application_number
int64
10.3M
15.9M
decision
stringclasses
3 values
title
stringlengths
3
468
abstract
stringlengths
43
4.3k
claims
stringlengths
44
338k
description
stringlengths
1.93k
2.86M
background
stringlengths
0
194k
summary
stringlengths
0
391k
cpc_label
stringlengths
0
12
filing_date
stringlengths
8
8
patent_issue_date
stringclasses
691 values
date_published
stringclasses
720 values
examiner_id
stringlengths
0
7
ipc_label
stringlengths
0
10
npe_litigated_count
int64
0
410
examiner_full_name
stringlengths
6
34
invention_title
stringlengths
3
410
small_entity_indicator
stringclasses
3 values
continuation
int64
0
1
decision_as_of_2020
stringclasses
6 values
main_ipcr_label_subclass
stringclasses
451 values
filing_year
int64
2k
2.02k
10,792,247
ACCEPTED
Sensor pre-load and weld fixture apparatus and method
A sensor pre-load and welding apparatus and method are disclosed. A weld fixture apparatus includes a fixture base upon which a sensor package having a sensor base and a sensor cover is located, and a load bar associated with a spring, wherein the load bar provides a specific weight to the fixture base in order to assist in maintaining the sensor cover and the sensor base parallel to one another upon the fixture base. An adjustable load foot is generally located above the fixture base, such that the adjustable load foot applies a pre-determined load with a specific weight to the sensor base in order to maintain the sensor cover and the sensor base securely in place as the sensor base and the sensor cover are welded to one another in order to configure the sensor package.
1. A weld fixture apparatus, comprising: a fixture base upon which a sensor package having a sensor base and a sensor cover is located a load bar associated with a spring, wherein said load bar provides a specific weight to said fixture base in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon said fixture base; and an adjustable load foot located above said fixture base, wherein said adjustable load foot applies a pre-determined load with a specific weight to said sensor base in order to maintain said sensor cover and said sensor base securely in place as said sensor base and said sensor cover are welded to one another in order to configure said sensor package. 2. The apparatus of claim 1 further comprising a plurality of guideposts integrated with said load bar in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon fixture base. 3. The apparatus of claim 1 wherein said sensor package comprises a SAW sensor. 4. The apparatus of claim 3 wherein said SAW sensor comprises at least one quartz component. 5. The apparatus of claim 1 further comprising a welding mechanism for tack welding said sensor cover to said sensor base in order to seal said sensor package. 6. The apparatus of claim 5 wherein said tack welding is provided by said welding mechanism at a low laser power for sealing said sensor package. 7. The apparatus of claim 6 wherein said sensor cover and said sensor base are located perpendicular to a laser beam generated by said welding mechanism for sealing said sensor package. 9. The apparatus of claim 1 further comprising a welding mechanism for stitch welding said sensor cover to said sensor base via a plurality of stitch welds for sealing said sensor package. 10. The apparatus of claim 1 further comprising a welding mechanism for welding said sensor cover to said sensor base, wherein said welding mechanism comprises a high power laser. 11. A weld fixture apparatus, comprising: a fixture base upon which a SAW sensor package having a sensor base and a sensor cover is located a load bar associated with a spring, wherein said load bar provides a specific weight to said fixture base in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon said fixture base; and a plurality of guideposts integrated with said load bar in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon fixture base; an adjustable load foot located above said fixture base, wherein said adjustable load foot applies a pre-determined load with a specific weight to said sensor base in order to maintain said sensor cover and said sensor base securely in place as said sensor base and said sensor cover are welded to one another in order to configure said SAW sensor package. 12. A weld fixture method, comprising the steps of: providing a fixture base upon which a sensor package having a sensor base and a sensor cover is located associating a load bar with a spring, wherein said load bar provides a specific weight to said fixture base in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon said fixture base; and locating an adjustable load foot above said fixture base, wherein said adjustable load foot applies a pre-determined load with a specific weight to said sensor base in order to maintain said sensor cover and said sensor base securely in place as said sensor base and said sensor cover are welded to one another in order to configure said sensor package. 13. The method of claim 12 further comprising the step of integrating a plurality of guideposts with said load bar in order to assist in maintaining said sensor cover and said sensor base parallel to one another upon fixture base. 14. The method of claim 12 wherein said sensor package comprises a SAW sensor. 16. The method of claim 12 further comprising the step of initially tack welding said sensor cover to said sensor base in order to seal said sensor package. 17. The method of claim 16 wherein said tack welding is provided by utilizing low laser power. 18. The method of claim 17 wherein said sensor cover and said sensor base are located perpendicular to a laser beam generated by said low power laser. 19. The method of claim 16 further comprising the step of: thereafter stitch welding said sensor cover to said sensor base. 20. The method of claim 19 further comprising the step of thereafter welding said sensor cover to said sensor base utilizing a high power laser.
TECHNICAL FIELD Embodiments are generally related to sensing methods and systems. Embodiments are also related to pressure and temperature sensors. Embodiments are additionally related to surface acoustic wave (SAW) devices and sensors. Embodiments are additionally related to welding fixture devices and welding techniques thereof. BACKGROUND OF THE INVENTION Various sensors are known in the pressure and temperature sensing arts. The ability to detect pressure and/or temperature is an advantage to any devices which are under constant temperature and which can be severely affected by temperature conditions. An example of such a device is an automobile tire, which of course, experiences variations in both temperature and pressure. Many different techniques have been proposed for sensing the pressure and/or temperature in tires, and for delivering this information to the operator at a central location on the vehicle so that he knows that a tire is at low or high air pressure. Such sensors generally communicate with the vehicle so that the sensed pressure and/or temperature are displayed to the operator when the vehicle is moving, i.e. the wheel rotating relative to the body of the vehicle. Such devices are generally relatively complex and expensive or alternatively are not particularly robust. Some tire pressure and/or temperature sensor systems incorporate a sensor that is fixed to the body so no rotating electrical contact between the rotating wheel and the chassis is required. In this system, a sensor rod is deflected by contact with the tire sidewall when the sidewall of the tire is deformed as occurs when the tire pressure is low. This system provides an indication of low tire pressure but is not robust. For example mud or other debris on the wheels may cause faulty readings. Furthermore, this system provides an indication only when the tire pressure is reduced significantly as is necessary for significant tire bulge to occur. Clearly such a system simply cannot provide a reading of actual tire pressure. In another form of fixed sensor the height of the vehicle can be detected and when the height is reduced, it is deemed tire pressure is low. However, if the tire in a rut or is parked on uneven ground, a faulty low-pressure reading is likely to be generated. More complicated systems are capable of monitoring tire pressure. For example, some pressure sensor systems utilize a rotating encoder formed by a multi-polar ring of magnetic segments of different polarity that are distributed circumferentially in a regular and alternating manner. A transmitter coil coaxial with the ring and a fixed pickup (an induction coil system) is energized by alternating electrical current flowing through the transmitter coil to generate a magnetic field superimposed on the magnetic field created by the multi-polar ring generates a signal picked up and delivers a signal relating the rotating characteristic of the wheel and thus, the state of the tire. Some tire pressure systems also utilize a wheel system wherein each sensor on each wheel is provided with a radio transmitter that transmit the information on tire pressure, etc. from the wheel to a radio receiver on the body of the vehicle and this transmitted signal is decoded to provide information on tire pressure etc. and makes it available to the operator. Conventional wireless systems, however, are not durable and are expensive to design and produce. One type of sensor that has found wide use in pressure and temperature sensing applications, such as, vehicle tires, is the Surface Acoustic Wave (SAW) sensors, which can be composed of a sense element on a base and pressure transducer sensor diaphragm that is part of the cover. For a SAW sensor to function properly, the sensor diaphragm should generally be located in intimate contact with the sense element at all pressure levels and temperatures. To compensate for expansion in the packaging, the sense element and sensor diaphragm must be preloaded when they are assembled to shift the output frequency a known amount, which ensures contact at all times. In conventional sensor designs, an interference fit between the cover and base can maintain a preload until the cover and base are locked in place by welding, soldering or other connecting means. In order to properly configure a sensor, such as a SAW sensor, the sensing device should include a sensor cover and a sensor base which are welded in order form a hermitic seal thereof. One of the problems with conventional welding devices and fixtures utilizing in forming sensor devices is that the sensing element is often at the mercy of the fixture load, which can subject the sensor elements within the sensor package to damage and/or prevent a true hermetically seal package from being formed. A need thus exists for an improved weld fixture apparatus and welding method, which can be utilized with the weld fixture apparatus, in order to properly configure sensor packages. BRIEF SUMMARY OF THE INVENTION The following summary of the invention is provided to facilitate an understanding of some of the innovative features unique to the present invention and is not intended to be a full description. A full appreciation of the various aspects of the invention can be gained by taking the entire specification, claims, drawings, and abstract as a whole. It is, therefore, one aspect of the present invention to provide an improved sensor assembly method and system. It is another aspect of the present invention to provide an improved method and system for welding components to a sensor during assembly thereof. It is yet another aspect of the present invention to provide a welding fixture technique for use in assembling sensor packages, such as, for example, SAW sensor devices. The aforementioned aspects of the invention and other objectives and advantages can now be achieved as described herein. A sensor pre-load and welding system and method are disclosed, which includes a weld fixture that includes a fixture base upon which a sensor package having a sensor base and a sensor cover is located, and a load bar associated with a spring, wherein the load bar provides a specific weight to the fixture base in order to assist in maintaining the sensor cover and the sensor base parallel to one another upon the fixture base. An adjustable load foot is generally located above the fixture base, such that the adjustable load foot applies a pre-determined load with a specific weight to the sensor base in order to maintain the sensor cover and the sensor base securely in place as the sensor base and the sensor cover are welded to one another in order to configure the sensor package. A plurality of guideposts can also be integrated with the load bar in order to assist in maintaining the sensor cover and the sensor base parallel to one another upon fixture base. The sensor itself can be, for example, a SAW sensor that includes one or more quartz components. Additionally, a welding mechanism can be provided for tack welding the sensor cover to the sensor base in order to seal the sensor package. Tack welding can be generated via a low laser power. When tack welding is implemented, the sensor cover and the sensor base are preferably located perpendicular to a laser beam generated by the welding mechanism. Stitch welding can also be implemented in order to weld the sensor cover to the sensor base via a plurality of stitch welds for sealing the sensor package. Finally, a high power laser can be implemented final welding of the sensor base to the sensor cover upon the weld fixture. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying figures, in which like reference numerals refer to identical or functionally-similar elements throughout the separate views and which are incorporated in and form a part of the specification, further illustrate the present invention and, together with the detailed description of the invention, serve to explain the principles of the present invention. FIG. 1 illustrates various views of a weld fix fixture apparatus, which can be implemented in accordance with a preferred embodiment of the present invention; FIG. 2 illustrates a side perspective view of the weld fixture apparatus depicted in FIG. 1, in accordance with a preferred embodiment of the present invention; FIG. 3 illustrates a bottom perspective view of the weld fixture apparatus depicted in FIGS. 1 and 2, in accordance with a preferred embodiment of the present invention; FIG. 4 illustrates an exploded view of a sensor package, which can be implemented in accordance with a preferred embodiment of the present invention; and FIG. 5 illustrates a high-level flow chart depicting a welding method, which can be implemented in accordance with a preferred embodiment of the present invention. DETAILED DESCRIPTION OF THE INVENTION The particular values and configurations discussed in these non-limiting examples can be varied and are cited merely to illustrate at least one embodiment of the present invention and are not intended to limit the scope of the invention. FIG. 1 illustrates various views of a weld fix fixture apparatus 100, which can be implemented in accordance with a preferred embodiment of the present invention. Top and bottom views of weld fixture apparatus 100 are disclosed in FIG. 1, along with back side and front side views. FIG. 2 illustrates a side perspective view of the weld fixture apparatus 100 depicted in FIG. 1, in accordance with a preferred embodiment of the present invention. Additionally, FIG. 3 illustrates a bottom perspective view of the weld fixture apparatus 100 depicted in FIGS. 1 and 2, in accordance with a preferred embodiment of the present invention. In FIGS. 1-3, similar or identical parts are generally indicated by identical reference numerals. Weld fixture apparatus 100 generally includes a fixture base 102 upon which a sensor package 101 having a sensor base (not shown in FIG. 1) and a sensor cover (also not shown in FIG. 1) can be positioned and located for welding via weld fixture apparatus 100. Fixture base 102 can be formed from a material such as copper. In generally fixture base 102 functions a locator, and includes a locator hold 120 for last placement via a welding mechanism (e.g., a laser welding mechanism), which is described in greater detail here. A load bar 110 is generally associated with a spring 194, such that load bar 110 provides a specific weight to fixture base 102 in order to assist in maintaining the sensor cover and the sensor base of sensor package 101 parallel to one another upon fixture base 102. Sensor package 101 is preferably located below a central portion 107 of load bar 110. Spring 194 is caped by a shouldered cap screw 106. Additionally, an adjustable load foot 108 can be located above the fixture base 102, such that the adjustable load foot 108 applies a pre-determined load with a specific weight to the sensor base in order to maintain the sensor cover and the sensor base securely in place as the sensor base and the sensor cover are welded to one another in order to configure sensor package 101. A plurality of guideposts 112 and 113, which function as locator pins can be associated or integrated with the load bar 110 in order to assist in maintaining the sensor cover and the sensor base of sensor package 101 parallel to one another upon fixture base 102. Note that sensor package 101 can be configured as a SAW sensor device (e.g., a SAW “button” sensor), which includes one or more quartz components. An example of such a SAW sensor device is described in greater detail herein with respect to FIG. 4, including sensor base and sensor cover components thereof. Fixture base 102 additionally includes holes 123 and 122 which can be utilized to respectively engage guideposts 112 and 113 at fixture base 102. In general, sensor package 101, such as, for example, a SAW sensor assembly, requires a weld process that will not affect the pre-determined load on any of the SAW quartz components inside sensor package 101 when the sensor cover is welded to the base of sensor package 101 (i.e., see FIG. 4 for sensor cover and sensor base). Thus, weld fixture apparatus 100 can be utilized to hold the sensor cover and sensor base in parallel with each other at a specific load. Additionally, as will be explained in greater detail herein, a welding method can be implemented which includes spot weld, stitch welds, and a final weld at various power and welding size setting so as not to apply additional loads or resulting in un-loading of the quartz components within the sensor package 101. FIG. 4 illustrates an exploded view of a sensor package 400, which can be implemented in accordance with a preferred embodiment of the present invention. Sensor package 400 of FIG. 4 is generally analogous to sensor package 101 of FIG. 1. Sensor package 400 can be utilized, for example, as a pressure sensor that includes a sense element 406, a sensor base 408, and a cover 404 that contains a flexible diaphragm 403 and a dimple 402. For the sensor to achieve the application accuracy required, the dimple 402 should be in intimate contact with the sense element 406 at all pressure levels and temperatures. To compensate for thermal expansion of the packaging materials (i.e., base 408 and cover 404), the sense element 406 (e.g., a quartz sense element) and the sensor diaphragm 403 can be preloaded when assembled, in order to shift the output frequency a known amount to ensure contact at all times. Note that although the sensor package 400 can be implemented as a SAW pressure sensor, it can be appreciated that alternative embodiments of the present invention can be implemented in the context of a non-SAW sensors. For example, rather than utilizing a quartz sense element, other types of sense elements (e.g., ceramic, silicon and the like) may be utilized in accordance with alternative embodiments of the present invention. The dimple 402 can be formed in the center of the pressure sensor diaphragm 403 portion of the cover 404 during its manufacture. The dimple 402 generally contacts a flat surface on the sense element 406. In general, the sensor package 400 can be embodied as a small, circular component. The design configuration is generally implemented as small, circular, hermetically sealed button package. Example dimensions include approximately 12 mm in diameter and approximately 2 mm thick. It can be of course be appreciated that such dimensions are mentioned for illustrative purposes only, and are not considered limiting features of the present invention. The dimensions of sensor package 400 can vary, depending on the needs and use of such a device. The design of the cover 404 and base 408 are such that it generally allows for the reduction of assembly tolerances. The sensor material of the base 408 and cover 404 can be formed from stainless steel 17-7 PH. The advantages of such a material are discussed in greater detail herein. The pressure sensor can also be configured in association with an interface design board. For example, a PCB or flex circuit interconnect can be located between the pressure sensor button package and one or more antennas thereof for the transmission and receipt of wireless data. Sensor package 400 generally includes a package cover 404 that includes a dimple 402 formed at the center of diaphragm 403. In FIG. 4, the diaphragm area of diaphragm 403 is indicated generally by a circular dashed line. Similarly, dimple 402 is generally indicated also by a circular dashed line. The diaphragm 403 is the flat surface on the top of cover 402. Sense element 106 can be implemented, for example, as a quartz sense element, a ceramic sense element, a silicon sense element and the like. A SAW chip, for example, can be utilized as sense element 406. Base 408 includes a base portion 220, which can be recessed into base 408 and in which the sensor element or sense element 406 can rest. Cover 404 can be initially formed from a flat sheet stock that is approximately 0.50 mm thick in the annealed condition. The cover can next be stamped into a circular shape, and deep drawn into a cup configuration. Next, dimple 402 can be formed into the center of the diaphragm 403 portion of cover 404, such that dimple 402 is formed approximately 0.6 mm deep into cover 404. It can be of course be appreciated that such dimensions are discussed herein for illustrative purposes only, and are not considered limiting features of the present invention. Again, the dimensions of cover 404 may vary, depending on the needs and use of such a device. Base 408 can also be formed from a stainless steel such as a stainless steel 17-7 PH material. Stamping approximately 2 mm thick annealed material into a circular disk can form base 408. Such a disk can be formed so that two small saddles are protruding from base 408 for which the sensor chip (e.g., a sense element 406) will rest. Holes 416 and 418 can thus be punched into base 408 to facilitate glass to metal seals thereof. Hole 416 is associated with pin 412, while hole 418 is associated with pin 414. Pins 412 and 414 can be utilized to make electrical connection through the hermetic seal. FIG. 5 illustrates a high-level flow chart 500 depicting a welding method, which can be implemented in accordance with a preferred embodiment of the present invention. The weld process can be composed generally of 3 individual steps. All reference to location on the circular part is made using a clock face naming convention. The first step is a tack weld, which is generally indicated by block 502 of flow chart 500. The operation depicted at block 502 can be accomplished utilizing a low laser power welding mechanism, such that the part to be welded is located perpendicular to the laser beam generated by the welding mechanism. The part is welded with one tack weld at 4 points located at 12, 6, 3, and 9 o'clock respectively. The second process step involves stitch welding, which is generally initiated as indicated at block 504. The stitch welding process is composed of 3 sets of stitch welds, which are respectively depicted at blocks 506, 508 and 510. The part to be welded is generally located at about a 65-degree angle from the laser beam generated by the welding mechanism. The first set of stitch weld, as illustrated at block 506, can begin at 9, 3, 6, and 12 o'clock and can be 1 hour counterclockwise in length. The second set of stitch welds as depicted at block 508 can start where the first set of stitch welds finished at 8, 2, 5, and 11 o'clock. The third and final set of stitch welds, as depicted at block 510, can begin at the finish of the second stitch weld at 7, 1, 4, and 10 o'clock. Once the third set of stitch welds are complete, the part or component is completely welded around the entire perimeter (e.g., the perimeter of sensor package 400 depicted in FIG. 4). The third and final step to the weld process is the final weld, which is generally indicated at block 512. This weld can be completed with a higher power laser that starts at 12 o'clock and completely circles the part to finish at 12 o'clock while the part is generally located at about 65 degrees form the laser beam. Based on the foregoing, it can be appreciate that embodiments of the present invention generally describe a weld fixture apparatus and a technique for welding a sensor cover to a sensor base so that any pre-determined load on the SAW quartz is not affected. First, a fixture apparatus is presented in which the sensor cover and sensor base are located parallel to each other and at a specific load. Second, a welding process is described which includes spot welds, stitch welds and a final weld at various power and weld size settings so that it is not necessary apply additional loads or un-load the quartz inside the package. The weld fixture apparatus generally includes a base, load bar, load foot and guideposts. The fixture load bar can be spring-loaded and at a specific weight with an adjustable load foot that applies the pre-determined load to the base and also hold the base and cover parallel to each other. The pre-load on to the SAW quartz can be held as the welding process takes place. The embodiments and examples set forth herein are presented to best explain the present invention and its practical application and to thereby enable those skilled in the art to make and utilize the invention. Those skilled in the art, however, will recognize that the foregoing description and examples have been presented for the purpose of illustration and example only. Other variations and modifications of the present invention will be apparent to those of skill in the art, and it is the intent of the appended claims that such variations and modifications be covered. The description as set forth is not intended to be exhaustive or to limit the scope of the invention. Many modifications and variations are possible in light of the above teaching without departing from the scope of the following claims. It is contemplated that the use of the present invention can involve components having different characteristics. It is intended that the scope of the present invention be defined by the claims appended hereto, giving full cognizance to equivalents in all respects. The embodiments of the invention in which an exclusive property or right is claimed are defined as follows.
<SOH> BACKGROUND OF THE INVENTION <EOH>Various sensors are known in the pressure and temperature sensing arts. The ability to detect pressure and/or temperature is an advantage to any devices which are under constant temperature and which can be severely affected by temperature conditions. An example of such a device is an automobile tire, which of course, experiences variations in both temperature and pressure. Many different techniques have been proposed for sensing the pressure and/or temperature in tires, and for delivering this information to the operator at a central location on the vehicle so that he knows that a tire is at low or high air pressure. Such sensors generally communicate with the vehicle so that the sensed pressure and/or temperature are displayed to the operator when the vehicle is moving, i.e. the wheel rotating relative to the body of the vehicle. Such devices are generally relatively complex and expensive or alternatively are not particularly robust. Some tire pressure and/or temperature sensor systems incorporate a sensor that is fixed to the body so no rotating electrical contact between the rotating wheel and the chassis is required. In this system, a sensor rod is deflected by contact with the tire sidewall when the sidewall of the tire is deformed as occurs when the tire pressure is low. This system provides an indication of low tire pressure but is not robust. For example mud or other debris on the wheels may cause faulty readings. Furthermore, this system provides an indication only when the tire pressure is reduced significantly as is necessary for significant tire bulge to occur. Clearly such a system simply cannot provide a reading of actual tire pressure. In another form of fixed sensor the height of the vehicle can be detected and when the height is reduced, it is deemed tire pressure is low. However, if the tire in a rut or is parked on uneven ground, a faulty low-pressure reading is likely to be generated. More complicated systems are capable of monitoring tire pressure. For example, some pressure sensor systems utilize a rotating encoder formed by a multi-polar ring of magnetic segments of different polarity that are distributed circumferentially in a regular and alternating manner. A transmitter coil coaxial with the ring and a fixed pickup (an induction coil system) is energized by alternating electrical current flowing through the transmitter coil to generate a magnetic field superimposed on the magnetic field created by the multi-polar ring generates a signal picked up and delivers a signal relating the rotating characteristic of the wheel and thus, the state of the tire. Some tire pressure systems also utilize a wheel system wherein each sensor on each wheel is provided with a radio transmitter that transmit the information on tire pressure, etc. from the wheel to a radio receiver on the body of the vehicle and this transmitted signal is decoded to provide information on tire pressure etc. and makes it available to the operator. Conventional wireless systems, however, are not durable and are expensive to design and produce. One type of sensor that has found wide use in pressure and temperature sensing applications, such as, vehicle tires, is the Surface Acoustic Wave (SAW) sensors, which can be composed of a sense element on a base and pressure transducer sensor diaphragm that is part of the cover. For a SAW sensor to function properly, the sensor diaphragm should generally be located in intimate contact with the sense element at all pressure levels and temperatures. To compensate for expansion in the packaging, the sense element and sensor diaphragm must be preloaded when they are assembled to shift the output frequency a known amount, which ensures contact at all times. In conventional sensor designs, an interference fit between the cover and base can maintain a preload until the cover and base are locked in place by welding, soldering or other connecting means. In order to properly configure a sensor, such as a SAW sensor, the sensing device should include a sensor cover and a sensor base which are welded in order form a hermitic seal thereof. One of the problems with conventional welding devices and fixtures utilizing in forming sensor devices is that the sensing element is often at the mercy of the fixture load, which can subject the sensor elements within the sensor package to damage and/or prevent a true hermetically seal package from being formed. A need thus exists for an improved weld fixture apparatus and welding method, which can be utilized with the weld fixture apparatus, in order to properly configure sensor packages.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>The following summary of the invention is provided to facilitate an understanding of some of the innovative features unique to the present invention and is not intended to be a full description. A full appreciation of the various aspects of the invention can be gained by taking the entire specification, claims, drawings, and abstract as a whole. It is, therefore, one aspect of the present invention to provide an improved sensor assembly method and system. It is another aspect of the present invention to provide an improved method and system for welding components to a sensor during assembly thereof. It is yet another aspect of the present invention to provide a welding fixture technique for use in assembling sensor packages, such as, for example, SAW sensor devices. The aforementioned aspects of the invention and other objectives and advantages can now be achieved as described herein. A sensor pre-load and welding system and method are disclosed, which includes a weld fixture that includes a fixture base upon which a sensor package having a sensor base and a sensor cover is located, and a load bar associated with a spring, wherein the load bar provides a specific weight to the fixture base in order to assist in maintaining the sensor cover and the sensor base parallel to one another upon the fixture base. An adjustable load foot is generally located above the fixture base, such that the adjustable load foot applies a pre-determined load with a specific weight to the sensor base in order to maintain the sensor cover and the sensor base securely in place as the sensor base and the sensor cover are welded to one another in order to configure the sensor package. A plurality of guideposts can also be integrated with the load bar in order to assist in maintaining the sensor cover and the sensor base parallel to one another upon fixture base. The sensor itself can be, for example, a SAW sensor that includes one or more quartz components. Additionally, a welding mechanism can be provided for tack welding the sensor cover to the sensor base in order to seal the sensor package. Tack welding can be generated via a low laser power. When tack welding is implemented, the sensor cover and the sensor base are preferably located perpendicular to a laser beam generated by the welding mechanism. Stitch welding can also be implemented in order to weld the sensor cover to the sensor base via a plurality of stitch welds for sealing the sensor package. Finally, a high power laser can be implemented final welding of the sensor base to the sensor cover upon the weld fixture.
20040303
20060704
20050908
62458.0
0
ABOAGYE, MICHAEL
SENSOR PRE-LOAD AND WELD FIXTURE APPARATUS AND METHOD
UNDISCOUNTED
0
ACCEPTED
2,004
10,792,311
ACCEPTED
Copolymer 1 related polypeptides for use as molecular weight markers and for therapeutic use
The present invention provides molecular weight markers for accurate determination of the molecular weight of glatiramer acetate and other copolymers. The present invention further provides a plurality of molecular weight markers for determining the molecular weight of glatiramer acetate and other copolymers which display linear relationships between molar ellipticity and molecular weight, and between retention time and the log of the molecular weight. The molecular weight markers also optimally demonstrate biological activity similar to glatiramer acetate orcorresponding copolymers and can be used for treating or preventing various immune diseases.
1-122. (Canceled) 123. In a process for obtaining a pharmaceutical product containing an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine, wherein the mixture has a desired average molecular weight and wherein during the process a batch of an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine, is tested using a gel permeation chromatography column to determine whether the mixture has the desired average molecular weight for inclusion in the pharmaceutical product, the improvement comprising calibrating the molecular weight obtained using the gel permeation chromatography column by subjecting a plurality of molecular weight markers, each of which is a polypeptide consisting essentially of alanine, glutamic acid, tyrosine and lysine and having a predetermined amino acid sequence, to chromatography on the column to establish a relationship between retention time on the column and molecular weight. 124. The process of claim 123, wherein the mixture of polypeptide that is tested is glatiramer acetate. 125. The process of claim 124, wherein the glatiramer acetate has an average molecular weight from 4000 to 13,000 Daltons. 126. The process of claim 125, wherein in the glatiramer acetate the molar fraction of analine is 0.427, of glutamic acid is 0.141, of lysine is 0.337 and of tyrosine is 0.093. 127. The process of claim 123, wherein the gel permeation chromatography column comprises a cross-linked agarose-based medium, with an exclusion limit of 2×106 Daltons, an optimal separation range of 1000 to 3×105 Daltons, and a bead diameter of 20-40 μm. 128. The process of claim 127, wherein the gel permeation chromatography column is Superose 12. 129. The process of claim 123, wherein in the molecular weight markers the molar fraction of analine is 0.38 to 0.5, of glutamic acid is 0.13 to 0.15, of tyrosine is 0.08 to 0.10 and of lysine is 0.3 to 0.4. 130. The process of claim 129, wherein in the molecular weight markers the molar fraction of analine is 0.422 to 0.444, of glutamic acid is 0.133 to 0.143, of tyrosine is 0.086 to 0.093 and of lysine is 0.333 to 0.349. 131. The process of claim 123, wherein one of the molecular weight markers is selected from the group consisting of AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 132. The process of claim 123, wherein the plurality of molecular weight markers is AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 133. The process of claim 124, further comprising a step of lyophilizing of the glatiramer acetate. 134. A process for obtaining a pharmaceutical composition containing an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine, wherein the mixture has a desired average molecular weight, which comprises obtaining a batch of an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine; determining the average molecular weight of the mixture of polypeptides in the batch using a molecular weight-calibrated gel permeation chromatography column; and including in the pharmaceutical product the mixture if the mixture is determined to have the desired average molecular weight, wherein the calibration of the molecular weight obtained using the gel permeation chromatography column comprises subjecting a plurality of molecular weight markers to chromatography on the column to establish a relationship between the retention time on the column and molecular weight, wherein each of the markers is a polypeptide consisting essentially of alanine, glutamic acid, tyrosine and lysine and has a predetermined amino sequence. 135. The process of claim 134, wherein the batch of the aqueous mixture of polypeptide is glatiramer acetate. 136. The process of claim 135, wherein the glatiramer acetate has an average molecular weight from 4000 to 13,000 Daltons. 137. The process of claim 136, wherein in the glatiramer acetate the molar fraction of analine is 0.427, of glutamic acid is 0.141, of lysine is 0.337 and of tyrosine is 0.093. 138. The process of claim 134, wherein the gel permeation chromatography column comprises a cross-linked agarose-based medium, with an exclusion limit of 2×106 Daltons, an optimal separation range of 1000 to 3×105 Daltons, and a bead diameter of 20-40 μm. 139. The process of claim 138, wherein the gel permeation chromatography column is Superose 12. 140. The process of claim 134, wherein in the molecular weight markers the molar fraction of analine is 0.38 to 0.5, of glutamic acid is 0.13 to 0.15, of tyrosine is 0.08 to 0.10 and of lysine is 0.3 to 0.4. 141. The process of claim 140, wherein in the molecular weight markers the molar fraction of analine is 0.422 to 0.444, of glutamic acid is 0.133 to 0.143, of tyrosine is 0.086 to 0.093 and of lysine is 0.333 to 0.349. 142. The process of claim 134, wherein one of the molecular weight markers is selected from the group consisting of AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 143. The process of claim 134, wherein the plurality of molecular weight markers is AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 144. The process of claim 135, further comprising a step of lyophilizing of the glatiramer acetate having the desired average molecular weight distribution. 145. A process for determining the average molecular weight of an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine, which comprises subjecting the mixture to chromatography on a molecular weight-calibrated gel permeation chromatography column so as to determine the average molecular weight of the mixture, wherein the calibration of the molecular weight obtained using the gel permeation chromatography column comprises subjecting a plurality of molecular weight markers to chromatography on the column to establish a relationship between retention time on the column and molecular weight, wherein each of the markers is a polypeptide consisting essentially of alanine, glutamic acid, tyrosine and lysine and has a predetermined amino acid sequence. 146. The process of claim 145, wherein the aqueous mixture of polypeptide is glatiramer acetate. 147. The process of claim 146, wherein the glatiramer acetate has an average molecular weight from 4000 to 13,000 Daltons. 148. The process of claim 147, wherein in the glatiramer acetate the molar fraction of analine is 0.427, of glutamic acid is 0.141, of lysine is 0.337 and of tyrosine is 0.093. 149. The process of claim 145, wherein the gel permeation chromatography column comprises a cross-linked agarose-based medium, with an exclusion limit of 2×106 Daltons, an optimal separation range of 1000 to 3×105 Daltons, and a bead diameter of 20-40 μm. 150. The process of claim 149, wherein the gel permeation chromatography column is Superose 12. 151. The process of claim 145, wherein in the molecular weight markers the molar fraction of analine is 0.38 to 0.5, of glutamic acid is 0.13 to 0.15, of tyrosine is 0.08 to 0.10 and of lysine is 0.3 to 0.4. 152. The process of claim 151, wherein in the molecular weight markers the molar fraction of analine is 0.422 to 0.444, of glutamic acid is 0.133 to 0.143, of tyrosine is 0.086 to 0.093 and of lysine is 0.333 to 0.349. 153. The process of claim 145, wherein one of the molecular weight markers is selected from the group consisting of AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 154. The process of claim 145, wherein the plurality of molecular weight markers is AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 155. A process for determining whether an aqueous mixture of polypeptides, each of which consists essentially of alanine, glutamic acid, tyrosine and lysine, has a desired average molecular weight, which comprises subjecting the mixture to a calibrated gel permeation chromatography column to determine the average molecular weight of the mixture and comparing the average molecular weight so determined to the desired average molecular weight, wherein the calibration of the molecular weight obtained using the gel permeation chromatography column comprises subjecting a plurality of molecular weight markers to chromatography on the column to establish a relationship between retention time on the column and molecular weight, wherein, each of the markers is a polypeptide consisting essentially of alanine, glutamic acid, tyrosine and lysine and has a predetermined amino acid sequence. 156. The process of claim 155, wherein the mixture of polypeptide that is tested is glatiramer acetate. 157. The process of claim 156, wherein the glatiramer acetate has an average molecular weight from 4000 to 13,000 Daltons. 158. The process of claim 157, wherein in the glatiramer acetate the molar fraction of analine is 0.427, of glutamic acid is 0.141, of lysine is 0.337 and of tyrosine is 0.093. 159. The process of claim 155, wherein the gel permeation chromatography column comprises a cross-linked agarose-based medium, with an exclusion limit of 2×106 Daltons, an optimal separation range of 1000 to 3×105 Daltons, and a bead diameter of 20-40 μm. 160. The process of claim 159, wherein the gel permeation chromatography column is Superose 12. 161. The process of claim 155, wherein in the molecular weight markers the molar fraction of analine is 0.38 to 0.5, of glutamic acid is 0.13 to 0.15, of tyrosine is 0.08 to 0.10 and of lysine is 0.3 to 0.4. 162. The process of claim 161, wherein in the molecular weight markers the molar fraction of analine is 0.422 to 0.444, of glutamic acid is 0.133 to 0.143, of tyrosine is 0.086 to 0.093 and of lysine is 0.333 to 0.349. 163. The process of claim 155, wherein one of the molecular weight markers is selected from the group consisting of AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid. 164. The process of claim 155, wherein the plurality of molecular weight markers is AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEAAYEA; (SEQ ID NO: 1) AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKEAAYEA; (SEQ ID NO: 2) AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKYKAEAAKAAAKEAAYE; (SEQ ID NO: 3) A AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEKKEYAAAEAKYKAEAA; (SEQ ID NO: 4) KAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 5) AAEAKYKAEAAKAAAKEAAYEA AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEAKKYAKAAKAEKKEYA; (SEQ ID NO: 6) AAEAKYKAEAAKKAYKAEAAKAAAKEAAYEA and AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKKKAKAEAKKYAKEAAK, (SEQ ID NO: 7) AKKEAYKAEAKKYAKAAKAEKKEYAAAEAKKAEAAKAYKAEAAKAAAKEAAYEA wherein A represents alanine, K represents lysine, Y represents tyrosine, and E represents glutamic acid.
RELATED APPLICATIONS The present application claims the benefit of provisional application 60/101,825, filed Sep. 25, 1998, which is incorporated by reference herein. INTRODUCTION The present invention provides molecular weight markers for accurate determination of the molecular weight of glatiramer acetate, terpolymers and other copolymers. The molecular weight markers are polypeptides having identified molecular weights between about 2,000 daltons and about 40,000 daltons, and an amino acid composition corresponding to glatiramer acetate or a related copolymer. Identified molecular weights are provided by polypeptides having defined sequences. Molecular weight markers corresponding to glatiramer acetate comprise the amino acids alanine, glutamic acid, tyrosine and lysine in specific molar ratios. Molecular weight markers corresponding to related terpolymers comprise three of the four amino acids. In a preferred embodiment, the polypeptide has alanine at the N-terminus and tyrosine at the fourth position from the N-terminus. The present invention further provides a plurality of molecular weight markers for determining the molecular weight range of a copolymer composition. The plurality of molecular weight markers ideally displays linear relationships between molar ellipticity and molecular weight, or between retention time and the log of molecular weight. Optimally, the polypeptides demonstrate biological activity similar to the copolymer from which they are derived. Polypeptides having defined molecular weights and amino acid compositions similar to glatiramer acetate optimally have therapeutic utility for the treatment of immune diseases and conditions. BACKGROUND OF THE INVENTION Autoimmune diseases occur when an organism's immune system fails to recognize some of the organism's own tissues as “self” and attacks them as “foreign.” Normally, self-tolerance is developed early by developmental events within the immune system that prevent the organism's own T cells and B cells from reacting with the organism's own tissues. These early immune responses are mediated by the binding of antigens to MHC molecules and presentation to T cell receptors. This self-tolerance process breaks down when autoimmune diseases develop and the organism's own tissues and proteins are recognized as “autoantigens” and attacked by the organism's immune system. For example, multiple sclerosis is believed to be an autoimmune disease occurring when the immune system attacks the myelin sheath, whose function is to insulate and protect nerves. It is a progressive disease characterized by demyelination, followed by neuronal and motor function loss. Rheumatoid arthritis (“RA”) is also believed to be an autoimmune disease which involves chronic inflammation of the synovial joints and infiltration by activated T cells, macrophages and plasma cells, leading to a progressive destruction of the articular cartilage. It is the most severe form of joint disease. The nature of the autoantigen(s) attacked in rheumatoid arthritis is poorly understood, although collagen type II is a candidate. A tendency to develop multiple sclerosis and rheumatoid arthritis is inherited. These diseases occur more frequently in individuals carrying one or more characteristic MHC class II alleles. For example, inherited susceptibility for rheumatoid arthritis is strongly associated with the MHC class II DRB1 *0401, DRB 1 *0404, or DRB 1*0405 or the DRB1*0101 alleles. The histocompatibility locus antigens (HLA) are found on the surface of cells and help determine the individuality of tissues from different persons. Genes for histocompatibility locus antigens are located in the same region of chromosome 6 as the major histocompatibility complex (MHC). The MHC region expresses a number of distinctive classes of molecules in various cells of the body, the genes being, in order of sequence along the chromosome, the Class I, II and III MHC genes. The Class I genes consist of HLA genes, which are further subdivided into A, B and C subregions. The Class II genes are subdivided into the DR, DQ and DP subregions. The MHC-DR molecules are the best known; these occur on the surfaces of antigen presenting cells such as macrophages, dendritic cells of lymphoid tissue and epidermal cells. The Class III MHC products are expressed in various components of the complement system, as well as in some non-immune related cells. A number of therapeutic agents have been developed to treat autoimmune diseases, including steroidal and non-steroidal anti-inflammatory drugs, for example, methotrexate; various interferons; and certain inhibitors of prostaglandin synthesis. However, these agents can be toxic when used for more than short periods of time or cause undesirable side effects. Other therapeutic agents bind to and/or inhibit the inflammatory activity of tumor necrosis factor (TNF), for example, anti-TNF specific antibodies or antibody fragments, or a soluble form of the TNF receptor. These agents target a protein on the surface of a T cell and generally prevent interaction with an antigen presenting cell (APC). However, therapeutic compositions containing natural folded proteins are often difficult to produce, formulate, store, and deliver. Moreover, the innate heterogeneity of the immune system can limit the effectiveness of drugs and complicate long-term treatment of autoimmune diseases. Glatiramer acetate (Copolymer 1; Cop 1; hereinafter GLAT copolymer) is a mixture of polypeptides composed of alanine, glutamic acid, lysine, and tyrosine in a molar ratio of approximately 4.6:1.5:3.6:1.0, respectively, which is synthesized by chemically polymerizing the four amino acids, forming products with average molecular weights ranging from about 4000 to about 13,000 daltons. The corresponding molar fractions are approximately 0.427 for alanine, 0.141 for glutamic acid, 0.337 for lysine and 0.093 for tyrosine, and may vary by about +/−10%. Related copolymers are mixtures of polypeptides composed of three (thus, “terpolymers”) of the four aforementioned amino acids. Copolymer 1 and the terpolymers address the innate heterogeneity of the mammalian immune system and human population and are effective for treatment of autoimmune diseases and other immune conditions. Preferred average molecular weight ranges and processes of making terpolymers are described in U.S. Pat. No. 5,800,808, which is hereby incorporated by reference in its entirety. Also contemplated by the invention are other copolymers comprised of other combinations of three, four, or five or more amino acids. To certify a Copolymer 1 or terpolymer preparation for use in a pharmaceutical products, it is necessary to accurately determine the molecular weight distribution of the polypeptides in the preparation. One method for determining the molecular weight is chromatography on a Superose 12 column. Calibration coefficients of columns for determination of glatiramer acetate molecular weight have been determined using glatiramer acetate batches with indirectly measured molecular weights. Indirect measures have included viscosimetry and velocity-sedimentation ultracentrifugation. More recently, batches of glatiramer acetate markers have been prepared whose molecular weights were determined by multiple angle laser light scattering (MALLS). Thus, a need exists for molecular weight markers useful as standards for determining the molecular weight distribution of copolymer compositions contemplated by the invention. Desirable molecular weight markers have defined molecular weights and physical properties which are analogous to the molecules for which molecular weight is to be determined. Ideally, there is a linear relationship between the defined molecular weights (or the log of the defined molecular weights) of the markers and a measurable physical property such as, for example, the molar ellipticity of the markers, or the retention time of the markers on a molecular sizing column. SUMMARY OF THE INVENTION Sequence-defined molecular weight markers that have chemical and physical characteristics similar to GLAT copolymer provide an accurate and robust calibration set for determinations of molecular weight of production batches. The present invention provides derivatives of GLAT copolymer useful as molecular weight markers for determining the molecular weight ranges of GLAT copolymer preparations and optimally having therapeutic utility for treatment of immune conditions. The invention further provides polypeptides having defined molecular weights which are derivatives of other copolymers and which are useful for determining molecular weight ranges of preparations of those copolymers. When those copolymers are therapeutically useful, the derivative polypeptides optimally have therapeutic utility. For determination of the molecular weight range of a GLAT copolymer preparation, the preferred derivative is a polypeptide having an amino acid compositon corresponding approximately to GLAT copolymer and an identified molecular weight which is between about 2,000 daltons and about 40,000 daltons. The polypeptide preferably has specific molar ratios of amino acids alanine, glutamic acid tyrosine and lysine. Moreover, in a preferred embodiment the polypeptide has alanine at the N-terminus and tyrosine at the fourth position from the N-terminus. For determination of the molecular weight of a terpolymer, the preferred derivative will have a defined molecular weight and an amino acid composition corresponding approximately to that of the terpolymer. Other copolymers are also contemplated by the invention. When determining of the molecular weight of a copolymer contemplated by the invention, the polypeptide derivative will have a defined molecular weight and an amino acid composition corresponding approximately to that of the copolymer. The present invention further provides a plurality of molecular weight markers for determining the molecular weight of glatiramer acetate or a terpolymer or other copolymer on a molecular weight sizing column. The markers comprise two to ten or more polypeptides, each polypeptide having an identified molecular weight. When determining the molecular weight range of glatiramer acetate, a preferred plurality of molecular weight markers will have defined molecular weights from about 2,000 daltons to about 40,000 daltons, and amino acid compositions corresponding to glatiramer acetate or a selected terpolymer. In preferred embodiments, there is a linear relationship between the log molecular weight of the polypeptide molecular weight markers and either the retention time of the molecular weight markers on a sizing column or between the molecular weight of the molecular weight markers and the molar ellipticity of the molecular weight markers. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of GLAT copolymer and consisting essentially of amino acids alanine, glutamic acid, tyrosine and lysine in molar fractions of from about 0.38 to about 0.50 alanine, from about 0.13 to about 0.15 glutamic acid, from about 0.08 to about 0.10 tyrosine, and from about 0.3 to about 0.4 lysine, and a pharmaceutically acceptable carrier. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular-weight range-of a terpolymer and consisting essentially of amino acids alanine, tyrosine, and lysine in the molar fractions of from about 0.3 to about 0.6 alanine, from about 0.005 to about 0.25 tyrosine, and from about 0.1 to about 0.5 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of glutamic acid. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of glutamic acid, tyrosine and lysine in molar fractions of from about 0.005 to about 0.300 glutamic acid, from about 0.005 to about 0.250 tyrosine, and from about 0.3 to about 0.7 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of alanine. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of amino acids alanine, glutamic acid and tyrosine in molar fractions of from about 0.005 to about 0.8 alanine, from about 0.005 to about 0.3 glutamic acid, and from about 0.005 to about 0.25 tyrosine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of lysine. The present invention also provides pharmaceutical compositions which includes a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of alanine, glutamic acid and lysine, in molar fractions of from about 0.005 to about 0.6 alanine, from about 0.005 to about 0.3 glutamic acid, and from about 0.2 to about 0.7 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of tyrosine. In general, pharmaceutical compositions of the invention include therapeutically effective amounts of a polypeptide which is useful as a molecular weight marker for determining the molecular weight range of a copolymer of any number (e.g., three to five or more) of amino acids. In the manner of glatiramer acetate, such a copolymer is a diverse population of sequences of the amino acids. The polypeptide useful as a molecular weight marker consists of those amino acids in molar fractions corresponding approximately to the copolymer. The present invention further provides methods for treating and preventing immune-mediated and autoimmune diseases in a mammal which include administering a therapeutically effective amount of a molecular weight marker of the invention. In another embodiment, the method for treating immune-mediated and autoimmune diseases in a mammal further involves inhibiting proliferation of T cells involved in the immune attack. In another embodiment, the method for treating immune-mediated and autoimmune diseases in a mammal involves binding a molecular weight marker of the invention to an antigen presenting cell. In yet another embodiment, the method for treating immune-mediated and autoimmune disease in a mammal involves binding a molecular weight marker of the invention to a major histocompatibility complex class II protein which is associated with autoimmune diseases. Autoimmune diseases contemplated by the present invention include arthritic conditions, demyelinating diseases and inflammatory diseases. For example, autoimmune diseases which can be treated by the present compositions include multiple sclerosis, rheumatoid arthritis, osteoarthritis, autoimmune hemolytic anemia, autoimmune oophoritis, autoimmune thyroiditis, autoimmune uveoretinitis, Crohn's disease, chronic immune thrombocytopenic purpura, colitis, contact sensitivity disease, diabetes mellitus, Graves disease, Guillain-Barre's syndrome, Hashimoto's disease, idiopathic myxedema, myasthenia gravis, psoriasis, pemphigus vulgaris, or systemic lupus erythematosus. Immune-mediated diseases result from undesired sensitivity of the immune system to particular foreign antigens. Examples are host-versus-graft disease (HVGD) and graft-versus-host disease (GVHD) and numerous types of delayed-type hypersensitivity (DTH). The present compositions can be used to treat one or more of these diseases. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1a provides the distribution of alanine in the molecular markers (TV-markers) described in Table 1. The amino acid position is defined by the X-axis. The presence of an alanine is indicated by a vertical bar at the indicated amino acid position. FIG. 1b provides the distribution of lysine in the TV-markers described in Table 1. The amino acid position is defined by the X-axis. The presence of a lysine residue is indicated by a vertical bar at the indicated amino acid position. FIG. 1c provides the distribution of glutamic acid in the TV-markers described in Table 1. The amino acid position is defined by the X-axis. The presence of a glutamic acid residue is indicated by a vertical bar at the indicated amino acid position. FIG. 1d provides the distribution of tyrosine in the TV-markers described in Table 1. The amino acid position is defined by the X-axis. The presence of a tyrosine residue is indicated by a vertical bar at the indicated amino acid position. FIG. 2 provides a plot of the molar ellipticity versus molecular weight of the present TV-markers compared to known glatiramer acetate markers. The molar ellipticity is provided in 10−5 deg cm−2 dmole−1 and the molecular weight is in daltons. Circles indicate TV-markers and squares depict glatiramer acetate markers. As shown, the TV-markers provide a linear relationship between molar ellipticity and molecular weight. FIG. 3a provides a plot of the relative retention time (RRT) of the present TV-markers versus the log molecular weight of those markers, using the RRT-based algorithm. FIG. 3b provides a plot of the log molecular weight of the TV-markers versus the retention time (RT) of those markers, using the Millennium-based algorithm. FIG. 4a provides a plot summarizing several calibrations of the relative retention time (RRT) of the present TV-markers versus the molecular weight of those markers, using the RRT-based algorithm. Data were obtained from sixteen columns. Average values for each of the sixteen calibrations are depicted. FIG. 4b provides a plot summarizing several calibrations of the molecular weight of the TV-markers versus the relative retention time (RRT) of those markers, using the Millennium-based algorithm. Data were obtained from sixteen columns. Average values for each of the sixteen calibrations are depicted. FIG. 5 depicts inhibition of Cop 1 binding to anti-Cop 1 polyclonal antibodies by four TV-markers and Cop 1 (03494). Absorbance ratio indicates absorbance measured with increasing inhibitor concentration relative to absorbance in the absence of binding inhibition. DETAILED DESCRIPTION OF THE INVENTION Molecular weight markers of the invention (e.g., TV-markers), include polypeptides having an amino acid composition approximately corresponding to glatiramer acetate or related terpolymers, and an identified molecular weight which is between about 2,000 daltons and about 40,000 daltons and are useful for accurately determining the molecular weight of GLAT copolymer and related terpolymers. It follows from the requirement for an identified molecular weight that a TV-marker should have a discrete molecular weight and not a range of molecular weights. Accordingly, TV-markers are synthesized according to a predetermined amino acid sequence which corresponds in composition to the copolymer for which molecular weight range is to be determined. Optimally, TV-markers have therapeutic activity which is similar to corresponding copolymer. These markers can be used in any molecular size discrimination system using any available molecular weight determination procedure or apparatus. For example, the present markers can be used for calibration of any chromatographic procedure or apparatus which is used for molecular weight determinations of polypeptides or proteins. Such a chromatographic apparatus can be a molecular weight sizing column which separates polypeptides on the basis of their molecular size. Examples of molecular weight sizing columns include TSK columns, Sephadex columns, Sepharose columns, and Superose columns. In order to provide molecular weight markers of discrete size and composition, molecular weight markers of the invention can be synthesized according to predetermined sequences by methods which are well known to those of skill in the art. Amino acids of the present invention include, but are not limited to the 20 commonly occurring amino acids. Also included are naturally occurring and synthetic derivatives, for example, selenocysteine. Amino acids further include amino acid analogues. An amino acid “analogue” is a chemically related form of the amino acid having a different configuration, for example, an isomer, or a D-configuration rather than an L-configuration, or an organic molecule with the approximate size-and shape of the amino acid, or an amino acid with modification to the atoms that are involved in the peptide bond, so as to be protease resistant when polymerized in a peptide or polypepide. The phrases “amino acid” and “amino acid sequence” as defined here and in the claims can include one or more components which are amino acid derivatives and/or amino acid analogs comprising part or the entirety of the residues for any one or more of the 20 naturally occurring amino acids indicated by that sequence. For example, in an amino acid sequence having one or more tyrosine residues, a portion of one or more of those residues can be substituted with homotyrosine. Further, an amino acid sequence having one or more non-peptide or peptidomimetic bonds between two adjacent residues, is included within this definition. The one letter and three letter amino acid codes (and the amino acid that each represents) are as follows: A means ala (alanine); C means cys (cysteine); D means asp (aspartic acid); E means glu (glutamic acid); F means phe (phenylalanine); G means gly (glycine); H means his (histidine); l means ile (isoleucine); K means lys (lysine); L means leu (leucine); M means met (methionine); N means asn (asparagine); P means pro (proline); Q means gin (glutamine); R means arg (arginine); S means ser (serine); T means thr (threonine); V means val (valine); W means trp (tryptophan); and Y means tyr (tyrosine). The term “hydrophobic” amino acid is defined here and in the claims as including aliphatic amino acids alanine (A, or ala), glycine (G, or gly), isoleucine (I, or ile), leucine (L, or leu), proline (P, or pro), and valine (V, or val), the terms in parentheses being the one letter and three letter standard code abbreviation s for each amino acid, and aromatic amino acids tryptophan (W, or trp), phenylalanine (F or phe), and tyrosine (Y, or tyr). The amino acids confer hydrophobicity as a function of the length of aliphatic and size of aromatic side chains, when found as residues within a protein. The term “charged” amino acid is defined here and in the claims as including an amino acids aspartic acid (D, or asp), glutamic acid (E, or glu), histidine (H, or his), arginine (R, or arg) and lysine (K, or lys), which confer a positive (his, lys and arg) or negative (asp and gly) charge at physiological values of pH in aqueous solutions on proteins containing these residues. Polypeptide Compositions Contemplated by the Invention—According to the present invention, polypeptides having defined molecular weights and comprising three or all four of the amino acids tyrosine, glutamic acid, alanine and lysine are preferred for the present markers. However, one of skill in the art can readily substitute structurally-related amino acids without deviating from the spirit of the invention. Thus, the present invention further contemplates conservative amino acid substitutions for tyrosine, glutamic acid, alanine and lysine in the present polypeptides. Such structurally-related amino acids include those amino acids which have about the same charge, hydrophobicity and size as tyrosine, glutamic acid, alanine or lysine. For example, lysine is structurally-related to arginine and histidine; glutamic acid is structurally-related to aspartic acid; tyrosine is structurally-related to serine, threonine, tryptophan and phenylalanine; and alanine is structurally related to valine, leucine and isoleucine. Moreover, molecular weight markers of the invention can be composed of L- or D-amino acids. As is known by one of skill in the art, L-amino acids occur in most natural proteins. However, D-amino acids are commercially available and can be substituted for some or all of the amino acids used to make molecular weight markers of the invention. The present invention contemplates molecular weight markers formed from mixtures of D- and L-amino acids, as well as molecular weight markers consisting essentially of either L- or D-amino acids. The average molecular weight and the average molar fraction of the amino acids in the present polypeptides can vary. However, a molecular weight range of about 2,000 to about 40,000 is contemplated, and basic polypeptides, rather than acidic polypeptides, are preferred. In one embodiment, the present invention provides polypeptide markers containing tyrosine, alanine, glutamic acid and lysine in defined molar ratios. In a more preferred embodiment, the molar ratio of amino acids of the present polypeptides is that found in GLAT copolymer. Such a correspondence in molar ratios provides the best molecular weight markers because those markers will have a charge and a molecular shape which is similar to that of GLAT copolymer. When structurally dissimilar markers are used, the markers may migrate or elute somewhat differently from GLAT copolymer preparations, even though those preparations have the same molecular weight as the markers. Moreover, in a preferred embodiment, alanine is at the N-terminus and tyrosine is at position four from the N-terminus. Edman degradation analyses performed on various glatiramer acetate batches revealed a greater abundance of alanine at the N-terminus and tyrosine at position four from the N-terminus. Therefore, in certain preferred embodiments, GLAT copolymer molecular weight markers have alanine at the N-terminus and tyrosine at position four from the N-terminus. Studies of the polymerization reaction used to synthesize GLAT copolymer have indicated that alanine and glutamic acid polymerize faster than lysine. As a result, the C-terminal portion of GLAT copolymer tends to be richer in alanine and glutamic acid, whereas the N-terminal portion tends to be richer in lysine. In preferred embodiments, the distribution of amino acid residues in GLAT copolymer molecular weight markers reflects this bias. When determining the molecular weight range of GLAT copolymer, a preferred molecular weight marker consists essentially of amino acids alanine, glutamic acid, tyrosine and lysine in molar fractions of from about 0.38 to about 0.50 alanine, from about 0.13 to about 0.15 glutamic acid, from about 0.08 to about 0.10 tyrosine, and from about 0.3 to about 0.4 lysine. In other embodiments, the present invention provides molecular weight markers containing three of the four amino acids alanine, glutamic acid, tyrosine, and lysine in defined ratios. In preferred embodiments, the molar fractions of amino acids present the molecular weight markers correspond to that found in a corresponding terpolymer. When the molecular weight marker contains alanine, glutamic acid and tyrosine, alanine can be present in a mole fraction of about 0.005 to about 0.800, glutamic acid can be present in a mole fraction of about 0.005 to about 0.300, and tyrosine can be present in a mole fraction of about 0.005 to about 0.250. The molecular weight is from about 2,000 to about 40,000 daltons, and preferably from about 3000 to about 12,000 daltons. When the molecular weight marker contains alanine, glutamic acid and lysine, alanine can be present in a mole fraction of about 0.005 to about 0.600, glutamic acid can be present in a mole fraction of about 0.005 to about 0.300, and lysine can be present in a mole fraction of about 0.2 to about 0.7. The molecular weight is between about 2,000 and about 40,000 daltons, and preferably between about 3000 and about 12,000 daltons. When the molecular weight marker contains alanine, tyrosine and lysine, alanine can be present in a mole fraction of about 0.3 to about 0.6, tyrosine can be present in a mole fraction of about 0.005 to about 0.250, and lysine can be present in a mole fraction of about 0.1 to about 0.5. The molecular weight is between about 2,000 and about 40,000 daltons, and preferably between about 3000 and about 12,000 daltons. When the molecular weight marker contains glutamic acid, tyrosine and lysine, glutamic acid can be present in a mole fraction of about 0.005 to about 0.300, tyrosine can be present in a mole fraction of about 0.005 to about 0.250, and lysine can be present in a mole fraction of about 0.3 to about 0.7. The molecular weight is between about 2,000 and about 40,000 daltons, and preferably between about 3000 and about 12,000 daltons. Polypeptides of the invention can be used for molecular weight range determinations of other copolymers contemplated by the invention. Contemplated copolymers can consist of combinations of three, four, or five or more amino acids. In general, in order to determine the molecular weight range of a copolymer contemplated by the invention, the polypeptide molecular weight marker will have a defined molecular weight and an amino acid composition corresponding approximately to that of the copolymer. It will be apparent to one of skill in the art that any bias in the distribution of amino acids in a copolymer can be determined as described above for GLAT copolymer. For example, the relative amounts of amino acids incorporated at each position of a terpolymer population can be obtained by analyzing the products of each step of an Edman degradation. Alternatively, the proportions of amino acids incorporated into a terpolymer population during synthesis can be monitored. Where applicable, molecular weight markers can then be synthesized which reflect the bias. In addition, certain preferred terpolymer molecular weight markers will have alanine or tyrosine at position four. Examples of preferred polypeptide molecular weight marker sequences are given in Table 1 (SEQ ID NOS: 1-7) using the conventional single letter amino acid code and reading from N-terminal to C-terminal. The seven indicated sequences are individual preparations of polypeptides having an amino acid composition corresponding to glatiramer acetate. Usually, amino acids comprising a molecular weight marker molecule are predominantly of one configuration (D- or L-configuration). In preferred embodiments, a molecular weight marker molecule is composed entirely of amino acids of the same configuration. However, molecular weight marker molecules comprising amino acids of mixed configuration may be preferred in certain embodiments where molecular weight is being determined for a glatiramer acetate preparation comprising amino acids of mixed configuration. TABLE 1 Selected TV-markers amino acid sequences SEQ ID NO Sequence 1 AKKYAKKEKAAKKAYKKEAKAKAAEAAAKEEYEAA 2 AKKYAKKAKAEKAKKAYKAAEAKKAAKYEKAAAEKAAAKE- AAYEA 3 AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAEAKY- KAEAAKAAAKEAAYEA 4 AKKYAKKEKAYAKAKKAEAKAAKKAKAEAKKYAKAAKAEK- KEYAAAEAKYKAEAAKAAAKEAAYEA 5 AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEA- KKYAKAAKAEKKEYAAAEAKYKAEAAKAAAKEAAYEA 6 AKKYAKKEKAYAKKAEKAAKKAEAKAYKAAEAKKKAKAEA- KKYAKAAKAEKKEYAAAEAKYKAEAAKKAYKAEAAKAAAK- EAAYEA 7 AKKYAKKAEKAYAKKAKAAKEKKAYAKKEAKAYKAAEAKK- KAKAEAKKYAKEAAKAKKEAYKAEAKKYAKAAKAEKKEYA- AAEAKKAEAAKAYKAEAAKAAAKEAAYEA In another embodiment, the present invention provides a plurality of molecular weight markers for determining the molecular weight of glatiramer acetate or a terpolymer on a molecular weight sizing column. The plurality of molecular weight markers are polypeptides. The plurality of markers can be two to about ten or more. In a preferred embodiment, the plurality of markers is about seven. Each polypeptide has an identified molecular weight which is between about 2,000 daltons and about 40,000 daltons, and an amino acid composition which corresponds approximately to that of glatiramer acetate or a terpolymer. When such a plurality of molecular weight markers are used as standards for determining the molecular weight of glatiramer acetate or a terpolymer, a relationship which is approximately linear exists between the retention time of the molecular weight markers on the chromatographic column and the log of the molecular weight. A plurality of markers is used which is sufficient to establish the approximately linear relationship, although more may be employed. FIG. 3 shows the approximately linear relationship between relative retention time and log molecular weight for TV-markers of the invention. In another embodiment, an approximately linear relationship exists between the molar ellipticity of the molecular weight markers and the molecular weight of the markers. When determining the molecular weight of a glatiramer acetate preparation by molar ellipticity, a plurality of markers is used which is sufficient to establish the approximately linear relationship, although more may be employed. A molecular weight for the glatiramer acetate or terpolymer preparation is then obtained based on the linear relationship. FIG. 2 shows the approximately linear relationship between molar ellipticity and molecular weight for TV-markers of the invention. Pharmaceutical Compositions Contemplated by the Invention—Molecular weight markers of the invention which correspond in composition to GLAT copolymer optimally have biological activity, and can be used for treatment of disease in the manner of GLAT copolymer. TV-markers having biological activity are alternately referred to as therapeutic markers. For example, GLAT copolymer is useful for the treatment of MS in humans as well as for blocking experimental allergic encephalomyelitis (EAE) in mice. Polypeptides of the invention having identified molecular weights and amino acid compositions corresponding to GLAT copolymer are shown herein to be active in the mouse model as well and demonstrate immunological characteristics which are similar to those of GLAT copolymer. Monoclonal antibodies which bind to GLAT copolymer also bind to TV-markers. Additionally, certain T cells which are stimulated by GLAT copolymer are also stimulated by molecular weight markers of the invention. Similarly, a polypeptide having a defined molecular weight and corresponding in amino acid composition to a terpolymer having therapeutic utility will optimally have therapeutic utility. In general, polypeptide molecular weight markers corresponding in composition to a biologically active copolymer will optimally have similar biological activity. The present molecular weight markers can be formulated into pharmaceutical compositions containing a pharmaceutically acceptable carrier. As used herein, “pharmaceutically acceptable carrier” includes any and all solvents, dispersion media, coatings, antibacterial and antifungal agents, isotonic and absorption delaying agents, sweeteners and the like. The pharmaceutically acceptable carriers may be prepared from a wide range of materials including, but not limited to, flavoring agents, sweetening agents and miscellaneous materials such as buffers and absorbents that may be needed in order to prepare a particular therapeutic composition. The use of such media and agents with pharmaceutically active substances is well known in the art. Except insofar as any conventional media or agent is incompatible with the active ingredient, its use in the therapeutic compositions is contemplated. Supplementary active ingredients can also be incorporated into the compositions. The present compositions may be formulated as an injectable solution or suspension, a spray solution or a suspension. Pharmaceutical compositions comprise an amount of one or more molecular weight markers of the invention. Preferably, the molecular weight markers consist essentially of three or all four of the amino acids tyrosine, alanine, glutamic acid and lysine in defined molar fractions. The molar fractions of the amino acids will be as set forth above. In one embodiment, the molecular weight markers of the pharmaceutical composition are capable of binding to an MHC class II protein which, preferably, is associated with an autoimmune disease. The Class II MHC protein consists of approximately equal-sized α and β subunits, both of which are transmembrane proteins. A peptide-binding cleft is formed by parts of the amino termini of both α and β subunits. This peptide-binding cleft is the site of presentation of the antigen to T cells. There are at least three types of Class II MHC molecules: HLA-DR, HLA-DQ, and HLA-DP molecules. There are also numerous alleles encoding each type of these HLA molecules. The Class II MHC molecules are expressed predominantly on the surfaces of B lymphocytes and antigen presenting cells such as macrophages. Any available method can be used to ascertain whether the molecular weight marker binds to one or more MHC class II proteins. For example, the polypeptide can be radiolabeled or biotinylated, mixed with a crude or pure preparation of MHC class II protein and binding detected by adherence of the reporter molecule to the MHC class II protein after removal of the unbound polypeptide. In another embodiment, the molecular weight markers are capable of binding to an MHC class II protein associated with multiple sclerosis. A polypeptide of this embodiment can have similar or greater affinity for the antigen binding groove of an MHC class II protein associated with multiple sclerosis than does Copolymer 1. Hence, the contemplated polypeptide can inhibit binding of or displace the binding of myelin autoantigens from the MHC class II protein. One MHC class II protein associated with multiple sclerosis is HLA-DR4 (DRB1*1501). In another embodiment, molecular weight markers of the invention are capable of binding to an MHC class II protein associated with an arthritic condition, for example, rheumatoid arthritis or osteoarthritis. Accordingly, a polypeptide of this embodiment can have a greater affinity for the antigen binding groove of an MHC class II protein associated with the autoimmune disease than does a type II collagen 261-273 peptide. Hence, the contemplated polypeptide can inhibit binding of, or displace the type II collagen 261-273 peptide from the antigen binding groove of an MHC class II protein. Therapeutic Methods Contemplated by the Invention—The present invention further provides methods for treating and preventing immune diseases in a mammal which include administering a therapeutically effective amount of a composition comprising a molecular weight marker of the invention. Autoimmune diseases contemplated by the present invention include either cell-mediated disease (e.g. T cell) or antibody-mediated (e.g. B cell) disorders. Such disorders can be, inter alia, arthritic conditions, demyelinating diseases and inflammatory diseases. For example, autoimmune diseases which can be treated by the present polypeptides include multiple sclerosis (MS), rheumatoid arthritis (RA), osteoarthritis, autoimmune hemolytic anemia, autoimmune oophoritis, autoimmune thyroiditis, autoimmune uveoretinitis, Crohn's disease, chronic immune thrombocytopenic purpura, colitis, contact sensitivity disease, diabetes mellitus, Graves disease, Guillain-Barre's syndrome, Hashimoto's disease, idiopathic myxedema, myasthenia gravis, psoriasis, pemphigus vulgaris, or systemic lupus erythematosus, The present compositions can be used to treat one or more of these diseases. The term “arthritic condition” as used herein is a condition wherein at least one symptom of rheumatoid arthritis is observed in at least one joint of a mammal, for example in a shoulder, knee, hip, backbone or a digit of the mammal. Examples of arthritic conditions include “polyarthritis”, which is an arthritic condition that affects more than a single joint; “juvenile arthritis”, an arthritic condition of humans under the age of 21; and Felty's syndrome, which can include the symptoms of neutropenia, splenomegaly, weight loss, anemia, lymphadenopathy, and pigment spots on the skin. Immune-mediated diseases contemplated by the present invention are characterized by undeisrable immune hypersensitivity to one or more antigens and include host-versus-graft disease (HVGD) and graft-versus-host disease (GVHD), which are exemplified, respectively, by graft rejection by the host immune system and by attack on the host by donor T cells. These diseases are a significant barrier to transplantation systems such as organ transplantations and bone marrow reconstitutions. Other contemplated immune mediated diseases include delayed-type hypersensitivity (DTH) which is associated with contact antigens such as poison ivy and poison oak and various chemicals, as well as tuberculosis, leprosy, leishmaniasis, deep fungal infections, etc. In one embodiment, any autoimmune disease can be treated by the present molecular weight markers so long as the contemplated marker binds to an MHC class II protein that has been associated with the autoimmune disease. One aspect of this embodiment provides a method which includes selecting a molecular weight marker that inhibits binding of an antigenic peptide to an MHC class II protein, for example, a method which further comprises selecting the molecular weight marker that inhibits class II-specific T cell responses to an MHC class II protein-peptide complex, and a method wherein the antigenic peptide is associated with an autoimmune disease; in another embodiment of the invention, a method is provided wherein the MHC class II protein is associated with an autoimmune disease. In another embodiment, the method for treating an autoimmune disease in a mammal further involves inhibiting the proliferation or function of T cells which are responsive to an autoantigen. RA is a T cell-mediated autoimmune disease which can be treated with the present polypeptides. The pathological process of autoimmune diseases and immune rejection is mediated by T cells. Upon binding to and recognition of an antigen, T cells proliferate, secrete cytokines and recruit additional inflammatory and cytotoxic cells to the site. The present molecular weight markers prevent T cell proliferation and T cell functions such as cytokine secretion and recruitment of inflammatory and cytotoxic cells to the site. When the autoimmune disease is an arthritic condition the autoantigen can be collagen, and the present molecular weight markers can inhibit the proliferation and function of collagen-responsive T cells. In another embodiment, the method for treating an autoimmune disease in a mammal involves binding the molecular weight marker to an antigen presenting cell such as a macrophage, a dendritic cell of the lymphoid tissue or an epidermal cell. The proliferation and functions of a T cell are activated when an appropriate antigen is presented to it. By binding to antigen presenting cells, the present molecular weight markers may block or otherwise interfere with T cell activation. In yet another embodiment, the method for treating an autoimmune disease in a mammal involves binding the molecular weight marker to a major histocompatibility complex class II protein which is associated with an autoimmune disease. The Class II MHC proteins are expressed predominantly on the surfaces of B lymphocytes and antigen presenting cells such as macrophages. These Class II MHC proteins have a peptide-binding cleft which is the site at which antigenic peptides are presented to T cells. When the present polypeptides bind to a major histocompatibility complex class II protein, those polypeptides can block or otherwise interfere with antigen presentation and/or T cell activation. In another embodiment, the method for treating an autoimmune disease in a mammal involves binding the molecular weight marker to Copolymer 1-reactive B cell antibodies, and/or Copolymer 1-reactive T cells. Copolymer 1-reactive TH2/3T cells facilitate the therapeutic effects of Copolymer 1. When binding to Copolymer 1-reactive T cells, the present molecular weight markers stimulate those T cells proliferate, secrete antiinflammatory cytokines and enhance the therapeutic benefits of treatment by the present methods. According to the present invention, the present molecular weight markers also bind to autoantigen-reactive antibodies which may block the antibody from attacking the target tissue, thereby helping to prevent the autoimmune disease from progressing. The present molecular weight markers may be administered by any convenient route. In one embodiment the present molecular weight markers can be administered by injection to facilitate delivery to the tissues affected by the autoimmune disease. Thus, the present molecular weight markers may, for example, be injected, ingested, inhaled, or topically applied. The subject molecular weight markers may be incorporated into a cream, solution or suspension for topical administration. The present molecular weight markers are preferably administered orally, topically or by injection without addition of an adjuvant. Useful Kits of the Invention—In an embodiment of the invention, a kit is provided for assaying the binding of an analyte to an MHC protein, which includes a water-soluble MHC protein, for example which has been recombinantly produced in a non-mammalian cell, and a means for detection of the bound analyte on the MHC protein, and instructions for use. The MHC protein used in the kit is an MHC class II protein selected from the group consisting of an MHC class II HLA-DR1 protein, an MHC class II HLA-DR2 protein and an MHC class II HLA-DR4 protein. The kit can further comprise an autoantigenic peptide. A kit of the invention can be used, for example, to test binding of a molecular weight marker of the invention to an MHC class II or inhibition of MHC binding of an autoantigenic peptide. In a preferred embodiment, the MHC class II protein is produced in an invertebrate or a microbial cell, such as an insect cell or a yeast cell and is therefore devoid of bound peptide in the antigen cleft. The means for detecting binding of the analyte to the MHC protein can be any radioactive, fluorimetric, chemiluminescent, enzymatic or colorimetric means known to one of ordinary skill in the art. In a preferred embodiment, the MHC protein is a class II HLA-DR1 or HLA-DR4 protein. Examples of preferred autoantigenic peptide to be included are a collagen II peptide, a peptide derived from myelin basic protein, myelin oligodendrite protein, or a peptide from another protein implicated in an autoimmune disease. The examples which follow describe the invention in detail with respect to showing how certain specific representative embodiments thereof can be made, the materials, apparatus and process steps being understood as examples that are intended to be illustrative only. In particular, the invention is not intended to be limited to the methods, materials, conditions, process parameters, apparatus and the like specifically recited herein. Throughout this application, various publications, patents, and patent applications have been referred to. The teachings and disclosures of these publications, patents, and patent applications in their entireties are hereby incorporated by reference into this application to more fully describe the state of the art to which the present invention pertains. It is to be understood and expected that variations in the principles of invention herein disclosed may be made by one skilled in the art and it is intended that such modifications are to be included within the scope of the present invention. The following examples further illustrate the invention. EXAMPLE 1 Physical Properties of TV-Markers Solid Phase Synthesis Seven molecular weight markers were made with molecular weights ranging from about 3700-12000 daltons in the laboratory of Prof. M. Fridkin (Weizmann Institute of Science) (Table 2). These markers are referred to as TV-markers. The individual peptides were assigned a name TV-##, where ## is the number of amino acid residues (e.g. TV-35 is the 35-mer marker). The amino acid composition of these markers meets glatiramer acetate specifications (Table 2). TABLE 2 Ala Glu Tyr Lys TV-35 - Peptide with a molecular weight = 3757 daltons Number of residues 15 5 3 12 Molar fraction 0.429 0.143 0.086 0.343 TV-45 - Peptide with molecular weight = 4790 daltons Number of residues 20 6 4 15 Molar fraction 0.444 0.133 0.089 0.333 TV-56 - Peptide with a molecular weight = 6008 daltons Number of residues 24 8 5 19 Molar fraction 0.429 0.143 0.089 0.339 TV-66 - Peptide with a molecular weight = 7040 daltons Number of residues 29 9 6 22 Molar fraction 0.439 0.136 0.091 0.333 TV-77 - Peptide with a molecular weight = 8259 daltons Number of residues 33 11 7 26 Molar fraction 0.429 0.143 0.091 0.338 TV-86 - Peptide with a molecular weight = 9220 daltons Number of residues 37 12 8 29 Molar fraction 0.430 0.140 0.093 0.337 TV-109 - Peptide with a molecular weight = 11727 daltons Number of residues 46 15 10 38 Molar fraction 0.422 0.138 0.092 0.349 FIGS. 1a, 1b, 1c and 1d provide the distribution of alanine, lysine, glutamic acid and tyrosine, respectively, in the TV-markers described in Table 2. The amino acid position is defined by the X-axis, with the first amino acid corresponding to the C-terminal position. The presence of an amino acid is indicated by a vertical bar at the indicated amino acid position. Confirmation of Mass and Sequence Mass Spectroscopy—Polypeptide samples were analyzed immediately after their synthesis using a VG platform mass spectrophotometer equipped with an electronspray ion source. Several months later the analysis was repeated at TEVA using a PE-Sciex AP1300 mass spectrophotometer equipped with an electronspray ion source (Table 3, first preparation). These results indicate that each polypeptide TV-marker has a single, main component with the intended molecular mass. TABLE 3 Mass Spectroscopy of Sequence-Defined Polypeptides Determined Determined Designed molecular mass - molecular mass - molecular mass first preparation second preparation Polypeptide (daltons) (daltons) (daltons) TV-35 3757 3757 3757 TV-45 4790 4790 4790 TV-56 6008 6008 6008 TV-66 7040 7041 7040 TV-77 8259 8259 8259 TV-86 9220 9220 9220 TV-109* 11727 11728 11727 *The 109-mer was further purified by fractionation on a reversed-phase column. Three fractions were collected and fraction number 2 was designated for calibration purposes and referred to as TV-109. A second batch of markers was prepared. Mass spectroscopy confirmed that the polypeptides of the second preparation were identical to the polypeptides of the first preparation (Table 3, second preparation). The similarity between the two preparations was also confirmed by chromatography on Superose 12. Each of the markers eluted with a sharp peak at a distinct retention time, regardless of the batch analyzed. Hence, the TV-markers of the present invention can be synthesized with reproducible mass. Edman degradation—The intended sequence of the polypeptides was confirmed by Edman degradation analysis of the first preparation. Characterization of the Polypeptides Circular dichroism—Structural similarity between the molecular weight markers and glatiramer acetate is a pre-requisite for an appropriate calibration of a molecular sizing column. Differences in polypeptide structure may result in different hydrodynamic size and consequently in altered retention time in the chromatographic system. The ellipticity, determined by circular dichroism, serves as a measure of the secondary structure of a polypeptide. When the ellipticity of the molecular weight markers and glatiramer acetate is similar, the structures of the two will be similar. The molar ellipticity of the polypeptides was determined on a Jobin-Yvon CD spectrophotometer. FIG. 2 and Table 4 show that the extent of molar ellipticity correlated with the molecular weight of the polypeptide. The shortest peptide exhibited the lowest ellipticity value. The molar ellipticity of the new markers was of the same order of magnitude as those of the currently used glatiramer acetate molecular weight markers. Note that while the exact molecular weight for the TV-markers was plotted, the average-by-number molecular weight for the glatiramer acetate was used in the plot. Thus, the new markers and glatiramer acetate possess similar structures and are therefore suitable for use as molecular weight markers for new preparations of glatiramer acetate. TABLE 4 Molecular Ellipticity MW M-ellip. MW marker (daltons) (210 nm) TV-markers TV-35 3757 −1.5367 TV-45 4790 −2.1651 TV-56 6008 −3.9658 TV-66 7040 −3.5172 TV-77 8259 −4.8365 TV-86 9220 −5.4546 TV-109 11727 −6.818 glatiramer acetate BD 743 3700 −2.0186 BD 714 5600 −4.4182 BD 681 6600 −5.2019 BD 677 7000 −6.0153 56895 8000 −6.9062 90995 8500 −9.1736 BD 656 8900 −8.8576 These analytical data indicate that the synthesized TV-marker polypeptides exhibit a substantial degree of similarity to the currently used glatiramer acetate molecular weight markers. The amino acid content is within glatiramer acetate specifications. The new polypeptides and the glatiramer acetate molecular weight markers have similar secondary structure, expressed as molar ellipticity. Consequently, TV-markers are expected to migrate or elute in a gel-permeation-chromatographic (GPC) system, such as Superose 12, like a glatiramer acetate preparation. EXAMPLE 2 Superose 12 Column Calibration with TV-Markers TV-markers and a glatiramer acetate preparation are expected to demonstrate a similar correlation between relative retention time (RRT) and log molecular weight. The TV-markers were chromatographed on several Superose 12 columns. The peak retention time for each of the polypeptides was recorded. The linear correlation between Log Molecular Weight (MW) and the Relative Retention Time (RRT) was calculated as follows: RRT=B1+B2×LogMW (see FIG. 3a and Table 5). The recently introduced Millennium-based data acquisition system (Waters Corp., Milford, Mass.) provides integrated calibration of GPC columns. The algorithm for the calibration is based on the retention time and is given by the equation: LogMW=A+B×RT or MW=10(A+B×RT) where MW is the molecular weight, RT is the retention time, A and B, respectively, are the intercept and the slope of the calculated regression function (FIG. 3b, Table 5). The results obtained by this algorithm are practically identical to those obtained with the currently applied algorithm, based on RRT. In the effort to automate procedures, the Millennium-based data acquisition system was employed to perform the calibration using the TV-markers. The analytical methods were updated accordingly. A good correlation (r2>0.98) was obtained between log MW and RRT, although the points do not distribute evenly around the regression line. This distribution is due to the differences in the ellipticity of the various markers, as is also observed for the glatiramer acetate. The somewhat deviant-from-linearity low molecular weight marker cannot be excluded because the regression must cover values down to 2500 daltons for the first standard deviation (+1 SD) distribution parameter. This is a general trait of all shorter peptides—they are less helical and more-linear. For the calibration based on the glatiramer acetate molecular weight markers, the intercept (B1) and slope (B2) were, respectively, 1.7415 and −0.2784. This compares favorably with the calibration values obtained with TV-markers (B1=1.6996; B2=−0.2705). The molecular weights obtained using the two calibration sets within the specification range differed by, typically, not more than 20% in the low molecular weight range and by not more than 12% in the RRT specification range of the peak (average molecular weight). This relatively small difference supports the claim that these markers can replace the currently used glatiramer acetate molecular weight markers without significant change in the reported molecular weight values. TABLE 5a Calibration by glatiramer acetate MW-markers Marker MW LOG MW PEAK RT RRT* TV-35 3757 3.575 28.97 0.728 TV-45 4790 3.68 27.96 0.703 TV-56 6008 3.779 27.12 0.682 TV-66 7040 3.848 26.32 0.662 TV-77 8259 3.917 25.56 0.643 TV-86 9220 3.965 24.93 0.627 TV-109 11727 4.069 23.57 0.593 INTERCEPT **A 6.2516 ***B1 1.6996 SLOPE B −0.0918 B2 −0.2705 r2 0.9927 0.9923 *RRT = RT/RTAcetone **calculated according Millennium equation: log MW = A + B × RT ***calculated according to equation: RRT = B1 + B2 × log MW Calibration based on TV-markers was compared to calibration based on glatiramer acetate molecular weight markers (Table 5b). The two calibrations were compared by calculating molecular weight values for each calibration set in the RRT range of 0.5 to 0.8. The TV-marker calibration set included a fraction of TV-109 which was purified by reversed phase chromatography prior to use for column calibration. TABLE 5b Column Calibration by TV-markers Glatir. Ac. TV (0.1) Difference RT* (MW1) (MWm) (MWm-MW1) RRT (min) Daltons Daltons Daltons % 0.5 19.89 28800 26700 −2100 −7.3% 0.51 20.28 26500 24500 −2000 −7.5% 0.52 20.68 24400 22600 −1800 −7.4% 0.53 21.08 22500 20700 −1800 −8.0% 0.54 21.48 20700 19100 −1600 −7.7% 0.55 21.87 19000 17500 −1500 −7.9% 0.56 22.27 17500 16100 −1400 −8.0% 0.57 22.67 16100 14800 −1300 −8.1% 0.58 23.07 14900 13600 −1300 −8.7% 0.59 23.46 13700 12500 −1200 −8.8% 0.6 23.86 12600 11500 −1100 −8.7% 0.61 24.26 11600 10600 −1000 −8.7% 0.62 24.66 10700 9700 −1000 −9.3% 0.63 25.06 9800 9000 −800 −8.2% 0.64 25.45 9000 8200 −800 −8.9% 0.65 25.85 8300 7600 −700 −8.4% 0.66 26.25 7700 7000 −700 −9.1 0.67 26.65 7100 6400 −700 −9.9 0.68 27.04 6600 6900 −600 −9.2% 0.69 27.44 6000 5400 −600 −10.0% 0.70 27.84 5500 5000 −500 −9.1% 0.71 28.24 5100 4600 −500 −9.8% 0.72 28.63 4700 4200 −500 −10.6% 0.73 29.03 4300 3900 −400 −9.3% 0.74 29.43 4000 3600 −400 −10.0% 0.75 29.83 3600 3300 −300 −8.3% 0.76 30.23 3400 3000 −400 −11.8% 0.77 30.62 3100 2800 −300 −9.7% 0.78 31.02 2800 2500 −300 −10.7% 0.79 31.42 2600 2300 −300 −11.5% 0.80 31.82 2400 2100 −300 −12.5% Purity of TV markers—Three of the markers (TV-66, TV-77 and TV-86) were further purified by reversed phase chromatography. Three fractions were obtained for each marker. The middle fraction containing the major portion of the peak was chromatographed on the Superose 12 system in comparison to the unfractionated markers (Table 6). TV markers were size chromatographed without purification (Regular) and after purification by reversed-phase chromatography (Purified). Peak retention times were determined and the differences were calculated. The peak retention time remained unaffected by the degree of purity. Therefore, the final product of the synthesis is useful for accurate calibration and extra purification is not required. TABLE 6 Effect of Purification on Retention Time Retention Time (RT) (min) Difference TV-marker Regular Purified (%) TV-66 26.200 26.233 −0.13% TV-77 25.450 25.450 0.00% TV-86 24.867 24.850 0.07% Consistency in reported values (Cross-validation)—Six batches of glatiramer acetate, manufactured in 1993 and 1994, were reanalyzed by GPC calibrated with the TV-markers. Their average molecular weight and the molecular weight distribution was compared to the values reported at the time of their release. Table 7 shows a comparison of molecular weight data from the original certificate of analysis and molecular weight data obtained using a Superose 12 column calibrated with TV-markers. The differences in reported values are typically less than 10%. TABLE 7 Comparison of Molecular Weight Determinations MW MW % Cop 1 preparation Millennium CoA difference 00193 average 10250 9900 −3.5% −1 SD 20950 19100 −9.7% +1 SD 51000 4800 −6.3% 00594 average 6700 6550 −2.3% −1 SD 15700 15100 −4.0% +1 SD 3600 3400 −5.9% 00993 average 9200 8600 −7.0% −1 SD 18500 17350 −6.9% +1 SD 4700 4400 −6.8% 04194 average 6100 6150 0.8% −1 SD 12600 12500 −0.8% +1 SD 3200 3200 0.0% 01793 average 8800 8300 −6.0% −1 SD 18100 17300 −4.6% +1 SD 5200 4750 −9.5% 05494 average 8100 8300 2.4% −1 SD 17800 17450 −2.0% +1 SD 4100 4100 0.0% Stability of markers in solution—TV-markers were chromatographed four times over a period of 24 hours. All markers were kept as solutions at room temperature and were analyzed at 8 hour intervals. Table 8 shows the peak retention time measured for the TV-markers at each of the four time points. At a concentration of 0.1 mg/ml, the TV-markers were stable in solution for at least 24 hours at room temperature. TABLE 8 Stability of TV-markers in solution at room temperature. Peak Retention Time (min) Average RSD TV-35 29.883 29.883 29.900 29.950 29.904 0.106% TV-45 28.933 28.917 28.917 28.933 28.925 0.032% TV-56 28.250 28.217 28.283 28.250 28.250 0.095% TV-66 27.400 27.350 27.433 27.433 27.404 0.143% TV-77 26.750 26.700 26.750 26.783 26.746 0.128% TV-86 26.117 26.100 26.150 26.150 26.129 0.095% TV-109Fr 11 24.783 24.850 24.883 24.850 24.842 0.169% In addition, solutions of the markers were stored for up to 3½ months under various storage conditions (2-8° C., −10 to −20° C., with/without azide). TV-markers are stable for at least 3 months when stored as frozen solutions (Table 9). As a precaution it was decided to allow storage of frozen solutions for two months. Lyophilized TV-markers are stable for at least two years according to accumulated stability data. TABLE 9 Stability of TV-markers at −10° to −20° C. Date of calibration: 22-May-97 09-Jul-97 04-Sep-97 Interval (days) — 48 105 Marker MW RT RT RT TV-35 3757 28.867 28.867 28.967 TV-45 4790 27.833 27.917 27.950 TV-56 6008 27.076 27.133 27.100 TV-66 7040 26.233 26.317 26.300 TV-77 8259 25.467 25.617 25.550 TV-86 9220 24.883 25.017 24.950 TV-109 11727 23.500 23.650 23.583 Summary of calibration data—Overall, the TV-markers were analyzed 53 times in two laboratories. A summary of the data is presented in FIG. 4 and Table 10. The differences observed among the individual runs (FIG. 4) reflect variations between columns rather than differences between the participating laboratories. This is indicated in FIG. 4 by the use of different symbols for some of the runs. Calibration constants in Table 10 were calcualted using the Millennium equation for data obtained for 53 calibration sets injected into 16 columns. TABLE 10 Calibration constants obtained in Plantex and Abic Labs RT RT Marker MW Mean SD RSD % Min Max Mean − SD Mean + SD TV-35 3757 29.69 0.463 1.6% 28.85 30.35 28.30 31.08 TV-45 4790 28.72 0.481 1.7% 27.88 29.40 27.28 30.16 TV-56 6008 27.99 0.520 1.9% 27.08 28.77 26.43 29.55 TV-66 7040 27.19 0.526 1.9% 26.26 27.96 25.61 28.77 TV-77 8259 26.49 0.550 2.1% 25.51 27.33 24.84 28.14 TV-86 9220 25.89 0.556 2.1% 24.89 26.72 24.22 27.56 TV-109 11727 24.56 0.557 2.3% 23.53 25.41 22.89 26.23 Intercept (A) 6.4706 0.1220 1.9% 6.2561 6.6500 6.1046 6.8366 Slope (B) −0.0969 0.0032 −3.3% −0.1014 −0.0919 −0.1064 −0.0873 r2 0.9901 0.0022 0.2% 0.9868 0.9828 0.9835 0.9967 Molecular weight distribution of a glatiramer acetate preparation—Molecular weight was determined for a batch of glatiramer acetate (BN 90995). Table 11 summarizes data obtained from 16 determinations on TV-marker-calibrated columns. TABLE 11a RT of glatiramer acetate (BN 90995) Average SD RSD % Peak 26.208 0.434 1.66 −2SD (2.5%) 19.865 0.528 2.66 −1SD (16%) 22.578 0.477 2.11 +1SD (84%) 28.934 0.324 1.12 TABLE 11b RRT of glatiramer acetate (BN 90995) Average SD RSD % Peak 0.664 0.014 2.09 −2SD (2.5%) 0.503 0.016 3.09 −1SD (16%) 0.572 0.015 2.54 +1SD (84%) 0.733 0.011 1.53 TABLE 11C MW (Daltons) of glatiramer acetate (BN 90995) Date Average SD RSD % Peak 7459 146 1.95 −1SD (16%) 16622 466 2.80 +1SD (84%) 4089 77 1.89 The application of a molecular weight and sequence-defined set of markers for the calibration of the Superose 12 column has several advantages over the currently used glatiramer acetate molecular weight markers. First, the use of solid phase synthesis assures consistency among the various preparations of each batch. Mass spectroscopy results (Table 3) confirmed the reproducibility of the synthesis. This consistency provides improved accuracy in molecular weight determinations. Second, the current calibration is based on the determination of the RRT at 50% of the peak area for each of the glatiramer acetate molecular weight markers. The new markers elute as sharp peaks. Their use in calibration is more accurate than the calculated retention time at 50% of the area of a broad peak. Third, the use of markers having molecular weights defined by predetermined sequence precludes any uncertainty which might accompany the use of markers whose molecular weight is determined by inexact measurement of physical properties. Fourth, the calibration procedure facilitates normalization of columns for molecular weight determinations, regardless of minor changes between column lots, age or instrumentation. EXAMPLE 3 Biological Activity of TV-Markers Reactivity of TV-markers with monoclonal antibodies to Cop 1.—Table 12 shows the binding of anti-Cop 1 monoclonal antibodies to TV-markers. TV-markers and reference Glat production batches were tested. Microtiter wells were coated with 2 μg/ml antigen. Values are counts per minute (cpm) of 125I-goat anti-mouse IgG bound to the monoclonal antibodies. Antibody binding to each TV-marker is compared to antibody binding to Cop 1 reference standard. TABLE 12 Reactivity of TV-markers and Cop 1 with mAbs in RIA Binding of mAb cpm (% Cop 1 binding) anti-Cop-1 anti-Cop-1 anti-Cop-1 Coating Antigen (3-3-9) (3-1-45) (5-7-2) PBS 1384 315 521 03494 14860 20587 10513 (glatiramer acetate) 55296 13705 (91) 17189 (83) 8683 (82) (glatiramer acetate) 55396 13458 (90) 17564 (85) 9142 (86) (glatiramer acetate) TV-35 1176 (0) 343 (0) 657 (1) (TV-marker) TV-56 1614 (2) 1581 (6) 9584 (91) (TV-marker) TV-77 2265 (6) 2152 (9) 4259 (37) (TV-marker) TV-86 1625 (2) 1606 (6) 8140 (76) (TV-marker) Reactivity with Cop 1 specific T cells.—T cells lines which can be stimulated with GLAT copolymer were used to test stimulatory activity of TV-markers in comparison to regular GLAT copolymer production batches (Table 13). As above, the activities of TV-markers were tested for in vitro. The proliferation of various mouse and human T cell lines was determined in response to peptides in culture. The cell lines included: BALB/c-Ts-Cop-1, a tempreature-sensitive line derived from BALB/c mice; L-22-1, a tempreature-sensitive clone derived from F1 mice; SC-103 and SC-14: human Cop 1 specific T cell clones. Proliferation was determined by measuring 3H-thymidine uptake by the T cell lines cultured with 10 μg of GLAT copolymer or TV-marker. Glatiramer acetate batches were stimulatory. TV-markers were also found to stimulate two of the four T cell lines, although not as strongly. TV-markers are recognized by both mouse and human T cells specific to glatiramer acetate. This confirms that there is amino acid sequence similarity and T cell epitope similarity among glatiramer acetate and TV-markers. TABLE 13 Reactivity of glatiramer acetate and TV-markers with glatiramer acetate specific T cell lines 3H-Thymidine incorporation cpm (% Cop 1) BALB/c- Antigen Ts-Cop-1 L-22-1 SC-103 SC-14 PBS 588 207 342 760 03494 32643 16395 8709 3091 (glatiramer acetate) 55296 35820 (110) 17315 (106) 7148 (81) 2973 (95) (glatiramer acetate) 55396 34281 (105) 17211 (105) 7019 (80) 3253 (107) (glatiramer acetate) TV-35 9465 (28) 225 (0) 438 (0) 884 (0) (TV-marker) TV-56 19545 (59) 232 (0) 237 (0) 3495 (117) (TV-marker) TV-77 17367 (52) 300 (1) 327 (0) 2701 (83) (TV-marker) TV-86 14694 (44) 418 (1) 298 (0) 2284 (65) (TV-marker) Blocking of Experimental Allergic Encephalomyelitis—To test the physiological activity of TV-markers, protection from experimental allergic encephalomyelitis (EAE) was investigated in mice. Injection of Copolymer 1 in complete Freund's adjuvant together with the encephalitogen can block EAE essentially as described in Aharoni et al., 17 EUR. J. IMMUNOL. 23 (1993). Other researchers have observed that the therapeutic effect of Copolymer 1 in multiple sclerosis patients is also associated with the induction of TH2 cells. Lahat et al., 244 J. NEUROL. 129 (1997). In this example, EAE is blocked by different polypeptides of the present invention. Induction of EAE—Two to three month old female (SJL/JxBALB/c)FI mice are injected in all four footpads with mouse spinal cord homogenate (3.5 mg/mouse) emulsified in a 1:1 ratio in complete Freund's adjuvant (CFA) supplemented with 4 mg/ml mycobacterium tuberculosis H37Ra. Pertussis toxin (0.25 ml, 250 ng, Sigma) is injected intravenously, immediately after and 48 hr later. Mice are examined daily from day 10 post induction for clinical signs of EAE which were scored on a 0-5 scale as described in Lando et al., 123 J. IMMUNOL. 2156 (1979). EAE blocking by injection with complete adjuvant—Each antigen being tested was included in the encephalitogenic inoculum. Table 14 shows the incidence of EAE in animals which received the encephalitogenic inoculum supplemented with a TV-marker or glatiramer acetate and in animals which received only the encephalitogenic inoculum. Also shown is the mean onset of EAE in animals which were not protected. Disease intensity is scored daily in mice with a score of zero (0=healthy) to five (5=dead). The onset is determined as the day an animal exhibits a disease score of at least one (1). TABLE 14 Protection from EAE by TV-markers Blocking Mean Onset Antigen Incidence Mean Score (days) % Blocking None (control) 10/10 4.9 11.3 — TV-45 0/10 0 — 100 TV-66 6/10 2.8 11.7 40 TV-77 1/9 0.2 14.0 89 TV-86 3/10 0.7 12.0 70 TV-109 0/10 0 — 100 03494 0/10 0 — 100 55396 0/10 0 — 100
<SOH> BACKGROUND OF THE INVENTION <EOH>Autoimmune diseases occur when an organism's immune system fails to recognize some of the organism's own tissues as “self” and attacks them as “foreign.” Normally, self-tolerance is developed early by developmental events within the immune system that prevent the organism's own T cells and B cells from reacting with the organism's own tissues. These early immune responses are mediated by the binding of antigens to MHC molecules and presentation to T cell receptors. This self-tolerance process breaks down when autoimmune diseases develop and the organism's own tissues and proteins are recognized as “autoantigens” and attacked by the organism's immune system. For example, multiple sclerosis is believed to be an autoimmune disease occurring when the immune system attacks the myelin sheath, whose function is to insulate and protect nerves. It is a progressive disease characterized by demyelination, followed by neuronal and motor function loss. Rheumatoid arthritis (“RA”) is also believed to be an autoimmune disease which involves chronic inflammation of the synovial joints and infiltration by activated T cells, macrophages and plasma cells, leading to a progressive destruction of the articular cartilage. It is the most severe form of joint disease. The nature of the autoantigen(s) attacked in rheumatoid arthritis is poorly understood, although collagen type II is a candidate. A tendency to develop multiple sclerosis and rheumatoid arthritis is inherited. These diseases occur more frequently in individuals carrying one or more characteristic MHC class II alleles. For example, inherited susceptibility for rheumatoid arthritis is strongly associated with the MHC class II DRB1 *0401, DRB 1 *0404, or DRB 1*0405 or the DRB1*0101 alleles. The histocompatibility locus antigens (HLA) are found on the surface of cells and help determine the individuality of tissues from different persons. Genes for histocompatibility locus antigens are located in the same region of chromosome 6 as the major histocompatibility complex (MHC). The MHC region expresses a number of distinctive classes of molecules in various cells of the body, the genes being, in order of sequence along the chromosome, the Class I, II and III MHC genes. The Class I genes consist of HLA genes, which are further subdivided into A, B and C subregions. The Class II genes are subdivided into the DR, DQ and DP subregions. The MHC-DR molecules are the best known; these occur on the surfaces of antigen presenting cells such as macrophages, dendritic cells of lymphoid tissue and epidermal cells. The Class III MHC products are expressed in various components of the complement system, as well as in some non-immune related cells. A number of therapeutic agents have been developed to treat autoimmune diseases, including steroidal and non-steroidal anti-inflammatory drugs, for example, methotrexate; various interferons; and certain inhibitors of prostaglandin synthesis. However, these agents can be toxic when used for more than short periods of time or cause undesirable side effects. Other therapeutic agents bind to and/or inhibit the inflammatory activity of tumor necrosis factor (TNF), for example, anti-TNF specific antibodies or antibody fragments, or a soluble form of the TNF receptor. These agents target a protein on the surface of a T cell and generally prevent interaction with an antigen presenting cell (APC). However, therapeutic compositions containing natural folded proteins are often difficult to produce, formulate, store, and deliver. Moreover, the innate heterogeneity of the immune system can limit the effectiveness of drugs and complicate long-term treatment of autoimmune diseases. Glatiramer acetate (Copolymer 1; Cop 1; hereinafter GLAT copolymer) is a mixture of polypeptides composed of alanine, glutamic acid, lysine, and tyrosine in a molar ratio of approximately 4.6:1.5:3.6:1.0, respectively, which is synthesized by chemically polymerizing the four amino acids, forming products with average molecular weights ranging from about 4000 to about 13,000 daltons. The corresponding molar fractions are approximately 0.427 for alanine, 0.141 for glutamic acid, 0.337 for lysine and 0.093 for tyrosine, and may vary by about +/−10%. Related copolymers are mixtures of polypeptides composed of three (thus, “terpolymers”) of the four aforementioned amino acids. Copolymer 1 and the terpolymers address the innate heterogeneity of the mammalian immune system and human population and are effective for treatment of autoimmune diseases and other immune conditions. Preferred average molecular weight ranges and processes of making terpolymers are described in U.S. Pat. No. 5,800,808, which is hereby incorporated by reference in its entirety. Also contemplated by the invention are other copolymers comprised of other combinations of three, four, or five or more amino acids. To certify a Copolymer 1 or terpolymer preparation for use in a pharmaceutical products, it is necessary to accurately determine the molecular weight distribution of the polypeptides in the preparation. One method for determining the molecular weight is chromatography on a Superose 12 column. Calibration coefficients of columns for determination of glatiramer acetate molecular weight have been determined using glatiramer acetate batches with indirectly measured molecular weights. Indirect measures have included viscosimetry and velocity-sedimentation ultracentrifugation. More recently, batches of glatiramer acetate markers have been prepared whose molecular weights were determined by multiple angle laser light scattering (MALLS). Thus, a need exists for molecular weight markers useful as standards for determining the molecular weight distribution of copolymer compositions contemplated by the invention. Desirable molecular weight markers have defined molecular weights and physical properties which are analogous to the molecules for which molecular weight is to be determined. Ideally, there is a linear relationship between the defined molecular weights (or the log of the defined molecular weights) of the markers and a measurable physical property such as, for example, the molar ellipticity of the markers, or the retention time of the markers on a molecular sizing column.
<SOH> SUMMARY OF THE INVENTION <EOH>Sequence-defined molecular weight markers that have chemical and physical characteristics similar to GLAT copolymer provide an accurate and robust calibration set for determinations of molecular weight of production batches. The present invention provides derivatives of GLAT copolymer useful as molecular weight markers for determining the molecular weight ranges of GLAT copolymer preparations and optimally having therapeutic utility for treatment of immune conditions. The invention further provides polypeptides having defined molecular weights which are derivatives of other copolymers and which are useful for determining molecular weight ranges of preparations of those copolymers. When those copolymers are therapeutically useful, the derivative polypeptides optimally have therapeutic utility. For determination of the molecular weight range of a GLAT copolymer preparation, the preferred derivative is a polypeptide having an amino acid compositon corresponding approximately to GLAT copolymer and an identified molecular weight which is between about 2,000 daltons and about 40,000 daltons. The polypeptide preferably has specific molar ratios of amino acids alanine, glutamic acid tyrosine and lysine. Moreover, in a preferred embodiment the polypeptide has alanine at the N-terminus and tyrosine at the fourth position from the N-terminus. For determination of the molecular weight of a terpolymer, the preferred derivative will have a defined molecular weight and an amino acid composition corresponding approximately to that of the terpolymer. Other copolymers are also contemplated by the invention. When determining of the molecular weight of a copolymer contemplated by the invention, the polypeptide derivative will have a defined molecular weight and an amino acid composition corresponding approximately to that of the copolymer. The present invention further provides a plurality of molecular weight markers for determining the molecular weight of glatiramer acetate or a terpolymer or other copolymer on a molecular weight sizing column. The markers comprise two to ten or more polypeptides, each polypeptide having an identified molecular weight. When determining the molecular weight range of glatiramer acetate, a preferred plurality of molecular weight markers will have defined molecular weights from about 2,000 daltons to about 40,000 daltons, and amino acid compositions corresponding to glatiramer acetate or a selected terpolymer. In preferred embodiments, there is a linear relationship between the log molecular weight of the polypeptide molecular weight markers and either the retention time of the molecular weight markers on a sizing column or between the molecular weight of the molecular weight markers and the molar ellipticity of the molecular weight markers. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of GLAT copolymer and consisting essentially of amino acids alanine, glutamic acid, tyrosine and lysine in molar fractions of from about 0.38 to about 0.50 alanine, from about 0.13 to about 0.15 glutamic acid, from about 0.08 to about 0.10 tyrosine, and from about 0.3 to about 0.4 lysine, and a pharmaceutically acceptable carrier. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular-weight range-of a terpolymer and consisting essentially of amino acids alanine, tyrosine, and lysine in the molar fractions of from about 0.3 to about 0.6 alanine, from about 0.005 to about 0.25 tyrosine, and from about 0.1 to about 0.5 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of glutamic acid. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of glutamic acid, tyrosine and lysine in molar fractions of from about 0.005 to about 0.300 glutamic acid, from about 0.005 to about 0.250 tyrosine, and from about 0.3 to about 0.7 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of alanine. The present invention further provides pharmaceutical compositions which include a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of amino acids alanine, glutamic acid and tyrosine in molar fractions of from about 0.005 to about 0.8 alanine, from about 0.005 to about 0.3 glutamic acid, and from about 0.005 to about 0.25 tyrosine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of lysine. The present invention also provides pharmaceutical compositions which includes a therapeutically effective amount of a polypeptide useful as a molecular weight marker for determining the molecular weight range of a terpolymer and consisting essentially of alanine, glutamic acid and lysine, in molar fractions of from about 0.005 to about 0.6 alanine, from about 0.005 to about 0.3 glutamic acid, and from about 0.2 to about 0.7 lysine, and a pharmaceutically acceptable carrier. The polypeptide is preferably substantially free of tyrosine. In general, pharmaceutical compositions of the invention include therapeutically effective amounts of a polypeptide which is useful as a molecular weight marker for determining the molecular weight range of a copolymer of any number (e.g., three to five or more) of amino acids. In the manner of glatiramer acetate, such a copolymer is a diverse population of sequences of the amino acids. The polypeptide useful as a molecular weight marker consists of those amino acids in molar fractions corresponding approximately to the copolymer. The present invention further provides methods for treating and preventing immune-mediated and autoimmune diseases in a mammal which include administering a therapeutically effective amount of a molecular weight marker of the invention. In another embodiment, the method for treating immune-mediated and autoimmune diseases in a mammal further involves inhibiting proliferation of T cells involved in the immune attack. In another embodiment, the method for treating immune-mediated and autoimmune diseases in a mammal involves binding a molecular weight marker of the invention to an antigen presenting cell. In yet another embodiment, the method for treating immune-mediated and autoimmune disease in a mammal involves binding a molecular weight marker of the invention to a major histocompatibility complex class II protein which is associated with autoimmune diseases. Autoimmune diseases contemplated by the present invention include arthritic conditions, demyelinating diseases and inflammatory diseases. For example, autoimmune diseases which can be treated by the present compositions include multiple sclerosis, rheumatoid arthritis, osteoarthritis, autoimmune hemolytic anemia, autoimmune oophoritis, autoimmune thyroiditis, autoimmune uveoretinitis, Crohn's disease, chronic immune thrombocytopenic purpura, colitis, contact sensitivity disease, diabetes mellitus, Graves disease, Guillain-Barre's syndrome, Hashimoto's disease, idiopathic myxedema, myasthenia gravis, psoriasis, pemphigus vulgaris, or systemic lupus erythematosus. Immune-mediated diseases result from undesired sensitivity of the immune system to particular foreign antigens. Examples are host-versus-graft disease (HVGD) and graft-versus-host disease (GVHD) and numerous types of delayed-type hypersensitivity (DTH). The present compositions can be used to treat one or more of these diseases.
20040302
20060711
20050217
92084.0
4
HUYNH, PHUONG N
COPOLYMER 1 RELATED POLYPEPTIDES FOR USE AS MOLECULAR WEIGHT MARKERS AND FOR THERAPEUTIC USE
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,792,337
ACCEPTED
Tibial sizer
A tibial sizer, or set of sizers, used to estimate the appropriate size tibial base plate implanted during knee arthroplasty. The preferred embodiment provides a measurement of the amount of exposed bone between a posterior proximal portion of the tibia and a posterior edge of the tibial sizer (which edge will correspond to the posterior edge of the tibial base plate). Preferably, the sizer includes a head and a handle extending outwardly from the head, as well as a channel with a slider configured and arranged to be slidably positioned within the channel. The slider includes markings for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of the head of the sizer. Additional markings are also provided for indicating a suggested size of tibial base plate with respect to the anterior/posterior direction.
1. A tibial sizer for use during knee arthroplasty, said tibial sizer comprising: a head; a handle extending outwardly from said head; a channel extending along said tibial sizer in a longitudinal direction, through at least a portion of said head and at least a portion of said handle; and a slider configured and arranged to be slidably positioned within said channel. 2. The tibial sizer as defined in claim 1, wherein said head includes posterior, lateral and medial outer peripheral surfaces, and further wherein said posterior outer peripheral surface is generally flat, and one of said lateral outer peripheral surface or said medial outer peripheral surface is curved and the other of said lateral outer peripheral surface and said medial outer peripheral surface is generally flat. 3. The tibial sizer according to claim 1, wherein said head includes posterior, lateral and medial outer peripheral surfaces, and further wherein said posterior outer peripheral surface is generally flat, and one of said lateral outer peripheral surface or said medial outer peripheral surface is curved and the other of said lateral outer peripheral surface and said medial outer peripheral surface is generally flat and includes a cutout portion therein. 4. The tibial sizer as defined in claim 1, wherein said head includes posterior, lateral and medial outer peripheral surfaces that are shaped to generally correspond to posterior, lateral and medial outer peripheral surfaces, respectively, of a tibial base plate of a unicompartmental knee prosthesis. 5. The tibial sizer as defined in claim 4, wherein either said lateral outer peripheral surface or said medial outer peripheral surface includes a generally flat surface with a cutout portion therein. 6. The tibial sizer as defined in claim 1, wherein said slider includes a hook portion at one end thereof for making contact with a posterior proximal portion of a tibia. 7. The tibial sizer as defined in claim 1, wherein said slider includes at least one set of markings thereon for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of said head of said tibial sizer. 8. The tibial sizer as defined in claim 1, further comprising: a first set of markings for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of said head of said tibial sizer; and a second set of markings for indicating a suggested size of tibial base plate with respect to an anterior/posterior direction. 9. The tibial sizer as defined in claim 8, wherein said first set of markings are located on said slider, and provide said indication of exposed bone amount when viewed with respect to a terminal edge of said handle. 10. The tibial sizer as defined in claim 8, wherein said second set of markings are located on both said slider and said handle. 11. The tibial sizer as defined in claim 10, wherein said second set of markings comprise: indicia on said handle representing different sizes of tibial base plates; and a pointer on said slider for pointing to the indicia on said handle to indicate a suggested size of tibial base plate with respect to the anterior/posterior direction. 12. The tibial sizer as defined in claim 8, further comprising a third set of markings, wherein said third set of markings comprise indicia on said slider representing different sizes of tibial base plates, wherein said third set of markings are not visible when said slider is inserted within said channel of said handle, but said third set of markings are visible when said slider is used without said handle, whereby said slider may be used for determining a suggested size of tibial base plate, with respect to the anterior/posterior direction, without said slider being inserted into said channel. 13. The tibial sizer as defined in claim 11 wherein: said handle includes a first surface on one side thereof and a second surface on an opposite side thereof; and further wherein said second set of markings are visible when viewing both said first surface and said second surface. 14. A method of using a tibial sizer to aid in selecting an appropriately sized tibial base plate, the method comprising the steps of: estimating the appropriate size of tibial base plate; selecting a tibial sizer of a size that corresponds to a tibial base plate of the estimated size; placing the selected tibial sizer on a cut surface of a resected tibia so that a generally flat outer peripheral surface of a head of the tibial sizer is against a surface created by a sagittal cut; verifying that the outer periphery of the head sufficiently covers the resected tibia, without extending beyond cortical bone of the tibia; if the outer periphery of the head does not provide appropriate coverage, selecting another tibial sizer of a different size and performing said verifying step again; after completing said verifying step, sliding a slider within a channel in said tibial sizer so that a hook found on a slider contacts a posterior edge of the tibia; viewing a first set of markings that indicate the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of said head of said tibial sizer; viewing a second set of markings that indicate a suggested size of tibial base plate with respect to an anterior/posterior direction; and selecting an appropriately sized tibial base plate based on information obtained during said verifying step and said viewing steps. 15. The method as defined in claim 14, further comprising the step of: using a cutout portion on the head of said tibial sizer as a guide for marking a desired location of a cut to accept a keel of a tibial implant. 16. The method as defined in claim 14, further comprising the step of: using a cutout portion on the head of said tibial sizer as a guide for creating a cut to accept a keel of a tibial implant. 17. A system of tibial sizers for use during knee arthroplasty, said system comprising: a plurality of differently sized tibial sizers, wherein each tibial sizer includes: a head; a handle extending outwardly from said head; and a channel extending along said tibial sizer in a longitudinal direction, through at least a portion of said head and at least a portion of said handle; and a slider configured and arranged to be slidably positioned within each of said channels of said plurality of differently sized tibial sizers. 18. The system of tibial sizers as defined in claim 17, wherein each of said heads includes posterior, lateral and medial outer peripheral surfaces, and further wherein said posterior outer peripheral surface is generally flat, and one of said lateral outer peripheral surface or said medial outer peripheral surface is curved and the other of said lateral outer peripheral surface and said medial outer peripheral surface is generally flat. 19. The system of tibial sizers as defined in claim 17, wherein each of said tibial sizers includes: a first set of markings for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of said head of said tibial sizer; a second set of markings for indicating a suggested size of tibial base plate with respect to an anterior/posterior direction; and a third set of markings, wherein said third set of markings include indicia on said slider representing different sizes of tibial base plates, wherein said third set of markings are not visible when said slider is inserted within said channel of said handle, but said third set of markings are visible when said slider is used without said handle, whereby said slider may be used for determining a suggested size of tibial base plate, with respect to the anterior/posterior direction, without inserting said slider into one of said channels.
The present invention relates generally to an instrument for helping to estimate the appropriate size tibial base plate implanted during knee arthroplasty surgery. More particularly, the present invention relates to one or more tibial sizers, and a method of using the sizers, where the sizers are used to estimate the appropriate size tibial base plate, with respect to both the anterior/posterior direction and the medial/lateral direction. Additionally, the preferred embodiment also provides a measurement of the amount of exposed bone between a posterior proximal portion of the tibia and a posterior edge of the tibial sizer (which edge will correspond to the posterior edge of the tibial base plate of the corresponding size). BRIEF SUMMARY OF THE INVENTION Briefly, the present invention relates to a tibial sizer for use during knee arthroplasty. The embodiment described herein is intended to be utilized during unicompartmental knee arthroplasty (UKA). However, the concept of the present invention could also be applied to other types of knee arthroplasty, such as total knee arthroplasty (TKA). The preferred embodiment of the tibial sizer includes a head and a handle extending outwardly from the head. There is preferably a channel that extends along the tibial sizer in a longitudinal direction, through at least a portion of the head and at least a portion of the handle, with a slider configured and arranged to be slidably positioned within the channel. In the preferred embodiment, the head includes posterior, lateral and medial outer peripheral surfaces. The posterior outer peripheral surface is generally flat, and one of the lateral outer peripheral surface or the medial outer peripheral surface is curved and the other of the lateral outer peripheral surface and the medial outer peripheral surface is generally flat and includes a cutout portion therein. Several sets of markings are preferably provided on the tibial sizer. There is preferably a first set of markings for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of the head of the tibial sizer. Additionally, there is also preferably a second set of markings for indicating a suggested size of tibial base plate with respect to an anterior/posterior direction, which markings are used when the slider is inserted into the channel of the tibial sizer. Optionally, the slider may be configured to be used, for some measurements, without being inserted into the channel. For this feature, the slider includes a third set of markings that comprise indicia representing different sizes of tibial base plates, wherein the third set of markings are for determining a suggested size of tibial base plate, with respect to the anterior/posterior direction, when the slider is used without being inserted into the tibial sizer. The present invention also relates to a method of using the tibial sizer, as well as to a system of tibial sizers of a plurality of different sizes. Preferably, the system of sizers only includes a single slider, which can be used with each of the sizers, or the slider can also be used alone (for certain measurements). BRIEF DESCRIPTION OF THE DRAWINGS Preferred embodiments of the present invention are described herein with reference to the drawings wherein: FIG. 1 is a perspective view of one side of one preferred embodiment of the tibial sizer of the present invention, shown with the slider inserted into the channel; FIG. 2 is a perspective view of the tibial sizer of FIG. 1, shown from the opposite side and without the slider; FIG. 3 is a cross-sectional view of the tibial sizer of FIG. 1, taken along line III-III of FIG. 2, showing the channel for receiving the slider; FIG. 4 is a perspective view of the slider, without the remainder of the tibial sizer; FIG. 5 is a view of a resected tibia, shown with an example of a tibial base plate of a unicompartmental knee prosthesis; and FIG. 6 is a view of the tibial sizer of FIG. 1 positioned upon the cut surface of a resected tibia. DETAILED DESCRIPTION OF THE INVENTION Turning now to FIGS. 1 and 2, a preferred embodiment of the present tibial sizer 10 is shown. The sizer includes a head 12 and a handle 14, as well as a separate slider 16 that is configured to slide within the head and handle. Turning first to the head 12, the outer periphery of the head is shaped to correspond to the outer periphery of a tibial base plate, one example of which is shown in FIG. 5 and is designated as base plate 18. In the depicted example, tibial base plate 18 is configured for use with a plastic insert 20. However, the present invention may also be used with other types of tibial base plates, such as those of unitary construction whereby the insert is not a separate component. As shown in FIG. 5, the tibial base plate 18 is intended to be implanted into the resected portion 21 of a tibia 24. The tibial sizer 10 is capable of being used on both the left and the right tibia, and on either the medial compartment or the lateral compartment of either tibia. However, for the sake of convenience in description, the tibial sizer will primarily be shown and described with respect to the medial compartment of the right tibia, and the terms lateral, medial, etc. relative to the right tibia will be used. Of course, if the prosthesis was being implanted into the left tibia, the surfaces on the prosthesis and the tibial sizer designated as lateral and medial would be reversed. FIG. 1 shows the tibial sizer 10 as it would be positioned for use in the medial compartment of the right tibia, and FIG. 6 shows the tibial sizer in such a position. Head 12 includes a curved outer peripheral surface 22 connected to a generally flat posterior outer peripheral surface 24, which is itself connected to another generally flat outer peripheral surface 26. In this orientation (for use with the medial compartment of the right tibia), the curved outer peripheral surface 22 is the medial outer peripheral surface of head 12, and surface 26 is the lateral outer peripheral surface of the head. Optionally, the generally flat lateral outer peripheral surface 26 includes a cutout portion 28, which can be used as a guide to create a cut, or to mark the position of a cut, to accommodate a keel on a tibial implant (such as keel 29 shown in FIG. 5), as described more fully below. The outer peripheral surfaces 22, 24, and 26 of the tibial sizer are shaped and sized like the corresponding outer peripheral surfaces of the tibial base plate 18 of FIG. 5. More specifically, curved outer peripheral surface 22 of the sizer 10 (FIG. 1) corresponds to curved outer peripheral surface 22′ of base plate 18 (FIG. 5) and generally flat outer peripheral surface 26 of the sizer 10 (FIG. 1) corresponds to generally flat outer peripheral surface 26′ of base plate 18 (FIG. 5). Additionally, generally flat posterior outer peripheral surface 24 of the sizer 10 corresponds to the generally flat posterior outer peripheral surface of the base plate 18 (which surface is hidden from view in FIG. 5). In order to accommodate the range of sizes of tibial base plates, there should be a set of tibial sizers with heads 12 of a variety of different sizes, with one head corresponding in size to each size of tibial base plate 18. For example, if there are six different sizes of tibial base plate 18, there should be six different sizes of tibial sizer 10. In order to readily show the size of a particular tibial sizer, size markings such as markings 30 and 30′ should be provided on at least one location, and preferably at two locations, as shown in FIG. 1. Further, the size markings 30/30′ should coincide with the size markings on the tibial base plates. For example, where there are six different sizes of tibial base plate to select from, designated as “Size 1”, “Size 2”, “Size 3”, “Size 4”, “Size 5” and “Size 6”, the six corresponding tibial sizers 10 should also be designated as “Size 1”, “Size 2”, etc. Although different sizes of tibial sizers should be provided, each sizer can be used for any one of the four compartments (i.e., lateral compartment of the right tibia, medial compartment of the right tibia, lateral compartment of the left tibia, and medial compartment of the left tibia). More specifically, the orientation shown in FIG. 1 is used for the medial compartment of the right tibia and for the lateral compartment of the left tibia; and the orientation shown in FIG. 2 (which is merely the slider of FIG. 1 turned upside down) is used for lateral compartment of the right tibia and for the medial compartment of the left tibia. In use, to determine the proper size tibial base plate to be implanted, different sized sizers 10 are placed on the resected portion 21 (FIG. 5) of the tibia 24, as shown in FIG. 6. The tibial sizer 10 should be placed with the flat outer peripheral surface 26 (which in this case is the lateral surface, since FIG. 5 shows the right tibia 24) against the surface 32 created by the sagittal cut. The tibial sizer 10 of the size that best covers the resected proximal tibia, without any overhang, should be selected. Care should be taken to ensure that the selected tibial sizer rests on cortical bone around its entire perimeter, without any overhang of the head 12, in order to ensure that the tibial base plate has strong cortical support. The present tibial sizer 10 also includes a feature for measuring the amount of exposed bone posterior to the sizer, as well as including markings for providing a suggested size of tibial base plate with regard to the anterior/posterior direction. This anterior/posterior size suggestion provided by the markings described below should be used in conjunction with the anterior/posterior size estimate provided by matching the size of the head 12 (in the anterior/posterior direction) with the size of the resected portion 21 of the tibia, as described above. In the preferred embodiment of the present invention, the size estimate in the medial/lateral direction is provided by matching the size of the head 12 (in the medial/lateral direction) with the size of the resected portion 21 of the tibia, as described above. The amount of exposed bone posterior to the sizer is indicated by the slider 16, which is shown inserted into the sizer 10 in FIG. 1, and is shown removed from the sizer in FIG. 4. The slider 16 is configured to slide within a channel 34 (FIG. 2) that extends along the longitudinal direction of 11 both the head 12 and the handle 14. FIG. 3 shows a cross-sectional view of the handle 14 taken along lines III-III of FIG. 2. This cross-sectional view clearly shows the channel 34, which also includes upper lips 36 for maintaining the slider 16 within the channel 34. The channel 34 is preferably configured to allow for the slider 16 to be easily removed, such as by simply pulling the slider out of the channel via a hook portion 38. As mentioned above, the present invention relates to a set of different sized tibial sizers 10, with one sizer sized to correspond to each available size of tibial base plate 18. Optionally, one slider 16 may be provided for each tibial sizer 10. In the alternative, only one slider 16 could be provided for all of the different sized tibial sizers. Thus, for example, if a set of tibial sizers includes heads 12 of six different sizes, the single slider 16 provided with the set could be configured to fit all of the sizers, and it could simply be moved into the channel of the sizer being used. Preferably, the slider (or sliders) and the sizers are all made of stainless steel, although other materials are also contemplated as being within the scope of the invention. The hook portion 38 of the slider 16 is configured to make contact with a posterior proximal portion 40 of the tibia 24 (see FIG. 5). When the slider 16 is inserted into the channel 34, and with the hook portion 38 making contact with the posterior proximal portion 40 and the head 12 properly aligned on the resected portion 21, two different sets of markings may be used—one set for indicating the amount of exposed bone posterior to the sizer; and another set for providing a suggested size of tibial base plate, with respect to the anterior/posterior direction. As shown in FIGS. 1 and 6, the first set of markings, designated as markings 42, indicate the amount of exposed bone between the posterior proximal portion 40 of the tibia 24 and the posterior outer peripheral surface 24 of the tibial sizer 10. More specifically, markings 42 are located on the slider 16, and provide the indication of exposed bone when viewed with respect to edge 44 of the handle 14 of the sizer 10. In the embodiment shown, markings 42 are provided in millimeters, between 0 mm and 20 mm, in 2 mm increments. Of course, any desired units may be used, and other increments between units are also contemplated. Markings 42, as well as the other types of markings described herein may be produced upon the sizer by a variety of different methods, such as laser etching, engraving, printing, etc. The second set of markings, designated as markings 46 in FIGS. 1 and 6, provide a suggested size of tibial base plate, with respect to the anterior/posterior direction. Markings 46 include indicia on the handle 14 representing different sizes of tibial base plates and a pointer 48 on the slider 16 for pointing to indicate a suggested size of tibial base plate, with respect to the anterior/posterior direction and with the amount of exposed bone indicated by the first set of markings 42. As can be seen in FIGS. 1 and 6, the pointer 48 is visible through a window 49 that is provided in the handle 14. However, when the tibial sizer 10 is used in the orientation shown in FIG. 2, a window is unnecessary because channel 34 is open on this side of the sizer. In the example shown in FIGS. 1 and 6, there are six different sizes of tibial base plates (numbered from 1 to 6). However, a different amount and/or a different type of indicia may be provided if the number of tibial base plates is different from six and/or if the different sizes of tibial base plates are represented by a different designation system, such as alphabetically. In use, the second set of markings 46 operates as follows. The head 12 of the appropriately sized tibial sizer 10 is positioned on the resected portion 21 of the tibia, with the flat outer peripheral surface 26 against the surface 32 created by the sagittal cut (FIGS. 5 and 6). The head 12 should be aligned so that its outer peripheral surfaces 22 and 24 do not extend beyond the bone, but instead rest on cortical bone, as mentioned above. If the outer peripheral surfaces 22 or 24 do extend beyond the bone, a smaller sizer should be selected. On the other hand, if the head 12 is so small that outer peripheral surfaces 22 and/or 24 are too small to rest on cortical bone, a larger sizer should be selected. After aligning the head 12 of the properly sized sizer 10, the slider 16 is slid within the channel 34 until the hook portion 38 makes contact with the posterior proximal portion 40 (FIG. 5) of the tibia 24. In order to facilitate gripping the slider, the slider 16 may optionally include a series of indentations 54 on the lateral and medial edges. With the hook portion 38 contacting posterior proximal portion 40, the pointer 48 on the slider 16 will point to indicia 46 on the handle 14 to suggest a size of tibial base plate, with respect to the anterior/posterior direction and with the amount of exposed bone indicated by the first set of markings 42. If a different amount of exposed bone is desired, the sizer 10 should be moved in the appropriate direction (i.e., the anterior direction or the posterior direction), and a different size of tibial base plate may be suggested (depending upon how much the amount of exposed bone is changed). The information provided by the second set of markings 46 (which provides size information for the anterior/posterior direction only) should be used in conjunction with the visual indication of the suggested size of tibial base plate from the head 12 being positioned on the resected portion 21 of the tibia (which provides size information for both the anterior/posterior direction and the media/lateral direction) to select a tibial base plate of an appropriate size. Optionally, the slider may also include a third set of markings representing different sizes of tibial base plates indicating a suggested size of tibial base plate (with respect to the anterior/posterior direction), where the third set of markings are only usable if the slider 16 is used by itself, such as shown in FIG. 4. The third set of markings, designated as markings 50 in FIG. 4, includes the same indicia as the second set of markings 46 (except without the pointer 48). Thus, for example, the third set of markings 50 may be the numbers 1 through 6, which correspond to different sizes of tibial base plates. Of course, indicia other than the numbers 1 through 6 may also be used for the third set of markings. In use, the third set of markings 50, which are visible when the slider 16 is used alone, operate as follows. The slider 16 (FIG. 4) is positioned upon the resected portion 21 (FIG. 5) of the tibia, with its hook portion 38 contacting the posterior proximal portion 40 of the tibia 24. The size of tibial base plate indicated by the one of the markings 50 closest to the anterior proximal portion 52 (FIG. 5) of the tibia 24 is the suggested size of tibial base plate, with respect to the anterior/posterior direction. Using the slider alone does not provide information for a suggested size of tibial base plate with respect to the medial/lateral direction, nor does it provide information regarding the amount of exposed bone between a posterior proximal portion of the tibia and a posterior edge of the head the tibial sizer (and/or the tibial base plate). To facilitate understanding of the present invention, a brief description of the use of a set of tibial sizers will be provided next. Although this description will refer to unicompartmental knee arthroplasty (UKA) of the medial compartment of the right tibia, the tibial sizers of the present invention are also configured to be used on the lateral compartment of the right tibia (by orienting the sizer 10 as shown in FIG. 2), as well as on the lateral compartment of the left tibia (FIG. 1 orientation) and the medial compartment of the left tibia (FIG. 2 orientation). As mentioned earlier, the concepts of the present invention may also be applied to other types of knee surgery, such as total knee arthroplasty (TKA). After the tibia has been resected, as shown in FIG. 5, the surgeon views the resected portion 21 and roughly estimates the appropriate size of tibial base plate needed, and selects (from a set of tibial sizers of different sizes) a tibial sizer 10 of a size that corresponds to a tibial base plate of the estimated size. As shown in FIG. 6, the surgeon then places the head 12 of the selected tibial sizer 10 on the cut surface 21 of the resected tibia so that the generally flat outer peripheral surface 26 (i.e., the lateral surface) of the head 12 of the tibial sizer 10 is against a surface 32 created by a sagittal cut. Next, the surgeon verifies that the outer medial periphery 22 of the head 12 sufficiently covers the resected tibia, without extending beyond cortical bone 23 (FIG. 5). If the outer medial periphery 22 of the head 12 does not provide appropriate coverage, the surgeon selects another tibial sizer 10 of a different size, and performs the verifying step again with the newly selected tibial sizer. If necessary, additional sizers are selected until the appropriate size has been found. When the appropriate size of tibial sizer has been found, the slider 16 is inserted into the channel 34. Of course, the slider may be inserted into the channel earlier, if desired. With the slider 16 within the channel 34, the slider is slid until the hook 38 found on a slider 16 contacts a posterior edge 40 of the tibia 24. The surgeon then views a first set of markings 42 that indicate the amount of exposed bone between the posterior proximal portion 40 of the tibia 24 and the posterior edge 24 of the head 12 of the tibial sizer 10. If the amount of bone exposed is too high or too low, the surgeon may choose to select a different size tibial base plate than the size that corresponds to the tibial sizer being used. If a size change is needed, the steps described may be repeated with a sizer that corresponds to the newly chosen size. In addition to viewing the way the head 12 corresponds to the resected portion 21 of the tibia, additional information about a suggested size of tibial base plate, with respect to the anterior/posterior direction, is provided by the surgeon's viewing of a second set of markings 46. The surgeon considers the position of the pointer 48 along indicia 46, which indicates suggested different sizes of tibial base plates for the amount of exposed bone indicated by the first set of markings 42. Finally, in light of the sizing information obtained by the surgeon when: (1) viewing the correspondence between the head 12 and the resected portion 21; (2) considering the amount of exposed bone indicated by markings 42; and (3) considering the suggested size of tibial base plate, with respect to the anterior/posterior direction, indicated by markings 46, the surgeon determines the appropriate size of tibial base plate to use. Then, the tibial base plate of the selected size is implanted using any desired method, and the arthroplasty continues as known to those of ordinary skill in the art. If desired, the surgeon may also opt to use the cutout portion 28 on the head 12 of the tibial sizer 10 as a guide for either marking a desired location of a cut to accept a keel (such as keel 29 of FIG. 5) of the tibial implant or for directly creating a cut to accept the keel 29. More specifically, the head 12 of the sizer is positioned on the resected portion 21 (FIG. 5) of the tibia, and it is properly aligned, as shown in FIG. 6. If marking is desired, the surgeon merely uses the cutout portion 28 as a guide to mark the bone, using known marking methods, and the bone is then cut or punched using known methods, where it was marked, in order to provide a space 31 for the keel 29 of the tibial implant. On the other hand, if the surgeon wants to directly cut the space 31 for the keel 29, he/she may use the cutout portion 28 directly for guiding the saw blade used to make the space for the keel. While various embodiments of the present invention have been shown and described, it should be understood that other modifications, substitutions and alternatives may be apparent to one of ordinary skill in the art. Such modifications, substitutions and alternatives can be made without departing from the spirit and scope of the invention, which should be determined from the appended claims. Various features of the invention are set forth in the appended claims.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>Briefly, the present invention relates to a tibial sizer for use during knee arthroplasty. The embodiment described herein is intended to be utilized during unicompartmental knee arthroplasty (UKA). However, the concept of the present invention could also be applied to other types of knee arthroplasty, such as total knee arthroplasty (TKA). The preferred embodiment of the tibial sizer includes a head and a handle extending outwardly from the head. There is preferably a channel that extends along the tibial sizer in a longitudinal direction, through at least a portion of the head and at least a portion of the handle, with a slider configured and arranged to be slidably positioned within the channel. In the preferred embodiment, the head includes posterior, lateral and medial outer peripheral surfaces. The posterior outer peripheral surface is generally flat, and one of the lateral outer peripheral surface or the medial outer peripheral surface is curved and the other of the lateral outer peripheral surface and the medial outer peripheral surface is generally flat and includes a cutout portion therein. Several sets of markings are preferably provided on the tibial sizer. There is preferably a first set of markings for indicating the amount of exposed bone between a posterior proximal portion of a tibia and a posterior edge of the head of the tibial sizer. Additionally, there is also preferably a second set of markings for indicating a suggested size of tibial base plate with respect to an anterior/posterior direction, which markings are used when the slider is inserted into the channel of the tibial sizer. Optionally, the slider may be configured to be used, for some measurements, without being inserted into the channel. For this feature, the slider includes a third set of markings that comprise indicia representing different sizes of tibial base plates, wherein the third set of markings are for determining a suggested size of tibial base plate, with respect to the anterior/posterior direction, when the slider is used without being inserted into the tibial sizer. The present invention also relates to a method of using the tibial sizer, as well as to a system of tibial sizers of a plurality of different sizes. Preferably, the system of sizers only includes a single slider, which can be used with each of the sizers, or the slider can also be used alone (for certain measurements).
20040303
20070206
20050915
99700.0
0
SWIGER III, JAMES L
TIBIAL SIZER
UNDISCOUNTED
0
ACCEPTED
2,004
10,792,420
ACCEPTED
Display apparatuses having layered liquid crystal displays
Display apparatuses are provided that includes a light source, a first liquid crystal display on the light source, and a second liquid crystal display on the first liquid crystal display. The first liquid crystal display is configured to allow a variable amount of light transmission based on a first control signal. The second liquid crystal display is configured to allow a variable amount of light transmission based on a second control signal.
1. A display apparatus comprising: a light source; a first liquid crystal display on the light source, wherein the first liquid crystal display is configured to allow a variable amount of light transmission based on a first control signal; and a second liquid crystal display on the first liquid crystal display, wherein the second liquid crystal display is configured to allow a variable amount of light transmission based on a second control signal. 2. The display apparatus of claim 1, wherein one of the first and second liquid crystal displays comprises a grayscale liquid crystal display and the other one of the first and second displays comprises a color liquid crystal display. 3. The display apparatus of claim 1, wherein both of the first and second liquid crystal displays comprise the same one of a grayscale liquid crystal display or a color liquid crystal display. 4. The display apparatus of claim 1, wherein the first and second liquid crystal displays comprise a twisted nematic liquid crystal display or a super twisted nematic liquid crystal display. 5. The display apparatus of claim 1, wherein the first and second liquid crystal displays comprise a passive matrix liquid crystal display or an active matrix liquid crystal display. 6. The display apparatus of claim 1, wherein the first liquid crystal display is between the light source and the second liquid crystal display. 7. The display apparatus of claim 1, wherein the second liquid crystal display is between the light source and the first liquid crystal display. 8. The display apparatus of claim 1, further comprising a display circuit that is configured to generate the first control signal to vary the amount of light transmission of the first liquid crystal display. 9. The display apparatus of claim 8, wherein the display circuit is configured to generate the first control signal based on the amount of light transmission of the second liquid crystal display. 10. The display apparatus of claim 9, wherein the display circuit is configured to increase light transmission through the first liquid crystal display when an amount of light transmission through the second liquid crystal display satisfies a threshold value. 11. The display apparatus of claim 8, wherein the display circuit is configured to generate the first control signal independent of the amount of light transmission of the second liquid crystal display. 12. The display apparatus of claim 8, further comprising a light sensor that is configured to generate an ambient light signal based on intensity of ambient light, and wherein the display circuit is configured to generate the first control signal to vary the amount of light transmission through the first liquid crystal display based on the ambient light signal. 13. The display apparatus of claim 8, wherein the first liquid crystal display is configured to operate in at least a first state having a first amount of light transmission and a second state having a second amount of light transmission that is greater than the first amount of light transmission, and wherein the display circuit is configured to generate the first control signal to change the first liquid crystal display between the first and second states. 14. The display apparatus of claim 1, wherein the light source comprises at least one light emitting diode. 15. The display apparatus of claim 1, wherein the light source comprises at least one fluorescent tube. 16. The display apparatus of claim 1, wherein the light source comprises at least one incandescent bulb. 17. The display apparatus of claim 1, wherein the light source comprises an electroluminescent panel. 18. The display apparatus of claim 1, wherein the second liquid crystal display comprises separately addressable pixels that are configured to display images by varying the amount of light transmission of the pixels based on the second control signal, and wherein the first liquid crystal display is configured to uniformly vary the amount of light transmission passing through it based on the first control signal. 19. The display apparatus of claim 1, wherein: the first liquid crystal display comprises a first substrate with conductive electrodes, a first liquid crystal layer on the first substrate, and a second substrate with conductive electrodes on the first liquid crystal layer; and the second liquid crystal display comprises a second liquid crystal layer on the second substrate, and a third substrate on the second liquid crystal layer; and further comprising a rear polarizer between the light source and the first substrate, and a front polarizer on the third substrate. 20. The display apparatus of claim 1, wherein: the first liquid crystal display comprises a first rear polarizer, a first substrate with conductive electrodes on the first rear polarizer, a first liquid crystal layer on the first substrate, a second substrate with conductive electrodes on the first liquid crystal layer, and a first front polarizer on the second substrate; and the second liquid crystal display comprises a second rear polarizer, a third substrate with conductive electrodes on the second rear polarizer, a second liquid crystal layer on the third substrate, a fourth substrate with conductive electrodes on the second liquid crystal layer, and a second front polarizer on the fourth electrode.
BACKGROUND OF THE INVENTION The present invention relates to displays, and more particularly, to liquid crystal displays (LCDs). Liquid crystal displays are commonly used in, for example, laptop computers, mobile telephones, personal digital assistants (PDAs) and, increasingly, in televisions. The use of LCDs in these devices is common because, for example, LCDs may be thinner and lighter and may draw less power than, for example, cathode ray tubes (CRTs), and may be less expensive than plasma displays or light emitting diode (LED) displays, such as organic LED displays and/or polymeric LED displays. LCDs are typically backlit by a light source, for example, by a light emitting diode (LED) or an electroluminescent (EL) panel. Backlit LCDs displays may operate well in poorly lit environments but may not function adequately in bright environments, for example, in brightly lit office environments or sunlight. LCDs may also provide less contrast differential between bright and dark areas than CRTs, plasma displays, and LED displays. SUMMARY OF THE INVENTION Embodiments of the present invention provide a display apparatus that includes a light source, a first liquid crystal display on the light source, and a second liquid crystal display on the first liquid crystal display. The first liquid crystal display is configured to allow a variable amount of light transmission based on a first control signal. The second liquid crystal display is configured to allow a variable amount of light transmission based on a second control signal. In some further embodiments of the present invention, one of the first and second liquid crystal displays includes a grayscale liquid crystal display, and the other one of the first and second liquid crystal displays includes a color liquid crystal display. Alternatively, both of the first and second liquid crystal displays can include the same one of a grayscale liquid crystal display or a color liquid crystal display. The first and second liquid crystal displays can each include a twisted nematic liquid crystal display or a super twisted nematic liquid crystal display, and can each include a passive matrix liquid crystal display or an active matrix liquid crystal display. The first liquid crystal display can be between the light source and the second liquid crystal display, or the second liquid crystal display can be between the light source and the first liquid crystal display. The display apparatus can further include a display circuit that is configured to generate the first control signal to vary the amount of light transmission of the first liquid crystal display. They can be configured to generate the first control signal based on the amount of light transmission of the second liquid crystal display. For example, the display circuit can be configured to increase light transmission through the first liquid crystal display when an amount of light transmission through the second liquid crystal display satisfies a threshold value. Alternatively, the display circuit can be configured to generate the first control signal independent of the amount of light transmission of the second liquid crystal display. The display apparatus can further include a light sensor that is configured to generate an ambient light signal based on intensity of ambient light. The display circuit can be configured to generate the first control signal to vary the amount of light transmission through the first liquid crystal display based on the ambient light signal. The first liquid crystal display can be configured to operate in at least a first state having a first amount of light transmission and a second state having a second amount of light transmission that is greater than the first amount of light transmission. The display circuit can be configured to generate the first control signal to change the first liquid crystal display between the first and second states. The light source can include one or more light emitting diodes, fluorescent tubes, incandescent bulbs, and/or electroluminescent panels. The second liquid crystal display can include separately addressable pixels that are configured to display images by varying the amount of light transmission of the pixels based on the second control signal. The first liquid crystal display can be configured to uniformly vary the amount of light transmission passing through it based on the first control signal. Alternatively, the first liquid crystal display can include separately addressable pixels that may be controlled independently of, or based on, the pixels in the second liquid crystal display. Accordingly, the first and second liquid crystal displays may be controlled to display the same or different images. In yet some further embodiments of the present invention, the first liquid crystal display can include a first substrate with electrodes, a first liquid crystal layer on the first substrate, and a second substrate with electrodes on the first liquid crystal layer. The second liquid crystal display can include a second liquid crystal layer on the second substrate, and a third substrate with electrodes on the second liquid crystal layer. A rear polarizer can be between the light source and the first substrate, and a front polarizer can be on the third substrate. In yet some further embodiments of the present invention, the first liquid crystal display can include a first rear polarizer, a first substrate with electrodes on the first rear polarizer, a first liquid crystal layer on the first substrate, a second substrate with electrodes on the first liquid crystal layer, and a first front polarizer on the second substrate. The second liquid crystal display can include a second rear polarizer, a third substrate with electrodes on the second rear polarizer, a second liquid crystal layer on the third substrate, a fourth substrate with electrodes on the second liquid crystal layer, and a second front polarizer on the fourth substrate. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a cross sectional view of a display having layered liquid crystal displays and a block diagram of a display control circuit according to various embodiments of the present invention. FIG. 2 is a cross sectional view of a display according to some embodiments of the present invention. FIG. 3 is a cross sectional view of a display according to some other embodiments of the present invention. DETAILED DESCRIPTION The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the invention are shown. In the drawings, the relative sizes of regions or features may be exaggerated for clarity. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Furthermore, relative terms such as overlying may be used herein to describe one layer or regions relationship to another layer or region as illustrated in the Figures. It will be understood that these terms are intended to encompass different orientations of the device in addition to the orientation depicted in the Figures. For example, if the device in the Figures is turned over, layers or regions described as “overlying” other layers or regions would now be oriented “below” or “underlying” these other layers or regions. The term “overlying” is intended to encompass both overlying and underlying in this situation. Like numbers refer to like elements throughout. It will be understood that although the terms first and second are used herein to describe various elements or modes of operation, these elements or modes of operation should not be limited by these terms. These terms are only used to distinguish one element or mode of operation from another element or mode of operation. Thus, for example, a first liquid crystal display (LCD) discussed below could be termed a second LCD, and similarly, a second LCD may be termed a first LCD without departing from the teachings of the present invention. The term “picture” is used herein to refer to any form of text, graphic, or other image that may be displayed by a LCD. Referring to FIG. 1, a display apparatus 100 includes a light source 102, a first LCD 104, and a second LCD 106 according to some embodiments of the present invention. The first and second LCDs 104 and 106 are layered on the light source 102 so that light from the light source 102 can pass through them. The display apparatus 100 can also include a display circuit 110 that generates first and second control signals 112 and 114. The first LCD 104 is configured to allow a variable amount of light transmission based on the first control signal 112. The second LCD 106 is configured to allow a variable amount of light transmission based on the second control signal 114. The first LCD 104 and/or the second LCD 106 may be a color LCD, a grayscale LCD, a passive matrix LCD such as a twisted nematic LCD or a super twisted nematic LCD, or a active matrix LCD such as a thin film transistor (TFT) LCD or a thin film diode (TFD) LCD. Although two control signals 112 and 114 are shown for illustration purposes, a single control signal or more than two control signals may be substituted therefor. The light source 102 may be a high brightness light source such as, for example, a point light source or a panel light source. If a point light source, for example, light emitting diode(s) (LEDs) or fluorescent tube(s) or incandescent bulb(s), is used, a diffuser may be used to evenly distribute the point light source across the liquid crystal display. A panel light source may be, for example, an electroluminescent (EL) panel. By using a high brightness light source, the display apparatus 100 can generate bright pictures, such as for use in high ambient light conditions, and/or to generate high brightness in local areas of the display apparatus 100, such as to reproducing sun light, flame, or another bright light source in a picture. The two layered LCDs 104 and 106 can be used to provide high contrast between bright and dark areas of displayed pictures and/or to vary the overall brightness of the display apparatus 100. The display circuit 110 controls the amount of light transmission through the first LCD 104, via the first control signal 112, to vary the amount of light that enters the second LCD 106. The display circuit 110 controls the second LCD 106, via the second control signal 114, to render a picture therein. The display circuit 110 may use an address or sequence of addresses to vary the light transmission of individual bit locations in the second LCD 106 to render the picture. According to some embodiments of the invention, the display circuit 110 controls the first LCD 104 to increase or decrease the transmission of light from the light source 102 to defined areas of the second LCD 106. For example, the contrast of brightness between two areas of the second LCD 106 can be increased by varying the light transmission of the corresponding adjacent two areas of the first LCD 104. In particular, the display circuit 110 may vary the light transmission of bit locations of an area of the first LCD 104 to increase or decrease the brightness of corresponding adjacent bit locations of the second LCD 106. In this manner, the display apparatus 100 may provide increased contrast between bright and dark areas so as to reproduce, for example, a flame in a dark room or car lights at night. According to some embodiments of the invention, the amount of light transmission through the first LCD 104 is not varied until the amount of light transmission in an area of the second LCD 106 satisfies a threshold amount. For example, when the light transmission of an area of the second LCD 104 approaches a maximum or threshold amount, the display circuit 110 further increases the brightness of light through that area by increasing the amount of light transmitted through a corresponding adjacent area of the first LCD 104. In some other embodiments of the invention, the amount of light transmission through the first LCD 104 is varied independent of the amount of light transmission through the second LCD 106. According to some other embodiments of the invention, the display circuit 110 controls the amount of light passing through the first LCD 104 to uniformly increase or decrease the amount of light provided to the second LCD 106 and, thereby, the brightness of the display apparatus 100. The display circuit 110 may sense ambient light and/or an input signal from a user and, based thereon, vary the amount of light transmission of the first LCD 104. Thus, for example, in high ambient light conditions, the first LCD 104 can be used to uniformly increase the brightness of the display apparatus 100, and in low ambient light conditions, the first LCD 104 can be used to uniformly decrease the brightness of the display apparatus 100. To uniformly vary the amount of light transmission through the first LCD 104, the display circuit 110 may address larger pixel areas than are addressed in the second LCD 106 to render a picture, and may be, for example, configured to only vary the brightness of the entire first LCD 104. Although some embodiments of the invention have been described above in which the second LCD 106 is configured to render a picture and the first LCD 104 is configured to vary the brightness of the second LCD 106, according to yet other embodiments of the present invention, the first and second LCDs 104 and 106 may be switched so that the described second LCD 106 is between the light source 102 and the described first LCD 104. According to yet further embodiments of the present invention, the display circuit 110 includes first and second control circuits 120 and 122, a light sensor 124, and a user interface 126. The first and second control circuits 120 and 122 respectively generate the first control signal 112 and the second control signal 114 to respectively vary the amount of light transmission of the first LCD 104 and the second LCD 106. The first control circuit 120 may operate independently of the second control circuit 122, or it may generate the first control signal 112 based on signals from the second control circuit 122 which may indicate, for example, the brightness of the second LCD 106. The light sensor 124 is configured to sense intensity of ambient light and to generate a control signal responsive thereto. The light sensor 124 may be, for example, a phototransistor and/or a photodiode and may be located close to the first and second LCDs 104 and 106 to sense ambient light impendent thereon. The user interface 126 may include a button, wheel, touch sensor, or other interface that is configured to receive a user's input and to generate a control signal responsive thereto. The first control circuit 120 and/or the second control circuit 120 my use the control signal from the light sensor 124 and/or the user interface 126 to vary the amount of light transmission of the first LCD 104 and/or the second LCD 106. The layers that make up the light source 102 and the first and second LCDs 104 and 106 may overlie one other as illustrated in FIG. 2 according to some embodiments of the present invention. The layers form a stack of a light source 102, a rear polarizer 202, a first substrate 204, a first liquid crystal layer 206, a second substrate 208, a second liquid crystal layer 210, a third substrate 212, and a front polarizer 214. The first, second, and third substrates 204, 208, and 212 can be, for example, glass or plastic. The first, second, and/or third substrates 204 may have formed thereon a color filter array such as, for example, an array of red, green, and blue (RGB) pixels that are configured to display color images. The pair of first and second substrates 204 and 208 include electrodes that conduct the first control signal 112 to vary the electric field across the first liquid crystal layer 206 and, thereby, its light transmission. Similarly, the pair of second and third substrates 208 and 212 include electrodes that conduct the second control signal 114 to vary the electric field across the second liquid crystal layer 210 and, thereby, its light transmission. Accordingly, the amount of light from the light source 102 that exits the front polarizer 214 is dependent upon the light transmission of the first and second liquid crystal layers 206 and 210, which may be separately controlled using the electrodes on the substrates 204, 208, and 212. FIG. 3 illustrates the layers that make up the light source 102 and the first and second LCDs 104 and 106 according to some other embodiments of the present invention. The layers form a stack of a light source 102, a first rear polarizer 302, a first substrate 304, a first liquid crystal layer 306, a second substrate 308, a first front polarizer 310, a second rear polarizer 312 a third substrate 314, a second liquid crystal layer 316, a fourth substrate 318, and a second front polarizer 320. The first, second, third, and/or fourth substrates 304, 308, 314, and 318 include, for example, glass, and can include a color filter array formed thereon. The first and second substrates 304 and 308 include electrodes that conduct the first control signal 112 to vary the electric field across the first liquid crystal layer 306 and, thereby, its light transmission. Similarly, the third and fourth substrates 312 and 318 include electrodes that conduct the second control signal 114 to vary the electric field across the second liquid crystal layer 316 and, thereby, its light transmission. The layers illustrated in FIGS. 2 and 3 are for illustration purposes only, and embodiments of the invention are not to be limited thereto. Indeed, as will be appreciated by one having skill in the art in view of the description herein, other ordering of the layers may be provided, some layers may be eliminated, and additional layers may be added. In the drawings and specification, there have been disclosed typical illustrative embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the invention being set forth in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention relates to displays, and more particularly, to liquid crystal displays (LCDs). Liquid crystal displays are commonly used in, for example, laptop computers, mobile telephones, personal digital assistants (PDAs) and, increasingly, in televisions. The use of LCDs in these devices is common because, for example, LCDs may be thinner and lighter and may draw less power than, for example, cathode ray tubes (CRTs), and may be less expensive than plasma displays or light emitting diode (LED) displays, such as organic LED displays and/or polymeric LED displays. LCDs are typically backlit by a light source, for example, by a light emitting diode (LED) or an electroluminescent (EL) panel. Backlit LCDs displays may operate well in poorly lit environments but may not function adequately in bright environments, for example, in brightly lit office environments or sunlight. LCDs may also provide less contrast differential between bright and dark areas than CRTs, plasma displays, and LED displays.
<SOH> SUMMARY OF THE INVENTION <EOH>Embodiments of the present invention provide a display apparatus that includes a light source, a first liquid crystal display on the light source, and a second liquid crystal display on the first liquid crystal display. The first liquid crystal display is configured to allow a variable amount of light transmission based on a first control signal. The second liquid crystal display is configured to allow a variable amount of light transmission based on a second control signal. In some further embodiments of the present invention, one of the first and second liquid crystal displays includes a grayscale liquid crystal display, and the other one of the first and second liquid crystal displays includes a color liquid crystal display. Alternatively, both of the first and second liquid crystal displays can include the same one of a grayscale liquid crystal display or a color liquid crystal display. The first and second liquid crystal displays can each include a twisted nematic liquid crystal display or a super twisted nematic liquid crystal display, and can each include a passive matrix liquid crystal display or an active matrix liquid crystal display. The first liquid crystal display can be between the light source and the second liquid crystal display, or the second liquid crystal display can be between the light source and the first liquid crystal display. The display apparatus can further include a display circuit that is configured to generate the first control signal to vary the amount of light transmission of the first liquid crystal display. They can be configured to generate the first control signal based on the amount of light transmission of the second liquid crystal display. For example, the display circuit can be configured to increase light transmission through the first liquid crystal display when an amount of light transmission through the second liquid crystal display satisfies a threshold value. Alternatively, the display circuit can be configured to generate the first control signal independent of the amount of light transmission of the second liquid crystal display. The display apparatus can further include a light sensor that is configured to generate an ambient light signal based on intensity of ambient light. The display circuit can be configured to generate the first control signal to vary the amount of light transmission through the first liquid crystal display based on the ambient light signal. The first liquid crystal display can be configured to operate in at least a first state having a first amount of light transmission and a second state having a second amount of light transmission that is greater than the first amount of light transmission. The display circuit can be configured to generate the first control signal to change the first liquid crystal display between the first and second states. The light source can include one or more light emitting diodes, fluorescent tubes, incandescent bulbs, and/or electroluminescent panels. The second liquid crystal display can include separately addressable pixels that are configured to display images by varying the amount of light transmission of the pixels based on the second control signal. The first liquid crystal display can be configured to uniformly vary the amount of light transmission passing through it based on the first control signal. Alternatively, the first liquid crystal display can include separately addressable pixels that may be controlled independently of, or based on, the pixels in the second liquid crystal display. Accordingly, the first and second liquid crystal displays may be controlled to display the same or different images. In yet some further embodiments of the present invention, the first liquid crystal display can include a first substrate with electrodes, a first liquid crystal layer on the first substrate, and a second substrate with electrodes on the first liquid crystal layer. The second liquid crystal display can include a second liquid crystal layer on the second substrate, and a third substrate with electrodes on the second liquid crystal layer. A rear polarizer can be between the light source and the first substrate, and a front polarizer can be on the third substrate. In yet some further embodiments of the present invention, the first liquid crystal display can include a first rear polarizer, a first substrate with electrodes on the first rear polarizer, a first liquid crystal layer on the first substrate, a second substrate with electrodes on the first liquid crystal layer, and a first front polarizer on the second substrate. The second liquid crystal display can include a second rear polarizer, a third substrate with electrodes on the second rear polarizer, a second liquid crystal layer on the third substrate, a fourth substrate with electrodes on the second liquid crystal layer, and a second front polarizer on the fourth substrate.
20040303
20080513
20050908
62232.0
0
VU, PHU
DISPLAY APPARATUSES HAVING LAYERED LIQUID CRYSTAL DISPLAYS
UNDISCOUNTED
0
ACCEPTED
2,004
10,792,482
ACCEPTED
Method and apparatus for all-purpose, automatic remote utility meter reading, utility shut off, and hazard warning and correction
Apparatus for routine monitoring and automatic reporting of electrical power and gas utility usage also provides means for detecting and reporting to the relevant utility companies, fire department, and other emergency responders the development of local hazards on premises at which one or more utility usage meters are installed, including the occurrence of a fire, a gas leak, or any other circumstances such as medical emergencies that demand fast response. Such reporting can include automatic reporting of both zero or excess electrical current draw or zero or excess gas usage. The system is clock driven, fully programmable, and expandable to such other types of sensors as would detect and report on such circumstances as the presence of noxious materials as in a chem/bio attack. A permanent record of all reported events is made.
1. Utility monitoring apparatus comprising: utility usage metering means; utility usage reporting means; utility hazard detection means; and utility hazard reporting means. 2. The apparatus of claim 30 wherein said utility comprises electrical power. 3. The apparatus of claim 30 wherein said utility comprises natural gas and said hazard further comprises other dangerous gases and liquids. 4. The apparatus of claim 30 wherein said hazard detection means comprises a fire alarm. 5. The apparatus of claim 4 further comprising means for transmitting a report to one or more remote recipients the fact that a fire has occurred at a premises at which said utility monitoring means is located. 6. The apparatus of claim 5 wherein said apparatus automatically transmits a report to one or more remote recipients the fact that a fire has occurred at a premises at which said utility monitoring means is located. 7. The apparatus of claim 3 wherein said hazard detection means comprises a gas leak detector. 8. The apparatus of claim 7 further comprising means for transmitting a report to one or more remote recipients the fact that a gas leak has occurred at a premises at which said utility monitoring means is located. 9. The apparatus of claim 8 wherein said apparatus automatically transmits a report to one or more remote recipients the fact that a gas leak has been detected at a premises at which said utility monitoring means is located. 10. The apparatus of claim 30 wherein said hazard detection means comprises electrical current monitoring means. 11. The apparatus of claim 10 wherein said electrical current monitoring means further comprises means for detecting zero electrical current and means for transmitting notice of said zero electrical current to an electrical utility company. 12. The apparatus of claim 11 wherein said apparatus automatically transmits notice of said zero electrical current to an electrical utility company. 13. The apparatus of claim 10 wherein said electrical current monitoring means further comprises means for detecting excessive electrical current and means for transmitting notice of said excessive electrical current to an electrical utility company. 14. The apparatus of claim 13 wherein said apparatus automatically transmits notice of said excessive electrical current to an electrical utility company. 15. The apparatus of claim 3 wherein said utility usage metering means and utility usage reporting means further comprise means for reporting zero gas usage upon the occurrence of zero gas usage. 16. The apparatus of claim 3 wherein said utility usage metering means and utility usage reporting means further comprise automatic means for reporting zero gas usage upon the occurrence of zero gas usage. 17. The apparatus of claim 30 wherein said utility usage and utility hazard reporting means comprise sensor means, data collection means, data transmission means, data reception means, data processing means, error detection means, and error correction means. 18. The apparatus of claim 17 wherein said error detection means further comprises means for sending confirmation data from said data reception means to said data collection means confirming that utility usage data from said data collection means had been successfully reported to said data reception means. 19. The apparatus of claim 17 wherein said error resolution means further comprises means for repetitive use of said error detection means a predetermined number of times, followed by identification and repair of any malfunction in the operation of said sensor means, data collection means, data transmission means, data reception means, and data processing means. 20. A method of reporting utility usage comprising: providing utility usage monitoring means to establish utility usage data; providing utility usage data processing means; providing means for transmitting said utility usage data from said utility usage data processing means to a remote data receiving apparatus; providing access means to said means for transmitting said utility usage data in the event said means for transmitting said utility usage data is found to be in use; transmitting confirmation from said data receiving apparatus to said utility usage processing means of the reception of said utility usage data; and repeating said transmission of said utility usage data to said data receiving apparatus a predetermined number of times in the event said confirmation is not received by said utility usage processing means; and in the event said transmission of said utility usage data to said data receiving apparatus is not thereby successful, initiating the identification and repair of any malfunction in said utility usage monitoring means, utility usage data processing means, and said means for transmitting said utility usage data from said utility usage data processing means to a remote data receiving apparatus. 21. The method of claim 20 wherein said access means comprises providing a bypass line and switching means therefor by which a telephone line to which said means for transmitting said utility usage data is connected can be disconnected, and a) disconnecting with said switching means said telephone line from connection thereof to an outside line to a utility company, and b) connecting with said switching means said bypass line to said outside line to a utility company upon a finding that said outside line to a utility company was being otherwise used. 22. The method of claim 20 wherein said utility usage data processing means comprises programmable microprocessor means and memory, and a) programming said microprocessor means to receive and store utility usage data; b) storing in said memory the telephone numbers of computers of those utility companies whose services are being utilized; c) storing in said memory said utility usage data; and d) transmitting said utility usage data to that selected one of said those utility companies whose services are being utilized that had provided the utility for which said utility usage data had been utilized. 23. The apparatus of claim 30 further comprising hazard correction means. 24. The apparatus of claim 23 wherein said hazard correction means comprises fire suppressant means and the automatic activation of said fire suppressant means upon the detection of a fire. 25. The apparatus of claim 23 wherein said hazard correction means comprises gas shutoff means and the automatic activation of said gas shutoff means upon the detection of a gas leak. 26. The apparatus of claim 30 further comprising self-diagnostic means adapted to test and report on the operational capability of said utility usage metering means, utility usage reporting means, utility hazard detection means, and utility hazard reporting means at the time of any such test. 27. The apparatus of claim 30 further comprising means for turning off and on from a remote source the provision of electrical power at a premises receiving said electrical power. 28. The apparatus of claim 30 further comprising means for turning off and on from a remote source the provision of gas at a premises receiving said gas. 29. The apparatus of claim 16 wherein said utility usage metering means and utility usage reporting means further comprises automatic means for reporting excessive gas usage upon the occurrence of excessive gas usage. 30. The apparatus of claim 1 further comprising data recording means adapted to receive digital data, wherein said digital data may be provided from either or both of said utility usage metering means and/or said utility hazard detection means, and placing into digital memory a record of said digital data as obtained from using either or both of said utility usage metering means and/or said utility hazard detection means. 31. The apparatus of claim 30 wherein said hazard detection means further comprise burglar alarm means. 32. The apparatus of claim 17 wherein said utility hazard detection means comprises water sprinkler means adapted to detect and report the turning on of a water sprinkler system. 33. The apparatus of claim 32 wherein said water sprinkler means comprises water sprinkler detection means and water sprinkler reporting means. 34. The apparatus of claim 32 wherein said water sprinkler detection means comprises sensor means. 35. The apparatus of claim 32 wherein said water sprinkler detection means comprises data collection means. 36. The apparatus of claim 32 wherein said water sprinkler reporting means comprises data transmission means. 37. The apparatus of claim 32 wherein said water sprinkler reporting means comprises data reception means. 38. The apparatus of claim 32 wherein said water sprinkler reporting means comprises data processing means. 39. The apparatus of claim 32 wherein said water sprinkler detection means comprises error detection means. 40. The apparatus of claim 32 wherein said water sprinkler detection means comprises error correction means. 41. The apparatus of claim 6 wherein following a predetermined delay said apparatus will automatically recheck to determine whether said alarm has continued to generate a report, and if not will foreclose the transmittal of said report as first generated. 42. The apparatus of claim 9 wherein following a predetermined delay said apparatus will automatically recheck to determine whether said alarm has continued to generate a report, and if not will foreclose the transmittal of said report as first generated. 43. The apparatus of claim 5 wherein, at the time of sending said report that a fire had occurred, a second action taken is to shut off the electrical power in the premises. 44. The apparatus of claim 5 wherein, at the time of sending said report that a fire had occurred, a second action taken is to shut off the natural gas in the premises.
CROSS-REFERENCE TO RELATED APPLICATIONS None STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT Not applicable REFERENCE TO A “SEQUENCE LISTING” Not applicable BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates generally to the remote sensing art, and more specifically to apparatus for remote utility meter reading, including responses at the premises to fires, gas leaks, and other hazards, by sending alarms to utility companies, the fire department, and other emergency responders, and also emergency adjustment of electricity and gas connections. 2. Background Information An important task of utility companies that provide households and businesses with electrical power, gas, water and the like is the reading of the meters that have been installed at those locations in order to apply appropriate monthly charges for having provided the service. That effort can be expensive and time consuming, if it is necessary for company employees to travel to each place that receives such service and read the meters that have been installed to measure the utility usage. Such work is also dangerous and expensive, with meter readers having had traffic accidents, and the like, or having to pay for insurance policies that would compensate for such events. Difficulty even in reading those meters can also arise, perhaps because a home owner keeps a dog in the yard, or shrubbery has been allowed to grow up over the meter, or the like. In fact, in some cases it has become the practice of utility companies to prohibit installation of meters behind a fence, which may require the use of extended lines running from the home or other building, which can be particularly expensive in the case of gas lines. For these reasons, much effort has been made to accomplish such meter reading remotely, preferably automatically, so that a minimum of costly human intervention would be involved. Filed with this application is an Information Disclosure Statement that sets out a number of issued patents in which it was sought to carry out remote meter reading. The present invention will be seen neither to have been anticipated nor suggested by any of that prior work, whether taken separately or in combination. At the same time, it could be important to obtain other information by such remote means that is not presently collected, particularly as to any malfunctions or errors in the use and operation of the utility equipment, or indeed emergency situations in which a particular house or business may have caught fire, or a gas leak has developed. Warning of the existence of a fire or gas leak is of course important in its own right, but it is also important to know what the condition may be of the utility (electricity or gas) equipment. Even more importantly, when no one happens to be in the home or at the office, it would be extremely useful if protection were provided against some emergency situations automatically. In factories or the like, water sprinkler systems that will turn on when a fire breaks out will often have been installed, but such equipment may be deemed not appropriate to the home, and typically no other such protection is provided. Even so, the present invention includes the capability of automatic activation of strategically placed fire extinguishers. With respect to electrical power, since insulation burns and electrical shorts can create even more fire, the continued presence of live electrical power in the context of a fire can be dangerous, both as to adding more fire and, perhaps by inadvertent contact with the house wiring, to the firefighters that will be arriving to get the fire under control. Similarly, the heat of a fire may break a gas line, and the release of such gas would undoubtedly increase the fire substantially, and even more dangerously may bring about an explosion. What is needed and would be very important for safety reasons, therefore, is a means by which the operation of the electrical and gas services would be shut off as soon after the outbreak of a fire as possible, or as soon as a gas leak was detected, and the firefighters should be made aware of that condition before they arrive at the site so as not to enter into any attempt, perhaps dangerously, to turn off either the electricity or gas, which would not be necessary if that had already been done. Turning off those services would often help to minimize the effects of the fire, or prevent a gas explosion, and the work of the firefighters could then be carried out more safely. Under situations such as a barricaded felon, or hostage circumstances and the like, it would also be useful for police departments to have remote means of controlling the furnishing of utilities. The present invention thus provides a method and apparatus by which either or both the electrical and gas services would be shut off automatically at the outbreak of a fire or occurrence of a gas leak, while at the same time providing remote notice both of the existence of the fire or gas leak and of the status of the electric and gas utility. Such an early warning would permit an earlier intervention in the fire or gas leak, so as to bring the particular circumstance under control and indeed to put out the fire or repair the gas leak, and the initial and dangerous step of turning off the electric power and gas in the midst of actual fire fighting would be avoided. It would also be appropriate for the respective utility companies to provide, to the owner of the home or other building, instructions that announce the presence of this shutoff capability, actions with respect to such facilities that such owner either should take or would not be allowed to take, and the circumstances under which the equipment would be used, as part of the service contract. SUMMARY OF THE INVENTION A utility meter that measures either electrical power or gas consumption either has a dedicated telephone connected thereto or preferably the telephone is integral to the meter, but in either case also having a modem within or connected to the meter so that either upon command or on a predetermined schedule, preferably at off-peak hours, the telephone will dial the phone number of the responsible electrical power or gas companies and in some cases various emergency responders such as the fire department and transmit to that company or other entity a report of the current readings on the gas or electric meter, and other information as the situation may require. If it was sought to use for this meter reading and other purposes described below the same telephone line as that used for conversation or internet connection by those living in the home or working in the business, the meter preferably includes the ability to “break in” on any telephone call that was in process and carry out the various functions set out below. For similar reasons of providing immediate access by the apparatus comprising the invention, such services as “call waiting” and the like are preferably excluded from the line in order that its constant availability can be assured, and in a preferred embodiment a line is used that is dedicated entirely to use by the invention and has no other function. Unless the context clearly indicates otherwise, reference hereinafter either to a “meter” or a “meter/modem” will mean the same in either case, i.e., the meter itself, together with a modem and connection to a telephone line, either integrally within the meter or separately connected. Similarly, the term “telephone” by itself will mean a connection from that modem to a line, i.e., an ordinary telephone line or by cable or other such means, including a meter antenna in the case of cellular phone transmission, through which a computer at the relevant utility company and the fire department can be contacted. For rural areas, in which farm houses may be isolated and have either poor or even no regular telephone service on fxed lines, the use of cellular phones may be optimal, together with the growing practice of placing a conspicuously sign along the highway, at the proximal end of a driveway that may extend back to a house that is not visible from the highway, an assigned number that is known to the fire department and other emergency responders in order that such responder will realize that the premises sought has in fact been located. The programming of a command schedule is carried out by a computer owned by the responsible utility company, or that programming could be carried out at the meter itself using installed programming means. Whether the programming is carried out at a remote computer or locally, that program will also include the periodic running of self-diagnostics both of the data transmission facilities and the operability of various sensors as a “backup” procedure for ensuring system reliability. A customer number or other such identification that has been assigned to the meter at a particular house or business, perhaps by way of the meter telephone number of the telephone attached thereto, or the address of the location at which the meter is installed, is registered in the computer at each relevant utility company so that the location of the meter from which a call has been received is immediately and automatically recorded. Upon receipt by the meter of a command from that computer, or by its own command, the total usage of electricity or gas is transmitted to the utility company computer, from which the usage over some preceding period, typically a month, can be calculated, and the billing for such usage can then be carried out, based on the identification of the customer using information previously stored in the computer that pertain to the phone number or address from which the call was made, or by other identifying information. The meter may instead or also have an incremental meter scale that will record only the usage over such preceding period, being reset to zero upon a scheduled reading, so that only the electricity or gas usage during that period would be sent to the company computer. The scheduling of meter readings, on a basis such as monthly, can also be done automatically by way of a clock, either the clock associated with the utility company computer or one contained within the meter. That clock could also be used to generate a command to read the meter at the time of startup or cutoff of service, or for similar such reasons. The utility company computer, as well as the on-site computer system, e.g. the microprocessor and associated memory and the like at the meter as will be described in more detail below, are entirely conventional in design, use conventional programming, data transmission and other procedures, and will be known to a person of ordinary skill in the art. However, one feature of the invention is that the programming of the on-site device can be, and preferably is, carried out from the main utility company computer that also has complete access to the premises device in other respects. Upon receipt of a meter reading from a meter at some home or business, either of total or incremental usage, the company computer will transmit back a confirmation of such receipt, and reset to zero the incremental meter if that type of reading had been used. Upon the computer failing to receive any transmission in response to its command, or at the time that the transmission had been scheduled, that computer will first check as to whether or not it had properly sent its command or transmission schedule to the meter, and make whatever adjustments of the computer as may be necessary to accomplish a successful command or schedule transmission. Then, after some predetermined number of unsuccessful attempts at transmission of that command or otherwise receive the data transmission, utility repair personnel would be sent to the site of the meter to determine whether its commands were not being received, even though properly sent, the schedule had not been properly entered, or those commands were being received but the meter telephone for some reason was not properly transmitting the meter readings, and so on, and based on those findings any appropriate repair would be made. If it were found that the problem was merely one of temporary excess “noise” on the lines, the transmission of the command could be postponed and then attempted later. In the same way, since transmission by the meter of the meter readings should result in the receipt by the meter telephone of the confirmation of receipt of the usage data by the company computer, and upon any failure to receive such confirmation, the meter would likewise carry out a predetermined number of attempts at such transmission, and the identification and repair of any equipment failure, or in some cases merely postpone the transmission if it were found that the problem was simply one of temporary noise on the lines. Other circumstances may also require intervention by the remote computer in the operation of the local meter, including turning on or off the supply of either the electrical power or the gas, perhaps as a result of the utility user not having made timely payments of the bill for the usage of the particular utility and then paying that bill, to permit carrying out maintenance in the neighborhood in which the meter is located, or for other reasons such as intervention by the police in some tactical situation. Fundamentally, however, provision is made for either or both the electricity or gas to be shut off in the event of fire or a gas leak. The prior practice of remote turnoff of power, gas, or the like, as for the nonpayment of a bill, has been that of a remote disconnection, which at least as to gas would still leave an amount of gas in the lines leading for some distance into the premises. In the present system, however, as will be seen below, that turnoff is done right at the meter, or very near to it, and upon a gas leak there is less gas that could leak into the premises and perhaps ultimately explode. Consequently, the electricity or gas meter is also connected to an appropriate “on/off” switch or valve that controls the electricity or gas, and in some cases would turn such utility on or off upon receipt of a command so to do from the remote utility computer. Manual operation of such controls is also provided, but the principal means of operation of the meter and related switching so as to cut off the electricity or gas derives from connection to alarms within the facility, whether a home or a business, warehouse, etc. Confirmation of the receipt of such a command by the meter from the computer is sent from the meter to the remote computer, followed by notice that the command in question has been executed, or if turning off the electricity or gas had been initiated locally, either manually or automatically in response to an alarm, notice of that event would also be sent to a computer at the relevant utility company or companies, and when appropriate to the fire department. In the event of failure of the remote computer to receive a notice that was to be responsive to its own command transmission, after some predetermined time period after the transmission of the command, or a sequence of attempts at such transmission, the remote computer would carry out the same kind of “troubleshooting” and repair procedure as was described above. More specifically, and particularly for purposes of intervention in the event of a fire or other such hazard, including an onset of an illness requiring emergency response, the meter can also be activated locally, either manually or automatically by command from the alarm(s) installed within the house or business to which alarm(s) the meter/modem is also connected. Preferably, manual activation is by way of an array of pre-programmed phone numbers, e.g., for the fire department, police, gas company, ambulance service, etc., that would be selected by the user based on the nature of the need. This feature would be an equivalent of a “911” call, except that the remote recipient of the call would be selected, and in the event the user was not able to converse, a pre-recorded message containing the identity of the caller and other relevant information would be sent to that call recipient. The same “outside” line can be used for the electricity and gas meters and various hazard detectors, selection among these being made by the telephone numbers that a microprocessor in the respective meters had been programmed to call, and by separate lines from sensors that will detect a fire or gas leak at appropriate locations in the home, office or other facility to those meter/modems, given that the gas and electric meters will often have different physical locations. Upon signal from an alarm in the home or other facility, notice of a fire or gas leak would be sent both to the fire department and to each relevant utility company, particularly including sending the location information to the fire department that would have identifying information in its computer in the same way as do the utility companies. Connection of respective meters to the gas or electrical system would then bring about shutoff of either or both the gas and electricity, and besides notice of the fire itself, notice of such shutoff is also sent to the fire department and to the respective utility company computers. The fire fighters who would then arrive at the scene to fight the fire or perhaps evacuate people in the event of a gas leak, would thereby be made aware from the fire department's own computer that the electricity or gas, or both, would have been shut off so as to present no danger to them, although, in the interest of confirming that protection, they would preferably make their own examination of the status of the electrical and gas switches or valves, assuming that there was safe access thereto. Depending on circumstances, i.e., as to whether or not additional electrical power might be needed by the fire fighters in order to carry out their firefighting or for purposes of providing medical attention or the like, provision would be made by which the automatic shutoff of the electricity could be locally overridden. Alternatively, notice of the fire only would be sent by the meter telephone to the fire station computer, wherein the fire station would have direct telephone connection through the meter telephone to the “on/off” switch or valve by which the electrical power and gas are controlled, so the fire fighter personnel could themselves decide whether or not to shut off either or both the electrical power or the gas, based either on their own knowledge of the particular situation at the indicated household or business or from their access to that same information in the remote computer. If not already done, fire department personnel would also send notice to the utility companies both of the fire and of any actions that the fire fighters might have taken in response to that fire, including shutting off either or both the electricity and/or the gas. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS A preferred embodiment of the invention, which should be viewed as an example only and not in any way to limit the scope of the invention, will be described in detail below with reference to the accompanying drawings. Since the additional connections as to a second utility involves essentially the creation of a second, parallel flow chart branch and set of device connections, the addition of a similar type of flow chart and connections as to yet a third or more meters and telephones, perhaps for a large factory or other large building, would be done in the same way, hence the drawings in which more than one utility is shown should be interpreted to mean “two or more” utilities and/or alarms, and of course then the remainder of such a system. Respective drawings for these various implementations and aspects of the invention, in which like numbers are used for like devices throughout the series of drawings, are as follows: FIG. 1 is a block diagram of a system from the prior art having a meter/modem unit that encompasses just the meter reading function as to a single utility. FIG. 2 is a flow chart that outlines a first implementation of the invention shown in FIG. 1 involving only the meter reading aspect of either an electric or a gas utility. FIG. 3 indicates from the prior art an example of the kind of information to be transmitted between the meter and the utility company. FIG. 4 is a more detailed block diagram of the meter/modem unit of FIG. 1 that includes aspects of the invention. FIG. 5 is a block diagram of an alternative embodiment of the meter/modem of FIG. 4, including the addition of one or more metering mechanisms and corresponding means for transmitting data to the relevant utility company. FIG. 6 is a block diagram of a second aspect of the invention that includes giving notice of the outbreak of a fire or gas leak at the premises. FIG. 7 is a flow chart outlining the functioning of the apparatus of FIG. 6 as to two or more different or similar utilities. DETAILED DESCRIPTION OF THE INVENTION A first embodiment of the invention includes data transmission system 10 shown in FIG. 1 that carries out first process 20 shown in the flow chart of FIG. 2, thus to transmit from meter/modem 12 through telephone line 14 to utility company computer 16 (e.g., an electric or a gas utility), the information listed in FIG. 3, which includes identification data for the meter, the current meter reading, and other relevant information, either listed as such or having memory space allocated therefor as indicated by the ellipsis at the bottom of FIG. 3. A remote recipient for hazard notices and the like, such as the fire department, is also represented by computer 16. The ellipsis at the bottom of FIG. 3 is intended to indicate that other information than that explicitly shown in FIG. 3 can also be included. Telephone line 14 can be of the ordinary type, or may be an optical “light pipe,” a cable, cellular antenna or any other such means of communication, but since the data to be transmitted is to be in digital form, the line must be of a quality to carry such data, and meter/modem 12 and computer 16 must of course include a modem. Ensuing processes then occur as noted below so as to place data sent from the meter/modem 12 to computer 16 to be entered into computer 16, and computer 16 is correspondingly adapted to receive, store and act on such data, and send commands to meter/modem 12, all of which employs standard equipment and occurs in the ordinary manner as will be known to a person of ordinary skill in the art. In case of a power failure, FIG. 1 shows meter/modem 12 backed up by battery 18. In routine use, the foregoing processes are initiated by a command sent from the company computer 16, as shown by the “Send Command” box 22 in the upper left hand corner of FIG. 2 and the asterisk (“*”) therein that designates the start of the process. In FIG. 2, the “action boxes” thereof appear essentially in two vertical columns, with those on the left referring to events at the utility company, that column being labeled “Utility,” and the events in the column on the right take place at meter/modem 12, with that column being labeled as “Meter.” The command sent from computer 16 as indicated in the “Send Command” box 22 should then be duly received by meter/modem 12 as shown in the “Command Received” box 24 in the upper right hand corner of FIG. 2. All of the data shown in FIG. 3 except for the last two entries (for the “Current Reading” and “Usage for Period”) will already be stored in meter/modem 12, of which a more detailed structure will be shown and described below. The meter reading sought by the aforesaid command and then read by meter/modem 12 is shown by the “Extract Current Reading” box 26 in FIG. 2 to which the “Command Received” box 24 connects, which may be either or both the total usage, either of electricity or gas, or it may be an incremental value that directly measures the usage since the last reading. If only a total usage value is reported, computer 16 will draw on its historical data as held in memory therein to obtain the previous meter reading, and then calculate the amount of usage since that last meter reading, for purposes of billing. (By “current” reading is meant, of course, not electrical current, but rather the reading on the meter at the particular time.) The “Transmit Complete Data” box 28 is connected to “Extract Current Reading” box 26 for purposes of receiving not only that current meter reading but also all of the prior-listed data in FIG. 3. The “Usage for Period” entry in FIG. 3 could also be calculated within meter/modem 12 from the total usage reading, could be read directly by an incremental meter, could be calculated by computer 16 upon receipt thereto of the total usage data and then sent back to meter 12, or that “Usage for Period” could be deleted entirely, with the calculation of incremental usage data taking place only in company computer 16 as was previously described. While the usage data are being extracted and transmitted by meter/modem 12, computer 16 would have been awaiting those data as shown in the “Await Data” box 30 to which, in the “Utility” sequence, the “Send Command” box 22 is connected. The “Await Data” box 30 then connects to the “Receive Complete Data” box 32, to which is connected the “Transmit Complete Data” box 28 in the right-hand “Meter” course of events. With all equipment operating and the various steps being properly carried out, meter/modem 12 would have been at the “Await Confirmation” box 34 connected below “Transmit Complete Data” box 28 in the “Meter” sequence, the “Receive Complete Data” box 32 on the “Utility” side then connecting on a “Yes” line to “Send Confirmation” box 36 which in turn connects back to the “Receive Confirmation” box 38 in the “Meter” sequence, which in turn connects along another “Yes” line in the “Meter” sequence to the “End Call” box 40. Computer 16 would then have the data necessary to calculate out and otherwise administer a new billing to the customer indicated in the data sent by meter/modem 12. An operational error at any point in that course of events will bring forth alternative events that will now be described. The first external indication of an operational error would appear as a failure of computer 16 to receive the meter reading from meter/modem 12, although of course that failure may not lie in computer 16 itself but instead either in meter/modem 12 or line 14. In any event, besides the “Yes” line extending downwardly from “Receive Complete Data” box 32 on the “Utility” side of FIG. 2, there is also a “No” line extending leftward from “Receive Complete Data” box 32 either to impose a two-minute delay as shown by the “2 Min. Delay” box 42, which extends either upwardly back to “Send Command” box 22, or to the “Repair” box 44. The choice of which way to go can be pre-programmed, and in this particular instance of the invention, as shown by the “≦3” and “>3” notations in FIG. 2, successive attempts to confirm reception of the complete data will be repeated three times (to take account, for example, of a possible temporarily noisy phone line or the like), but after that no further attempt is made and repair of the problem is sought instead. The “≦3” designation on the upward pointing part of that “No” line refers to there being up to three attempts, while the “>3” designation on the downward pointing part of that “No” line indicates that after three attempts, repair of the problem will be sought instead. The occurrence of such a sequence can be programmed, either at computer 16 or at meter/modem 12 (if so equipped), and the specification here of a two minute delay and three attempts are examples only, which could be set differently as to either of those values as conditions warranted. Computer 16 has an ordinary screen display (not shown) onto which, in the event of such event, computer 16 will “post” a notice that an anticipated data reception had not been received, so that the utility company personnel will be made aware that an operational error has occurred hence the action indicated by “Repair” box 44 should be carried out. By the act of transmitting a meter reading at “Transmit Complete Data” box 28, the programming of meter/modem 12 is placed into the mode of “Await Confirmation” box 34, i.e., it is expected that confirmation of receipt of the reading would shortly be received from computer 12. (If an incremental reading of meter/modem 12 were in use, that confirmation message would also “zero” that incremental reading device; in other words the reading device would simply be a digital counter having enough range to encompass reading at least the usual amount of kilowatt-hours for a month, and analogously for gas consumption, and “zeroing” by computer 16 would merely be to send to meter/modem 12 an ordinary “reset” bit as will be known to persons of ordinary skill in the art.) However, it might be that all of the requisite data were properly transmitted by meter/modem 12 to computer 16, but after transmitting the data at “Transmit Complete Data” box 28 and passing into the stage of “Await Confirmation” box 34, there was no confirmation received by meter/modem 12 at the “Receive Confirmation” box 38. To illustrate that circumstance, “Receive Confirmation” box 38, besides having a “Yes” line that ends the call at “End Call” box 38, also has a “No” line that extends to another “2 Min. Delay” box 46. From there another line extends upwardly and back to the “Transmit Complete Data” box 28, from which a second attempt at sending the data from meter/modem 12 to computer 16 is carried out. Although computer 16 may in fact have received the complete data but yet failed to notify meter/modem 12 of that fact, such retransmission of that data would indicate at computer 16 that the confirmation had either not been properly sent or at least had not been received at meter/modem 12, and that meter/modem 12 was still seeking such a confirmation. In any case, initiation of a second command transmission from “Send Command” box 22 will initiate a second instance in which meter/modem 12 would have been signaled to expect a confirmation, hence it is not necessary to add further repetitions of the confirmation-related “2 Min. Delay” box 46: for each attempted transmission (other than an initially successful one) there will be a two-minute delay both at meter/modem 12 and at computer 16, and as previously noted, there would be no fourth attempt but recourse to “Repair” box 44 instead. Repetition of the confirmation process at meter/modem 12 can be used to “trouble-shoot” the operation, since a case in which meter/modem 12 kept repeating the sending of data, but yet the data in computer 16 were found by examination to be new data actually received, the problem would then have been isolated to the confirmation process. It is important that confirmation be properly carried out, since that step is used not only to terminate a given transmission of data, but also, in the event that the data sent pertained not to total usage but to incremental usage, that confirmation must also “zero” that incremental meter for the next reading. FIG. 4 now shows meter/modem 12 in greater detail. Specifically, metering mechanism 50 represents the device that actually measures either the usage of electrical power or the gas consumption, as attached to the lines carrying the electricity or gas. The structure and function of such meters is well known to a person of ordinary skill in the art and need not be discussed further, except to point out that the result of a reading, although often shown for view by a dial or the like on the meter itself, for reading by the human eye, must for present purposes also have been converted to digital form as in ordinary binary code, binary coded decimal (BCD) or the like, likewise in a manner that will be well known to a person of ordinary skill in that art. The data so recorded are transferred from metering mechanism 50 by microprocessor 52 into memory 54. The term “microprocessor” is meant here in a general sense and can, for example, include an Application Specific Integrated Circuit (ASIC), a “System on a Chip” (SoC), a Field Programmable Gate Array (FPGA) or the like, provided that provision is also made to carry out the functions to be described below, and providing further that preferably microprocessor 52 includes a crystal clock 56 or the like for purposes of defining a time schedule (e.g., monthly) of meter readings. Battery 59 provides backup power in the event of a power failure to the microprocessor 52, memory 54, clock 56 and modem 58. Microprocessor 52 is further programmed to transmit notice to the electric utility computer 16 (FIG. 1) of a power failure. As noted earlier, the programming of microprocessor 52 is a matter well known to those of ordinary skill in the art, but a specific instance of so doing is presented in U.S. Pat. No. 6,672,151 issued Jan. 6, 2004, to Schultz et al., which patent by this reference is hereby incorporated herein as though fully set forth. Although this patent centers on application to a tire pressure sensor (Col. 3, lines 26-27), the circuitry and other aspects set out therein are easily adaptable to the full array of sensors noted elsewhere herein. In that patent, in fact, the tire inspection pressure device is adapted to the measurement of the pressure in the tanks of the fire extinguishers (Col. 11, lines 33 ff.) for inspection and maintenance purposes, and measurements can be initiated by an operator (Col. 15, lines 27-30). Reference is also made to measuring weight (Col. 22, lines 1-3) and other contexts such as refrigeration devices, air conditioners, and the like, both as installed (Col. 22, lines 12-16) or as a quality control step in the manufacture of such devices (Col. 22, lines 26-29; 48-50), or in natural gas lines or liquid propane tanks (Col. 22, line 61-Col. 23, line 9), but does not address or suggest the range of functions that are set out herein as to the present invention. Concerning the present invention, therefore, for actual fire fighting purposes (as opposed to maintenance) there is provided by Fireboy® and of Quincy, Mass., both (1) an automatic fire extinguisher in its HFC-227ea model that uses heptafluoropropane as the smothering agent, and discharge is initiated at 175° F.; and (2) an automatic engine shutoff/override system in their series 3000, 5000 and 8000 series systems, both of which devices are deemed to be applicable to and operable in the system of hazard protection set out herein as concerns fires. This particular Fireboy® fire extinguisher, for example, can be operated manually as well as automatically, and such manual operation can easily be modified to be operable remotely under the control of microprocessor 52 under a programming process such as that of Schultz et al. '151, since the tire pressure sensor noted in that patent is operable by a microprocessor (Col. 4, lines 16-17). An example of such a microprocessor is given in Schultz et al. '151 as the HMOS-E single component 8-bit microcomputer 8748H from Intel (Col. 4, lines 63-65), and specific examples of other components are also set forth that would be under the remote control of microprocessor 52 under a programming process such as that of Schultz et al. '151, i.e., IR emitters Model No. LD271 from Seimens-Litronix (Col. 5, lines 13-14), photo transistor No. Model BP103-B from Seimens-Litronix (Col. 5 lines 28, 29), comparator Model No. LM339 from National Semiconductor (Col. 5, lines 41-42), a BCD-to-7 segment latch/decoder Model No. MC54/74H4511 from Motorola (Col. 5, lines 59-60), segment display Model. No. FNF500 from Fairchild Semiconductor (Col. 5, lines 64-65), tone decoder Model No. LM567 also from Fairchild Semiconductor (Col. 6, lines 49-51), pressure sensor Model No. 24 OPC from Microswitch (Col. 6, lines 8-9), voltage-to-frequency converter (VF) Model No. AD654 from Analog Devices; either a Signetics 80C751 or NEC micro PD75304 microprocessor (Col 25, lines 31-35), a Signetics PCF8577 controller; a Schmidt 14093 NAND gate (Col. 26, lines 14-15), a standare 9-volt D battery such as the Eveready #522, an LTE5208A infrared LED from Light-On (Col. 26, lines 37-38), a Signetics TDA3047 infrared preamplifier (Col. 26, lines 47-48), infrared detector LTR-316AG from Light-On (Col. 27, lines 33-35), a standard 4.7 volt 1 NS230 zener diode, a Nova Sensor #NPH pressure sensor (Col. 27, lines 59-60) or other suppliers such as Honeywell or IC Sensors (Col. 27, lines 65-67; a National ADC0801 8-bit A/D converter (Col. 28, lines 22-23); a 1.2 volt LM385 zener diode (Col. 28, lines 26-27); a Motorola 14021 8-bit shift register (Col. 28, lines 36-38); another zener diode, which may be an LTE5208A from Light-On; a Signetics TDA 3047 infrared preamplifier (Col. 28, lines 66-67); an Eveready #CR2045 lithium oxide button batter (Col. 29, lines 37-38); 14903 Schmidt NAND gates from Motorola (Col 29, lines 54-55); and a Motorola 2N4403 transistor from Motorola (Col. 29, lines 61-62). The Shultz et al. infrared receiver can receive signals at distances of approximately 3-5 feet (Col. 23, lines 38-41) from the sensor, which could be installed to read water pressure in lines to a water sprinkler system, and hence could be used in the present invention to detect the turning on of a water sprinkler in lieu of the “moisture detector,” humidity meter, or oximeter adaptations as discussed further below. Occasion so to cause remote manual operation might arise in a case in which it was important to turn on those extinguishers at which the temperature had not yet reached the “trigger temperature” (175° F.) of those extinguishers. Similarly, the mechanism of shutting down a boat engine can easily be adapted to the mechanics of shutting off, say, a valve of a gas line as described herein. The kind of computer control necessary for these purposes is described in Shultz et al. '151 at Col. 14, line 62-Col. 15, line 1: “A CPU based system as is well known in the art comprises: a control circuit for maintaining the proper sequence of events with regard to interrupts, instructions, wait requests, and timing functions, an arithmetic logic unit (ALU) for performing arithmetic and logic operations, and various registers for program counting, an instruction decoder, and addressing unit.” These are the basic components incorporated within what is referred to generally herein as microprocessor 52. Upon command from computer 16 in accordance with a pre-programmed schedule, by manual intervention, or in response to an emergency situation as will be described below, modem 58 will be provided with the current reading as stored in memory 54, together with the other data listed in FIG. 3 as shown in the “Extract Current Reading” box 26 in FIG. 2, and then transmit the entirety of that data to computer 16 in accordance with the “Transmit Complete Data” box 28 of FIG. 2. Modem 58 will of course be configured to dial the proper utility company telephone number for the modem that serves as an input port to computer 16. The other activities outlined in FIG. 2 will of course proceed as before, the present description being intended only to provide more detail as to the functioning of whatever modem may be in use. FIG. 5 now shows a second embodiment of the invention wherein two or more utility companies are configured to receive meter readings. Both first metering mechanism 60 and second metering mechanism 62 are seen to collect usage data from respective first and second lines (which respectively could be electricity and gas lines, or both could be gas lines or both electric lines), whereupon microprocessor 64 and clock 66 then cause the data so received to be sent to memory 68. Those data will of course be stored and otherwise treated as separate and distinguishable entries into memory 68. Coincident with that practice, memory 68 will have had stored therewithin the respective phone numbers of the computers at the two utilities, if two are involved, so that the usage data recorded by first and second metering mechanisms 60, 62 will be sent by modem 70 to the proper utility, i.e., to first utility 72 and second utility 74, respectively. The procedures set out in FIG. 2, adapted to serve two or utility companies, will of course proceed as before. The two ellipses 76 shown (vertically) on respective sides of microprocessor 64 and clock 66 are intended to show that additional power usage data from other meters could be gathered and transmitted to the proper utility companies. Such a procedure need not involve any more utility companies, but could instead involve a number of different meter readings from different meters that would be sent to a single utility. This could be the case, e.g., in an apartment building in which the several apartments were individually metered for electricity usage. Battery 78 in FIG. 5 provides backup power in the event of a power failure to microprocessor 64, clock 66, memory 68, and modem 70. Microprocessor 64 is further programmed to transmit notice to the electric utility computer 16 (FIG. 1) of any such power failure, i.e., the discontinuance of any use of electricity. That procedure would provide earlier notice to the electric company of such failure than does the common practice in which one would “call the electric company when the power goes out,” and moreover, if a pattern of such notices were to be received essentially simultaneously from sites throughout a single neighborhood, the accumulation of such reports would show immediately that the electric company had a problem “in the field,” such as a lightning strike or vehicle collision at a telephone pole transformer, or perhaps the entry of a bird or squirrel into the lines at a substation. It is also advantageous that microprocessor 64 be programmed to show as well any surge of power usage beyond that, say, of the startup of an electric motor, such as to show a level of current flow that would indicate a short circuit. Such a warning, if heeded by identifying and eliminating the source of such a short circuit, might indeed forestall the development of a fire, or perhaps at least “catch it” before it has reached a point of a fire that would set off the alarm. The metering mechanism would be taking readings continually in any event, and it would be well within the knowledge of a person of ordinary skill in the art to program into microprocessor 52 in FIG. 4 or microprocessor 64 in FIG. 5 a threshold level, so that any reading above that level would indicate that a short circuit had been formed and hence modem 58 (FIG. 4) or modem 70 (FIG. 5) would receive instruction to transmit notice thereof to company computer 16 (FIG. 1). The complete cessation of power, indicated by the lack of any electrical current flow at all, would indicate a power failure that would likewise be so reported. It should be emphasized that in light of the foregoing “hazard” warning function, and of other hazard types as will be discussed below, if the phone line used by the invention is shared with ordinary phone usage, or with an internet connection, provision is made by which the present apparatus will “break in” to any such use to report a hazard. That is, a short “bypass” to the ordinary phone line is provided, along with switching means that will connect that bypass through to the external phone line while at the same time disconnecting the ordinary straight line connection thereto of the “house phone” or the like. With that type of warning mechanism in mind, an important additional function of the invention lies in providing notice to both the fire company and the (respective) utility company(ies) of the outbreak of a fire, or of a gas leak, at a home or at other buildings. The occurrence of a fire or gas leak, or even a power failure or sudden electrical current surge, would constitute a “hazard” in the premises itself as opposed to an operational error in the system described above that reports on the normal course of events. For that reason, one or more fire alarms and/or gas detectors are also connected to the utility usage meter, whereby to send notice that a fire or a gas leak has occurred, but further in the electrical system to record the current being drawn, which could fall to zero or be excessive. FIG. 6 thus shows an embodiment of the invention that for purposes of simplicity will treat only a single utility, but may be applied to several utilities and/or companies in the manner of FIG. 5, and in addition to the routine provision of utility usage data will also send notice, upon such event occurring, that a fire has broken out, a gas leak has been detected, or there is an abnormal draw of electrical current at the premises—or again, preferably all of those functions can be employed. Indeed, a “burglar alarm” system can also be connected to meter/modem 12 for like purposes, in which case the microprocessor 64 would need to be programmed accordingly, including provision in meter/modem 12 for calling the police and/or a private security company. Such usage could employ a motion detector such as that described by U.S. Pat. No. 6,650,242 issued Nov. 18, 2003, to Clerk et al. This patent relates directly to providing warnings in a warehouse or the like of the movement of vehicles or people relative to injury hazards, using a rotatable infrared (IR) fan beam derived from light emitting diodes (LEDs) directed from a mobile vehicle to warn of the approach thereof, but would equally apply to having that fan beam emission at a fixed site to warn of the approach of a person. Detection in Clerk et al. '242 itself is by way of an IR detector device worn either by company personnel or placed at strategic plant locations that will respond with an audible or visible warning upon coming into contact with the IR beam from the vehicle as that vehicle approaches, but it could be possible to mount the detector near the IR source and rely on reflection from a person approaching to detect that person's presence, or of course other motion detector devices might be employed instead. In such a fixed site situation, connection would be made to meter/modem 12 as in the other cases described. Other sources of hazard of concern that might be detected, as by various types of detectors of a “chem/bio” terrorist attack, may be included among the connections to meter/modem 12 for “homeland defense” purposes, and the programming of microprocessor 64 with respect to selecting the intended remote recipient of each type of hazard will incorporate the instructions necessary to respond to such events. For convenience, all of such abnormal events are herein designated to be “hazards.” The present invention, in short, provides not only the recording and reporting of utility usage data, but is broad enough in design to encompass the wide range of additional hazard warning functions as described herein. It is a particular feature of the invention, indeed, that microprocessor 64 is programmed to store within memory 68, which may be a hard drive, for example, a permanent record both of utility usage data and any fire, gas leak, or other hazard events and the like for accounting, administrative, insurance, legal, or other purposes. Among the events automatically reported on, for which operations the necessary programming within microprocessor 64 is provided, are included the occurrence of any extremes in the usage of either or both electrical power and gas. Zero electrical power usage, i.e., a “power failure,” can be life threatening either from the point of view simply of extreme cold weather or in the event a resident of a home subsists on a kidney dialysis machine or the like, while excessive electrical power usage can mean the occurrence of a “short” from which may come the outbreak of a fire. The same life threat applies as to gas usage in the event of zero usage, at least as to the weather, and an indication of excessive gas usage, which should also have been reported by a gas leak detector if such were the case (and for which the automatic reporting here being discussed would serve as a “backup” in the event of failure in the gas leak detector), could indicate an inability of the residents, because of old age or the like, to adjust their environment properly for which some assistance might be needed. With regard to various hazard detectors, beginning with a gas leak, for example, the Thermo Electron Corporation provides an FX-IR Single Gas Transmitter, Model 67-0022-1, that detects gas at the “trace” level and can be adapted for the detection of a gas leak in a manner appropriate to this particular remote warning context. That is, this instrument operates on 3-phase power, possibly providing analog data with a response time of 12 seconds, and hence, in that case, microprocessor 64, for example, must be provided with an analog-to-digital converter (“A/D” or “ADC”) in order to provide a reading that will generate a warning signal from microprocessor 64. That feature of proving digital data is in fact an option available to the hazard detector, and since the addition of a switch or relay to the detector is also an option, this detector can also, and preferably will, be used to turn off the gas supply upon the occurrence of a gas leak, provided that the gas line itself has been provided with a valve that is operable by such a switch or relay. An example of such a valve is that provided by OMEGA Engineering, Inc., in its model SV-300 supplied under the name “OMEGA-FLO™ 2-Way General Purpose,” which is manually set but can then be “tripped” (i.e., closed) electrically, as would occur upon receiving a signal so to do from the aforesaid gas leak detector. Similarly, CCI Controls provides a gas leak detector that incorporates either an alarm only facility in its model 7773, or both the alarm and valve shutoff of the gas supply in its model 7239, and up to three such units can be interconnected so as to operate in tandem on a single output line. The valve sizes range from 3/8 inch to one inch, and hence can be used in either a household or an industrial context. Included in these instruments is the facility to analyze the ambient weather and seasonal weather conditions so as to adjust the sensor threshold point in order to avoid “false alarms.” Once the gas supply is turned off at the valve, that gas will remain off until manually turned back on. These detectors also have a battery backup in the event of an electrical power failure. Again, these detectors may require conversion of the “alarm” output therefrom to digital form as previously described in order to be employed in the present invention. General Motors, Inc., also provides its !R5000 flammable gas hydrocarbons detector that cites a measurement range of “0-5000 ppm” for trace measurements, and having a response time of 8 seconds. A wide range of optical sensors, light cables, and the like from Telemecanique Global Detection iso btainable from SquareD. As to such a system as a whole, FIG. 6 shows in block diagram form a simplified version of such an arrangement, and FIG. 7 is a flow chart that demonstrates the procedures carried out by the apparatus of FIG. 6. The apparatus is similar to that shown in FIG. 1, but with the addition of connections either or both to a fire alarm device and a gas leak detector, or to other such hazard detectors. That is, meter/alarm system 80 of FIG. 6 is seen to include the usual meter/modem 82, a telephone line (which as noted earlier could be a cable, a cellular antenna, etc.), and utility company computer 86, but now with the addition of alarm 88 that upon responding, say, to smoke as with a smoke alarm, or the detection of a gas leak, would transmit a “fire” or “gas leak” signal to meter/modem 82. The manner that is used by meter/modem 82 to receive an alarm signal of any type can be direct and automatic, wherein alarm 88 sends a signal to meter/modem 82 immediately upon detection of a hazard, or meter/modem 82 can periodically query alarm 88 for the presence of an alarm indication, the former method being preferred. The actual detection of a hazard such as a fire, gas leak, or other such dangerous event as noted herein is carried about by hazard detector 90, that may detect smoke, a gas leak, etc., that connects to alarm 88. In the case of a water sprinkler system, the “hazard” detected would not be the fire as such but rather the fact that the water sprinkler system had been turned on to spray water because of a local fire, as noted below. Also shown in FIG. 6 is a line from “Alarm” box 88 to “Power” box 92, at which the utility in question can be shut off as will be described further below. It should be noted that notification of a fire can arise not only from an ordinary smoke detector, typically of an electronic type, but also by the activation of a water sprinkler system, if appropriate detectors are provided at a sprinkler outlet that water has begun to course therefrom. Such a detector might possibly be provided, for example, by adaptation of the “moisture detector” described in U.S. Pat. No. 4,377,783 issued Mar. 22, 1983, to Wagner, which patent is by this reference incorporated herein in its entirety as though fully set forth. An ordinary humidity detector would serve the same purpose, one example of such a humidity probe being the HUMICAP® thin-film polymer sensor offered by the Vaisala Group of Vantaa, Finland. Either of these two devices would of course need to include A/D converters and the other standard means for acquiring transmittable digital data. For this purpose, the Schultz et al. '151 system noted above, or an adaptation of the infrared components of a commercial oximeter that measures blood pressure could also be employed. As one example pertaining to a water sprinkler system, the Silent Knight company of Maple Grove, Minn., provides its SK-5208 Fire Alarm Control Communicator that is specifically adapted to control water sprinkler systems as installed in manufacturing plants, warehouses, schools, and the like, and also provides its SK-5235 Remote Annunciator that allows remote programming along with other accessories. The actual detection of fires, however, rests on the usual smoke alarms, of either the ionization or photoelectric type, there being no provision in the Silent Knight products of means for noting at a central control panel the automatic turning on of a sprinkler system as a result of events at the actual site of the sprinkler system, as would be provided either by a water flow detector adapted from the Wagner '783 patent as noted above or by a humidity measuring device such as the Vaisala Group HUMICAP® thin-film polymer sensor noted above. In either such case, the device would need to include means for recognizing a hazard, e.g., by including means for entering a predefined threshold value, the later measurement of which would be taken to be an indication of a reportable hazard, and such alarm would then be sent to meter/modem 82 immediately upon detection of a hazard, and meter/modem 82 would then carry out the several processes as have previously been described. The procedure to be followed requires only that the alarm device, be it a smoke detector, a sprinkler system, a gas leak detector, humidity or moisture detector or the like, be provided with appropriate indicator means by which a query sent to it by meter/modem 82 would yield a measurement response, or such device on its own volition, will provide different indications depending upon whether or not the sensor device has responded to the occurrence of whatever stimulus to which the device was designed to respond. The one could be a smoke detector, as noted above, or a water sprinkler system would include a sensor that would detect the ejection of water from a sprinkler such as that just noted, and the same procedure would apply to a gas leak detector. The rightward part of FIG. 7 is essentially a duplicate of FIG. 2, and indeed retains the same reference numerals, but has had added thereto the steps involved in responding to an alarm in accordance with FIG. 6. That is, the right side of FIG. 7 includes everything in the flow diagram shown in FIG. 2, but with alarm system 100 now shown on the left side of FIG. 7. The normal operations as previously described with reference to FIG. 2 will be carried out as before, independently of the operations of the attached alarm system 100. Consequently, no further description of the first process 20 of FIG. 2 and now shown again in FIG. 7 is necessary here, and only alarm system 100 will be described, but to include the fact that the processes of alarm system 100 may serve also to terminate those of FIG. 2 as shown on the right side of FIG. 7—continued readings of meter/modem 82 in FIG. 6 would clearly be inapplicable if alarm system 100 had turned off the utility—and hence the two processes are shown to be linked. The process mentioned earlier in which meter/modem 82 automatically receives “status reports” from the alarm system will now be described, commencing with the “Signal From Alarm” box 102. It may be noted that in FIG. 6, the arrow that connects alarm box 88 to meter/modem 82 is bidirectional, meaning that queries can be sent from meter/modem 82 to alarm box 88, which in turn can send a response back to meter/modem 82, either in response to a query or on its own volition. As noted above, the system can be programmed to send a query to alarm box 88 only on initial startup, the processes shown on the left side of FIG. 7 then taking control; alarm box 88 can be “self-starting” and then automatic so that no queries at all were used; or at the other extreme repetitive queries from meter/modem 82 to alarm 88 might be used. The “Signal From Alarm” box 102 in FIG. 7 is bidirectional with respect to its connection to the “Send Command” box 22 of FIG. 7 for the same reason. It should be emphasized that all of first process 20 continues as before, with first process 20 being carried out in the apparatus of FIG. 6, while at the same time the alarm process 100 shown to the left in FIG. 7 likewise proceeds, also using the apparatus of FIG. 6, and quite independently of first process 20 that is taking place on the right side of FIG. 7 (other than to terminate the first process 20 in the event the utility referred to is turned off by second process 100). The devices shown in FIG. 4 are taken here to represent as well the structure that is applicable to meter/modem 82 of FIG. 6 and hence to the operations shown in FIG. 7. At the same time, the operations of FIG. 7 also depend on the elements of FIG. 6, especially alarm 88. In operation, while “Send Command” box 22 is initiating process 20 because of having received either an internal, timed command from microprocessor 52 of FIG. 4 so to transmit that had been programmed within microprocessor 52 or had received a command from the utility company computer 16, microprocessor 52 of FIG. 4 has also sent a query to alarm 88 of FIG. 6 as to whether or not alarm 88 has detected a fire or gas leak. That query step is shown by the leftward pointing arrow head of FIG. 7, with the associated line being labeled “No—Query.” One query initiates this second process involving alarm 88, and after that alarm 88 continues to test for the occurrence of a fire or gas leak. (In fact, depending upon how the system was programmed, what has been termed a “Query” may be nothing more than the initial powering up of alarm 88.) Unlike the delay processes used in first process 20 that tests only three times as to whether or not the utility company computer 16 has received the data from meter/modem 88, as shown in the “Receive Complete Data” box 32 of FIGS. 2 and 7, the testing for the presence of a fire, a gas leak, or any other hazard is repeated indefinitely, and continues such testing as long as the apparatus is operating. That manner of carrying out that repetitive testing is shown in the line of FIG. 7 that extends down from a first “Signal from Alarm?” box 102 to the “45 Sec. Delay” box 104, and thence to a second “Signal from Alarm?” box 106. The rightward pointing arrow head on the “No”—“Query” line between the first “Signal from Alarm?” box 102 to the “Send Command” box 22 in the first process sends a “No” signal, hence a presumed absence of a fire or gas leak or other hazard is reported, while at the same time that “No” result of the test also enters into a 45 second delay, as shown by the aforesaid line extending down from the first “Signal from Alarm?” box 102 to the “45 Sec. Delay” box 104. The purpose of that short delay is to determine whether or not that first alarm might have been a “false alarm,” that would be shown by there being no repetition of that alarm in the second “Signal from Alarm?” box 104 that connects to the bottom of “45 Sec. Delay” box 104. If there is no such second alarm, the “No” line extending from second “Signal from Alarm?” box 104 back up to first “Signal from Alarm?” box 102 then continues the routine monitoring for an alarm. A “Yes” response in second “Signal from Alarm?” box 104, however, indicates that the first such alarm was not a false alarm, and hence a hazard reporting sequence is commenced. That 45 second delay could of course be set by microprocessor 52 of FIG. 4 to any time delay that was deemed appropriate, the 45 second delay being shown only as an example. The rate at which the apparatus in its entirety tests for the presence of a fire or gas leak is similarly programmed in meter/modem 82, i.e., in microprocessor 52 of FIG. 4, since again FIG. 4 shows the internal structure of meter/modem 82 of FIG. 7. The following description assumes certain priorities as to the order in which the several events arising from a fire or gas leak might be set, but as in other aspects of the description as previously given, circumstances may dictate different priorities, in which case different priorities would be programmed into microprocessor 52. Upon the occurrence of a fire (the gas leak case will be described further below), or more exactly upon the sensor in Alarm 88 of FIG. 6 indicating that a fire has broken out, the “Yes” line extending down from second “Signal from Alarm?” box 106 leads to several responses, i.e., that “Yes” line has several branches, the first two of which lead to “Call Fire Department” box 108 and “Shut Off Electricity” box 110. That is, upon the indication of a fire, the fire department is called first, through the programming of microprocessor 52 of FIG. 4, and at the same time the electrical power is shut off by that same programming, as indicated by the branch line of that “Yes” line that extends down to “Shut Off Electricity” box 110. The connection required to cause that shut down is shown by the line that extends from “Alarm” box 88 down to “Power” box 92, wherein by “Power” is generally meant either the electrical power or the gas supply. The procedure as to the utility shut off is that upon events reaching “Shut Off Electricity” box 110 or “Shut Off Gas” box 118, a signal so to do is sent from meter/modem 82 to “Alarm” box 88, and that command is then sent to “Power” box 92 to accomplish the shutoff. Then after another two minute delay, as shown by the branch of the “Yes” line that extends down to another “2 Min. Delay” box 112, that same program causes a call to be sent to the electric company, as shown by the line extending from “2 Min. Delay” box 112 down to “Notify Utility of Fire and of Power Shutoff” box 114, the assumption being that there is not much that the electric company could do about a fire at the premises, hence the notification to the company can be delayed until after the matter of the fire itself has been addressed by way of notice to the fire department. In extending the capacity of the system to the reporting of gas leaks, as shown by the dotted line extending to the left in FIG. 7 from just below the second “Signal from Alarm?” box 106, it is assumed that the priorities would be different. That is, the first response to the discovery of a gas leak would be assumed to be having the gas supply shut off, and for that reason the first response to such a detection is shown as “Call Gas Company” box 116 to which the aforesaid dotted line from second “Signal from Alarm?” box 106 is connected. Also shown is “Shut Off Gas” box 118, likewise connected to second “Signal from Alarm?” box 106, to include the case in which there is the capability right at the premises to shut off the gas as previously described. Although no specific delay is shown, the third priority of action following the detection of a gas leak is shown by “Notify Fire Department of Gas Leak” box 120, for the purpose of warning that facility that there may be an impending disaster at the premises, although nothing had yet occurred, and the fire department could then respond as deemed appropriate. Asterisks 122 in FIG. 7 are intended to show, as was shown by ellipses 76 in FIG. 5, that additional utilities, whether electric or gas, can also be accepted by the system described with proper programming of microprocessor 52. An important part of the system as a whole, as was set out by the preceding description of the invention, is that if a telephone line or like communication means is used that is also used, say, by a resident family for personal phone calls, the apparatus of the invention is provided with means for interrupting any such phone calls and then carrying out its own processes as have been described. The specific apparatus and procedures set forth above are of course exemplary only and not limiting, and as has been indicated, a specific embodiment of the invention, or such variations therefrom as would be obvious to a person of ordinary skill in the art, must be taken also to be encompassed by the invention, which is to be interpreted and construed only in light of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention This invention relates generally to the remote sensing art, and more specifically to apparatus for remote utility meter reading, including responses at the premises to fires, gas leaks, and other hazards, by sending alarms to utility companies, the fire department, and other emergency responders, and also emergency adjustment of electricity and gas connections. 2. Background Information An important task of utility companies that provide households and businesses with electrical power, gas, water and the like is the reading of the meters that have been installed at those locations in order to apply appropriate monthly charges for having provided the service. That effort can be expensive and time consuming, if it is necessary for company employees to travel to each place that receives such service and read the meters that have been installed to measure the utility usage. Such work is also dangerous and expensive, with meter readers having had traffic accidents, and the like, or having to pay for insurance policies that would compensate for such events. Difficulty even in reading those meters can also arise, perhaps because a home owner keeps a dog in the yard, or shrubbery has been allowed to grow up over the meter, or the like. In fact, in some cases it has become the practice of utility companies to prohibit installation of meters behind a fence, which may require the use of extended lines running from the home or other building, which can be particularly expensive in the case of gas lines. For these reasons, much effort has been made to accomplish such meter reading remotely, preferably automatically, so that a minimum of costly human intervention would be involved. Filed with this application is an Information Disclosure Statement that sets out a number of issued patents in which it was sought to carry out remote meter reading. The present invention will be seen neither to have been anticipated nor suggested by any of that prior work, whether taken separately or in combination. At the same time, it could be important to obtain other information by such remote means that is not presently collected, particularly as to any malfunctions or errors in the use and operation of the utility equipment, or indeed emergency situations in which a particular house or business may have caught fire, or a gas leak has developed. Warning of the existence of a fire or gas leak is of course important in its own right, but it is also important to know what the condition may be of the utility (electricity or gas) equipment. Even more importantly, when no one happens to be in the home or at the office, it would be extremely useful if protection were provided against some emergency situations automatically. In factories or the like, water sprinkler systems that will turn on when a fire breaks out will often have been installed, but such equipment may be deemed not appropriate to the home, and typically no other such protection is provided. Even so, the present invention includes the capability of automatic activation of strategically placed fire extinguishers. With respect to electrical power, since insulation burns and electrical shorts can create even more fire, the continued presence of live electrical power in the context of a fire can be dangerous, both as to adding more fire and, perhaps by inadvertent contact with the house wiring, to the firefighters that will be arriving to get the fire under control. Similarly, the heat of a fire may break a gas line, and the release of such gas would undoubtedly increase the fire substantially, and even more dangerously may bring about an explosion. What is needed and would be very important for safety reasons, therefore, is a means by which the operation of the electrical and gas services would be shut off as soon after the outbreak of a fire as possible, or as soon as a gas leak was detected, and the firefighters should be made aware of that condition before they arrive at the site so as not to enter into any attempt, perhaps dangerously, to turn off either the electricity or gas, which would not be necessary if that had already been done. Turning off those services would often help to minimize the effects of the fire, or prevent a gas explosion, and the work of the firefighters could then be carried out more safely. Under situations such as a barricaded felon, or hostage circumstances and the like, it would also be useful for police departments to have remote means of controlling the furnishing of utilities. The present invention thus provides a method and apparatus by which either or both the electrical and gas services would be shut off automatically at the outbreak of a fire or occurrence of a gas leak, while at the same time providing remote notice both of the existence of the fire or gas leak and of the status of the electric and gas utility. Such an early warning would permit an earlier intervention in the fire or gas leak, so as to bring the particular circumstance under control and indeed to put out the fire or repair the gas leak, and the initial and dangerous step of turning off the electric power and gas in the midst of actual fire fighting would be avoided. It would also be appropriate for the respective utility companies to provide, to the owner of the home or other building, instructions that announce the presence of this shutoff capability, actions with respect to such facilities that such owner either should take or would not be allowed to take, and the circumstances under which the equipment would be used, as part of the service contract.
<SOH> SUMMARY OF THE INVENTION <EOH>A utility meter that measures either electrical power or gas consumption either has a dedicated telephone connected thereto or preferably the telephone is integral to the meter, but in either case also having a modem within or connected to the meter so that either upon command or on a predetermined schedule, preferably at off-peak hours, the telephone will dial the phone number of the responsible electrical power or gas companies and in some cases various emergency responders such as the fire department and transmit to that company or other entity a report of the current readings on the gas or electric meter, and other information as the situation may require. If it was sought to use for this meter reading and other purposes described below the same telephone line as that used for conversation or internet connection by those living in the home or working in the business, the meter preferably includes the ability to “break in” on any telephone call that was in process and carry out the various functions set out below. For similar reasons of providing immediate access by the apparatus comprising the invention, such services as “call waiting” and the like are preferably excluded from the line in order that its constant availability can be assured, and in a preferred embodiment a line is used that is dedicated entirely to use by the invention and has no other function. Unless the context clearly indicates otherwise, reference hereinafter either to a “meter” or a “meter/modem” will mean the same in either case, i.e., the meter itself, together with a modem and connection to a telephone line, either integrally within the meter or separately connected. Similarly, the term “telephone” by itself will mean a connection from that modem to a line, i.e., an ordinary telephone line or by cable or other such means, including a meter antenna in the case of cellular phone transmission, through which a computer at the relevant utility company and the fire department can be contacted. For rural areas, in which farm houses may be isolated and have either poor or even no regular telephone service on fxed lines, the use of cellular phones may be optimal, together with the growing practice of placing a conspicuously sign along the highway, at the proximal end of a driveway that may extend back to a house that is not visible from the highway, an assigned number that is known to the fire department and other emergency responders in order that such responder will realize that the premises sought has in fact been located. The programming of a command schedule is carried out by a computer owned by the responsible utility company, or that programming could be carried out at the meter itself using installed programming means. Whether the programming is carried out at a remote computer or locally, that program will also include the periodic running of self-diagnostics both of the data transmission facilities and the operability of various sensors as a “backup” procedure for ensuring system reliability. A customer number or other such identification that has been assigned to the meter at a particular house or business, perhaps by way of the meter telephone number of the telephone attached thereto, or the address of the location at which the meter is installed, is registered in the computer at each relevant utility company so that the location of the meter from which a call has been received is immediately and automatically recorded. Upon receipt by the meter of a command from that computer, or by its own command, the total usage of electricity or gas is transmitted to the utility company computer, from which the usage over some preceding period, typically a month, can be calculated, and the billing for such usage can then be carried out, based on the identification of the customer using information previously stored in the computer that pertain to the phone number or address from which the call was made, or by other identifying information. The meter may instead or also have an incremental meter scale that will record only the usage over such preceding period, being reset to zero upon a scheduled reading, so that only the electricity or gas usage during that period would be sent to the company computer. The scheduling of meter readings, on a basis such as monthly, can also be done automatically by way of a clock, either the clock associated with the utility company computer or one contained within the meter. That clock could also be used to generate a command to read the meter at the time of startup or cutoff of service, or for similar such reasons. The utility company computer, as well as the on-site computer system, e.g. the microprocessor and associated memory and the like at the meter as will be described in more detail below, are entirely conventional in design, use conventional programming, data transmission and other procedures, and will be known to a person of ordinary skill in the art. However, one feature of the invention is that the programming of the on-site device can be, and preferably is, carried out from the main utility company computer that also has complete access to the premises device in other respects. Upon receipt of a meter reading from a meter at some home or business, either of total or incremental usage, the company computer will transmit back a confirmation of such receipt, and reset to zero the incremental meter if that type of reading had been used. Upon the computer failing to receive any transmission in response to its command, or at the time that the transmission had been scheduled, that computer will first check as to whether or not it had properly sent its command or transmission schedule to the meter, and make whatever adjustments of the computer as may be necessary to accomplish a successful command or schedule transmission. Then, after some predetermined number of unsuccessful attempts at transmission of that command or otherwise receive the data transmission, utility repair personnel would be sent to the site of the meter to determine whether its commands were not being received, even though properly sent, the schedule had not been properly entered, or those commands were being received but the meter telephone for some reason was not properly transmitting the meter readings, and so on, and based on those findings any appropriate repair would be made. If it were found that the problem was merely one of temporary excess “noise” on the lines, the transmission of the command could be postponed and then attempted later. In the same way, since transmission by the meter of the meter readings should result in the receipt by the meter telephone of the confirmation of receipt of the usage data by the company computer, and upon any failure to receive such confirmation, the meter would likewise carry out a predetermined number of attempts at such transmission, and the identification and repair of any equipment failure, or in some cases merely postpone the transmission if it were found that the problem was simply one of temporary noise on the lines. Other circumstances may also require intervention by the remote computer in the operation of the local meter, including turning on or off the supply of either the electrical power or the gas, perhaps as a result of the utility user not having made timely payments of the bill for the usage of the particular utility and then paying that bill, to permit carrying out maintenance in the neighborhood in which the meter is located, or for other reasons such as intervention by the police in some tactical situation. Fundamentally, however, provision is made for either or both the electricity or gas to be shut off in the event of fire or a gas leak. The prior practice of remote turnoff of power, gas, or the like, as for the nonpayment of a bill, has been that of a remote disconnection, which at least as to gas would still leave an amount of gas in the lines leading for some distance into the premises. In the present system, however, as will be seen below, that turnoff is done right at the meter, or very near to it, and upon a gas leak there is less gas that could leak into the premises and perhaps ultimately explode. Consequently, the electricity or gas meter is also connected to an appropriate “on/off” switch or valve that controls the electricity or gas, and in some cases would turn such utility on or off upon receipt of a command so to do from the remote utility computer. Manual operation of such controls is also provided, but the principal means of operation of the meter and related switching so as to cut off the electricity or gas derives from connection to alarms within the facility, whether a home or a business, warehouse, etc. Confirmation of the receipt of such a command by the meter from the computer is sent from the meter to the remote computer, followed by notice that the command in question has been executed, or if turning off the electricity or gas had been initiated locally, either manually or automatically in response to an alarm, notice of that event would also be sent to a computer at the relevant utility company or companies, and when appropriate to the fire department. In the event of failure of the remote computer to receive a notice that was to be responsive to its own command transmission, after some predetermined time period after the transmission of the command, or a sequence of attempts at such transmission, the remote computer would carry out the same kind of “troubleshooting” and repair procedure as was described above. More specifically, and particularly for purposes of intervention in the event of a fire or other such hazard, including an onset of an illness requiring emergency response, the meter can also be activated locally, either manually or automatically by command from the alarm(s) installed within the house or business to which alarm(s) the meter/modem is also connected. Preferably, manual activation is by way of an array of pre-programmed phone numbers, e.g., for the fire department, police, gas company, ambulance service, etc., that would be selected by the user based on the nature of the need. This feature would be an equivalent of a “911” call, except that the remote recipient of the call would be selected, and in the event the user was not able to converse, a pre-recorded message containing the identity of the caller and other relevant information would be sent to that call recipient. The same “outside” line can be used for the electricity and gas meters and various hazard detectors, selection among these being made by the telephone numbers that a microprocessor in the respective meters had been programmed to call, and by separate lines from sensors that will detect a fire or gas leak at appropriate locations in the home, office or other facility to those meter/modems, given that the gas and electric meters will often have different physical locations. Upon signal from an alarm in the home or other facility, notice of a fire or gas leak would be sent both to the fire department and to each relevant utility company, particularly including sending the location information to the fire department that would have identifying information in its computer in the same way as do the utility companies. Connection of respective meters to the gas or electrical system would then bring about shutoff of either or both the gas and electricity, and besides notice of the fire itself, notice of such shutoff is also sent to the fire department and to the respective utility company computers. The fire fighters who would then arrive at the scene to fight the fire or perhaps evacuate people in the event of a gas leak, would thereby be made aware from the fire department's own computer that the electricity or gas, or both, would have been shut off so as to present no danger to them, although, in the interest of confirming that protection, they would preferably make their own examination of the status of the electrical and gas switches or valves, assuming that there was safe access thereto. Depending on circumstances, i.e., as to whether or not additional electrical power might be needed by the fire fighters in order to carry out their firefighting or for purposes of providing medical attention or the like, provision would be made by which the automatic shutoff of the electricity could be locally overridden. Alternatively, notice of the fire only would be sent by the meter telephone to the fire station computer, wherein the fire station would have direct telephone connection through the meter telephone to the “on/off” switch or valve by which the electrical power and gas are controlled, so the fire fighter personnel could themselves decide whether or not to shut off either or both the electrical power or the gas, based either on their own knowledge of the particular situation at the indicated household or business or from their access to that same information in the remote computer. If not already done, fire department personnel would also send notice to the utility companies both of the fire and of any actions that the fire fighters might have taken in response to that fire, including shutting off either or both the electricity and/or the gas.
20040302
20060808
20050908
57477.0
7
PHAM, TOAN NGOC
METHOD AND APPARATUS FOR ALL-PURPOSE, AUTOMATIC REMOTE UTILITY METER READING, UTILITY SHUT OFF, AND HAZARD WARNING AND CORRECTION
MICRO
0
ACCEPTED
2,004
10,792,523
ACCEPTED
Blood bank testing workstations
A platform or workstation comprising a plurality of various size holes and slots for holding blood specimens, test tubes, gel-cards and reagent bottles in an organized arrangement to simplify testing of the blood specimens and to eliminate the likelihood of human error. The platform comprises a top plate, a middle plate and a bottom plate which are spaced apart in a parallel plates arrangement. The top plate and the middle plate each comprise a plurality of holes in a matrix configuration for receiving blood specimen tubes and test tubes, and one or more columns of slots adjacent to the matrix configuration of holes for receiving gel-cards. Other size holes are provided for receiving the reagent bottles. The bottom plate only has screw holes for securing the top plate, middle plate and bottom plate together in the spaced apart relationship, and otherwise performs as a stop for articles inserted into the workstation holes. A first embodiment organizes all equipment needed to perform routine and complex testing in one space using 70 holes of 3 sizes and 3 slots in a predetermined arrangement. A second embodiment organizes blood specimens, test tubes and gel-cards in a row and stores reagents needed to perform tests using 57 holes of 3 sizes and 16 slots in a predetermined arrangement. A third embodiment organizes equipment for special studies and tests and uses 35 holes of 3 sizes and 12 slots in a predetermined arrangement.
1. A blood bank testing workstation comprising: a top plate spaced above a middle plate and said middle plate spaced above a bottom plate; each of said top plate and said middle plate comprises a matrix of holes, said matrix of holes in said top plate being aligned with said matrix of holes in said middle plate; a column of slots in said top plate positioned adjacent to said matrix of holes in said top plate; and a column of slots in said middle plate positioned adjacent to said matrix of holes in said middle plate and aligned directly under said column of slots in said top plate. 2. The blood bank testing workstation as recited in claim 1 wherein said workstation comprises a plurality of rows in said top plate and corresponding holes in said middle plate, each row comprises a first size hole of said matrix of holes, a plurality of second size holes of said matrix of holes, and a slot. 3. The blood bank testing workstation as recited in claim 1 wherein said column of slots in said top plate comprises a through slot, and said column of slots in said middle plate comprises a non-through slot. 4. The blood bank testing workstation as recited in claim 1 wherein said matrix of holes comprises a first column of a first size holes for receiving blood specimen tubes and an adjacent array of second size holes for receiving test tubes. 5. The blood bank testing workstation as recited in claim 1 wherein said platform comprises a plurality of screws for securing said top plate, said middle plate and said bottom plate together, said screws being inserted in first spacers between said top plate and said middle plate and second spacers between said middle plate and said bottom plate. 6. The blood bank testing workstation as recited in claim 5 wherein said plurality of screws are screwed into standoffs on the bottom of said bottom plate. 7. The blood bank testing workstation as recited in claim 1 wherein said workstation comprises a plurality of third size through holes in said first plate and positioned behind said column of slots, and a plurality of said third size holes in said middle plate aligned under said corresponding third size holes in said top plate, said third size holes in said middle plate being non-through holes. 8. The blood bank testing workstation as recited in claim 7 wherein an array of second size holes are positioned both in front of and behind said third size holes for supporting test tubes inserted in said top plate and said middle plate. 9. The blood bank testing workstation as recited in claim 1 wherein said workstation comprises a second column of slots in said top plate adjacent to said first column of slots; and a second column of slots in said middle plate positioned adjacent to said first column of slots and aligned directly under said second column of slots in said top plate. 10. The blood bank testing workstation as recited in claim 1 wherein said workstation comprises a plurality of third size through holes in said first plate behind said matrix of holes, and a plurality of said third size holes in said middle plate aligned under said corresponding third size holes in said top plate, said third size holes in said middle plate being non-through holes. 11. The blood bank testing workstation as recited in claim 10 wherein a row of second size holes are positioned on said top plate in the same row as said third size holes and behind said first column and said second column of slots; and a row of said second size holes are positioned in said middle plate aligned under said corresponding second size holes in said top plate. 12. A blood bank testing workstation as recited in claim 14 wherein said workstation comprises in said top plate a second column of slots adjacent to said first column of slots and a third column of slots adjacent to said second column of slots; and in said middle plate a second column of slots adjacent to said first column of slots and a third column of slots adjacent to said second column of slots, all slots in said middle plate being aligned under all corresponding slots in said top plate. 13. A blood bank testing workstation as recited in claim 12 wherein said workstation comprises in said top plate a plurality of third size holes arranged in two rows behind said matrix of holes adjacent to said first, second and third column of slots, and in said middle plate aligned under said top plate are a plurality of said third size holes arranged in two rows behind said matrix of holes adjacent to said first, second and third column of slots. 14. The blood bank testing workstation as recited in claim 12 wherein each of said plurality of third size holes in said middle plate comprises non-through holes with a second size hole extending through the center of said third size holes. 15. The blood bank testing workstation as recited in claim 13 wherein said holes in said two rows of said third size holes are staggered with respect to each of said two rows.
CROSS-REFERENCE TO RELATED APPLICATIONS This is a continuation of Design Application No. 29/198,065, filed Jan. 23, 2004, now pending. BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates generally to workstations or test platforms for use by laboratory technicians to perform tests on specimens of blood, and in particular to testing workstations or platforms having prearranged holes and slots for receiving various size specimen tubes, gel-cards, reagent tubes and/or reagent bottles in an organized manner on a workstation; 2. Description of Related Art The introduction of new Gel-Technology in a blood bank laboratory made the standard workstations obsolete because the laboratory technologist could not handle both traditional test tubes and the new Gel-Technology on one workstation. A gel-card is a device which comprises six microtubes on one card having a bottom portion that is thin and extends the width of the gel-card which is typically 2{fraction (3/4)} inches wide and 2{fraction (1/16)} inches high. Gel-cards were developed by Ortho-Clinical Diagnostics of Raritan, N.J. Instead the laboratory technologist was forced to use equipment which was not suited for the new gel-card technology and had to divide testing into sections or use multiple pieces of equipment which cluttered the work space making it cramped, confusing and error prone. Various errors were reported in determining a patient's blood type such as a confirming test not coinciding with an original test, specimens were misplanted, and test tubes which were previously next to each other were now separated in different areas. In particular, antibody screens, which had previously been done in test tubes next to the patient specimens, were now performed using the new gel-technology in a different location of the work space away from the specimens making it more difficult to match patients with the associated gel-cards. This problem caused errors in placing the wrong specimen in the gel-card or mismatching the patient with the gel-card, and mismatching antibodies with the patient. A workstation, platform, or rack was needed which received traditional specimen tubes, test tubes, and new gel-cards and in other platforms the capability of receiving reagent bottles. Otherwise, the laboratory technologist was required to set-up patient specimens and their tests in different locations or different times, and it was time consuming and confusing for the technologist to remember what test had been completed and on what patient specimens. More equipment was needed in the work area to perform testing, causing the work area to become smaller, cluttered and confusing. The following U.S. patents disclose various trays in the prior art for receiving test tubes and containers: U.S. Pat. No. 2,790,547, issued Apr. 30, 1957 to Dorothy Jean Sutton, discloses a laboratory tray for use by laboratory medical technicians in medical diagnosis. The tray comprises several sections of different depths for stacking slides, for receiving hypodermic syringes, and syringe needles, for receiving clean pipettes or for miscellaneous supplies, and the tray comprises a panel having a plurality of apertures of varying dimensions to receive larger test tubes, smaller test tubes, jars for holding dry sponges or absorbent cotton, and solution bottles. However, this tray does not have slots for receiving gel-cards for testing purposes. U.S. Pat. No. 2,880,865, issued Apr. 7, 1959 to David C. Knox, discloses a hematologist tray comprising an outer tray and an inner tray. The outer tray comprises a plurality of various apertures for receiving restriction tubes and holes to support bottles, beakers, etc. An inner tray comprises ten pairs of openings for receiving test tubes and adjacent to each pair of openings is a slot to receive a pair of slides. However, this tray does not have the capability of handling gel-cards. U.S. Pat. No. 3,604,526, issued Sep. 14, 1971 to Douglas J. Rem, discloses a test tube holder comprising a plurality of apertures for portability and segregation of test tubes and protection of their contents. The holder comprises a U-shaped channeled base member and a C-shaped tube-retaining support member. The C-shaped member comprises a plurality of annular, axially aligned apertures wherein upper apertures are formed perpendicular to a top wall while lower apertures are formed perpendicularly of the bottom wall 28. Other embodiments show apertures only in the top wall and do not extend into the bottom wall for conveniently handling other devices of less height. However, again there is no capability of receiving gel-cards. SUMMARY OF THE INVENTION Accordingly, it is therefore an object of this invention to provide an efficiently organized arrangement of various size holes and slots for receiving patient specimen tubes, test tubes, gel-cards and/or reagent bottles in a prearranged row order to provide an efficient blood bank testing workstation. It is another object of this invention to provide a blood bank testing workstation for laboratory technologists to perform blood testing operations in a manner that eliminates the likelihood of human errors. These and other objects are accomplished by a blood bank testing workstation comprising a top plate spaced above a middle plate and the middle plate spaced above a bottom plate, each of the top plate and the middle plate comprises a matrix of holes, the matrix of holes in the top plate being aligned with the matrix of holes in the middle plate, a column of slots in the top plate positioned adjacent to the matrix of holes in the top plate, and a column of slots in the middle plate positioned adjacent to the matrix of holes in the middle plate and aligned directly under the column of slots in the top plate. The workstation comprises a plurality of rows in the top plate and corresponding holes in the middle plate, each row comprises a first size hole of the matrix of holes, a plurality of second size holes of the matrix of holes, and a slot. The column of slots in the top plate comprises a through slot, and the column of slots in the middle plate comprises a non-through slot. The matrix of holes comprises a first column of a first size holes for receiving blood specimen tubes and an adjacent array of second size holes for receiving test tubes. The platform comprises a plurality of screws for securing the top plate, the middle plate and the bottom plate together, the screws being inserted in first spacers between the top plate and the middle plate and second spacers between the middle plate and the bottom plate. The plurality of screws are screwed into standoffs on the bottom of the bottom plate. The workstation comprises a plurality of third size through holes in the first plate and positioned behind the column of slots, and a plurality of the third size holes in the middle plate aligned under the corresponding third size holes in the top plate, the third size holes in the middle plate being non-through holes. An array of second size holes are positioned both in front of and behind the third size holes for supporting test tubes inserted in the top plate and the middle plate. The workstation comprises a second column of slots in the top plate adjacent to the first column of slots, and a second column of slots in the middle plate positioned adjacent to the first column of slots and aligned directly under the second column of slots in the top plate. The workstation comprises a plurality of third size through holes in the first plate behind the matrix of holes, and a plurality of the third size holes in the middle plate aligned under the corresponding third size holes in the top plate, the third size holes in the middle plate being non-through holes. A row of second size holes are positioned on the top plate in the same row as the third size holes and behind the first column and the second column of slots, and a row of the second size holes are positioned in the middle plate aligned under the corresponding second size holes in the top plate. The workstation comprises in the top plate a second column of slots adjacent to the first column of slots and a third column of slots adjacent to the second column of slots, and in the middle plate a second column of slots adjacent to the first column of slots and a third column of slots adjacent to the second column of slots, all slots in the middle plate being aligned under all corresponding slots in the top plate. The workstation comprises in the top plate a plurality of third size holes arranged in two rows behind the matrix of holes adjacent to the first, second and third column of slots, and in the middle plate aligned under the top plate are a plurality of the third size holes arranged in two rows behind the matrix of holes adjacent to the first, second and third column of slots. Each of the plurality of third size holes in the middle plate comprises non-through holes with a second size hole extending through the center of the third size holes. The two rows of the third size holes are staggered with respect to each of the two rows. Additional objects, features and advantages of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of the preferred embodiments exemplifying the best mode of carrying out the invention as presently perceived. BRIEF DESCRIPTION OF THE DRAWINGS The appended claims particularly point out and distinctly claim the subject matter of this invention. The various objects, advantages and novel features of this invention will be more fully apparent from a reading of the following detailed description in conjunction with the accompanying drawings in which like reference numerals refer to like parts, and in which: FIG. 1 is a front perspective view of a TS6 platform according to the invention; FIG. 2 is a top plan view of the TS6 platform; FIG. 3 is a right side elevational view of the TS6 platform; FIG. 4 is a front elevational view of the TS6 platform; FIG. 5 is a bottom plan view of the TS6 platform; FIG. 6 is a front perspective view of a second embodiment or GEL8 blood bank testing workstation according to the invention; FIG. 7 is a top plan view of the GEL8 workstation; FIG. 8 is a front elevational view of the GEL8 workstation; FIG. 9 is a right side elevational view of the GEL8 workstation; FIG. 10 is a bottom plan view of the GEL8 workstation; FIG. 11 is a front perspective view of a third embodiment or CU blood bank testing workstation according to the invention; FIG. 12 is a top plan view of the CU workstation; FIG. 13 is a front elevational view of the CU workstation; FIG. 14 is a right side elevational view of the CU workstation; and FIG. 15 is a bottom plan view of the CU workstation. DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS Referring to FIG. 1, FIG. 2 and FIG. 3, FIG. 1 is a perspective view of a six (6) specimen testing (TS6) platform or workstation 10 according to the present invention, which is used for blood bank testing and in particular ABORH, DAT and X-match tests. FIG. 2 is a top plan view of the platform 10, and FIG. 3 is a right side elevational view of the TS6 platform 10. The testing platform 10 comprises a top plate 12, a middle plate 27 and a bottom plate 28 in separate, spaced apart horizontal planes parallel to each other. A first set of spacers 20a-20e are positioned around screws 18a-18e between the top plate 12 and the middle plate 14, and a second set of spacers 22a-22e are positioned around screws 18a-18e between the middle plate 14 and the bottom plate 28. Shorter spacers or standoffs 24a-24e on the bottom side of the bottom plate 28 are screwed on the ends of screws 18a-18e which are inserted into holes on the corners and center of the top plate 12, middle plate 14, and bottom plate 16. The standoff 24e may be made slightly shorter than standoffs 24a-24d to prevent rocking of the platform 10 while on a flat surface during use. In top plate 12 of the illustrative embodiment a column of six holes 301-306 are provided each 16 mm in diameter, and an array or matrix of fifty-four (54) smaller holes 3411-3469 are provided each 12.5 mm in diameter. This matrix of small holes 3411-3469 comprises 9 holes in each row and 6 holes in each column as shown in FIG. 2. Likewise, the middle plate 12 comprises a column of six holes 321-326 each 16 mm in diameter suitable for receiving blood specimen tubes, and the fifty-four smaller holes 3611-3669 each 12.5 mm in diameter are suitable for receiving standard test tubes. Still referring to FIG. 1 and FIG. 2, the top plate 12 and the middle plate 14 each comprise a total of seventy-one (71) holes and each hole in the top plate 12 is axially aligned directly above a correspondingly positioned hole in the middle plate 14. For example, hole 301 in a first row of the top plate 12 is directly above hole 321 in the middle plate. Likewise, in the same first row smaller holes 3411-3469 in the top plate are directly above corresponding holes 3611-3669 in the middle plate 14. In addition to the column of 6 holes 301-306 and matrix of 54 smaller holes 3411-3469 in the top plate 12 and the column of 6 holes 321-326 and matrix of 54 smaller holes 3611-3669 in the middle plate 14, another portion of the platform 10 comprises a column of three slots 401-403 in the top plate 12 each slot being in a row adjacent to holes 3419, 3429 and 3439 respectively. Likewise, there are three slots 421-423 in the middle plate 14 located and aligned directly under the slots 401-403 in the top plate 12. The slots 401-403 in the top plate 12 of the illustrated embodiment measure 2 mm×72 mm, extend completely through the top plate 12, and are sized for receiving a standard gel-card. The slots 401-403 in the middle plate 14 are not cut completely through the middle plate 14 and measure 2 mm×72 mm with a depth of approximately 3 mm which is sufficiently deep to retain a bottom edge of a gel-card. This enables a gel-card, inserted into slots 401-403 and 421-423, to extend above the top plate 12 for ease of use of the microtubes and to allow information on the gel-card to be easily read. The first three rows in the top plate 12 of platform 10 each comprise a larger hole such as hole 30, in the first row, a series of smaller holes such as holes 3411-3419 and a slot such as slot 40, which together provide an organized, efficient arrangement for performing blood bank testing. Similarly the first three rows of the middle plate 14 comprise a larger hole such as hole 321 in the first row, a series of smaller holes, such as holes 3611-3619, and a slot, such as slot 421, and each row of holes and slots is aligned under the corresponding holes and slots in top plate 12. Still referring to FIGS. 1 and 2, the top plate 12 and the middle plate 14 comprise three holes 601-603, and 621-623 respectively behind slot 403 in the top plate 12 and 423 in the middle plate 14 which are each 12.5 mm in diameter suitable for receiving test tubes or reagent tubes. Behind holes 601-603 on the top plate 12 and the holes 621-623 on the middle plate 14 are three larger holes 501-503 on the top plate 12 and holes 521-523 on the middle plate 14. Each of these larger holes 501-503 and 521-523 are 25 mm in diameter and are provided for conveniently holding articles such as reagent bottles. However, holes 521-523 in the middle tray 14 are not through holes, but instead they are cut out to a depth of approximately 3 mm, which enables articles such as reagent bottles inserted into holes 501-503 and partial holes 521-523 to extend higher above the top plate 12 of platform 10. Behind the 25 mm holes 501-503 and 521-523 are five holes 604-608 in the top plate 12 and correspondingly aligned holes 624-628 in the middle plate 14. These five holes are 12.5 mm in diameter and are staggered in two rows with holes 604, 605 being forward and holes 606, 607 and 608 being back of holes 604, 605 along the back edge of top plate 12 as shown in FIGS. 1 and 2, and likewise, on the middle plate 14 holes 624 and 625 are forward and holes 626, 627 and 628 are back along the rear edge of middle plate 14. These 12.5 mm holes 604-608 are provided to store useful articles such as balance tubes, pens, scissors, pipette, etc. The solid bottom plate 16 serves as a stop underneath the middle plate for articles that extend through the holes in the middle plate 14. The workstation or testing platform 10 is designed structurally to avoid making errors in a hospital blood bank, to simplify and speed-up the workflow process, and to better organize the workflow and conserve bench space. It allows a laboratory technologist to organize in a safe and efficient manner all the necessary testing tubes including a patient specimen tube in a single row along with a gel-card, which makes the testing visually and physically easier to perform. Having the slots 401-403 on the top plate 12 and slots 421-423 on the middle plate 14 for receiving gel-cards on the testing platform 10 eliminates the need for another secondary workstation making it easier for a technologist to see and load the microtubes of the gel-card and avoid an error of planting a patient blood specimen in the wrong gel-card. Referring again to FIG. 1, the top plate 12 and the middle plate 14 are made of plastic and may be embodied by a Lexan® polycarbonate, manufactured by General Electric Company, or by a Hyzod® polycarbonate manufactured by Sheffield Plastics, Inc. The top plate 12 and the middle plate 14 are machined together to insure alignment of holes and slots by a CNC milling machine. The bottom plate 16 may be embodied by a plastic made of a high density polyethylene. Referring to FIG. 2 and FIG. 4, FIG. 4 is a front elevational view of the testing platform 10 showing the front left corner spacers 20a, 22a, the front right corner spacers 20b, 22b, and center spacers 20e, 22e. The center spacers 20e, 22e are located approximately in the center of the platform 10. The screws 18a-18d at the corners of the platform 10 and the center screw 18e may be embodied by commonly available stainless steel, flat head, Phillips machine screws having a 10-32 thread and a length of 2.5 inches. The spacers 20a-20e, 22a-22e at the four corners and the center of the platform 10 may be embodied by commonly available Nylon unthreaded round spacers having a {fraction (3/8)} inch O.D., {fraction (3/4)} inch length #10 screw size. Referring to FIG. 1 and FIG. 5, FIG. 5 shows a bottom plan view of the testing platform 10 comprising the bottom plate 16 and standoffs 24a-24e. The standoffs 24a-24e are threaded and screwed onto the ends of the 10-32 screws 18a-18e. The standoffs 24a-24e are commonly available nylon threaded, round standoffs having a {fraction (3/8)} inch O.D., {fraction (3/8)} inch length and 10-32 thread. As previously described, the bottom plate 16 provides a stop for articles such as specimen tubes or test tubes inserted into holes in the platform 10. The TS6 platform 10 as shown in FIG. 1 measures 11.25 inches×6.5 inches×2.5 inches and is intended to accommodate six (6) patient specimens which are received by top plate holes 301-306 and bottom plate holes 321-326. However, one of ordinary skill in the art will recognize that other dimensions for the TS6 platform 10 may be implemented depending on a user laboratory requirement or preference without departing from the invention. GEL8 Workstation N, Referring to FIG. 6, FIG. 7 and FIG. 8, FIG. 6 is a perspective view of a second embodiment of the blood bank testing workstations comprising an eight (8) specimen testing platform or workstation 70 according to the present invention, and it is referred to as a GEL8 workstation 70 comprising two columns of slots 4011-4081 and 4012-4082 for receiving gel-cards 76 and used for blood bank testing. FIG. 7 is a top plan view of the GEL8 workstation 70, and FIG. 8 is a front elevational view of the GEL8 workstation 70. The GEL8 workstation 70 comprises a top plate 26, a middle plate 27 and a bottom plate 28 arranged in separate, spaced apart horizontal planes parallel to each other. A first set of spacers 20a-20g are positioned around screws 18a-18g between the top plate 26 and the middle plate 27, and a second set of spacers 22a-22g are positioned around screws 18a-18g between the middle plate 27 and the bottom plate 28. Shorter spacers or standoffs 24a-24g on the bottom side of the bottom plate 28 are screwed on the ends of screws 18a-18g which are inserted into holes on the corners and across the center of the top plate 26, the middle plate 27, and the bottom plate 28. The standoffs 24e-24g may be made slightly shorter than the corner standoffs 24a-24d to prevent rocking of the workstation 70 while on a flat surface during use. The top plate 26 of the illustrative embodiment comprises a column of eight holes 301-308 each 16 mm in diameter, and an array or matrix of forty (40) smaller holes 3411-3481 are provided each hole being 12.5 mm in diameter. This matrix of smaller holes 3411-3481 comprises 5 holes such as 3411-3415 in each row and 8 holes such as 3411-3481 in each column. Likewise, in the middle plate 27 the eight holes 321-328 are 16 mm in diameter suitable for receiving blood specimen tubes 72, and the forty (40) smaller holes 3611-3685 are 12.5 mm in diameter, suitable for receiving standard test tubes 74. Still referring to FIG. 1 and FIG. 2, the top plate 26 and the middle plate 27 each comprise fifty-seven (57) holes and each hole in the top plate 26 is axially aligned directly above a correspondingly positioned hole in the middle plate 27. For example, hole 30, in a first row of the top plate 26 is directly above hole 32, in the middle plate 27. Likewise, in the same first row smaller holes 3411-3415 in the top plate 26 are directly above corresponding holes 3611-3615 in the middle plate 27. Behind the eighth row in top plate 26, which comprises hole 308 and smaller holes 3681-3685, are four (4) larger holes 504-507 which are 25 mm in diameter. Likewise, in the middle plate 27 corresponding holes 524-527 are partial non-through holes which are 25 mm in diameter and approximately 3 mm deep, and they are axially aligned directly under holes 504-507 in the top plate 26. The larger holes 504-507 are provided to hold reagent bottles 78. In addition to the fifty-seven (57) holes in the top plate 26 and fifty-seven 57 holes in the middle plate 27, the first column of eight slots 4011-4081 is provided in the top plate 26, and the column of corresponding slots 4211-4281 is provided in the middle plate 27, the slots 4011-4081 in the top plate 26 being aligned directly above corresponding slots 4211-4281 in the middle plate 27. The slots 4011-4081 in the top plate 26 of the illustrated embodiment measure 2 mm×72 mm, extend completely through the top plate 26, and are sized for receiving a standard gel-card. The slots 4211-4281 in the middle plate 27 are not cut completely through the middle plate 27 and measure 2 mm×72 mm with a depth of approximately 3 mm. This enables the gel-card 76 inserted in one of the slots 4011-4081 to extend above the top plate 26 for ease of use of the microtubes and to allow information on the gel-card to be easily read. Further, in the top plate 26 there is a second column of eight slots 4012-4082 adjacent to the first column of eight slots 4011-4081 to accommodate a second column of gel-cards 76. Likewise, on the middle plate 27 slots 4212-4282 are provided adjacent to the first column of eight slots 4211-4281, and slots 4212-4282 are aligned directly under slots 4012-4082. Again, slots 4212-4282 in the middle plate 27 are not cut completely through the middle plate 27 and measure 2 mm×72 mm with a depth of approximately 3 mm. This enables the microtubes in the gel-card 76 inserted in one of the slots 4012-4082 to be easily accessed and information on the gel-card to be easily read. Each row of holes in workstation 70 such as the row in the top plate 12 with holes 301 and 3411-3415 comprises slots 4011 and 4012, and likewise each row of holes in the middle plate 27 such as the row with holes 321 and 3611-3615 comprises the partial slots 4211 and 4212. The GEL8 workstation 70 comprises in plate 26 two holes 641, 642 each 12.5 mm in diameter behind the last slot 4081 in the first column of slots 4011-4081. Likewise, in the middle plate 27, there are two holes 661 and 662 each 12.5 mm in diameter behind the last slot 4281 in the first column of slots 4011-4081 and holes 661 and 662 are axially aligned under holes 641 and 642 in the top plate 26. Further, in plate 26 there are three holes 643, 644 and 645 each 12.5 mm in diameter behind the last slot 4082 in the second column of slots 4012-4082 Likewise, in the middle plate 27 there are three holes 663, 664 and 665 each 12.5 mm in diameter behind the last slot 4282 in the second column of slots 4212-4282. The top plate 26 holes 643-645 are axially aligned above the middle plate holes 663-665 for certain other applications. The 12.5 mm holes 641-645 in the top plate 26 and corresponding holes 661-665 in middle plate 27 may be changed to 25 mm holes in the workstation 70 depending on laboratory user requirements. The workstation 70 is designed structurally to avoid making errors in a hospital blood bank, to simplify and speed-up the workflow process, and to better organize the workflow and conserve bench space. It allows a laboratory technologist to organize in a safe and efficient manner all the necessary testing tubes including a patient specimen tube in a single row along with a gel-card, which makes the testing visually and physically easier to perform. Having the two columns of 16 slots 4011-4081 and slots 4012-4082 on the top plate 26 and slots 4211-4281 and slots 4212-4282 on the middle plate 27 for receiving gel-cards 76 on the workstation 70 eliminates the need for another secondary workstation making it easier for a technologist to see and load the microtubes of the gel-card 76 and avoid an error of planting a patient blood specimen in the wrong gel-card. The advantage of this workstation 70 is that it allows the technologist to centralize testing on one workstation instead of 2 to 3. It also allows the technologist to organize the specimen tubes 72, test tubes 74 and gel-card 76 in line with each other, making them easier to see and to add reagents/cells without contaminating other tests within the rack. Workstation 70 stores all the reagent bottles 78 needed to perform testing eliminating the need to have reagent bottles 78 in a separate platform. This conserves reagents as their shelf life is diminished when left at room temperature, and conserves on bench space. The workstation 70 also lines up the reagent bottles 78 where they are needed. Reagents bottles 78 are aligned with test tubes 74 and reagent cell tubes are located in holes 641-645 behind the gel-cards 4081 and 4082 which use those specific cells. As described above, the five 12.5 mm holes 641-645 located behind gel-cards 4081 and 4082 can be changed to 25 mm holes which accommodate reagent bottles for labs which do not dilute their own cells, or aliquot from reagent bottles into test tubes. Referring again to FIG. 6, the top plate 26 and the middle plate 27 are made of plastic and may be embodied by a Lexan® polycarbonate, manufactured by General Electric Company, or by a Hyzod® polycarbonate manufactured by Sheffield Plastics, Inc. The top plate 12 and the middle plate 14 are machined together to insure alignment of holes and slots by a CNC milling machine. The bottom plate 28 may be embodied by a plastic made of a high density polyethylene. Referring to FIG. 7 and FIG. 8, FIG. 8 is a front elevational view of the workstation 70 showing the front left corner spacers 20a, 22a, the front right corner spacers 20b, 22b, and front spacers 20f, 22f. There are center spacers 20e, 22e located approximately in the center of the workstation 70, and rear spacers 20g-22g (not shown) located in the rear center of the workstation 70. The screws 18a-18g at the corners and center corner of the workstation 70 may be embodied by commonly available stainless steel, flat head, Phillips machine screws having a 10-32 thread and a length of 2.5 inches. The spacers 20a-20g, 22a-22g at the four corners and the center areas of the workstation 70 may be embodied by commonly available Nylon unthreaded, round spacers having a {fraction (3/8)} inch O.D., {fraction (3/4)} inch length #10 screw size. Referring to FIG. 6 and FIG. 9, FIG. 9 is a right side elevation view of the GEL8 workstation 70 showing the spacers 20e, 22e and standoff 24e, which are located between the slots 4031 and 4041, are slightly toward the front of the workstation 70 between the front spacers 20f, 22f and rear spacers 20g and 22g. Referring to FIG. 6 and FIG. 10, FIG. 10 shows a bottom plan view of the GEL8 workstation 70 comprising the bottom plate 28 and standoffs 24a-24g. The standoffs 24a-24g are threaded and screwed onto the ends of the 10-32 screws 18a-18g. The standoffs 24a-24g are commonly available nylon threaded, round standoffs having a {fraction (3/8)} inch O.D., {fraction (3/8)} inch length and 10-32 thread. As previously described, the bottom plate 28 provides a stop for articles such as specimen tubes 72 or test tubes 74 inserted into holes 301-308 and 3412-3485 respectively in the workstation 70. The GEL8 workstation 70 as shown in FIG. 6 measures 11.25 inches×9.5 inches×2.5 inches and is intended to accommodate eight (8) patient specimen tubes 72 which are received by top plate holes 301-308 and middle plate holes 321-328. However, one of ordinary skill in the art will recognize that other dimensions of the GEL8 workstation 70 may be implemented depending on a user laboratory requirement or preference without departing from the invention. CU Workstation Referring to FIG. 11, FIG. 12 and FIG. 13, FIG. 11 is a perspective view of a third embodiment of the blood bank testing workstation comprising a universal special studies platform or workstation 80 according to the present invention. It is referred to as a CU workstation 80 and is used for blood bank testing such as to perform up to 4 antibody ID panels at one time using gel-card technology. FIG. 12 is a top plan view of the CU workstation 80, and FIG. 13 is a front elevational view of the CU workstation 80. The CU workstation 80 comprises a top plate 82, a middle plate 84 and a bottom plate 86 arranged in separate, spaced apart horizontal planes parallel to each other. A first set of spacers 20a-20g are positioned around screws 18a-18g between the top plate 82 and the middle plate 84, and a second set of spacers 22a-22g are positioned around screws 18a-18g between the middle plate 84 and the bottom plate 86. Shorter spacers or standoffs 24a-24g on the bottom side of the bottom plate 84 are screwed on the ends of screws 18a-18g which are inserted into holes on the corners and across the central area of the top plate 82, the middle plate 84, and the bottom plate 86. The standoffs 24e-24g may be made slightly shorter than the corner standoffs 24a-24d to prevent rocking of the CU workstation 80 while on a flat surface during use. The top plate 82 of the illustrative embodiment comprises a column of four holes 301-304 each 16 mm in diameter, and an array of eight (8) smaller holes 3411-3442 are provided adjacent to holes 301-304, each hole being 12.5 mm in diameter. This array of smaller holes 3411-3442 comprises 2 holes in each row and 4 holes such as 3411-3441 in each column. Likewise, in the middle plate 84 the four holes 321-324 are 16 mm in diameter suitable for receiving blood specimen tubes 72, and the eight (8) smaller holes 3611-3642 are 12.5 mm in diameter, suitable for receiving standard test tubes 74. Still referring to FIG. 11 and FIG. 12, the top plate 82 and the middle plate 84 each comprise thirty-five (35) holes and each hole in the top plate 82 is axially aligned directly above a correspondingly positioned hole in the middle plate 84. For example, hole 30, in a first row of the top plate 82 is directly above hole 32, in the middle plate 84. Likewise, in the same first row smaller holes 3411-3412 in the top plate 82 are directly above corresponding holes 3611-3612 in the middle plate 84. Behind the fourth row in top plate 82, which comprises hole 304 and smaller holes 3441-3442, are two rows of larger holes 901-9012 and 941-9411 which extend the length of the workstation 80 and are 18 mm in diameter. In the middle plate 84 there are two rows of holes 921-9212 and 961-9611. The 18 mm holes 901-9012 and 941-9411, are provided to hold reagent bottles 78. Each of the 12 holes 921-9212 and the 11 holes 961-9611 in the middle plate 84 is 18 mm in diameter and approximately 3 mm deep. The two rows of holes 901-9012 and 941-9411 in the top plate 82 are staggered or off-center relative to each row, and the two rows of holes 921-9212 and 961-9611 in the middle plate 84 are similarly off-center relative to each row. Each of the 18 mm holes 921-9212 and 961-9611 in the middle plate 84 comprises 12.5 mm through holes 931-9312 and 951-9511 which are on center with the 18 mm holes 921-9212 and 961-9611, and the 18 mm holes 921-9212 and 961-9611 are axially aligned under the 18 mm holes 901-9012 and 941-9411 in the top plate 82. In addition to the thirty-five (35) holes in the top plate 82 and the corresponding thirty-five (35) holes in the middle plate 84, there are three columns of slots 4011-4041, 4012-4042 and 4013-4043 in the top plate 82 and likewise there are three columns of slots 4211-4241, 4212-4242 and 4213-4243 in the middle plate 84. This arrangement of slots in the top plate 82 and the middle plate 84 results in four test rows, each test row comprising, for example, in the first row of the top plate, a specimen hole 301, two test tube holes 3411, 3412 and three gel-card slots 4011, 4012 and 4013. Likewise in the middle plate 84 the first row comprises the specimen hole 321, two test tube holes 3611, 3612, and three gel-card partial slots 4211, 4212 and 4213. The first column of four slots 4011-4041 is provided in the top plate 82, and the column of corresponding slots 4211-4241 is provided in the middle plate 84, the slots 4011-4041 in the top plate 82 being aligned directly above corresponding slots 4211-4241 in the middle plate 84. The slots 4011-4041 in the top plate 82 of the illustrated embodiment measure 2 mm×72 mm, extend completely through the top plate 82, and are suitably sized for receiving a standard gel-card. The slots 4211-4241 in the middle plate 84 are not cut completely through the middle plate 84 and measure 2 mm×72 mm with a depth of approximately 3 mm. This enables the gel-card 76 inserted in one of the slots 4011-4081 to extend above the top plate 82 for ease of use of the microtubes and to allow information on the gel-card to be easily read. Further in the top plate 82, the second column of four slots 4012-4042 is adjacent to the first column of four slots 4011-4041. Likewise, on the middle plate 84 slots 4212-4242 are provided adjacent to the first column of four slots 4211-4241, and slots 4212-4242 are aligned directly under slots 4012-4042. Also, slots 4212-4242 in the middle plate 84 are not cut completely through the middle plate 84 and measure 2 mm×72 mm with a depth of approximately 3 mm. The third column of four slots 4013-4043 in the top plate 82 is adjacent to the second column of four slots 4012-4042. Likewise on the middle slot 84 slots 4213-4243 are provided adjacent to the second column of four slots 4212-4242 and slots 4213-4243 are aligned directly under slots 4013-4043. Again, slots 4213-4243 are not cut completely through the middle plate 84 and measure 2 mm×72 mm with a depth of approximately 3 mm. The CU workstation 80 is designed structurally to be used to perform specialized testing in a blood bank including antibody identification, phenotype, and more complex testing using the gel-card technology. Workstation 80 allows a laboratory technologist to organize reagent bottles 78, patient specimen tubes 72, working test tubes 74 and gel-cards 76 in one central location and orienting them in a manner that facilitates accuracy and speed in testing such as providing a patient specimen tube 72, testing tubes 74 and gel-cards 76 in a single row on the workstation 80. Having the three columns of slots 4011-4041, slots 4012-4042 and slots 4013-4043 on the middle plate 84 for receiving gel-cards 76 on the workstation 80 often eliminates the need for other racks or workstations making it easier for a technologist to see and load the microtubes of the gel-card 76 and avoid an error of planting a patient blood specimen in the wrong gel-card 76. The advantage of workstation 80 is that it allows the technologist to store reagents in the workstation 80 and lines them up in the order in which they will be used. The 18 mm holes 901-9012 and 941-9411, which allow the reagents to be stored on the rack, do not pass completely through the middle plate 84 in order to accommodate shorter reagent bottles. The 12.5 mm holes 931-9312 and 951-9511, which are centered within holes 921-9212 and 961-9611 in the middle plate 84 beneath the 18 mm holes 901-9012 and 941-9411 in the top plate 82, are for laboratories which dilute their own reagents or aliquot reagents and store them in test tubes 74. (These tubes may also be stored in the workstation 80 when not in use). Another advantage is that it allows the technologist to work on multiple (up to 4) patient specimens at one time, and it lines-up each specimen in its own row and all the test tubes 74 and gel-cards 76 that it will need to perform extra testing. Referring again to FIG. 11, the top plate 82 and the middle plate 84 are made of plastic and may be embodied by a Lexan® polycarbonate, manufactured by General Electric Company, or by a Hyzod® polycarbonate manufactured by Sheffield Plastics, Inc. The top plate 12 and the middle plate 14 are machined together to insure alignment of holes and slots by a CNC milling machine. The bottom plate 86 may be embodied by a plastic made of a high density polyethylene. Referring to FIG. 12 and FIG. 13, FIG. 13 is a front elevational view of the workstation 80 showing the front left corner spacers 20a, 22a, the front right corner spacers 20b, 22b, and front center area spacers 20f, 22f. There are center spacers 20e, 22e located near the center area of the workstation 80, between slots 4032 and 4042, and rear spacers 20g, 22g (not shown) located in the rear center of the workstation 80. The screws 18a-18g at the corners and center areas of the workstation 80 may be embodied by commonly available stainless steel, flat head, Phillips machine screws having a 10-32 thread and a length of 2.5 inches. The spacers 20a-30g, 22a-22g at the four corners and the center areas of the workstation 80 may be embodied by commonly available Nylon unthreaded, round spacers having a {fraction (3/8)} inch O.D., 3 inch length #10 screw size. Referring to FIG. 11 and FIG. 14, FIG. 14 is a right side elevational view of the CU workstation 80 and shows the spacers 20e, 22e and standoff 24e, which are located between the slots 4032 and 4042, are slightly left of the center between the front spacers 20b, 22b (and 20f, 22f) and the rear spacers 20c and 22c (and 20g, 22g). Referring to FIG. 11 and FIG. 15, FIG. 15 shows a bottom plan view of the CU workstation 80 comprising the bottom plate 86 and standoffs 24a-24g. The standoffs 24a, 24g are threaded and screwed onto the end of the 10-32 screws 18a-18g. The standoffs 24a-24g are commonly available nylon threaded, round standoffs having a {fraction (3/8)} inch O.D., {fraction (3/8)} inch length and 10-32 thread. As previously described, the bottom plate 86 provides a stop for articles such as specimen tubes 72 or test tubes 74 inserted into holes 301-304 and 3411-3442 in the workstation 80. The CU workstation 80 as shown in FIG. 11 measures 12.0 inches×6.5 inches×2.5 inches and is intended to accommodate four (4) patient specimens which are received by top plate holes 301-304 and middle plate holes 321-324. However, one of ordinary skill in the art will recognize that other dimensions for the CU workstation 80 may be implemented depending on a user laboratory requirement or preference without departing from the invention. This invention has been disclosed in terms of certain embodiments. It will be apparent that many modifications can be made to the disclosed apparatus without departing from the invention. For example, each of the platform or workstation embodiments is designed for a particular application in the area of blood bank testing and the number of blood specimen holes and corresponding test rows which may be increased or decreased in each embodiment. Therefore, it is the intent of the appended claims to cover all such variations and modifications as come within the true spirit and scope of this invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention This invention relates generally to workstations or test platforms for use by laboratory technicians to perform tests on specimens of blood, and in particular to testing workstations or platforms having prearranged holes and slots for receiving various size specimen tubes, gel-cards, reagent tubes and/or reagent bottles in an organized manner on a workstation; 2. Description of Related Art The introduction of new Gel-Technology in a blood bank laboratory made the standard workstations obsolete because the laboratory technologist could not handle both traditional test tubes and the new Gel-Technology on one workstation. A gel-card is a device which comprises six microtubes on one card having a bottom portion that is thin and extends the width of the gel-card which is typically 2{fraction (3/4)} inches wide and 2{fraction (1/16)} inches high. Gel-cards were developed by Ortho-Clinical Diagnostics of Raritan, N.J. Instead the laboratory technologist was forced to use equipment which was not suited for the new gel-card technology and had to divide testing into sections or use multiple pieces of equipment which cluttered the work space making it cramped, confusing and error prone. Various errors were reported in determining a patient's blood type such as a confirming test not coinciding with an original test, specimens were misplanted, and test tubes which were previously next to each other were now separated in different areas. In particular, antibody screens, which had previously been done in test tubes next to the patient specimens, were now performed using the new gel-technology in a different location of the work space away from the specimens making it more difficult to match patients with the associated gel-cards. This problem caused errors in placing the wrong specimen in the gel-card or mismatching the patient with the gel-card, and mismatching antibodies with the patient. A workstation, platform, or rack was needed which received traditional specimen tubes, test tubes, and new gel-cards and in other platforms the capability of receiving reagent bottles. Otherwise, the laboratory technologist was required to set-up patient specimens and their tests in different locations or different times, and it was time consuming and confusing for the technologist to remember what test had been completed and on what patient specimens. More equipment was needed in the work area to perform testing, causing the work area to become smaller, cluttered and confusing. The following U.S. patents disclose various trays in the prior art for receiving test tubes and containers: U.S. Pat. No. 2,790,547, issued Apr. 30, 1957 to Dorothy Jean Sutton, discloses a laboratory tray for use by laboratory medical technicians in medical diagnosis. The tray comprises several sections of different depths for stacking slides, for receiving hypodermic syringes, and syringe needles, for receiving clean pipettes or for miscellaneous supplies, and the tray comprises a panel having a plurality of apertures of varying dimensions to receive larger test tubes, smaller test tubes, jars for holding dry sponges or absorbent cotton, and solution bottles. However, this tray does not have slots for receiving gel-cards for testing purposes. U.S. Pat. No. 2,880,865, issued Apr. 7, 1959 to David C. Knox, discloses a hematologist tray comprising an outer tray and an inner tray. The outer tray comprises a plurality of various apertures for receiving restriction tubes and holes to support bottles, beakers, etc. An inner tray comprises ten pairs of openings for receiving test tubes and adjacent to each pair of openings is a slot to receive a pair of slides. However, this tray does not have the capability of handling gel-cards. U.S. Pat. No. 3,604,526, issued Sep. 14, 1971 to Douglas J. Rem, discloses a test tube holder comprising a plurality of apertures for portability and segregation of test tubes and protection of their contents. The holder comprises a U-shaped channeled base member and a C-shaped tube-retaining support member. The C-shaped member comprises a plurality of annular, axially aligned apertures wherein upper apertures are formed perpendicular to a top wall while lower apertures are formed perpendicularly of the bottom wall 28 . Other embodiments show apertures only in the top wall and do not extend into the bottom wall for conveniently handling other devices of less height. However, again there is no capability of receiving gel-cards.
<SOH> SUMMARY OF THE INVENTION <EOH>Accordingly, it is therefore an object of this invention to provide an efficiently organized arrangement of various size holes and slots for receiving patient specimen tubes, test tubes, gel-cards and/or reagent bottles in a prearranged row order to provide an efficient blood bank testing workstation. It is another object of this invention to provide a blood bank testing workstation for laboratory technologists to perform blood testing operations in a manner that eliminates the likelihood of human errors. These and other objects are accomplished by a blood bank testing workstation comprising a top plate spaced above a middle plate and the middle plate spaced above a bottom plate, each of the top plate and the middle plate comprises a matrix of holes, the matrix of holes in the top plate being aligned with the matrix of holes in the middle plate, a column of slots in the top plate positioned adjacent to the matrix of holes in the top plate, and a column of slots in the middle plate positioned adjacent to the matrix of holes in the middle plate and aligned directly under the column of slots in the top plate. The workstation comprises a plurality of rows in the top plate and corresponding holes in the middle plate, each row comprises a first size hole of the matrix of holes, a plurality of second size holes of the matrix of holes, and a slot. The column of slots in the top plate comprises a through slot, and the column of slots in the middle plate comprises a non-through slot. The matrix of holes comprises a first column of a first size holes for receiving blood specimen tubes and an adjacent array of second size holes for receiving test tubes. The platform comprises a plurality of screws for securing the top plate, the middle plate and the bottom plate together, the screws being inserted in first spacers between the top plate and the middle plate and second spacers between the middle plate and the bottom plate. The plurality of screws are screwed into standoffs on the bottom of the bottom plate. The workstation comprises a plurality of third size through holes in the first plate and positioned behind the column of slots, and a plurality of the third size holes in the middle plate aligned under the corresponding third size holes in the top plate, the third size holes in the middle plate being non-through holes. An array of second size holes are positioned both in front of and behind the third size holes for supporting test tubes inserted in the top plate and the middle plate. The workstation comprises a second column of slots in the top plate adjacent to the first column of slots, and a second column of slots in the middle plate positioned adjacent to the first column of slots and aligned directly under the second column of slots in the top plate. The workstation comprises a plurality of third size through holes in the first plate behind the matrix of holes, and a plurality of the third size holes in the middle plate aligned under the corresponding third size holes in the top plate, the third size holes in the middle plate being non-through holes. A row of second size holes are positioned on the top plate in the same row as the third size holes and behind the first column and the second column of slots, and a row of the second size holes are positioned in the middle plate aligned under the corresponding second size holes in the top plate. The workstation comprises in the top plate a second column of slots adjacent to the first column of slots and a third column of slots adjacent to the second column of slots, and in the middle plate a second column of slots adjacent to the first column of slots and a third column of slots adjacent to the second column of slots, all slots in the middle plate being aligned under all corresponding slots in the top plate. The workstation comprises in the top plate a plurality of third size holes arranged in two rows behind the matrix of holes adjacent to the first, second and third column of slots, and in the middle plate aligned under the top plate are a plurality of the third size holes arranged in two rows behind the matrix of holes adjacent to the first, second and third column of slots. Each of the plurality of third size holes in the middle plate comprises non-through holes with a second size hole extending through the center of the third size holes. The two rows of the third size holes are staggered with respect to each of the two rows. Additional objects, features and advantages of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of the preferred embodiments exemplifying the best mode of carrying out the invention as presently perceived.
20040303
20070821
20050728
73203.0
0
NOVOSAD, JENNIFER ELEANORE
BLOOD BANK TESTING WORKSTATIONS
SMALL
1
CONT-ACCEPTED
2,004
10,792,593
ACCEPTED
Virtual reality system
A virtual reality (VR) system includes an image playback system that sends images to an image viewing device, such as a pair of display glasses. Each image has a 360-degree field of view. An user views a portion of the images. The portion of the image viewed is determined by a directional sensor mounted to the display glasses. The images are advanced according to a speed sensor attached to a moving device, such as a stationary bicycle. The VR system simultaneously coordinates the portion of the images viewed by the user by coordinating signals from the directional sensor and the speed sensor.
1. A virtual reality (VR) system comprising: an image playback system having a storage device for maintaining a plurality of images where each image has a field-of-view defining an X direction and a Y direction; an image viewing device operatively communicating with said image playback system for displaying a portion of said plurality of images to a user; a directional sensor operatively communicating with said playback system for defining a viewing direction of the user in both of said X and Y directions; a forward and rearward moving device for defining a Z direction; and a speed sensor operably connected to said moving device and operatively communicating with said playback system for providing a rate of change of said plurality of images in said Z direction; said VR system characterized by said image playback system having a controller operatively connected to said storage device for simultaneously coordinating said X and Y directions of said directional sensor and said Z direction of said speed sensor such that said viewing direction and said rate of change are interlaced to automatically change said portion of said plurality of images displayed by said image viewing device in said X, Y, and Z directions when the user moves the directional sensor in at least one of the X and Y directions and simultaneously moves the moving device in the Z direction. 2. A VR system as set forth in claim 1 wherein said controller automatically changes said portion of said images displayed by said image viewing device throughout said field-of-view. 3. A VR system as set forth in claim 1 wherein said field-of-view is further defined as 360 degrees in the X direction and 180 degrees in the Y direction. 4. A VR system as set forth in claim 3 wherein said portion of said plurality of images is further defined as approximately 140 degrees in the X direction and 90 degrees Y direction. 5. A VR system as set forth in claim 1 wherein said image viewing device is further defined as display glasses adapted to be worn by the user. 6. A VR system as set forth in claim 5 wherein said directional sensor is attached to said display glasses such that said portion of said plurality of images automatically changes as said glasses move in said X and Y directions. 7. A VR system as set forth in claim 1 wherein said image playback system includes a first wireless interface for communicating with said speed sensor and said directional sensor. 8. A VR system as set forth in claim 7 wherein said speed sensor includes a second wireless interface for communicating with said first wireless interface of said playback system. 9. A VR system as set forth in claim 7 wherein said directional sensor includes a third wireless interface for communicating with said first wireless interface of said playback system. 10. A VR system as set forth in claim 1 wherein said forward and rearward moving device is further defined as an exercise apparatus for allowing a user to exercise. 11. A VR system as set forth in claim 10 wherein said speed sensor is operatively connected to said exercise apparatus and is operational as the user exercises. 12. A VR system as set forth in claim 1 wherein said plurality of images are compressed for increasing an amount of images stored on said storage device. 13. A VR system as set forth in claim 1 wherein said image playback system further includes a frame buffer operatively communicating with said image viewing device for displaying said portion of said plurality of images to the user at a constant frame rate. 14. A method of operating a virtual reality (VR) system comprising: maintaining a plurality of images where each image has a 360-degree field-of-view defining a X direction and a Y direction; determining a viewing direction of a user in both of the X and Y directions; displaying a portion of the plurality of images to the user; and sensing a rate of change of the plurality of images moving in a Z direction; the method characterized by simultaneously coordinating the X and Y directions and the Z direction and interlacing the viewing direction and the rate of change for automatically changing the plurality of images in the X, Y, and Z directions as the user changes the viewing direction in at least one of the X and Y directions and simultaneously moves in the Z direction. 15. A method as set forth in claim 14 wherein the step of automatically changing the plurality of images is further defined as automatically changing the plurality of images in the X, Y, and Z directions throughout the 360-degree field-of-view. 16. A method as set forth in claim 14 wherein the step of maintaining the plurality of images is further defined as compressing the plurality of images and storing the plurality of images. 17. A method as set forth in claim 16 wherein the step of displaying the portion of the plurality of images is further defined as decompressing the images. 18. A method as set forth in claim 14 wherein the step of determining a viewing direction of a user is further defined as monitoring any movement of the user. 19. A method as set forth in claim 14 wherein the step of coordinating the X and Y directions and the Z direction is further defined as communicating across one or more wireless interfaces. 20. A method as set forth in claim 14 wherein the step of displaying a portion of the plurality of images to the user is further defined as displaying a portion of the plurality of images to the user at a constant frame rate.
BACKGROUND OF THE INVENTION 1. Field of the Invention The subject invention relates generally to virtual reality (VR) systems. The invention relates specifically to VR systems coupled with an exercise apparatus where a user views and interacts with images in an immersion-type fashion. 2. Description of the Related Art Various VR systems are well known in the prior arch in which a user views a plurality of images. Two such VR systems are disclosed in U.S. Pat. No. 5,499,146 (the '146 patent) to Donahe et al. and U.S. Pat. No. 6,244,987 (the '987 patent) to Ohsuga et al. The '146 patent discloses a VR system having an image playback system for storing a plurality of images having a 360-degree field-of-view. The images are previously recorded using a plurality of video cameras and electronically “stitched” together to create the images with the 360-degree field-of-view. The playback system is operatively connected to a display and a directional sensor. The display and directional sensor are mounted to a helmet that is worn by a user. The display shows a portion of each image based on the position of the helmet, as measured by the directional sensor. The plurality of images are sequenced and displayed for the user at a predetermined rate. The '987 patent discloses a VR system having an image playback system for storing a plurality of images. The playback system is operatively connected to a display and a speed sensor. The speed sensor is attached to an exercise apparatus for measuring a speed of a user operating the exercise apparatus. The display presents the plurality of images to the user at a rate determined by the speed measured by the speed apparatus. Although these systems may provide some advantages over other systems, there remains an opportunity for a VR system that provides a more realistic environment of 360-degree images that are dynamically viewed by a user. BRIEF SUMMARY OF THE INVENTION AND ADVANTAGES The invention provides a virtual reality (VR) system comprising an image playback system having a storage device for maintaining a plurality of images. Each image has a field-of-view defining an X direction and a Y direction. An image viewing device operatively communicates with the playback system for displaying a portion of the plurality of images to a user. A directional sensor operatively communicates with the playback system for defining a viewing direction of the user in both of the X and Y directions. A forward and rearward moving device defines a Z direction. A speed sensor is operably connected to the moving device and operatively communicates with the playback system for providing a rate of change of the plurality of images in the Z direction. The VR system is characterized by the image playback system having a controller operatively connected to the storage device. The controller simultaneously coordinates the X and Y directions of the directional sensor and the Z direction of the speed sensor. The viewing direction and the rate of change are interlaced to automatically change the plurality of images displayed by the image viewing device in the X, Y, and Z directions when the user moves the directional sensor in at least one of the X and Y directions and simultaneously moves the moving device in the Z direction. The invention also includes a method of operating the VR system. The method includes the steps of maintaining the plurality of images; determining a viewing direction of a user in both of the X and Y directions; displaying a portion of the plurality of images to the user; sensing a rate of change of the plurality of images moving in a Z direction; simultaneously coordinating the X and Y directions and the Z direction; and interlacing the viewing direction and the rate of change for automatically changing the plurality of images in the X, Y, and Z directions as the user changes the viewing direction in at least one of the X and Y directions and simultaneously moves in the Z direction. Accordingly, the invention provides a VR system that automatically reacts to the dynamics of a user simultaneously moving in X, Y, and Z directions by altering the portion of the plurality of images displayed to the user. BRIEF DESCRIPTION OF THE DRAWINGS Other advantages of the present invention will be readily appreciated as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings wherein: FIG. 1 is a perspective view of a preferred embodiment of a virtual reality system in accordance with the subject invention; FIG. 2 is a forward-looking segment defining a first image and a portion of the first image viewed by a user; FIG. 3 is a backward-looking segment of the first image and another portion of the first image viewed by the user; FIG. 4 is a forward-looking segment defining a second image and a portion of the second image viewed by the user; FIG. 5 is a forward-looking segment of a third image and a portion of the third image viewed by the user; FIG. 6 is a forward-looking segment of a fourth image and a portion of the fourth image viewed by the user; and FIG. 7 is a forward-looking segment of a fifth image and a portion of the fifth image viewed by the user. DETAILED DESCRIPTION OF THE INVENTION Referring to the Figures, wherein like numerals indicate like parts throughout the several views, a virtual reality (VR) system is shown at 10 in FIG. 1. The VR system broadly includes an image playback system 12, an image viewing device 20, and a forward and rearward moving device 26 that each communicate with each other. The image playback system 12 includes a storage device 14 and a controller 16 operatively connected to one another. The storage device 14 maintains a plurality of images. Each image has a field-of-view defining an X direction and a Y direction. In a preferred embodiment, the X direction field-of-view is defined as 360 degrees and the Y direction field-of-view is defined as 180 degrees. However, those skilled in the art appreciate the field-of-view of the X direction may be less than 360 degrees and the field-of-view of the Y direction could be less than 180 degrees. The 360 degrees of the X direction and the 180 degrees of the Y direction represent a completely spherical image. The images are preferably generated using a camera with a 360-degree field-of-view lens. One suitable lens is the “ParaMax360” produced by Panosmart of Antibes, France. In a first alternative, the images may be produced by several standard lenses then combined to create the 360 degree field-of-view. A second alternative is for the images to be computer generated. In the preferred embodiment, the plurality of images are compressed and then stored. This allows an increased amount of images to be stored on the storage device. The images are then decompressed before being displayed. Several acceptable compression/decompression algorithms (Codecs) are known to those skilled in the art. However, it is preferred that the XviD codec is implemented. The XviD codec is open-source software available via the Internet at www.xvid.org. The image viewing device 20 operatively communicates with the image playback system 12. The image viewing device 20 displays a portion 22 of the plurality of images to a user U. In the preferred embodiment, the image viewing device 20 is further defined as a pair of display glasses 20 worn on the head of the user U. The portion 22 of the plurality of images displayed by the display glasses 20 is preferably 140 degrees in the X direction and 90 degrees in the Y direction. Those skilled in the art realize that display glasses 20 with alternate dimensional configurations are also possible. An example of suitable display glasses 20 is the “i-glasses SVGA Pro” model manufactured by i-O Display systems, LLC, a division of Ilixco, Inc., both of Menlo Park, Calif. However, a variety of suitable display glasses 20 exist and could be implemented in the VR system 10. Further, the image viewing device 20 could be a flat or curved screen or monitor positioned in front of and/or about the user U. The forward and rearward moving device 26, in the preferred embodiment, is an exercise apparatus for allowing the user U to exercise. The exercise apparatus is illustrated in FIG. 1 as a stationary bicycle 26. However, a different type of exercise apparatus could be implemented, including, but not limited to, a treadmill, a stair climber, or an elliptical trainer. Those skilled in the art will also realize that other types of moving devices 26 could be utilized in the subject invention without deviating from the scope of the subject invention. Preferably, the image playback system 12, image viewing device 20, and forward and rearward moving device 26 communicate with each other across one or more wireless interfaces. Specifically, the image playback system 12 includes a first wireless interface 18 for communicating with the image viewing device 20 and the forward and rearward moving device 26. Similarly, the image viewing device 20 includes a second wireless interface 32 for communicating with the first wireless interface 18 of the playback system 12. Further, the forward and rearward moving device 26 includes a similar wireless interface 36 for communicating with the first wireless interface 18 of the playback system 12. As discussed below, there may be other wireless interfaces for communicating among other components in the VR system 10. In the preferred embodiment, the wireless interfaces 18, 32, 36, operate using radio waves. Preferably, the wireless interfaces 18, 32, 36, utilize Bluetooth® technology as described by the Bluetooth Special Interest Group headquartered in Overland Park, Kans. Other radio wave interfaces, such as 802.11, PCS, etc., may also be implemented. In a first alternative embodiment, the wireless interfaces 18, 32, 36, operate using frequencies in the optical band, such as the infrared standards developed by the Infrared Data Association (IrDA) of Walnut Creek, Calif. In a second alternative embodiment, the communication between the image playback system 12 and the other components of the VR system 10 is accomplished using a hardwired interface. This hardwired interface may involve transmission of electrons over a conductive wire or pulses of light over a fiber-optic cable. In order to specifically monitor the movement of the user U in the X and Y directions, a directional sensor 24 is included. The directional sensor 24 operatively communicates with the image playback system 12. In particular, the directional sensor 24 defines a viewing direction of the user U in both of the X and Y directions. In the preferred embodiment, the directional sensor 24 is attached to the display glasses 20. This allows a portion of the plurality of images displayed by the display glasses 20 to change in the X and Y directions as the user U moves the display glasses 20 by moving his or her head. The directional sensor 24 preferably defines a third wireless interface 34 for communicating with the first wireless interface 18 of the playback system 12. An example of a suitable directional sensor 24 is the “InterTrax2” manufactured by InterSense of Burlington, Mass. As appreciated by those skilled in the art, any suitable directional sensor 24 may be used. Further, in the embodiment where the image viewing device 20 is a screen or monitor, the directional sensor 24 could be mounted directly to the head and/or different areas of the user U. In order to monitor the movement of the user U in a Z direction, a speed sensor 28 is provided. The speed sensor 28 is operably connected to the forward and rearward moving device 26 such that the forward and rearward moving device 26 defines the Z direction. The speed sensor 28 also operatively communicates with the image playback system 12 to provide a rate of change of the plurality of images in the Z direction. Preferably, the speed sensor 28 is operably connected to a rotating wheel, pedal crank, or similar part of the stationary bicycle 26. The speed sensor 28 defines a fourth wireless interface 36 for communicating with the first wireless interface 18 of the playback system 12. Referring to FIGS. 2 and 3, one of the plurality of 360-degree field-of-view images is illustrated and is defined as a first image 38. A forward-looking segment 40 of the first image 38, defined by the X-direction between 0 and 180 degrees, is shown in FIG. 2. A portion 22 of the image viewed by the display glasses 20 is shown with a broken line. The portion 22 of the image is illustrated as a rectangle but could be of any suitable shape or size. FIG. 3 illustrates a backward-looking segment 42, defined by the X-direction between 180 and 360 degrees. The controller 16 simultaneously coordinates the X and Y directions of the directional sensor 24 and the Z direction of the speed sensor 28. The viewing direction and the rate of change are interlaced to automatically change the portion 22 of the plurality of images displayed by the image viewing device 20 in the X, Y, and Z directions when the user U moves the directional sensor 24 in at least one of the X and Y directions and simultaneously moves the moving device 26 in the Z direction. In particular, the controller 16 automatically changes the portion 22 of the images displayed by the image viewing device 20 throughout the 360-degree field-of-view. The preferred embodiment of the image playback system 12 also includes a frame buffer. The frame buffer receives the portion 22 of the plurality of images and retransmits the portion 22 at a constant frame rate. This retransmission at a constant frame rate prevents “slow motion” or blurry images from being received by the user U. The frame buffer may be implemented as software within the controller 16 or as a separate hardware module within the image playback system 22. FIGS. 4 through 7 illustrate the coordination between the X and Y directions of the directional sensor 24 and the Z direction of the speed sensor 28. For simplification of illustration, only the forward-looking portions of the images are shown. Several of the plurality of images that would be present between FIGS. 4 and 5, between FIGS. 5 and 6, etc., are omitted to further simplify the illustration. As the user U operates the stationary bicycle 26 of the preferred embodiment, the plurality of images are advanced in the Z direction. The first image 38, shown in FIG. 2, will advance to a second image 44, shown in FIG. 4, which will advance to a third image 46, shown in FIG. 5, to a fourth image 48, shown in FIG. 6, and finally to a fifth image 50, shown in FIG. 7. The user U, however, does not see the entirety of each of the images 38, 44, 46, 48, 50. Instead, the user U views the portion 22 of each image 38, 44, 46, 48, 50, as shown by the broken line. As the user U moves his or her head, the directional sensor 24 sends a signal to the controller 16 which, in turn, changes the portion 22 that is viewed by the user U. As the images are advanced, the user U can turn his or her head to the right or left, i.e. in the X direction, or up and down, i.e., in the Y direction, to view the objects in the X direction's 360-degree field-of-view. For example, the user U looking relatively straight ahead in FIG. 4 can turn his or her head to the right get a better view of the lake to the right of the road as shown in FIG. 5. Also, the user U can look up, as shown in FIG. 6, or down, as shown in FIG. 7, to focus on an approaching vehicle. If the user U stops pedaling the stationary bicycle 26, the progression of images stops. The user U may then also turn his or her head to get a better look at any objects in the stationary 360-degree field-of-view of the X direction. Obviously, many modifications and variations of the present invention are possible in light of the above teachings. The invention may be practiced otherwise than as specifically described within the scope of the appended claims, wherein that which is prior art is antecedent to the novelty set forth in the “characterized by” clause. The novelty is meant to be particularly and distinctly recited in the “characterized by” clause whereas the antecedent recitations merely set forth the old and well-known combination in which the invention resides. These antecedent recitations should be interpreted to cover any combination in which the inventive novelty exercises its utility. In addition, the reference numerals in the claims are merely for convenience and are not to be read in any way as limiting.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The subject invention relates generally to virtual reality (VR) systems. The invention relates specifically to VR systems coupled with an exercise apparatus where a user views and interacts with images in an immersion-type fashion. 2. Description of the Related Art Various VR systems are well known in the prior arch in which a user views a plurality of images. Two such VR systems are disclosed in U.S. Pat. No. 5,499,146 (the '146 patent) to Donahe et al. and U.S. Pat. No. 6,244,987 (the '987 patent) to Ohsuga et al. The '146 patent discloses a VR system having an image playback system for storing a plurality of images having a 360-degree field-of-view. The images are previously recorded using a plurality of video cameras and electronically “stitched” together to create the images with the 360-degree field-of-view. The playback system is operatively connected to a display and a directional sensor. The display and directional sensor are mounted to a helmet that is worn by a user. The display shows a portion of each image based on the position of the helmet, as measured by the directional sensor. The plurality of images are sequenced and displayed for the user at a predetermined rate. The '987 patent discloses a VR system having an image playback system for storing a plurality of images. The playback system is operatively connected to a display and a speed sensor. The speed sensor is attached to an exercise apparatus for measuring a speed of a user operating the exercise apparatus. The display presents the plurality of images to the user at a rate determined by the speed measured by the speed apparatus. Although these systems may provide some advantages over other systems, there remains an opportunity for a VR system that provides a more realistic environment of 360-degree images that are dynamically viewed by a user.
<SOH> BRIEF SUMMARY OF THE INVENTION AND ADVANTAGES <EOH>The invention provides a virtual reality (VR) system comprising an image playback system having a storage device for maintaining a plurality of images. Each image has a field-of-view defining an X direction and a Y direction. An image viewing device operatively communicates with the playback system for displaying a portion of the plurality of images to a user. A directional sensor operatively communicates with the playback system for defining a viewing direction of the user in both of the X and Y directions. A forward and rearward moving device defines a Z direction. A speed sensor is operably connected to the moving device and operatively communicates with the playback system for providing a rate of change of the plurality of images in the Z direction. The VR system is characterized by the image playback system having a controller operatively connected to the storage device. The controller simultaneously coordinates the X and Y directions of the directional sensor and the Z direction of the speed sensor. The viewing direction and the rate of change are interlaced to automatically change the plurality of images displayed by the image viewing device in the X, Y, and Z directions when the user moves the directional sensor in at least one of the X and Y directions and simultaneously moves the moving device in the Z direction. The invention also includes a method of operating the VR system. The method includes the steps of maintaining the plurality of images; determining a viewing direction of a user in both of the X and Y directions; displaying a portion of the plurality of images to the user; sensing a rate of change of the plurality of images moving in a Z direction; simultaneously coordinating the X and Y directions and the Z direction; and interlacing the viewing direction and the rate of change for automatically changing the plurality of images in the X, Y, and Z directions as the user changes the viewing direction in at least one of the X and Y directions and simultaneously moves in the Z direction. Accordingly, the invention provides a VR system that automatically reacts to the dynamics of a user simultaneously moving in X, Y, and Z directions by altering the portion of the plurality of images displayed to the user.
20040303
20070529
20050908
94693.0
8
LESPERANCE, JEAN E
VIRTUAL REALITY SYSTEM
UNDISCOUNTED
0
ACCEPTED
2,004
10,792,995
ACCEPTED
Sas piston channel for optimum air scavenging
A piston channel is provided for a piston of an air scavenging internal combustion engine. The channel extends radially inward partially around a circumference of a piston body. An edge wall of the channel is sloped towards a wrist pin aperture in the piston to improve purging efficiency of a transfer duct.
1. An internal combustion engine comprising: a cylinder block; a piston housed and vertically slidable within the cylinder block; a wrist pin aperture extending through the piston; and a piston channel located on the piston, the piston channel having a top edge wall wherein a portion of the top edge wall is sloped towards the wrist pin aperture up to an intersection formed between the top edge wall and an outer sidewall of the piston such that as the piston channel first opens air is directed by the top edge wall to a top corner of a scavenging passagee. 2. The internal combustion engine of claim 1, wherein the piston channel extends radially inward partially around a circumference of the piston and is shaped such that the top edge wall is sloped upward in an outward radial direction. 3. The internal combustion engine of claim 1, wherein the top edge wall is sloped such that an open time between the pistol) channel and a scavenging port is increased. 4. The internal combustion engine of claim 1, wherein the top edge wall is sloped in a direction towards the top corner of the scavenging passage. 5. A piston for an internal combustion engine comprising: a substantially cylindrical piston body; and a piston channel that extends circumferentially around a portion of the piston body and is shaped such that a portion of an edge wall is sloped towards a wrist pin aperture located in the piston up to an intersection formed between the edge wall and an outer sidewall of the piston such that as the piston channel first opens air is directed by the edge wall to a top corner of a scavenging passage. 6. The piston of claim 5, wherein the edge wall of the piston channel is tapered. 7. The piston of claim 5, wherein the edge wall of the piston channel is angled from about ten degrees to about sixty degrees from an axis parallel to a centerline of the wrist pin aperture.
FIELD OF THE INVENTION The present invention relates to engines and more particularly, to a piston channel of an internal combustion engine. BACKGROUND OF THE INVENTION Small two-stroke engines enjoy widespread acceptance in the field of hand-held outdoor equipment due to performance advantages over competing technologies. The main issue with these engines is a potential for high hydrocarbon emissions. In traditional two-stroke engines, incoming fuel mixture (fuel and air) is used to help expel exhaust gases. With stratified scavenging, a fresh air charge is used to expel the exhaust gases. The result is lower emissions and lower fuel consumption. In a stratified scavenging two-stroke internal combustion engine, an air supply is introduced into a combustion chamber of the engine after a combustion event has occurred and before a fuel mixture is delivered from a crankcase chamber of the engine. The air supply facilitates exhausting the combusted gas from the combustion chamber and provides some air to facilitate combustion of the subsequently delivered fuel mixture. SUMMARY OF THE INVENTION The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later. In accordance with an aspect of the present invention, an internal combustion engine is provided. The internal combustion engine includes a cylinder block; a piston housed and vertically slidable within the cylinder block; and a piston channel located on the piston. The piston channel includes an upwardly angled top edge wall. In accordance with another aspect of the present invention, a piston is provided for an internal combustion engine. The piston includes a substantially cylindrical piston body; and a scavenging channel that extends circumferentially around a portion of the piston body and is shaped such that an upper wall of the scavenging channel is angled upward in a outward radial direction. In accordance with yet another aspect of the present invention, an internal combustion engine provided that includes a cylinder block; a piston housed and vertically slidable within the cylinder block; and channel means having an angled top wall for purging a scavenging channel of the engine. To the accomplishment of the foregoing and related ends, the invention then, comprises the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the present invention is intended to include all such aspects and their equivalents. Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates a cross sectional view of a stratified scavenging two-stroke engine in accordance with an aspect of the present invention. FIG. 2 illustrates an angled wall in relation to a transfer duct of a stratified scavenging two-stroke engine with a piston in a first position in accordance with an aspect of the present invention. FIG. 3 illustrates an angled wall in relation to a transfer duct of a stratified scavenging two-stroke engine with a piston in a second position in accordance with an aspect of the present invention. FIG. 4 illustrates a piston of a stratified scavenging two-stroke engine in accordance with an aspect of the present invention. DETAILED DESCRIPTION OF THE INVENTION The present invention relates to a piston channel employed for improved purging of a transfer or scavenging passage. The present invention will now be described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. It is to be appreciated that the various drawings are not drawn to scale from one figure to another nor inside a given figure, and in particular that the size of the components are arbitrarily drawn for facilitating the reading of the drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block form in order to facilitate describing the present invention. Referring initially to FIG. 1, a cross sectional view of a stratified scavenging two-stroke engine 10 is illustrated in accordance with an aspect of the present invention. In particular, FIG. 1 illustrates a cross section through a crankshaft axis and perpendicular to a cylinder axis. A piston 12 is housed and vertically slidable within a cylinder block 14 of the engine 10. The piston 12 includes a piston channel, or kidney, 16 wherein a portion of an edge wall 18 is angled, tapered, or otherwise sloped towards a wrist pin aperture 19 located in the piston 12. For example, the edge wall 18 can have a gradually increasing angle and can be angled from about ten degrees to about sixty degrees from an axis parallel to a centerline of the wrist pin aperture 19. It is contemplated that the angled edge wall 18 facilitates purging of the fuel mixture from a scavenging passage 44, thereby improving emissions output from the engine 10, as will be discussed below. However, it is to be appreciated that other airflow dynamics may help facilitate purging. A crankcase 20 is coupled to an underside portion of the cylinder block 14, and a crank chamber 22 is formed in the crankcase 20. The piston 12 and the cylinder block 14 form a cylinder chamber, or combustion chamber, 26 to which a fuel mixture is fed to be ignited. Provided in a sidewall of the cylinder block 14 are an exhaust port (not shown), which is connected to an exhaust passage (not shown) for exhausting combustion gas after combustion, and a scavenging port 28 for supplying the fuel mixture to the combustion chamber 26. The exhaust port is coupled to a muffler (not shown) via an exhaust pipe (not shown) and the combustion gas is exhausted into the atmosphere as exhaust gas from the muffler. A wrist pin 30 extends through the wrist pin aperture 19, such that the wrist pin 30 pivotally couples the piston 12 with a connecting rod 32. The connecting rod 32 is pivotally connected to a crankshaft 34 by a crankpin (not shown) and can rotate at both ends so that an angle of the connecting rod 32 can change as the piston 12 moves and the crankshaft 34 rotates. The connecting rod 32 includes a large end 36, which encircles rod journals, and a small end 38, which encircles the wrist pin 30. The wrist pin 30 extends transversely through the piston 12 and is secured to the piston 12 by a wrist pin boss 40. Bearings for the wrist pin 30 may be either in the piston 12, the connecting rod 32, or both. The crankshaft 34 is supported for rotation within the crankcase 22 via bearings 41. The crankshaft 34 is operable to deliver rotational force to a portion (e.g., a trimmer head drive shaft, a chainsaw drive shaft) of a power tool. During operation of the engine 10, when the piston 12 begins to ascend from a bottom dead center position, the volume of the crankcase 22 increases. During the piston ascent, the piston 12 closes the exhaust port and the scavenging port 28. As a result, pressure inside the crankcase 22 and a scavenging passage 44 declines, drawing fuel-air mixture into the crankcase 22, and drawing air from an air passage 46 (FIG. 3), through the piston channel 16, into the scavenging passage 44 and then into the crankcase 22. When the piston 12 nears a top dead center position, the fuel-air mixture that was supplied to the combustion chamber 26 in the previous stroke ignites, and when the piston 12 begins to descend, the pressure inside the crankcase 22 rises. Meanwhile, opening the exhaust port and the scavenging port 28 exhausts the combustion gas inside the combustion chamber 26 to the exhaust passage. At substantially the same time, the air inside the scavenging passage 44 jets into the combustion chamber 26, exhausting the remaining combustion gas. The fuel-air mixture that was drawn into the crankcase 22 is supplied into the combustion chamber 26 via the scavenging passage 44 following the air. The piston 12 then reaches the bottom dead center. Turning now to FIGS. 2 and 3, enlarged views of the piston edge wall 18 in relation to the scavenging port 28 are shown with the piston 12 in first and second positions, respectively. In particular, FIGS. 2 and 3 illustrate an airflow pattern between the piston channel 16 and the scavenging passage 44 during ascent of the piston 12 in the cylinder block 14. In FIG. 2, the first piston position is such that the scavenging port 28 is first opened to the piston channel 16. When the piston channel 16 first opens, air enters the scavenging port 28 from the piston channel 16 and fuel mixture is forced out of the scavenging passage 44 back into the crankcase 22. The sloped edge wall 18 of the piston channel 16 increases the open time between the piston channel 16 and the scavenging port 28 while still allowing for support of the wrist pin boss 40. In FIG. 3, the piston is depicted farther up in the total vertical travel. As shown in the example, the angled edge wall 18 in the piston 12 is directed towards a top portion 48 of the scavenging passage 44 when the piston 12 begins to open the passage 44. Accordingly, air from the piston channel 16 flows towards the top portion 48 prior to traveling down the scavenging passage 44. Directing the airflow to the top portion 48 facilitates forcing of remaining fuel mixture back down the scavenging passage 44 and into the crankcase 22. The more effective the scavenging passage 44 can be purged, the less unburned raw emissions results. FIG. 4 illustrates the piston 12 from a side view with the cylinder block 14 removed. The piston 12 includes a substantially cylindrical body wherein the piston channel 16 extends partially around a circumferential periphery of the piston body. More specifically, the piston channel 16 extends radially inward partially around a circumference of the piston body such that the edge wall 18 is sloped upward in an outward radial direction. It is to be appreciated that the piston channel 16 can be of any suitable shape having an edge wall 18 that is sloped towards a wrist pin aperture 19 at the scavenging port 28 opening. The presence of the sloped edge wall 18 in the piston channel 16 facilitates increased purging of the scavenging passage 44 as compared to channels having top walls which are parallel to the centerline of the wrist pin aperture 19. What has been described above includes exemplary implementations of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art will recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Small two-stroke engines enjoy widespread acceptance in the field of hand-held outdoor equipment due to performance advantages over competing technologies. The main issue with these engines is a potential for high hydrocarbon emissions. In traditional two-stroke engines, incoming fuel mixture (fuel and air) is used to help expel exhaust gases. With stratified scavenging, a fresh air charge is used to expel the exhaust gases. The result is lower emissions and lower fuel consumption. In a stratified scavenging two-stroke internal combustion engine, an air supply is introduced into a combustion chamber of the engine after a combustion event has occurred and before a fuel mixture is delivered from a crankcase chamber of the engine. The air supply facilitates exhausting the combusted gas from the combustion chamber and provides some air to facilitate combustion of the subsequently delivered fuel mixture.
<SOH> SUMMARY OF THE INVENTION <EOH>The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later. In accordance with an aspect of the present invention, an internal combustion engine is provided. The internal combustion engine includes a cylinder block; a piston housed and vertically slidable within the cylinder block; and a piston channel located on the piston. The piston channel includes an upwardly angled top edge wall. In accordance with another aspect of the present invention, a piston is provided for an internal combustion engine. The piston includes a substantially cylindrical piston body; and a scavenging channel that extends circumferentially around a portion of the piston body and is shaped such that an upper wall of the scavenging channel is angled upward in a outward radial direction. In accordance with yet another aspect of the present invention, an internal combustion engine provided that includes a cylinder block; a piston housed and vertically slidable within the cylinder block; and channel means having an angled top wall for purging a scavenging channel of the engine. To the accomplishment of the foregoing and related ends, the invention then, comprises the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the present invention is intended to include all such aspects and their equivalents. Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
20040304
20060404
20050908
62582.0
0
ALI, HYDER
SAS PISTON CHANNEL FOR OPTIMUM AIR SCAVENGING
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,302
ACCEPTED
Apparatus and method for operation of a high temperature fuel cell system using recycled anode exhaust
A method for improving the efficiency of a hydrocarbon catalytic reformer and close-coupled fuel cell system by recycling a percentage of the anode exhaust syngas directly into the reformer in a range between about 20% and about 60%. Oxygen is supplied to the reformer at start-up. Under equilibrium conditions, oxygen required for reforming of hydrocarbon fuel is derived entirely from endothermic reforming of water and carbon dioxide in the recycled syngas. Recycling of anode syngas into the reformer increases fuel efficiency, adds excess water to the reformate to increase protection against anode coking, and protects the fuel cell stack against air- and water-borne contaminants. A method for producing an excess amount of syngas for exporting for other purposes is also provided.
1. A fuel cell system for generating electricity by combination of oxygen with hydrogen-containing fuel, comprising: a) a fuel cell stack including cathodes and anodes; and b) a catalytic reformer for reforming hydrocarbon to provide hydrogen-containing reformate fuel to said stack, wherein said stack exhausts syngas, and wherein said system is configured to recycle from about 20% to about 60% of said exhausted syngas into said reformer. 2. A fuel cell system in accordance with claim 1 further including a syngas outlet through which produced syngas may be exported for other purposes. 3. A fuel cell system in accordance with claim 2 further including a controllable hydrocarbon fuel supply to the reformer for controlling the export of produced syngas. 4. A fuel cell system in accordance with claim 1 further including an inline pump for recycling said syngas into said reformer. 5. A fuel system in accordance with claim 4 further including a heat exchanger for cooling said syngas entering said pump. 6. A fuel system in accordance with claim 5 further configured to supply heat removed from said syngas for heating reformer input. 7. A fuel cell system in accordance with claim 1 wherein reforming in said reformer includes endothermic reforming of hydrocarbons in combination with water and carbon dioxide. 8. A fuel cell system in accordance with claim 1 wherein said fuel cells are selected from the group consisting of solid-oxide fuel cells and molten carbonate fuel cells. 9. A vehicle comprising a fuel cell system wherein said fuel cell system includes a fuel cell stack including cathodes and anodes, and a catalytic reformer for reforming hydrocarbon to provide hydrogen-containing reformate fuel to said stack, wherein said stack exhausts syngas, and wherein said system is configured to recycle from about 20% to about 60% of said exhausted syngas into said reformer. 10. A method for operating a high temperature fuel cell system including a fuel cell stack including cathodes and anodes and a catalytic reformer for reforming hydrocarbon to provide hydrogen-containing reformate fuel to said stack, comprising the steps of: a) directing said reformate fuel into said stack assembly; b) exhausting a massflow of syngas from said stack; and c) recycling a portion of said syngas massflow into said reformer, wherein said recycled portion is from about 20% to about 60% of said exhausting syngas massflow. 11. A method in accordance with claim 10 further comprising the step of exporting an amount of said syngas massflow for other purposes. 12. A method in accordance with claim 11 further comprising the step of providing a controllable hydrocarbon fuel supply to the reformer for controlling the amount of syngas massflow available for export. 13. A method in accordance with claim 10 wherein said recycled syngas portion includes water and carbon dioxide, further comprising the step of endothermically reforming said water, said carbon dioxide, and said hydrocarbon in said reformer into hydrogen and carbon monoxide in said reformate fuel.
TECHNICAL FIELD The present invention relates to high temperature fuel cells having a solid-oxide electrolytic layer separating an anode layer from a cathode layer; more particularly, to high temperature fuel cell systems comprising a plurality of individual fuel cells in a stack wherein fuel is provided by an associated catalytic hydrocarbon reformer; and most particularly, to such a fuel cell system wherein steady-state reforming is substantially endothermic and wherein anode tail gas is recycled through the reformer to improve system efficiency. BACKGROUND OF THE INVENTION Fuel cells which generate electric current by controllably combining elemental hydrogen and oxygen are well known. In one form of such a fuel cell, an anodic layer and a cathodic layer are separated by a non-permeable electrolyte formed of a ceramic solid oxide. Such a fuel cell is known in the art as a “solid-oxide fuel cell” (SOFC). It is further known to combine a plurality of such fuel cells into a manifolded structure referred to in the art as a “fuel cell stack” and to provide a partially-oxidized “reformate” fuel to the stack from a hydrocarbon catalytic reformer. Prior art catalytic partial-oxidizing (POX) reformers typically are operated exothermically by using intake air to partially oxidize hydrocarbon fuel as may be represented by the following equation for a hydrocarbon and air: C7H12+3.5(O2+3.77N2)→6H2+7CO+13.22N2+heat. (Eq. 1) Prior art reformers typically are operated slightly fuel-lean of stoichiometric to prevent coking of the anodes from decomposition of non-reformed hydrocarbon within the fuel cell stack. Thus some full combustion of hydrocarbon and reformate occurs within the reformer in addition to, and in competition with, the electrochemical combustion of the fuel cell process. Such full combustion is wasteful of fuel and creates additional heat which must be removed from the reformate and/or stack, typically by passing a superabundance of cooling air through the cathode side of the stack. It is known to produce a reformate containing hydrogen and carbon monoxide by endothermic steam reforming (SR) of hydrocarbon in the presence of water in the so-called “water gas” process, which may be represented by the following equation: C7H12+7H2O+heat→13H2+7CO. (Eq. 2) Many known fuel cell systems use water in the reforming process, either recovered from the fuel cell exhaust or supplied to the system. In the case of recovered water, a large heat exchanger is required to condense the water, adding mass, cost, and parasitic losses to the system. In the case of supplied water, the water must be filtered and deionized, resulting in added cost, complexity, and maintenance requirements. In addition, for vehicular applications, the water must be stored, transported with the reformer, and periodically replenished. It is also known to produce a reformate containing hydrogen and carbon monoxide by endothermic reforming of hydrocarbon in the presence of carbon dioxide in the so-called “dry reforming” process, which may be represented by the following equation: C7H12+7CO2+heat→6H2+14CO. (Eq. 3) High temperature fuel cells inherently produce a combination of direct current electricity, waste heat, and syngas. The syngas, as used herein, is a mixture of unburned reformate, including hydrogen, carbon monoxide, and nitrogen, as well as combustion products such as carbon dioxide and water. In some prior art fuel cell systems, the syngas is burned in an afterburner, and the heat of combustion is partially recovered by heat exchange in heating incoming air for reforming or for the cathodes, or for both. In other prior art fuel cell systems, a portion of the anode syngas is recycled into the anode inlet to the fuel cell, in conjunction with fresh reformate, to improve the overall fuel efficiency of the fuel cell system. What is needed in the art is a means for improving still further the fuel efficiency of a hydrocarbon reformer process. What is also needed in the art is a means for improving the power density of a fuel cell stack. BRIEF DESCRIPTION OF THE INVENTION Briefly described, a method and apparatus for operating a hydrocarbon catalytic reformer and close-coupled fuel cell system in accordance with the invention comprises recycling a percentage of anode syngas into the reformer, preferably in a range between about 20% and 60%. Although air must be supplied to the reformer at start-up, after the system reaches equilibrium operating conditions, some or all of the oxygen required for reforming of hydrocarbon fuel may be derived by endothermically reforming water and carbon dioxide in the syngas. Efficiency is improved over similar prior art fuel cell systems because the water is kept and used in the gas phase, thus obviating the need for a condenser. Recycling of anode syngas into the reformer a) increases fuel efficiency by endothermic reforming of water and carbon dioxide in the syngas in accordance with Equation 2 above; b) adds excess water to the reformate to increase protection against anode coking; and c) provides another opportunity for anode consumption of residual hydrogen and carbon monoxide in the syngas. In addition, this “recycle reformate” provides a more concentrated fuel supply to the stack since little or no air is added to the reformer. Air added to the reforming process adds significant amounts of nitrogen which dilutes the resulting reformate. The higher concentration of fuel gasses in “recycle reformate” increases the power output of the fuel cell stack. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will now be described, by way of example, with reference to the accompanying drawing, in which FIG. 1 is a schematic drawing of a high temperature fuel cell system in accordance with the invention. DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring to FIG. 1, a high temperature fuel cell system 10 as may be suited to use as an auxiliary power unit (APU) in a vehicle 11 includes components known in the art of solid-oxide or molten carbonate fuel cell systems. FIG. 1 is not a comprehensive diagram of all components required for operation but includes only those components novelly formed and/or arranged in accordance with the apparatus and method of the invention. Missing components will be readily inferred by those of ordinary skill in the art. A hydrocarbon catalytic reformer 12 includes a heat exchanger/combustor 14, preferably formed integrally therewith. A fuel cell stack 16 comprises preferably a plurality of individual fuel cell elements connected electrically in series as is known in the art. Stack 16 includes passageways for passage of reformate across the anode surfaces of the stack and passageways for passage of air across the cathode surfaces of the stack, as is well known in the prior art. A cathode air heat exchanger 22 includes an intake air side 24 and a combuster exhaust gas side 26. A pump 28 is provided for recycling a portion 29a, 29b of the anode tail gas 31, or syngas, into an inlet of reformer 12. Optionally, stream portion 29a may be cooled as it enters pump 28 by optional heat exchanger 37. The heat 27 absorbed from stream portion 29a can be used, as for example, for fuel vaporization, and for preheating of reformer inputs. An additional portion 33 of tail gas 31 may also be provided to exchanger/combustor 14, and the balance 35 may be exhausted or diverted to other purposes. Endothermic reforming with syngas recycle may be represented by the following equation, C7H12+9H2O+10.5CO2+heat→10H2+10CO+5H2O+7.5CO2 (Eq. 4) Hydrogen and oxygen, combined to produce water in the electrochemical process of the fuel cell stack, are recovered by endothermic reforming and are used over again, thus greatly increasing the hydrocarbon fuel efficiency of the system. Further, the energy required for the water reforming is derived from the “waste” energy in the anode syngas which in prior art high temperature fuel cells is entirely discarded in the cathode cooling air and/or through the system exhaust. In operation, fuel 15a is controllably supplied from a source (not shown) to an inlet 30 of reformer 12, as is known in the art. Fuel may comprise any conventional or alternative fuel as is known in the art, for example, gasoline, diesel, jet fuel, kerosene, propane, natural gas, carbon, biodiesel, ethanol and methanol. Air 17a is supplied from a source (not shown), such as a blower or other air pump, to intake air side 24 of heat exchanger 22 and thence to stack 16. A portion of air 17a may be diverted selectively around heat exchanger 22 by control valve 32 to control the temperature of the air entering the fuel cell stack. At start-up, fuel 15b and air 17b are also supplied to a reformer pre-heater 34 connected to an inlet 36 on reformer 12. The air/fuel mixture in pre-heater 34 may be combusted therein, as by a spark igniter, or alternatively may be reformed therein upon an electrically-heated catalyst, to provide a hot exhaust for rapid warming of catalytic elements in reformer 12 to provide a rapid start-up of system 10. At a time after start-up when such heating is no longer needed, the air flow and fuel flow to pre-heater 34 may be terminated. Reformate 40 is supplied from reformer 12 to anodes in stack 16. Syngas 31 (anode tail gas) is exhausted from stack 16 and is preferably assisted by inline pump 28. First portion 29 of the exhausted syngas is recycled to an inlet of reformer 12; preferably, recycled portion 29 is between about 20% and about 60% of total syngas flow 31. Second portion 33 of the exhausted syngas is recycled to an inlet of heat exchanger/combustor 14. Heated cathode air 38 is exhausted from stack 16 and is provided to heat exchanger/combustor 14 wherein it is mixed with syngas portion 33 and combusted to provide heat for endothermic reforming of water and carbon dioxide with hydrocarbon fuel in reformer 12. Spent air and combustion products 42 are exhausted from heat exchanger/combustor 14 and passed through exhaust side 26 of heat exchanger 22 wherein heat is abstracted by intake air 17a in inlet side 24. Cooled exhaust is discharged to atmosphere 44. Optionally, additional fuel 15c may be controllably supplied to reformer 12 from a source (not shown) so that a greater portion of tailgas 31 may be exported for other purposes through exhaust 35. Under these or similar steady-state operating conditions, little or no outside air need be provided to reformer 12. Sufficient heat is provided to the reformer from the sensible heat of the recycled tail gas plus combustion of syngas portion 33 to permit endothermic reforming of the input fuel and the water and carbon dioxide in the syngas. Most or all of the needed reforming oxygen is derived from the water and carbon dioxide. The following benefits accrue to a fuel cell system in accordance with the invention: 1. The net fuel/electric efficiency of the system may be substantially increased over prior art high temperature fuel cell systems. Most of the system efficiency improvement is from higher reforming efficiency. Some of the improvement is from higher effective stack fuel utilization. 2. The power density of the stack is increased by increasing the concentration of reactants in the stack and by minimizing concentration polarization by less nitrogen dilution. 3. The system is allowed to operate with a higher margin of safety in terms of carbon formation in the reformer, reformate piping, or stack inlet. 4. The admission of water-borne contaminants on the fuel cell anodes is avoided or eliminated altogether, by eliminating the need for exogenous water and exogenous oxygen. All fuel cells tend to have sensitivities to trace contaminants which come into the system over time in the air, fuel, and/or water consumed in operation. The level of sensitivity depends in part upon the fuel cell technology and the operating temperature. While solid oxide fuel cells tend to have less sensitivity to contaminants than some other types, the accumulation of sulfur, metal oxides, salts, carbon, and other contaminants can lead to long term loss in performance. In endothermic reforming in accordance with the invention, the combustion water and oxygen are chemically pure, resulting from generation within the fuel cell system itself. Using recycled anode exhaust as the steady-state oxidant for the system allows a near fully endothermic (using only recycle) reforming process. Depending upon the selected operating temperature for the stack and reformer, the efficiency of heat recovery in the final exhaust and the minimization of thermal losses to the walls, there may not always be a balance between heat required to preheat the reactants and do the endothermic chemistry with heat available through simple heat exchange from the cathode exhaust. Therefore, a portion of the anode exhaust which is not recycled into the reformer may be used as shown to supply combustive heat to the reformer to support the endothermic reforming process. Reformate is a highly useful fuel which in itself can be exported for use on other apparatus, for combustion and/or exhaust after-treatment functions. It is possible to operate the reformer to produce excess reformate for these additional uses. To further improve the fuel cell system efficiency, the exported reformate may be taken from downstream of the stack, with reduced fuel utilization in the stack resulting in improved stack efficiency. If this export periodically is not necessary (e.g., vehicle engine or other reformate consumer is off) then the reformate volume can be reduced to just the amount required by the fuel cell stack with higher utilization. While the invention has been described by reference to specific embodiments, it should be understood that numerous changes may be made within the spirit and scope of the inventive concepts described. Accordingly, it is intended that the invention not be limited to the described embodiments, but will have full scope defined by the language of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Fuel cells which generate electric current by controllably combining elemental hydrogen and oxygen are well known. In one form of such a fuel cell, an anodic layer and a cathodic layer are separated by a non-permeable electrolyte formed of a ceramic solid oxide. Such a fuel cell is known in the art as a “solid-oxide fuel cell” (SOFC). It is further known to combine a plurality of such fuel cells into a manifolded structure referred to in the art as a “fuel cell stack” and to provide a partially-oxidized “reformate” fuel to the stack from a hydrocarbon catalytic reformer. Prior art catalytic partial-oxidizing (POX) reformers typically are operated exothermically by using intake air to partially oxidize hydrocarbon fuel as may be represented by the following equation for a hydrocarbon and air: in-line-formulae description="In-line Formulae" end="lead"? C 7 H 12 +3.5(O 2 +3.77N 2 )→6H 2 +7CO+13.22N 2 +heat.  (Eq. 1) in-line-formulae description="In-line Formulae" end="tail"? Prior art reformers typically are operated slightly fuel-lean of stoichiometric to prevent coking of the anodes from decomposition of non-reformed hydrocarbon within the fuel cell stack. Thus some full combustion of hydrocarbon and reformate occurs within the reformer in addition to, and in competition with, the electrochemical combustion of the fuel cell process. Such full combustion is wasteful of fuel and creates additional heat which must be removed from the reformate and/or stack, typically by passing a superabundance of cooling air through the cathode side of the stack. It is known to produce a reformate containing hydrogen and carbon monoxide by endothermic steam reforming (SR) of hydrocarbon in the presence of water in the so-called “water gas” process, which may be represented by the following equation: in-line-formulae description="In-line Formulae" end="lead"? C 7 H 12 +7H 2 O+heat→13H 2+7 CO.  (Eq. 2) in-line-formulae description="In-line Formulae" end="tail"? Many known fuel cell systems use water in the reforming process, either recovered from the fuel cell exhaust or supplied to the system. In the case of recovered water, a large heat exchanger is required to condense the water, adding mass, cost, and parasitic losses to the system. In the case of supplied water, the water must be filtered and deionized, resulting in added cost, complexity, and maintenance requirements. In addition, for vehicular applications, the water must be stored, transported with the reformer, and periodically replenished. It is also known to produce a reformate containing hydrogen and carbon monoxide by endothermic reforming of hydrocarbon in the presence of carbon dioxide in the so-called “dry reforming” process, which may be represented by the following equation: in-line-formulae description="In-line Formulae" end="lead"? C 7 H 12 +7CO 2 +heat→6H 2 +14CO.  (Eq. 3) in-line-formulae description="In-line Formulae" end="tail"? High temperature fuel cells inherently produce a combination of direct current electricity, waste heat, and syngas. The syngas, as used herein, is a mixture of unburned reformate, including hydrogen, carbon monoxide, and nitrogen, as well as combustion products such as carbon dioxide and water. In some prior art fuel cell systems, the syngas is burned in an afterburner, and the heat of combustion is partially recovered by heat exchange in heating incoming air for reforming or for the cathodes, or for both. In other prior art fuel cell systems, a portion of the anode syngas is recycled into the anode inlet to the fuel cell, in conjunction with fresh reformate, to improve the overall fuel efficiency of the fuel cell system. What is needed in the art is a means for improving still further the fuel efficiency of a hydrocarbon reformer process. What is also needed in the art is a means for improving the power density of a fuel cell stack.
<SOH> BRIEF DESCRIPTION OF THE INVENTION <EOH>Briefly described, a method and apparatus for operating a hydrocarbon catalytic reformer and close-coupled fuel cell system in accordance with the invention comprises recycling a percentage of anode syngas into the reformer, preferably in a range between about 20% and 60%. Although air must be supplied to the reformer at start-up, after the system reaches equilibrium operating conditions, some or all of the oxygen required for reforming of hydrocarbon fuel may be derived by endothermically reforming water and carbon dioxide in the syngas. Efficiency is improved over similar prior art fuel cell systems because the water is kept and used in the gas phase, thus obviating the need for a condenser. Recycling of anode syngas into the reformer a) increases fuel efficiency by endothermic reforming of water and carbon dioxide in the syngas in accordance with Equation 2 above; b) adds excess water to the reformate to increase protection against anode coking; and c) provides another opportunity for anode consumption of residual hydrogen and carbon monoxide in the syngas. In addition, this “recycle reformate” provides a more concentrated fuel supply to the stack since little or no air is added to the reformer. Air added to the reforming process adds significant amounts of nitrogen which dilutes the resulting reformate. The higher concentration of fuel gasses in “recycle reformate” increases the power output of the fuel cell stack.
20040304
20080205
20050908
71686.0
0
WILLS, MONIQUE M
APPARATUS AND METHOD FOR OPERATION OF A HIGH TEMPERATURE FUEL CELL SYSTEM USING RECYCLED ANODE EXHAUST
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,350
ACCEPTED
Method and system to model, measure, recalibrate, and optimize control of the drilling of a borehole
Methods and systems for controlling the drilling of a borehole are disclosed. The methods employ the assumption that nonlinear problems can be modeled using linear equations for a local region. Common filters can be used to determine the coefficients for the linear equation. Results from the calculations can be used to modify the drilling path for the borehole. Although the calculation/modification process can be done continuously, it is better to perform the process at discrete intervals along the borehole in order to maximize drilling efficiency.
1. A method of drilling a borehole, comprising: providing a model; drilling a discrete interval of a borehole based upon the model; and modifying the model based on data obtained during drilling. 2. The method of claim 1, wherein the model is the drill string whirl model. 3. The method of claim 1, wherein the model is the torque/drag/bucking model. 4. The method of claim 1, wherein the model is the BHA dynamics model. 5. The method of claim 1, wherein the model is the geosteering model. 6. The method of claim 1, wherein the model is the hydraulics model. 7. The method of claim 1, wherein the model is the geomechanics model 8. The method of claim 1, wherein the model is the pore pressure/fracture gradient model. 9. The method of claim 1, wherein the model is the SFIP model. 10. The method of claim 1, wherein the step of modifying comprises: separating the inclinometer data from the magnetometer data. 11. The method of claim 1, wherein the step of modifying comprises: resampling data on a regular grid. 12. The method of claim 1, wherein the step of modifying comprises: filtering observed data. 13. The method of claim 1, wherein the step of modifying comprises: estimating noise. 14. The method of claim 1, wherein the step of modifying comprises: mapping y values. 15. The method of claim 1, wherein the step of modifying comprises: determining one or more linear state variables. 16. The method of claim 1, wherein the step of modifying comprises: estimating statistics. 17. The method of claim 1, wherein the step of modifying comprises: constructing estimators. 18. A method of drilling a borehole, comprising: providing a model; drilling a discrete interval of a borehole based upon the model; modifying the model based on data obtained during drilling by: separating the inclinometer data from the magnetometer data; resampling data on a regular grid; filtering observed data; estimating noise; mapping y values; determining one or more linear state variables; estimating statistics; and constructing estimators. 19. The method of claim 18, wherein the model is the drill string whirl model. 20. The method of claim 18, wherein the model is the torque/drag/bucking model. 21. The method of claim 18, wherein the model is the BHA dynamics model. 22. The method of claim 18, wherein the model is the geosteering model. 23. The method of claim 18, wherein the model is the hydraulics model. 24. The method of claim 18, wherein the model is the geomechanics model 25. The method of claim 18, wherein the model is the pore pressure/fracture gradient model. 26. The method of claim 18, wherein the model is the SFIP model. 27. A computer-readable storage medium containing a set of instructions for a general purpose computer, the set of instructions comprising: an input routine operatively associated with one or more sensors; a run routine for implementing an update method; and an output routine for controlling a drilling operation. 28. The storage medium of claim 27, wherein the run routine is constructed and arranged to: separate the inclinometer data from the magnetometer data; resample data on a regular grid; filter observed data; estimate noise; map y values; determe one or more linear state variables; estimate statistics; and construct estimators.
BACKGROUND The present invention relates to the field of borehole drilling for the production of hydrocarbons from subsurface formations. In particular, the present invention relates to systems that modify the drilling process based upon information gathered during the drilling process. As oil well drilling becomes more and more complex, the importance of maintaining control over as much of the drilling equipment as possible increases in importance. There is, therefore, a need in the art to infer the actual borehole trajectory from the measurements made by existing systems. There is also a need in the art to project the borehole trajectory beyond the greatest measured depth as a function of the control parameters. BRIEF DESCRIPTION OF THE DRAWINGS A more complete understanding of the present disclosure and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings, wherein: FIG. 1a is a diagram of a bottom hole assembly according to the teachings of the present invention. FIG. 1b is a diagram of the bottom hole assembly at two points along the borehole according to the teachings of the present invention. FIG. 1c is a diagram illustrating the change in attitude of the bottom hole assembly after encountering a curve in the borehole. FIG. 2 is a flowchart of the method the present invention. FIG. 3 shows a system for surface real-time processing of downhole data. FIG. 4 shows a logical representation of a system for surface real-time processing of downhole data. FIG. 5 shows a data flow diagram for a system for surface real-time processing of downhole data. FIG. 6 shows a block diagram for a sensor module. FIG. 7 shows a block diagram for a controllable element module. While the present invention is susceptible to various modifications and alternative forms, specific exemplary embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims. DETAILED DESCRIPTION The description that follows is better understood in conjunction with the following terms: ( ) after a matrix over variables encloses the index of a sample number corresponding to that specific state or matrix. α is a weighting factor used in the symmetrical, exponential filter of equations (9) and (10). A is a matrix in the state vector formulation which governs the underlying physics. bx is the near magnetometer x-axis bias, which includes magnetic interference. by is the near magnetometer y-axis bias, which includes magnetic interference. bz is the near magnetometer z-axis bias, which includes magnetic interference. B is a matrix in the state vector formulation which governs the relation between the control variables and the state of the system. c is the number of control parameters. C is a matrix in the state vector formulation which governs the relation between the observables, y and the state of the system, x. {tilde over (C)} is an augmented version of C which makes it possible to include sensor bias without significantly reformulating the problem (refer to equation ({tilde over (2)}) and the discussion around it). CF is a sub matrix of matrix C containing those matrix elements pertaining to the far inclinometers/magnetometers (“inc/mag”) package. {tilde over (C)}N is a sub matrix of matrix {tilde over (C)} containing those matrix elements pertaining to the near inc/mag package. D is a matrix in the state vector formulation which governs the relation between the system noise, w and the state vector, x. For simplicity, D has been set to the identity matrix. E( ) is used to denote “expected value of”. F as a subscript refers to the far inclinometer/magnetometer package. H(Ω,α,ξ) is a spatial frequency domain transfer function for the symmetrical exponential filter of equations (9) and (10). The spatial frequency Ω is expressed in terms of the spatial sampling frequency. i is an arbitrary sample index. I as a subscript refers to an inclinometer package. Ik×k is the k×k identity matrix. K is the Kalman gain, defined recursively through equations (15)-(17) (see below). m is an arbitrary sample index. M is an integer offset used in the resampling. The resampling is carried out such that the far sensor lags the near sensor by M samples. M as a subscript refers to a magnetometer package. n is an index used to designate the latest available sample. N as a subscript refers to the near inclinometer/magnetometer package. P is a variable in the Kalman predictor equations defined recursively via equations (16) and (17) (see below). Rv is the cross-correlation matrix for noise process v. Rw is the cross-correlation matrix for noise process w. ξ is the number of samples on either side of the central sample in the symmetrical exponential filter of equations (9) and (10) (see below). sx is the near magnetometer x-axis scale factor. sy is the near magnetometer y-axis scale factor. sz is the near magnetometer z-axis scale factor (the z-axis is conventionally taken as the tool axis). w is a vector representing the system noise. In general, the dimensionality of w may be different from that of x, but due to our ignorance of the system, it has been set to that of x. x x(i)denotes the state vector corresponding to the ith sample of the system. For a given sample, x had 6 components in the initial formulation of the problem. These six components corresponded to the outputs an ideal inclinometer/magnetometer package would have were it to follow the borehole trajectory in space. With the remapping discussed on pages 6 and 7, x has 12 elements for a given sample. A specific tool face angle must be assumed in specifying x. {tilde over (x)} is an augmented version of the 6 component state vector x which makes it possible to include sensor bias without significantly reformulating the problem (refer to equation ({tilde over (2)}) and the discussion around it). {tilde over (x)} has 7 elements instead of 6; the extra element is set to 1. {haeck over (x)} is a filtered version of x , discussed more fully on page 5 in relation to equations (9) and (10) (see below). {circumflex over (x)} is the Kalman predictor of the state vector x. Note that in the renumbering of the near and far variables so as to bring them to a common point in space, this vector has 12 elements at each sample. y is the vector corresponding to the measurements. y has 12 components. The first six components come from the near inc/mag package; the second six components come from the far inc/mag package. yN consists of the near elements of y, i.e., the first six elements of y. yF consists of the far elements of y, i.e., the last six elements of y. {tilde over (y)}F is an augmented version of the vector yF (refer to equation (6) and the discussion around it). To obtain hydrocarbons such as oil and gas, boreholes are drilled by rotating a drill bit that is attached to the end of the drill string. A large proportion of drilling activity involves directional drilling, i.e., drilling deviated and/or horizontal boreholes, in order to increase the hydrocarbon production from underground formations. Modern directional drilling systems generally employ a drill string having a bottom hole assembly (“BHA”) and a drill bit at end thereof that is rotated by a drill motor (mud motor) and/or the drill string. A number of downhole devices placed in close proximity to the drill bit measure certain downhole operating parameters associated with the drill string. Such devices typically include sensors for measuring downhole temperature and pressure, azimuth and inclination measuring devices and a resistivity-measuring device to determine the presence of hydrocarbons and water. Additional downhole instruments, known as logging-while-drilling (“LWD”) tools, are frequently attached to the drill string to determine the formation geology and formation fluid conditions during the drilling operations. Pressurized drilling fluid (commonly known as the “mud” or “drilling mud”) is pumped into the drill pipe to rotate the drill motor and to provide lubrication to various members of the drill string including the drill bit. The drill pipe is rotated by a prime mover, such as a motor, to facilitate directional drilling and to drill vertical boreholes. The drill bit is typically coupled to a bearing assembly having a drive shaft that in turn rotates the drill bit attached thereto. Radial and axial bearings in the bearing assembly provide support to the radial and axial forces of the drill bit. Boreholes are usually drilled along predetermined paths and the drilling of a typical borehole proceeds through various formations. The drilling operator typically controls the surface-controlled drilling parameters, such as the weight on bit, drilling fluid flow through the drill pipe, the drill string rotational speed (r.p.m. of the surface motor coupled to the drill pipe) and the density and viscosity of the drilling fluid to optimize the drilling operations. The downhole operating conditions continually change and the operator must react to such changes and adjust the surface-controlled parameters to optimize the drilling operations. For drilling a borehole in a virgin region, the operator typically has seismic survey plots which provide a macro picture of the subsurface formations and a pre-planned borehole path. For drilling multiple boreholes in the same formation, the operator also has information about the previously drilled boreholes in the same formation. Additionally, various downhole sensors and associated electronic circuitry deployed in the BHA continually provide information to the operator about certain downhole operating conditions, condition of various elements of the drill string and information about the formation through which the borehole is being drilled. Halliburton Energy Services of Houston, Tex. has developed a system, called “ANACONDA™” to aid in the drilling of boreholes. ANACONDA is a trademark of Halliburton Energy Services of Houston, Tex. The ANACONDA™ system has two sets of sensor packages, one for inclination and one for magnetic called the inclinometers and the magnetometers (“inc/mag”). One set of sensor packages is fitted close to the bend in the tool, and thus close to magnetic interference, the second package is placed farther up hole, far from the bend and thus far from magnetic interference. There are three control points in the ANACONDA™ system: a. The bend, which can be controlled in two dimensions; b A first packer, which can be inflated or not; and c. A second packer, which operates the same or similarly to the first packer and which may be separated by a variable distance from the first package. Given a system such as this, it will now be shown that the information which is sought can be viewed as solutions for a state vector. The general equations for a linear state variable are given by described in “Signal Processing Systems, Theory and Design,” N. Kalouptsidis, A Wiley-Interscience Publication, John Wiley & Sons, Inc., New York, 1997 as: x(n+1)=A(n)·x(n)+B(n)·u(n)+D(n)·w(n) (1) y(n)=C(n)·x(n)+v(n) (2) Where: The vectors x(i) represent successive states of the system. These states are, in general, not known, but inferred. The vectors u(i) represent the measurable input signal, assumed to be deterministic. The u(i) represent the controls to the system. The vectors y(i) represent the output of the system (a measurable vector) w(n) represents the process noise v(n) represents the measurement noise The matrices A, B, C and D are determined by the underlying physics and mechanisms employed in the drilling process. Equation (1) perfectly reflects the problem at hand if we take the vector x(n) to be the set of 6 measurements an ideal survey sensor would make in surveying the borehole at sample point n. The vector u(n) would be the vector of control variables applied at survey point n, namely the two bend angles of the BHA, the depth, the inflation of each of the packers, and the separation of the packers (and any other control variables). Finally, the vector y(n) would be the set of 12 measurements from the near and far inc/mag packages. The true borehole trajectory, if it were known, could be described by a set of inclination and azimuth values versus depth. Alternatively, the borehole trajectory could be described in terms of the outputs from an ideal, noiseless inc/mag package at each of the measured depths (as a detail, it would be necessary to specify the tool face for such a package). Each set of measurements, at each depth, constitutes a state vector (six measurements at each depth, three from the inclinometers, three from the magnetometers). It is anticipated that, at least locally, the response of the system as formulated will be linear when the borehole is expressed in terms of a succession of these state vectors. The state vectors themselves can be obtained via a series of matrix transformations which are nonlinear functions of the inclination, azimuth and tool face. It is this nonlinearity which makes it desirable to express the state vectors in terms of an ideal sensor rather than the true angular coordinates. There are several difficulties with directly carrying forward a solution of the problem as formulated. While it should be possible to formulate the matrices A, B, C, and D using drill string mechanics, this is an extremely difficult problem. It appears most practical to estimate these matrices based on experience, but the vectors x(n) are never known. This is actually the core of the problem; means must be devised to operate as though the x(n) are known. In addition, the noise processes are not known, although reasonable guesses can be made for these processes, and these guesses can be modified based on experience. Furthermore, in the body of available literature dealing with such systems, it is always assumed that the noise sources have zero mean. This is a very poor assumption for the problem at hand in which the magnetometers near the bit are likely to experience magnetic interference. All needed theorems can be reworked in terms of noise sources with non-zero mean, but the resulting equations are often extremely cumbrous. Many of the prior art systems use a “continuous measure/continuous-update procedure. Unfortunately, continuous correction often leads to excessive levels of micro-tortuosity, which results in increased annoyingly drag on the dill bit and erratic boreholes. Drilling programs are often conducted in accordance with a pre-drilling model of the subterranean conditions and the intended path of the borehole or other borehole parameters. Models which may be used include the Drillstring Whirl Model, Torque/Drag/Buckling Model, BHA Dynamics Model, Geosteering Model, Hydraulics Model, Geomechanics (rock strength) Model, pore pressure/fracture gradient (“PP/FG”) Model, and the SFIP Model. Current methods do not provide a means to readily update the model based on downhole conditions sensed while drilling. In this new method, measured borehole data, possibly including data newly available because of increased bandwidth, would be sent to the surface during drilling. The data would be processed at the surface to update or recalibrate the current model to which the drilling program is being conducted. The control for the drilling program would then be updated to reflect the updated model. In one method, the model and instructions for the drilling program would be stored in a downhole device. After revising the model at the surface, information to update the stored downhole model, likely a much smaller quantity of information than the raw measured borehole data, would be transmitted downhole, whereupon the drilling program would then be continued as determined based upon the new model. Seismic analysis techniques are useful for obtaining a course description of subsurface structures. Downhole sensors are more precise, but have far more limited range than the seismic analysis techniques. Correlation between original estimates based upon seismic analysis and readings from downhole sensors enable more accurate drilling. The correlation can be made more effective if performed in an automated manner, typically by use of a digital computer. The computations for the correlation can take place on the surface, or downhole, or some combination thereof, depending upon the bandwidth available between the downhole components and the surface, and the operating environment downhole. A drill string is instrumented with a plurality of survey sensors at a plurality of spacings along a drill string. Surveys are taken continuously during the survey process from each of the surveying stations. These surveys can be analyzed individually using techniques such as, for example, IFR or IIFR. In addition to providing an accurate survey of the borehole, it is desired to provide predictions of where the drilling assembly is headed. Note that the surveys from the survey sensors located at different positions along the drill string will not, in general, coincide with each other when they have been adjusted for the difference in measured depth between these sensors. This is due in part to sensor noise, in part to fluctuations in the earth's magnetic field (in the case where magnetic sensors are used—but gyroscopes can be used in place or, or in addition to magnetic sensors), but mostly due to drill string deflection. As is illustrated below, in a curved borehole, drill string deflection causes successive surveys to be different. This difference is related to the drill string stiffness, to the curvature of the borehole, and the forces acting on the drill string. As an alternative (but preferred) embodiment, torque, bending moment, and tension measurements are also made at a plurality of locations along the drill string, preferably located near the plurality of survey sensors. All of this information can then be coupled with a mechanical model (based on standard mechanics of deformable materials and on borehole mechanics) to predict the drilling tendency of the bit. Given all of the variables and uncertainties in the drilling process, it is believed that this problem is best approached from a signal processing standpoint. Other disclosures discuss the improved downhole data available as a result of improved data bandwidth, e.g., the receipt and analysis of data from sensors spaced along the drill string (e.g., multiple pressure sensors) and the receipt and analysis of data from a point at or near the drill bit (e.g., cutter stress or force data). Such data may be used for real time control of drilling systems at the surface. For example, one could ascertain information about the material being drilled from analysis at the surface of information from bit sensors. Based on the data, one might chose to control in a particular manner the weight on bit or speed of bit rotation. One might also use such information to control downhole devices. For example, one might control from uphole, using such data, a downhole drilling device with actuators, e.g., a hole enlargement device, rotary steerable device, device with adjustable control nozzles, or an adjustable stabilizer. One might actively control downhole elements e.g., bite (adjusting bit nozzles), adjustable stabilizers, clutches, etc. FIG. 1 illustrates the various components of the BHA. Referring specifically to FIG. 1a, the BHA 100 has a bit 102 that is connected at bend 104 to the motor element 103 which may or may not be operated during drilling, depending upon whether or not the borehole is to be bent. The BHA 100 is connected to the surface drilling rig via pipe 105. Various sensors 106, 108 and 110 can be attached to the BHA 100 as illustrated in FIG. 1a. In particular, sensors 108 and 110 are spaced a predetermined (or variable) distance apart. The separation distance between sensors 108 and 110 is necessary for measuring the attitude of the BHA 100 at various points along the borehole 120. FIG. 1b illustrates the BHA 100 at two different positions along the borehole 120. At the initial position 130 (farther up the borehole 120), the BHA 100 has a particular attitude with respect to the Earth. Farther down the borehole at position 140, the attitude is changed because of the curvature of the borehole 120. The absolute position of the BHA 100 with respect to the Earth has changed a negligible amount, but the attitude (amount of rotation about one or more axis with respect to the Earth) of the BHA 100 has changed appreciably because of the curvature of the borehole 120. FIG. 1c illustrates the attitude difference by overlaying the BHA 100 at the two different positions 130 (solid line) and 140 (dashed line and prime element numbers). Referring to FIG. 1c, and taking sensor 108 as a “pivot point,” sensor 106′ is “higher” than sensor 106, and sensor 110′ is “lower” than sensor 110. In other words, the sensor's attitude between themselves with respect to the Earth is different at different points along the borehole, particularly in curves. The difference in attitude between the sensors 106, 108 and 110 and the fixed reference point (Earth) at various points along the borehole is measurable. Because the attitude difference is measurable, that difference can be used to determine the actual direction of the borehole, and that directional information, in conjunction with the location of the desired destination, can be used to “correct” the subsequent drilling direction of the BHA 100 using the equations identified below. The equations identified below can be implemented on, for example, a digital computer that is incorporated into the system of the present invention in order to make a tangible contribution toward a more useful borehole and/or increase the efficiency of the drilling process. Distributed acoustic telemetry might be used to determine locations of unintended wall contact, for example, by actively pinging the drill pipe between two sensor locations. Acoustic sensors could also be used for passive listening for washouts in the pipe. A washout can happen anywhere and locating the washout can require slow tripping and careful examination of the drill pipe. Multiple sensors will help locate the washout. Such monitoring could also assist in identification of the location of key seats by monitoring the change in acoustic signature from sensor to sensor. Such analysis might also assist in locating swelling shales to limit requirements for backreaming operations. The availability and analysis of such data would allow for hole conditioning precisely where problem area is located. Such data might also be useful when not actually drilling, for example in a mode when the drill bit is rotating and off bottom, out of the pilot hole possibly—for example insert and swab or other operations that aren't directly affecting the drilling process. Data might be used to control the rate at which you move the pipe, the trip speed, to make sure you are not surging or swabbing. By having data from multiple sensors, e.g., pressure sensors, some would be swabbing and some would be surging if there is something going on in between them. In addition, high data rate BHA sensors for rotation and vibration might provide information that would mitigate against destructive BHA behaviors. The Matrix {tilde over (C)} By its nature, it is not possible to provide an analytical formulation of the matrix {tilde over (C)} since this must include the unknown and variable magnetic interference to the system. If properly formulated, it is reasonable to assume that E(v(i))=0 ∀i, where E( ) is used to denote expected value. Now consider ∑ i = 1 n ⁢ ⁢ y ⁡ ( i ) = ∑ i = 1 n ⁢ ⁢ C ~ ⁡ ( i ) · x ~ ⁡ ( i ) + ∑ i = 1 n ⁢ ⁢ v ⁡ ( i ) If we assume that {tilde over (C)}(i) is approximately constant over the summation interval, and if n is sufficiently large, we can rewrite this as ∑ i = 1 n ⁢ ⁢ y ⁡ ( i ) = C ~ ⁡ ( n ) · ∑ i = 1 n ⁢ x ~ ⁡ ( i ) + n · E ⁡ ( v ⁡ ( i ) ) ⁢ ⁢ or ⁢ ∑ i = 1 n ⁢ ⁢ y ⁡ ( i ) = C ~ ⁡ ( n ) · ∑ i = 1 n ⁢ x ~ ⁡ ( i ) There is an implicit assumption here that both the near and far packages have their tool faces aligned in the same direction as the tool face angle selected for the vectors x(i). This detail can be dealt with in the actual programming of a digital computer. Likewise, we will be assuming that there are no cross-axial couplings between any of the sensors. This is a calibration issue, not a signal processing issue. There should not be any cross-coupling between the near and far instrument packages, or between the inclinometers and magnetometers, so in reality, the equation can be rewritten as two equations of the form ∑ i = 1 n ⁢ ⁢ y N ⁡ ( i ) = C ~ N ⁢ ( n ) · ∑ i = 1 n ⁢ x ~ ⁡ ( i ) ⁢ ⁢ and ( 3 ) ∑ i = 1 n ⁢ ⁢ y F ⁡ ( i ) = C F ⁡ ( n ) · ∑ i = 1 n ⁢ x ⁡ ( i ) ( 4 ) where the subscript N refers to measurements made by the instrument package near the bit, and the subscript F refers to measurements made by the instrument package farther from the bit and where the matrix {tilde over (C)}N(n) represents the transform from true borehole coordinates to the near sensor package and makes up the first six rows of matrix {tilde over (C)}(n) and the matrix CF(n) represents the transform from true borehole coordinates to the far sensor package and makes up the last six rows of the matrix C(n) (note that the added terms from the bias are not included for the far sensor since it is assumed that the far sensor experiences no interference). Since there should not be any cross-coupling between the inclinometer and the magnetometer packages, the matrix {tilde over (C)}N(n) should be sparse and CF(n) should be block diagonal. At this point, we must face the practical reality that the x(i) are not known. The following appears to be the only practical way of dealing with this issue, with respect to the determination of {tilde over (C)}. Assume explicitly that the far instrument package reads the true borehole trajectory, at least in the sense that ∑ i = 1 n ⁢ ⁢ y F ⁡ ( i ) ≈ ∑ i = 1 n ⁢ x ⁡ ( i ) ( 5 ) This implies that we accept the approximation CF≈I6×6CF≈I6×6, where I6×6 is the 6×6 identity matrix. The implications of this will be discussed later, but it will be remarked at this point that although it appears we are obviating the near measurements, this is not quite so, for a further re-ordering of the vectors will be required before the remaining matrices can be determined. One of the biggest issues in formulating this problem has been deriving any useful information from the near survey package. The proposed formulation is capable in principle of using this extra information, although there is certainly some question as to how much true information is added by these sensors. After the discussion of how all matrices and noise processes are estimated has been completed, a summary of all of the relevant steps and assumptions will be made. We can now write ∑ i = 1 n ⁢ ⁢ y N ⁡ ( i ) = C ~ N ⁡ ( n ) · ∑ i = 1 n ⁢ y ~ F ⁡ ( i ) ( 6 ) where {tilde over (y)}F is an augmented version of yF that is obtained by adding a seventh element equal to unity. Other than random noise, which has been averaged out in the vector v(n), the accelerometers in the near package should read the same as the accelerometers in the far package assuming there is no deflection of the BHA section containing both instrument packages. This may not be a valid assumption, but this portion of the BHA should be more rigid than the portion above the far instrument package (if this turns out to be problematic, an iterative approach can be pursued in which the borehole trajectory obtained at each stage of the iteration is used to define a coordinate rotation between the two packages). With this approximation, we obtain the two equations ∑ i = 1 n ⁢ ⁢ y NI ⁡ ( i ) = C NI ⁡ ( n ) · ∑ i = 1 n ⁢ y FI ⁡ ( i ) ⁢ ⁢ or ⁢ ∑ i = 1 n ⁢ ⁢ y NI ⁡ ( i ) = ∑ i = 1 n ⁢ y FI ⁡ ( i ) since CNI=I3×3 where I3×3 is the 3×3 identity matrix. Therefore: ∑ i = 1 n ⁢ ⁢ y NM ⁡ ( i ) = C ~ NM ⁡ ( n ) · ∑ i = 1 n ⁢ y ~ FM ⁡ ( i ) ( 7 ) In these expressions, the additional subscript I designates inclinometer package, and the additional subscript M designates the magnetometer package. There should be no errors in the inclinometer packages that haven't been taken care of in the calibration, so the augment notation has been dropped for that package and CNI has been set to the 3×3 identity matrix. Any magnetic materials resident in the drill string near a magnetometer will add an offset to each of the three components. This will appear as a bias. Any magnetic materials housing a magnetometer package will modify the scale factors of the magnetometers within the package. Therefore, the matrix {tilde over (C)}NM(n) has the following form: C ~ NM ⁡ ( n ) = ( s x ⁡ ( n ) 0 0 b x ⁡ ( n ) 0 s y ⁡ ( n ) 0 b y ⁡ ( n ) 0 0 s z ⁡ ( n ) b z ⁡ ( n ) ) ( 8 ) Two sets of measurements will need to be summed to determine the six coefficients. Alternatively, the coefficients can be determined using the least squares method. The biases are the parameters most likely to change with time, while the scale factors should remain fairly constant and can be determined less frequently. If there are no materials shielding the near magnetometers, the scale factors can be set to the scale factors that were obtained in the calibration of the near magnetometer. The Noise Processes v(i) The common assumptions for such processes are that they are stationary, white and uncorrelated. It is doubtful that these assumptions are valid for the system at hand. Because the noise statistics, and possibly even the distribution will vary with lithology, bit type and condition, and weight on bit, the statistics can only be assumed to be quasi stationary. If information on these variables is available, they can also be included in the control variables for the state vector. This should improve system performance. Since the disturbances on most of the sensors will have a common source, it is reasonable to believe they will be correlated. It should be possible to estimate v(i) by examining the data, but it will be necessary to modify the way the data are processed. Because of the way we were forced to define {tilde over (C)}(n), the true borehole trajectory was assumed to map directly to the far measurements. This causes the system noise to be present in our estimators of the state vectors. The constraint which leads to this, equation (5), also provides the way out of this problem. Equation (5) provides an equality between filtered responses. Hence, we can satisfy Eq. (5) by filtering the outputs of the far sensors. The precise form of the filter can be worked out quite easily once the spatial sampling rate and the spatial resolution desired are known. However, there are some important details: 1. This only makes sense if the power spectrum of the noise peaks at a significantly shorter wavelength than the power spectrum of the borehole trajectory. 2. In order to avoid any lag between the input and output of this filter, it is best to use a symmetrical filter. That is, the x(n) should be estimated from data obtained at equal distances on both sides of point n. In those cases where there are not enough (or no) data points available from the far sensor ahead of point n, then corrected data from the near sensor must be used. In order to avoid any lag between the input and output of this filter, it is best to use a symmetrical filter. That is, the x(n) should be estimated from data that are obtained at equal distances on both sides of point n. In those cases where there are not enough (or no) data points available from the far sensor ahead of point n, then corrected data from the near sensor must be used. Generally, a symmetrical weighted sum exponential filter can be used. With such a filter, x ⋓ ⁡ ( n ) i = 1 - α 1 + α · ( 1 - 2 · α ξ ) · ∑ k = 0 2 - ξ ⁢ ⁢ α  k - ξ  · y ⁡ ( n + ξ - k ) i + 6 ( 9 ) For later reference, the transfer function of such a filter is given by: H ⁡ ( Ω , α , ξ ) = 1 - α 1 + α · ( 1 - 2 · α ξ ) · 1 - α 2 - 2 · α ξ + 1 · cos ( Ω · ( ξ + 1 ) ) + 2 · α ξ + 2 · cos ⁡ ( Ω · ξ ) 1 + α 2 - 2 · α · cos ⁡ ( Ω ) ( 10 ) Where the following notation has been used: {haeck over (x)}(n)i is the ith component of an estimator of the nth sample of the state of the system; i=1 . . . 6. A different type of estimator will be defined later with a different notation. Ω is the spatial frequency at which the transfer function is calculated, expressed as a ratio of the physical spatial frequency (samples/unit length) to the spatial sampling frequency in the same units. α is a weighting factor, 0<α<1. Other values can be used, but they will not be useful for the problem at hand. A good initial guess is α=½. ξ is the number of samples included in the filter before and after sample n. With this transformation, the noise process v(i) can be observed and characterized using: v(n)=y(n)−{tilde over (C)}(n)·{haeck over (x)}(n) (11) By observing successive values of v(n), it is possible to examine the distributions of each of the six processes and estimate their cross-correlations, which will be needed in implementing a Kalman predictor. The Matrices A and B The decision whether it makes more sense to use a Kalman type predictor or a brute force least squares approach to the problem at hand is determined mostly by our ability to provide estimators of the matrices A and B. As the solution has been formulated thus far, we already have an estimator of the state x of the system. However, this estimator is simply a low frequency version of the measured response; the underlying physics is not taken into account in any way. The functions of the matrices A and B are to account for the physics governing the bend of the tool and the borehole trajectory and the controls to the system. As the problem has been formulated thus far, there probably isn't enough information to include the physics since the bias and scale factor error in the first six elements of y was derived by assuming that the BHA containing the near and the far elements is rigid compared to the rest of the system. If this assumption is correct, the near and the far sensors provide the same information for any sample i. Can any use be made of the near sensors? It is clear from FIG. 1c that the near sensor does provide additional information, and this information can be used by making another modification to the formulation of the state and measurement vectors. FIG. 1b illustrates two successive positions of the BHA. If the borehole is curved, it is evident that, even with ideal sensor packages, the outputs of a sensor package in the near position will differ from those of a far sensor package when measurements are made with each package at the same point in the borehole. By re-ordering the state vector y so that all of the elements refer to a given point in space, it should be possible to make use of this information. A similar re-ordering must be made of the measurement vector, x, but now x must be expanded such that each state vector x(i) has 12 elements: 6 from the near sensor at point i, and 6 from the far sensor as re-mapped. All of the data must be resampled onto a regular grid to allow this to happen. It will be assumed that the resampling noise is small. Any number of readily obtainable resampling algorithms can be used for this purpose. It is best that this be done on a regular grid and that the spacing between the near and far sensors is an integer multiple, M of the spacing between grid elements. Also, the spacing between grid elements should be approximately equal to the average spacing between samples and should by no means be less than this spacing. As noted earlier, it is not anticipated that the system response will be linear, but it is anticipated that it will be locally linear, i.e., that it will act in a linear fashion from one state to the next. The matrices A(i) and B(i) appropriate for a given x(i) can be obtained by modifying the control variables u(i) and observing the predicted value of x(i+1) over at least as many variations of the control parameters as there are unknowns in the system. Each matrix A(i) has 144 unknowns (it is a 12×12 matrix), while each matrix B(i) has 12c unknowns, where c is the number of control variables (each B(i) is a 12×c matrix). Least squares techniques can be used if the number of variations made in the control parameters is more than the number of unknowns. It is desirable for the matrices A(n) and B(n) to sparse matrices and the number of actual unknowns is considerably less than 12·((12+c). However, this will need to be established either analytically or empirically. The following criticisms with responses are offered to this technique. 1. It is obvious that we are no longer solving for the borehole trajectory, which was one of the original objectives. In point of fact, no one ever has anything but a model for a borehole trajectory. The information gained with the proposed method should provide the best information to use any of the standard borehole modeling techniques, such as the minimum curvature method. (With the large volume of data available from the drilling system, it may be possible to develop better interpretation methods.) 2. Perhaps a more serious critique is that equations (1) and (2) are treated as uncoupled equations. The reason this can be problematic is that the Kalman predictor makes use of the matrix C. C should also be re-ordered with the re-ordering of the state vector. As a practical matter, this may not be necessary since C is assumed to be quasi-stationary, and hence the submatrices constituting C are quasi-stationary. Nevertheless, a re-ordering of C could be tried in practice to see if any improvement is obtained. It is conceivable that it will be necessary to use {tilde over (C)} instead of C if the variations in the near magnetometer biases are rapid and related to the system controls. In that case, the x, A, B, D and w will need to be suitably augmented; it is not anticipated that this will add any unknowns to these vectors or matrices. 3. The formulation does not appear to address the real problem at hand, namely the prediction of the state vector from the greatest measured depth within a borehole. The near sensor makes measurements closest to the greatest measured depth, while the far sensor lags (M samples on the resampled grid) behind it. Hence, it would seem that the state space formulation cannot be used when it's really needed due to the lack of knowledge from the far sensor. This is not the case. The partial knowledge from the near sensors can be used with a Kalman predictor to provide estimates of the state at the points where data are missing from the far sensors. These estimates can be used directly as estimates of the readings from the far sensor. It should be noted that this technique offers a very large advantage: it possible with this formulation to input a proposed set of control variables and examine the resulting state vector using Kalman prediction routines. Determination of D(n) and w(n) Unless the specific causes of the noise processes w(n) are known, it is only possible to solve for D(n)·w(n). We in fact don't even know the dimensionality of either term. About all that can be done is to set D(n)=I12×12 and assume that w(n) is a 12×1 column vector. Then the statistics can be enumerated using past data and the equation w(n)=x(n+1)−A(n)·x(n)−B(n)·u(n) (12) Summary of Analysis Each step in the analysis was discussed in fair detail in the preceding sections. In this section, an overview is presented of the analysis. To simplify processing, a few of steps will be presented in a different order from that used above. In addition, the Kalman predictor will be introduced. This was not introduced earlier because no discussion is needed of the predictor once its terms have been defined. Reference is made to FIG. 2, which illustrates the overall method of the invention. The method 200 begins generally at step 202. In step 204, the inclinometer data is separated from the magnetometer data. To do so, one begins with the series yN(i) and yF(i), for i=0 . . . n where n designates the latest available sample. There are the near (sensor 108 of FIG. 1) and far (sensor 110) inc/mag readings, respectively. The inclinometer data and the magnetometer data are then separated by constructing yFM(i) as the argument set of vectors of the far magnetometer readings. Using equations (7) and (8) (defined above), and the method of least squares, one can determine {tilde over (C)}NM(i) and from that, construct {tilde over (C)}(i) and C(i). In step 206, the data is resampled on a regular grid. This step is performed with M samples between the near and the far sensor packages. In step 208, the observed, resampled data is filtered. Specifically, the variables α and ε are specified. The observed/resampled data are then spacially filtered by calculating {haeck over (x)}(i)j using equation (9). The amount of noise is estimated in step 210 in order to allow for bias correction. To estimate the statistics of the noise w(i), noting that D(i)=I6×6, one would use equation (12) to determine the values of w(i). Then the value of E(w(i)) and E(w(i)·w(j)) are determined. In step 212, the y values are mapped for shifted measure. Specifically, y values are mapped such that each far measurement references the same point in space as each near measurement. This involves shifting the far measurements by M samples: yFar re-mapped(i)=yFar(i+M), i=1 . . . n−M where n is the index of the last available data value. The resulting data (which has been resampled, filtered, bias corrected and shifted measure) is then used to determine the direction of subsequent drilling of the BHA 100 in step 214. Specifically, one uses (in the form as x(i), i=1 . . . n−M) the resampled, filtered, bias corrected and shifted measured values. Thereafter, A and B (matrices of the linear state variables) are determined using equation (1) and the method of least squares. The input control variables u(i) from each of the measurements can be used as input values. In step 216, the statistics of v(i) are estimated using equation (11). Specifically, E(v(n)), E(v(n)·v(m)) are estimated. The estimators are constructed in step 218. As in step 214, the input control variables u(i) from each of the measurements can be used as input values. In step 218, the estimators of the states n−M+1 . . . n are constructed by recursively applying the following equations: {circumflex over (x)}(i+1)=[A(i)−K(i)·C(i)]·{circumflex over (X)}(i)+B(i)·u(i)+K(i)·y(i) (13) (use {tilde over (y)}(i) when y(i) is not available) ŷ(i)=C(i)·{circumflex over (x)}(i) (14) K(i)=A(i)·P(i)·CT(i)·[C(i)·P(i)CT(i)+Rv(i)]−1 (15) P(i)=[A(i)−K(i)·C(i)]·P(i)·[A(i)−K(i)·C(i)]T+Rw(i)+K(i)·Rv(i)·K(i)T (16) P(0)=Cov(x(0),x(0)) (17) which are used to determine {circumflex over (x)}. In these expressions, Rv(i) is the correlation matrix of the vector v(i), and Rw(i) is the correlation matrix of the vector w(i) estimated from their statistics. These are assumed to be quasi-stationary and diagonal. As noted earlier, it is unlikely that true diagonality will be achieved. It is suggested that the Kalman algorithm be tried with the covariances as estimated with no attempt at diagonalization. Once the missing information due to the lag of the far sensors has been estimated using the recursion discussed above, equations (13)-(17) can again be applied recursively from any end point to project the behavior of the system as a function of the control variables. The only difference is that, in this case, the values of y are also projected using the Kalman equations. While the above method has been given as a series of discrete steps, it will be understood that the steps illustrated above are but one example of the method of the present invention, and that variations of the method, such as reordering steps and/or the substitution of one or more equations are possible without departing from the spirit and scope of the invention. If it is desirable at that point along the borehole, the results of the above computations can be used, in step 220, to revise the drilling direction. In other words, the information gathered along the drill string can be used to modify the drilling vector and/or be used to modify the current model that is used to direct the drilling activity (to form an updated model). As mentioned before, the modification of the drilling model can occur continuously, or at discrete intervals along the borehole (based on time and/or distance). A check is made at step 222 to determine if the drilling (and thus the borehole) is complete. If so, the method ends generally at step 222. Otherwise, the method reverts back to step 204 and the method resumes. While this process can be repeated continually along the borehole, it is better to make course corrections at discrete intervals along the borehole. While making course corrections only at discrete intervals may lead to a longer drill string, there are benefits to avoiding continuous course correction. For instance, discrete course corrections oftentimes leads to less “kinky” boreholes that are easier to use once drilled. Moreover, the drilling efficiency between the discrete course corrections can be significantly higher than with drill strings that are continuously corrected. See, e.g., “Toruosity versus Micro-Tortuosity—Why Little Things Mean a Lot” by Tom Gaynor, et al., SPE/IADC 67818 (2001). The above method, and alternate embodiments thereof, can be implemented as a set of instructions on, for example, a general purpose computer. General purpose computers include, among other things, digital computers having, for example, one or more central processing units. The central processing units can be in a personal computer, or microcontrollers embedded within the BHP, or some other device or combination of devices. The general purpose computers used to implement the method of the present invention can be fitted into or connected with any number of devices (for decentralized computing) and can be networked, be placed on a grid, or perform the calculations in a stand-alone fashion. The computer used for implementing the method of the present invention can be fitted with display screens for output to a user, and/or can be connected directly to control units that control the character and manner of drilling. Moreover, the computer system that implements the method of the present invention can include input devices that enable a user to impart instructions, data, or commands to the implementing device in order to control or to otherwise utilize the information and control capability possible with the present invention. The computer system that implements the present invention can also be fitted with system memory, persistent storage capacity, or any other device or peripheral that can be connected to the central processing unit and/or a network to which the computer system operates. Finally, the method of the present invention can be implemented in software, in hardware, or any combination of hardware and software. The software can be stored upon a machine-readable storage medium, such as a compact disk (“CD”), floppy disk, digital versatile disk (“DVD”), memory stick, etc. The method of the present invention can be implemented on the system illustrated in FIG. 3. The oil well drilling equipment 300 (simplified for ease of understanding) includes a derrick 305, derrick floor 310, draw works 315 (schematically represented by the drilling line and the traveling block), hook 320, swivel 325, kelly joint 330, rotary table 335, drill string 340, drill collar 345, LWD tool or tools 350, and drill bit 355. Mud is injected into the swivel by a mud supply line (not shown). The mud travels through the kelly joint 330, drill string 340, drill collars 345, and LWD tool(s) 350, and exits through jets or nozzles in the drill bit 355. The mud then flows up the annulus between the drill string and the wall of the borehole 360. A mud return line 365 returns mud from the borehole 360 and circulates it to a mud pit (not shown) and back to the mud supply line (not shown). The combination of the drill collar 345, LWD tool(s) 350, and drill bit 355 is known as the bottom hole assembly (or “BHA”) 100 (see FIG. 1a). A number of downhole sensor modules and downhole controllable elements modules 370 are distributed along the drill string 340, with the distribution depending on the type of sensor or type of downhole controllable element. Other downhole sensor modules and downhole controllable element modules 375 are located in the drill collar 345 or the LWD tools. Still other downhole sensor modules and downhole controllable element modules 380 are located in the bit 380. The downhole sensors incorporated in the downhole sensor modules, as discussed below, include acoustic sensors, magnetic sensors, calipers, electrodes, gamma ray detectors, density sensors, neutron sensors, dipmeters, imaging sensors, and other sensors useful in well logging and well drilling. The downhole controllable elements incorporated in the downhole controllable element modules, as discussed below, include transducers, such as acoustic transducers, or other forms of transmitters, such as gamma ray sources and neutron sources, and actuators, such as valves, ports, brakes, clutches, thrusters, bumper subs, extendable stabilizers, extendable rollers, extendible feet, etc. The sensor modules and downhole controllable element modules communicate with a surface real-time processor 385 through communications media 390. The communications media can be a wire, a cable, a waveguide, a fiber, or any other media that allows high data rates. Communications over the communications media 390 can be in the form of network communications, using, for example Ethernet, with each of the sensor modules and downhole controllable element modules being addressable individually or in groups. Alternatively, communications can be point-to-point. Whatever form it takes, the communications media 390 provides high speed data communication between the devices in the borehole 360 and the surface real-time processor. The surface real-time processor 385 also has data communication, via communications media 390 or another route, with surface sensor modules and surface controllable element modules 395. The surface sensors, which are incorporated in the surface sensor modules as discussed below, include, for example, weight-on-bit sensors and rotation speed sensors. The surface controllable elements, which are incorporated in the surface controllable element modules, as discussed below, include, for example, controls for the draw works 315 and the rotary table 335. The surface real-time processor 385 also includes a terminal 397, which may have capabilities ranging from those of a dumb terminal to those of a workstation. The terminal 397 allows a user to interact with the surface real-time processor 385. The terminal 397 may be local to the surface real-time processor 385 or it may be remotely located and in communication with the surface real-time processor 385 via telephone, a cellular network, a satellite, the Internet, another network, or any combination of these. As illustrated by the logical schematic of the system in FIG. 4, the communications media 390 provides high speed communications between the surface sensors and controllable elements 395, the downhole sensor modules and controllable element modules 370, 375, 380, and the surface real-time processor 385. In some cases, the communications from one downhole sensor module or controllable element module 405 may be relayed through another downhole sensor module or downhole controllable element module 410. The link between the two downhole sensor modules or downhole controllable element modules 405 and 410 may be part of the communications media 390. Similarly, communications from one surface sensor module or surface controllable element module 415 may be relayed through another downhole sensor module or downhole controllable element module 420. The link between the two downhole sensor modules or downhole controllable element modules 415 and 420 may be part of the communications media 390. The communications media 390 may be a single communications path or it may be more than one. For example, one communications path, e.g. cabling, may connect the surface sensors and controllable elements 395 to the surface real-time processor 385. Another, e.g. wired pipe, may connect the downhole sensors and controllable elements 395 to the surface real-time processor 385. The communications media 390 is labeled “high speed” on FIG. 4. This designation indicates that the communications media 390 operates at a speed sufficient to allow real-time control, through the surface real time processor 385, of the surface controllable elements and the downhole controllable elements based on signals from the surface sensors and the surface controllable elements. Generally, the high speed communications media 390 provides communications at a rate greater than that provided by mud telemetry. In some example systems, the high speed communications are provided by wired pipe, which at the time of filing was capable of transmitting data at a rate of approximately 1 megabit/second. Considerably higher data rates are expected in the future and fall within the scope of this disclosure and the appended claims. A general system for real-time control of downhole and surface logging while drilling operations using data collected from downhole sensors and surface sensors, illustrated in FIG. 5, includes downhole sensor module(s) 505 and surface sensor module(s) 510. Raw data is collected from the downhole sensor module(s) 505 and sent to the surface (block 515) where it is stored in a surface raw data store 520. Similarly, raw data is collected from the surface sensor module(s) 510 and stored in the surface raw data store 520. Raw data from the surface raw data store 520 is then processed in real time (block 525) and the processed data is stored in a surface processed data store 530. The processed data is used to generate control commands (block 535). In some cases, the system provides displays to a user 540 through, for example, terminal 397, who can influence the generation of the control commands. The control commands are used to control downhole controllable elements 545 and surface controllable elements 550. In many cases, the control commands produce changes or otherwise influence what is detected by the downhole sensors and the surface sensors, and consequently the signals that they produce. This control loop from the sensors through the real-time processor to the controllable elements and back to the sensors allows intelligent control of logging while drilling operations. In many cases, as described below, proper operation of the control loops requires a high speed communication media and a real-time surface processor. Generally, the high-speed communications media 390 permits data to be transmitted to the surface where it can be processed by the surface real-time processor 385. The surface real-time processor 385, in turn, may produce commands that can be transmitted to the downhole sensors and downhole controllable elements to affect the operation of the drilling equipment. Moving the processing to the surface and eliminating much, if not all, of the downhole processing makes it possible in some cases to reduce the diameter of the drill string producing a smaller diameter well bore than would otherwise be reasonable. This allows a given suite of downhole sensors (and their associated tools or other vehicles) to be used in a wider variety of applications and markets. Further, locating much, if not all, of the processing at the surface reduces the number of temperature-sensitive components that must operate in the severe environment encountered as a well is being drilled. Few components are available which operate at high temperatures (above about 200° C.) and design and testing of these components is very expensive. Hence, it is desirable to use as few high temperature components as possible. Further, locating much, if not all, of the processing at the surface improves the reliability of the downhole design because there are fewer downhole parts. Further, such designs allow a few common elements to be incorporated in an array of sensors. This higher volume use of a few components results in a cost reduction in these components. An example sensor module 600, illustrated in FIG. 6, includes, at a minimum, a sensor device or devices 605 and an interface to the communications medium 610 (which is described in more detail with respect to FIGS. 6 and 7). In most cases, the output of each sensor device 605 is an analog signal and generally the interface to the communications media 610 is digital. An analog to digital converter (ADC) 615 is provided to make that conversion. If the sensor device 605 produces a digital output or if the interface to the communications media 610 can communicate an analog signal through the communications media 390, the ADC 615 is not necessary. A microcontroller 620 may also be included. If it is included, the microcontroller 620 manages some or all of the other devices in the example sensor module 600. For example, if the sensor device 605 has one or more controllable parameters, such as frequency response or sensitivity, the microcontroller 620 may be programmed to control those parameters. The control may be independent, based on programming included in memory attached to the microcontroller 620, or the control may be provided remotely through the high-speed communications media 390 and the interface to the communications media 610. Alternatively, if a microcontroller 620 is not present, the same types of controls may be provided through the high-speed communications media 390 and the interface to communications media 610. The sensor module 600 may also include an azimuth sensor 625, which produces an output related to the azimuthal orientation of the sensor module 600, which is itself related to the orientation of the drill string because the sensor modules are coupled to the drill string. Data from the azimuth sensor 625 is compiled by the microcontroller 620, if one is present, and sent to the surface through the interface to the communications media 610 and the high-speed communications media 390. Data from the azimuth sensor 625 may need to be digitized before it can be presented to the microcontroller 620. If so, one or more additional ADCs (not shown) would be included for that purpose. At the surface, the surface processor 385 combines the azimuthal information with other information related to the depth of the sensor module 600 to identify the location of the sensor module 600 in the earth. As that information is compiled, the surface processor (or some other processor) can compile a good map of the borehole. The sensor module 600 may also include a gyroscope 630, which provides orientation information in three axes rather than just the single axis information provided by the azimuth sensor 625. The information from the gyroscope is handled in the same manner as the azimuthal information from the azimuth sensor, as described above. An example controllable element module 700, shown in FIG. 7, includes, at a minimum, an actuator 705 and/or a transmitter device or devices 710 and an interface to the communications media 715. The actuator 705 is one of the actuators described above and may be activated through application of a signal from, for example, a microcontroller 720, which is similar in function to the microcontroller 620 shown in FIG. 6. The transmitter device is a device that transmits a form of energy in response to the application of an analog signal. An example of a transmitter device is an piezoelectric acoustic transmitter that converts an analog electric signal into acoustic energy by deforming a piezoelectric crystal. In the example controllable element module 700 illustrated in FIG. 7, the microcontroller 720 generates the signal that is to drive the transmitter device 710. Generally, the microcontroller generates a digital signal and the transmitter device is driven by an analog signal. In those instances, a digital-to-analog converter (“DAC”) 725 is necessary to convert the digital signal output of the microcontroller 720 to the analog signal to drive the transmitter device 710. The example controllable element module 700 may include an azimuth sensor 730 or a gyroscope 735, which are similar to those described above in the description of the sensor module 600. The interface to the communications media 615, 715 can take a variety of forms. In general, the interface to the communications media 615, 715 is a simple communication device and protocol built from, for example, (a) discrete components with high temperature tolerances or (b) from programmable logic devices (“PLDs”) with high temperature tolerances. The above-described computer system can be used in conjunction with the method of the present invention. The method of the present invention can be reduced to a set of instructions that can run on a general purpose computer, such as computer 397. The set of instructions can comprise an input routine that can be operatively associated with one or more sensors along the drill string and/or the BHP. Similarly, the input routine can accept instructions from a user via one or more input devices, such as a keyboard, mouse, trackball, or other input device. The set of instructions can also include a run routine that implements the method of the present invention or any part thereof to generate, for example, an updated model. The set of instructions can include an output routine that displays information, such as the results of the method of the present invention, to a user, such as through a monitor, printer, generated electronic file, or other device. Similarly, the output routine can be operatively associated with control elements of the drill string and other drilling equipment in order to direct the drilling operation or any portion thereof. The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. The foregoing description is not intended to be exhaustive, or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.
<SOH> BACKGROUND <EOH>The present invention relates to the field of borehole drilling for the production of hydrocarbons from subsurface formations. In particular, the present invention relates to systems that modify the drilling process based upon information gathered during the drilling process. As oil well drilling becomes more and more complex, the importance of maintaining control over as much of the drilling equipment as possible increases in importance. There is, therefore, a need in the art to infer the actual borehole trajectory from the measurements made by existing systems. There is also a need in the art to project the borehole trajectory beyond the greatest measured depth as a function of the control parameters.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>A more complete understanding of the present disclosure and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings, wherein: FIG. 1 a is a diagram of a bottom hole assembly according to the teachings of the present invention. FIG. 1 b is a diagram of the bottom hole assembly at two points along the borehole according to the teachings of the present invention. FIG. 1 c is a diagram illustrating the change in attitude of the bottom hole assembly after encountering a curve in the borehole. FIG. 2 is a flowchart of the method the present invention. FIG. 3 shows a system for surface real-time processing of downhole data. FIG. 4 shows a logical representation of a system for surface real-time processing of downhole data. FIG. 5 shows a data flow diagram for a system for surface real-time processing of downhole data. FIG. 6 shows a block diagram for a sensor module. FIG. 7 shows a block diagram for a controllable element module. detailed-description description="Detailed Description" end="lead"? While the present invention is susceptible to various modifications and alternative forms, specific exemplary embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
20040304
20060530
20050908
64551.0
0
MCELHENY JR, DONALD E
METHOD AND SYSTEM TO MODEL, MEASURE, RECALIBRATE, AND OPTIMIZE CONTROL OF THE DRILLING OF A BOREHOLE
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,369
ACCEPTED
System and method for storing, assembling and transporting a canopy
A method for disassembling and packaging the canopy in a container, wherein the length of the container is 25% shorter than the length of each of the upright assemblies. As a result, the length of the container is significantly short as compared with prior art containers. To accommodate the shortened length, the width and/or the height of the container may be increased as necessary to still house all of the components of the canopy. Preferably, the length of the container is sufficiently short to accommodate placing the container in a traditional sedan automobile trunk.
1. A canopy kit for storage, transport and assembly such that the canopy kit can be easily manufactured, displayed and purchased, the canopy kit comprising: four vertical posts, each vertical post including a first portion operatively connectable to a second portion for erecting such that a length of the four vertical posts can be selectively reduced; three horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion; four arch cross rails, each arch cross rail including a first portion removably connectable to a second portion; a plurality of frame connectors for connecting the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the four vertical posts; a tarp for covering the frame of the peaked roof; means for attaching the tarp to the frame of the peaked roof; and an elongated box having a length, a width and a height, the elongated box length being sufficient to house the first and second portions of the vertical posts, horizontal cross rails and arch cross rails, and the width and the height being sufficient to house the plurality of frame connectors, the tarp and the means for attaching. 2. A canopy kit as recited in claim 1, wherein the first and second portions of the vertical posts, horizontal cross rails and arch cross rails are approximately 41 inches and the length of the elongated box is approximately 42 inches. 3. A canopy kit as recited in claim 2, further comprising a third portion of each of the four horizontal cross rails, the third portion removably connectable to the second portion thereof. 4. A canopy kit as recited in claim 1, further comprising four base feet connectable to the first portion of the four vertical posts for stabilizing each vertical post and a strip for protecting the tarp. 5. A canopy kit as recited in claim 4, wherein a canopy assembled from the canopy kit is at least 9 feet wide by at least 9 feet deep, wherein the horizontal cross rails are at least 6 feet above the base feet. 6. A canopy kit as recited in claim 1, wherein the means for attaching is a ball bungee cord. 7. A canopy kit as recited in claim 1, wherein the first portions of the vertical posts, horizontal cross rails and arch cross rails have a smaller neck for insertion with the corresponding second portions of the vertical posts, horizontal cross rails and arch cross rails. 8. A canopy kit as recited in claim 7, further comprising means on the second portions of the vertical posts, horizontal cross rails and arch cross rails for engaging a hole formed in the smaller neck of the corresponding first portions of the vertical posts, horizontal cross rails and arch cross rails. 9. A canopy kit as recited in claim 8, wherein the means is a push button device. 10. A canopy kit as recited in claim 1, wherein the frame connectors include three-way connectors and four-way connectors. 11. A canopy kit as recited in claim 1, wherein the length of the container for storage is approximately no more than 75% of a length of the four vertical posts. 12. A canopy kit as recited in claim 1, wherein the length of the container for storage is approximately no more than 50% of a length of the four vertical posts. 13. A canopy kit as recited in claim 1, wherein wherein the vertical posts, horizontal cross rails, arch cross rails, and frame connectors are fabricated from steel. 14. A canopy kit for storage, the canopy kit comprising: six vertical posts, each vertical post including a first portion removably connectable to a second portion; six horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion; six arch cross rails, each arch cross rail including a first portion removably connectable to a second portion; a plurality of frame connectors for connecting the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the six vertical posts; a tarp for covering the frame of the peaked roof; means for attaching the tarp to the frame of the peaked roof; and an elongated box having a length, a width and a height, the length being at least 25% shorter than a fuill length of the vertical posts and the width and the height being sufficient to house the plurality of frame connectors, the tarp, the horizontal cross rails, the arch cross rails, and the means for attaching. 15. A canopy kit as recited in claim 14, wherein a canopy assembled from the canopy kit is approximately 10 feet wide by approximately 20 feet deep by approximately 9.5 feet high. 16. A canopy kit as recited in claim 15, wherein the length of the elongated box is approximately than 60 inches. 17. A canopy kit as recited in claim 15, wherein the length of the elongated box is approximately 43 inches. 18. A canopy kit for storage, the canopy kit comprising: eight vertical posts, each vertical post including means for reducing a length thereof by at least 20%; eight horizontal cross rails, each horizontal cross rail including means for reducing a length thereof; six arch cross rails, each arch cross rail including means for reducing a length thereof; a plurality of frame connectors for connecting the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the eight vertical posts; a tarp for covering the frame of the peaked roof; bungee cords for attaching the tarp to the frame of the peaked roof; and an elongated box having a length, a width and a height, the length being sufficient to house the reduced vertical posts and horizontal cross rails, and the width and the height being sufficient to house the plurality of frame connectors, the tarp, the arch cross rails and the bungee cords. 19. A canopy kit as recited in claim 18, wherein the means for reducing a length thereof is a plurality of first portions removably connectable to a plurality of corresponding second portions. 20. A canopy kit as recited in claim 18, wherein the plurality of frame connectors are nested in a line for reducing a length of the line and covered by at least a portion of the eight vertical posts, the eight horizontal cross rails and the six arch cross rails.
CROSS-REFERENCE TO A RELATED APPLICATION This application relates to U.S. patent application Ser. No. 10/282,283, filed Oct. 28, 2002 and published as US 2003/0084934 A1, which is incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The subject disclosure relates to systems and methods for assembling and packing canopies, and more particularly to improved systems and methods for reducing the size of a container required to store, display and transport one or more canopies. 2. Background of the Related Art Use of canopies to protect a variety of items from the elements has been widely used and well understood in the art. Typical items include cars, boats, recreational vehicles, and picnic tables just to name a few. Some examples of packages for canopies are illustrated in U.S. Pat. Nos. 5,730,281; 6,141,902; and 6,679,009 each of which is incorporated herein by reference in its entirety. The prior art illustrates a canopies, greenhouses and shelters being packed in container. Packaged, the containers vary in size from 11×6.5×70 inches to 10×11×86 inches to 84×96×48 inches. None of the prior art containers for such buildings can be efficiently packaged for transport by the manufacturer, attractively displayed in a variety of locations by the retailer or transported in the trunk of a traditional sedan automobile by the purchaser. For instance, a 70 inch container cannot be easily displayed at the end of an aisle by the retailer. With a 70 inch container, a portion of the 70 inch container extends out of the trunk of a sedan automobile for transport. There is a need, therefore, for an improved storage and assembly system and method which permits compact storage and transport while still allowing easy assembly, and aids in assuring adequate structural integrity when assembled. SUMMARY OF THE INVENTION In a preferred embodiment, a canopy kit stores, transports and assembles such that the canopy kit can be easily manufactured, displayed and purchased. The canopy kit includes four vertical posts, each vertical post including a first portion removably connectable to a second portion, three horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion, and four arch cross rails, each arch cross rail including a first portion removably connectable to a second portion. The canopy kit also includes a plurality of frame connectors for connect the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the four vertical posts. A tarp of the canopy kit is for covering the frame of the peaked roof. The canopy kit also includes means for attaching the tarp to the frame of the peaked roof and an elongated box having a length, a width and a height. The length being sufficient to house the first and second portions of the vertical posts, horizontal cross rails and arch cross rails, and the width and the height being sufficient to house the plurality of frame connectors, the tarp and the means for attaching. In another preferred embodiment, a canopy kit includes six vertical posts, each vertical post including a first portion removably connectable to a second portion, six horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion, and six arch cross rails, each arch cross rail including a first portion removably connectable to a second portion. The canopy kit also includes a plurality of frame connectors for connecting the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the six vertical posts as well as a tarp for covering the frame of the peaked roof. Means for attaching the tarp to the frame of the peaked roof and an elongated box having a length, a width and a height are also included in the canopy kit. The length of the elongated box is at least 25% shorter than a full length of the vertical posts, and the width and the height are sufficient to house the plurality of frame connectors, the tarp, the horizontal cross rails, the arch cross rails, and the means for attaching. It is an aspect of the subject disclosure to provide a method for boxing a canopy so that the box can be easily transported, stored and displayed while reducing the likelihood of damage to the components of the canopy. It should be appreciated that the present invention can be implemented and utilized in numerous ways. These and other unique features of the system disclosed herein will become more readily apparent from the following description and the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS So that those having ordinary skill in the art to which the disclosed system appertains will more readily understand how to make and use the same, reference may be had to the drawings wherein: FIG. 1 is a perspective view of an assembled canopy constructed in accordance with the subject disclosure. FIG. 2 is an exploded view of the roof frame portion of the canopy of FIG. 1. FIG. 3 is an exploded view of an upright assembly of the canopy of FIG. 1. FIG. 3A is an exploded view of an upright assembly of another canopy constructed in accordance with the subject disclosure. FIGS. 4-12 are a sequence of perspective views illustrating a method for packing the canopy of FIG. 1 in a container. FIG. 13 is a cross-sectional view of a container filled by the sequence of FIGS. 4-12. FIG. 14 is an exploded view of a roof frame portion of an eight legged canopy constructed in accordance with the subject disclosure. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS The present invention overcomes many of the prior art problems associated with kits for housing canopies. The advantages, and other features of the system disclosed herein, will become more readily apparent to those having ordinary skill in the art from the following detailed description of certain preferred embodiments taken in conjunction with the drawings which set forth representative embodiments of the present invention and wherein like reference numerals identify similar structural elements. Referring to FIG. 1, an assembled canopy is referred to generally by the reference numeral 100. The canopy 100 provides shelter from the elements yet can be easily assembled and deconstructed for easy storage, transport and display. In a preferred embodiment, the canopy 100 is 10 feet wide by 20 feet long by 9.5 feet high. The canopy 100 includes a roof frame portion 102 covered by a resilient tarp 104. In a preferred embodiment, the tarp 104 is attached to the roof frame portion 102 by ball bungee cords 124 as shown in U.S. patent application Ser. No. 10/282,283 filed Oct. 28, 2002 which is incorporated herein by reference in its entirety. The roof frame portion 102 is supported by six upright assemblies 106. Referring to FIG. 2, roof frame portion 102 includes a plurality of 3-way connectors 108 and 4-way connectors 110 for interconnecting horizontal rail assemblies 112 and arch rail assemblies 114. Preferably, the connectors 108, 110 are sized to receive the rail assemblies 112, 114 and define holes for receiving push button devices mounted on the rail assemblies 112, 114. The horizontal rail assemblies 112 include three portions 116a-c. Portions 116b and 116c have smaller necks with push button devices to facilitate insertion and coupling. The arch rail assemblies 114 include two portions 118a and 118b. Similar to the horizontal rail assemblies 112, the two portions 118a and 118b of the arch rail assemblies 114 have smaller necks with push buttons. For simplicity and clarity, only enough reference numerals with tag lines that are sufficient for understanding have been shown. Referring now to FIG. 3, an upright assembly 106 has two tubular portions 120a and 120b that interconnect by insertion. To accomplish the insertion, tubular portion 120a has a smaller neck with a push button device 121 for engaging a hole defined by the tubular portion 120b. A base foot 122 is sized and configured to receive the tubular portion 120b when assembled. Referring now to FIG. 3A, an alternative upright assembly 306 has two tubular portions 320a and 320b that interconnect by insertion. To accomplish a friction fit when inserted, tubular portion 320a has a smaller neck and a plurality of protrusions 321 on portion 320b create sufficient friction to selectively hold portions 320a and portion 320b together. It is also envisioned that screws, telescoping portions, threads and other like fastening means known to those of ordinary skill in the pertinent art may be utilized to secure components. Referring now to FIGS. 4-12, a method for disassembling and packaging the canopy 100 in a container 200 is shown. The method includes reducing the length of each of the upright assemblies 106, horizontal rail assemblies 112 and arch rail assemblies 114 by approximately half or thirds. As a result, the length A of the container 200 can be shortened commensurately as compared with prior art containers. To accommodate the shortened length A, the width B and/or the height C of the container 200 may be increased as necessary to still house all of the components of the canopy 100. Preferably, the length is 42 inches or less to accommodate placing the container 200 in a traditional sedan automobile trunk. Referring now to FIGS. 4 and 5, an empty container 200 receives several rows of tubular pipes. These tubular pipes may be tubular portions 120a and 120b of the upright assemblies 106, portions 116a-c of the horizontal rail assemblies 112, portions 118a and 118b of the arch rail assemblies 114, and combinations thereof. In a preferred embodiment, the bottom of the container 200 has four layers of pipes thereon, wherein each layer has fewer pipes than the preceding to form a roughly triangular cross-sectional shape 131 as outlined in FIG. 13. Referring to FIGS. 6 and 7, two strips 202 are placed onto the pipes in order to help maintain the roughly triangular cross-sectional shape. Preferably, the strips 202 are cardboard. Next, the plurality of 3-way connectors 108 and 4-way connectors 110 are placed into the container 200 along with the base feet 122 and ball bungee cords 124. In a preferred embodiment, the plurality of frame connectors 108, 110 are nested in a line for reducing a length of the line and covered by at least a portion of the eight vertical posts, the eight horizontal cross rails and the six arch cross rails. As shown in FIG. 7, in order to nest the frame connectors 108, 110, the axis of each connector 110 is offset along the length of the container 200 with respect to the adjacent connector 108, 110. For adjacent, three-way connectors 108, the axis may be offset or the three-way connectors may be arranged back to back. As a result, shifting that may damage the tarp or other components is prevented. Referring now to FIGS. 8 and 9, the remainder of the pipes required for the canopy 100 are placed on top of the connectors 108 and 110. The remainder of the pipes also form roughly triangular shapes 133 as outlined in FIG. 13. At this point, the components within the container 200 form a roughly rectangular cross-sectional shape. The remainder of the pipes also provide protection for the tarp 208 by separating the tarp 208 from the edges of the connectors 108, 110 that may cut or otherwise damage the tarp 208 during shifting and jostling of the components. Referring to FIGS. 10, 11 and 12, a large strip 208 is placed into the container 200. Preferably, the large strip 208 is cardboard for protecting the tarp 104 from damage. The tarp 104 is placed onto the large strip 208 and the container 200 can be sealed for storage, transport and display. The various components such as the tarp 104, ball bungee cords 124 and any required loose hardware may be bagged and also placed in the container 200. In a preferred embodiment, the container 200 when packaged is 42 inches by 16.5 inches by 10 inches when holding a 10×20×9.5 foot canopy 100. The two portions 118a and 118b of the arch rail assemblies 114 are 41 inch and 25.75 inch tubes, respectively. The three portions 116a-c of the horizontal rail assemblies 112 are 41 inch tubes. The tubular portions 120a and 120b of the upright assemblies 106 are 41 inch and 40 inch tubes, respectively. It is envisioned that the components of the canopy may be fabricated from steel, aluminum, plastic, PVC, polyethylene and combinations thereof. Referring now to FIG. 14, as will be appreciated by those of ordinary skill in the pertinent art, the roof frame portion 402 utilizes the same principles of the roof frame portion 102 described above. Accordingly, like reference numerals preceded by the numeral “4” instead of the numeral “1”, are used to indicate like elements. The horizontal rail assemblies 412 include two portions 416a and 416b. In a preferred embodiment, a length of the horizontal rail assemblies 412 is 10 feet and each portion 416a and 416b is approximately 60 inches long. Consequently, a container for storing the portions 416a and 416b is approximately 60 inches in length. As a result, if a preferred upright assembly is approximately 80 inches, the length of the container for storage is approximately 75% of the upright assembly. Circle A shows another preferred method for interconnecting portions of the roof frame portion 402 or upright assemblies 120a, 120b. Each portion 418a and 418b of the arch rail assemblies 414 include two portions 118a and 118b, each portion having a crimped section 415 to provide an interference fit between the portions 118a and 118b when engaged. While the invention has been described with respect to preferred embodiments, those skilled in the art will readily appreciate that various changes and/or modifications can be made to the invention without departing from the spirit or scope of the invention as defined by the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The subject disclosure relates to systems and methods for assembling and packing canopies, and more particularly to improved systems and methods for reducing the size of a container required to store, display and transport one or more canopies. 2. Background of the Related Art Use of canopies to protect a variety of items from the elements has been widely used and well understood in the art. Typical items include cars, boats, recreational vehicles, and picnic tables just to name a few. Some examples of packages for canopies are illustrated in U.S. Pat. Nos. 5,730,281; 6,141,902; and 6,679,009 each of which is incorporated herein by reference in its entirety. The prior art illustrates a canopies, greenhouses and shelters being packed in container. Packaged, the containers vary in size from 11×6.5×70 inches to 10×11×86 inches to 84×96×48 inches. None of the prior art containers for such buildings can be efficiently packaged for transport by the manufacturer, attractively displayed in a variety of locations by the retailer or transported in the trunk of a traditional sedan automobile by the purchaser. For instance, a 70 inch container cannot be easily displayed at the end of an aisle by the retailer. With a 70 inch container, a portion of the 70 inch container extends out of the trunk of a sedan automobile for transport. There is a need, therefore, for an improved storage and assembly system and method which permits compact storage and transport while still allowing easy assembly, and aids in assuring adequate structural integrity when assembled.
<SOH> SUMMARY OF THE INVENTION <EOH>In a preferred embodiment, a canopy kit stores, transports and assembles such that the canopy kit can be easily manufactured, displayed and purchased. The canopy kit includes four vertical posts, each vertical post including a first portion removably connectable to a second portion, three horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion, and four arch cross rails, each arch cross rail including a first portion removably connectable to a second portion. The canopy kit also includes a plurality of frame connectors for connect the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the four vertical posts. A tarp of the canopy kit is for covering the frame of the peaked roof. The canopy kit also includes means for attaching the tarp to the frame of the peaked roof and an elongated box having a length, a width and a height. The length being sufficient to house the first and second portions of the vertical posts, horizontal cross rails and arch cross rails, and the width and the height being sufficient to house the plurality of frame connectors, the tarp and the means for attaching. In another preferred embodiment, a canopy kit includes six vertical posts, each vertical post including a first portion removably connectable to a second portion, six horizontal cross rails, each horizontal cross rail including a first portion removably connectable to a second portion, and six arch cross rails, each arch cross rail including a first portion removably connectable to a second portion. The canopy kit also includes a plurality of frame connectors for connecting the horizontal and arch cross rails to form a frame for a peaked roof, and mounting the frame on the six vertical posts as well as a tarp for covering the frame of the peaked roof. Means for attaching the tarp to the frame of the peaked roof and an elongated box having a length, a width and a height are also included in the canopy kit. The length of the elongated box is at least 25% shorter than a full length of the vertical posts, and the width and the height are sufficient to house the plurality of frame connectors, the tarp, the horizontal cross rails, the arch cross rails, and the means for attaching. It is an aspect of the subject disclosure to provide a method for boxing a canopy so that the box can be easily transported, stored and displayed while reducing the likelihood of damage to the components of the canopy. It should be appreciated that the present invention can be implemented and utilized in numerous ways. These and other unique features of the system disclosed herein will become more readily apparent from the following description and the accompanying drawings.
20040304
20071120
20050908
57921.0
5
YIP, WINNIE S
SYSTEM AND METHOD FOR STORING, ASSEMBLING AND TRANSPORTING A CANOPY
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,446
ACCEPTED
Drain cleaning apparatus
Drain cleaning apparatus comprises a housing in which a drain cleaning cable is coiled and from which the cable is displaced for introducing an outer end of the cable into a drain to be cleaned. The housing is stationary and the cable is rotated about its axis relative to the housing by a drive motor coupled to an inner end of the cable. A manually operable cable feeding device can be coupled with the housing for feeding the cable outwardly and inwardly relative to the housing.
1. Drain cleaning apparatus comprising, a housing having a cable opening, a drain cleaning cable having a cable axis and first and second ends, said second end extending outwardly through said cable opening, and means for rotating said cable about said cable axis relative to the housing. 2. Drain cleaning apparatus according to claim 1, wherein said means for rotating said cable includes an electric motor connected to said first end of said cable. 3. Drain cleaning apparatus according to claim 2, wherein said motor is in said housing. 4. Drain cleaning apparatus according to claim 2, further including a control switch on said housing for selectively connecting said motor to a source of electrical power. 5. Drain cleaning apparatus according to claim 4, further including a remotely operable switch for selectively disconnecting said motor from said source of electric power independent of said control switch. 6. Drain cleaning apparatus according to claim 5, wherein said motor is in said housing. 7. Drain cleaning apparatus according to claim 1, wherein at least a portion of said housing is constructed of antibacterial plastic material. 8. Drain cleaning apparatus according to claim 1, wherein said cable is coiled in said housing about a coil axis transverse to said cable axis, and means for feeding the coiled cable outwardly and inwardly through said cable opening. 9. Drain cleaning apparatus according to claim 8, wherein said means for feeding includes a manually operated cable feed device. 10. Drain cleaning apparatus according to claim 9, further including a flexible guide tube having a first end adjacent the cable opening in said housing and having a second end spaced from the first end, and said feed device being coupled to said second end. 11. Drain cleaning apparatus according to claim 8, wherein said means for feeding includes means for rotating the coiled cable in opposite directions about said coil axis. 12. Drain cleaning apparatus according to claim 1, wherein said housing includes an outer shell having a shell axis and an inner wall spaced inwardly therefrom, said cable opening being in said outer shell, and said cable being coiled about said inner wall. 13. Drain cleaning apparatus according to claim 12, wherein the cable has a diameter and the space between the inner wall and outer shell is greater than said diameter and less than twice said diameter. 14. Drain cleaning apparatus according to claim 12, wherein said inner wall is rotatable relative to said outer shell about said shell axis. 15. Drain cleaning apparatus according to claim 14, and means including a crank for manually rotating said inner wall. 16. Drain cleaning apparatus according to claim 14, wherein said cable opening in said outer shell has an opening axis transverse to said shell axis. 17. Drain cleaning apparatus according to claim 16, wherein said opening axis is generally parallel to a line tangential to said outer shell. 18. Drain cleaning apparatus according to claim 17, wherein said shell axis is horizontal during use of the apparatus. 19. Drain cleaning apparatus according to claim 18, and means including a crank for manually rotating said inner wall. 20. Drain cleaning apparatus according to claim 12, wherein said inner wall is fixed against rotation relative to said outer shell. 21. Drain cleaning apparatus according to claim 20, wherein said cable opening in said outer shell has an opening axis parallel to said shell axis. 22. Drain cleaning apparatus according to claim 21, wherein said opening axis coincides with said shell axis. 23. Drain cleaning apparatus according to claim 22, wherein said shell axis is vertical during use of the apparatus. 24. Drain cleaning apparatus according to claim 23, wherein each said outer shell and inner wall have a generally vertical lower portion and a dome-shaped upper portion. 25. Drain cleaning apparatus comprising, a housing including an annular cable housing having a vertical axis and radially spaced apart inner and outer walls providing a cable passageway therebetween having lower and upper ends, said outer wall having a cable opening therethrough, a drain cleaning cable having a cable axis and an inner end in said housing, said cable being coiled about said inner wall and extending outwardly through said cable opening, and a motor coupled to said inner end of the cable for rotating the cable about said cable axis relative to said housing. 26. Drain cleaning apparatus according to claim 25, wherein said outer wall at said cable opening includes a coupling for attaching a flexible cable guide tube to said housing. 27. Drain cleaning apparatus according to claim 26, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 28. Drain cleaning apparatus according to claim 25, wherein said housing further includes a motor housing laterally adjacent said cable housing, said motor being in said motor housing. 29. Drain cleaning apparatus according to claim 28, and a handle between said motor housing and said cable housing. 30. Drain cleaning apparatus according to claim 28, wherein said motor is electrically operated and includes an output end coupled to said inner end of the cable. 31. Drain cleaning apparatus according to claim 30, wherein said output end of said motor has an axis generally tangential to said lower end of said passageway. 32. Drain cleaning apparatus according to claim 30, and a switch on said housing for selectively connecting said motor to a source of electrical power. 33. Drain cleaning apparatus according to claim 32, wherein said switch is on said motor housing, and a handle between said motor housing and said cable housing. 34. Drain cleaning apparatus according to claim 33, wherein said output end of said motor has an axis generally tangential to said lower end of said passageway. 35. Drain cleaning apparatus according to claim 34, wherein said outer wall at said cable opening includes a coupling for attaching a flexible cable guide tube to said cable housing, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 36. Drain cleaning apparatus, comprising a housing having a base and a cover, said base having a first base portion including an annular wall extending upwardly therefrom and a domed wall extending upwardly and radially inwardly from said annular wall, said base having a second base portion extending laterally of said first base portion, said cover having a first cover portion including an annular wall and domed wall respectively radially spaced from and overlying the annular wall and domed wall of said first base portion, said cover further including a second cover portion overlying said second base portion, an electric motor between the second portions of the base and cover, a drain cleaning cable having a cable axis, said cable being coiled about said annular wall of the first base portion and having an inner end coupled to said motor for said motor to rotate said cable about said cable axis relative to said housing, said domed wall of said first cover portion having a cable opening therethrough, and said cable extending outwardly through said opening and having an outer end spaced therefrom. 37. Drain cleaning apparatus according to claim 36, wherein said cable opening is through the apex of said domed wall of said first cover portion and includes a coupling for attaching a flexible cable guide tube thereto, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 38. Drain cleaning apparatus according to claim 36, and a manually operable control switch on said second cover portion for selectively connecting said motor to a source of power. 39. Drain cleaning apparatus according to claim 38, further including a remotely operable switch for selectively disconnecting said motor from said source of electric power independent of said control switch. 40. Drain cleaning apparatus according to claim 36, and a handle between the first and second cover portions. 41. Drain cleaning apparatus according to claim 40, wherein said handle has one end interconnected with said first cover portion and another end interconnected with said second cover portion. 42. Drain cleaning apparatus according to claim 41, wherein said first and second cover portions are separate from one another and removably mounted on said base. 43. Drain cleaning apparatus according to claim 42, wherein said one end of said handle is fastened to said first cover portion and said another end is slidably interengaged with said second cover portion. 44. Drain cleaning apparatus according to claim 40, and a manually operable control switch on said second cover portion for selectively connecting said motor to a source of power. 45. Drain cleaning apparatus according to claim 44, wherein said first and second cover portions are separate from one another and removably mounted on said base and said handle has one end interconnected with said first cover portion and another end interconnected with said second cover portion. 46. Drain cleaning apparatus according to claim 45, wherein said one end of said handle is fastened to said first cover portion and said another end is slidably interengaged with said second cover portion. 47. Drain cleaning apparatus according to claim 46, wherein said cable opening is through the apex of said domed wall of said first cover portion and includes a coupling for attaching a flexible cable guide tube thereto, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 48. Drain cleaning apparatus according to claim 47, further including a remotely operable switch for selectively disconnecting said motor from said source of electric power independent of said control switch. 49. Drain cleaning apparatus comprising a housing having an axis and axially opposite ends, a drum supported in said housing for rotation relative thereto about a drum axis, an electric motor supported on said drum for rotation therewith, a drain cleaning cable having a cable axis, said cable being coiled about said drum and having a first end coupled to said motor for said motor to rotate said cable about said cable axis relative to said drum, said housing having a cable opening therethrough, and said cable extending outwardly through said opening and having a second end spaced therefrom. 50. Drain cleaning apparatus according to claim 49, and a switch on said drum for selectively connecting said motor to a source of electrical power. 51. Drain cleaning apparatus according to claim 50, wherein said source of electrical power is a battery supported on said drum for rotation therewith. 52. Drain cleaning apparatus according to claim 49, wherein said cable opening is generally tangential with respect to said drum and includes a coupling for attaching a flexible guide tube to said opening, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 53. Drain cleaning apparatus according to claim 49, and a handle on said housing for carrying the apparatus. 54. Drain cleaning apparatus according to claim 53, wherein said housing is circular and said handle extends transverse to said axis of said housing, and circumferentially spaced apart feet on said housing opposite said handle. 55. Drain cleaning apparatus according to claim 49, and a crank handle on said drum for rotating the drum about said drum axis relative to said housing. 56. Drain cleaning apparatus according to claim 49, wherein said housing includes first and second annular housing members and said drum is rotatably mounted on one of said members. 57. Drain cleaning apparatus according to claim 56, wherein said drum has an open end facing said one housing member and a closed end facing the other housing member, said motor being mounted on said closed end. 58. Drain cleaning apparatus according to claim 57, further including a battery mounted on said closed end for operating said motor, and a switch mounted on said closed end for selectively connecting said motor to said battery. 59. Drain cleaning apparatus according to claim 58, wherein said other housing member includes a peripheral opening providing access to said closed end of said drum, said switch being accessible through said peripheral opening. 60. Drain cleaning apparatus according to claim 59, and a crank handle on said closed end of said drum accessible through said peripheral opening for manually rotating said drum. 61. Drain cleaning apparatus according to claim 60, wherein said cable opening is generally tangential with respect to said drum and includes a coupling for attaching a flexible guide tube to said opening, and a manually operable cable feed device coupled to said guide tube for displacing said cable inwardly and outwardly through said cable opening in response to rotation of said cable about said cable axis. 62. Drain cleaning apparatus according to claim 61, and a handle on said housing for carrying the apparatus, said handle extending transverse to said axis of said housing, and circumferentially spaced apart feet on each of the housing members opposite said handle. 63. Drain cleaning apparatus according to claim 19, wherein said housing is constructed from antibacterial plastic material. 64. Drain cleaning apparatus according to claim 24, wherein said housing is constructed from antibacterial plastic material. 65. Drain cleaning apparatus according to claim 29, wherein said housing and said handle are constructed from antibacterial plastic material. 66. Drain cleaning apparatus according to claim 36, wherein said housing is constructed from antibacterial plastic material. 67. Drain cleaning apparatus according to claim 40, wherein said housing and said handle are constructed from antibacterial plastic material. 68. Drain cleaning apparatus according to claim 49, wherein said housing and said drum are constructed from antibacterial plastic material. 69. Drain cleaning apparatus according to claim 53, wherein said housing, said drum and said handle are constructed from antibacterial plastic material.
BACKGROUND OF THE INVENTION This invention relates to drain cleaning apparatus and devices and, more particularly, to improvements in portable, motor-operated drain cleaners. Relatively small, portable drain cleaners are of course well known and, generally, include a drain cleaning snake or cable coiled in a housing or drum from which an end of the cable extends for introduction into a drain or sewer line to be cleaned. The drum is rotated in order to rotate the cable about its axis as the latter is advanced into the drain, and such rotation of the drum is achieved by coupling the drum with a suitable drive motor which, in some instances is provided by a handheld drill. The cable is advanced out of the drum and into a drain either manually, by pulling the cable outwardly of the drum, or through the use of a cable feeding device attached to the drum as shown, for example, in U.S. Pat. No. 6,158,076 to Rutkowski, et al. and U.S. Pat. No. 6,615,436 to Burch, et al., or to a guide tube or hose as shown, for example, in U.S. Pat. No. 6,009,588 to Rutkowski, all of which patents are incorporated herein by reference for background information. In such drain cleaning apparatus heretofore known, the drum is a rotating part which a user must contend with during operation of the drain cleaner. Moreover, in the absence of a cable feeding device, the user must de-energize the drive motor and manually displace the cable out of the drum during a drain cleaning operation and back into the drum following completion of the operation. Such manual displacement of the cable exposes the user's hands, gloves or other clothing to the grime and other moisture-laden material which adheres to the cable as the latter advances into and is withdrawn from a drain or the like being cleaned. In any event, the drain cleaning apparatus and devices of the foregoing character heretofore available are not easy to use, most often do not provide for hands-off operation with respect to the cable, expose a user to contact with the rotating cable drum, and render a drain cleaning operation tedious and, often, undesirably time-consuming. SUMMARY OF THE INVENTION In accordance with the present invention, motor-operated drain cleaning apparatus is provided by which the foregoing and other disadvantages of such devices heretofore available are advantageously minimized or overcome. More particularly in this respect, a drain cleaning device in accordance with the invention provides for the drain cleaning cable to be stored in a non-rotating housing and to be rotated about the cable axis when the cable is in a drain by a motor coupled to the end of the cable in the housing. Advantageously, the outer or operating end of the cable can be associated with a cable feeding device coupled to the housing, such as through the use of a flexible guide tube or hose, whereby an operator of the apparatus does not have to come into contact with rotating parts of the apparatus, or the cable which rotates relative thereto and is advanced and retracted relative to the housing by the feeding device. Accordingly, use and operation of the device with a cable feeding mechanism is much easier than is the operation of units heretofore available and, moreover, affords the operator the ability to avoid contact with the cable and thus exposure to dirt, grime and other undesirable matter which may accumulate on the cable during a drain cleaning operation. Still further, a user is much more relaxed in connection with using the apparatus in that he or she does not see any rotating parts of the apparatus other than the cable, and visibility of the latter is minimal once the operating end of the cable is in a drain, especially if displacement of the cable into and from the drain is through the use of a cable feeding mechanism. Suitable cable feeding devices can include those shown in the aforementioned patents and, preferably, is one enabling displacement of the cable out of and into the housing without changing the direction of the drive motor, such as the feed mechanisms disclosed in co-pending application Ser. No. ______ in the name of Rutkowski, et al. and which is assigned to the same assignee as the present application. It is accordingly an outstanding object of the present invention to provide improved, motor-operated drain cleaning apparatus. Another object is the provision of apparatus of the foregoing character in which rotation of the drain cleaning cable about its axis during displacement relative to a drain being cleaned is achieved by rotating the cable by a motor coupled to the end of the cable in a housing of the device. Yet another object is the provision of apparatus of the foregoing character in which the drain cleaning cable is stored in a non-rotating housing and is directly rotated about the cable axis relative to the housing. A further object is the provision of drain cleaning apparatus of the foregoing character which is portable, easy to use, does not have any visible rotating parts, such as a cable drum, and affords an opportunity for hands-off use or use with a minimum hand contact with the cable during a drain cleaning operation. BRIEF DESCRIPTION OF THE DRAWINGS The foregoing objects, and others, will in part be obvious and in part pointed out more fully hereinafter in conjunction with the written description of preferred embodiments of the invention illustrated in the accompanying drawings in which: FIG. 1 is a perspective view of drain cleaning apparatus in accordance with the invention; FIG. 2 is a sectional elevation view of the apparatus shown in FIG. 1; FIG. 3 is a plan view of the base portion of the housing of the apparatus; FIG. 4 is an inverted plan view of a cover portion of the housing; FIG. 5 is a perspective view of another embodiment of drain cleaning apparatus in accordance with the invention; FIG. 6 is a perspective view of the base portion of the housing of the apparatus shown in FIG. 5; FIG. 7 is an underside perspective view of the cover portion of the housing of the apparatus shown in FIG. 5; FIG. 8 is a perspective view from one side of yet another embodiment of drain cleaning apparatus in accordance with the invention; FIG. 9 is a perspective view of the apparatus in FIG. 8 from the opposite side thereof; FIG. 10 is an exploded perspective view of the component parts of the apparatus shown in FIGS. 8 and 9; FIG. 11 is a sectional elevation view of the apparatus taken along line 11-11 in FIG. 9; and, FIG. 12 is a cross-sectional elevation view of the apparatus taken along line 12-12 in FIG. 9. DESCRIPTION OF PREFERRED EMBODIMENTS Referring now in greater detail to the drawings, wherein the showings are for the purpose of illustrating preferred embodiments of the invention only and not for limiting the invention, drain cleaning apparatus 10 illustrated in FIGS. 1-4 includes a housing comprising a base 12 and a cover which, in this embodiment, includes first and second cover portions 14 and 16, respectively, which overlie and are attached to base 12 as set forth more fully hereinafter. Base 12 has a first portion 12a which includes an annular wall 18 extending upwardly of the base and having a vertical axis A, and a domed wall 20 extending upwardly and radially inwardly from annular wall 18 and having a closed upper end or apex 22. Base 12 further includes a second base portion 12b integral with and extending laterally of the first base portion and having an upwardly open compartment area 24 providing a lower portion of a motor and switch compartment as set forth more fully hereinafter. Cover portion 14 forms an outer shell of the housing with respect to base portion 12a and includes an annular wall 26 radially outwardly of and surrounding annular wall 18 of the base and a domed wall 28 extending upwardly and inwardly of wall 26 so as to be radially spaced from and overlie domed wall 20 of the base. Domed wall 28 terminates at its upper end in a cable opening 30 coaxial with axis A and, preferably, wall 28 includes a sleeve portion 32 having an outer surface provided with ribs or barbs 34 for frictionally interengaging with and coupling a flexible guide hose 36 with the cover. The spaced annular and domed walls provide a cable passageway 38 having a lower end 38a and an upper end 38b which communicates with cable opening 30, and a drain cleaning cable 40 is coiled in the lower portion of passageway 38 about annular wall 18 of base 12. Cable 40 has an inner end 42 relative to the housing which extends tangentially from lower end 38a of passageway 38 through an opening 44 in the lower portion of annular wall 26 of the cover for coupling with a drive motor unit M of the apparatus as set forth more fully hereinafter. Cable 40 extends upwardly from the coil in the lower portion of passageway 38, through cable opening 30 and, in the embodiment shown, through flexible guide tube 36 and a cable feeding device CF which corresponds structurally to a feeding device disclosed in the aforementioned co-pending application Ser. No. ______. Basically in this respect, the cable feeder comprises a base B having axially opposite ends and an actuator defined by first and second actuator members A1 and A2, respectively, overlying base B between the opposite ends thereof. Actuators A1 and A2 are mounted on base B by a pivot pin P for displacement toward and away from base B independent of one another, and one of the opposite ends of base B is adapted to receive and frictionally interengage with the outer end of guide tube 36. The feeding device further includes axially spaced apart sets of actuating rolls, each of which sets includes a pair of rolls mounted on the corresponding one of the actuators A1 and A2 and a single roll mounted on base B and underlying the rolls on the corresponding actuator. The rolls of each set are skewed so as to alternately engage with and displace the cable in opposite directions relative to the cable feeder in response to rotation of the cable about its axis. As mentioned, cable 40 extends through the cable feeding device, and the cable has an outer end 46 provided, for example, with a bulb auger BA. Preferably, passageway 38 has a radial dimension which precludes two turns of the coil being in the same radial plane in the passageway. This relationship can be obtained by providing for the radial width of the passageway to be less than twice the outer diameter of the cable. Second cover portion 16 is contoured to overlie and matingly interengage with second base portion 12b, and the interior compartment area 24 of base portion 12b and the interior compartment area 48 of second cover portion 16 are structured to axially capture motor unit M and a pneumatically actuated switch unit 50 therebetween. Further, an on-off switch 52 is mounted on cover portion 16 for selectively connecting and disconnecting motor unit M to a power source which, in the embodiment disclosed, is a 110 volt source to which the motor unit is connected by a power cord 54. Motor unit M is mounted on cover portion 16 and comprises an electric motor 56 and a gear box 58 which is driven thereby and which has a slip clutch output coupling 60 for connection to end 42 of cable 40 by means of a pair of set screws 62. Pneumatically actuated switch 50 is mounted on cover portion 16 and is connected to an air hose 64 which, in a well-known manner, has a foot or hand actuator component attached to the outer end thereof and by which pulses of air under pressure are delivered to the switch by depressing the actuator to alternately open and close the switch. While not shown, it will be appreciated that switches 50 and 52 are connected in series with motor M and the power source, whereby displacement of switch 52 to the “on” position connects motor M to the power source subject to the operating condition of switch 50. During use, the operator displaces the actuator of the pneumatically actuated switch to alternately energize and de-energize motor 56 and, accordingly, alternately rotate and stop rotation of cable 40. Cover portion 14 is removably attached to base 12 by means of a plurality of threaded fasteners, not shown, extending through openings 66 in cover portion 14 and into openings 68 therefor in base 12, and cover portion 16 is removably mounted on the base by a plurality of threaded fasteners, not shown, which extend upwardly from the bottom of base 12 through openings 70 therefor and to openings 72 in cover portion 16. Domed wall 28 of cover portion 14 is provided with a plurality of arcuate slots 74 therethrough which enable observing the movement of cable 40 upwardly toward opening 30 during operation of the apparatus, and housing and cover portions 12b and 16 are provided with aligned slots 75 which provide vent openings to the motor unit when the base and cover are assembled. A handle 76 is provided for lifting and transporting the drain cleaner and includes a first end 76a attached to domed wall 28 of cover 14 by a threaded fastener 78 extending into the handle from the interior side of wall 28. Second end 76b of the handle is releasably interengaged with cover portion 16 by a slot and finger arrangement including slots 80 and 82 in cover portion 16 and fingers 84 and 86 on end 76b of the handle which extend through slots 80 and 82, respectively. Finger 84 engages under the inner side of cover portion 16, and the handle is removable with cover portion 14 by removing the fasteners from the openings 66 of the latter and pivoting cover portion 14 and handle 76 clockwise from the position shown in FIG. 2 to disengage fingers 82 and 84 from the corresponding slots and then lifting cover portion 14 and handle 76 from cover portion 16. In use, it will be appreciated that power cord 54 is plugged into a power source and switch 52 is then turned to the “on” position to enable energizing of the motor dependent on the condition of pneumatically actuated switch 50. Presuming the operator to depress the actuator of switch 50 to close the switch, motor 56 is energized and cable 40 is rotated relative to base 12 and the cover components. Further presuming the cable feeding device CF to be in a neutral position as shown in FIG. 2, end 46 of the cable rotates relative thereto and can be positioned at the entrance of a drain into which the cable is to be advanced. Assuming actuator A1 to be operable to displace the cable to the right in FIG. 2 relative to the cable feeder, the operator can then displace actuator A1 toward body B of the cable feeding device to engage the cable between the rolls of the corresponding roll set and thus advance the cable into the drain. Selectively, the operator can displace the cable feeding device to its neutral position whereby the cable continues to rotate without being further advanced into the drain. Also, selectively, the operator can actuate switch 50 to open the circuit to motor 56 to interrupt rotation of the cable. Further, upon removal of a blockage and assuming the cable to be rotating relative to the cable feeding device, the operator can displace actuator A2 toward base B, whereupon the cable is engaged between the rolls of the corresponding roll set to reverse the direction of displacement of the rotating cable relative thereto to withdraw the cable from the drain. While the use of a pneumatically operated switch of the foregoing character and a manually operable cable feeding device are preferred in connection with operating the apparatus to optimize the operator's ability to control the operation and to provide hands-free operation, it will be appreciated that control of the drive motor can be achieved through just the on-off switch 52 and that the cable can be manually pulled from the housing and pushed into a drain to be cleaned. FIGS. 5-7 illustrate drain cleaning apparatus 10A which, primarily, incorporates a modification of the housing structure of apparatus 10 illustrated in FIGS. 1-4. Accordingly, like numerals are used in FIGS. 5-7 to identify component parts corresponding to those of the apparatus in FIGS. 1-4. Drain cleaning apparatus 10A comprises a base 12A which includes a first portion 12a comprising annular and domed wall portions 18 and 20, respectively. Base 12A also includes a second U-shaped portion 12b integral with and extending laterally from portion 12a and defined by legs 92 and 94 extending generally tangentially from the opposite sides of base portion 12a and a bridging portion 96 between the outer ends of the legs. As will be appreciated from FIG. 7, the housing of drain cleaning apparatus 10A further includes a cover comprising a first cover portion 14A and a second cover portion 16A which, in this embodiment, is integral with and extends laterally from the first cover portion. Housing portion 14A includes annular and domed wall portions 26 and 28 which are spaced from and overlie and cooperate with wall portions 18 and 20 of the base to provide a cable passageway as shown and described in connection with FIGS. 1-4. Housing portion 16A is defined by legs 98 and 100 extending generally tangentially of housing portion 14A and a bridging portion 102 between the outer ends of the legs, and when the base and cover portions are assembled, legs 98 and 100 and bridging portion 102 respectively overlie legs 92 and 94 and bridging portion 96 of base portion 12b. Moreover, when the base and cover portions are assembled, legs 92 and 98 define a compartment for a battery pack 103 and on-off switch 104, and legs 94 and 100 define a compartment for a motor unit M. Further, as will be appreciated from FIG. 5, the legs and bridging portions of the base and cover members cooperatively provide a carrying handle 105 for the drain cleaning apparatus. In this embodiment, motor unit M includes a motor 106 and gear box 108 having a slip clutch output coupling 60 for connection to the inner end 42 of a drain cleaning cable. Further, it will be appreciated that the power source for the motor in this embodiment is battery pack 103 and that the latter is connected in circuit with motor 106 through on-off switch 104. As in the embodiment shown in FIGS. 1-4, the drain cleaning apparatus can also be provided with a pneumatically actuated, foot-operated control switch if desired. While not shown, it will be appreciated that the housing portions are interconnected by suitable threaded fasteners extending upwardly through openings 110 therefor in base 12A and into corresponding apertured posts 112 on the cover component. Legs 94 and 100 of the base and cover portion 16A are provided with aligned slots 113 which provide for venting the motor compartment. As will be appreciated from the description herein regarding the embodiment shown in FIGS. 1-4, a drain cleaning cable is coiled about annular wall 18 of the base portion and has an inner end connected to coupling 60 for rotation of the cable about its axis by motor 106, and the cable extends through the cable opening at the top of domed wall 28 of the cover and has an outer end spaced therefrom for introduction into a drain to be cleaned. Furthermore, a cable feeding device such as that described above can be used to displace the cable relative to the housing. FIGS. 8-12 illustrate yet another embodiment of drain cleaning apparatus in accordance with the present invention. In this embodiment, drain cleaning apparatus 120 includes a cylindrical housing having a horizontal axis A and comprising first and second housing members 122 and 124 axially interconnected by a plurality of threaded fasteners 126. Housing member 122 comprises a circular outer wall 128 and a closed end wall 130, and member 124 comprises a circular outer wall 132 and an inwardly extending peripheral flange 134 which provides for the corresponding end of the housing to be open. The drain cleaning apparatus further includes a drum 136 having a closed end wall 138 and a circular outer wall 140 spaced radially inwardly of the outer peripheral edge of wall 138 to define a peripheral flange 142 about the closed end of the drum. Drum 136 is received in the housing and supported for rotation relative thereto about axis A. More particularly, in this respect, end wall 138 of the drum is provided with an axially inwardly extending drum shaft 144, and end wall 130 of housing member 122 is provided with an axially inwardly extending hub 146 which receives the innermost end of shaft 144 and supports the latter for rotation about axis A. Drum 136 is axially retained in hub 146 by means of a washer 148 and a drum mounting fastener 150. The axially inner side of end wall 138 of drum 136 is provided with a compartment 152 for receiving a motor unit M, a compartment 154 for receiving a battery pack 156, and an axially inwardly extending switch recess 158 having an inner wall 160 on which an on-off switch 162 is mounted. As in the previous embodiments, motor unit M includes an electric motor 164 connected to a gear box 166 having an output to a slip clutch coupling 60 by which inner end 42 of drain cleaning cable 40 is coupled to the motor unit. End wall 138 of the drum is provided with slots 139 for venting the motor unit compartment. The housing, as defined by housing members 122 and 124 has a cable opening 168, and cable 40 is coiled about drum 136 in the space between drum wall 140 and cylindrical walls 128 and 132 of the housing members, which space defines a cable passageway 38, and the cable extends outwardly through opening 168 and, as in the previous embodiments, has an outer end, now shown, which is adapted to be introduced into a drain to be cleaned. Preferably, opening 168 terminates in a collar 170 which is provided with barbs or the like to facilitate connecting a flexible guide tube thereto, such as that shown in connection with the embodiment of FIGS. 1-4. Opening 168 extends generally tangentially of the passageway at the upper portion of the housing. Motor unit M and battery pack 156 are axially captured in the corresponding compartment by a retainer 172 including a plate portion 174 overlying compartment 154 and a retaining arm 176 which depends therefrom and across compartment 152. End wall 138 of drum 136 is provided on the axially outer side thereof with a crank arm 180 by which the drum can be manually rotated about axis A relative to the housing, and each of the housing members is provided with a pair of circumferentially spaced apart feet 182 for supporting the drain cleaner on an underlying surface in a use position as shown in the drawings. Further, closed end wall 130 of housing member 122 is provided with a plurality of radially extending axially outwardly projecting recesses 184 each of which terminates in a foot 186 which projects axially outwardly therefrom and which feet provide an alternative arrangement for supporting the drain cleaner on an underlying surface. Further, each of the housing members 122 and 124 is provided with a corresponding handle portion 188 which, when the housing members are assembled, provides a carrying handle diametrically opposite feet 182 of the housing. As will be appreciated from the description of the previous embodiments herein, motor 164 is adapted to be energized through on-off switch 162, and when the latter is in the “on position” the motor operates through gear box 166 to rotate cable 40 about its axis and relative to the drum and housing components. If the cable extends through a flexible guide tube having a cable feeding device attached thereto as described in connection with the embodiment of FIGS. 1-4, the operator can actuate the feeding device to advance cable 40 outwardly of the housing and into a drain to be cleaned. In response to advancement of the cable in this respect, drum 136 is free to rotate in the clockwise direction in FIG. 11 to accommodate such cable displacement. When the operator actuates the cable feeding device to reverse the direction of cable displacement, drum 136 is free to rotate in the opposite direction as the cable is fed back into the housing. Advantageously in connection with this embodiment, the operator can actuate the switch to the “off position,” thereby stopping rotation of the cable, and then manually rotate drum 136 through the use of crank arm 180 to more quickly draw the cable back into the housing. In each of the foregoing embodiments, the housing components are constructed from a suitable plastic material such as polyethylene, for example, and preferably are constructed from an antibacterial plastic material or a plastic material such as polyethylene having an antibacterial additive therein such as the additive IRGAGUARD available from Ciba Specialty Chemicals, Inc. of Tarrytown, N.Y. While considerable emphasis has been placed herein on preferred embodiments of the invention, it will be appreciated that other embodiments can be readily devised and that many changes can be made in the preferred embodiments without departing from the principals of the invention. In this respect, for example, it will be appreciated that a wide variety of on-off switch structures can be employed, that the use of a pneumatically actuated switch is optional, and that, if used, any variety of cable feeding devices can be employed either in association with a flexible guide tube or directly connected to or supported adjacent the housing. Further, it will be appreciated that the drive motor can be reversible in which case the main control switch would operate to reverse the direction of the output rotation of the motor, thus enabling the use of a cable feeding device with the drain cleaner which would operate to displace the cable into a drain in response to rotation of the cable in one direction about its axis and outwardly of the drain and into the housing in response to rotation of the cable in the opposite direction about its axis. These and other modifications of the preferred embodiments as well as other embodiments will be obvious to those skilled in the art upon reading the description herein, whereby the foregoing descriptive matter is to be interpreted merely as illustrative of the invention and not as a limitation.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to drain cleaning apparatus and devices and, more particularly, to improvements in portable, motor-operated drain cleaners. Relatively small, portable drain cleaners are of course well known and, generally, include a drain cleaning snake or cable coiled in a housing or drum from which an end of the cable extends for introduction into a drain or sewer line to be cleaned. The drum is rotated in order to rotate the cable about its axis as the latter is advanced into the drain, and such rotation of the drum is achieved by coupling the drum with a suitable drive motor which, in some instances is provided by a handheld drill. The cable is advanced out of the drum and into a drain either manually, by pulling the cable outwardly of the drum, or through the use of a cable feeding device attached to the drum as shown, for example, in U.S. Pat. No. 6,158,076 to Rutkowski, et al. and U.S. Pat. No. 6,615,436 to Burch, et al., or to a guide tube or hose as shown, for example, in U.S. Pat. No. 6,009,588 to Rutkowski, all of which patents are incorporated herein by reference for background information. In such drain cleaning apparatus heretofore known, the drum is a rotating part which a user must contend with during operation of the drain cleaner. Moreover, in the absence of a cable feeding device, the user must de-energize the drive motor and manually displace the cable out of the drum during a drain cleaning operation and back into the drum following completion of the operation. Such manual displacement of the cable exposes the user's hands, gloves or other clothing to the grime and other moisture-laden material which adheres to the cable as the latter advances into and is withdrawn from a drain or the like being cleaned. In any event, the drain cleaning apparatus and devices of the foregoing character heretofore available are not easy to use, most often do not provide for hands-off operation with respect to the cable, expose a user to contact with the rotating cable drum, and render a drain cleaning operation tedious and, often, undesirably time-consuming.
<SOH> SUMMARY OF THE INVENTION <EOH>In accordance with the present invention, motor-operated drain cleaning apparatus is provided by which the foregoing and other disadvantages of such devices heretofore available are advantageously minimized or overcome. More particularly in this respect, a drain cleaning device in accordance with the invention provides for the drain cleaning cable to be stored in a non-rotating housing and to be rotated about the cable axis when the cable is in a drain by a motor coupled to the end of the cable in the housing. Advantageously, the outer or operating end of the cable can be associated with a cable feeding device coupled to the housing, such as through the use of a flexible guide tube or hose, whereby an operator of the apparatus does not have to come into contact with rotating parts of the apparatus, or the cable which rotates relative thereto and is advanced and retracted relative to the housing by the feeding device. Accordingly, use and operation of the device with a cable feeding mechanism is much easier than is the operation of units heretofore available and, moreover, affords the operator the ability to avoid contact with the cable and thus exposure to dirt, grime and other undesirable matter which may accumulate on the cable during a drain cleaning operation. Still further, a user is much more relaxed in connection with using the apparatus in that he or she does not see any rotating parts of the apparatus other than the cable, and visibility of the latter is minimal once the operating end of the cable is in a drain, especially if displacement of the cable into and from the drain is through the use of a cable feeding mechanism. Suitable cable feeding devices can include those shown in the aforementioned patents and, preferably, is one enabling displacement of the cable out of and into the housing without changing the direction of the drive motor, such as the feed mechanisms disclosed in co-pending application Ser. No. ______ in the name of Rutkowski, et al. and which is assigned to the same assignee as the present application. It is accordingly an outstanding object of the present invention to provide improved, motor-operated drain cleaning apparatus. Another object is the provision of apparatus of the foregoing character in which rotation of the drain cleaning cable about its axis during displacement relative to a drain being cleaned is achieved by rotating the cable by a motor coupled to the end of the cable in a housing of the device. Yet another object is the provision of apparatus of the foregoing character in which the drain cleaning cable is stored in a non-rotating housing and is directly rotated about the cable axis relative to the housing. A further object is the provision of drain cleaning apparatus of the foregoing character which is portable, easy to use, does not have any visible rotating parts, such as a cable drum, and affords an opportunity for hands-off use or use with a minimum hand contact with the cable during a drain cleaning operation.
20040304
20080506
20050908
84448.0
0
KARLS, SHAY LYNN
DRAIN CLEANING APPARATUS
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,571
ACCEPTED
Magnetoresistive sensor having improved synthetic free layer
A magnetoresistive sensor having employing a synthetic free layer having a first magnetic layer that contributes strongly to the GMR effect and a second magnetic layer that does not contribute to GMR effect, but has a negative magnetostriction to compensate for a positive magnetostriction of the first ferromagnetic layer.
1. A magnetoresistive sensor, comprising: a magnetically pinned layer; a magnetically free layer; a non-magnetic spacer layer sandwiched between the magnetic free layer and the magnetic pinned layer; and the magnetic free layer further comprising; a first magnetic layer; a second magnetic layer comprising a material containing Co, Ni and a material selected from the group consisting of Nb, Mo, W, Si and B; a non-magnetic coupling layer sandwiched between said first and second free layers; and said first and second magnetic layers of said free layer being aniparallel coupled across said non-magnetic coupling layer. 2. A magnetoresistive sensor as in claim 1 wherein said pinned layer comprises an alloy containing Co and Fe. 3. A magenteoresitive sensor as in claim 1 wherein said pinned layer comprises an allow containing substantially equal parts of Ni and Co. 4. A magnetetoresistive sensor as in claim 1 wherein said pinned layer comprises: a third magnetic layer; a fourth magnetic layer; a non-magnetic coupling layer sandwiched between said third and fourth magnetic layers of said pinned layer; and wherein at least one of said pinned layers comprises Co50Fe50. 5. A magnetoresistive sensor as in claim 1, wherein said non-magentic layer sandwitched between said first and second magnetic layers of said free layer comprises Ru. 6. A magnetoresistive sensor as in claim 1, where said first magnetic layer of said free layer comprises substantially equal parts of Co and Fe. 7. A magnetoresitive sensor as in claim 1, wherein said first magnetic layer of said free layer comprises Co, Fe, and Cu. 8. A magnetoresistive sensor as in claim 1 wherein said first magnetic layer of said free layer comprises Co42Fe43Cu15. 9. A magnetoresistive sensor as in claim 1 wherein said first magnetic layer of said free layer comprises Co90Fe10. 10. A magnetoresistive sensor as in claim 1 wherein said first magnetic layer of said free layer comprises a thin layer of Ni90Fe10 disposed adjacent said non magnetic spacer layer. 11. A magnetoresistive sensor as in claim 1 wherein said first magnetic layer of said free layer comprises a layer of Ni90Fe10 disposed adjacent said non-magnetic spacer layer and wherein said layer of Ni90Fe10 is 5-10 Angstroms thick. 12. A current in plane (CIP) magnetoresistive sensor, comprising: a pinned layer comprising first and second magnetic layers antiparallel coupled across a first non magnetic coupling layer, said first magnetic layer comprising Co50Fe50 and said second magnetic layer comprising Co90Fe10; a free magnetic layer comprising third and fourth magnetic layer antiparallel coupled across a second non-magnetic spacer layer said third magnetic layer comprising Co90Fe10 and said fourth magnetic layer comprising and alloy comprising Co, Ni and a material selected from the group consisting of Nb, Mo, W, Si and B; and a non magnetic, electrically conductive spacer layer sandwiched between said free and pinned layers, said first third magnetic layer of said free layer being formed adjacent said non-magnetic, electrically conductive spacer layer. 13. A current perpendicular to plane magnetoresistive sensor, comprising. a pinned layer comprising first and second magnetic layers antiparallel coupled across a first non magnetic coupling layer, said first and second magnetic layer comprising Co50Fe50; a free magnetic layer comprising third and fourth magnetic layer antiparallel coupled across a second non-magnetic spacer layer said third magnetic layer comprising Co50Fe50 and said fourth magnetic layer comprising and alloy comprising Co, Ni and a material selected from the group consisting of Nb, Mo, W, Si and B; and a non magnetic, spacer layer sandwiched between said free and pinned layers, said first third magnetic layer of said free layer being formed adjacent said non-magnetic, electrically conductive spacer layer. 14. A magnetoresistive sensor as in claim 13 wherein said non-magnetic spacer layer is electrically conductive and said sensor is a current perpendicular to plane giant magnetoresistive sensor (GM)R. 15. A magnetoresistive sensor as in claim 13 wherein said non-magnetic spacer layer is electrically insulating and said sensor is a tunnel valve. 16. A current perpendicular to plane magnetoresistive sensor, comprising. a pinned layer comprising first and second magnetic layers antiparallel coupled across a first non magnetic coupling layer, said first and second magnetic layer comprising Co50Fe50; a free magnetic layer comprising third and fourth magnetic layer antiparallel coupled across a second non-magnetic spacer layer said third magnetic layer comprising Co42Fe43Cu15 and said fourth magnetic layer comprising and alloy comprising Co, Ni and a material selected from the group consisting of Nb, Mo, W, Si and B; and a non magnetic, spacer layer sandwiched between said free and pinned layers, said first third magnetic layer of said free layer being formed adjacent said non-magnetic, electrically conductive spacer layer. 17. A magnetoresistive sensor as in claim 1, wherein said second magnetic layer of said free layer is 75 atomic percent Co. 18. A data storage system, comprising: a magnetic medium; an actuator; a slider connected with the actuator for movement across a surface of said magnetic medium, said slider having a magnetic head comprising: an inductive write head; and a magnetoresistive sensor comprising: a magnetically pinned layer; a magnetically free layer; a non-magnetic spacer layer sandwiched between the magnetic free layer and the magnetic pinned layer; and the magnetic free layer further comprising; a first magnetic layer; a second magnetic layer comprising a material containing Co, Ni and a material selected from the group consisting of Nb, Mo, W, Si and B; a non-magnetic coupling layer sandwiched between said first and second free layers; and said first and second magnetic layers of said free layer being aniparallel coupled across said non-magnetic coupling layer. 19. A magnetoresistive sensor as in claim 1 wherein said sensor is a dual GMR sensor. 20. A magnetoresistive sensor as in claim 1 wherein said sensor is a differential GMR sensor.
FIELD OF THE INVENTION The present invention relates to magnetoresitive sensors and more particularly to a giant magnetoresistive sensor, GMR having an improved synthetic free layer. BACKGROUND OF THE INVENTION The heart of a computer is an assembly that is referred to as a magnetic disk drive. The magnetic disk drive includes a rotating magnetic disk, write and read heads that are suspended by a suspension arm adjacent to a surface of a rotating magnetic disk and an actuator that swings the suspension arm to place the read and write heads over selected circular tracks on the rotating disk. The read and write heads are directly located on a slider that has an air bearing surface (ABS). The suspension arm biases the slider into contact with the surface of the disk when the disk is not rotating but, when the disk rotates, air is swirled by the rotating disk. When the slider rides on the air bearing, the write and read heads are employed for writing magnetic impressions to and reading magnetic impressions from the rotating disk. The read and write heads are connected to processing circuitry that operates according to a computer program to implement the writing and reading functions. The write head includes a coil layer embedded in first, second and third insulation layers (insulation stack), the insulation stack being sandwiched between first and second pole piece layers. A gap is formed between the first and second pole piece layers by a gap layer at an air bearing surface (ABS) of the write head and the pole piece layers are connected at a back gap. Current conducted to the coil layer induces a magnetic flux in the pole pieces which causes a magnetic field to fringe out at a write gap at the ABS for the purpose of writing the aforementioned magnetic impressions in tracks on the moving media, such as in circular tracks on the aforementioned rotating disk. In recent read head designs a spin valve sensor, also referred to as a giant magnetoresistive (GMR) sensor, has been employed for sensing magnetic fields from the rotating magnetic disk. The sensor includes a nonmagnetic conductive layer, hereinafter referred to as a spacer layer, sandwiched between first and second ferromagnetic layers, hereinafter referred to as a pinned layer and a free layer. First and second leads are connected to the spin valve sensor for conducting a sense current therethrough. The magnetization of the pinned layer is pinned perpendicular to the air bearing surface (ABS) and the magnetic moment of the free layer is located parallel to the ABS, but free to rotate in response to external magnetic fields. The magnetization of the pinned layer is typically pinned by exchange coupling with an antiferromagnetic layer. The thickness of the spacer layer is chosen to be less than the mean free path of conduction electrons through the sensor. With this arrangement, a portion of the conduction electrons is scattered by the interfaces of the spacer layer with each of the pinned and free layers. When the magnetizations of the pinned and free layers are parallel with respect to one another, scattering is minimal and when the magnetizations of the pinned and free layer are antiparallel, scattering is maximized. Changes in scattering alter the resistance of the spin valve sensor in proportion to cos θ, where θ is the angle between the magnetizations of the pinned and free layers. In a read mode the resistance of the spin valve sensor changes proportionally to the magnitudes of the magnetic fields from the rotating disk. When a sense current is conducted through the spin valve sensor, resistance changes cause potential changes that are detected and processed as playback signals. A spin valve sensor is characterized by a magnetiresistive (MR) coefficient that is substantially higher than the MR coefficient of an anisotropic magnetoresistive (AMR) sensor. For this reason a spin valve sensor is sometimes referred to as a giant magnetoresistive (GMR) sensor. When a spin valve sensor employs a single pinned layer it is referred to as a simple spin valve. When a spin valve employs an antiparallel (AP) pinned layer it is referred to as an AP pinned spin valve. An AP spin valve includes first and second magnetic layers separated by a thin non-magnetic coupling layer such as Ru. The thickness of the spacer layer is chosen so as to antiparallel couple the magnetizations of the ferromagnetic layers of the pinned layer. A spin valve is also known as a top or bottom spin valve depending upon whether the pinning layer is at the top (formed after the free layer) or at the bottom (before the free layer). A pinning layer in a bottom spin valve is typically made of platinum manganese (PtMn). The spin valve sensor is located between first and second nonmagnetic electrically insulating read gap layers and the first and second read gap layers are located between ferromagnetic first and second shield layers. In a merged magnetic head a single ferromagnetic layer functions as the second shield layer of the read head and as the first pole piece layer of the write head. In a piggyback head the second shield layer and the first pole piece layer are separate layers. Sensors can also be categorized as current in plane (CIP) sensors or as current perpendicular to plane (CPP) sensors. In a CIP sensor, current flows from one side of the sensor to the other side in the parallel to the planes of the materials making up the sensor. Conversely, in a CPP sensor the sense current flows from the top of the sensor to the bottom of the sensor perpendicular to the plane of the layers of material making up the sensor. Yet another type of sensor, somewhat similar to a CPP GMR sensor is a Tunnel Valve. A tunnel valve employs an electrically insulating spacer layer rather than a conductive spacer layer. A tunnel valve operates based on quantum mechanical tunneling of electrons through the insulating spacer layer. This tunneling is maximized when the magnetizations of the free and pinned layers are parallel to one another adjacent to the spacer layer. Recently, researchers have found that a change in the material of the pinned layer adjacent to the spacer layer can increase δr of the sensor. For example it has been found if the magnetic layers of the pinned layer are comprised of substantially equal parts Co and Fe, ie. Co50Fe50, the δr of a CPP spin valve can be improved significantly. In a CIP spin valve similar δr improvement has been found with the use of Co90Fe10 in the pinned layer. These materials have strong positive magnetostriction, which means that the compressive stresses which inevitably occur in a spin valve will tend to magnetize the pinned layers perpendicular to the ABS of the sensor. This is not a problem for the pinned layer, and is even an advantage, since this is the desired direction of pinning, and the magnetostriction only acts to assist the desired pinning. It would be possible to achieve a similar δr improvement by using similar material in the free layer (ie. Co50Fe50 for CPP, Co10Fe10 for CIP). However, the strong positive magnetostriction of these materials would magnetize the free layer in an undesirable direction perpendicular to the ABS. This would lead to unacceptable signal noise and free layer instability. Another mechanism for increasing GMR effect, or δr, is to increase the thickness of the free and pinned layers. This is especially suitable in a CPP sensor where the total thickness of the sensor is not as limiting. It is known that increasing the thickness of the free layer can increase the GMR effect. However, increasing the free layer thickness also increases the magnetic thickness. This leads to free layer stiffness, because the coercivity of the free layer increases to the point that the sensor becomes insensitive to signals. One method that has been proposed to overcome this has been to form an antiparallel coupled free layer also referred to as a synthetic free layer. Such a synthetic free layer is similar to an AP pinned layer in that it has first and second magnetic layers having magnetizations that are antiparallel to one another across a coupling layer such as Ru. The synthetic free layer has a larger physical thickness than a simple free layer, but has a much smaller magnetic thickness, which is the difference between the magnetic thicknesses of the first and second magnetic layers. A serious disadvantage of such a synthetic free layer is that the second magnetic layer (that which is furthest from the spacer layer) subtracts from the GMR effect, because it is 180 degrees out of phase with the magnetization of the first magnetic layer adjacent to the spacer. Therefore, any GMR advantage achieved by the use of synthetic free layers is essentially lost by this subtractive effect of the second layer. Therefore, there remains a strong felt need for a mechanism for taking advantage of the increased GMR effects provided by the use of materials such as Co50Fe50 or Co90Fe10 in a free layer while mitigating the problems associated with the strong positive magnetostriction of such materials. There also remains a strong felt need for a means for utilizing the advantages of synthetic free layers in a spin valve without experiencing the subtractive effect of the second free layer on the GMR on the sensor. SUMMARY OF THE INVENTION The present invention provides a sensor having a synthetic free layer having first and second magnetic materials separated by a non-magnetic coupling layer. The first magnetic layer of the free layer contributes strongly to a GMR effect and has a positive magnetostriction, whereas the second ferromagnetic layer contributes very little to GMR effect and has a negative magnetostriction that compensates for the positive magnetostriction of the first magnetic layer of the free layer. The present invention allows the sensor to utilize the benefits of a synthetic free layer, that is large physical thickness with small magnetic thickness, while mitigating the subtractive GMR typical caused by second magnetic layer of a synthetic free layer. The present invention also advantageously allows the use of materials such as Co50Fe50 in the free layer, which provide excellent GMR effect, but suffer from strong positive magnetostriction. The strong positive mangetostriction of the such materials used in a first magnetic layer is compensated by a negative magnetostriction in the second magnetic layer of the sensor. The present invention may include a synthetic free layer having a first layer comprising substantially equal parts of Co and Fe. The synthetic free layer might also include a second layer constructed of CoNiX, where X is selected from the group consisting of: Nb, Mo, W, Si and B. The present invention might also include a synthetic free layer having a first layer comprising Co90Fe10 or some similar material and a second layer constructed of CoNiX, where X is selected from the group consisting of: Nb, Mo, W, Si and B. The present invention could be embodied in a current perpendicular to plane CPP GMR sensor, a current in plane (CIP) GMR sensor, a tunnel valve or some other sort of sensor such as a differential GMR or dual spin valve sensor. The present invention could include a self pinned pinned layer or a pinned layer that is pinned by exchange coupling with an AFM layer. The pinned layer may be an antiparallel coupled pinned layer including first and second magnetic layers formed of Co50Fe50, or some similar material. The pinned layer could also include a first and second magnetic layers comprising Co50Fe50, and Co90Fe10 respectively. BRIEF DESCR ON OF THE DRAWINGS For a fuller understanding of the nature and advantages of this invention, as well as the preferred mode of use, reference should be made to the following detailed description read in conjunction with the accompanying drawings. FIG. 1 is a schematic illustration of a disk drive system in which the invention might be embodied; FIG. 2 is an ABS view of a slider illustrating the location of a magnetic head thereon; FIG. 3 is an ABS view of a magnetic sensor according to an embodiment of the present invention taken from circle 3 of FIG. 2; and FIG. 4 is an ABS view of a magnetic sensor according to an alternate embodiment of the invention. BEST MODE FOR CARRYING OUT THE INVENTION The following description is of the best embodiments presently contemplated for carrying out this invention. This description is made for the purpose of illustrating the general principles of this invention and is not meant to limit the inventive concepts claimed herein. Referring now to FIG. 1, there is shown a disk drive 100 embodying this invention. As shown in FIG. 1, at least one rotatable magnetic disk 112 is supported on a spindle 114 and rotated by a disk drive motor 118. The magnetic recording on each disk is in the form of annular patterns of concentric data tracks (not shown) on the magnetic disk 112. At least one slider 113 is positioned near the magnetic disk 112, each slider 113 supporting one or more magnetic head assemblies 121. As the magnetic disk rotates, slider 113 moves radially in and out over the disk surface 122 so that the magnetic head assembly 121 may access different tracks of the magnetic disk where desired data are written. Each slider 113 is attached to an actuator arm 119 by way of a suspension 115. The suspension 115 provides a slight spring force which biases slider 113 against the disk surface 122. Each actuator arm 119 is attached to an actuator means 127. The actuator means 127 as shown in FIG. 1 may be a voice coil motor (VCM). The VCM comprises a coil movable within a fixed magnetic field, the direction and speed of the coil movements being controlled by the motor current signals supplied by controller 129. During operation of the disk storage system, the rotation of the magnetic disk 112 generates an air bearing between the slider 113 and the disk surface 122 which exerts an upward force or lift on the slider. The air bearing thus counter-balances the slight spring force of suspension 115 and supports slider 113 off and slightly above the disk surface by a small, substantially constant spacing during normal operation. The various components of the disk storage system are controlled in operation by control signals generated by control unit 129, such as access control signals and internal clock signals. Typically, the control unit 129 comprises logic control circuits, storage means and a microprocessor. The control unit 129 generates control signals to control various system operations such as drive motor control signals on line 123 and head position and seek control signals on line 128. The control signals on line 128 provide the desired current profiles to optimally move and position slider 113 to the desired data track on disk 112. Write and read signals are communicated to and from write and read heads 121 by way of recording channel 125. With reference to FIG. 2, the orientation of the magnetic head 121 in a slider 113 can be seen in more detail. FIG. 2 is an ABS view of the slider 113, and as can be seen the magnetic head including an inductive write head and a read sensor, is located at a trailing edge of the slider. The above description of a typical magnetic disk storage system, and the accompanying illustration of FIG. 1 are for representation purposes only. It should be apparent that disk storage systems may contain a large number of disks and actuators, and each actuator may support a number of sliders. With reference now to FIG. 3, a magnetic head according to one possible embodiment of the invention includes a current perpendicular to plane (CPP) GMR sensor 300 that is sandwiched between first and second shields 302, 304. The shields 302, 304 are constructed of a magnetic, electrically conductive material such as for example NiFe and also function as electrical leads, conducting sense current to the sensor 300 to be electrically conducted through the sensor perpendicular to planes of layers making up the sensor (ie. vertically with respect to FIG. 3). A fill material 301, such as alumina can be provided between the shields 302, 304 outside of the area of the sensor 300. In some designs, hard bias layers to stabilize the free layer are placed outside the fill material 301, in this case, usually very thin fill material 301 is used so that the hard bias layers are placed in close proximity to the free layer to provide strong biasing. The 301 insulation layer between the hard bias layers and the sensor is essential to prevent sense current shunting. The sensor 300 further includes a magnetically pinned layer 306 and a magnetically free layer 308. A non-magnetic spacer layer 310 is sandwiched between the free layer 308 and pinned layer 306. The present embodiment is described in terms of a CPP GMR and as such the spacer 310 layer may be one of several electrically conductive materials and is preferably Cu. Those skilled in the art will appreciate that the sensor could also be a tunnel valve, in which case the spacer 310 would be a non-magnetic electrically insulating material such as Alumina. The sensor may also include a capping layer 311, which may be for example Ta formed over the free layer 308. With continued reference to FIG. 3, the pinned layer 306 may include first and second magnetic layers 312, 314 having magnetizations that are pinned antiparallel to one another, as indicated by symbols 313,315, across an AP coupling layer 316 that may be for example Ru. The magnetization of the pinned layer 306 may be pinned by exchange coupling the first magnetic layer 312 with an antiferromagnetic layer 318. The antiferromagnetic material of layer 318, which may be for example PtMn or IrMn, does not in and of itself have a magnetization, but when exchange coupled with a magnetic material such as first magnetic layer 318, strongly pins the magnetization of that magnetic layer. A seed layer 320 could also be provided at the bottom of the sensor to promote a desired crystallographic structure in the layers formed thereon. It should also be pointed out that the pinned layer 306 could also be self-pinned, in which case the AFM layer 318 would not be needed. In that case the pinned layer would be pinned by a combination of intrinsic anisotropy of the layers 312, 314 and magnetostriction of those layers 312, 314 combined with compressive stresses which inevitably exist in the sensor 300. The invention contemplates the use of either an AFM pinned or self pinned sensor. The first and second magnetic materials 312, 314 can be constructed of a magnetic material containing substantially equal parts of Co and Fe, ie. Co50Fe50. The 50-50 percentages are atomic percent and need not be exact. The percentages of either material could vary for example by 10% in either direction. The magnetic layers 312, 314 of the pinned layer could also be made of many other magnetic materials as well, such as Co or NiFe. With continued reference to FIG. 3 the free layer is a synthetic free layer having first and second magnetic layers 322, 324 separated by a non-magnetic coupling layer 326 such as Ru. Like the pinned layer, the magnetic layers 322, 324 of the free layer have magnetizations 323, 325 that are antiparallel coupled across the spacer layer 326, but are free to rotate in response to a magnetic field. The first magnetic layer 322, that which is closest to the spacer layer 310, is preferably constructed of substantially equal parts of Co and Fe, ie. Co50Fe50. This first layer 322 could also preferably be constructed of an alloy containing Co, Fe and Cu, such as for example Co42Fe43Cu15, or could be constructed as a mutilayer film including layers of Co50Fe50 interspersed with layers of Cu. These materials described for constructing the first magnetic layer 322 of the free layer 308 have been found to provide increased GMR effect. However, as described above they also have a strong positive magnetostriction which tends to move the magnetization to a direction perpendicular to the ABS surface. The desired direction of magnetization is parallel with the ABS as indicated by arrows 323, 325. This strong positive magnetostriction, when present in the free layer 308 as a whole, would lead to unacceptable signal noise, increased error rate, and free layer instability. With continued reference to FIG. 3, in order to alleviate the positive magnetosriction of the first layer 322, the second layer 324 of the free layer is constructed of a material having a negative magnetostriction. The relative thicknesses of the layers 322, 324 can be selected create net zero magnetostriction for the free layer 308 as a whole. The second layer 324 of the free layer 308 is constructed of an amorphous CoNiX alloy, where X is one of the following materials: Nb, Mo, W, Si and B. The alloy is preferably 75 atomic percent Co and 25 atomic percent NiX. Constructing the second layer 324 of the above described CoNiX material, causes the second layer to have no contribution to GMR effect. This advantageously prevents the second layer 324 from subtracting from the GMR effect as would otherwise be experienced if layer 324 were constructed of a material that contributed to GMR such as CoFe. In this way, the advantages of the second layer such as greater physical thickness, magnetostriction control, and decreased magnetic thickness, can be enjoyed without the undesirable GMR subtraction experienced in prior art synthetic free layers. With continued reference to FIG. 3, the presence of the “X” elements (Nb, Mo, W, Si and B) also advantageously causes the second layer 324 of the free layer 308 to be amorphous. Magnetostriction of a material can be effected by two factors, material composition and crystalographic structure, ie. the epitaxial growth of the material. When attempting to construct a material layer to have a specific magnetostriction, trying to control two separate effects simultaineously can be extremely challenging. By eliminating one of those factors (ie. epitaxy) the magnetostriction can be much more easily controlled through adjustment of material composition alone. In addition, a very thin (5-10 Angstroms) layer of Ni90Fe10 327 is preferably provided adjacent to the coupling layer 326 to assist the antiparallel coupling of the first and second free layers 322, 324 across the coupling layer 326. With reference now to FIG. 4, the present invention can also be embodied in a current in plane (CIP) sensor 400. The sensor 400 is constructed on a first gap layer 402 that provides a non-magnetic, dielectric substrate on which to construct the sensor 400. A second gap 404 is formed over the top of the sensor 400. First and second hard bias layers 406, 408 formed at either side of the sensor 400 are constructed of a relatively high coercivity magnetic material. First and second electrically conductive leads 410, 412 are formed over the hard bias layers and over a potion of each side of the sensor. The leads 410, 412 provide electrical sense current to the sensor which can be conducted along the plane of the material layers of the sensor 400 from one side to the other. The sensor includes a pinned layer 414, which can be an antiparallel (AP) pinned layer having first and second magnetic layers 416, 418 that have their magnetizations antiparallel pinned across a coupling layer 420 that can be for example Ru. The first magnetic layer 416 of the pinned layer can be constructed of Co90 Fe10 or some similar material. The second pinned layer 418 can be formed of Co90Fe10 or some similar material. The pinned layer 414 can be pinned by exchange coupling with an AFM layer 419, or can be self pinned as described with reference to the embodiment illustrated with reference to FIG. 3. In addition a seed layer 421 can be provided to assure a desired epitaxial growth of the various layers of the sensor 400. The pinned layer 406 is separated from a magnetic free layer 422 by a non-magnetic, electrically conductive spacer layer 424, which can be for example Cu. The free layer includes first and second magnetic layers 426, 428 separated by a coupling layer 430, which can be for example Ru. The first and second magnetic layers have magnetizations that are antiparallel coupled across the spacer layer 430 but are free to rotate in the presence of a magnetic field. The first magnetic layer 426 of the free layer can be constructed of Co90Fe10 or some similar material. The second magnetic layer 428 of the free layer 422 can be constructed of CoNiX, where X is one of the following materials: Nb, Mo, Si, B. As with the embodiment described with reference to FIG. 3, the material of the second magnetic layer 428 has a negative magntetostriction that compensates for the positive magnetostriction of the first magnetic layer 426, thereby maintaining the free layer stability that would otherwise be lost if the free layer 422 had a net positive magnetostriction. Also, as described with reference to the embodiment illustrated in FIG. 3, the second layer 428 of the free layer 422 provides no GMR effect and so does not subtract from the GMR effect provided by the first layer 426. The second free layer 428 preferably includes a thin (5 to 10 Angstrom) layer of Ni90Fe10 429 to assist in the antiparallel coupling of the first and second magnetic layers 426, 428 of the free layer 422. While the above embodiments have been described with reference to CIP and CPP GMRs it should be pointed out that the inventive concepts of the present invention can be embodied in many other types of sensors. For example, the sensor could be a differential GMR sensor. In addition, the sensor could be a dual GMR sensor having two separate free layers formed on either side of a central pinned layer. Many other embodiments will no doubt become apparent to those skilled in the art that would still fall within the scope of the invention. Therefore, while various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>The heart of a computer is an assembly that is referred to as a magnetic disk drive. The magnetic disk drive includes a rotating magnetic disk, write and read heads that are suspended by a suspension arm adjacent to a surface of a rotating magnetic disk and an actuator that swings the suspension arm to place the read and write heads over selected circular tracks on the rotating disk. The read and write heads are directly located on a slider that has an air bearing surface (ABS). The suspension arm biases the slider into contact with the surface of the disk when the disk is not rotating but, when the disk rotates, air is swirled by the rotating disk. When the slider rides on the air bearing, the write and read heads are employed for writing magnetic impressions to and reading magnetic impressions from the rotating disk. The read and write heads are connected to processing circuitry that operates according to a computer program to implement the writing and reading functions. The write head includes a coil layer embedded in first, second and third insulation layers (insulation stack), the insulation stack being sandwiched between first and second pole piece layers. A gap is formed between the first and second pole piece layers by a gap layer at an air bearing surface (ABS) of the write head and the pole piece layers are connected at a back gap. Current conducted to the coil layer induces a magnetic flux in the pole pieces which causes a magnetic field to fringe out at a write gap at the ABS for the purpose of writing the aforementioned magnetic impressions in tracks on the moving media, such as in circular tracks on the aforementioned rotating disk. In recent read head designs a spin valve sensor, also referred to as a giant magnetoresistive (GMR) sensor, has been employed for sensing magnetic fields from the rotating magnetic disk. The sensor includes a nonmagnetic conductive layer, hereinafter referred to as a spacer layer, sandwiched between first and second ferromagnetic layers, hereinafter referred to as a pinned layer and a free layer. First and second leads are connected to the spin valve sensor for conducting a sense current therethrough. The magnetization of the pinned layer is pinned perpendicular to the air bearing surface (ABS) and the magnetic moment of the free layer is located parallel to the ABS, but free to rotate in response to external magnetic fields. The magnetization of the pinned layer is typically pinned by exchange coupling with an antiferromagnetic layer. The thickness of the spacer layer is chosen to be less than the mean free path of conduction electrons through the sensor. With this arrangement, a portion of the conduction electrons is scattered by the interfaces of the spacer layer with each of the pinned and free layers. When the magnetizations of the pinned and free layers are parallel with respect to one another, scattering is minimal and when the magnetizations of the pinned and free layer are antiparallel, scattering is maximized. Changes in scattering alter the resistance of the spin valve sensor in proportion to cos θ, where θ is the angle between the magnetizations of the pinned and free layers. In a read mode the resistance of the spin valve sensor changes proportionally to the magnitudes of the magnetic fields from the rotating disk. When a sense current is conducted through the spin valve sensor, resistance changes cause potential changes that are detected and processed as playback signals. A spin valve sensor is characterized by a magnetiresistive (MR) coefficient that is substantially higher than the MR coefficient of an anisotropic magnetoresistive (AMR) sensor. For this reason a spin valve sensor is sometimes referred to as a giant magnetoresistive (GMR) sensor. When a spin valve sensor employs a single pinned layer it is referred to as a simple spin valve. When a spin valve employs an antiparallel (AP) pinned layer it is referred to as an AP pinned spin valve. An AP spin valve includes first and second magnetic layers separated by a thin non-magnetic coupling layer such as Ru. The thickness of the spacer layer is chosen so as to antiparallel couple the magnetizations of the ferromagnetic layers of the pinned layer. A spin valve is also known as a top or bottom spin valve depending upon whether the pinning layer is at the top (formed after the free layer) or at the bottom (before the free layer). A pinning layer in a bottom spin valve is typically made of platinum manganese (PtMn). The spin valve sensor is located between first and second nonmagnetic electrically insulating read gap layers and the first and second read gap layers are located between ferromagnetic first and second shield layers. In a merged magnetic head a single ferromagnetic layer functions as the second shield layer of the read head and as the first pole piece layer of the write head. In a piggyback head the second shield layer and the first pole piece layer are separate layers. Sensors can also be categorized as current in plane (CIP) sensors or as current perpendicular to plane (CPP) sensors. In a CIP sensor, current flows from one side of the sensor to the other side in the parallel to the planes of the materials making up the sensor. Conversely, in a CPP sensor the sense current flows from the top of the sensor to the bottom of the sensor perpendicular to the plane of the layers of material making up the sensor. Yet another type of sensor, somewhat similar to a CPP GMR sensor is a Tunnel Valve. A tunnel valve employs an electrically insulating spacer layer rather than a conductive spacer layer. A tunnel valve operates based on quantum mechanical tunneling of electrons through the insulating spacer layer. This tunneling is maximized when the magnetizations of the free and pinned layers are parallel to one another adjacent to the spacer layer. Recently, researchers have found that a change in the material of the pinned layer adjacent to the spacer layer can increase δr of the sensor. For example it has been found if the magnetic layers of the pinned layer are comprised of substantially equal parts Co and Fe, ie. Co 50 Fe 50 , the δr of a CPP spin valve can be improved significantly. In a CIP spin valve similar δr improvement has been found with the use of Co 90 Fe 10 in the pinned layer. These materials have strong positive magnetostriction, which means that the compressive stresses which inevitably occur in a spin valve will tend to magnetize the pinned layers perpendicular to the ABS of the sensor. This is not a problem for the pinned layer, and is even an advantage, since this is the desired direction of pinning, and the magnetostriction only acts to assist the desired pinning. It would be possible to achieve a similar δr improvement by using similar material in the free layer (ie. Co 50 Fe 50 for CPP, Co 10 Fe 10 for CIP). However, the strong positive magnetostriction of these materials would magnetize the free layer in an undesirable direction perpendicular to the ABS. This would lead to unacceptable signal noise and free layer instability. Another mechanism for increasing GMR effect, or δr, is to increase the thickness of the free and pinned layers. This is especially suitable in a CPP sensor where the total thickness of the sensor is not as limiting. It is known that increasing the thickness of the free layer can increase the GMR effect. However, increasing the free layer thickness also increases the magnetic thickness. This leads to free layer stiffness, because the coercivity of the free layer increases to the point that the sensor becomes insensitive to signals. One method that has been proposed to overcome this has been to form an antiparallel coupled free layer also referred to as a synthetic free layer. Such a synthetic free layer is similar to an AP pinned layer in that it has first and second magnetic layers having magnetizations that are antiparallel to one another across a coupling layer such as Ru. The synthetic free layer has a larger physical thickness than a simple free layer, but has a much smaller magnetic thickness, which is the difference between the magnetic thicknesses of the first and second magnetic layers. A serious disadvantage of such a synthetic free layer is that the second magnetic layer (that which is furthest from the spacer layer) subtracts from the GMR effect, because it is 180 degrees out of phase with the magnetization of the first magnetic layer adjacent to the spacer. Therefore, any GMR advantage achieved by the use of synthetic free layers is essentially lost by this subtractive effect of the second layer. Therefore, there remains a strong felt need for a mechanism for taking advantage of the increased GMR effects provided by the use of materials such as Co 50 Fe 50 or Co 90 Fe 10 in a free layer while mitigating the problems associated with the strong positive magnetostriction of such materials. There also remains a strong felt need for a means for utilizing the advantages of synthetic free layers in a spin valve without experiencing the subtractive effect of the second free layer on the GMR on the sensor.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention provides a sensor having a synthetic free layer having first and second magnetic materials separated by a non-magnetic coupling layer. The first magnetic layer of the free layer contributes strongly to a GMR effect and has a positive magnetostriction, whereas the second ferromagnetic layer contributes very little to GMR effect and has a negative magnetostriction that compensates for the positive magnetostriction of the first magnetic layer of the free layer. The present invention allows the sensor to utilize the benefits of a synthetic free layer, that is large physical thickness with small magnetic thickness, while mitigating the subtractive GMR typical caused by second magnetic layer of a synthetic free layer. The present invention also advantageously allows the use of materials such as Co 50 Fe 50 in the free layer, which provide excellent GMR effect, but suffer from strong positive magnetostriction. The strong positive mangetostriction of the such materials used in a first magnetic layer is compensated by a negative magnetostriction in the second magnetic layer of the sensor. The present invention may include a synthetic free layer having a first layer comprising substantially equal parts of Co and Fe. The synthetic free layer might also include a second layer constructed of CoNiX, where X is selected from the group consisting of: Nb, Mo, W, Si and B. The present invention might also include a synthetic free layer having a first layer comprising Co 90 Fe 10 or some similar material and a second layer constructed of CoNiX, where X is selected from the group consisting of: Nb, Mo, W, Si and B. The present invention could be embodied in a current perpendicular to plane CPP GMR sensor, a current in plane (CIP) GMR sensor, a tunnel valve or some other sort of sensor such as a differential GMR or dual spin valve sensor. The present invention could include a self pinned pinned layer or a pinned layer that is pinned by exchange coupling with an AFM layer. The pinned layer may be an antiparallel coupled pinned layer including first and second magnetic layers formed of Co 50 Fe 50 , or some similar material. The pinned layer could also include a first and second magnetic layers comprising Co 50 Fe 50 , and Co 90 Fe 10 respectively.
20040303
20061031
20050908
62237.0
0
EVANS, JEFFERSON A
MAGNETORESISTIVE SENSOR HAVING IMPROVED SYNTHETIC FREE LAYER
UNDISCOUNTED
0
ACCEPTED
2,004
10,793,761
ACCEPTED
Angle adjust device for a cymbal
An angle adjust device for a cymbal includes a connecting seat mounted to a free end of a cymbal stand. The connecting includes a hollow stub longitudinally extending through the connecting seat and a protrusion laterally extending from the connecting seat. A connector is mounted to the protrusion of the connecting seat and has a trough defined in the connector. The trough has an opening defined in one side of the connector facing the connecting seat. An actuated rod is limited in the connector. The actuated rod has a threaded section screwed into the threaded hole in the slider and a polygonal head co-axially extending from the threaded section through the connector for user to easily rotate the actuated rod and adjust a distance between the slider and the connecting seat.
1. An angle adjust device for a cymbal, comprising: a connecting seat adapted to be mounted to a free end of a cymbal stand, the connecting seat including a hollow stub longitudinally extending through the connecting seat and a protrusion laterally extending from the connecting seat; a connector mounted to the protrusion of the connecting seat and having a trough defined in the connector, the trough in the connector having an opening defined in one side of the connector facing the connecting seat; an actuated rod limited in the connector, the actuated rod having a threaded section screwed into the threaded hole in the slider and a polygonal head co-axially extending from the threaded section through the connector for user to easily rotate the actuated rod and adjust a distance between the slider and the connecting seat. 2. The angle adjust device as claimed in claim 1, wherein a tapered plane is formed on a top portion of the slider, the tapered plane having a height gradually reduced relative to the connecting seat. 3. The angle adjust device as claimed in claim 1, wherein the protrusion is U-shaped and has two rails respectively inwardly extending from two opposite sides of the protrusion to define two grooves in the two opposite sides of the protrusion, the connector having two flanges outwardly extending from two opposite sides thereof and each flange respectively inserted into a corresponding one of the two grooves in the protrusion to hold the connector in place between the two rails. 4. The angle adjust device as claimed in claim 2, wherein the protrusion is U-shaped and has two rails respectively inwardly extending from two opposite sides of the protrusion to define two grooves in the two opposite sides of the protrusion, the connector having two flanges outwardly extending from two opposite sides thereof and each flange respectively inserted into a corresponding one of the two grooves in the protrusion to hold the connector in place between the two rails. 5. The angle adjust device as claimed in claim 1, wherein the connector comprises two guiders laterally inwardly extending from two opposite sidewalls of the trough in the connector and the slider comprises two grooves respectively defined in two opposite sides of the slider, each groove in the slider receiving a corresponding one of the two guiders of the connector to limit a moving direction of the slider. 6. The angle adjust device as claimed in claim 1, wherein the connector comprises a through hole defined in a back thereof and co-axially corresponding to the threaded hole in the slider, an annular lip extending from an inner periphery of the through hole in the connector, the actuated rod having a shoulder radially extending therefrom between the threaded section and the polygonal head and abutting the annular lip of the connector to limited the actuated rod in the connector. 7. The angle adjust device as claimed in claim 1 further comprising a resilient member mounted between the slider and the connecting seat for ensure the actuated rod limited in the connector. 8. The angle adjust device as claimed in claim 7, wherein the slider comprises a blind hole defined therein and extending toward the connecting seat for partially receiving the resilient member. 9. The angle adjust device as claimed in claim 8, wherein the blind hole in the slider co-axially communicates with the threaded hole in the slider so that the actuated rod extends through the resilient member. 10. The angle adjust device as claimed in claim 7, wherein the resilient member is a coil spring. 11. The angle adjust device as claimed in claim 8, wherein the resilient member is a coil spring. 12. The angle adjust device as claimed in claim 9, wherein the resilient member is a coil spring.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an angle adjust device, and more particularly to an angle adjust device for a cymbal. 2. Description of Related Art A conventional angle adjust device (80) for a cymbal in accordance with the prior art shown in FIGS. 6 and 7 is secured on a shaft (71) of a cymbal stand (70). An axle (72) longitudinally upwardly extends from the shaft (71). The axle (72) centrally extends through a first cymbal (73) and a second cymbal (74). The angle adjust device (80) includes a connecting seat (81) mounted on a top of the shaft (71) and the axle (72) extends through the connecting seat (81). An L-shaped actuated rod (82) is pivotally mounted on the connecting seat (81) and a screw (83) extends through the actuated rod and radially screwed into the connecting seat (81). A spring (84) sleeved on the screw (83) between a vertical portion (820) of the actuated rod (82) and the connecting seat (81). The actuated rod (82) has an act portion (821) laterally extending from an upper end of the vertical portion (820) of the actuated rod (82). The actuated rod (82) includes a horizontal portion extending for a top of the vertical portion (820) toward the axle (72). A hollow sleeve (85) extends from the connecting seat (81) and is sleeved on the axle (72). A washer (86), a cushion pad (87) and the second cymbal (73) are respectively sequentially sleeved on the hollow sleeve (85). The action portion (821) is moved to lift the washer (86) for adjusting an angle of elevation of the cymbal when the actuated rod (82) is rotated to drive the vertical portion (820) moved toward the connecting seat (81). However, the conventional angle adjust device for a cymbal in accordance with the prior art has the follow disadvantages that need to be advantageously altered. 1. The actuated rod (82), the screw (83) and the spring (84) are assembled after the connecting seat (81) being mounted to the cymbal stand (70). However, the spring (84) is previously compressed between the connecting and the actuated rod (82) so that the conventional angle adjust device is inconveniently assembled. 2. The connecting seat (81) is usually made of metal for providing structure strength to allow the screw screwed into the connecting seat (81). For reducing the friction between the sleeve and the axle (72), the sleeve (85) is usually made of plastic. Consequently, the sleeve (85) needs to be perpendicularly mounted to and extending through the connecting seat. It is a hard job. 3. The actuated rod (82), the screw (83) and the spring (84) of the conventional angle adjust device are exposed so that the conventional angle adjust device for a cymbal does not have the dustproof function. The present invention has arisen to mitigate and/or obviate the disadvantages of the conventional angle adjust device for a cymbal. SUMMARY OF THE INVENTION The main objective of the present invention is to provide an improved angle adjust device for a cymbal, the angle adjust device of the present invention can be easily assembled and has a good connection. To achieve the objective, the angle adjust device in accordance with the present invention comprises a connecting seat mounted to a free end of a cymbal stand. The connecting includes a hollow stub longitudinally extending through the connecting seat and a protrusion laterally extending from the connecting seat. A connector is mounted to the protrusion of the connecting seat and has a trough defined in the connector. The trough has an opening defined in one side of the connector facing the connecting seat. An actuated rod is limited in the connector. The actuated rod has a threaded section screwed into the threaded hole in the slider and a polygonal head co-axially extending from the threaded section through the connector for user to easily rotate the actuated rod and adjust a distance between the slider and the connecting seat. Further benefits and advantages of the present invention will become apparent after a careful reading of the detailed description with appropriate reference to the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an exploded perspective view of an angle adjust device for a cymbal in accordance with the present invention; FIG. 2 is a cross-sectional view of the angle adjust device for a cymbal in accordance with the present invention; FIG. 3 is a top plan view in cross-section of the angle adjust device in FIG. 2; FIG. 4 is a side operational plan view in cross-section of the angle adjust device in FIG. 2 when the slider is inwardly moved to lift the cymbal; FIG. 5 is a side operational plan view in cross-section of a second embodiment of an angle adjust device for a cymbal in accordance with the present invention when the slider is outwardly moved to reduce the angle between the cymbal and the level; FIG. 6 is a schematic plan view of a conventional angle adjust device for a cymbal in accordance with the prior art; and FIG. 7 is an operational view in cross-section of the angle adjust device in FIG. 6. DETAILED DESCRIPTION OF THE INVENTION Referring to the drawings and initially to FIGS. 1-3, an angle adjust device for a cymbal in accordance with the present invention comprises connecting seat (10) mounted on a free end of a cymbal stand (60), a connector (20) laterally mounted to the connecting seat (10) and a slider (30) movably received in the connector (20). The connecting seat (10) includes a hollow stub (11) extending therethrough and a U-shaped protrusion (12) laterally extending therefrom. The U-shaped protrusion (12) has two opposite sides each having a rail (13) inwardly extending therefrom near an outer periphery of the connecting seat (10). The two rails (13) correspond to each other to defined two grooves (14) in the two opposite sides of the U-shaped protrusion (12). The connector (20) is mounted to the U-shaped protrusion (12). The connector (20) includes two flanges (21) respectively laterally extending from two opposite sides of the connector (20). Each flange (21) is received in a corresponding one of the two grooves (14) in the U-shaped protrusion (12) to hold the connector (20) in place on the connecting seat (10). A trough (22) is defined in the connector (20) and two guiders (23) laterally inwardly extend from two opposite sidewalls of the trough (22). The trough (22) has an opening (not numbered) defined in one side of the connector facing the connecting seat (10). A through hole (24) is defined in a back of the connector (20) and horizontally communicates with the trough (22). An annular lip (241) radially extends from an inner periphery of the through hole (24). The slider (30) includes a threaded hole (31) defined therein and co-axially corresponds to the through hole (24) in the connector (20). The threaded hole (31) extends through the slider (30). Two grooves (32) are defined in two opposite sides of the slider (30) for movably receiving a corresponding one of the two guiders (23). A tapered plane (33) is formed on a top portion of the slider (30). The height of the tapered plane (33) is gradually reduced relative to the distance between the slider (30) and hollow stub (11) of eth connecting seat (10). A blind hole (34) is laterally defined in the slider (30) and extends toward the connecting seat (10). A resilient member (40) is compressively mounted between the slider and the connecting (10). In the preferred embodiment of the present invention, the resilient member (40) is a coil spring. The resilient member (40) is partially received in the blind hole (34), and has a first end abutting against the outer periphery of the connecting seat (10) ad a second end abutting a bottom of the blind hole (34) in the slider (30) for outwardly pushing the slider (30). An actuated rod (50) includes a threaded section (52) screwed into the threaded holed (31) in the slider (30) for adjusting a distance between the slider (30) and the connecting seat (10) when rotating the actuated rod (50). A shoulder (53) radially outwardly extends from the actuated rod (50) and abuts against the annular lip (241) due to the restitution force of the resilient member (40). A polygonal head (51) centrally extends from the shoulder (53) through the through hole (24) in the connector (20) for user to easily rotate the actuated rod (50). The polygonal head (51) co-axially corresponds to the threaded section (52). As usual, the cymbal stand (60) has an axle (64) longitudinally extending therefrom through the hollow stub (11) of the connecting seat (10). A washer (61), a cushion pad (62) and a cymbal (63) are sequentially sleeved on the hollow stub, wherein the tapered plane (33) of the slider (30) abuts against a bottom of the washer (61). With reference to FIGS. 2 and 4, the slider (30) is moved toward the connecting seat (10) to increase an angle of elevation of the cushion pad (62) and the cymbal (63) due to the tapered plane (33) of the slider (30) when rotating the actuated rod (50). On the contrary, the angle of elevation of the cushion pad (62) and the cymbal (63) is decreased when the slider (30) is moved opposite to the connecting seat (10). With reference to FIG. 5, it is a second embodiment of the angle adjust device in accordance with the present invention. The threaded hole (31) in the slider (30) communicates with the blind hole (34) and co-axially corresponds to the through hole (24) in the connector (20) so that the actuated rod (50) extends through the resilient member (40). As described above, the angle adjust device for a cymbal in accordance with the present invention includes the following advantages. 1. The connector (20), the slider (30), the resilient member (40) and the actuated rod (50) are previously assembled and mounted to the connecting seat (10) so that the assembling processes of the present invention is simplified. 2. The connector (20) is buckled to the connecting seat (10) for increasing the connecting area and the hollow stub (1) is integrally formed with the connecting seat (10) so that the angle adjust device of the present invention has a good connection. 3. The slider (30), the resilient member (40) and the actuated rod (50) are received in the trough (22) in the connector (20) so that the angle adjust device of the present invention has a complete appearance and an effect of dustproof. Although the invention has been explained in relation to its preferred embodiment, it is to be understood that many other possible modifications and variations can be made without departing from the spirit and scope of the invention as hereinafter claimed.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to an angle adjust device, and more particularly to an angle adjust device for a cymbal. 2. Description of Related Art A conventional angle adjust device ( 80 ) for a cymbal in accordance with the prior art shown in FIGS. 6 and 7 is secured on a shaft ( 71 ) of a cymbal stand ( 70 ). An axle ( 72 ) longitudinally upwardly extends from the shaft ( 71 ). The axle ( 72 ) centrally extends through a first cymbal ( 73 ) and a second cymbal ( 74 ). The angle adjust device ( 80 ) includes a connecting seat ( 81 ) mounted on a top of the shaft ( 71 ) and the axle ( 72 ) extends through the connecting seat ( 81 ). An L-shaped actuated rod ( 82 ) is pivotally mounted on the connecting seat ( 81 ) and a screw ( 83 ) extends through the actuated rod and radially screwed into the connecting seat ( 81 ). A spring ( 84 ) sleeved on the screw ( 83 ) between a vertical portion ( 820 ) of the actuated rod ( 82 ) and the connecting seat ( 81 ). The actuated rod ( 82 ) has an act portion ( 821 ) laterally extending from an upper end of the vertical portion ( 820 ) of the actuated rod ( 82 ). The actuated rod ( 82 ) includes a horizontal portion extending for a top of the vertical portion ( 820 ) toward the axle ( 72 ). A hollow sleeve ( 85 ) extends from the connecting seat ( 81 ) and is sleeved on the axle ( 72 ). A washer ( 86 ), a cushion pad ( 87 ) and the second cymbal ( 73 ) are respectively sequentially sleeved on the hollow sleeve ( 85 ). The action portion ( 821 ) is moved to lift the washer ( 86 ) for adjusting an angle of elevation of the cymbal when the actuated rod ( 82 ) is rotated to drive the vertical portion ( 820 ) moved toward the connecting seat ( 81 ). However, the conventional angle adjust device for a cymbal in accordance with the prior art has the follow disadvantages that need to be advantageously altered. 1. The actuated rod ( 82 ), the screw ( 83 ) and the spring ( 84 ) are assembled after the connecting seat ( 81 ) being mounted to the cymbal stand ( 70 ). However, the spring ( 84 ) is previously compressed between the connecting and the actuated rod ( 82 ) so that the conventional angle adjust device is inconveniently assembled. 2. The connecting seat ( 81 ) is usually made of metal for providing structure strength to allow the screw screwed into the connecting seat ( 81 ). For reducing the friction between the sleeve and the axle ( 72 ), the sleeve ( 85 ) is usually made of plastic. Consequently, the sleeve ( 85 ) needs to be perpendicularly mounted to and extending through the connecting seat. It is a hard job. 3. The actuated rod ( 82 ), the screw ( 83 ) and the spring ( 84 ) of the conventional angle adjust device are exposed so that the conventional angle adjust device for a cymbal does not have the dustproof function. The present invention has arisen to mitigate and/or obviate the disadvantages of the conventional angle adjust device for a cymbal.
<SOH> SUMMARY OF THE INVENTION <EOH>The main objective of the present invention is to provide an improved angle adjust device for a cymbal, the angle adjust device of the present invention can be easily assembled and has a good connection. To achieve the objective, the angle adjust device in accordance with the present invention comprises a connecting seat mounted to a free end of a cymbal stand. The connecting includes a hollow stub longitudinally extending through the connecting seat and a protrusion laterally extending from the connecting seat. A connector is mounted to the protrusion of the connecting seat and has a trough defined in the connector. The trough has an opening defined in one side of the connector facing the connecting seat. An actuated rod is limited in the connector. The actuated rod has a threaded section screwed into the threaded hole in the slider and a polygonal head co-axially extending from the threaded section through the connector for user to easily rotate the actuated rod and adjust a distance between the slider and the connecting seat. Further benefits and advantages of the present invention will become apparent after a careful reading of the detailed description with appropriate reference to the accompanying drawings.
20040308
20060905
20050929
95482.0
0
LOCKETT, KIMBERLY R
ANGLE ADJUST DEVICE FOR A CYMBAL
SMALL
0
ACCEPTED
2,004
10,793,817
ACCEPTED
Blasting apparatus
A process for treating surfaces of rare earth metal-based permanent magnets, comprising removing an oxide layer formed on a surface of each of the permanent magnets using a blasting apparatus. The apparatus comprises a tubular barrel formed of a mesh net for accommodation of work pieces and supported circumferentially outside a center axis of a support member rotatable about the center axis, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel, wherein at least one of the tubular barrel and the support member is detachably mounted. The process further comprises removing the tubular barrel or the support member from the blasting apparatus and attaching the tubular barrel or the support member to a vapor deposited film forming apparatus, where a metal film is formed on the surface of each of the permanent magnets by a vapor deposition process.
1. A process for treating surfaces of rare earth metal-based permanent magnets, comprising the steps of removing an oxide layer formed on a surface of each of the rare earth metal-based permanent magnets using a blasting apparatus which comprises a tubular barrel formed of a mesh net for accommodation of work pieces and supported circumferentially outside a center axis of a support member rotatable about said center axis, for rotation about said center axis, so that said tubular barrel can be rotated about said center axis of said support member by rotating said support member, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of said tubular barrel rotated about said center axis, wherein at least one of said tubular barrel and said support member for supporting said tubular barrel is detachably mounted; removing said tubular barrel containing the rare earth metal-based permanent magnets with the oxide layers removed therefrom, or said support member for supporting said tubular barrel from said blasting apparatus; and attaching said tubular barrel or said support member to a vapor deposited film forming apparatus, where a metal film is formed on the surface of each of the rare earth metal-based permanent magnets by a vapor deposition process. 2. A process for treating the surfaces of rare earth metal-based permanent magnets according to claim 1, the process further including a step of removing the tubular barrel containing the rare earth metal-based permanent magnets having the metal films formed thereon, or the support member for supporting the tubular barrel from the vapor deposited film forming apparatus, and attaching said tubular barrel or said support member again to the blasting apparatus, where the metal films are subjected to a shot peening.
CROSS REFERENCE TO RELATED APPLICATION This application is a division of Ser. No. 09/819,765, filed Mar. 29, 2001. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a blasting apparatus suitable for carrying out a surface treatment of sintered products such as rare earth metal-based permanent magnets and ceramics. 2. Description of the Related Art A blasting apparatus is conventionally used for a surface treatment of, for example, rare earth metal-based permanent magnets, i.e., a treatment for removing an oxide layer formed on the surface, a treatment for cleaning the surface or a shot peening for finishing a film formed on the surface. There are various types of blasting apparatus. For example, in a tumbler-type blasting apparatus, work pieces are placed into a drum within the apparatus, and an injection nozzle is disposed so as to inject a blast material against the work pieces through an opening in the drum, while stirring the work pieces by rotating the drum (see Japanese Patent Application Laid-open No.11-347941). A blasting apparatus as described above is capable of mass-treatment of work pieces and excellent in productivity. In such apparatus, however, the injection of the blast material against the work pieces can be conducted only through the opening in the drum, and hence, there is, of course, a limit in respect of the treating efficiency. When an attempt is made to stir the work pieces as homogenously as possible by prolonging the treating period of time or by increasing the rotational speed of the drum in order to enhance the treating efficiency, the collision of the workpieces against one another occur frequently and with a strong shock force. For this reason, a cracking and breaking is produced in many of the work pieces. The stirring of the work pieces must be carried out, so that they are not dropped out through the opening and hence, the setting of the stirring condition is accompanied by a limitation. Further, it is necessary to place and remove the work pieces into and out of the drum before and after the treatment and hence, during the placing and removal, a cracking and breaking may be caused in the work pieces. SUMMARY OF THE INVENTION Accordingly, it is an object of the present invention to provide a blasting apparatus, which is excellent in treating efficiency of work pieces, and in which the occurrence of the cracking and breaking of the work pieces can be inhibited. To achieve the above object, according to a first aspect and feature of the present invention, there is provided a blasting apparatus, comprising a tubular barrel formed of a mesh net for accommodation of work pieces and rotatable about a center axis, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel. According to a second aspect and feature of the present invention, in addition to the first feature, the inside of the tubular barrel is divided into two or more accommodating sections. According to a third aspect and feature of the present invention, in addition to the second feature, the inside of the tubular barrel is divided radiately from the center axis into two or more accommodating sections. According to a fourth aspect and feature of the present invention, in addition to the first feature, the tubular barrel is detachably mounted. According to a fifth aspect and feature of the present invention, there is provided a blasting apparatus, comprising a tubular barrel formed of a mesh net for accommodation of work pieces and supported circumferentially outside a center axis of a support member rotatable about the center axis, for rotation about the center axis, so that the tubular barrel can be rotated about the center axis of the support member by rotating the support member, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel rotated about the center axis. According to a sixth aspect and feature of the present invention, in addition to the fifth feature, a plurality of the tubular barrels are supported in an annular shape circumferentially outside the center axis of the support member. According to a seventh aspect and feature of the present invention, in addition to the fifth feature, the tubular barrel and/or the support member for supporting the tubular barrel is detachably mounted. According to an eighth aspect and feature of the present invention, there is provided a process for blasting surfaces of work pieces using a blasting apparatus according to the first or fifth feature. According to a ninth aspect and feature of the present invention, in addition to the eighth feature, the work pieces are rare earth metal-based permanent magnets. According to a tenth aspect and feature of the present invention, there is provided a process for treating the surfaces of rare earth metal-based permanent magnets, comprising the steps of removing an oxide layer formed on the surface of each of the rare earth metal-based permanent magnets using a blasting apparatus according to the fourth or seventh feature, removing the tubular barrel containing the rare earth metal-based permanent magnets with the oxide layers removed therefrom, or the support member for supporting the tubular barrel from the blasting apparatus, and attaching the tubular barrel or the support member to a vapor deposited film forming apparatus, where a metal film is formed on the surface of each of the rare earth metal-based permanent magnets by a vapor deposition process. According to an eleventh aspect and feature of the present invention, in addition to the tenth feature, the process further includes a step of removing the tubular barrel containing the rare earth metal-based permanent magnets having the metal films formed thereon, or the support member for supporting the tubular barrel from the vapor deposited film forming apparatus, and attaching the tubular barrel or the support member again to the blasting apparatus according to the fourth or seventh feature, where the metal films are subjected to a shot peening. With the blasting apparatus according to the first feature of the present invention (a first embodiment of the present invention) in which the injection nozzle is disposed to inject the blast material against the work pieces from the outside of the tubular barrel formed of the mesh net for accommodation of the work pieces and rotatable about the center axis, the work pieces can be stirred homogenously and efficiently without excessive occurrence of the collision of the work pieces against one another and without occurrence of the collision of the work pieces against one another with a strong shock force. Therefore, the treating efficiency is enhanced and moreover, it is possible to inhibit the occurrence of the cracking and breaking of the work pieces. Since the tubular barrel is formed of the mesh net, the blast material can be injected from all directions. Therefore, any number of injection nozzles for injecting the blast material can be disposed at any locations in any manner, so that the blast material can be injected uniformly and efficiently against the work pieces. With the blasting apparatus according to the fifth feature of the present invention (a second embodiment of the present invention) in which the tubular barrel formed of the mesh net for accommodation of the work pieces and supported circumferentially outside the center axis of the support member rotatable about the center axis, for rotation about the center axis, so that the tubular barrel can be rotated about the center axis of the support member by rotating the support member, and the injection nozzle is disposed to inject the blast material against the work pieces from the outside of the tubular barrel rotated about the center axis, it is possible to more inhibit the occurrence of the cracking and breaking of the work pieces, in addition to the effect provided in the blasting apparatus according to the first feature of the present invention. The above and other objects, features and advantages of the invention will become apparent from the following description of the preferred embodiment taken in conjunction with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagrammatic front view of the inside of one example of a blasting apparatus according to a first embodiment of the present invention; FIG. 2 is a diagrammatic side view of the inside of the one example of the blasting apparatus according to the first embodiment of the present invention; FIG. 3 is a diagrammatic front view of the inside of another example of a blasting apparatus according to the first embodiment of the present invention; FIG. 4 is a diagrammatic side view of the inside of the another example of the blasting apparatus according to the first embodiment of the present invention; FIG. 5 is a diagrammatic front view of the inside of one example of a blasting apparatus according to a second embodiment of the present invention; FIG. 6 is a diagrammatic side view of the inside of the one example of the blasting apparatus according to the second embodiment of the present invention; FIG. 7 is a diagrammatic side view of the inside of another example of a blasting apparatus according to the second embodiment of the present invention; FIG. 8 is a diagrammatic perspective view showing the embodiment with the cylindrical barrels supported on the support members in the blasting apparatus shown in FIG. 7; FIG. 9 is a diagrammatic perspective view showing an embodiment other than the embodiment with the cylindrical barrels supported on the support members shown in FIG. 8; FIG. 10 is a diagrammatic perspective view of the cylindrical barrel used in the embodiment shown in FIG. 9; and FIG. 11 is a diagrammatic partially front view showing how the cylindrical barrel is supported on the support member in the embodiment shown in FIG. 9. DETAILED DESCRIPTION OF THE INVENTION The present invention will now be described by way of embodiments with reference to the accompanying drawings. Typical examples of work pieces subjected to a surface treatment using a blasting apparatus according to the present invention are sintered products such as rare earth metal-based permanent magnets and ceramics liable to be cracked and broken. However, the workpiece is not limited to these sintered products, and may be any piece, if the surface treatment of such a piece can be achieved by a blasting treatment. For example, the work piece may be a piece liable to be deformed due to the collision of them against one another, such as a casting aluminum. If the surface treatment of such work pieces is conducted using the blasting apparatus according to the present invention, an effect of inhibiting the deformation can be provided. Examples of blast materials used in the blasting apparatus according to the present invention are metallic blast materials such as steel shots and non-metallic blast materials such as Alundum (a trade name of Norton Co.,) and glass beads, any one of which is selected properly depending on the treating purpose. A blasting apparatus according to a first embodiment of the present invention will now be described. This apparatus includes a tubular barrel formed of a mesh net for accommodation of workpieces and rotatable about a center axis, and an injection nozzled is posed to inject a blast material against the workpieces from the outside of the tubular barrel. The outlines of several examples of the blasting apparatus will be described below with the drawings. A blasting apparatus shown in FIGS. 1 and 2 is of a type in which the inside of a tubular barrel is not divided. FIG. 1 is a diagrammatic front view (a partially perspective view) of the inside of the blasting apparatus 1. A cylindrical barrel 5 formed of a mesh net of a stainless steel disposed in a lower area in the apparatus is constructed, so that it is rotated about a center axis by rotating rollers 2 and 3 by driving a motor (not shown) to stir work pieces 10 in the barrel 5 homogenously and efficiently (see an arrow in FIG. 1). A total of six injection nozzles 4 for injecting a blast material against work pieces 10 in the cylindrical barrel 5 are disposed above the cylindrical barrels in two rows in a longitudinal direction of the barrel at an appropriate injection angle θ (usually in a range of 20° to 300). If a central support shaft 6 is provided on the center axis, it is convenient when the cylindrical barrel is removed from the apparatus and moved. FIG. 2 is a diagrammatic side view of the inside of the blasting apparatus 1. The individual injection nozzle 4 has an appropriate angle of oscillation in the longitudinal direction of the cylindrical barrel 5 and hence, is capable of injecting the blast material uniformly and efficiently against all the work pieces 10 (not shown in FIG. 2) in the barrel. A blasting apparatus shown in FIGS. 3 and 4 is of a type in which the inside of a tubular barrel is divided into two or more accommodating sections. FIG. 3 is a diagrammatic front view (a partially perspective view) of the inside of the blasting apparatus 51. In this apparatus 51, the inside of a cylindrical barrel 55 is divided radiately from a center axis into six accommodating sections fan-shaped in section. The blasting apparatus 51 is constructed so that the cylindrical barrel 55 is rotated about the center axis by rotating the central support shaft 56 on the center axis by driving a motor (not shown), whereby work pieces 60 in the barrel are stirred homogeneously and efficiently (see an arrow in FIG. 3), unlike the blasting apparatus shown in FIGS. 1 and 2. A total of three injection nozzles 54 for injecting a blast material against the work pieces 60 in the cylindrical barrel 55 are disposed in such a manner that one of the injection nozzles 54 is located above the barrel 55, other one of the injection nozzles 54 is located on the right of and below the barrel 55, and remaining one of the injection nozzles 54 is located on the left of and below the barrel 55. FIG. 4 is a diagrammatic side view of the inside of the blasting apparatus 51. The injection nozzles 54 are movable in the longitudinal direction of the cylindrical barrel 55 and hence, are capable of injecting the blast material uniformly and efficiently against all of the work pieces 60 (not shown in FIG. 4) in the barrel. With the blasting apparatus according to the first embodiment of the present invention, the accommodation of the work pieces in the tubular barrel formed of the mesh net ensures that the work pieces can be stirred homogenously and efficiently in a state in which they are less piled up one on another without excessive occurrence of the collision of the work pieces against one another and without occurrence of the collision of the work pieces against one another with a strong shock force. Therefore, the area of work piece blasted per unit time is increased and hence, the treating efficiency is enhanced and moreover, it is possible to inhibit the occurrence of the cracking and breaking of the work pieces. Since the tubular barrel is formed of the mesh net, the blast material can be injected from all directions. Therefore, any number of injection nozzles for injecting the blast material can be disposed at any locations in any manner, so that the blast material can be injected uniformly and efficiently against the work pieces. In addition, the blasting treatment can be carried out with an excellent treating efficiency and hence, can be achieved at an injection pressure lower than that in the prior art. Therefore, the load of a compressor can be reduced, and an increase in power efficiency can be provided. After the blasting of the work pieces, it is desirable that the blast material deposited on the surfaces of the work pieces and on the tubular barrel is removed by blowing of air under conditions, for example, of a pressure in a range of 0.1 MPa to 0.5 MPa and of a treating time in a range of 1 minute to 3 minutes. Since the tubular barrel is formed of the mesh net, the blast material can be removed easily, and if the treatment is carried out while rotating the tubular barrel, the blast material can be removed more efficiently. In addition, the work pieces are stirred in the state in which they have been accommodated in the tubular barrel, and hence, the work pieces cannot be dropped out through an opening, as is the case when a conventional tumbler-type apparatus. If the inside of the tubular barrel is divided into two or more accommodating sections as in the blasting apparatus shown in FIGS. 3 and 4, even when the same amount of work pieces are to be subjected to the blasting treatment, the work pieces can be placed in a smaller amount into each of the accommodating sections rather than in a larger amount into a single tubular barrel. In this case, the frequency of collision of the work pieces against one another can be more reduced, and the collision energy can be reduced and hence, the work pieces can be stirred homogeneously and efficiently in a state in which they are less piled up one on another. Therefore, it is possible to more inhibit the occurrence of the cracking and breaking of the work pieces. Partitions for defining the accommodating sections are desirable to be net-shaped. The provision of the tubular barrel detachable and easy to handle provides the following advantages: First, the placing and removal of the work pieces into and out of the tubular barrel can be carried out at any site and hence, it is possible to enhance the convenience. In the surface treatment of rare earth metal-based permanent magnets, the single tubular barrel can be used consistently at a plurality of steps. More specifically, it is possible to sequentially carry out the following steps: a step of removing an oxide layer formed on the surface of each of the rare earth metal-based permanent magnets using this blasting apparatus, a step of removing, from the blasting apparatus, the tubular barrel in which the rare earth metal-based permanent magnets with the oxide layers removed therefrom have been contained, a step of attaching the tubular barrel to a vapor deposited film forming apparatus to form a metal film such as an aluminum film on the surface of each of the rare earth metal-based permanent magnets by a vapor deposition process, a step of removing, from the vapor deposited film forming apparatus, the tubular barrel in which the rare earth metal-based permanent magnets having the metal films formed thereon have been contained, a step of attaching the tubular barrel again to the blasting apparatus to subject the metal film to a shot peening, a step of removing, from the blasting apparatus, the tubular barrel in which the rare earth metal-based permanent magnets having the metal films subjected to the shot peening have been contained, a step of immersing the tubular barrel into a chemical conversion-treating liquid (for example, a chemical conversion-treating liquid for a chromating treatment described in Japanese Patent Publication No.6-66173 or for a zirconium-phosphate treatment described in Japanese Patent Application Laid-open No.2000-150216) in a state in which the rare earth metal-based permanent magnets have been contained in the tubular barrel (wherein the tubular barrel may be rotated in the chemical conversion-treating liquid in order to form a more uniform film), and a step of pulling the tubular barrel up, thereby forming a chemical conversion film on the surface of each of the metal films. In addition, after the step of removing an oxide layer formed on the surface of each of the rare earth metal-based permanent magnets using this blasting apparatus, it is possible to carry out a step of removing, from the blasting apparatus, the tubular barrel in which the rare earth metal-based permanent magnets with the oxide layers removed therefrom have been contained, a step of immersing the tubular barrel into a chemical conversion-treating liquid (for example, a chemical conversion-treating liquid for a phosphate treatment or a chromating treatment described in Japanese Patent Application Laid-open No.60-63903) in a state in which the rare earth metal-based permanent magnets have been contained in the tubular barrel (wherein the tubular barrel may be rotated in the chemical conversion-treating liquid in order to form a more uniform film), and a step of pulling the tubular barrel up, thereby forming a chemical conversion film on the surface of each of the magnets. As long as the tubular barrel can be consistently used, the tubular barrel may be used at another step carried out between the above-described steps. Therefore, the need for carrying out an operation for transferring the magnets between the steps is eliminated and hence, it is possible to inhibit the occurrence of the cracking and breaking of the magnets, which may be caused during transferring of the magnets and in addition, to eliminate labor for the transferring operation. If a plurality of tubular barrels having the same shape are prepared and put into continuous service, the tubular barrel X passed through a B step can be transferred to a C step and then, the tubular barrel Y passed through an A step can be transferred to the B step. Therefore, all of the steps can be conducted smoothly and hence, the time required for all of the steps can be shortened. Especially, the blasting step and the blast material removing step by blowing of air, as described above, have been carried out in the same treating chamber in the prior art. However, if the tubular barrels are detachable and easy to handle, both of these steps can be carried out in different treating chambers adjoining each other, and while the blast material removing step is being conducted in the tubular barrel X, the blasting step can be conducted in the tubular barrel Y. Therefore, it is possible to reduce the time period required for the blast material removing step and occupied in the time period required for all of the steps. The deposition of a vapor deposition material such as aluminum to the tubular barrel to a moderate extent inhibits the damaging (including the wearing, the reduction in strength and the peeling-off of a welded zone) of the mesh net forming the tubular barrel at the blasting step and the blast material removing step and hence, it is possible to prolong the time of durability of the tubular barrel. In addition, the vapor deposition material such as aluminum and the blast material deposited to the tubular barrel to an excessive extent can be removed at the blasting step and the blast material removing step. Therefore, it is possible to prolong the time of durability of the tubular barrel, and to inhibit foreign matters deposited to the barrel during formation of a metal film by the vapor deposition process from being deposited to the surface of each of the work pieces to produce projections. The shape of the barrel is not limited to the cylindrical shape, and the barrel may be polygonal in section such as hexagonal and octagonal, if it is tubular. If the shape of the tubular barrel is not cylindrical, the barrel cannot be rotated smoothly using a roller as in the blasting apparatus shown in FIGS. 1 and 2. Therefore, the rotation of the barrel may be conducted by rotating the central support shaft as in the blasting apparatus shown in FIGS. 3 and 4. Net-shaped dividing walls may be provided vertically in the longitudinal direction within the tubular barrel (the accommodating section), so that one work piece may be accommodated in each of partitioned chamber portions defined by the dividing walls, whereby the work pieces may be subjected in spaced-apart states to the blasting treatment. Examples of the mesh net forming the tubular barrel include those made of a stainless steel and titanium, but the mesh net made of titanium is desirable from a reduction in weight of the tubular barrel. The mesh net may be made using a net-shaped plate produced by punching or etching a flat plate, or may be made by knitting a linear material. The opening rate of the mesh (the proportion of the area of an opening to the area of the mesh) depends on the shape and the size of a work piece, but is desirably in a range of 50% to 95%, more desirably in a range of 60% to 85%. If the opening rate is smaller than 50%, there is a possibility that the mesh itself is an obstacle between the injection nozzle and the work piece, resulting in a reduced treating efficiency. If the opening rate is larger than 95%, there is a possibility that the mesh is deformed or damaged during the treatment or during another handling. The wire diameter of the mesh is selected in consideration of the opening rate and the strength, and is desirable to be in a range of 0.1 mm to 10 mm. Further, if the handling ease is taken into consideration, the wire diameter of the mesh is desirable to be in a range of 0.3 mm to 5 mm. A blasting apparatus according to a second embodiment of the present invention will now be described. This apparatus includes a tubular barrel formed of a mesh net for accommodation of work pieces and supported circumferentially outside a center axis of a support member rotatable about the center axis, for rotation about the center axis, so that the tubular barrel can be rotated about the central axis of the support member, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel rotated about the center axis. The outline of one example of the blasting apparatus will be described below with the drawings. FIG. 5 is a diagrammatic front view (a partially perspective view) of the inside of a blasting apparatus 101. Support member 107 rotatable about a center axis is supported on rollers 102 and 103 in a lower area in the apparatus, and six cylindrical barrels 105 formed of a mesh net of a stainless steel are supported in an annular shape circumferentially outside the center axis of the support member by support shaft 108 for rotation about the center axis. When the support member 107 is rotated about the center axis by rotating the rollers 102 and 103 by driving a motor (not shown), the cylindrical barrel 105 supported by the support shaft 108 is rotated about the center axis in response to the rotation of the support member 107, whereby work pieces 110 within the barrel are stirred homogenously and efficiently (see an arrow in FIG. 5). A total of six injection nozzles 104 for injecting a blast material against the work pieces 110 in the cylindrical barrel 105 are disposed above the cylindrical barrel 105 in two rows in a longitudinal direction of the barrel at an appropriate injection angle, as in the blasting apparatus shown in FIGS. 1 and 2. If a central support shaft 106 is provided on the center axis of the support member 107, it is convenient when the support member 107 supporting the cylindrical barrel is removed from the apparatus and moved. FIG. 6 is a diagrammatic side view of the inside of the blasting apparatus 101. The individual injection nozzle 104 has an appropriate angle of oscillation in the longitudinal direction of the cylindrical barrel 105 and hence, is capable of injecting the blast material uniformly and efficiently against all the work pieces 110 (not shown in FIG. 6) in the barrel, as in the blasting apparatus shown in FIGS. 1 and 2. FIG. 7 is a diagrammatic side view of the inside of another example of a blasting apparatus 151. As in this apparatus 151, two series of the six cylindrical barrels supported on the support members provided at opposite ends in the blasting apparatus shown in FIGS. 5 and 6 (the twelve cylindrical barrels 55) may be supported on support members 157, and a single injection nozzle 154 may be disposed for each of the two series. FIG. 8 is a diagrammatic perspective view showing the embodiment with the cylindrical barrels 155 supported on the support members 157. FIG. 9 is a diagrammatic perspective view showing an embodiment other than the embodiment with the cylindrical barrels supported on the support members shown in FIG. 8. Six cylindrical barrels 205 formed of a mesh net of a stainless steel are supported in an annular shape circumferentially outside a horizontal central support shaft 206, i.e., the central support shaft 206 of a support member 207 by a support shaft 208 for rotation about the center axis, so that they can be rotated about the center axis (the cylindrical barrels are supported in two series and hence, the total number of the cylindrical barrels supported is twelve) (work pieces are still not accommodated). FIG. 10 is a diagrammatic perspective view of the cylindrical barrel 205 used in the embodiment shown in FIG. 9. The cylindrical barrel 205 is capable of being opened and closed in a longitudinal direction and comprises an upper cage portion 205a and a lower cage portion 205b formed as symmetrical elements capable of being opened and closed through a hinge (not shown). The cylindrical barrel 205 has a support shaft 208 for being supported by the support member 207. If such a cylindrical barrel 205 is used, it is possible to easily conduct the placing and removal of work pieces into and out of the cylindrical barrel 205 and hence, it is possible to inhibit the occurrence of the cracking and breaking of the work pieces during the placing and removal of the work pieces into and out of the cylindrical barrel 205. During the blasting treatment, the upper and lower cage portions 205a and 205b are fastened to each other by a clip (not shown). Net-shaped dividing walls may be provided vertically in the longitudinal direction within the cylindrical barrel 205, so that one work piece may be accommodated in each of partitioned chamber portions defined by the dividing walls, whereby the work pieces may be subjected in spaced-apart states to the blasting treatment. FIG. 11 is a diagrammatic partially front view showing how the cylindrical barrel 205 is supported on the support member 207 in the embodiment shown in FIG. 9. The cylindrical barrel 205 is supported by clamping the support shaft 208 in the support member 207. It is desirable that the clamping of the support shaft 208 in the support member 207 is resiliently conducted, for example, as in a mechanism utilizing a repulsive force of a spring, so that the cylindrical barrel 205 is detachably supported on the support member 207. Even with the blasting apparatus according to the second embodiment of the present invention, an effect similar to that in the blasting apparatus according to the first embodiment of the present invention can be provided. Advantages provided when the tubular barrel and/or the support member for supporting the tubular barrel is detachably mounted and easy to handle, are similar to the advantages described in the blasting apparatus according to the first embodiment of the present invention. The blasting apparatus according to the second embodiment of the present invention has remarkable advantages which will be described below. First, even when the same amount of work pieces are to be subjected to the blasting treatment, the work pieces can be placed in a smaller amount in to each of the smaller tubular barrels rather than in a larger amount in to a single larger tubular barrel. In this case, the frequency of collision of the workpieces against one another can be more reduced, and the collision energy can be reduced and hence, the workpieces can be stirred homogeneously and efficiently in a state in which they are less piled up one on another. Therefore, it is possible to more inhibit the occurrence of the cracking and breaking of the work pieces. Work pieces having different shapes or work pieces having different sizes can be accommodated in each of the tubular barrels, respectively, and the tubular barrels are fixed in an annular shape circumferentially outside the center axis of the support member to carry out the blasting treatment. Therefore, the blasting treatments of a plurality of types of work pieces can be carried out at one time. A plurality of tubular barrels having different mesh shapes are used in combination with one another and fixed in an annular shape circumferentially outside the center axis of the support member to carry out the blasting treatment, whereby the treating efficiency can be varied for every tubular barrels. Therefore, the work pieces accommodated in each of the tubular barrels can be treated to different extents, respectively. In the blasting apparatus shown in FIGS. 5 and 6 and the blasting apparatus shown in FIG. 7, the six cylindrical barrels are supported on one surface of one of the support members (in the blasting apparatus shown in FIG. 7, the cylindrical barrels are supported in two series and hence, the total number of the cylindrical barrels supported is twelve), but the number of the tubular barrels supported on one of the support members is not limited to six and may be one. The tubular barrel may be supported, so that by rotating the support member, it can be rotated about the center axis and can be also rotated about its axis by a known mechanism. The shape of the tubular barrel and the construction of the mesh net are as described for the blasting apparatus according to the first embodiment of the present invention. The inside of the tubular barrel may be divided radiately from the center axis into two or more accommodating sections, as in the blasting apparatus shown in FIGS. 3 and 4. When an oxide layer formed on each of rare earth metal-based permanent magnets is to be removed, or a metal film formed on the surface of each of rare earth metal-based permanent magnets by a vapor deposition process is to be subjected to a shot peening for a finishing treatment, using the blasting apparatus according to the present invention, if the blast material is injected under an injection pressure in a range of 0.1 MPa to 0.5 MPa, while rotating the tubular barrel in the blasting apparatus according to the first embodiment of the present invention, or the support member in the blasting apparatus according to the second embodiment of the present invention at a rotational speed in a range of 0.5 rpm to 30 rpm (desirably in a range of 1 rpm to 10 rpm), the surface treatment of the rare earth metal-based permanent magnets can be carried out uniformly and efficiently. EXAMPLES The blasting apparatus according to the present invention will be further described in detail by way of following examples, but it will be understood that the blasting apparatus according to the present invention is not limited to such examples. The following examples were carried out using sintered magnets having a composition of 14Nd-79Fe-6B-1Co and a size of 30 mm×15 mm×6 mm, and produced by pulverizing a known cast ingot and then subjecting the resulting powder to a pressing, a sintering, a heat treatment and a surface working, for example, as described in U.S. Pat. Nos. 4,770,723 and 4,792,368 (such sintered magnets will be referred to as magnet test pieces hereinafter). Example 1 First Example of Removal of Oxide Layer Formed on Surface of Magnet Test Piece (Condition) The removal of an oxide layer formed on the surface of each of magnet test pieces was carried out using the blasting apparatus shown in FIGS. 1 and 2. The cylindrical barrel used in Example 1 was made of a stainless steel at a diameter of 355 mm and a length of 600 mm and had an opening rate of a mesh of 70% (an opening was square with a length of one side equal to 5.1 mm and with a wire diameter of 1.0 mm). 414 Magnet test pieces were placed into the cylindrical barrel. Alundum A#180 (made by Sinto Brator Co., Ltd and having a grain size of #180 according to JIS) was used as a blast material and injected under an injection pressure of 0.2 MPa for 20 minutes, while rotating the cylindrical barrel at 5 rpm. (Result) After the blast material was injected for 20 minutes, the ten magnet test pieces were removed from the cylindrical barrel and subjected to a surface observation using a scanning electron microscope. The result showed that there was no magnet test piece having the oxide layer left on the surface thereof. In addition, five of the 414 magnet test pieces each had a cracking and breaking. Example 2 Second Example of Removal of Oxide Layer Formed on Surface of Magnet Test Piece (Condition) The removal of an oxide layer formed on the surface of each of magnet test pieces was carried out using the blasting apparatus shown in FIGS. 3 and 4. The cylindrical barrel used in Example 2 was made of a stainless steel at a diameter of 355 mm and a length of 600 mm and had an opening rate of a mesh of 70% (an opening was square with a length of one side equal to 5.1 mm and with a wire diameter of 1.0 mm). The inside of the cylindrical barrel was divided radiately from the center axis into six accommodating sections fan-shaped in section. 69 Magnet test pieces were placed into each of the accommodating sections of the cylindrical barrel (a total of 414 magnet test pieces were accommodated in the entire cylindrical barrel). Alundum A#180 (made by Sinto Brator Co., Ltd and having a grain size of #180 according to JIS) was used as a blast material and injected under an injection pressure of 0.2 MPa for 15 minutes, while rotating the cylindrical barrel at 5 rpm. (Result) After the blast material was injected for 15 minutes, the ten magnet test pieces were removed from the cylindrical barrel and subjected to a surface observation using a scanning electron microscope. The result showed that there was no magnet test piece having the oxide layer left on the surface thereof. In addition, two of the 414 magnet test pieces each had a cracking and breaking. Example 3 Third Example of Removal of Oxide Layer Formed on Surface of Magnet Test Piece (Condition) The removal of an oxide layer formed on the surface of each of magnet test pieces was carried out using the blasting apparatus shown in FIGS. 5 and 6. Each of the cylindrical barrels used in Example 3 was made of a stainless steel at a diameter of 110 mm and a length of 600 mm and had an opening rate of a mesh of 70% (an opening was square with a length of one side equal to 5.1 mm and with a wire diameter of 1.0 mm). 69 Magnet test pieces were placed into each of the cylindrical barrels (a total of 414 magnet test pieces were accommodated in the six cylindrical barrels). Alundum A#180 (made by Sinto Brator Co., Ltd and having a grain size of #180 according to JIS) was used as a blast material and injected under an injection pressure of 0.2 MPa for 15 minutes, while rotating the support members at 5 rpm. (Result) After the blast material was injected for 15 minutes, the ten magnet test pieces were removed from the cylindrical barrels and subjected to a surface observation using a scanning electron microscope. The result showed that there was no magnet test piece having the oxide layer left on the surface thereof. In addition, one of the 414 magnet test pieces had a cracking and breaking. Example 4 Shot Peening for Finishing Treatment of Aluminum Film Formed on Surface of Magnet Test Piece (Condition) An oxide layer formed on the surface of each of the magnet test pieces was removed under the same conditions as in Example 1, and the cylindrical barrel containing the magnet test pieces with the oxide layers removed therefrom was removed from the blasting apparatus and attached to a vapor deposited film forming apparatus described in U.S. Pat. No. 4,116,161, where the magnet test pieces were subjected to a vapor deposition process, whereby an aluminum film having an average thickness of 7 μm was formed on the surface of each of the magnet test pieces. Then, the cylindrical barrel containing the magnet test pieces having the aluminum films formed on their surfaces was removed from the vapor deposited film forming apparatus and attached again to the blasting apparatus used in Example 1, where GB-AG (glass beads made by Sinto Brator Co., Ltd and having a grain size of #180 according to JIS) used as a blast material was injected under an injection pressure of 0.2 MPa for 15 minutes, while rotating the cylindrical barrel at 5 rpm. (Result) After the blast material was injected for 15 minutes, the ten magnet test pieces were removed from the cylindrical barrel and subjected to a surface observation using a scanning electron microscope. The result showed that there was no magnet test piece incompletely subjected to the shot peening, and all of the magnet test pieces exhibited a good corrosion resistance. Seven of the 414 magnet test pieces each had a cracking and breaking. As described above, the cylindrical barrel containing the magnet test pieces can be used consistently without transferring of the magnet test pieces at the every steps, i.e., at the step of removing the oxide layer formed on the surface of each of the magnet test pieces, the step of forming the aluminum film on the surface of each of the magnet test piece by the vapor deposition process and the step of subjecting the aluminum film formed on the surface of each of the magnet test piece to the shot peening, and nevertheless, the occurrence of the cracking and breaking of the magnet test pieces other than the seven magnet test pieces each having a cracking and breaking can be inhibited. Although the embodiments of the present invention have been described in detail, it will be understood that the present invention is not limited to the above-described embodiments, and various modifications in design may be made without departing from the spirit and scope of the invention defined in claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a blasting apparatus suitable for carrying out a surface treatment of sintered products such as rare earth metal-based permanent magnets and ceramics. 2. Description of the Related Art A blasting apparatus is conventionally used for a surface treatment of, for example, rare earth metal-based permanent magnets, i.e., a treatment for removing an oxide layer formed on the surface, a treatment for cleaning the surface or a shot peening for finishing a film formed on the surface. There are various types of blasting apparatus. For example, in a tumbler-type blasting apparatus, work pieces are placed into a drum within the apparatus, and an injection nozzle is disposed so as to inject a blast material against the work pieces through an opening in the drum, while stirring the work pieces by rotating the drum (see Japanese Patent Application Laid-open No.11-347941). A blasting apparatus as described above is capable of mass-treatment of work pieces and excellent in productivity. In such apparatus, however, the injection of the blast material against the work pieces can be conducted only through the opening in the drum, and hence, there is, of course, a limit in respect of the treating efficiency. When an attempt is made to stir the work pieces as homogenously as possible by prolonging the treating period of time or by increasing the rotational speed of the drum in order to enhance the treating efficiency, the collision of the workpieces against one another occur frequently and with a strong shock force. For this reason, a cracking and breaking is produced in many of the work pieces. The stirring of the work pieces must be carried out, so that they are not dropped out through the opening and hence, the setting of the stirring condition is accompanied by a limitation. Further, it is necessary to place and remove the work pieces into and out of the drum before and after the treatment and hence, during the placing and removal, a cracking and breaking may be caused in the work pieces.
<SOH> SUMMARY OF THE INVENTION <EOH>Accordingly, it is an object of the present invention to provide a blasting apparatus, which is excellent in treating efficiency of work pieces, and in which the occurrence of the cracking and breaking of the work pieces can be inhibited. To achieve the above object, according to a first aspect and feature of the present invention, there is provided a blasting apparatus, comprising a tubular barrel formed of a mesh net for accommodation of work pieces and rotatable about a center axis, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel. According to a second aspect and feature of the present invention, in addition to the first feature, the inside of the tubular barrel is divided into two or more accommodating sections. According to a third aspect and feature of the present invention, in addition to the second feature, the inside of the tubular barrel is divided radiately from the center axis into two or more accommodating sections. According to a fourth aspect and feature of the present invention, in addition to the first feature, the tubular barrel is detachably mounted. According to a fifth aspect and feature of the present invention, there is provided a blasting apparatus, comprising a tubular barrel formed of a mesh net for accommodation of work pieces and supported circumferentially outside a center axis of a support member rotatable about the center axis, for rotation about the center axis, so that the tubular barrel can be rotated about the center axis of the support member by rotating the support member, and an injection nozzle disposed to inject a blast material against the work pieces from the outside of the tubular barrel rotated about the center axis. According to a sixth aspect and feature of the present invention, in addition to the fifth feature, a plurality of the tubular barrels are supported in an annular shape circumferentially outside the center axis of the support member. According to a seventh aspect and feature of the present invention, in addition to the fifth feature, the tubular barrel and/or the support member for supporting the tubular barrel is detachably mounted. According to an eighth aspect and feature of the present invention, there is provided a process for blasting surfaces of work pieces using a blasting apparatus according to the first or fifth feature. According to a ninth aspect and feature of the present invention, in addition to the eighth feature, the work pieces are rare earth metal-based permanent magnets. According to a tenth aspect and feature of the present invention, there is provided a process for treating the surfaces of rare earth metal-based permanent magnets, comprising the steps of removing an oxide layer formed on the surface of each of the rare earth metal-based permanent magnets using a blasting apparatus according to the fourth or seventh feature, removing the tubular barrel containing the rare earth metal-based permanent magnets with the oxide layers removed therefrom, or the support member for supporting the tubular barrel from the blasting apparatus, and attaching the tubular barrel or the support member to a vapor deposited film forming apparatus, where a metal film is formed on the surface of each of the rare earth metal-based permanent magnets by a vapor deposition process. According to an eleventh aspect and feature of the present invention, in addition to the tenth feature, the process further includes a step of removing the tubular barrel containing the rare earth metal-based permanent magnets having the metal films formed thereon, or the support member for supporting the tubular barrel from the vapor deposited film forming apparatus, and attaching the tubular barrel or the support member again to the blasting apparatus according to the fourth or seventh feature, where the metal films are subjected to a shot peening. With the blasting apparatus according to the first feature of the present invention (a first embodiment of the present invention) in which the injection nozzle is disposed to inject the blast material against the work pieces from the outside of the tubular barrel formed of the mesh net for accommodation of the work pieces and rotatable about the center axis, the work pieces can be stirred homogenously and efficiently without excessive occurrence of the collision of the work pieces against one another and without occurrence of the collision of the work pieces against one another with a strong shock force. Therefore, the treating efficiency is enhanced and moreover, it is possible to inhibit the occurrence of the cracking and breaking of the work pieces. Since the tubular barrel is formed of the mesh net, the blast material can be injected from all directions. Therefore, any number of injection nozzles for injecting the blast material can be disposed at any locations in any manner, so that the blast material can be injected uniformly and efficiently against the work pieces. With the blasting apparatus according to the fifth feature of the present invention (a second embodiment of the present invention) in which the tubular barrel formed of the mesh net for accommodation of the work pieces and supported circumferentially outside the center axis of the support member rotatable about the center axis, for rotation about the center axis, so that the tubular barrel can be rotated about the center axis of the support member by rotating the support member, and the injection nozzle is disposed to inject the blast material against the work pieces from the outside of the tubular barrel rotated about the center axis, it is possible to more inhibit the occurrence of the cracking and breaking of the work pieces, in addition to the effect provided in the blasting apparatus according to the first feature of the present invention. The above and other objects, features and advantages of the invention will become apparent from the following description of the preferred embodiment taken in conjunction with the accompanying drawings.
20040308
20060808
20050113
62312.0
0
NGUYEN, GEORGE BINH MINH
Method for treating surfaces of rare earth metal-based permanent magnets
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,793,829
ACCEPTED
Microelectro mechanical system for magneto-optic data storage apparatus
The present invention relates to a Microelectro mechanical system structure. More specifically the invention relates to utilize a sacrificial layer to fabricate an air bearing structure, followed by forming an aperture, and reducing the aperture to nano-scale by electroplating. And then, by using of two thick film photoresist films for twice electroplating fabrication, for fabricate metal microcoils having high aspect ratio structure and interconnection metal line, to achieve efficiencies of utilizing area and reducing resistance. Moreover, proceed lithography depends on different portions and exposure dose. Then form a single photoresist film to have a specific dimension and thickness structure, finally, by using reflow process, forming a magneto-optic (MO) pickup head comprises of Supersphere Solid Immersion Lens (SSIL), nano-aperture, microcoils and air bearing by using an integrated fabrication, with advantages such as no high cost device and precise apparatus are required in the process of fabrication, mass production in batch fabrication, without step of assembly, for high-density data storage and rewritable record.
1. A Microelectro mechanical system (MEMS) structure for magneto-optic data storage apparatus, comprising the steps of: (1) forming a matarial layer on a substrate, and forming air bearing shape on said material layer by lithoghraphy and etching, and sandwiching a sacrificial layer between said material layer and a dielectric layer; (2) forming an initial aperture on said dielectric layer by lithography and etching and moving specific portions of said sacrificial layer under said aperture by using an etching solution of said sacrificial layer, and then depositing a conductive layer as an electroplating seed layer on said dielectric layer; (3) reducing said initial aperture by electroplating metal for forming nano-aperture, and then a photoresist film is coated and patterned by lithography and following electroplating step for forming microcoils and a second electroplating pad is applied, wherein said second electroplating pad electrically connect with said microcoils; (4) removing the photoresist film of said step (3) and then etching said electroplating seed layer and coating another photoresist film to mantle said microcoils, fillisters are formed in the said photoresist film by lithography; (5) forming interconnection metal line along said fillisters above said microcoils by electroplating with power supply from said second electroplating pad and removed the photoresist film coated in step (4), then a new photoresist film is coated and patterned to form protruding cylinder-shaped with plate structure above said nano-aperture; and (6) Forming supersphere solid immersion lens (SSIL) above said nano-aperture by reflow process from said protruding cylinder-shaped with plate structure to a sphere-shape structure, and then etching said sacrificial layer with etching solution and separating said substrate. 2. The Microelectro mechanical system structure according to claim 1, further comprise forming a protruding and recessing structure by using lithography and etching on a material layer and then depositing a sacrificial layer on said material layer, then a dielectric layer is deposited above the sacrificial layer, after removing said sacrificial layer, said air bearing can be formed at the bottom of said dielectric layer. 3. The Microelectro mechanical system structure according to claim 1, wherein said material layer can be the silicon dioxide. 4. The Microelectro mechanical system structure according to claim 1, wherein said sacrificial layer can be the silicon dioxide. 5. The Microelectro mechanical System structure according to claim 1, wherein said dielectric layer can be the silicon nitride or amorphous silicon without doping. 6. The Microelectro mechanical system structure according to claim 1, wherein a photoresist film to mantle said microcoils of said step (4) is not attacked by positive photoresist developer. 7. The Microelectro mechanical system structure according to claim 1, wherein said protruding cylinder-shaped with plate structure of step (5) is formed by different mask and exposure dose during lithography. 8. The Microelectro mechanical system structure according to claim 1, wherein said interconnection metal line of step (5) and said microcoils can be the same material. 9. The Microelectro mechanical system structure according to claim 1, further comprising forming said an initial aperture on said dielectric layer by using lithography and etching and removing said sacrificial layer under said initial aperture, and then depositing an electroplating seedlayer for electroplating metal for reducing said initial aperture to nano-aperture.
REFERENCE CITED 1. U.S. Pat. No. 6,094,803 2. U.S. Pat. No. 6,055,220 3. U.S. Pat. No. 6,335,522 B1 FIELD OF THE INVENTION This present invention relates to Microelectro mechanical system (MEMS) structure. More particularly, the present invention relates to an integrated process of a magneto-optic (MO) pickup head comprises of Supersphere Solid Immersion Lens (SSIL), nano-aperture, microcoils, and air bearing, which has an optical re-recordable device with high resolution for high-density data storage and rewritable record in optical data storage. DESCRIPTION OF THE RELATED ART Information storage and retrieval has become immensely important as a result of the increased need for information exchange in the modern, high technology society of today. The rapidly growing urge for increased access to information has spurred the development of ever larger and faster data storage and retrieval systems. Various kinds of methods are known to minimize the spot size for high-density data storage, optical data storage system is one of the methods, which is used popularly, as this system provides the capability to store large quantities of data on a disk for high-density data storage by using a small data size. In apparatus of an optical data storage system, pickup head is the key component, due to high recording density is determined by the size of spot directly. Wherein, the size of the recorded marks or pits on the disk is limited by the diameter of the focused laser spot on the disk. This spot size is the same as the diameter of the focused optical beam, called as the beam waist size. The waist size of a focused light beam is given approximately by λ/2NA, where λ is the wavelength of the incident light, and NA is the numerical aperture of the lens. Magneto-Optic (MO) system is one of the erasable optical data storage systems. While Magneto-Optic system reads data by measuring the rotation of the incident polarization caused by the MO media. The waist size of spot size can be reduced by either using shorter wavelength lasers, such as blue lasers, or by employing higher NA lenses. Another way to reduce the spot size is through near-field optics, in which a physical aperture is formed which allows light to be transmitted only through the aperture. When an aperture is smaller than the wavelength of the incident light, the spot size of the light passed through the aperture is unrestricted by the diffraction limit but decided by the aperture size. The smaller aperture leads to a smaller spot size when the aperture is smaller than the wavelength of the incident light. A smaller aperture size is fabricated either by using optical fiber tips made in pipette shape or by adopting the FIB (Focused Ion Beam). In 2001, Lane et al. disclosed an over-electroplating method to form a tiny aperture by “electroplating method”, wherein the diameter of the aperture was shrunk and defined with the electroplating time. In 1994, the research group in Stanford University disclosed a new design for optical data storage to reduce the spot size efficiently, as described by Kino, 1994. The concept is added another lens between the objective lens and the recording media, called “Solid Immersion Lens” (SIL). The incident light is focused by the objective lens in advance, and then the incident light will be focused again by the SIL before arriving the media surface. When the incident light enters the SIL, the light velocity will change due to the different material. Therefore, the wavelength of the light will also change in the SIL. The present invention relates to Microelectro mechanical system (MEMS) structure for magneto-optic data storage apparatus, and it particularly relates to a process of magneto-optic pickup head for near field optical data storage. An integrated process of a magneto-optic (MO) pickup head comprising of Supersphere Solid Immersion Lens (SSIL), nano-aperture, microcoils, and air bearing is disclosed. According to paper “Super-resolution by combination of a solid immersion lens and an aperture” in Jpn. J. Appl. Phys. Vol. 40 (2001) pp. 1778-1782, that discloses a structure combining a solid immersion lens (SIL) and an aperture, a tiny light spot having an effective light spot can be focused by incident light source. The incident light is focused again through solid immersion lens (SIL) after objective lens, and then passes through the aperture. A high concentrated power formed on aperture for outputting light spot through aperture is able to provide better power for writing data on disk by using SIL. In addition, the paper also discloses that accessing signal can be improved by combination of solid immersion lens and an aperture, and then signal contrast is also improved. The device using process of combination of SIL and aperture obtain solid immersion lens and aperture, and then assembly for precise requirement. But the diameter of fabricated SIL is one centimeter and aperture is fabricated by adopting the Focused Ion Beam (FIB). However, this method is known as a high cost and wasting time technique due to only SIL is used to improve optical data storage efficiency in this structure, lacking of efficiency attached by using supersphere solid immersion lens (SSIL) according to the present invention. A magneto-optic pickup head comprises of an air bearing design, SIL and microcoils, as described by Sookyung Kim et al., “Design and fabrication technology of optical flying head for first surface MO recording”, Optical Memory and Optical Data Storage Topical Meeting 2002, International Symposium, 2002, pp. 204-206. The above apparatus are formed and assembled. Wherein, process of forming SIL is more complicated than the present invention. Not only assembly is needed in whole accomplishment of whole apparatus, but also only SIL is used to improve optical data storage efficiency in this structure. Therefore, this structure is unable to achieve efficiency of using SSIL according to the present invention. Another attempt to reduce the spot size and to increase the recording area density, as exemplified by the following references: U.S. Pat. No. 6,094,803, titled “Wafer processing techniques for near field magneto-optical head”. U.S. Pat. No. 6,055,220, titled “Optical disk data storage system with improved solid immersion lens”. As reference to U.S. Pat. No. 6,094,803, by Carl Carlson et al., titled “Wafer processing techniques for near field magneto-optical head”, that discloses a designed method for mass producing a magneto-optic pickup head including a numerical aperture(NA) optical focusing device, which comprises of an air bearing structure, micro lens and microcoils, by using wafer processing techiniques. Air bearing design is formed on a substrate such as an alumina layer. And, a flat optical substrate is molded or heat pressed in batches at wafer level to form the desired lens shapes. Microcoils can be simultaneously formed with the lens on same substrate. And then, these two substrates are combined by bonding process. Wherein, microcoils are formed by using thin-film processing techniques, which comprises of metal plug as interconnection metal line for supplying power to microcoils. Only SIL is used to improve optical data storage efficiency in the process of this patent, therefore, it is unable to achieve efficiency of using SSIL according to the present invention. With reference to U.S. Pat. No. 6,055,220, by Harry Jonathon Mamin et al., titled “Optical disk data storage system with improved solid immersion lens”, that discloses an optical pickup head with an air bearing slider supporting a SIL and with a patterned thin film formed on the slider at the focus of the SIL to act as an aperture, for improving effective numerical aperture of optical pickup head and minimizing size of light spot. One issue in optical pickup head structure used for near field recording is the flying height between the pickup head and the disk. Flying height is important to keep the moving pickup head stable at the near field recording. The air bearing design could achieve a stable flying height by the special protruding structure design at the bottom of the pickup head. The structure is identical to U.S. Pat. No. 6,094,803 mentioned above, that only SIL is used to improve optical storage efficiency without efficiency of using SSIL according to the present invention. There are two means to forming an aperture are disclosed according to the patent. Firstly, that precisely combines lithography and etching process to form an aperture on metal thin film in direct. Precise and expensive exposing machine and advanced fabrication technique are needed by this means. Secondly, by scattering pellets of high polymer at bottom of solid immersion lens, followed by depositing metal thin film, and utilize lift-off technique to remove pellets of high polymer, to obtain an aperture. But in this means, there is no specification of controlling position of high polymer, and also unable to sure aperture formed whether can be aligned to focus point of solid immersion lens or not. Yet another attempt at improving the recording data, as illustrated by the following reference: U.S. Pat. No. 6, 6,335,522 B1, titled “Optical probe having a refractive index micro-lens and method of manufacturing the same”. As further reference to U.S. Pat. No. 6,335,522 B1, titled “Optical probe having a refractive index micro-lens and method of manufacturing the same”, that discloses an optical pickup head comprises of a cantilever, a projection having a micro-aperture and arranged at the free end of the cantilever and a focusing objective lens also arranged at the free end of the cantilever. There are several methods are proposed according to this technique. Wherein, the same characteristic among these methods is two substrates are needed for bonding wafer. This is a complex fabrication, because inaccuracy of aligning happened easily, and also, it is not useful in application of continuous mass production. According to this technique aperture is formed by combining lithography and etching process. Thus, size of aperture is limited by process of lithography and etching. And, technique of processing micro lens according to this patent is by using a mother mold and followed by heat-pressed to the mother mold. But, process of producing a mother mold is too complex. Moreover, when hemisphere-shaped structure obtain outline of pressing mold by using electroplating method to cause some problems such as satisfaction of optical requirement to surface curvature and roughness. SUMMARY OF THE INVENTION The main purpose of the present invention is to provide an integrated fabrication of using magneto-optic (MO) pickup head combining supersphere solid immersion lens, nano-aperture, microcoils and air bearing without step of assembly and precise apparatus for high optical data storage and rewritable efficiency. Another purpose of the present invention is to provide a system having advantages such as mass production in batch process for high optical data storage and rewritable. For the above purposes, the present invention provides a MicroElectroMechanical System (MEMS) structure for magneto-optic data storage apparatus. The MEMS structure fabrication process comprises the steps of: Firstly, a material layer is deposited on a substrate, and an air bearing shape is formed on the material layer by lithography and etching, followed by sandwiches a sacrificial layer between the material layer and a deposited dielectric layer. Secondly, an initial aperture is formed on the dielectric layer by lithography and dry etching. After that, remove specific portions of the sacrificial layer under the aperture by using an etching solution of the sacrificial layer. Followed by a conductive layer is used as an electroplating seed layer that is deposited on the dielectric layer. Thirdly, an electroplating area defined by photoresist coating and lithography, followed by electroplating metal is used to reduce the initial aperture to nano-scale to form a nano aperture. Then the photoresist mold is removed after reducing aperture step. Another photoresist film is coated and patterned to form electroplating mold for the following electroplating microcoils process. Then the electroplating process is applied to fabricate microcoils and a second electroplating pad structure. The second electroplating pad connected with all the microcoils structure. Fourthly, remove the photoresist mold for electroplating microcoils and etch the electroplating seed layer. A new photoresist film is coated again to mantle the microcoils and patterned to form the fillisters structure in the photoresist film by lithography. This coating photoresist film is usually the negative photoresist that can resist the developer of the positive photoresist. Fifthly, interconnection metal lines are deposited along the fillisters above the microcoils by electroplating again with electroplating power is supplied from the second electroplating pad instead of the etched seedlayer. The last photoresist film is coated again and patterned to form a protruding cylinder-shaped with plate structure located above the nano-aperture. The protruding cylinder-shaped with plate structure formed in the photoresist film is fabricated depending on different mask and exposure dose during the lithography step. Finally, a supersphere solid immersion lens (SSIL) located above the nano-aperture is formed by reflow process, wherein the protruding cylinder-shaped structure is changed to a sphere-shaped structure. The sacrificial layer is totally being etched with etching solution of the sacrificial layer. And, the substrate is separated. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be better understood from the following detailed description of preferred embodiments of the invention, taken in conjunction with the accompanying drawings, in which FIG. 1, FIG. 2 and FIG. 3 are views showing step (1) according to the present invention; FIG. 4 and FIG. 5 are views showing step (2) according to the present invention; FIG. 6 and FIG. 7 are views showing step (3) according to the present invention; FIG. 8 is a view showing step (4) according to the present invention; FIG. 9, FIG. 10 and FIG. 11 are views showing step (5) according to present invention; and FIG. 12 and FIG. 13 are views showing step (6) according to present invention. DESCRIPTION OF THE PREFERRED EMBODIMENTS The following descriptions of the preferred embodiments are provided to understand the features and the structures of the present invention. Please refer to FIG. 1 till FIG. 13, these figures showing procedures of Microelectro mechanical system (MEMS) structure for magneto-optic data storage apparatus. FIG. 1, FIG. 2 and FIG. 3 are views showing step (1) according to the present invention. FIG. 4 and FIG. 5 are views showing step (2) according to the present invention. FIG. 6 and FIG. 7 are views showing step (3) according to the present invention. FIG. 8 is a view showing step (4) according to the present invention. FIG. 9, FIG. 10 and FIG. 11 are views showing step (5) according to present invention. FIG. 12 and FIG. 13 are views showing step (6) according to present invention. In the process of fabricating pickup head for recording optical data, the present invention according to MEMS technology provide a means focusing incident light pre-focused by objective lens again into the nano-aperture by SSIL. This present process is batch production without assembly to forming a magneto-optic pickup head comprise of supersphere solid immersion lens, nano-aperture, microcoils and air bearing structure. The process comprises the steps of: step (1): As illustrated in FIG. 1, a material layer 102 is formed on a substrate 101. The material layer 102 can be the silicon dioxide. An air bearing shape is defined on the material layer 102 by using lithography and etching. And then, as reference to FIG. 2 and FIG. 3, sandwiches a sacrificial layer 103 between said material layer 102 and a dielectric layer 104. The sacrificial layer 103 can be the silicon dioxide. So the air bearing structure can be formed at the bottom of the structure after the final release step. Then a dielectric layer 104 is deposited as the pedestal of the total structure. The dielectric layer 104 can be the silicon nitride or amorphous silicon without doping as shown in FIG. 3. step (2): As further illustrated in FIG. 4, an initial aperture is formed in the dielectric layer 104 by using lithography and dry etching. After that, remove specific portions of the sacrificial layer 103 under the aperture by using an etching solution of the sacrificial layer 103. FIG. 5 illustrates a conductive layer is deposited as an electroplating seed layer 111 above the dielectric layer 104. The sidewall of the initial aperture will also be covered by the deposited metal 111 due to the step coverage. step (3): With reference to FIG. 6, after an electroplating area defined by photoresist coating and lithography process, electroplating metal 112 is used to reduce the initial aperture to nano-scale to form a nano aperture. As further illustrated in FIG. 7, another photoresist film 121 which is coated and patterned by lithography to form the electroplating mold for microcoils fabrication, with the following electroplating step, microcoils 113 and a second electroplating pad are formed. The microcoils 113 are used to generate magnetic field with supplying power. The second electroplating pad is prepared and connected with all the microcoils structure for the following electroplating interconnection step after etching seedlayer. After the microcoils and second electroplating pad are fabricated, the photoresist film 121 is removed and the seedlayer 111 between the microcoils is etched. step (4): After etching seedlayer 111, a photoresist film 122 is coated to mantle the microcoils 113. The photoresist film 122 is not attacked by positive photoresist developer, for example is SU-8. The fillisters structure 131 are defined in the photoresist film 122 by lithography. step (5): With further reference to FIG. 9, interconnection metal lines 114 are deposited along the fillisters 131 above the microcoils 113 by electroplating again with electroplating power supplied from the second electroplating pad. The interconnection metal lines 114 are used to conduct the input source to generate magnetic field. As illustrated in FIG. 10, a last photoresist film 1221 is coated again. The photoresist film 1221 are patterned to form a protruding cylinder-shaped with plate structure 123, as illustrated in FIG. 11. The protruding cylinder-shaped with plate structure 123 is formed from the photoresist film 1221 depending on different mask and exposure dose during lithography. step (6): As illustrated in FIG. 12, a supersphere solid immersion lens (SSIL) 124 located above the nano-aperture is formed by reflow process, wherein the protruding cylinder-shaped of the structure 123 is changed to a sphere-shaped structure. Incident light pre-focused by objective lens will be focused again into the nano-aperture by supersphere solid immersion lens 124. Finally, with reference to FIG. 13, the sacrificial layer 103 is totally being etched with etching solution of the sacrificial layer 103. The substrate 101 is separated. By the above steps of the present invention, a pickup head for magneto-optic data storage apparatus is formed. The present invention may be embodied in other specific forms without departing from the spirit of the essential attributes thereof; therefore, the illustrated embodiment should be considered in all respects as illustrative and not restrictive, reference being made to the appended claims rather than to the foregoing description to indicate the scope of the invention.
<SOH> FIELD OF THE INVENTION <EOH>This present invention relates to Microelectro mechanical system (MEMS) structure. More particularly, the present invention relates to an integrated process of a magneto-optic (MO) pickup head comprises of Supersphere Solid Immersion Lens (SSIL), nano-aperture, microcoils, and air bearing, which has an optical re-recordable device with high resolution for high-density data storage and rewritable record in optical data storage.
<SOH> SUMMARY OF THE INVENTION <EOH>The main purpose of the present invention is to provide an integrated fabrication of using magneto-optic (MO) pickup head combining supersphere solid immersion lens, nano-aperture, microcoils and air bearing without step of assembly and precise apparatus for high optical data storage and rewritable efficiency. Another purpose of the present invention is to provide a system having advantages such as mass production in batch process for high optical data storage and rewritable. For the above purposes, the present invention provides a MicroElectroMechanical System (MEMS) structure for magneto-optic data storage apparatus. The MEMS structure fabrication process comprises the steps of: Firstly, a material layer is deposited on a substrate, and an air bearing shape is formed on the material layer by lithography and etching, followed by sandwiches a sacrificial layer between the material layer and a deposited dielectric layer. Secondly, an initial aperture is formed on the dielectric layer by lithography and dry etching. After that, remove specific portions of the sacrificial layer under the aperture by using an etching solution of the sacrificial layer. Followed by a conductive layer is used as an electroplating seed layer that is deposited on the dielectric layer. Thirdly, an electroplating area defined by photoresist coating and lithography, followed by electroplating metal is used to reduce the initial aperture to nano-scale to form a nano aperture. Then the photoresist mold is removed after reducing aperture step. Another photoresist film is coated and patterned to form electroplating mold for the following electroplating microcoils process. Then the electroplating process is applied to fabricate microcoils and a second electroplating pad structure. The second electroplating pad connected with all the microcoils structure. Fourthly, remove the photoresist mold for electroplating microcoils and etch the electroplating seed layer. A new photoresist film is coated again to mantle the microcoils and patterned to form the fillisters structure in the photoresist film by lithography. This coating photoresist film is usually the negative photoresist that can resist the developer of the positive photoresist. Fifthly, interconnection metal lines are deposited along the fillisters above the microcoils by electroplating again with electroplating power is supplied from the second electroplating pad instead of the etched seedlayer. The last photoresist film is coated again and patterned to form a protruding cylinder-shaped with plate structure located above the nano-aperture. The protruding cylinder-shaped with plate structure formed in the photoresist film is fabricated depending on different mask and exposure dose during the lithography step. Finally, a supersphere solid immersion lens (SSIL) located above the nano-aperture is formed by reflow process, wherein the protruding cylinder-shaped structure is changed to a sphere-shaped structure. The sacrificial layer is totally being etched with etching solution of the sacrificial layer. And, the substrate is separated.
20040308
20060221
20050908
62575.0
0
PHAM, LONG
MICROELECTRO MECHANICAL SYSTEM FOR MAGNETO-OPTIC DATA STORAGE APPARATUS
SMALL
0
ACCEPTED
2,004
10,794,220
ACCEPTED
Instrument for use in minimally invasive hip surgery
The invention is directed to an instrument for use in minimally invasive hip surgery. In particular, the instrument is useful for both alignment and insertion/impaction of an acetabular shell. Furthermore, the instrument is suitable for assuring the shell is impacted with the proper abduction and version in left or right hips.
1. An instrument for use in hip arthroplasty, comprising: a main body; an impaction body attached to an end of said main body and positionable inside the hip of a patient, said impaction body having an axis coaxial with an impaction axis; an arm extending from said main body and having a guide ring at an end thereof, said guide ring having an axis coaxial with an impaction axis; a removable trocar; and a removable impacting instrument. 2. The instrument of claim 1, wherein any of said main body, said impaction body, or said arm are modular. 3. The instrument of claim 1, wherein said trocar is used to puncture the patient's skin and make a path through the underlying soft tissue for insertion of said impacting instrument. 4. The instrument of claim 3, wherein to puncture said skin, said trocar is inserted through said guide ring of said arm and along said impaction axis. 5. The instrument of claim 1, said impaction body having a threaded stud at a first end thereof and a rim connected to said threaded stud at its other end such that the position of said acetabular shell can be varied without loosening said shell from said stud. 6. The instrument of claim 1, wherein said impaction body includes an angled sleeve having a bore therethrough. 7. An instrument for use in hip arthroplasty, comprising: a main body, said main body having a rotatable handle; an impaction body attached to an end of said main body and positionable inside the hip of a patient, said impaction body having an axis coaxial with an impaction axis; wherein the position of the handle indicates that the main body is in the proper position. 8. The instrument of claim 7, wherein when the handle is rotated to one position, the instrument may be used with left hips and when the handle is rotated to a second position, the instrument may be used with right hips. 9. The instrument of claim 7, wherein when the handle is perpendicular or parallel to an edge of the operating room table, the instrument will impact an acetabular shell with the proper version. 10. An instrument for the impaction of an acetabular shell, comprising: an impaction body, said impaction body having a threaded stud at a first end thereof and a rim connected to said threaded stud at its other end such that the position of said acetabular shell can be varied without loosening said shell from said stud.
RELATED PATENT APPLICATIONS This patent application is related to co-pending U.S. patent application Ser. No. 10/166,209, filed Jun. 10, 2002, published as U.S. Pub 2003/0229352, and entitled, “Apparatus for, and Method of, Providing a Hip Replacement.” FIELD OF THE INVENTION This invention is generally directed to an instrument for use in minimally invasive (MIS) hip surgery. The invention is more specifically directed to an instrument useful in the various steps related to the implantation of an acetabular prosthesis via MIS methods. BACKGROUND OF THE INVENTION Traditionally, hip replacement surgery has been done via “open” surgical procedures. With open procedures, space for inserting and manipulating surgical instruments is not that critical and it is easier to get around major anatomical features, such as the greater trochanter of the femur. However, with the advent of minimally-invasive surgical procedures for hip replacement, small incision sizes combined with tight anatomical clearances have resulted in the need for surgical instruments that take maximum advantage of available space. All patents and publications mentioned herein are incorporated by reference herein. While these devices may be acceptable for their intended or described uses, they are often complex and not geometrically and spatially optimized. Accordingly, there is room for improvement within the art. OBJECTS OF THE INVENTION It is an object of the invention to provide an instrument for use in minimally invasive hip surgery. It is a further object of the invention to provide a method of using the instrument. These and other objects of the invention are achieved by An instrument for use in hip arthroplasty, comprising: a main body; an impaction body attached to an end of the main body and positionable inside the hip of a patient, the impaction body having an axis coaxial with an impaction axis; an arm extending from the main body and having a guide ring at an end thereof, the guide ring having an axis coaxial with an impaction axis; a removable trocar; and a removable impacting instrument. These and other objects of the invention are achieved by an instrument for use in hip arthroplasty, comprising: a main body, the main body having a rotatable handle; an impaction body attached to an end of the main body and positionable inside the hip of a patient, the impaction body having an axis coaxial with an impaction axis; wherein the position of the handle indicates that the main body is in the proper position. These and other objects of the invention are achieved by an instrument for the impaction of an acetabular shell, comprising: an impaction body, the impaction body having a threaded stud at a first end thereof and a rim connected to the threaded stud at its other end such that the position of the acetabular shell can be varied without loosening the shell from the stud. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1A is an elevation view of an exemplary embodiment of an instrument according to the invention. FIG. 1B is a perspective view of an exemplary embodiment of an instrument according to the invention. FIG. 1C is a top view of an exemplary embodiment of an instrument according to the invention. FIG. 2 is a top view of the main body of the instrument according to the invention. FIG. 3 is an elevation view of the main body of the instrument according to the invention. FIG. 4A is an elevation view of the impaction portion of the instrument according to the invention. FIG. 4B is a cross-section of the impaction portion of the instrument according to the invention. FIG. 5 is a simplified representation of how the instrument according to the invention assures the proper impaction axes. FIG. 6 is a perspective view of an acetabular shell and liner for use with the instrument and method according to the invention. FIG. 7 is an elevation view of a first configuration of the instrument according to the invention. FIG. 8A is an elevation view of a second configuration of the instrument according to the invention. FIGS. 8B and 8C are cross section and detail views, respectively, of the second configuration of the instrument, as shown in FIG. 8. FIGS. 9, 10, 11, 12, 13, and 14 depict various steps in a method of using the instrument according to the invention. FIGS. 15A and 15B are second exemplary embodiments of the instrument according to the invention. DETAILED DESCRIPTION OF THE DRAWINGS With respect to the above-referenced figures, an exemplary embodiment of a an instrument and method of using the instrument that meets and achieves the various objects of the invention set forth above will now be described. FIG. 1A is an elevation view, FIG. 1B is a perspective view, and FIG. 1C is a top (plan) view of an exemplary embodiment of the instrument 10 according to the invention. The instrument 10 is preferably modular, comprising three separable main parts, namely: main body 50, arm 20, and impaction body 40. Arm 20 may comprise two portions, namely a extended first arm portion 21 (extending outwardly away from main body 50) and a downwardly angled second arm portion 22. At an end of second arm portion 22 is a guide ring 30, including a guide bore 31. It is possible to omit downwardly angled second arm portion 22 and lower and/or lengthen extended first arm portion 21. However, then the angle between guide ring 30 and first portion 21 would be sharper. Furthermore, it is possible for arm 20 to be a single curved arm. The structure shown herein is merely an exemplary embodiment. At the other end of first arm portion 21, a releasable connection 23 is provided so that the arm 20 may be selectively attached and detached from main body 50. While the details of releasable connection 23 are not critical to the invention, one form of releasable connection 23 may be that shown in the drawings. Pins 24 in the end of extended arm portion 21 are to be received within bores 55 of main body 50 for a guidance function. A rotatable threaded member 25 is received in a threaded bore 57 of main body 50 to provide the securing function. Threaded member 25 may include a thumb wheel 26 for ease of operation. As shown in FIGS. 1A and 1B, the longitudinal axis of guide bore 31 is coincident and coaxial with a keyed bore 47 (whose function is further described below) in impaction body 40, which itself is coincident and coaxial with the center of acetabular shell S and the proper impaction direction/axis I for acetabular shell S. As used herein, the impaction axis/direction I means the direction in which the axis of rotation of the acetabular shell S is properly aligned and typically coaxial with the main axis of the patient's acetabulum A or perpendicular to the plane of the opening of the acetabular shell S. Impaction in this direction is important to minimize rotation of the acetabular shell S during final seating. FIG. 2 is an elevation view of main body 50. Main body 50 generally comprises an elongated body 51. At a first end of elongated body 51 is a handle 53, which typically will be transverse to elongated body 51. At the opposite end of elongated body 51 from handle 53 is a locking unit 55. The details of locking unit 55 may vary and are typically conventional, but as an example, locking unit 55 may be actuated by locking sleeve 52, which can slide along the outer surface of elongated body 51 in the direction of the arrows against the bias of springs (not shown). A bore 54 is contained within elongated body 51 for receipt of a conventional locking member 45 of the impaction body 40 (FIG. 4A). Accordingly, through use of locking sleeve 52, locking member 45 can be locked within and released from inside bore 54 of elongated body 51. This makes main body 50 and impaction body 40 selectively seperable from each other. As shown in FIG. 1C, handle 53 makes a specific angle with respect to arm 20. This angle is such that when instrument 10 is properly used, handle 53 gives the doctor a visual indication that the acetabular shell S is being inserted with the proper version along impaction axis I. This is schematically shown in FIG. 5. FIG. 5 is a schematic plan view depicting the instrument 10 with respect to a patient P having left and right acetabulums A and an operating room table T having long edges E. As shown in FIG. 5, when handle 53 is perpendicular to the long edge of the operating room table T, the impaction axis I is properly aligned with the patient's pelvis and acetabulums A regardless of whether a left or right hip is being operated on. While the patient P is shown in the supine position, the instrument may be used with the patient in any position including supine or lateral. To allow the instrument to be used for both left and right hips, handle 53 should be adjustable so it may be aligned perpendicular with either long edge E of operating room table T when the instrument is inserted wit the proper anteversion. This can be done by the following exemplary non-limiting method. Tightening member 56, which compresses handle 53 against elongated body 51 to prevent movement of handle 53, can be loosened. The position of handle 53 adjusted and then tightening member 56 re-tightened. This allows handle 53 to be aligned with the long edge of the operating room table regardless of whether instrument 10 is going to be used for a left or right hip. Typically, the amount of rotation allowed is 90 degrees. Rotation may be limited by any known means. FIG. 4A depicts an elevation view of impaction body 40 and FIG. 4B depicts a cross-section of impaction body 40. Impaction body 40 is a modular element that will come in various sizes. The size used typically will be selected based upon the size of the acetabular shell S being impacted. Each size of impaction body 40 will have a conventional locking member 45 so that the impaction body 40 can be separated from or locked to main body 50, as described above. Opposite the free end of locking member 45 is a mounting element 46, for example, a mounting pin. Mounting element 46 connects locking member 45 to first impaction body portion 43. First impaction body portion 43 is a cylindrical shell and although typically made from steel, may be made from any material capable of being impacted. Second impaction body portion 42 is also cylindrical, but in this case typically solid and made from a plastic material capable of withstanding impaction. Plastics are preferred so that the edges of second impaction body portion 42 do not scratch or otherwise damage an inner surface of acetabular shell S. Such scratches or damage would typically render an acetabular shell S unusable. Second impaction body portion 42 can rotate within the shell defined by first impaction body portion 42. Second impaction body portion 42 may have grooves 42′ therein for interacting with tongues 43′ on the inner walls of first impaction body portion 43 to prevent the separation of the two elements, while still allowing relative rotation. However, any interlocking members may be used which prevent separation of the two elements, while still allowing control of relative rotation. A threaded stud 41 is mounted on the free end of second impaction body portion 42. Threaded stud 41 is for receiving the acetabular shell S thereon via the conventional threaded hole 7 of the acetabular shell S (FIG. 5). Threaded stud 41 may be mounted on second impaction body portion 42 in any way, such as but not limited to, being spot welded or even unitarily formed therewith. Rim portion 44 is affixed to the opposite end of second impaction body 42 from threaded stud 41. Accordingly, a doctor may rotate rim portion 44 and cause a resulting rotation in second impaction body 42 and threaded stud 41, for reasons to be discussed below. Rim portion 44 has a keyed bore 47 at the center thereof for receipt of an instrument or tool therein, as will also be described. As shown in FIG. 4A, the impaction axis I passes through bore 47 and the centers of first and second impaction bodies 43, 42 and threaded stud 41. This allows, as will be described later, the various instruments that are used with instrument I to be smoothly entered and passed through soft tissue, avoiding any hard bone. As mentioned above, by rotating rim portion 44, this results in rotation of second impaction body 42 and threaded stud 41. This is an important aspect of the invention for the following reason. FIG. 5 depicts a typical acetabular prosthesis P contemplated for use with the invention. An acetabular shell S is the portion of the prosthesis P that is directly implanted in the natural acetabulum of the patient undergoing hip replacement surgery. Acetabular shell S has a threaded hole 7 at its bottom for attachment to an impacting device such as shown in the invention. After the shell S is implanted, a shell liner 5, most typically made from either: metal, ceramic, or polyethylene (e.g. UHMWPE), is then inserted into the acetabular shell S, in an impacting direction, as shown by the arrow. For situations in which additional fixation between the acetabular shell S and the patient's natural acetabulum is required, screws (not shown), may be passed through one or more screw holes 9 in shell S and into the bone surrounding the acetabulum. The patient's acetabulum would now be ready for receipt of the femoral portion, i.e., femoral head, of the implant. Typically these screws can be affixed in only certain locations in the patient's acetabulum due to bone quality issues. Therefore, there needs to be the ability to align screw holes 9 with those portions of the patient's acetabulum that have good bone. In some prior art devices, once the acetabular shell S was fully screwed onto the threaded stud, there was no ability to fine tune the alignment of screw holes 9 with respect to the acetabulum without loosening the shell S (e.g., rotating it back on the threads). See e.g. U.S. Pat. No. 5,474,560. This could cause problems during impacting or damage the instrument 10 or acetabular shell S. In other prior art devices, the use of flexible cable actuators introduce slack into the drive mechanism that do not allow for the easy and precise fine tuning that is required in surgical applications. See e.g. U.S. Pub 2003/0050645 and WO03/065906. This is especially true when the acetabular shell S is not constrained within the patient's acetabulum. However, with the invention, even with the acetabular shell S completely threaded on threaded stud 41, the position of screw hole 9 with respect to the patient's acetabulum can be fine tuned by rotating rim portion 44. A first configuration of the instrument 10 according to the invention is shown in FIG. 7. In this configuration, a trocar 100 for piercing the patient's skin is inserted through the guide bore 31 in guide ring 30. Because the shaft 110 of trocar 100 will typically have a smaller diameter than the guide bore 31, a guide sleeve 33 is slipped into the guide bore 31. The second configuration of the instrument according to the invention is shown in FIG. 8A. In this configuration, the guide sleeve 33 is removed from the guide bore 31 and an impacting instrument 200 is inserted through the guide bore 31 in the guide ring 30 and the keyed bore 47 in rim portion 44. Impacting instrument has an impaction body, which includes an impaction surface 212. At its opposite end, impacting instrument 200 will comprise a keyed tip 211 that matches the keyed bore 47 of rim portion 44 such that when impaction tool 200 is rotated, rotation will be imparted on rim portion 44 (FIG. 8B). Furthermore, shaft 210 of impacting instrument 200 may include laser or other etching 215 (FIG. 8C) that lines up with edges 33 of guide ring 30, so as to indicate that impacting instrument 200 is fully or properly seated within bore 47 of rim 44. Having described the structure of instrument 10 and its various configurations, its method of use will now be described. FIG. 9 shows the first stage of the use of instrument 10 during a MIS hip arthroplasty. During this surgery, a main incision 305 has been made which provides primary access to the patient's acetabulum. The details of this main incision can be found in related application US Pub 2003/0229352, whose contents are incorporated by reference herein. An acetabular shell S is mounted on threaded stud 41 and handle 53 positioned for left or right as previously described, depending upon the hip being operated upon. Main body 50 is inserted into the incision 305 in the patient's skin 300 and acetabular shell S preliminarily aligned with the patient's acetabulum A. If screws are going to be used with acetabular shell S, rim 44 may be rotated until screw holes 9 are lined up with bone suitable for screws. Furthermore, when main body 50 points straight at the ceiling the abduction is correct and when handle 53 is perpendicular to the edge of the operating table, the impaction axis I and version are now correct. Guide sleeve 33 is inserted into guide bore 31 of guide ring 30. Trocar 100 is inserted through guide sleeve 33 and the doctor manipulates handle 102 until pointed tip 115 approaches the patient's skin 300 and then punctures the skin 300. The doctor continues to push the trocar 100 through the soft tissue 315 until the pointed tip 115 of the trocar 100 comes close to the bore of rim 44 (FIG. 10). Trocar 100 is then removed from the patient's body and instrument 10. Guide sleeve 33 is removed from guide bore 31 of guide ring 30. As shown in FIG. 11, this results in a small portal 310 in the patient's skin 300 and a small path 320 in the soft tissue 315 between the small portal 310 and bore 47 of rim 44. As shown in FIG. 12, impacting instrument 200 is then inserted through guide bore 31 of guide ring 30 and then further manipulated by the doctor through portal 310 and path 320 until keyed tip 211 is received within keyed bore 47 of rim 44. The doctor may then impart blows on the impacting end of impacting instrument 200 using, for example, a hammer 295. While impacting the blows of hammer 295, the doctor will continue to hold instrument 10 by handle 53 to make sure the blows continue to be imparted along the proper impaction axis I. After the doctor is sure that the acetabular shell S is properly and firmly impacted within the patient's acetabulum A and the screws added if needed, as shown in FIG. 13, the doctor will rotate the handle 212 of impacting instrument 200. This will result in the rotation of rim 44, second impaction body portion 42, and threaded stud 41. The rotation of threaded stud 41 will ultimately result in the separation of acetabular shell S from threaded stud 41 and therefore instrument 10 (not shown due to scale). Finally, as shown in FIG. 14, impacting instrument 200 is removed from the patient's body and the guide bore 31 of guide ring 30. Instrument 10 is then removed from main incision 305 and the rest of the hip arthroplasty completed. FIGS. 15A and 15B are second exemplary embodiments of the instrument according to the invention. Generally second exemplary embodiment is similar to the first embodiment. However, instrument 10′ is different from instrument 10 in how acetabular shell S connects to instrument 10. In particular, impaction body 40 is simplified and streamlined into an angled sleeve member 70 having a bore 71 coaxial with the insertion axis I. A stud 80 having a threaded end (not shown) is passed through a gasket 82 made of a material that will not damage the inner surfaces of the acetabular shell S and screwed into bore 7, as previously described. Impaction body 70 is slipped over stud 80. Then, keyed tip 211 of impacting instrument 200 is mated with keyed bore 81 of stud 80 and instrument 10 operated as previously described. This simplified design is especially suitable for MIS methods. Although this invention has been disclosed and illustrated with reference to particular exemplary embodiments, the principles involved are susceptible for use in numerous other embodiments which will be apparent to persons of ordinary skill in the art. The invention is, therefore, to be limited only as indicated by the scope of the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Traditionally, hip replacement surgery has been done via “open” surgical procedures. With open procedures, space for inserting and manipulating surgical instruments is not that critical and it is easier to get around major anatomical features, such as the greater trochanter of the femur. However, with the advent of minimally-invasive surgical procedures for hip replacement, small incision sizes combined with tight anatomical clearances have resulted in the need for surgical instruments that take maximum advantage of available space. All patents and publications mentioned herein are incorporated by reference herein. While these devices may be acceptable for their intended or described uses, they are often complex and not geometrically and spatially optimized. Accordingly, there is room for improvement within the art.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>FIG. 1A is an elevation view of an exemplary embodiment of an instrument according to the invention. FIG. 1B is a perspective view of an exemplary embodiment of an instrument according to the invention. FIG. 1C is a top view of an exemplary embodiment of an instrument according to the invention. FIG. 2 is a top view of the main body of the instrument according to the invention. FIG. 3 is an elevation view of the main body of the instrument according to the invention. FIG. 4A is an elevation view of the impaction portion of the instrument according to the invention. FIG. 4B is a cross-section of the impaction portion of the instrument according to the invention. FIG. 5 is a simplified representation of how the instrument according to the invention assures the proper impaction axes. FIG. 6 is a perspective view of an acetabular shell and liner for use with the instrument and method according to the invention. FIG. 7 is an elevation view of a first configuration of the instrument according to the invention. FIG. 8A is an elevation view of a second configuration of the instrument according to the invention. FIGS. 8B and 8C are cross section and detail views, respectively, of the second configuration of the instrument, as shown in FIG. 8 . FIGS. 9, 10 , 11 , 12 , 13 , and 14 depict various steps in a method of using the instrument according to the invention. FIGS. 15A and 15B are second exemplary embodiments of the instrument according to the invention. detailed-description description="Detailed Description" end="lead"?
20040305
20100126
20050922
96932.0
1
HOFFMAN, MARY C
INSTRUMENT FOR USE IN MINIMALLY INVASIVE HIP SURGERY
UNDISCOUNTED
0
ACCEPTED
2,004
10,794,356
ACCEPTED
Ratiometric stud sensing
A stud or joist sensor device and associated sensing method using a ratio of capacitance measurements from a plurality of capacitive sensing elements. The device locates a feature of an object or discontinuity behind a surface or wall, such as an edge and/or a center of a stud behind the surface, a joist under a floorboard, a gap behind sheetrock, a metal conductor behind a surface or the like. The device may be moved over a surface, thereby detecting changes in capacitance. The change in capacitance is due to the effective dielectric constant caused by the passage over an object such as a stud. When two capacitive sensing elements provide equivalent capacitance measures, the device is over a centerline of the stud. When a ratio of the capacitance measurements equals a transition ratio, the device is over an edge of the stud.
1. A method of finding a feature behind a surface using a sensor having first and second plates, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate; measuring a second capacitance of a second capacitor including the second plate; and computing a ratio of the first and second capacitances. 2. The method of claim 1, further comprising the acts of: determining a first reference that represents an initial capacitance of the first capacitor; and determining a second reference that represents an initial capacitance of the second capacitor. 3. The method of claim 2, wherein: the first capacitance is a difference between the first reference and the first capacitance; and the second capacitance is a difference between the second reference and the second capacitance. 4. The method of claim 1, further comprising the acts of: determining whether one or more of the first and second capacitances exceeds a threshold; and re-measuring the first and second capacitances if one or more of the first and second capacitances exceeds the threshold. 5. The method of claim 1, further comprising the act of determining whether the ratio is within a predetermined range. 6. The method of claim 5, further comprising the act of indicating that, if the ratio is within the predetermined range, that an edge is detected. 7. The method of claim 5, wherein the ratio is a function of a maximum of the first and second capacitances. 8. The method of claim 5, wherein the predetermined range is a range having fixed boundaries. 9. The method of claim 8, wherein the predetermined range is approximately between 0.3 and 0.35. 10. The method of claim 5, further comprising deriving the predetermined range from a look-up table. 11. The method of claim 5, further comprising generating the predetermined range. 12. The method of claim 1, further comprising the acts of: comparing the first and second capacitances; determining that an edge is closer to a centerline of the first plate than a centerline of the second plate if the first capacitance is greater than the second capacitance; and determining that the edge is closer to the centerline of the second plate than the centerline of the first plate if the first capacitance is less than the second capacitance. 13. The method of claim 1, further comprising the act of determining whether the ratio is within a predetermined range of a value of one. 14. The method of claim 13, wherein the predetermined range is inclusively 0.9 to 1. 15. The method of claim 13, further comprising the act of indicating that, if the ratio is within the predetermined range, a centerline of an object is detected. 16. The method of claim 1, wherein the first and second capacitances are indicative of a duration of time necessary to charge a respective one of the first and second plates to a respective reference level. 17. The method of claim 2, wherein: the first reference is indicative of a duration of time necessary to charge the first plate having the initial capacitance to a first reference; the second reference is indicative of a duration of time necessary to charge the second plate having the initial capacitance to a second reference; wherein the first capacitance is a difference between the first reference and a duration of time to charge the first plate to the first reference; and the second capacitance is a difference between the second reference and a duration of time to charge the second plate to the second reference. 18. The method of claim 17, wherein the first reference equals the second reference. 19. The method of claim 1, the act of moving comprising applying the sensor to the surface. 20. The method of claim 1, the act of moving comprising applying the surface to the sensor. 21. A method of finding a feature behind a surface using a sensor having first and a second plates of approximately equal areas, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate, measuring a second capacitance of a second capacitor including the second plate; comparing the first and second capacitances; and repeating the acts of measuring and comprising. 22. The method of claim 21, wherein the act of comparing includes: computing a ratio between the first and second capacitances; determining whether the ratio is within a predetermined range ratio; and indicating, if the ratio is within the range, that an edge is detected. 23. The method of claim 21, wherein the act of comparing the first and second capacitances includes: determining whether the first and second capacitances differ by less than a threshold; indicating that, if the first and second capacitances differ by less than the threshold, a centerline of an object is detected. 24. The method of claim 21, wherein the act of comparing the first and second capacitances includes: computing a ratio between the first and second capacitances; determining whether the ratio is within a predetermined range of one; and indicating, if the capacitance ratio is within the range, that a centerline of an object is detected. 25. A sensor for finding a feature of a structure comprising: a first plate having a first capacitance and adapted for forming a first capacitor with the structure; a second plate having a second capacitance and adapted for forming a second capacitor with the structure; a first measurement circuit coupled to the first plate, the first measurement circuit measuring a first capacitance value of the first capacitor; a second measurement circuit coupled to the second plate, the second measurement circuit measuring a second capacitance value of the second capacitor; and a comparison circuit coupled to the first and second measurement circuits, the comparison circuit generating a ratio of the first and second capacitance values. 26. The sensor of claim 25, wherein: the first capacitance value represents a difference between the first capacitance and an initial capacitance of the first capacitor; and the second capacitance value represents a difference between the second capacitance and an initial capacitance of the second capacitor. 27. The sensor of claim 25, further comprising threshold circuitry coupled to first and second measurement circuits, the threshold circuitry determining whether the first and second capacitance values are above a threshold. 28. The sensor of claim 25, further comprising a processing circuit coupled to the comparison circuit and coupled to receive the ratio value. 29. The sensor of claim 28, wherein the processing circuit determines whether the ratio is within a predetermined range. 30. The sensor of claim 29, further including an indicator coupled to the processing circuit, the indicator providing an indication that the sensor is over an edge of the structure when the ratio is within the predetermined range. 31. The sensor of claim 28, wherein the processing circuit determines whether the capacitance ratio is within a predetermined range of one. 32. The sensor of claim 31, further including an indicator coupled to the processing circuit, the indicator providing an indication that the sensor is over a centerline of an object of the structure when the ratio is within the range of one. 33. The sensor of claim 30, further including a look-up table coupled to the processing circuit, the look-up table providing a transition ratio to the processing circuit, wherein the transition ratio is used to set the predetermined range. 34. The sensor of claim 28, further comprising: a source of a reference voltage; wherein the first measurement circuit includes a first index, the first index indicating a number of clock cycles needed to charge the first plate to the reference voltage level; and wherein the second measurement circuit includes a second index, the second index indicating a number of clock cycles needed to charge the second plate to the reference voltage level. 35. The sensor of claim 34, wherein the first and second measurement circuits respectively include: a current source coupled to a respective one of the first or second plate; a discharge switch coupled to the respective one of the first or second plate; a digital-to-analog converter (DAC) having an input terminal coupled to receive a data signal from the processing circuit and an output terminal; and a comparator having a first input terminal coupled to the respective one of the first or second plate, a second input terminal coupled to the DAC, and an output terminal providing the output signal of the measurement circuit. 36. A sensor comprising: a first and a second plate positioned in about the same plane and spaced apart, and adapted to be located adjacent a surface; a measurement circuit coupled to the first and second plates thereby to measure a capacitance value of each of the plates; and a comparison circuit coupled to receive the measured capacitance values and determine a ratio between a change in the measured capacitance values. 37. The sensor of claim 36, further comprising an indicator coupled to the comparison circuit thereby to provide an indication of the ratio of the capacitances. 38. The sensor of claim 37, wherein the indication is that the ratio is approximately equal to a predetermined ratio, thereby locating an edge. 39. The sensor of claim 37, wherein the indication is that the ratio is approximately equal to one, thereby locating a centerline of an object.
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to an electronic sensor, and, in particular, to a sensor suitable for detecting the location of an object behind a variety of surfaces, including walls, floors and other non-electrically conductive structures. More specifically, the invention relates to an electronic sensor used to detect centerlines and edges of wall studs, floor joists, and the like. 2. Description of the Prior Art U.S. Pat. No. 4,464,622 entitled “Electronic wall stud sensor,” issued Aug. 7, 1984, and incorporated in its entirety by reference herein, discloses an electronic wall stud sensor particularly suitable for locating a stud positioned behind a wall surface. (A “stud” is a structural member of a building to which an interior wall surface such as wall board or paneling is affixed.) Typically in the U.S., “2-by-4” wooden studs are used in construction. Nominally, a 2-by-4 stud is 51 mm (2 inches) wide and 102 mm (4 inches) deep and of any suitable length. The actual dimensions of a 2-by-4 are more typically 38 mm (1½ inches) wide and 89 mm (3½ inches) deep. Use of English (inches) units and U.S. stud sizes here is in conformance with U.S. construction practice and is not intended to be limiting, but is only illustrative. Finding studs is a typical problem for building repairs, picture hanging, etc. The sensor detects the stud by measuring a change in capacitance due to a change in the dielectric constant along the wall. Due to the placement of the studs, a wall surface exhibits changing dielectric constants while the sensor is moved along the wall surface. The sensor includes a plurality of capacitor plates, a circuit for detecting changes in the capacitance, and an indicator. The plurality of capacitor plates is mounted in the sensor such that they can be positioned close to a wall's surface. When the capacitor plates are drawn along the surface, the circuit detects a change in the capacitance of the plates due to a change in the average dielectric constant of the surface. The capacitor plates are used to measure the effective capacitance or change in capacitance of a wall. Before detection begins, the sensor first performs a calibration to null out the effect of a wall in the absence of a stud. The capacitor plates are composed of a center plate and a symmetric pair of electrically connected edge plates. The difference in capacitance between the center and edge plates is used to determine the location of the edge of a stud. The centerline of the stud is then determined by finding both the left and right edges of the stud and then measuring to the middle of the distance between the edges. Thus, multiple measurements must be made in order to determine the centerline of the stud. The indicator indicates the change in capacitance of the capacitor plate, thereby alerting an operator to the wall stud position. The indicator also alerts the operator when calibration is occurring. While this procedure is effective in determining the centerline of a stud, significant errors in determining the location of the stud's edges can occur. One factor is the depth of the stud behind the surface. Due to the thickness of the sheetrock (also referred to as gypsum wall board and which has a thickness of 16 mm or equivalently ⅝ of an inch) or other wall surface material, a “ballooning” effect may distort the perceived width of the stud. The closer a stud is positioned to the surface, the wider the stud will appear when sensed in this way. Similarly, the farther or deeper a stud is positioned, the narrower the stud will appear. This ballooning effect is exacerbated when the sensitivity of the sensor is increased to aid in detecting deeper studs. The ballooning may be asymmetric due to electrical wires, metallic pipes and other objects in close proximity to the stud, which in turn may lead to a reduced the ability to accurately determine a stud's centerline. In the case of extreme ballooning, location of an edge of a stud can be inaccurately indicated by as much as 51 mm (2 inches). Similarly, the centerline of the stud may be so inaccurately indicated that it is completely off the actual stud location. A first method of compensating for the ballooning effect is shown in U.S. Pat. No. 6,023,159, entitled “Stud sensor with dual sensitivity,” issued Feb. 8, 2000, and incorporated by reference herein in its entirety. Unfortunately, using a dual sensitivity control only partially minimizes the ballooning effect. A second method of compensating for the ballooning effect is shown in U.S. Pat. No. 5,917,314, entitled “Electronic wall-stud sensor with three capacitive elements,” issued Jun. 29, 1999, and incorporated by reference herein. This second method discloses using three parallel sensing plates and using sums and differences between the various plate capacitances to determine the centerline and edges of a stud. The above methods, which use electronic wall stud sensors, are unable to reliably and accurately sense an edge of a stud (or other structural member) through surfaces that are thicker than 38 mm (1½ inches). Additionally, these sensors, if overly sensitive, falsely indicate the presence of non-existing studs. Therefore, known sensors have disadvantages. BRIEF SUMMARY An apparatus and method for determining a feature of a structure while reducing effects of an unknown thickness of the member located behind a surface are provided. The feature may be a centerline and/or an edge of an object or member, such as a stud or joist. The feature may also be an edge of a gap or discontinuity of the structure. The sensor apparatus includes a plurality of capacitive plates. The sensor may also include circuitry to sense an effective capacitance created by a plate, the covering and objects behind the covering. The sensor may compute a ratio between the capacitance measurements of a pair of the plates. A ratio of approximately one may indicate a centerline of a stud or joist or similar member. A ratio in a predetermined range may indicate an edge of a stud or joist. Some embodiments provide a method of finding a feature behind a surface using a sensor having first and second plates, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate; measuring a second capacitance of a second capacitor including the second plate; and computing a ratio of the first and second capacitances. Some embodiments provide a method of finding a feature behind a surface using a sensor having first and a second plates of approximately equal areas, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate, measuring a second capacitance of a second capacitor including the second plate; comparing the first and second capacitances; and repeating the acts of measuring and comprising. Some embodiments provide a sensor for finding a feature of a structure comprising: a first plate having a first capacitance and adapted for forming a first capacitor with the structure; a second plate having a second capacitance and adapted for forming a second capacitor with the structure; a first measurement circuit coupled to the first plate, the first measurement circuit measuring a first capacitance value of the first capacitor; a second measurement circuit coupled to the second plate, the second measurement circuit measuring a second capacitance value of the second capacitor; and a comparison circuit coupled to the first and second measurement circuits, the comparison circuit generating a ratio of the first and second capacitance values. Some embodiments provide a sensor comprising: a first and a second plate positioned in about the same plane and spaced apart, and adapted to be located adjacent a surface; a measurement circuit coupled to the first and second plates thereby to measure a capacitance value of each of the plates; and a comparison circuit coupled to receive the measured capacitance values and determine a ratio between a change in the measured capacitance values. BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1A-1C illustrate a plan view of a prior art single plate capacitive sensor positioned against a wall at a lateral distance away from a hidden stud and the capacitance produced by the sensor and the wall. FIGS. 2A-2D illustrates combinations of hidden studs and wall coverings of different widths and thicknesses as detectable in accordance with the invention. FIG. 3 illustrates capacitance measurements versus distance for various wall structures. FIG. 4A illustrates a plan view of a second prior art capacitive sensor having a primary plate and two side plates positioned at a lateral distance away from a hidden stud. FIG. 4B shows a graph of capacitance measurements of a primary plate and secondary (side) plates versus a lateral distance between a sensor and a hidden stud. FIGS. 5A-5D illustrate a plan view of and capacitance produced by a ratiometric capacitive sensor having two primary plates, in accordance with the present invention, positioned at a lateral distance away from an object, such as a hidden stud. FIG. 5E shows a graph of a ratio of capacitance measurements of two primary plates versus a lateral distance between a sensor and an object, such as a hidden stud, in accordance with the present invention. FIG. 6A illustrates plan views of a ratiometric capacitive sensor positioned at a lateral distance away from a hidden stud, in accordance with the present invention. FIG. 6B illustrates a plan view of a ratiometric capacitive sensor centered on an edge of a hidden stud, in accordance with the present invention. FIG. 6C illustrates a plan view of a ratiometric capacitive sensor centered on a centerline of a hidden stud, in accordance with the present invention. FIGS. 6D-6F show graphs of normalized capacitance measurements and a ratio versus distance for a hidden stud having a single, double and triple widths, respectively, in accordance with the present invention. FIG. 7 illustrates a plan view of a ratiometric capacitive sensor having two primary plates and side plates, in accordance with the present invention. FIG. 8 illustrates a plan view of a capacitive sensor having two pairs of orthogonally oriented primary plates, in accordance with the present invention. FIG. 9 illustrates a plan view of a capacitive sensor having a series of three or more plates, in accordance with the present invention. FIG. 10 illustrates a plan view of a capacitive sensor having grid of plates. FIG. 11 illustrates a plan view of a ratiometric capacitive sensor having two primary plates and circuit positioned between the two primary plates, in accordance with the present invention. FIG. 12 shows a block diagram of a ratiometric capacitive sensor having two primary plates and circuitry, in accordance with the present invention. FIG. 13 shows block diagram of another ratiometric capacitive sensor having two primary plates and circuitry, in accordance with the present invention. FIG. 14 shows a block diagram of ratiometric circuitry, in accordance with the present invention. FIGS. 15A-F show timing diagrams of circuitry increasing a DAC voltage, in accordance with the present invention. FIGS. 16A-F show timing diagrams of circuitry decreasing a DAC voltage, in accordance with the present invention. FIGS. 17-19 illustrate a process to detect a centerline and edges of an object, such as a stud, in accordance with the present invention. DETAILED DESCRIPTION A ratiometric capacitive sensor may use capacitance measurements from multiple conductive plates to determine the presence of objects, such as studs and joists, hidden behind a covering surface such as a wall, floor, ceiling, etc. In some embodiments, a ratiometric capacitive sensor includes two conductive plates. Each conductive plate acts as part of a separate capacitor. Circuitry coupled to each plate measures an effective change in capacity of the separate capacitors, which is effected by the density of material in close proximity to the plates. As a result, the combination of a wall or other surface covering and an underlying stud or other member has a larger capacitance than a wall covering alone without a stud. A capacitance measurement may be taken from each plate. The capacitance measurement from one plate may then be compared to a capacitance measurement of another plate to determine boundaries and features of the materials in the vicinity of the plates. FIG. 1A illustrates a plan view of a known capacitive sensor 200 having a single plate 202 positioned against a wall 99 at a lateral distance D away from a hidden stud 100. The stud 100 has two edges 102 and defines a centerline 101 relative to its positioning to the wall 99. FIGS. 1B and 1C illustrate a capacitance produced between the plate 202 and the wall 99. A capacitance curve 210 shows peaks at the centerline 101 of each stud 100 and a valley between a pair of studs 100. The capacitance curve 210 shows a minimum capacitance value when the sensor 200 is directly between the pair of studs 100. To mark the centerline of a stud 100, a sensor 200 must detect the peak of the capacitance curve 210. Unfortunately, the absolute apex of curve 210 is difficult to detect because of the relative flatness of the capacitance curve 210 as the sensor 200 is centered or nearly centered over a stud 100. For this reason, sensor 200 is not used to find centerlines 101 of studs 100. Therefore, sensor 200 only indicates edges 102 of a stud 100. As capacitance curve 210 passes through a transition capacitance value, the centerline 204 of the sensor 200 may be approximately over an edge 102 of the stud 100. While the capacitance is above this value, the sensor 200 may indicate it is over the stud 100. The transition capacitance value is set at the factor and may not be useful in locating edges and centers of studs located behind wall structures having different thicknesses and studs having different widths. FIGS. 2A-2D illustrate various wall structures having hidden studs 100 of different widths and wall coverings 99 of different thicknesses as encountered in typical buildings. FIG. 2A shows a single stud 100A presenting edges 102A hidden behind a single layer of sheetrock 99A. FIG. 2B shows two studs 100B side-by-side presenting edges 102B hidden behind a single layer of sheetrock 99A. FIG. 2C shows a single stud 100A presenting edges 102A hidden behind a double layer of sheetrock 99B. FIG. 2D shows two studs side-by-side presenting edges 102B hidden behind a double layer of sheetrock 99B. Each combination of widths and thicknesses presents a unique capacitance curve to a sensor 200 as the sensor 200 passes over the stud or studs 100. FIG. 3 graphs a series of capacitance measurement curves versus distance for the various wall structures shown in FIGS. 2A-2D. The distance may be a measure of the distance between a centerline 101 of stud 100 or group of studs and the centerline of a capacitive plate, e.g., plate 202 of FIG. 1A. The capacitance measurement may be a measure of a change in capacitance that is formed by the capacitive plate, e.g., plate 202, and the wall structure formed with one or more studs 100 providing an unknown width and a wall covering 99 having an unknown thickness. Curve 220 illustrates a capacitance detected over a wall structure having a single-width stud 100A defining edges 102A hidden by a single sheet of wall covering 99A, e.g., as shown in FIG. 2A. Curve 230 illustrates a capacitance detected over a wall structure having a double-width stud 100B defining edges 102B hidden by a single sheet of wall covering 99A, e.g., as shown in FIG. 2B. Curve 240 illustrates a capacitance detected over a wall structure having a single-width stud 100A defining edges 102A and hidden by two sheets of wall covering 99B, e.g., as shown in FIG. 2C. Curve 250 illustrates a capacitance detected over a wall structure having a double-width stud 100B defining edges 102B and hidden by two sheets of wall covering 99B, e.g., as shown in FIG. 2D. As the capacitance reaches a predetermined threshold value, the sensor 200 may indicate an edge 102 of a stud 100 is detected. For each particular wall structure, however, a unique threshold value is required to properly locate an edge 102 of a stud 100. For example, curve 220 may use threshold value 221 to indicate when the sensor 200 is centered over an edge 102A as shown at point 261. Similarly, curves 230, 240 and 250 may use respective threshold values 231, 241 and 251 when sensor 200 is centered over an edge 102A or 102B as shown at respective points 262, 263 and 264. FIG. 3 also shows that capacitance measurements may be normalized such that a single stud 100A hidden behind a single layer of sheetrock 99A, as shown in FIG. 2A, may produce a peak capacitance measurement value of 1.0 and a minimum calibrated value of 0.0 as seen from curve 220. Measurements of other wall structures may be normalized to a single-stud single-layer construction. Curve 230 shows a relative maximum capacitance value of 1.4. Similarly, curves 240 and 250 show relative maximum capacitance values of 0.4 and 0.6, respectively. A sensor using a single fixed threshold value, e.g., threshold value 221, for various wall structures, will sometime correctly and other times incorrectly identify locations of edges 102 of a stud 100. When the assumptions of the wall thickness and stud width are correct, the location of an edge 102 may be properly identified. For example, a sensor using a threshold value 221 calibrated for a single layer of sheetrock and a single stud may accurately determine the edges 102A of a single stud 100A behind a single layer of sheetrock 99A, as shown by point 261. If a sensor uses a single fixed threshold value designed for a particular wall structure that is different from the actual structure under test, the sensor 200 may provide false edge indications. For example, a sensor using a threshold value 221, which is set for a single stud, may incorrectly indicate an edge's position rather than the actual edge 102B of a double stud, as shown at point 265. In the example shown, a ballooning effect has occurred such that a false edge indication shows the stud edges 102B are positioned in a manner making the stud appear wider than it actually is. FIG. 4A illustrates a plan view of a capacitive sensor 200A having a primary plate 202A and two side plates 213 as described in U.S. Pat. No. 5,917,314. The sensor 200A is positioned at a lateral distance D away from a hidden stud 100. The two side plates 213 are electrically connected to act as a single capacitive plate. The side plates 213 assist in sharpening the detection of the hidden stud 100. The capacitance sensed by the side plates 213 are subtracted from the capacitance of the primary plate 202A. FIG. 4B shows a graph of capacitance measurements of a primary plate 202A and side plates 213 versus a lateral distance D between a sensor 200A and a hidden stud 100. Curve 210 shows a change in capacitance of the primary plate 202A of sensor 200A. The side plates 213 present a dual peak curve 270. Each peak represents a position of the sensor 200A when one of the side plates 213 is centered over the stud 100. A difference calculation between curve 210 of a primary plate 202A and the curve 270 of side plates 213 results in curve 280, which is a narrower than curve 210 of the primary plate 202A. Unfortunately, the measured capacitances shown in curves 210 and 270 and the difference in capacitances, as shown in curve 280, do not provide a direct indication of the location of an edge of a stud if the thickness of the separating material and the width of the stud are unknown since different wall structures present different nominal capacitances. Using a fixed difference threshold to indicate a stud's edge regardless of wall covering thickness may erroneously indicate an edge is closer to or farther from the centerline of the stud than is actually correct as described above with reference to FIGS. 2A-2D. Additionally, the rounded top of curve 280, though narrower than curve 210, still may not be sharp enough to pinpoint the location of a centerline 101 of a stud 100. FIG. 5A illustrates a plan view of a ratiometric capacitive sensor 300 having two primary plates 301, 302, in accordance with the present invention. The sensor 300 is positioned against a wall 99 at a lateral distance D away from a hidden stud 100. The stud 100 has two edges 102 and defines a centerline 101 relative to its positioning along the wall 99. Additionally, the sensor 300 defines a centerline 304 that may be equally positioned between a first plate 301 and a second plate 302. In some embodiments, associated circuitry (not shown) operates to independently measure values indicative of a capacitance of each plate 301 and 302. FIGS. 5B and 5C illustrate a capacitance produced between each respective plate 301 and 302 of the sensor 300 and the wall 99. FIG. 5B shows a capacitance curve 310 produced by the first plate 301 and the wall 99. FIG. 5C shows a capacitance curve 320 produced by the second plate 302 and the wall 99. Capacitance curves 310 and 320 are drawn relative to the centerline 304 of the sensor 300. Additionally, curves 310 and 320 show peaks when respective plates 301 and 302 are positioned over the centerline 101 of a stud 100 and show valleys when respective plates 301 and 302 are positioned between pairs of studs 100. At points where a sensor 300 measures a minimum capacitance valve or a relatively low capacitance valve, a sensor 300 may be positioned far from any stud 100. The measured capacitance values increase as the sensor 300 nears the stud 100; however, the capacitance values of each plate 301 and 302 will differ if one of the plates is closer to the stud 100. For example, a first plate 301 may be close to or over an edge 102 of a stud 100. At the same time, the second plate 302 may still be positioned at a lateral distance away from the stud 100. In this case, the change in capacitance from its minimum value experienced by the first plate 301 will be greater than the change in capacitance experienced by the second plate 302. In some embodiments, capacitance measurements are used to calculate a ratio. A first capacitance measurement represents the change in capacitance from a minimum value experienced on a first plate 301. A second capacitance measurement represents the change in capacitance from a minimum value experienced on a second plate 302. A ratio between the first and second capacitance measurements may be computed. If the ratio is approximately equal to a predetermined value, it may be determined that a centerline 304 of the sensor 300 is centered over an edge 102 of a stud 100. If the capacitance measurements are equal or the ratio is approximately equal to unity, both plates may be centered over the stud's edge 102 and the centerline 304 of the sensor 300 may be centered over the centerline 101 of the stud 100. FIG. 5D shows overlapping first and second capacitance curves 310 and 320 relative to the centerline 304 of the sensor 300 and a stud 100. A point at which curves 310 and 320 intersect may indicate a position of the sensor 300 where each plate is encountering an equal capacitance; therefore, the centerline 304 of the sensor 300 may be directly over a centerline 101 of the stud 100. In some embodiments, at least one of the capacitance values must be above a floor threshold value, a value above a minimum capacitance value, before the capacitance measurements are compared with each other. FIG. 5E shows a graph of a curve 330, which represents a ratio of capacitance measurements of two primary plates 301, 302 versus a lateral distance between a ratiometric capacitive sensor's centerline 304 and a centerline 101 of a stud 100, in accordance with the present invention. This ratio may be computed as the smaller capacitance divided by the larger capacitance, thereby resulting in a ratio that is equal to or less than one. The calculated results, shown in a ratio curve 330, exhibits a sharp peak rather than a rounded top as previously seen in the single plate curves 210, 220, 230 and 240 of FIG. 3. The sharp peak of curve 330 allows a ratiometric sensor to locate a stud's features with increased accuracy unlike the sensors 200 and 200A of FIGS. 1A and 4A, which generate rounded peaked curves. In other words, the sharp point of the ratio curve 330 may be used to more precisely determine a centerline 101 of a stud 100. Additionally, a transition ratio may be compared to the calculated ratio to determine the location of an edge 102 of a stud 100 as further described below. The transition ratio predicts a capacitance ratio formed at an edge of a stud when the sensor 300 is centered over the stud's edge for a particular wall structure. As such, a transition ratio may be used to indicate when the sensor 300 is centered over an edge 102. A transition ratio may be determined in a number of ways. The transition ratio may be a factory set constant. Alternatively, the transition ratio may be set by an operator. In some embodiments, the transition ratio is calculated during operation. In some embodiments, a transition ratio may be set during manufacturing. For example, a factory may set a transition ratio equal to a fixed value, e.g., 0.33. When plates produce capacitance measurements that form a ratio approximately equal to 0.33, the sensor 300 may indicate that the center of the sensor 300 is directly over an edge 102 of the stud 100. In some embodiments, a transition ratio may be directly or indirectly selected by an operator of the sensor. For example, an operator may select a stud width and/or a wall thickness. The stud width and/or wall thickness may be used to select an appropriate transition ratio, for example, as shown in the table below. Wall Covering Stud Type Thickness Transition Ratio Double stud Single sheet 0.32 76 mm (3 inches) 13 mm (½ an inch) Single stud Single sheet 0.33 38 mm (1½ inches) 13 mm (½ an inch) Double stud Double sheet 0.35 76 mm (3 inches) 25 mm (1 inch) Single stud Double sheet 0.45 38 mm (1½ inches) 25 mm (1 inch) In some embodiments, a transition ratio may be automatically determined by the sensor 300 based on capacitance measurements. A capacitance measurement may be a measure of a maximum capacitance measurement on a plate as shown in FIG. 3. In some circumstances, the actual ratio of measured plate capacitances at the stud's edge 102 varies predictably with the wall thickness. Therefore, a maximum measured capacitance value may be used to set a transition ratio used to locate a stud's edge. This maximum value may indicate a wall covering's thickness, with thicker walls having smaller maximum values. The maximum value may also provide an indication of the width of the stud, with wider studs having larger maximum values. The measured capacitance values may also be compared to indicate a direction of a stud with the plate having a higher capacitance measurement indicating the direction of the center of the stud. In some embodiments, the transition ratio may be calculated based on a historic maximum capacitance measurement. In other embodiments, a transition ratio may be calculated based on an instantaneous maximum capacitance measurement. A historic maximum capacitance measurement may be determined over time as measured from either plate 301 or 302. A maximum capacitance measurement is expected when the plate 301 or 302 is centered over a stud. The maximum capacitance measurement may be saved in memory. As the capacitance changes over time, an updated maximum capacitance value may be stored. Alternatively, an instantaneous maximum capacitance measurement may be used. An instantaneous maximum capacitance measurement may be selected each time the sensor 300 takes each pair of capacitance measurements from plates 301 and 302. In some embodiments, the larger of the two capacitance measurements may represent the maximum capacitance measurement. That is: Cmax=max{FirstPlate Value, SecondPlate Value}. In other embodiments, the maximum capacitance value may be determined by examining the capacitance formed by a single plate 301. Using the maximum capacitance measurement, the sensor 300 may select a transition ratio from a table or compute a transition ratio from a formula. A sensor 300, having plates centered 38 mm (1½ inches) apart, with each plate 19 mm (¾ of an inch) wide, may use a transition ratio as shown in the table below. For example, a maximum capacitance measurement of 1.4, representing a double-width stud hidden behind a single sheet of sheetrock, may have a transition ratio of 0.32. Maximum Capacitance Transition Ratio 1.4 0.32 1.0 0.33 0.6 0.35 0.4 0.45 Alternatively, the sensor 300 may compute a transition ratio for each ratio calculation. In some embodiments, a transition ratio may be calculated as: TR ⁡ ( P ) = { 0.61 - 0.28 ⁢ C max P 1 / 2 if ⁢ ⁢ C max < P 1 / 2 0.33 else where TR(P) is a Transition Ratio; P1/2 is a design constant; and Cmax is a Maximum Capacitance. The design constant P1/2 may be set during manufacturing and may represent the expected maximum capacitance measured over a reference wall structure having a single (nominal) stud having a width of 44 mm (1¾ inches) and a wall covering 99 having a thickness of 13 mm (½of an inch). In some embodiments, the maximum capacitance Cmax parameter may be the historical maximum capacitance. In other embodiments, the maximum capacitance Cmax parameter may be the instantaneous maximum capacitance described above. The formula shows that if Cmax is less than the design constant P1/2, the formula is used. If Cmax is greater than or equal to the design constant P1/2, a fix value of 0.33 is used. Once set, the transition ratio may be used to determine the location of an edge of a stud. A sensor 300 may measure a first capacitance value on a first plate 301 and a second capacitance value on a second plate 302. A capacitance ratio may be calculated between the first and second capacitance values. This capacitance ratio may be compared to the predicted transition ratio to determine whether the sensor is presently centered over an edge of a stud. For example, a sensor 300 measuring a maximum capacitance value of 1.4 indicates the sensor has passed over a double-wide stud having a width of 76 mm (3 inches) hidden behind a single layer of sheetrock having a thickness of 13 mm (½ an inch). The transition ratio for this wall structure may be set to a value of 0.32. When the sensor 300 detects a position where the first and second capacitance measurements are approximately equal to 0.32, the sensor 300 may indicate that the sensor 300 is centered over an edge 102. In some embodiments, the stud's edge location may be determined to an accuracy of approximately 3 mm (⅛ of an inch) over a wall covering thickness range of 13 to 25 mm (½ to 1 inch). A relative maximum capacitance value may be used to indicate the composition of a wall. For example, a specific design of a sensor 300 may measure a maximum capacitance value of 1.4, which indicates a double width stud hidden behind a single layer of sheetrock. Measured capacitance values indicate a direction in which a stud 100 is located. At a stud's edge 102, one plate may be directly over the centerline 101 of the stud 100, while the other may be off to one side of the stud 100. The plate 301 or 302 positioned over the stud 100 will have a larger capacitance than the other plate 302 or 301 and will pass a maximum value as the sensor 300 is drawn across the stud 100. A plate 301 or 302 showing a larger capacitance indicates that the centerline 304 of the sensor 300 needs to be moved in the direction of that plate 301 or 302. FIGS. 6A-6C illustrate plan views of a ratiometric capacitive sensor 300A having two primary plates 301 and 302, in accordance with the present invention. FIG. 6A shows a centerline 304 of a sensor 300A positioned at a distance of D1 from a centerline 101 of a hidden stud 100. A plate 302 positioned at a substantial distance away from a stud 100 produces a near constant capacitance equal to some nominal or minimum value. As the sensor 300A, and consequently its plates 301, 302, is moved closer to the object, the capacitance of each plate 301, 302 will begin to increase. A sensor 300A may periodically monitor changes in capacitance of each plate 301, 302. As the capacitance changes from its nominal value, the sensor 300A may sense an approaching stud 100. A first plate 301 may near the stud 100 first; therefore its capacitance will be greater than the capacitance of the second plate 302, which may be farther away from the stud 100. FIG. 6B illustrates a plan view of capacitive sensor 300A with the centerline 304 of the sensor 300A positioned directly over an edge 102A of a hidden stud 100 and positioned at a distance of D2 from a centerline 101 of the stud 100. Some sensors 300A have lateral dimensions such that when the centerline 304 of the sensor 300A is positioned directly over an edge 102A of a hidden stud 100, the centerline of the first plate 301 is directly over the centerline 101 of the stud 100. In this situation, the capacitance of the first plate 301 is at its maximum value. Additionally, the ratio of the capacitances between the plates 301 and 302 may be equal to a predicable transition ratio. Therefore, a sensor 300A may identify the location of an edge 102A of stud 100 by calculating a ratio and determining whether the ratio equals this transition ratio. Additionally, since the first plate 301 has a capacitance greater than the second plate 302, the sensor 300A may provide an indication as to whether the stud 100 is to the right or left of the centerline 304 of the sensor 300A. FIG. 6C illustrates a plan view of capacitive sensor 300A with the centerline 304 of the sensor 300A centered directly over a centerline 101 of a hidden stud 100, resulting in a center-to-center distance of D3=0. In this position, each plate 301 and 302 may be partially over the stud 100. Each plate 301 and 302 will have a capacitance value that is some minimum threshold above its nominal values, below its maximum value, and approximately equal to a common value. Therefore, a centerline of a object may be located by identifying when two plates have capacitance values equal to a common value that is above some floor threshold value. A floor threshold may be selected to be a value above a calibration capacitance measurement. The calibration capacitance measurement may be the minimum capacitance measured by the sensor 300. Setting the floor threshold value to a high value reduces the risk of false positive edge 102 and centerline 101 indications. Setting the floor threshold value to a low values allows a sensor 300 to detect narrower studs or to detect studs through thicker wall coverings. FIGS. 6D, 6E and 6F show graphs of capacitance measurements and a ratio versus distance for a hidden stud having single, double and triple widths, respectively, in accordance with the present invention. A single-width stud may be approximately 38 mm (1½inches) wide. A double-width stud may be approximately 76 mm (3 inches) wide. A triple-width stud may be approximately 114 mm (4½ inches) wide. The width of a capacitance curve increases as the width of a stud or group of studs increases. The ratio curve, however, remains a curve having a sharp peak, which may be used to locate a centerline of a stud. FIG. 6D shows two plate capacitance curves 310A and 310B and a ratio curve 330A, in accordance with the present invention for FIG. 2A. The horizontal axis of the graph represents the distance between the centerline 304 of ratiometric capacitive sensor 300A and the centerline 101 of a single-width hidden stud 100. A first plate 301 is positioned at a distance from a stud 100 results in a change in capacitance shown by curve 310A. Similarly, a second plate 302 positioned at a distance from a stud 100 results in an equivalent but shifted change in capacitance as shown by the laterally offset curve 320A. When a centerline 304 of sensor 300A is positioned at a distance D=D1 from the centerline 101 of a stud 100 as shown in FIG. 6A, the first plate 301 exhibits a substantial change in capacitance but the second plate 302 only shows a substantially low change in capacitance as seen at points 312 and 322, respectively. Additionally, at the distance D1, the ratio of the capacitance measurements is also substantially low, as shown on curve 330A at point 332. At a distance D=D1, the sensor 300A is not centered over a centerline 101 or edge 102 of the stud 100. The substantially low capacitance ratio shown at point 332 and the substantial change in capacitance detected in the first plate 301 shown at point 312 indicate a direction that an operator must move the sensor 300A in order to reach a centerline 101 or edge 102 of the stud 100. In other words, a plate having a higher capacitance indicates the direction of a centerline 101 of a stud 100 relative to the centerline 304 of the sensor 300A. When sensor 300A is positioned at a distance D=D2 from the centerline 101 of a stud 100 as shown in FIG. 6B, the first plate 301 detects a maximum capacitance and the second plate 302 detects a substantial change in capacitance, as seen at points 313 and 333, respectively. This combination of capacitance measurements results in a capacitance ratio approximately equal to a determined transition ratio. When a sensor 300A calculates a capacitance ratio approximately equal to a predetermined transition ratio, the sensor 300A may indicate to an operator that the sensor 300A is centered over an edge 102 of the stud 100. Additionally, the sensor 300A may indicate to which side of the centerline 304 of the sensor 300A that the stud 100 is positioned. When sensor 300A is centered at a distance D=D3=0 over a stud 100 as shown in FIG. 6C, both plates 301 and 302 detect an approximately equal capacitance measurement. At the point where curves 310A and 320A intersect, their values are equal and the ratio curve 330A peaks at a maximum value of unity. Therefore, a unity ratio or a value approximately equal to unity may be used to identify the centerline 101 of a stud 100. FIG. 6E graphs capacitance measurement curves 310B and 320B and a ratio curve 330B versus distance for a double-width hidden stud, in accordance with the present invention. Curves 310B and 320B represent a change in capacitance in plates 301 and 302, respectively, as sensor 300A passes over a double-width stud. Curve 330B represents the ratio of curves 310B and 320B. The peak of curve 330B locates a centerline of the double-width stud. An edge of the double-width stud may be located the position when the ratio curve 330B equals a predetermined transition ratio, as indicated by points 335 and 336. FIG. 6F graphs capacitance measurement curves 310C and 320C and a ratio curve 330C versus distance for a triple-width hidden stud, in accordance with the present invention. Curves 310C and 320C represent a change in capacitance in plates 301 and 302, respectively, as sensor 300A passes over a triple-width stud. Curve 330C represents the ratio of curves 310C and 320C. The peak of curve 330C locates a centerline of the triple-width stud. An edge of the triple-width stud may be located when the ratio curve 330C equals a predetermined transition ratio, as indicated by points 337 and 338. Curves 330A, 330B and 330C show a ratio of the capacitance curves. A ratio curve 330 may be computed as follows. When the first plate 301 produces a capacitance that is greater than the capacitance produced by the second plate 302, a ratio is calculated by dividing the second plate's change in capacitance value by the larger first plate's change in capacitance value. Similarly, when the first plate 301 produces a capacitance that is less than the capacitance produced by the second plate 302, the ratio is calculated by dividing the smaller first plate's change in capacitance value by the second plate's change in capacitance value. Formulaically, the ratio curve 330 may be computed by: cap_ratio ⁢ ( D ) = min ⁢ { FirstPlateValue ⁡ ( D ) , SecondPlateValue ⁡ ( D ) } max ⁢ { FirstPlateValue ⁡ ( D ) , SecondPlateValue ⁡ ( D ) } where the plate value may be a change in value from a nominal value such as a nominal or minimal value determined during calibration. Theoretically, a plate value may be an absolute measurement of capacitance rather than a measurement of a change in capacitance. Practically, a plate value or capacitance measurement is a relative measurement from a value that may exclude parasitic capacitances of a sensor's circuitry and a wall covering. In some embodiments, a plate value is an indirect measure of capacitance. For example, the plate value may be a measure of a number of clock cycles necessary to charge a plate 301 or 302 to a reference level. In some embodiments, the area between the first and second plates 301, 302 is occupied by side plates and/or circuitry. A set of plates 301, 302 positioned along side one another in a plane results in a non-conductive gap area between the plates 301, 302. The gap may be used for locating side plates 213 (FIG. 4A) or additional primary plates (see below with reference to FIGS. 8-10). Additionally, the gap may be used to position the associated electronic circuitry used to determine a capacitance value of each plate 301 and 302. In some embodiments, the first and second plates 301, 302 are each approximately the width of one-half of a typical stud and their centers are positioned approximately the width of one typical stud apart, thereby leaving another one-half width of a stud as a gap between the plates 301, 302. In some embodiments of the present invention, a first plate 301 and a second plate 302 have similar or equal dimensions. In some embodiments, each plate has the same the width. For example, plates 301 and 302 may each have a width equal to 19 mm (¾ of an inch). Greater plate widths advantageously increase the plate's capacitance, however, it may also decrease certainty in locating centerline and edge features of an object or a discontinuity. Similarly, the separation of the plates 301 and 302 may also affect the accuracy of location an object or a discontinuity having particular width. In some embodiments, each plate has the same the height. For example, plates 301 and 302 may each have a height of 51 mm (2 inches). Plates having a longer plate height advantageously increase the plate's capacitance, thereby increasing a sensor's accuracy in more precisely locating centerline and edge features of an object or a discontinuity. A plate's height, however, may be limited by a desired physical size of a sensor's housing. In some embodiments of the present invention, a first plate 301 and a second plate 302 are positioned in sensor 300 such that their center-to-center spacing is a distance equal to the width of a typical object or discontinuity. For example, the width of a single 2-by-4 stud may be approximately 38 to 44 mm (1½ to 1¾ inches), (the actual stud width). Therefore, a sensor may be designed to having a center-to-center spacing of plates 302, 303 of 44 mm (1 3/4 inches). In some embodiments of the present invention, a first plate 301 and a second plate 302, each having dimensions of 51 mm (2 inches) by 19 mm (¾ of an inch), are separated by a gap of 19 mm (¾ of an inch) resulting in a pair of plates 301 and 302 that have a center-to-center spacing of 44 mm (1¾ inches). FIG. 7 illustrates a plan view of an alternate embodiment of a ratiometric capacitive sensor 300B, in accordance with the present invention. The sensor 300B includes two primary plates 301 and 302 each having a set of side plates 213. A pair of side plates 213 straddling a primary plate 301 and 302 results in a capacitance curve having steeper slopes as previously shown with reference to FIGS. 4A and 4B. A resulting ratio curve would have slight steeper slopes as well, thereby providing a sharper point for locating a centerline 101 of a stud 100. FIG. 8 illustrates a plan view of a capacitive sensor 300C having two pairs of orthogonally oriented primary plates 301C-1, 302C-1, 301C-2 and 302C-2. A first pair of plates 301C-1 and 302C-2 may be used to find a vertically oriented stud. A second pair of plates 301C-2 and 302C-2 may used to find a horizontally oriented stud. FIG. 9 illustrates a plan view of a capacitive sensor 300D having a series of three or more plates, for example, Plates A-G. When the plates are placed against a wall and activated, the series of plates may be calibrated. While some plates may be located partially over or completely over a stud, other plates may be at a substantial lateral distance away from the studs. As such, plates that exhibit the lowest capacitance may be used to define the nominal capacitance value. After calibration, which may entail sliding the series of plates across the wall, these plates may be used to indicate the location of a void behind a walled surface. The nominal capacitance value may also be used as a reference. The nominal value may be used to determine whether other plates are positioned near, partially over or completely over a stud. In some embodiments, a sensor 300D may be able to detect one or more studs located behind the wall without moving the sensor 300D across the wall. A series of three or more plates has a further advantage that objects or discontinuities of various widths may be measured. Additionally, the series of plates A-G may be integrated with other equipment. For example, a horizontal series of plates may be fixed in the back of a level. The level may be placed against a wall and activated. A series of LED may be used to indicate the location of studs or other objects or discontinuities such as metal pipes and electrical wires. Alternatively, a series of plates may be positioned over moving objects, such as over a conveyor belt. The plates A-G may be used to detect a passing object and may be used to identify the centerline of the passing object. FIG. 10 illustrates a plan view of a capacitive sensor 300E having an array of primary plates 11-34, in accordance with the present invention. An array of plates may have two or more columns and two or more rows of plates. Each plate 11-34 may be individually charged separately or in concert with a subset of other plates to determine a capacitance measurement. Ratios between various pairs of capacitance measurements may be taken to identify features of a hidden structure. FIG. 11 illustrates a plan view of a capacitive sensor 300F having two primary plates 301 and 302 and associated signal processing circuitry 400 positioned in the gap between the two primary plates 301 and 302, in accordance with the present invention. Each plate 301 and 302 may be conventionally electrically connected to the circuitry 400 with a conductor, such as an etched conductor on a PC board. FIG. 12 shows a block diagram of a ratiometric capacitive sensor having two primary plates 301 and 302 and associated circuitry 400A, in accordance with the present invention. In some embodiments, a sensor includes a first plate 301, a second plate 302 and electronic circuitry 400A having a first measurement circuit 410A, a second measurement circuit 410B, a comparison circuit 414, and an indicator 416. The first and second plates 301 and 302 are conventionally charged and discharged by the respective first and second measurement circuits 410A, 410B. Each measurement circuit 410A, 410B provides a capacitance measurement to the comparison circuit 414. The capacitance measurement may be an indication of a change in capacitance from a nominal capacitance experienced during calibration. The comparison circuit 414 processes the capacitance measurements. For example, the comparison circuit 414 may compute a ratio between the capacitive measurements. The comparison circuit 414 may determine whether the capacitive measurements are within a predetermined value of each other. The comparison circuit 414 then provides a signal to the indicator 416. The indicator 416 may be used to alert the operator of information regarding an object, such as a stud. The comparison circuit 414 (e.g., a comparator) may compare and/or process the capacitance measurements to determine whether an object or a discontinuity is present and/or whether a feature of an object or a discontinuity is detected. For example, comparison circuit 414 may determine that the sensor 300 is centered over a stud 100 by detecting that the capacitance measurements are equal to each other and also above a floor threshold. Capacitance measurements may be considered equal when they are within a predetermined percentage value or absolute value from each other. Comparison circuit 414 may determine that the sensor is centered over an edge 102 of a stud 100 by detecting that the capacitance measurements form a ratio that is equal to a transition ratio. The transition ratio may be a fixed value, a value indirectly or directly selected by a user, a value extracted from a lookup table or a computed value. A capacitance ratio may be considered equal to the transition ratio when the capacitance ratio falls within range of values about the transition ratio. In some embodiments, the comparison circuit 414 couples capacitance measurement to the indicator 416. The indicator 416 may visually (or audibly) display a value indicative of each capacitance value. The operator may use the displayed values to visually determine whether an object or a discontinuity exists, for example, by looking for changing capacitive measurements. Additionally, an operator may use the displayed values to visually determine the location of edges 102 and centerlines 101 of studs 100, for example, by looking for capacitance measurements equaling a transition ratio. FIG. 13 shows another version of a sensor of FIG. 11 having two primary plates 301 and 302 and circuitry 400B. The sensor includes a first plate 301, a second plate 302 and electronic circuitry 400B having a first measurement circuit 420A, a second measurement circuit 420B, a properly programmed microcomputer or a microcontroller 424, and an indicator 426. Here microcontroller 424 carries out the comparator functions of comparison circuit 414 of FIG. 12. The first and second plates 301 and 302 are charged and discharged by the respective first and second measurement circuits 420A, 420B. Each measurement 402A, 402B circuit provides a capacitance measurement to the microcontroller 424. Additionally, the microcontroller 424 may provide timing or other control signals to the first and second measurement circuits 420A and 420B. The microcontroller 424 processes the capacitance measurements and may provide a signal to the indicator 426. The indicator 416 may include a display, such as a liquid crystal display and/or LEDs, and may include an audio device, such as a speaker or buzzer. FIG. 14 shows a block diagram of circuitry 400B of a ratiometric capacitive sensor of FIG. 13. Circuitry 400B includes a first measurement circuit 420A and a second measurement circuit 420B. The measurement circuits 420A, 420B may be used to measure relative charging times of the first and second capacitors formed by the plates 301 and 302. In some embodiments, circuitry 400B also includes reference circuit 500 having a reference capacitor CREF 514C, which may be used to form a third capacitance and to which charge times of plates 301 and 302 may be compared. The first measurement circuit 420A and the second measurement circuit 420B may be similarly constructed. A measurement circuit 420A/B may include an electrical connection 502A/B to a respective plate 302, 303 (not shown in FIG. 14). A respective plate 301 or 302 may be connected, by way of a connection 502A/B, to a current source 508A/B, a discharge switch 504A/B, and a first input signal to a comparator 510A/B. A second input signal to the comparator 510A/B may be provided by an output of a digital-to-analog converter (“DAC”) 512A/B having an input that may be independently set and changed by a microcontroller 424. An output signal of the comparator 510A may be provided as a data input to a first delay flip-flop (“D flip-flop”) 520A. An output signal of the comparator 510B may be provided as a data input to a second D flip-flop 520B. The reference capacitor CREF 514C may be connected to a third current source 508C, a third discharge switch 504C and a first input to a third comparator 510C. A second voltage input to the third comparator 510C may provided by, for example, a voltage source preset during factory calibration. An output of the third comparator 510C may be provided as a clock signal input to the first and second D flip-flops 520A, 520B. The Q-output of each D flip-flop 520A, 520B may be provided as an input to the microcontroller 424. The microcontroller 424 may be programmed conventionally as described herein to control the operation of a measurement circuit 420A, 420B, 500. For example, the microcontroller 424 may set a signal on control line 506 that simultaneously turns the discharge switches 504A, 504B, 504C on and off. The microcontroller 424 may also be used to set the values provided to the DACs 512A, 512B and to process the Q-output of each D flip-flop 520A, 520B. As a result, the microcontroller 424 may provide as an output signal(s) an indication of a location of a sensed edge and/or sensed centerline of a hidden object such as stud and joist. The indication may be provided to the user visually and/or audibly, for example, by a display 430, a speaker 432, and/or the like. Additionally, the display may indicate a relative direction of the hidden object. In some embodiments, calibration of a ratiometric stud sensor is performed by placing the sensor 300 having plates 301 and 302 on a wall and turning the power on thereto (conventionally from a battery, not shown). The sensor then charges and discharges each plate to determine a value for each DAC that will cause the comparators to trigger simultaneously with the comparator in the reference circuitry. These DAC values become a calibrated reference point against which a change in capacity may be determined. As the sensor 300 is moved toward and over a stud 100, each DAC value is continuously updated to maintain simultaneous triggering of the comparators with the triggering of the comparator in the reference circuitry 500. The change of each DAC value from its calibration reference point is a measure of the change in capacitance sensed by that plate. The change in the DAC value may be used as a capacitance measurement. Dividing the smaller of the two capacitance measurements by the larger gives an updated capacitance ratio. The centerline of a stud may be determined when the capacitance ratio is equal to unity. A capacitance ratio equaling a particular transition ratio, whose precise value depends on the plate configuration, occurs at the stud edge. The microcontroller 424 can then activate an appropriate display 430, 432 to indicate the desired characteristics of the stud. FIGS. 15A-F show timing diagrams of circuitry 400B increasing a DAC voltage. FIG. 15A shows a waveform 610 representing a control voltage 506 across discharge switch 504A. FIG. 15B shows a waveform 620 representing a voltage on capacitive plate 302. FIG. 15C shows a waveform 630 representing an output of a comparator 510A. FIG. 15D shows a waveform 640 representing a voltage on reference capacitor 514C. FIG. 15E shows a waveform 650 representing an output of a reference comparator 510C. FIG. 15F shows a waveform 660 representing an output of flip-flop 520A. In this sequence of figures, a first comparator 510A of circuit 420A triggers at a time T2 in curve 650 before the triggering at time T3 in curve 650 of a third comparator 510C of reference circuit 500. FIG. 15A shows in curve 610 the timing of a control signal 506, which may be used to simultaneously close and open discharge switches, namely first, second and third discharge switches 502A-C. At time T1, the control signal 506 opens the discharge switches 502A-C, thereby allowing the plates 301 and 302 and capacitor 514C to charge. At time T4, control signal closes 506 the discharge switches 502A-C, thereby discharging the plates 301 and 302 and capacitor 514C. In some embodiments, the control signal 506 is provided by a microcontroller 424. FIG. 15B shows in curve 620 representing input voltages supplied to a first comparator 510A. A first input signal is provided as a voltage level from a first plate 301. A second input is provided as a steady voltage level supplied by a first DAC 512A. The capacitor voltage of the first plate 301 changes as it charges and discharges. When switch 504A/B is closed by control signal 506, the plate voltage is held at a value of zero volts. Upon opening the switches 504A, 504B, 504C, current sources 508A-C charge each plate 301 and 302 and the reference capacitor 514C in the reference circuit 500. Assuming all current sources 508A-C are identical, each plate 301 and 302 and the reference capacitor 514C is charged at a rate inversely proportional to its capacity, or more specifically at a rate following dV/dt=I/C. When a plate voltage equals the voltage on the second input of the comparator 510A/B/C, the comparator output will change states. If the reference comparator 510C triggers first, the D flip-flop 520A/B output will be a logical zero, while if a plate comparator 510A/B changes state first, the output of that D flip-flop 520A/B will be a logical one. Before time T1, the capacitor voltage is at a known level, namely zero volts. Between times T1 and T4, the capacitors are allowed to charge. As some point, namely time T2, the increasing voltage level of the capacitor equals the steady voltage level provided by the first DAC 512A. At this point, the comparator 510A changes states, thereby providing a logical one to a D input of a first D flip-flop 520A. FIG. 15C shows in curve 630 the output signal of the first comparator 510A, which is provided as the D input signal to a first D flip-flop 520A. FIG. 15D shows in curve 640 representing input voltages supplied to a third comparator 510C. A first input signal is provided as a variable voltage level across a reference capacitor 514C. A second input is provided as a steady voltage level supplied by reference voltage source 507. The voltage across the reference capacitor 514C changes as it charges and discharges. Before time T1, the capacitor voltage is at a known level, namely zero volts. Between times T1 and T4, the reference capacitor 514C is allowed to charge. As some point, namely time T3, the increasing voltage level of the reference capacitor 514C equals the steady voltage level provided by the reference voltage source 507. At this point, the comparator 510C changes states, thereby providing a logical one to a clock input of a first D flip-flop 520A. FIG. 15E shows in curve 650 the output signal of the third comparator 510C, which is provided as the clock input of the first D flip-flop 520A. FIG. 15F shows in curve 650 a Q-output signal of the first D flip-flop 520A. Once the clock signal provided by the reference circuit 500 triggers the first D flip-flop 520A, the Q-output signal represents a sample and hold of the logical value supplied at the D input. Since the first comparator 510A triggered before the reference circuit 500, the voltage supplied by the first DAC 512A is too low and may be increase. For example, the microcontroller 424 may detect the logical one provided by the D flip-flop 520A and determine that the voltage provided by the first DAC 512A should be increased by some amount before the next charging sequence as shown in FIG. 15B. FIGS. 16A-F show timing diagrams of circuitry 400B decreasing a DAC voltage. In this sequence of figures, the third comparator 510C triggers time T3, which occurs before the first comparator 510A triggers at time T2. FIG. 16A shows in curve 710 the timing of a control signal 506, which may be used to simultaneously close and open discharge switches, namely first, second and third discharge switches 502A-C. At time T1, the control signal 506 opens the discharge switches 502A-C, thereby allowing the capacitors to charge. FIG. 16B shows in curve 720 input voltages supplied to the first comparator 510A. As some point, namely time T2, the increasing voltage level of the capacitor formed by plate 301 equals the steady voltage level provided by the first DAC 512A. At this point, the comparator 510A changes states from a logical zero to a logical one. FIG. 16C shows in curve 730 the output of the first comparator 510A, which is provided as the D input of the first D flip-flop 520A. FIG. 16D shows in curve 740 input voltages supplied to the third comparator 510C. Between times T1 and T4, the reference capacitor 514C is allowed to charge. As some point, namely time T3, the increasing voltage level of the reference capacitor 514C equals the steady voltage level provided by the reference voltage source 507. At this point, the comparator 510C changes states, thereby providing a logical one to a clock input of the first D flip-flop 520A. FIG. 16E shows in curve 750 the output of the third comparator 510C, which is provided as the clock input of the first D flip-flop 520A. In the case shown in FIGS. 16A-F, the reference circuit 500 triggered at time T3, which occurs before the first circuit 420A triggered at time T2. Therefore, the clock signal triggers the D flip-flop 520A before the output of the first comparator 510A is provided to the D input of the D flip-flop 520A. This timing results in the Q-output signal to remain at a logical zero, as shown in curve 760 of FIG. 15F. Since the first comparator 510A triggered after the reference circuit 500, the voltage supplied by the first DAC 512A may be too high and may be decrease. For example, the microcontroller 424 may detect the logical zero provided by the D flip-flop 520A and determine that the voltage provided by the first DAC 512A should be decreased by some amount before the next charging sequence as shown in FIG. 16B. Eventually, the DAC voltage be increased or decrease to a value that will cause the first circuit 420A to trigger at approximately the same time as the reference circuit 500. During initialization, a DAC value that causes the circuits 420A, 500 to trigger at the same time may be used as a predetermined DAC value that represents an initial capacitance of the first plate 301. The predetermined DAC value may represent the capacitance of a wall without a stud. After initialization, a DAC value that causes the circuits 420A, 500 to trigger at the same time may. The second plate 302 may be charged and discharged and a second DAC value may be determined in a fashion equivalent to the process used with reference to the first circuit 420A describe above. The first and second circuits 420A, 420B may operate by a same control signal to generate independent capacitance measurements. In operation, each time the discharge switches 504A-C are opened, outputs from the D flip-flops 502A, 502B will eventually be updated. The microprocessor 424 may use this information to increase or decrease the input to the corresponding DAC 512A/B, which in turn, increases or decreases the time it takes for the plate comparator 510A/B to trigger. The sensor may operate as a closed loop feedback system that maintains the time to trigger for each plate equal to that of the reference channel. An eventual value of a DAC 512A/B may be directly related to a plate capacitance or a change in plate capacitance. The two independent capacitance measurements may be in a form of a change in first and second DAC values from their calibration values. The sensed first DAC value may be used along with the sense second DAC value to determine the presents and features of an object or a discontinuity, such as the centerline 101 and edges 102 of a stud 100. FIGS. 17-19 illustrate a process to detect a centerline 101 and edges 102 of an object or a discontinuity, such as a stud 100, for example, as may be carried out by micro controller 424 or comparison circuit 414. The order of steps presented may be rearranged by those skilled in the art. FIG. 17 illustrates a top level flow of processing of sensor 300, in accordance with some embodiments of the present invention as carried out by the program executed by processor 424. At step 700, sensor 300 powers up and is assumed to be positioned against a surface 99. The sensor 300 performs a calibration step 710 to reduce the impact of parasitic circuit and wall capacitances. The calibration step determines a reference value such as a DAC value that represents an absolute capacitance of the wall structure and includes parasitic capacitances of the sensor 300. At step 720, sensor 300 begins a process of measuring plate capacitances, e.g., determining capacitance measurements in the form of a relative capacitance values from the calibration values. At step 730, the sensor 300 computes a capacitance ratio between plate capacitance measurements from step 720. At step 740, a sensor 300 determines whether the capacitive measurements of step 720 indicate a centerline 101 of an object or a discontinuity has been detected. That is, if the capacitance ratio is approximately equal to unity, or alternatively, if the capacitance measurements are approximately equal to one another. If so, at step 750, the sensor 300 may provide a visual and/or an audio indication that a centerline 101 of the object or the discontinuity is detected. If not, the process may continue. At step 760, sensor 300 determines whether the capacitive measurements of step 720 indicate an edge of an object or a discontinuity has been detected. An edge is detected when the capacitance ratio is approximately equal to a transition ratio. If so, at step 770, the sensor 300 provides a visual and/or an audio indication that an edge of the object or the discontinuity is detected. If not, the sensor 300 repeats the process with step 720. Additionally, sensor 300 determines the relative direction an object or a discontinuity exists based on the relative magnitudes of the measured plate capacitances. For example, the sensor 300 indicates that the stud is positioned to the left of the centerline 304 of the sensor 300. Sensor 300 indicates the direction of an object or a discontinuity audibly and/or visually. FIG. 18 illustrates a sensor calibration process (step 710 of FIG. 17), in accordance with some embodiments of the present invention. At step 800, calibration begins. At step 810, the sensor and surface are positioned proximally to one another. For example, sensor 300 is placed against a wall or alternatively an object is positioned along side a sensor 300. At step 820, the sensor is enabled. For example, the circuit is powered by a switch controlled by an operator. At step 830 reference measurements are taken. In some embodiments, a reference measurement is made for each plate, e.g., plate 301 or 302. In some embodiments, a DAC value is determined that causes measurement circuitry to trigger at the same time as a reference circuit having a reference capacitor. With reference to FIG. 14 for example, DAC values 512A and 512B are determined, one for each plate 301 and 302, such that comparators 510A, 510B and 501C simultaneously trigger. A nominal capacitance value of each plate 301 and 302 may be represented by a DAC value 512A and 512B, respectively. Once the calibration values are stored in step 840, the end of calibration is reached, as shown by step 850. FIG. 19 shows further sensor processing, in accordance to some embodiments of the present invention. The process begins after calibration with step 900. In step 910, plate capacitance measurements may be made. For example, a change in capacitance from a nominal capacitance, for example, as determined during calibration, may be measured. In step 920, a determination is made as to whether either and/or both of the measurements are above a predetermined floor threshold. If not, the process begins again with step 910. If capacitance measurements are above a predetermined floor threshold, a capacitor ratio is computed as a ratio between the smaller and the larger of the capacitance values, as shown in step 930. Next, a decision is made as to whether a centerline of a stud is detected, as shown in step 940. If the capacitance values are equal or equal within a predetermine offset, the centerline 304 of a sensor 300 is over a centerline 101 of a stud 100. As shown in step 950, an announcement to a user is made that indicates that a centerline has been found. If the capacitance values are unequal, a transition ratio is computed, as shown in step 960. At step 970, the transition ratio is compared to the capacitance ratio. If the transition ratio is equal to capacitance ratio, or within a predetermined offset, an edge is detected. If an edge is detected, the detection of an edge is announced and/or the direction of the edge may be announced as indicated at step 980. In either case, the process repeats with new capacitance measurements at step 910. A ratiometric capacitive sensor 300 in accordance with the invention may be used to detect a variety of hidden objects in addition to studs and joists. For example, a sensor having long and narrow plates may be used to find a crack or gap hidden behind a surface. Sensor 300 may be used to find a safe hidden behind a wall. Sensor 300 may be used to find brick wall hidden behind sheetrock. Additionally, sensor 300 may be stationary and be positioned to allow objects to pass across its plates. While the present invention has been described with reference to one or more particular variations, those skilled in the art will recognize that many changes may be made thereto without departing from the spirit and scope of the present invention. Each of these embodiments and obvious variations thereof are contemplated as falling within the scope of the claimed invention, which is set forth in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention This invention relates to an electronic sensor, and, in particular, to a sensor suitable for detecting the location of an object behind a variety of surfaces, including walls, floors and other non-electrically conductive structures. More specifically, the invention relates to an electronic sensor used to detect centerlines and edges of wall studs, floor joists, and the like. 2. Description of the Prior Art U.S. Pat. No. 4,464,622 entitled “Electronic wall stud sensor,” issued Aug. 7, 1984, and incorporated in its entirety by reference herein, discloses an electronic wall stud sensor particularly suitable for locating a stud positioned behind a wall surface. (A “stud” is a structural member of a building to which an interior wall surface such as wall board or paneling is affixed.) Typically in the U.S., “2-by-4” wooden studs are used in construction. Nominally, a 2-by-4 stud is 51 mm (2 inches) wide and 102 mm (4 inches) deep and of any suitable length. The actual dimensions of a 2-by-4 are more typically 38 mm (1½ inches) wide and 89 mm (3½ inches) deep. Use of English (inches) units and U.S. stud sizes here is in conformance with U.S. construction practice and is not intended to be limiting, but is only illustrative. Finding studs is a typical problem for building repairs, picture hanging, etc. The sensor detects the stud by measuring a change in capacitance due to a change in the dielectric constant along the wall. Due to the placement of the studs, a wall surface exhibits changing dielectric constants while the sensor is moved along the wall surface. The sensor includes a plurality of capacitor plates, a circuit for detecting changes in the capacitance, and an indicator. The plurality of capacitor plates is mounted in the sensor such that they can be positioned close to a wall's surface. When the capacitor plates are drawn along the surface, the circuit detects a change in the capacitance of the plates due to a change in the average dielectric constant of the surface. The capacitor plates are used to measure the effective capacitance or change in capacitance of a wall. Before detection begins, the sensor first performs a calibration to null out the effect of a wall in the absence of a stud. The capacitor plates are composed of a center plate and a symmetric pair of electrically connected edge plates. The difference in capacitance between the center and edge plates is used to determine the location of the edge of a stud. The centerline of the stud is then determined by finding both the left and right edges of the stud and then measuring to the middle of the distance between the edges. Thus, multiple measurements must be made in order to determine the centerline of the stud. The indicator indicates the change in capacitance of the capacitor plate, thereby alerting an operator to the wall stud position. The indicator also alerts the operator when calibration is occurring. While this procedure is effective in determining the centerline of a stud, significant errors in determining the location of the stud's edges can occur. One factor is the depth of the stud behind the surface. Due to the thickness of the sheetrock (also referred to as gypsum wall board and which has a thickness of 16 mm or equivalently ⅝ of an inch) or other wall surface material, a “ballooning” effect may distort the perceived width of the stud. The closer a stud is positioned to the surface, the wider the stud will appear when sensed in this way. Similarly, the farther or deeper a stud is positioned, the narrower the stud will appear. This ballooning effect is exacerbated when the sensitivity of the sensor is increased to aid in detecting deeper studs. The ballooning may be asymmetric due to electrical wires, metallic pipes and other objects in close proximity to the stud, which in turn may lead to a reduced the ability to accurately determine a stud's centerline. In the case of extreme ballooning, location of an edge of a stud can be inaccurately indicated by as much as 51 mm (2 inches). Similarly, the centerline of the stud may be so inaccurately indicated that it is completely off the actual stud location. A first method of compensating for the ballooning effect is shown in U.S. Pat. No. 6,023,159, entitled “Stud sensor with dual sensitivity,” issued Feb. 8, 2000, and incorporated by reference herein in its entirety. Unfortunately, using a dual sensitivity control only partially minimizes the ballooning effect. A second method of compensating for the ballooning effect is shown in U.S. Pat. No. 5,917,314, entitled “Electronic wall-stud sensor with three capacitive elements,” issued Jun. 29, 1999, and incorporated by reference herein. This second method discloses using three parallel sensing plates and using sums and differences between the various plate capacitances to determine the centerline and edges of a stud. The above methods, which use electronic wall stud sensors, are unable to reliably and accurately sense an edge of a stud (or other structural member) through surfaces that are thicker than 38 mm (1½ inches). Additionally, these sensors, if overly sensitive, falsely indicate the presence of non-existing studs. Therefore, known sensors have disadvantages.
<SOH> BRIEF SUMMARY <EOH>An apparatus and method for determining a feature of a structure while reducing effects of an unknown thickness of the member located behind a surface are provided. The feature may be a centerline and/or an edge of an object or member, such as a stud or joist. The feature may also be an edge of a gap or discontinuity of the structure. The sensor apparatus includes a plurality of capacitive plates. The sensor may also include circuitry to sense an effective capacitance created by a plate, the covering and objects behind the covering. The sensor may compute a ratio between the capacitance measurements of a pair of the plates. A ratio of approximately one may indicate a centerline of a stud or joist or similar member. A ratio in a predetermined range may indicate an edge of a stud or joist. Some embodiments provide a method of finding a feature behind a surface using a sensor having first and second plates, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate; measuring a second capacitance of a second capacitor including the second plate; and computing a ratio of the first and second capacitances. Some embodiments provide a method of finding a feature behind a surface using a sensor having first and a second plates of approximately equal areas, the method comprising the acts of: moving the sensor and surface adjacent one another; measuring a first capacitance of a first capacitor including the first plate, measuring a second capacitance of a second capacitor including the second plate; comparing the first and second capacitances; and repeating the acts of measuring and comprising. Some embodiments provide a sensor for finding a feature of a structure comprising: a first plate having a first capacitance and adapted for forming a first capacitor with the structure; a second plate having a second capacitance and adapted for forming a second capacitor with the structure; a first measurement circuit coupled to the first plate, the first measurement circuit measuring a first capacitance value of the first capacitor; a second measurement circuit coupled to the second plate, the second measurement circuit measuring a second capacitance value of the second capacitor; and a comparison circuit coupled to the first and second measurement circuits, the comparison circuit generating a ratio of the first and second capacitance values. Some embodiments provide a sensor comprising: a first and a second plate positioned in about the same plane and spaced apart, and adapted to be located adjacent a surface; a measurement circuit coupled to the first and second plates thereby to measure a capacitance value of each of the plates; and a comparison circuit coupled to receive the measured capacitance values and determine a ratio between a change in the measured capacitance values.
20040304
20061003
20050908
68148.0
1
WHITTINGTON, KENNETH
RATIOMETRIC STUD SENSING
SMALL
0
ACCEPTED
2,004
10,794,475
ACCEPTED
System and method for estimating fuel vapor with cylinder deactivation
Various systems and methods are disclosed for carrying out combustion in a fuel-cut operation in some or all of the engine cylinders of a vehicle. Further, various subsystems are considered, such as fuel vapor purging, air-fuel ratio control, engine torque control, catalyst design, and exhaust system design.
1. A method for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders, the method comprising: operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; mixing exhaust gas from the first and second set; and determining an indication of fuel vapors from a sensor measuring said mixed exhaust gas based on the operation of the second set of cylinders. 2. The method of claim 1 wherein said indication is a concentration of fuel vapors in said first set of cylinder. 3. The method of claim 1 wherein said indication is a mass flow rate of fuel vapors in said first set of cylinder. 4. The method of claim 1 wherein said operating the second set of cylinders occurs during said operation of the first set of cylinders. 5. The method of claim 1 wherein the second set of cylinders further operates without injected fuel. 6. The method of claim 5 wherein the second set of cylinders further operates with inducted air. 7. The method of claim 6 wherein the fist and second sets of cylinders are both coupled to an exhaust manifold, wherein the sensor is located in said exhaust manifold. 8. The method of claim 6 wherein the first and second sets of cylinders are in the same bank of a v-8 engine. 9. The method of claim 1 where the second set of cylinders operates about stoichiometry. 10. A method for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders, the method comprising: operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; mixing exhaust gas from the first and second set; and determining an estimate of fuel vapors to the first set of cylinders based on fuel injected to said first set of cylinders and a sensor measuring said mixed exhaust gas. 11. The method of claim 10 wherein said indication is a concentration of fuel vapors in said first set of cylinder. 12. The method of claim 10 wherein said indication is a mass flow rate of fuel vapors in said first set of cylinder. 13. The method of claim 10 wherein said operating the second set of cylinders occurs during said operation of the first set of cylinders. 14. The method of claim 10 wherein the second set of cylinders further operates without injected fuel. 15. The method of claim 14 wherein the second set of cylinders further operates with inducted air. 16. The method of claim 15 wherein the fist and second sets of cylinders are both coupled to an exhaust manifold, wherein the sensor is located in said exhaust manifold. 17. The method of claim 15 wherein the first and second sets of cylinders are in the same bank of a v-8 engine. 18. The method of claim 10 wherein the second set of cylinders operates about stoichiometry. 19. The method of claim 10 wherein said estimate of fuel vapors is further based on an amount of fuel injected to said second set of cylinders. 20. A computer readable storage medium having stored data representing instructions executable by a computer for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders, the computer readable storage medium comprising: instructions for operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; instructions for operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; instructions for mixing exhaust gas from the first and second set; and instructions for determining an indication of fuel vapors from a sensor measuring said mixed exhaust gas based on the operation of the second set of cylinders.
BACKGROUND AND SUMMARY Engines are usually designed with the ability to deliver a peak output, although most engine operation is performed well below this peak value. As such, it can be beneficial to operate with some cylinders inducting air without fuel injection as described in U.S. Pat. No. 6,568,177. Engines are also designed to purge fuel vapors generated in the fuel delivery system through combustion in the cylinders. The approach for such operation described in U.S. Pat. No. 6,568,177 advantageously disables the partial cylinder operating mode when such fuel vapor purging is requested. However, the inventors herein have recognized that it can be advantageous to deliver fuel vapors to a subset of the engine cylinders, thereby prolonging the ability to operate in a fuel-cut state even when fuel vapor purging is required. However, in such cases, exhaust gasses between cylinders with and without fuel vapor purge can mix. Thus, when attempting to estimate the amount of fuel vapors in the purge flow, the error is diluted since some of the exhaust gasses measured are from cylinders without any fuel vapors. Therefore, a new method for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders is used. The method comprises operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; mixing exhaust gas from the first and second set; and determining an indication of fuel vapors from a sensor measuring said mixed exhaust gas based on the operation of the second set of cylinders. In this way, it is possible to take into account the cylinders without fuel vapors. BRIEF DESCRIPTION OF THE FIGURES The above features and advantages will be readily apparent from the following detailed description of example embodiment(s). Further, these features and advantages will also be apparent from the following drawings. FIG. 1 is a block diagram of a vehicle illustrating various components of the powertrain system; FIGS. 1A and 1B show a partial engine view; FIGS. 2A-2T show various schematic system configurations; FIGS. 3A1-3A2 are graphs representing different engine operating modes at different speed torque regions; FIGS. 3B-3C, 4-5, 7-11, 12A-12B, 13A, 13C1-C2, and 16-20 and 34 are high level flow charts showing example routines and methods; FIGS. 6A-D, 13B1-13B2 and 13D1-13D2 are graphs show example operation; FIGS. 14 and 15 show a bifurcated catalyst; FIG. 21 contains graphs showing a deceleration torque request being clipped via a torque converter model to keep engine speed above a minimum allowed value; FIGS. 22-27 show engine torque over an engine cycle during a transition between different cylinder cut-out modes; FIGS. 28-33 show Fourier diagrams of engine torque excitation across various frequencies for different operating modes, and when transitioning between operating modes. DETAILED DESCRIPTION OF EXAMPLE EMBODIMENT(S) OF THE INVENTION Referring to FIG. 1, internal combustion engine 10, further described herein with particular reference to FIGS. 1A and 1B, is shown coupled to torque converter 11 via crankshaft 13. Torque converter 11 is also coupled to transmission 15 via turbine shaft 17. Torque converter 11 has a bypass, or lock-up clutch 14 which can be engaged, disengaged, or partially engaged. When the clutch is either disengaged or partially engaged, the torque converter is said to be in an unlocked state. The lock-up clutch 14 can be actuated electrically, hydraulically, or electro-hydraulically, for example. The lock-up clutch 14 receives a control signal (not shown) from the controller, described in more detail below. The control signal may be a pulse width modulated signal to engage, partially engage, and disengage, the clutch based on engine, vehicle, and/or transmission operating conditions. Turbine shaft 17 is also known as transmission input shaft. Transmission 15 comprises an electronically controlled transmission with a plurality of selectable discrete gear ratios. Transmission 15 also comprises various other gears, such as, for example, a final drive ratio (not shown). Transmission 15 is also coupled to tire 19 via axle 21. Tire 19 interfaces the vehicle (not shown) to the road 23. Note that in one example embodiment, this powertrain is coupled in a passenger vehicle that travels on the road. FIGS. 1A and 1B show one cylinder of a multi-cylinder engine, as well as the intake and exhaust path connected to that cylinder. As described later herein with particular reference to FIG. 2, there are various configurations of the cylinders and exhaust system, as well as various configuration for the fuel vapor purging system and exhaust gas oxygen sensor locations. Continuing with FIG. 1A, direct injection spark ignited internal combustion engine 10, comprising a plurality of combustion chambers, is controlled by electronic engine controller 12. Combustion chamber 30 of engine 10 is shown including combustion chamber walls 32 with piston 36 positioned therein and connected to crankshaft 40. A starter motor (not shown) is coupled to crankshaft 40 via a flywheel (not shown). In this particular example, piston 36 includes a recess or bowl (not shown) to help in forming stratified charges of air and fuel. Combustion chamber, or cylinder, 30 is shown communicating with intake manifold 44 and exhaust manifold 48 via respective intake valves 52a and 52b (not shown), and exhaust valves 54a and 54b (not shown). Fuel injector 66A is shown directly coupled to combustion chamber 30 for delivering injected fuel directly therein in proportion to the pulse width of signal fpw received from controller 12 via conventional electronic driver 68. Fuel is delivered to fuel injector 66A by a conventional high pressure fuel system (not shown) including a fuel tank, fuel pumps, and a fuel rail. Intake manifold 44 is shown communicating with throttle body 58 via throttle plate 62. In this particular example, throttle plate 62 is coupled to electric motor 94 so that the position of throttle plate 62 is controlled by controller 12 via electric motor 94. This configuration is commonly referred to as electronic throttle control (ETC), which is also utilized during idle speed control. In an alternative embodiment (not shown), which is well known to those skilled in the art, a bypass air passageway is arranged in parallel with throttle plate 62 to control inducted airflow during idle speed control via a throttle control valve positioned within the air passageway. Exhaust gas sensor 76 is shown coupled to exhaust manifold 48 upstream of catalytic converter 70 (note that sensor 76 corresponds to various different sensors, depending on the exhaust configuration as described below with regard to FIG. 2. Sensor 76 may be any of many known sensors for providing an indication of exhaust gas air/fuel ratio such as a linear oxygen sensor, a UEGO, a two-state oxygen sensor, an EGO, a HEGO, or an HC or CO sensor. In this particular example, sensor 76 is a two-state oxygen sensor that provides signal EGO to controller 12 which converts signal EGO into two-state signal EGOS. A high voltage state of signal EGOS indicates exhaust gases are rich of stoichiometry and a low voltage state of signal EGOS indicates exhaust gases are lean of stoichiometry. Signal EGOS is used to advantage during feedback air/fuel control in a conventional manner to maintain average air/fuel at stoichiometry during the stoichiometric homogeneous mode of operation. Conventional distributorless ignition system 88 provides ignition spark to combustion chamber 30 via spark plug 92 in response to spark advance signal SA from controller 12. Controller 12 causes combustion chamber 30 to operate in either a homogeneous air/fuel mode or a stratified air/fuel mode by controlling injection timing. In the stratified mode, controller 12 activates fuel injector 66A during the engine compression stroke so that fuel is sprayed directly into the bowl of piston 36. Stratified air/fuel layers are thereby formed. The strata closest to the spark plug contain a stoichiometric mixture or a mixture slightly rich of stoichiometry, and subsequent strata contain progressively leaner mixtures. During the homogeneous mode, controller 12 activates fuel injector 66A during the intake stroke so that a substantially homogeneous air/fuel mixture is formed when ignition power is supplied to spark plug 92 by ignition system 88. Controller 12 controls the amount of fuel delivered by fuel injector 66A so that the homogeneous air/fuel mixture in chamber 30 can be selected to be at stoichiometry, a value rich of stoichiometry, or a value lean of stoichiometry. The stratified air/fuel mixture will always be at a value lean of stoichiometry, the exact air/fuel being a function of the amount of fuel delivered to combustion chamber 30. An additional split mode of operation wherein additional fuel is injected during the exhaust stroke while operating in the stratified mode is also possible. Nitrogen oxide (NOx) adsorbent or trap 72 is shown positioned downstream of catalytic converter 70. NOx trap 72 is a three-way catalyst that adsorbs NOx when engine 10 is operating lean of stoichiometry. The adsorbed NOx is subsequently reacted with HC and CO and catalyzed when controller 12 causes engine 10 to operate in either a rich homogeneous mode or a near stoichiometric homogeneous mode such operation occurs during a NOx purge cycle when it is desired to purge stored NOx from NOx trap 72, or during a vapor purge cycle to recover fuel vapors from fuel tank 160 and fuel vapor storage canister 164 via purge control valve 168, or during operating modes requiring more engine power, or during operation modes regulating temperature of the omission control devices such as catalyst 70 or NOx trap 72. (Again, note that emission control devices 70 and 72 can correspond to various devices described in FIGS. 2A-R). Also note that various types of purging systems can be used, as described in more detail below with regard to FIGS. 2A-R. Controller 12 is shown in FIG. 1A as a conventional microcomputer, including microprocessor unit 102, input/output ports 104, an electronic storage medium for executable programs and calibration values shown as read only memory chip 106 in this particular example, random access memory 108, keep alive memory 110, and a conventional data bus. Controller 12 is shown receiving various signals from sensors coupled to engine 10, in addition to those signals previously discussed, including measurement of inducted mass air flow (MAF) from mass air flow sensor 100 coupled to throttle body 58; engine coolant temperature (ECT) from temperature sensor 112 coupled to cooling sleeve 114; a profile ignition pickup signal (PIP) from Hall effect sensor 118 coupled to crankshaft 40; and throttle position TP from throttle position sensor 120; and absolute Manifold Pressure Signal MAP from sensor 122. Engine speed signal RPM is generated by controller 12 from signal PIP in a conventional manner and manifold pressure signal MAP from a manifold pressure sensor provides an indication of vacuum, or pressure, in the intake manifold. During stoichiometric operation, this sensor can give and indication of engine load. Further, this sensor, along with engine speed, can provide an estimate of charge (including air) inducted into the cylinder. In a one example, sensor 118, which is also used as an engine speed sensor, produces a predetermined number of equally spaced pulses every revolution of the crankshaft. In this particular example, temperature Tcat1 of catalytic converter 70 and temperature Tcat2 of emission control device 72 (which can be a NOx trap) are inferred from engine operation as disclosed in U.S. Pat. No. 5,414,994, the specification of which is incorporated herein by reference. In an alternate embodiment, temperature Tcat1 is provided by temperature sensor 124 and temperature Tcat2 is provided by temperature sensor 126. Continuing with FIG. 1A, camshaft 130 of engine 10 is shown communicating with rocker arms 132 and 134 for actuating intake valves 52a, 52b and exhaust valve 54a. 54b. Camshaft 130 is directly coupled to housing 136. Housing 136 forms a toothed wheel having a plurality of teeth 138. Housing 136 is hydraulically coupled to an inner shaft (not shown), which is in turn directly linked to camshaft 130 via a timing chain (not shown). Therefore, housing 136 and camshaft 130 rotate at a speed substantially equivalent to the inner camshaft. The inner camshaft rotates at a constant speed ratio to crankshaft 40. However, by manipulation of the hydraulic coupling as will be described later herein, the relative position of camshaft 130 to crankshaft 40 can be varied by hydraulic pressures in advance chamber 142 and retard chamber 144. By allowing high pressure hydraulic fluid to enter advance chamber 142, the relative relationship between camshaft 130 and crankshaft 40 is advanced. Thus, intake valves 52a, 52b and exhaust valves 54a, 54b open and close at a time earlier than normal relative to crankshaft 40. Similarly, by allowing high pressure hydraulic fluid to enter retard chamber 144, the relative relationship between camshaft 130 and crankshaft 40 is retarded. Thus, intake valves 52a, 52b, and exhaust valves 54a, 54b open and close at a time later than normal relative to crankshaft 40. Teeth 138, being coupled to housing 136 and camshaft 130, allow for measurement of relative cam position via cam timing sensor 150 providing signal VCT to controller 12. Teeth 1, 2, 3, and 4 are preferably used for measurement of cam timing and are equally spaced (for example, in a V-8 dual bank engine, spaced 90 degrees apart from one another) while tooth 5 is preferably used for cylinder identification, as described later herein. In addition, controller 12 sends control signals (LACT, RACT) to conventional solenoid valves (not shown) to control the flow of hydraulic fluid either into advance chamber 142, retard chamber 144, or neither. Relative cam timing is measured using the method described in U.S. Pat. No. 5,548,995, which is incorporated herein by reference. In general terms, the time, or rotation angle between the rising edge of the PIP signal and receiving a signal from one of the plurality of teeth 138 on housing 136 gives a measure of the relative cam timing. For the particular example of a V-8 engine, with two cylinder banks and a five-toothed wheel, a measure of cam timing for a particular bank is received four times per revolution, with the extra signal used for cylinder identification. Sensor 160 provides an indication of both oxygen concentration in the exhaust gas as well as NOx concentration. Signal 162 provides controller a voltage indicative of the O2 concentration while signal 164 provides a voltage indicative of NOx concentration. Alternatively, sensor 160 can be a HEGO, UEGO, EGO, or other type of exhaust gas sensor. Also note that, as described above with regard to sensor 76, sensor 160 can correspond to various different sensors depending on the system configuration, as described in more detail below with regard to FIG. 2. As described above, FIGS. 1A (and 1B) merely show one cylinder of a multi-cylinder engine, and that each cylinder has its own set of intake/exhaust valves, fuel injectors, spark plugs, etc. Referring now to FIG. 1B, a port fuel injection configuration is shown where fuel injector 66B is coupled to intake manifold 44, rather than directly cylinder 30. Also, in the example embodiments described herein, the engine is coupled to a starter motor (not shown) for starting the engine. The starter motor is powered when the driver turns a key in the ignition switch on the steering column, for example. The starter is disengaged after engine start as evidence, for example, by engine 10 reaching a predetermined speed after a predetermined time. Further, in the disclosed embodiments, an exhaust gas recirculation (EGR) system routes a desired portion of exhaust gas from exhaust manifold 48 to intake manifold 44 via an EGR valve (not shown). Alternatively, a portion of combustion gases may be retained in the combustion chambers by controlling exhaust valve timing. The engine 10 operates in various modes, including lean operation, rich operation, and “near stoichiometric” operation. “Near stoichiometric” operation refers to oscillatory operation around the stoichiometric air fuel ratio. Typically, this oscillatory operation is governed by feedback from exhaust gas oxygen sensors. In this near stoichiometric operating mode, the engine is operated within approximately one air-fuel ratio of the stoichiometric air-fuel ratio. This oscillatory operation is typically on the order of 1 Hz, but can vary faster and slower than 1 Hz. Further, the amplitude of the oscillations are typically within 1 a/f ratio of stoichiometry, but can be greater than 1 a/f ratio under various operating conditions. Note that this oscillation does not have to be symmetrical in amplitude or time. Further note that an air-fuel bias can be included, where the bias is adjusted slightly lean, or rich, of stoichiometry (e.g., within 1 a/f ratio of stoichiometry). Also note that this bias and the lean and rich oscillations can be governed by an estimate of the amount of oxygen stored in upstream and/or downstream three way catalysts. As described below, feedback air-fuel ratio control is used for providing the near stoichiometric operation. Further, feedback from exhaust gas oxygen sensors can be used for controlling air-fuel ratio during lean and during rich operation. In particular, a switching type, heated exhaust gas oxygen sensor (HEGO) can be used for stoichiometric air-fuel ratio control by controlling fuel injected (or additional air via throttle or VCT) based on feedback from the HEGO sensor and the desired air-fuel ratio. Further, a UEGO sensor (which provides a substantially linear output versus exhaust air-fuel ratio) can be used for controlling air-fuel ratio during lean, rich, and stoichiometric operation. In this case, fuel injection (or additional air via throttle or VCT) is adjusted based on a desired air-fuel ratio and the air-fuel ratio from the sensor. Further still, individual cylinder air-fuel ratio control could be used, if desired. Also note that various methods can be used to maintain the desired torque such as, for example, adjusting ignition timing, throttle position, variable cam timing position, exhaust gas recirculation amount, and a number of cylinders carrying out combustion. Further, these variables can be individually adjusted for each cylinder to maintain cylinder balance among all the cylinder groups. Referring now to FIG. 2A, a first example configuration is described using a V-8 engine, although this is simply one example, since a V-10, V-12, I4, I6, etc., could also be used. Note that while numerous exhaust gas oxygen sensors are shown, a subset of these sensors can also be used. Further, only a subset of the emission control devices can be used, and a non-y-pipe configuration can also be used. As shown in FIG. 2A, some cylinders of first combustion chamber group 210 are coupled to the first catalytic converter 220, while the remainder are coupled to catalyst 222. Upstream of catalyst 220 and downstream of the first cylinder group 210 is an exhaust gas oxygen sensor 230. Downstream of catalyst 220 is a second exhaust gas sensor 232. In this example, groups 210 and 212 each have four cylinders. However, either group 210 or group 212 could be divided into other groups, such as per cylinder bank. This would provide four cylinder groups (two on each bank, each with two cylinders in the group). In this way, two different cylinder groups can be coupled to the same exhaust gas path on one side of the engine's bank. Similarly, some cylinders of second combustion chamber group 212 are coupled to a second catalyst 222, while the remainder are coupled to catalyst 220. Upstream and downstream are exhaust gas oxygen sensors 234 and 236 respectively. Exhaust gas spilled from the first and second catalyst 220 and 222 merge in a Y-pipe configuration before entering downstream under body catalyst 224. Also, exhaust gas oxygen sensors 238 and 240 are positioned upstream and downstream of catalyst 224, respectively. In one example embodiment, catalysts 220 and 222 are platinum and rhodium catalysts that retain oxidants when operating lean and release and reduce the retained oxidants when operating rich. Further, these catalysts can have multiple bricks, and further these catalysts can represent several separate emission control devices. Similarly, downstream underbody catalyst 224 also operates to retain oxidants when operating lean and release and reduce retained oxidants when operating rich. As described above, downstream catalyst 224 can be a group of bricks, or several emission control devices. Downstream catalyst 224 is typically a catalyst including a precious metal and alkaline earth and alkaline metal and base metal oxide. In this particular example, downstream catalyst 224 contains platinum and barium. Note that various other emission control devices could be used, such as catalysts containing palladium or perovskites. Also, exhaust gas oxygen sensors 230 to 240 can be sensors of various types. For example, they can be linear oxygen sensors for providing an indication of air-fuel ratio across a broad range. Also, they can be switching type exhaust gas oxygen sensors that provide a switch in sensor output at the stoichiometric point. Also, the system can provide less than all of sensors 230 to 240, for example, only sensors 230, 234, and 240. In another example, only sensor 230, 234 are used with only devices 220 and 222. Also, while FIG. 2A shows a V-8 engine, various other numbers of cylinders could be used. For example, an I4 engine can be used, where there are two groups of two cylinders leading to a common exhaust path with and upstream and downstream emission control device. When the system of FIG. 2A is operated in an AIR/LEAN mode, first combustion group 210 is operated at a lean air-fuel ratio (typically leaner than about 18:1) and second combustion group 212 is operated without fuel injection. Thus, in this case, and during this operation, the exhaust air-fuel ratio is a mixture of air from the cylinders without injected fuel, and a lean air fuel ratio from the cylinders combusting a lean air-fuel mixture. In this way, fuel vapors from valve 168 can be burned in group 210 cylinders even during the AIR/LEAN mode. Note that the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Note that, as described in more detail below, the mode selected may be based on desired engine output torque, whether idle speed control is active, exhaust temperature, and various other operating conditions. Referring now to FIG. 2B, a system similar to that in FIG. 2A is shown, however a dual fuel vapor purge system is shown with first and second purge valves 168A and 168B. Thus, independent control of fuel vapors between each of groups 210 and 212 is provided. When the system of FIG. 2B is operated in an AIR/LEAN mode, first combustion group 210 is operated at a lean air-fuel ratio (typically leaner than about 18:1), second combustion group 212 is operated without fuel injection, and fuel vapor purging can be enabled to group 210 via valve 168A (and disabled to group 212 via valve 168B). Alternatively, first combustion group 210 is operated without fuel injection, second combustion group 212 is operated at a lean air-fuel ratio, and fuel vapor purging can be enabled to group 212 via valve 168B (and disabled to group 210 via valve 168A). In this way, the system can perform the AIR/LEAN mode in different cylinder groups depending on operating conditions, or switch between the cylinder groups to provide even wear, etc. Referring now to FIG. 2C, a V-6 engine is shown with first group 250 on one bank, and second group 252 on a second bank. The remainder of the exhaust system is similar to that described above in FIGS. 2A and 2B. The fuel vapor purge system has a single control valve 168 fed to cylinders in group 250. When the system of FIG. 2C is operated in an AIR/LEAN mode, first combustion group 250 is operated at a lean air-fuel ratio (typically leaner than about 18:1) and second combustion group 252 is operated without fuel injection. Thus, in this case, and during this operation, the exhaust air-fuel ratio is a mixture of air from the cylinders without injected fuel, and a lean air fuel ratio from the cylinders combusting a lean air-fuel mixture. In this way, fuel vapors from valve 168 can be burned in group 250 cylinders even during the AIR/LEAN mode. Note that the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2D, a system similar to that in FIG. 2C is shown, however a dual fuel vapor purge system is shown with first and second purge valves 168A and 168B. Thus, independent control of fuel vapors between each of groups 250 and 252 is provided. When the system of FIG. 2D is operated in an AIR/LEAN mode, first combustion group 250 is operated at a lean air-fuel ratio (typically leaner than about 18:1), second combustion group 252 is operated without fuel injection, and fuel vapor purging can be enabled to group 250 via valve 168A (and disabled to group 212 via valve 168B). Alternatively, first combustion group 250 is operated without fuel injection, second combustion group 252 is operated at a lean air-fuel ratio, and fuel vapor purging can be enabled to group 252 via valve 168B (and disabled to group 250 via valve 168A). In this way, the system can perform the AIR/LEAN mode in different cylinder groups depending on operating conditions, or switch between the cylinder groups to provide even wear, etc. Note that the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2E, a V-6 engine is shown similar to that of FIG. 2C, with the addition of an exhaust gas recirculation (EGR) system and valve 178. As illustrated in FIG. 2E, the EGR system takes exhaust gasses exhausted from cylinders in cylinder group 250 to be fed to the intake manifold (downstream of the throttle). The EGR gasses then pass to both cylinder groups 250 and 252 via the intake manifold. The remainder of the exhaust system is similar to that described above in FIGS. 2A and 2B. Note that, as above, the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2F, a system similar to that in FIG. 2E is shown, however a dual fuel vapor purge system is shown with first and second purge valves 168A and 168B. Further, EGR gasses are taken from group 252, rather than 250. Again, the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2G, a system similar to that in FIG. 2A is shown, however an exhaust gas recirculation system and valve 178 is shown for introducing exhaust gasses that are from some cylinders in group 210 and some cylinders in group 212 into the intake manifold downstream of the throttle valve. Again, the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2H, a system similar to that in FIG. 2G is shown, however a dual fuel vapor purge system is shown with first and second purge valves 168A and 168B. Again, the engine can also operate in any of the 5 various modes described below with regard to FIG. 3A1, for example. Referring now to FIG. 2I, a V-6 engine is shown with first cylinder group 250 on a first bank, and second cylinder group 252 on a second bank. Further, a first exhaust path is shown coupled to group 250 including an upstream emission control device 220 and a downstream emission control device 226. Further, an exhaust manifold sensor 230, an intermediate sensor 232 between devices 220 and 226, and a downstream sensor 239 are shown for measuring various exhaust gas air-fuel ratio values. In one example, devices 220 and 226 are three way catalysts having one or more bricks enclosed therein. Similarly, a second exhaust path is shown coupled to group 252 including an upstream emission control device 222 and a downstream emission control device 228. Further, an exhaust manifold sensor 234, an intermediate sensor 236 between devices 222 and 228, and a downstream sensor 241 are shown for measuring various exhaust gas air-fuel ratio values. In one example, devices 222 and 228 are three way catalysts having one or more bricks enclosed therein. Continuing with FIG. 2I, both groups 250 and 252 have a variable valve actuator (270 and 272, respectively) coupled thereto to adjust operation of the cylinder intake and/or exhaust valves. In one example, these are variable cam timing actuators as described above in FIGS. 1A and 1B. However, alternative actuators can be used, such as variable valve lift, or switching cam systems. Further, individual actuators can be coupled to each cylinder, such as with electronic valve actuator systems. Note that FIG. 2I, as well as the rest of the figures in FIG. 2 are schematic representations. For example, the purge vapors from valve 168 can be delivered via intake ports with inducted air as in FIG. 2J, rather than via individual paths to each cylinder in the group as in FIG. 2I. And as before, the engine can also operate in various engine modes, such as in FIG. 3A1, or as in the various routines described below herein. Referring now to FIG. 2J, a system similar to that of FIG. 2I is shown with an alternative fuel vapor purge delivery to the intake manifold, which delivery fuel vapors from valve 168. Note that such a system can be adapted for various systems described in FIG. 2 above and below, as mentioned with regard to FIG. 2I, although one approach may provide advantages over the other depending on the operating modes of interest. Referring now to FIG. 2K, a V-8 engine is shown with a first group of cylinders 210 spanning both cylinder banks, and a second group of cylinders 212 spanning both cylinder banks. Further, an exhaust system configuration is shown which brings exhaust gasses from the group 212 together before entering an emission control device 260. Likewise, the gasses exhausted from device 260 are mixed with untreated exhaust gasses from group 210 before entering emission control device 262. This is accomplished, in this example, via a cross-over type exhaust manifold. Specifically, exhaust manifold 256 is shown coupled to the inner two cylinders of the top bank of group 212; exhaust manifold 257 is shown coupled to the outer two cylinders of the top bank of group 210; exhaust manifold 258 is shown coupled to the inner two cylinders of the bottom bank of group 210; and exhaust manifold 259 is shown coupled to the outer two cylinders of the bottom bank of group 212. Then, manifolds 257 and 258 are fed together and then fed to mix with gasses exhausted from device 250 (before entering device 262), and manifolds 256 and 259 are fed together and fed to device 260. Exhaust gas air-fuel sensor 271 is located upstream of device 260 (after manifolds 256 and 259 join). Exhaust gas air-fuel sensor 273 is located upstream of device 262 before the gasses from the group 210 join 212. Exhaust gas air-fuel sensor 274 is located upstream of device 262 after the gasses from the group 210 join 212. Exhaust gas air-fuel sensor 276 is located downstream of device 276. In one particular example, devices 260 and 262 are three way catalysts, and when the engine operates in a partial fuel cut operation, group 212 carries out combustion oscillating around stoichiometry (treated in device 260), while group 210 pumps are without injected fuel. In this case, device 262 is saturated with oxygen. Alternatively, when both cylinder groups are combusting, both devices 260 and 262 can operate to treat exhausted emissions with combustion about stoichiometry. In this way, partial cylinder cut operation can be performed in an odd fire V-8 engine with reduced noise and vibration. Note that there can also be additional emission control devices (not shown), coupled exclusively to group 210 upstream of device 262. Referring now to FIG. 2L, another V-8 engine is shown with a first group of cylinders 210 spanning both cylinder banks, and a second group of cylinders 212 spanning both cylinder banks. However, in this example, a first emission control device 280 is coupled to two cylinders in the top bank (from group 212) and a second emission control device 282 is coupled to two cylinders of the bottom bank (from group 212). Downstream of device 280, manifold 257 joins exhaust gasses from the remaining two cylinders in the top bank (from group 210). Likewise, downstream of device 282, manifold 258 joins exhaust gasses from the remaining two cylinders in the bottom bank (from group 210). Then, these two gas streams are combined before entering downstream device 284. In one particular example, devices 280, 282, and 284 are three way catalysts, and when the engine operates in a partial fuel cut operation, group 212 carries out combustion oscillating around stoichiometry (treated in devices 280 and 282), while group 210 pumps are without injected fuel. In this case, device 284 is saturated with oxygen. Alternatively, when both cylinder groups are combusting, devices 280, 282, and 284 can operate to treat exhausted emissions with combustion about stoichiometry. In this way, partial cylinder cut operation can be performed in an odd fire V-8 engine with reduced noise and vibration. Note that both FIGS. 2K and 2L shows a fuel vapor purge system and valve 168 for delivering fuel vapors to group 210. Referring now to FIG. 2M, two banks of a V8 engine are shown. The odd fire V8 engine is operated by, in each bank, running two cylinders about stoichiometry and two cylinders with air. The stoichiometric and air exhausts are then directed through a bifurcated exhaust pipe to a bifurcated metal substrate catalyst, described in more detail below with regard to FIGS. 14 and 15. The stoichiometric side of the catalyst reduces the emissions without the interference from the air side of the exhaust. The heat from the stoichiometric side of the exhaust keeps the whole catalyst above a light-off temperature during operating conditions. When the engine is then operated in 8-cylinder mode, the air side of the catalyst is in light-off condition and can reduce the emissions. A rich regeneration of the air side catalyst can also be performed when changing from 4 to 8 cylinder mode whereby the 2 cylinders that were running air would be momentarily operated rich to reduce the oxygen storage material in the catalyst prior to returning to stoichiometric operation, as discussed in more detail below. This regeneration can achieve 2 purposes: 1) the catalyst will function in 3-way operation when the cylinders are brought back to stoichiometric operation and 2) the regeneration of the oxygen storage material will result in the combustion of the excess CO/H2 in the rich exhaust and will raise the temperature of the catalyst if it has cooled during period when only air was pumped through the deactivated cylinders. Continuing with FIG. 2M, exhaust manifold 302 is shown coupled to the inner two cylinders of the top bank (from group 212). Exhaust manifold 304 is shown coupled to the outer two cylinders of the top bank (from group 210). Exhaust manifold 308 is shown coupled to the inner two cylinders of the bottom bank (from group 210). Exhaust manifold 306 is shown coupled to the outer two cylinders of the bottom bank (from group 212). Exhaust manifolds 302 and 304 are shown leading to an inlet pipe (305) of device 300. Likewise, exhaust manifolds 306 and 308 are shown leading to an inlet pipe (307) of device 302, which, as indicated above, are described in more detail below. The exhaust gasses from devices 300 and 302 are mixed individually and then combined before entering device 295. Further, a fuel vapor purge system and control valve 168 are shown delivering fuel vapors to group 212. Again, as discussed above, an I-4 engine could also be used, where the engine has a similar exhaust and inlet configuration to one bank of the V-8 engine configurations shown above and below in the various Figures. FIGS. 2N, 20, and 2P are similar to FIGS. 2K, 2L, and 2M, respectively, except for the addition of a first and second variable valve actuation units, in this particular example, variable cam timing actuators 270 and 272. Referring now to FIG. 2Q, an example V-6 engine is shown with emission control devices 222 and 224. In this example, there is no emission control device coupled exclusively to group 250. A third emission control device (not shown) can be added downstream. Also, FIG. 2Q shows an example V-6 engine, however, others can be used in this configuration, such as a V-10, V-12, etc. Referring now to FIG. 2R, an example system is shown where fuel vapors are passed to all of the cylinders, and in the case of cylinder fuel cut operation, fuel vapor purging operating is suspended. Referring now to FIGS. 2S and 2T, still another example system is shown for an engine with variable valve operation (such as variable cam timing from devices 270 and 272), along with a fuel vapor purging system having a single valve 168 in 2S, and dual purge valves 168A,B in 2T. There are various fuel vapor modes for FIGS. 2A-2T, some of which are listed below: operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group inducting gasses without injected fuel operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group inducting gasses without injected fuel operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group inducting gasses without injected fuel operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group stoichiometric without fuel vapors operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group stoichiometric without fuel vapors operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group stoichiometric without fuel vapors operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group lean without fuel vapors operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group lean without fuel vapors operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group lean without fuel vapors operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group rich without fuel vapors operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group rich without fuel vapors operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group rich without fuel vapors operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group rich with fuel vapors (and injected fuel) operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group rich with fuel vapors (and injected fuel) operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group rich with fuel vapors (and injected fuel) operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group lean with fuel vapors (and injected fuel) operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group lean with fuel vapors (and injected fuel) operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group lean with fuel vapors (and injected fuel) operate the first group of cylinders lean with fuel vapor purge (and injected fuel), and the other group stoichiometric with fuel vapors (and injected fuel) operate the first group of cylinders stoichiometric with fuel vapor purge (and injected fuel), and the other group stoichiometric with fuel vapors (and injected fuel) operate the first group of cylinders rich with fuel vapor purge (and injected fuel), and the other group stoichiometric with fuel vapors (and injected fuel) Each of these modes can include further variation, such as different VCT timing between cylinder banks, etc. Also note that operation at a cylinder cut condition provides a practically infinite air-fuel ratio, since substantially no fuel is being injected by the fuel injectors for that cylinder (although there may be some fuel present due to fuel around the intake valves and in the intake port that will eventually decay away). As such, the effective air-fuel ratio is substantially greater than about 100:1, for example. Although, depending on the engine configuration, it could vary between 60:1 to practically an infinite value. Regarding the various systems shown in FIGS. 2A-R, different system configurations can present their own challenges that are addressed herein. For example, V-8 engines, such as in FIG. 2A, for example, can have uneven firing order, so that if it is desired to disable a group of 4 cylinders, then two cylinders on each bank are disabled to provide acceptable vibration. However, this presents challenges since, as shown in FIG. 2A, some exhaust system configurations treat emissions from the entire bank together. Further, as shown in FIGS. 2S-2T, a single valve actuator can be used to adjust all of the valves of cylinders in a bank, even though some cylinders in the bank are disabled, while others are operating. Unlike such V-8 engines, some V-6 engines can be operated with a cylinder bank disabled, thus allowing an entire cylinder bank to be a group of cylinders that are operated without fuel injection. Each of these different types of systems therefore has its own potential issues and challenges, as well as advantages, as discussed and addressed by the routines described in more detail below. Note a bifurcated induction system (along firing order groups) can also be used for the fresh air. Such a system would be similar to the system of FIG. 2T, except that the valves 168A and 168B would be replaced by electronically controlled throttles. In this way, fuel vapor purge could be fed to these two bifurcated induction systems, along with airflow, so that separate control of fuel vapor purge and airflow could be achieved between groups 210 and 212. However, as discussed above with regard to FIGS. 2I and 2J, for example, the VCT actuators can be used to obtain differing airflows (or air charges) between the cylinders of groups 250 and 252, without requiring a split induction system. Several control strategies may be used to take advantage of the ability to provide differing air amounts to differing cylinder groups, as discussed in more detail below. As one example, separate control of airflow to different cylinder groups (e.g., via VCT actuators 270 and 272 in FIGS. 2I and 2J), can be used in split ignition operation to allow more (or less) air flow into a group of cylinders. Also, under some conditions there may be no one air amount that satisfies requirements of combustion stability, heat generation, and net power/torque. For example, the power producing cylinder group may have a minimum spark advance for stability, or the heat producing cylinder group may have a maximum heat flux due to material constraints. Bank-VCT and/or bifurcated intake could be used to achieve these requirements with different air amounts selected for different cylinder groups. Another control strategy example utilizing a bifurcating inlet (or using VCT in a V6 or V10) would allow lower pumping losses in cylinder cut-out mode by changing the air flow to that group, where VCT is not solely associated with a firing group. Further details of control routines are included below which can be used with various engine configurations, such as the those described in FIGS. 2A-2T. As will be appreciated by one of ordinary skill in the art, the specific routines described below in the flowcharts may represent one or more of any number of processing strategies such as event-driven, interrupt-driven, multi-tasking, multi-threading, and the like. As such, various steps or functions illustrated may be performed in the sequence illustrated, in parallel, or in some cases omitted. Likewise, the order of processing is not necessarily required to achieve the features and advantages of the example embodiments of the invention described herein, but is provided for ease of illustration and description. Although not explicitly illustrated, one of ordinary skill in the art will recognize that one or more of the illustrated steps or functions may be repeatedly performed depending on the particular strategy being used. Further, these figures graphically represent code to be programmed into the computer readable storage medium in controller 12. Referring now to FIG. 3A1, a graph is shown illustrating engine output versus engine speed. In this particular description, engine output is indicated by engine torque, but various other parameters could be used, such as, for example: wheel torque, engine power, engine load, or others. The graph shows the maximum available torque that can be produced in each of five operating modes. Note that a percentage of available torque, or other suitable parameters, could be used in place of maximum available torque. Further note that the horizontal line does not necessarily correspond to zero engine brake torque. The five operating modes in this embodiment include: Operating all cylinders with air pumping through and substantially no injected fuel (note: the throttle can be substantially open, or closed, during this mode), illustrated as line 3A1-8 in the example presented in FIG. 3A1; Operating some cylinders lean of stoichiometry and remaining cylinders with air pumping through and substantially no injected fuel (note: the throttle can be substantially open during this mode), illustrated as line 33ba in the example presented in FIG. 3A1; Operating some cylinders at stoichiometry, and the remaining cylinders pumping air with substantially no injected fuel (note: the throttle can be substantially open during this mode), shown as line 3A1-4 in the example presented in FIG. 3A1; Operating all cylinders lean of stoichiometry (note: the throttle can be substantially open during this mode, shown as line 3A1-2 in the example presented in FIG. 3A1; Operating all cylinders substantially at stoichiometry (or slightly rich of stoichiometry) for maximum available engine torque, shown as line 3A1-0 in the example presented in FIG. 3A1. Described above is one exemplary embodiment where an 8-cylinder engine is used and the cylinder groups are broken into two equal groups. However, various other configurations can be used, as discussed above and below. In particular, engines of various cylinder numbers can be used, and the cylinder groups can be broken down into unequal groups as well as further broken down to allow for additional operating modes. For the example presented in FIG. 3A1 in which a V-8 engine is used, lines 3A1-16 shows operation with 4 cylinders operating with air and substantially no fuel, line 3A1-14 shows operation with four cylinders operating at stoichiometry and four cylinders operating with air, line 3A1-12 shows 8 cylinders operating lean, line 3A1-10 shows 8 cylinders operating at stoichiometry, and line 3A1-18 shows all cylinders operating without injected fuel. The above described graph illustrates the range of available torques in each of the described modes. In particular, for any of the described modes, the available engine output torque can be any torque less than the maximum amount illustrated by the graph. Also note that in any mode where the overall mixture air-fuel ratio is lean of stoichiometry, the engine can periodically switch to operating all of the cylinders stoichiometric or rich. This is done to reduce the stored oxidants (e.g., NOx) in the emission control device(s). For example, this transition can be triggered based on the amount of stored NOx in the emission control device(s), or the amount of NOx exiting the emission control device(s), or the amount of NOx in the tailpipe per distance traveled (mile) of the vehicle. To illustrate operation among these various modes, several examples of operation are described. The following are simply exemplary descriptions of many that can be made, and are not the only modes of operation. As a first example, consider operation of the engine along trajectory A. In this case, the engine initially is operating with all cylinders in the fuel-cut mode. Then, in response to operating conditions, it is desired to change engine operation along trajectory A. In this case, it is desired to change engine operation to operating with four cylinders operating lean of stoichiometry, and four cylinders pumping air with substantially no injected fuel. In this case, additional fuel is added to the combusting cylinders to commence combustion, and correspondingly increase engine torque. Likewise, it is possible to follow the reverse trajectory in response to a decrease in engine output. As a second example, consider the trajectory labeled B. In this example, the engine is operating with all cylinders combusting at substantially stoichiometry. In response to a decrease in desired engine torque, 8 cylinders are operated in a fuel cut condition to provide a negative engine output torque. As a third example, consider the trajectory labeled C. In this example, the engine is operating with all cylinders combusting at a lean air-fuel mixture. In response to a decrease in desired engine torque, 8 cylinders are operated in a fuel cut condition to provide a negative engine output torque. Following this, it is desired to change engine operation to operating with four cylinders operating lean of stoichiometry, and four cylinders pumping air with substantially no injected fuel. Finally, the engine is again transitioned to operating with all cylinders combusting at a lean air-fuel mixture. As a fourth example, consider the trajectory labeled D. In this example, the engine is operating with all cylinders combusting at a lean air-fuel mixture. In response to a decrease in desired engine torque, 8 cylinders are operated in a fuel cut condition to provide a negative engine output torque. Likewise, it is possible to follow the reverse trajectory in response to an increase in engine output. Continuing with FIG. 3A1, and lines 3A1-10 to 3A1-18 in particular, an illustration of the engine output, or torque, operation for each of the exemplary modes is described. For example, at engine speed N1, line 3A1-10 shows the available engine output or torque output that is available when operating in the 8-cylinder stoichiometric mode. As another example, line 3A1-12 indicates the available engine output or torque output available when operating in the 8-cylinder lean mode at engine speed N2. When operating in the 4-cylinder stoichiometric and 4-cylinder air mode, line 3A1-14 shows the available engine output or torque output available when operating at engine speed N3. When operating in the 4-cylinder lean, 4-cylinder air mode, line 3A1-16 indicates the available engine or torque output when operating at engine speed N4. Finally, when operating in the 8-cylinder air mode, line 3A1-18 indicates the available engine or torque output when operating at engine speed N5. Referring now to FIG. 3A2, another graph is shown illustrating engine output versus engine speed. The alternative graph shows the maximum available torque that can be produced in each of 3 operating modes. As with regard to FIG. 3A1, note that the horizontal line does not necessarily correspond to zero engine brake torque. The three operating modes in this embodiment include: Operating all cylinders with air pumping through and substantially no injected fuel (note: the throttle can be substantially open, or closed, during this mode), illustrated as line 3A2-6 in the example presented in FIG. 3A2; Operating some cylinders at stoichiometry, and the remaining cylinders pumping air with substantially no injected fuel (note: the throttle can be substantially open during this mode), shown as line 3A2-4 in the example presented in FIG. 3A2; Operating all cylinders substantially at stoichiometry (or slightly rich of stoichiometry) for maximum available engine torque, shown as line 3A2-2 in the example presented in FIG. 3A2. Referring now to FIG. 3B, a routine for controlling the fuel vehicle purge is described. In general terms, the routine adjusts valve 168 to control the fuel vapor purging supplied to the cylinder group 210 to be combusted therein. As illustrated in FIG. 2A, the fuel vapor can be purged to cylinders in group 210 while these cylinders are carrying out stoichiometric, rich, or lean combustion. Furthermore, the cylinders in group 212 can be carrying out combustion at stoichiometric, rich, or lean, or operating with air and substantially no injector fuel. In this way, it is possible to purge fuel vapor while operating in the air-lean mode. Further, it is possible to purge fuel vapors while operating in a stoichiometric-air mode. Referring now specifically to FIG. 3B, in step 310, the routine determines whether fuel vapor purging is requested. This determination can be based on various parameters, such as whether the engine is in a warmed up state, whether the sensors and actuators are operating without degradation, and/or whether the cylinders in group 210 are operating under feedback air-fuel ratio control. When the answer to step 310 is yes, the routine continues to step 312 to activate valve 168. Then, in step 314, the routine estimates the fuel vapor purge amount in the fuel vapors passing through valve 168. Note that there are various ways to estimate fuel vapor purging based on the valve position, engine operating conditions, exhaust gas air-fuel ratio, fuel injection amount and various other parameters. One example approach is described below herein with regard to FIG. 4. Next, in step 316, the routine adjusts the opening of valve 168 based on the estimated purge amount to provide a desired purge amount. Again, there are various approaches that can be used to produce this control action such as, for example: feedback control, feed-forward control, or combinations thereof. Also, the desired purge amount can be based on various parameters, such as engine speed and load, and the state of the charcoal canister in the fuel vapor purging system. Further, the desired purge amount can be based on the amount of purge time completed. From step 316, the routine continues to step 318 to determine whether the estimated purge amount is less than a minimum purge value (min_prg). Another indication of whether fuel vapor purging is substantially completed is whether the purge valve 168 has been fully opened for a predetermined amount of operating duration. When the answer to step 318 is no, the routine continues to end. Alternatively, when the answer to step 318 is yes, the routine continues to step 320 to disable fuel vapor purging and close valve 168. Also, when the answer to step 310 is no, the routine also continues to step 322 to disable the fuel vapor purging. In this way, it is possible to control the fuel vapor purging to a subset of the engine cylinders thereby allowing different operating modes between the cylinder groups. Referring now to FIG. 3C, an example routine for controlling the system as shown in FIG. 2B is described. In general, the routine controls the fuel vapor purge valves 168a and 168b to selectively control fuel vapor purge in cylinder groups 210, or 212, or both. In this way, different sets of cylinders can be allowed to operate in different operating modes with fuel vapor purging, thereby providing for more equalized cylinder operation between the groups. Referring now specifically to FIG. 3C, in step 322, the routine determines whether fuel vapor purging is requested as described above with regard to step 310 of FIG. 3B. When the answer to step 322 is yes, the routine continues to step 324 to select the cylinder group, or groups, for purging along with selecting the purge valve or valves to actuate. The selection of cylinder groups to provide fuel vapor purging is a function of several engine and/or vehicle operating conditions. For example, based on the quantity of fuel vapor purge that needs to be processed through the cylinders, the routine can select either one cylinder group or both cylinder groups. In other words, when greater fuel vapor purging is required, both cylinder groups can be selected. Alternatively, when lower amounts of fuel vapor purging are required, the routine can select one of groups 210 and 212. When it is decided to select only one of the two cylinder groups due to, for example, low fuel vapor purging requirements, the routine selects from the two groups based on various conditions. For example, the decision of which group to select can be based on providing equal fuel vapor purging operation for the two groups. Alternatively, the cylinders operating at the more lean air-fuel ratio can be selected to perform the fuel vapor purging to provide improved combustion stability for the lean operation. Still other selection criteria could be utilized to select the number and which groups to provide fuel vapor purging. Another example is that the when only a single cylinder group is selected, the routine alternates between which group is selected to provide more even wear between the groups. For example, the selection could attempt to provide a consistent number of engine cycles between the groups. Alternatively, the selection could attempt to provide a consistent amount of operating time between the groups. When the first group is selected, the routine continues to step 326 to actuate valve 168a. Alternatively, when the second group is selected, the routine continues to step to actuate valve 168b in step 328. Finally, when both the first and second groups are selected, the routine continues to step 330 to actuate both valves 168a and 168b. From either of steps 326, 328, or 330, the routine continues to step 332 to estimate the fuel vapor purging amount. As described above, there are various approaches to estimate fuel vapor purge amount, such as described below herein with regard to FIG. 4. Next, in step 334, the routine continues to adjust the selected purge valve (or valves) based on the estimated purge amount to provide the desired purge amount. As described above, there are various approaches to providing feedback and/or feedforward control to provide the desired purge amount. Further, the desired purge amount can be selected based on various operating conditions, such as, for example: engine speed and engine load. Continuing with FIG. 3C, in step 336, the routine determines whether the estimated purge amount is less than the minimum purge amount (min_prg). As discussed above herein with regard to step 318 of FIG. 3B. As discussed above, when the answer to step 336 is yes, the routine ends. Alternatively, when the answer to step 336 is no, the routine also continues to step 338 to disable fuel vapor purging. When the answer to step 336 is no, the routine continues to the end. In this way, it is possible to provide both cylinder groups with the ability to operate in the air/lean, or air/stoichiometric mode and combust fuel vapors, or the other group operates with air and substantially no injected fuel. Note also that the routines of FIGS. 3A and 3B could be modified to operate with the configurations of FIGS. 2C-2T. Referring now to FIG. 4, a routine for estimating fuel vapor purge amounts is described. Note that this example shows calculations for use on a V8 type engine with four cylinders per bank and with two cylinders purging and two cylinders without purge on a bank as illustrated in FIG. 2A, for example. However, the general approach can be expanded to other system configurations as is illustrated in detail below. The following equations describe this example configuration. The measured air-fuel ratio in the exhaust manifold (λmeas) can be represented as: λmeas=(0.5dmaprg/dt+0.5dmair/dt)/(0.5dmfprg/dt+dmfinj1/dt+dmfinj2/dt+dt+dmfinj3/dt+dmfinj4/dt) where: dmaprg/dt=is the mass air flow rate in the total fuel vapor purge flow; dmair/dt=is the mass air flow rate measured by the mass air flow sensor flowing through the throttle body; dmfprg/dt=is the fuel flow rate in the total fuel vapor purge flow; dmfinj1/dt=is the fuel injection in the first cylinder of the bank coupled to the air-fuel sensor measuring λmeas; dmfinj2/dt=is the fuel injection in the second cylinder of the bank coupled to the air-fuel sensor measuring λmeas; dmfinj3/dt=is the fuel injection in the third cylinder of the bank coupled to the air-fuel sensor measuring λmeas; dmfinj4/dt=is the fuel injection in the fourth cylinder of the bank coupled to the air-fuel sensor measuring λmeas; When operating in with two cylinders inducting air with substantially no injected fuel, and fuel vapors delivered only to two cylinders carrying out combustion in that bank, this reduces to: λmeas=(0.5dmarpg/dt+0.5dmair/dt)/(0.5dmfprg/dt+dmfinj2/dt+dmfinj3/dt) Then, using an estimate of dmaprg/dt based on manifold pressure and purge valve position, the commanded values for dmfinj2/dt and dmfinj3/dt, the measured air-fuel ratio from the sensor for λmeas, and the measure airflow from the mass air flow sensor for dmair/dt, an estimate of dmfprg/dt can be obtained. As such, the concentration of fuel vapors in the purge flow can then be found as the ratio of dmfprg/dt to dmaprg/dt. Also, as discussed in more detail below, the fuel injection is adjusted to vary dmfinj2/dt and dmfinj3/dt to provide a desired air-fuel ratio of the exhaust gas mixture as measured by λmeas. Finally, in the case where cylinders 1 and 4 are combusting injected fuel, the commanded injection amounts can be used to determine the amount of fuel injected so that the first equation can be used to estimate fuel vapors. In this way, it is possible to estimate the fuel vapor purge content from a sensor seeing combustion from cylinders with and without fuel vapor purging. Referring now specifically to FIG. 4, first in step 410, the routine calculates a fresh air amount to the cylinders coupled to the measurement sensor from the mass air flow sensor and fuel vapor purging valve opening degree. Next, in step 412, the routine calculates the fuel flow from the fuel injectors. Then, in step 414, the routine calculates concentration of fuel vapors from the air and fuel flows. Note that if there are two fuel vapor purge valves, each providing vapors to separate cylinder banks and sensor sets, then the above calculations can be repeated and the two averaged to provide an average amount of vapor concentration from the fuel vapor purging system. Referring now to FIG. 5, a routine is described for controlling a mixture air-fuel ratio in an engine exhaust during fuel vapor purging. Specifically, the example routine of FIG. 5 can be used when a sensor measures exhaust gases that are mixed from cylinders with and without fuel vapor purging. First, in step 510, the routine determines a desired air-fuel ratio (λdes) for the cylinders. Then, in step 512, the routine calculates an open loop fuel injection amount based on the estimated purge flow and estimated purge concentration to provide an air-fuel mixture in the cylinders with fuel vapor purging at the desired value. Then, in step 514, the routine adjusts fuel injection to the cylinders receiving fuel vapor purging to provide the desired mixture air-fuel ratio that is measured by the exhaust air-fuel ratio sensor. In this way, the adjustment of the fuel injection based on the sensor feedback can not only be used to maintain the mixture air-fuel ratio at a desired value, but also as an estimate of fuel vapor purging in the cylinders receiving fuel vapors. Further, the cylinders without fuel vapors can be operated either with air and substantially no injected fuel, or at a desired air-fuel ratio independent of the fuel vapors provided to the other cylinders. As described above herein, there are various operating modes that the cylinders of engine 10 can experience. In one example, the engine can be operated with some cylinders combusting stoichiometric or lean gases, with others operating to pump air and substantially no injected fuel. Another operating mode is for all cylinders to be combusting stoichiometric or lean gases. As such, the engine can transition between these operating modes based on the current and other engine operating conditions. As described below, under some conditions when transitioning from less than all the cylinders combusting to all the cylinders combusting, various procedures can be used to provide a smooth transition with improved engine operation and using as little fuel as possible. As illustrated in the graphs of FIGS. 6A-D, one specific approach to transition from four cylinder operation to eight cylinder operation is illustrated. Note that the particular example of four cylinder to eight cylinder operation could be adjusted based on the number of cylinders in the engine such as, for example: from three cylinders to six cylinders, from five cylinders to ten cylinders, etc. Specifically, FIG. 6A shows total engine air flow, FIG. 6B shows the fuel charge per cylinder, FIG. 6C shows ignition (spark) angle, and FIG. 6D shows the air-fuel ratio of combusting cylinders. As shown in FIGS. 6A-D, before time T1, four cylinders are initially combusting a lean air-fuel ratio and providing a desired engine output torque. Then, as engine airflow is decreased, the air-fuel ratio approaches the stoichiometric value and the engine is operating with four cylinders combusting a stoichiometric air-fuel ratio and pumping air with substantially no injected fuel. Then, at time T1, the engine transitions to eight cylinders combusting. At this time, the desire is to operate all engine cylinders as lean as possible to minimize the torque increase by doubling the number of combusting cylinders. However, since the engine typically has a lean combustion air-fuel ratio limit (as indicated by the dashed dot line in FIG. 6D), it is not possible to compensate all the increased torque by combusting a lean air-fuel ratio in all the cylinders. As such, not only is the fuel charge per cylinder decreased, but the ignition angle is also decreased until the airflow can be reduced to the point at which all the cylinders can be operated at the lean limit. In other words, from time T1 to T2, engine torque is maintained by decreasing engine airflow and retarding ignition timing until the engine can be operated with all the cylinders at the air-fuel ratio limit to provide the same engine output as was provided before the transition from four cylinders to eight cylinders. In this way, it is possible to provide a smooth transition, while improving fuel economy by using lean combustion in the enabled cylinders, as well as the previously stoichiometric combusting cylinders and thus reducing the amount of ignition timing retard after the transition that is required. This improved operation can be compared to the case where the transition is from four cylinders to eight cylinders, with the eight cylinders combusting at stoichiometry. In this case, which is illustrated by the dashed lines in FIGS. 6A-6D, a greater amount of ignition timing retard for a longer duration, is required to maintain engine torque substantially constant during the transition. As such, since this requires more ignition timing retard, over a longer duration, more fuel is wasted to produce engine output than with the approach of the solid lines in FIGS. 6A-6D, one example of which is described in the routine of FIG. 7. Referring now to FIG. 7, a routine is described for controlling a transition from less than all the cylinders combusting to all the cylinders combusting, such as the example from four cylinders to eight cylinders illustrated in FIGS. 6A-D. First, in step 710, the routine determines whether a transition has been requested to enable the cylinders operating to pump air and substantially no injected fuel. When the answer to step 710 is yes, the routine continues to step 712 to determine whether the system is currently operating in the air-lean mode. When the answer to step 712 is yes, the routine transitions the engine to the air-stoichiometric mode by decreasing engine airflow. Next, from step 714, or when the answer to step 712 is no, the routine continues to step 716. In step 716, the routine calculates a lean air-fuel ratio with all cylinders operating (λf) at the present airflow to provide the current engine torque. In the example of transitioning from four cylinders to eight cylinders, this air-fuel ratio is approximately 0.5 if the current operating conditions are in the air-stoichiometric mode. In other words, all the cylinders would require half the fuel to produce the same torque as half the cylinders at the current amount of fuel. Next, in step 718, the routine calculates the lean limit air-fuel ratio (λLL) for the conditions after the transition. In other words, the routine determines the combustion stability lean limit which is available after the transition for the operating conditions present. Then, in step 720, the routine determines whether the calculated lean air-fuel ratio to maintain engine torque (λf) is greater than the lean limit air-fuel ratio. If the answer to step 720 is no, the transition is enabled without ignition timing retard. In this case, the routine transitions the cylinders to the new air-fuel ration calculated in step 716 to maintain engine torque. However, the more common condition is that the required air-fuel ratio to maintain engine torque is greater than the lean limit for the operating conditions. In this case, the routine continues to step 722 to transition the air-fuel ratio at the lean air-fuel limit and compensate the torque difference via the ignition timing retard. Further, the airflow is reduced until the engine can operate at the lean air-fuel ratio limit (or within a margin of the limit) without ignition timing retard. In this way, the transition to enabling cylinders with lean combustion can be utilized to improve fuel economy and maintain engine torque during the transition. Thus, not only is the torque balanced over the long term, but also over the short term using air-fuel enleanment in addition to ignition timing retard, if necessary. Further, this transition method achieves the a synergistic effect of rapid catalyst heating since the ignition timing retard and enleanment help increase heat to the exhaust system to rapidly heat any emission control devices coupled to deactivated cylinders. Note that various modifications can be made to this transition routine. For example, if transitioning to enable purging of NOx stored in the exhaust system, rich operation can follow the enleanment once airflow has been reduced. Referring now to FIG. 8, a routine is described for controlling engine cylinder valve operation (intake and/or exhaust valve timing and/or lift, including variable cam timing, for example) depending on engine conditions and engine operating modes. In general terms, the routine of FIG. 8 allows engine cylinder valve operation for different groups of cylinders during engine starting to help compensate for variations in ignition timing between the groups. First, in step 810, the routine determines whether the present conditions represent an engine starting condition. This can be determined by monitoring if the engine is being turned by a starting motor. Note however, that engine starting can include not only the initial cranking by the starter, but also part of the initial warm up phase from a cold engine condition. This can be based on various parameters, such as engine speed, time since engine start, or others. Thus, when the answer to step 810 is yes, the routine then determines whether the engine is already in a warmed up condition in step 812. This can be based on, for example, engine coolant temperature. When the answer to step 812 is no, the routine sets the flag (flag_LS) to one. Otherwise, the flag is set to zero at 816. Next, the routine continues to step 818 where a determination is made as to whether split ignition operation is requested. One example of split ignition operation includes the following method for rapid heating of the emission control device when an emission control device(s) is below a desired operating temperature. Specifically, in this approach, the ignition timing between two cylinders (or two or more cylinder groups) is set differently. In one example, the ignition timing for the first group (spk_grp—1) is set equal to a maximum torque, or best, timing (MBT_spk), or to an amount of ignition retard that still provides good combustion for powering and controlling the engine. Further, the ignition timing for the second group (spk_grp—2) is set equal to a significantly retarded value, for example −29°. Note that various other values can be used in place of the 29° value depending on engine configuration, engine operating conditions, and various other factors. Also, the power heat flag (ph_enable) is set to zero. The amount of ignition timing retard for the second group (spk_grp—2) used can vary based on engine operating parameters, such as air-fuel ratio, engine load, and engine coolant temperature, or catalyst temperature (i.e., as catalyst temperature rises, less retard in the first and/or second groups, may be desired). Further, the stability limit value can also be a function of these parameters. Also note, as described above, that the first cylinder group ignition timing does not necessarily have to be set to maximum torque ignition timing. Rather, it can be set to a less retarded value than the second cylinder group, if such conditions provide acceptable engine torque control and acceptable vibration. That is, it can be set to the combustion stability spark limit (e.g., −10 degrees). In this way, the cylinders on the first group operate at a higher load than they otherwise would if all of the cylinders were producing equal engine output. In other words, to maintain a certain engine output (for example, engine speed, engine torque, etc.) with some cylinders producing more engine output than others, the cylinders operating at the higher engine output produce more engine output than they otherwise would if all cylinders were producing substantially equal engine output. An advantage to the above aspect is that more heat can be created by operating some of the cylinders at a higher engine load with significantly more ignition timing retard than if operating all of the cylinders at substantially the same ignition timing retard. Further, by selecting the cylinder groups that operate at the higher load, and the lower load, it is possible to minimize engine vibration. Thus, the above routine starts the engine by firing cylinders from both cylinder groups. Then, the ignition timing of the cylinder groups is adjusted differently to provide rapid heating, while at the same time providing good combustion and control. Also note that the above operation provides heat to both the first and second cylinder groups since the cylinder group operating at a higher load has more heat flux to the catalyst, while the cylinder group operating with more retard operates at a high temperature. Note that in such operation, the cylinders have a substantially stoichiometric mixture of air and fuel. However, a slightly lean mixture for all cylinders, or part of the cylinders, can be used. Also note that all of the cylinders in the first cylinder group do not necessarily operate at exactly the same ignition timing. Rather, there can be small variations (for example, several degrees) to account for cylinder to cylinder variability. This is also true for all of the cylinders in the second cylinder group. Further, in general, there can be more than two cylinder groups, and the cylinder groups can have only one cylinder. Further note that, as described above, during operation according to one example embodiment, the engine cylinder air-fuel ratios can be set at different levels. In one particular example, all the cylinders can be operated substantially at stoichiometry. In another example, all the cylinders can be operated slightly lean of stoichiometry. In still another example, the cylinders with more ignition timing retard are operated slightly lean of stoichiometry, and the cylinders with less ignition timing retard are operated slightly rich of stoichiometry. Further, in this example, the overall mixture of air-fuel ratio is set to be slightly lean of stoichiometry. In other words, the lean cylinders with the greater ignition timing retard are set lean enough such that there is more excess oxygen than excess rich gasses of the rich cylinder groups operating with less ignition timing retard. Continuing with FIG. 8, when the answer to step 818 is yes, the routine enables the split ignition operations in step 820 by setting the flag (PH_ENABLE_Flg) to one. Then, in step 822, the desired valve operation (in this case valve timing) for the first and second group of cylinders is calculated separately and respectively based on the conditions of the cylinder groups, including the air flow, air/fuel ratio, engine speed, engine torque (requested and actual), and ignition timing. In this way, an appropriate amount of air charge and residual charge can be provided to the different cylinder groups to better optimize the conditions for the respective ignition timing values used in the cylinders. The desired variable cam timings for the cylinder groups can also be based on various other parameters, such as catalyst temperature(s) and/or whether flag_CS is set to zero or one. When operating in the split ignition operation, at least during some conditions, this results in different VCT settings between different cylinder groups to provide improved engine operation and catalyst heating. In this way, the air flow to the cylinder with more advanced ignition timing can be used to control engine output torque, as well as the torque imbalance between the cylinder groups. Further, the airflow to the cylinder with more retarded ignition timing can be used to control the combustion stability, or heat flux produced. Also, if the engine is not equipped with VCT, but rather variable valve lift, or electrically actuated valves, then different airflow can be provided to different cylinders via valve lift, or variation of timing and/or lift of the electrically actuated valves. Furthermore, if the engine is equipped with multiple throttle valves (e.g., one per bank), then airflow to each group can be adjusted via the throttle valve, rather than via variations in VCT. Continuing with FIG. 8, when the answer to step 818 is no, the routine continues to step 824 where a determination is made as to whether fuel injector cut-out operation of a cylinder, or cylinder groups, is enabled. When the answer to step 824 is yes, the routine continues to step 826 to calculate the desired cam timing (s) for operating cylinder group(s) taking into account the cylinder cut-out operation. In other words, different valve timings can be selected, at least during some conditions, based on whether cylinder cut-out operation is engaged. Thus, the VCT timing for the respective cylinder groups is based on the air-fuel ratio of combustion in the group combusting air and injected fuel, while the VCT timing for the group without fuel injection is selected to, in one example, minimize engine pumping losses. Alternatively, when transitioning into, or out of, the partial or total cylinder cut-out operation, the VCT timing for the respective cylinder groups is adjusted based on this transition. For example, when enabling combustion of cylinder previous in cylinder cut-out operation, the VCT timing is adjusted to enable efficient and low emission re-starting of combustion, which can be a different optimal timing for the cylinders which were already carrying out combustion of air and injected fuel. This is described in more detail below with regard to FIG. 12, for example. Alternatively, when the answer to step 824 is no, the valve timing for the cylinder groups is selected based on engine speed and load, for example. In this way, it is possible to select appropriate valve timing to improve cylinder cut-out operation. When firing groups coincide with VCT (or bifurcated intake groups), it is possible to optimize the amount of catalyst heating (or efficient engine operation) depending on the vehicle tolerance to different types of excitation (NVH) given the operating conditions. Specifically, in one example, NVH performance can be improved by reducing the airflow to cylinders with significantly retarded ignition timing to reduce any effect of combustion instability that may occur. Likewise, in another example, engine torque output can be increased, without exacerbating combustion instability, by increasing airflow to the cylinder(s) with more advanced ignition timing. This can be especially useful during idle speed control performed via an idle bypass valve, or via the electronic throttle, where even though total airflow is being increased, that increased airflow can be appropriately allocated to one cylinder group or another depending on the ignition timing split used. Note that an alternative starting routine is described in FIG. 34. Referring now to FIG. 9, a routine is described for identifying pedal tip-out conditions, and using such information to enable or disable fuel injection to cylinders, or cylinder groups, of the engine. First, in step 910, the routine identifies whether a tip-out condition has been detected. Note that there are various approaches to detecting a tip-out condition, such as, for example: detecting if whether the pedal has been released by the vehicle driver's foot, whether a requested engine output has decreased below a threshold value (for example, below zero value engine brake torque), whether a requested wheel torque has decreased below a threshold level, or various others. When the answer to step 910 is yes and a tip-out condition has been detected, the routine continues to step 912. In step 912, the routine determines whether the requested engine output is less than threshold T1. In one example, this threshold is the minimum negative engine output that can be achieved with all the cylinders combusting. This limit can be set due to various engine combustion phenomena, such as engine misfires, or significantly increased emissions. Also note that various types of requested engine output can be used, such as, for example: engine torque, engine brake torque, wheel torque, transmission output torque, or various others. When the answer to step 912 is yes, the routine continues to step 914. In step 914, the routine enables a fuel cut operation, which is discussed in more detail below with regard to FIG. 10. Alternatively, when the answer to either step 910 or 912 is no, the routine continues to step 916 in which combustion in all the cylinders of the engine is continued. Note that the fuel cut operation enabled in step 914 can be various types of cylinder fuel cut operation. For example, only a portion of the engine's cylinders can be operated in the fuel cut operation, or a group of cylinders can be operated in the fuel cut operation, or all of the engine cylinders can be operated in the fuel cut operation. Furthermore, the threshold T1 discussed above with regard to step 912 can be a variable value that is adjusted based on the current engine conditions, including engine load and temperature. Referring now to FIG. 10, an example routine is described for controlling fuel cut operation, which can be used with a variety of system configurations, such as, for example, FIGS. 2A-2H. First, in step 1010, the routine determines whether fuel cut operation has been enabled as discussed above with regard to step 914 of FIG. 9. When the answer to step 1010 is yes, the routine continues to step 1012. In step 1012, the routine determines the number of cylinder groups to disable based on the requested engine output and current engine and vehicle operating conditions. These operating conditions include the catalyst operating conditions, temperature (engine temperature and/or catalyst temperature) and engine speed. Next, in step 1014, the routine determines the number of cylinders in the groups to be disabled based on the requested engine output and engine and vehicle operating conditions. In other words, the routine first determines the number of cylinder groups to be disabled, and then determines within those groups, the number of cylinders of the groups to be disabled. These determinations are also selected depending on the engine and exhaust catalyst configuration. For example, in cases using a downstream lean NOx trap, in addition to disabling cylinders, the remaining active cylinders can be operated at a lean air-fuel ratio. Continuing with FIG. 10, in step 1016, the routine determines whether the requested engine output is greater than a threshold T2, such as when a vehicle driver tips-in to the vehicle pedal. When the answer to step 1016 is no, the routine continues to step 1018 to determine whether temperature of the emission control devices coupled to disabled cylinders is less than a minimum temperature (min_temp). As such, the routine monitors the requested engine output and the temperature of the emission control devices to determine whether to re-enable cylinder combustion in the activated cylinders. Thus, when the answer to either step 1016 or 1018 is yes, the routine continues to step 1020 to disable fuel cut operation and enable combustion. This enabling can enable all the cylinders to return to combustion or only a part of the activated cylinders to return to combustion. Whether all or only a portion of the cylinders are reactivated depends on various engine operating conditions and on the exhaust catalyst configuration. For example, when three-way catalysts are used without a lean NOx trap, all of the cylinders may be enabled to carry out combustion. Alternatively, when a downstream lean NOx trap is used, all or only a portion of the cylinders may be re-enabled at a lean air-fuel ratio, or some of the cylinders can be re-enabled to carry out stoichiometric combustion. Note that before the fuel cut operation is enabled, the engine can be operating with all the cylinders carrying out lean, stoichiometric, or rich engine operation. Referring now to FIG. 11, a routine is described for performing idle speed control of the engine, taking into account fuel vapor purging. First, in step 1110, the routine determines whether idle speed control conditions are present. Idle speed conditions can be detected by monitoring whether the pedal position is lower than a preselected threshold (indicating the driver's foot is off the pedal) and the engine speed is below a threshold speed (for example 1000 RPM). When the answer to step 1110 is yes, the routine continues to step 1112. In step 1112, the routine determines whether lean combustion is enabled based on the current engine operating conditions, such as exhaust temperature, engine coolant temperature, and other conditions, such as whether the vehicle is equipped with a NOx trap. When the answer to step 1112 is no, the routine continues to step 1114. In step 1114, the routine maintains the desired idle speed via the adjustment of air flow to the engine. In this way, the air flow is adjusted so that the actual speed of the engine approaches the desired idle speed. Note that the desired idle speed can vary depending on operating conditions such as engine temperature. Next, in step 1116, the routine determines whether fuel vapors are present in the engine system. In one example, the routine determines whether the purge valve is actuated. When the answer to step 1116 is yes, the routine continues to step 1118. In step 1118, the routine adjusts the fuel injection amount (to the cylinders receiving fuel vapors) to maintain the desired air-fuel ratio, as well as compensate for the fuel vapors, while fuel injected to cylinders combusting without fuel vapors (if any) can be set to only a feed-forward estimate, or further adjusted based on feedback from the exhaust gas oxygen sensor. Thus, both cylinders with and without fuel vapor are operated at a desired air-fuel ratio by injecting less fuel to the cylinders with fuel vapors. In one example, the desired combustion air-fuel ratio oscillates, about the stoichiometric air-fuel ratio, with feedback from exhaust gas oxygen sensors from the engine's exhaust. In this way, the fuel injection amount in the cylinders with fuel vapors is compensated, while the fuel injection amount to cylinders operating without fuel vapors is not affected by this adjustment, and all of the cylinders combusting are operated about stoichiometry. Next, in step 1120, the routine determines whether the fuel injection pulse width (to the cylinders with fuel vapors) is less than a minimum value (min_pw). When the answer to step 1120 is yes, the routine continues to step 1122 to disable fuel vapor purging and close the purge valve (s). In this way, the routine prevents the fuel injection pulse width from becoming lower than a minimum allowed pulse width to operate the injectors. When the answer to either step 1116, or 1120 is no, the routine continues to the end. When the answer to step 1112 is yes, the routine continues to step 1124. Then, in step 1124, the routine maintains the desired idle speed via adjustment of fuel injection. In this way, the fuel injection amount is adjusted, so that the actual speed of the engine approaches the desired idle speed. Note that this lean combustion conditions includes conditions where some cylinders operate with a lean air-fuel ratio, and other cylinders operate without injected fuel. Next, in step 1126, the routine determines whether fuel vapors are present in the engine (similar to that in step 1116). When the answer is yes, the routine continues to step 1128 where air flow is adjusted to maintain the air-fuel ratio in the combusting cylinders and compensate for the fuel vapors. Note that there are various ways to adjust the air flow to the cylinders carrying out combustion, such as by adjusting the throttle position of the electronically controlled throttle plate. Alternatively, air flow can be adjusted by changing valve timing and/or lift, such as by adjusting a variable cam timing actuator. Next, in step 1130, a routine determines whether the cylinder air-fuel ratio (of cylinders carrying out combustion) is less than a minimum value (afr_min). In one example, this is a minimum lean air-fuel ratio, such as 18:1. In addition, the routine monitors whether air flow is at the maximum available air flow for the current engine operating conditions. If not, the engine first attempts to increase air flow by further opening the throttle, or adjusting valve timing and/or lift. However, when air flow is already at a maximum available amount, the routine continues to step 1132 to disable lean combustion. The routine may still allow continued cylinder fuel cut-out operation since this operation provides for maximum fuel vapor purging in a stoichiometric condition as will be discussed below. When the answer to either step 1110, 1126, or 1130, is no, the routine continues to the end. In this way, it is possible to operate with fuel vapor purging and improve operation of both lean and stoichiometric combustion. Specifically, by using fuel injection to maintain idle speed during lean conditions, and air flow to maintain idle speed during non-lean conditions, it is possible to provide accurate engine idle speed control during both conditions. Also, by disabling lean operation, yet continuing to allow cylinder fuel cut-out operation, when the fuel vapors are too great to allow lean combustion, it is possible to improve the quantity of fuel vapor purge that can be processed. In other words, during cylinder fuel cut-out operation, all the fuel vapors are fed to a portion of the cylinders, for example as shown in FIG. 2C. However, since less than all the cylinders are carrying out the combustion to generate engine output, these cylinders operate at a higher load, and therefore a higher total requirement of fuel to be burned. As such, the engine is less likely to experience conditions where the fuel injectors are less than the minimum pulse width than compared if all the cylinders were carrying out combustion with fuel vapors. In this way, improved fuel vapor purging capacity can be achieved. Referring now to FIGS. 12A and 12B, routines are described for controlling cylinder valve adjustment depending, in part, on whether some or all of the cylinders are operating an a fuel-cut state. In general, the routine adjusts the cylinder valve timing, and/or valve lift, based on this information to provide improved operation. Also, the routine of FIG. 12A is an example routine that can be used for system configurations such as those shown in FIGS. 2N, 20, 2P, 2S and/or 2T. The routine of FIG. 12B is an example routine that can be used for system configurations such as those shown in FIGS. 2I and 2J. First, in step 1210, the routine determines whether the engine is operating in a full or partial fuel injector cut-out operation. When the answer to step 1210 is yes, the routine continues to step 1212. In step 1212, the routine determines a desired cylinder valve actuation amount for a first and second actuator. In this particular example, where a first and second variable cam timing actuator are used to adjust cam timing of cylinder intake and/or exhaust valves, the routine calculates a desired cam timing for the first and second actuator (VCT_DES1 and VCT_DES2). These desired cam timing values are determined based on the cylinder cut-out condition, as well as engine operating conditions such as the respective air-fuel ratios and ignition timing values between different cylinder groups, throttle position, engine temperature, and/or requested engine torque. In one embodiment, the operating conditions depend on operating mode. Specifically, in addition to engine speed versus torque, the following conditions are considered in an idle speed mode: engine speed, closed pedal, crank start, engine temperature, and air charge temperature. In addition to engine speed versus torque, the following conditions are considered in a part throttle or wide open throttle condition: rpm, desired brake torque, and desired percent torque. In one example, where the routine is applied to a system such as in FIG. 2S or 2T, the routine can further set a cam timing per bank of the engine, where the cylinder groups have some cylinders from each bank in the group. Thus, a common cam timing is used for both cylinders with and without combustion from injected fuel. As such, the desired cam timing must not only provide good combustion in the cylinders carrying out combustion, but also maintain a desired manifold pressure by adjusting airflow though the engine, along with the throttle. Note that in many conditions, this results in a different cam timing for the combusting cylinders than would be obtained if all of the cylinders were carrying out combustion in the cylinder group. Alternatively, when the answer to step 1210 is no, the routine continues to step 1214 to calculate the desired valve actuator settings (VCT_DES1 and VCT_DES2) based on engine conditions, such as engine speed, requested engine torque, engine temperature, air-fuel ratio, and/or ignition timing. From either of steps 1212 or 1214, the routine continues to step 1216 where a determination is made as to whether the engine is transitioning into, or out of, full or partial fuel injector cut-out operation. When the answer to step 1216 is no, the routine continues to step 1218 where no adjustments are made to the determined desired cylinder valve values. Otherwise, when the answer to step 1216 is yes, the routine continues to step 1220 where the routine determines whether the transition is to re-enable fuel injection, or cut fuel injection operation. When it is determined that a cylinder, or group of cylinders, is to be re-enabled, the routine continues to step 1222. Otherwise, the routine continues to the end. In step 1222, the routine adjusts the desired cam timing values (VCT_DES1 and/or VCT_DES2) of cylinder valves coupled to cylinders being re-enabled to a re-starting position (determine based on engine coolant temperature, airflow, requested torque, and/or duration of fuel-cut operation). In this way, it is possible to have improved re-starting of the cylinders that were in fuel-cut operation. In the case where both cylinders are operated in a fuel cut operation, all of the cylinders can be restarted at a selected cam timing that provides for improved starting operation. Note that due to different system configurations, this may also adjust cam timing of cylinders already carrying out combustion. As such, additional compensation via throttle position or ignition timing can be used to compensate for increases or decreases engine output due to the adjustment of cam timing before the transition. The details of the transition are discussed in more detail above and below, such as regarding FIG. 6, for example. Referring now to FIG. 12B, an alternative embodiment for controlling cylinder valve actuation based on fuel-cut operation is described. First, in step 1230, the routine determines whether the engine is operating in a full or partial fuel injector cut-out operation. When the answer to step 1230 is yes, the routine continues to step 1232. In step 1232, the routine determines a desired cylinder valve actuation amount for an actuator coupled to a group of cylinders in which fuel injection is disabled. In one example, this is a desired cam timing value. Further, the routine also calculates an adjustment to throttle position, along with the cam timing, to adjust the engine output to provide a requested engine output. In one example, the requested engine output is a negative (braking) engine torque value. Further, in step 1232, the routine adjusts the cam timing for the combusting cylinders (if any) based on conditions in those combusting cylinders. Alternatively, the routine can set the desired cylinder valve actuation amount for deactivated cylinders to provide a desired engine pumping loss amount, since adjusting the cam timing of the cylinders will vary the intake manifold pressure (and airflow), thus affecting engine pumping losses. Note that in some cases, this results in a different cam timing being applied to the group of cylinders combusting than the group of cylinders in fuel-cut operation. Alternatively, when the answer to step 1230 is no, the routine continues to step 1234 to calculate the desired valve actuator settings (VCT_DES1 and VCT_DES2) based on engine conditions, such as engine speed, requested engine torque, engine temperature, air-fuel ratio, and/or ignition timing as shown in step 1214. From either of steps 1232 or 1234, the routine continues to step 1236 where a determination is made as to whether the engine is transitioning into, or out of, full or partial fuel injector cut-out operation. When the answer to step 1236 is no, the routine continues to step 1238 where no adjustments are made to the determined desired cylinder valve values. Otherwise, when the answer to step 1236 is yes, the routine continues to step 1240 where the routine determines whether the transition is to re-enable fuel injection, or cut fuel injection operation. When it is determined that a cylinder, or group of cylinders, is to be re-enabled, the routine continues to step 1242. Otherwise, the routine continues to the end. In step 1242, the routine adjusts the cam timing actuators coupled to disabled cylinders to a re-starting position. Note that the cylinders can re-start at a lean air-fuel ratio, a rich air-fuel ratio, or at stoichiometry (or to oscillate about stoichiometry). In this way, by moving the cam timing that provides for improved starting, while optionally leaving the cam timing of cylinders already combusting at its current condition, it is possible provide improved starting operation. Referring now to FIGS. 13A and 13B, routines and corresponding example results are described for controlling partial and full cylinder cut operation to reestablish the oxygen storage amount in the downstream three-way catalyst, as well as to reestablish the fuel puddle in the intake manifold to improve transient fuel control. Note that the routines FIGS. 13A and 13C can be carried out with various system configurations as represented in FIG. 2. For example, the routine of FIG. 13A can be utilized with the system of FIG. 2Q, for example. Likewise, the routine of FIG. 13C can be utilized with the system of FIG. 2R. Referring now specifically to FIG. 13A, in step 1302, the routine determines whether partial cylinder fuel cut-out operation is present. When the answer to step 1302 is yes, the routine continues to step 1304. In step 1304, the routine determines whether the cylinders carrying out combustion are operating about stoichiometry. When the answer to step 1304 is yes, the routine continues to step 1306. In step 1306, the routine determines whether transition to operate both cylinder groups to combust an air-fuel ratio that oscillates about stoichiometry has been requested by the engine control system. When the answer to any of steps 1302, 1304, or 1306 are no, the routine continues to the end. When the answer to step 1306 is yes, the routine continues to step 1308. In step 1308, the routine enables fuel injection in the disabled cylinder group at a selected rich air-fuel ratio, while continuing operation of the other cylinder carrying out combustion about stoichiometry. The selected rich air-fuel ratio for the re-enabled cylinders is selected based on engine operating conditions such as, for example: catalyst temperature, engine speed, catalyst space velocity, engine load, and such or requested engine torque. From step 1308, the routine continues to step 1310, where a determination is made as to whether the estimated actual amount of oxygen stored in the downstream three-way catalyst (O2_d_act) is greater than a desired amount of oxygen (O2_d_des). When the answer to step 1310 is yes, the routine continues to step 1312 to continue the rich operation of the re-enabled cylinder group at a selected rich air-fuel ratio, and the oscillation about stoichiometry of the air-fuel ratio of the already combusting cylinders. As discussed above with regard to step 1308, the rich air-fuel ratio is selected based on engine operating conditions, and various depending upon them. From step 1312, the routine returns to step 1310 to again monitor the amount of oxygen stored in the downstream three-way catalyst. Alternatively, the routine of FIG. 13A can also monitor a quantity of fuel in the puddle in the intake manifold of the cylinders that are being re-enabled in step 1310. When the answer to step 1310 is no, the routine continues to step 1314 which indicates that the downstream three-way catalyst has been reestablished at a desired amount of stored oxygen between the maximum and minimum amounts of oxygen storage, and/or that the fuel puddle in the intake manifold of the various enabled cylinders has been reestablished. As such, in step 1314, the routine operates both groups about stoichiometry. In this way, it is possible to re-enable the cylinders from a partial cylinder cut-out operation and reestablish the emission control system to a situation in which improved emission control can be achieved. The operation of FIG. 13A is now illustrated via an example as shown in FIGS. 13B1 and 13B2. FIG. 13B1 shows the air-fuel ratio of group 1, while FIG. 13B2 shows the air-fuel ratio of group 2. At time T0, both cylinder groups operate to carry out combustion about the stoichiometric value. Then, at time T1, it is requested to transition the engine to partial cylinder cut operation, and therefore the cylinder group 1 is operating at a fuel cut condition. As shown in FIG. 13B1, the air-fuel ratio is infinitely lean and designated via the dashed line that is at a substantially lean air-fuel ratio. Then, at time T2, it is desired to re-enable the partially disabled cylinder operation, and therefore the cylinder group 1 is operated at a rich air-fuel ratio as shown in FIG. 13B1, this rich air-fuel ratio varies as engine operating conditions change. The rich operation of group 1 and the stoichiometric operation of group 2 continues until time T3, at which point it is determined that the downstream emission control device has been reestablished to an appropriate amount of oxygen storage. As described elsewhere herein, the identification of when to discontinue the rich regeneration operation can be based on estimates of stored oxygen, and/or based on when a sensor downstream of the downstream emission control device switches. At time T3, both cylinder groups are returned to stoichiometric operation, as shown in FIGS. 13B1 and 13B2. As such, improved engine operation is achieved since the second cylinder group can remain combusting at stoichiometry throughout these transitions, yet the downstream emission control device can have its oxygen storage reestablished via the rich operation of the first cylinder group. This reduces the amount of transitions in the second cylinder group, thereby further improving exhaust emission control. Referring now to FIG. 13C, a routine is described for controlling cylinder cut-out operation where both cylinder groups are disabled. First, in step 1320, the routine determines whether all cylinders are presently in the cylinder cut operation. When the answer to step 1320 is yes, the routine continues to step 1322 to determine whether the cylinders will be carrying out stoichiometric combustion when enabled. When the answer to step 1322 is yes, the routine continues to step 1324 to determine whether the transition of one or two groups is requested to be enabled. In other words, the routine determines whether it has been requested to enable only one cylinder group, or to enable two cylinder groups to return to combustion. When the answer to step 1324, or step 1322, or step 1320, is no, the routine ends. Alternatively, when in step 1324, it is requested to enable both cylinder groups, the routine continues to step 1326. In step 1326, the routine operates fuel injection in both cylinder groups at a selected rich air-fuel ratio. Note that the groups can be operated at the same rich air-fuel ratio, or different rich air-fuel ratios. Likewise, the individual cylinders in the groups can be operated at different rich air-fuel ratios. Still further, in an alternative embodiment, only some of the cylinders are operated rich, with the remaining cylinders operating about stoichiometry. From step 1326, the routine continues to step 1328. In step 1328, the routine determines whether the estimated amount of oxygen stored in the upstream three-way catalyst coupled to the first group (O2_u1_act) is greater than a desired amount of stored oxygen for that catalyst (O2_u1_des). When the answer to step 1320 is no, indicating that the oxygen storage amount has not yet been reestablished in that device, the routine continues to step 1330 to calculate whether the estimated actual amount of oxygen stored in the emission upstream three-way catalyst coupled to the second group (O2_u2_act) is greater than its desired amount of stored oxygen (O2_u2_des). When the answer to step 1330 is no, indicating that neither upstream three-way catalyst coupled to the respective first and second groups' cylinders has been reestablished to their respective desired amounts of stored oxygen, the routine continues to step 1326, where rich operation in both cylinder groups is continued at the selected air-fuel ratio. Also note that the selected rich air-fuel ratio is adjusted based on engine operating conditions as described above herein with regard to step 1308, for example. When the answer to step 1328 is yes, indicating that the upstream three-way catalyst coupled to the first cylinder group has had its oxygen amount reestablished, the routine continues to step 1332 to transition the first group to operate about stoichiometry. Next, the routine continues to step 1334 where it continues operation of the second a t the selected rich air-fuel ratio and the second group to combust an air-fuel mixture that oscillates about stoichiometry. Then, the routine continues to step 1336, where a determination is made as to whether the estimated amount of stored oxygen in a downstream three-way catalyst (which is coupled to at least one of the upstream three-way catalysts, if not both) is greater than its desired amount of stored oxygen. When the answer to step 1336 is no, the routine returns to step 1334 to continue the rich operation in the second group, and the stoichiometric operation in the first group. Alternatively, when the answer to step 1336 is yes, the routine continues to step 1338 to transition both cylinder groups to operate about stoichiometry. Continuing with FIG. 13C, when the answer to step 1330 is yes, indicating that the oxygen amount has been reestablished in the emission upstream three-way catalyst coupled to the second group, the routine transitions the second group to stoichiometry in step 1342. Then, in step 1344, the routine continues to operate the first cylinder group at the rich air-fuel ratio and the second cylinder group about stoichiometry. Then, the routine continues to step 1346 to again monitor the oxygen storage amount in the downstream three-way catalyst. From step 1346, when the downstream fuel catalyst has not yet had enough oxygen depleted to reestablish the oxygen amount, the routine returns to step 1344. Alternatively, when the answer to step 1346 is yes, the routine also transitions to step 1338 to have both cylinder groups operating about stoichiometry. From step 1324, when it is desired to transition only one cylinder group to return to combustion, the routine continues to step 1350 to enable fuel injection in one cylinder group at the selected rich air-fuel ratio and continue fuel cut operation in the other cylinder group. This operation is continued in step 1352. Note that for this illustration, it is assumed that in this case the first cylinder group has been enabled to carry out combustion, while the second cylinder group has continued operating at fuel cut operation. However, which cylinder group is selected to be enabled can vary depending on engine operating conditions, and can be alternated to provide more even cylinder ware. From step 1352, the routine continues to step 1354, where a determination is made as to whether the estimated actual amount of stored oxygen in the upstream three-way catalyst coupled to the first cylinder group (O2_u1_act) is greater than the desired amount (O2_u1_des). When the answer to step 1354, is no, the routine returns to step 1352. Alternatively, when the answer to step 1354 is yes, the routine continues to step 1356 to operate a first cylinder group about stoichiometry and continue the operation of the second cylinder group in the fuel cut operation. Finally, in step 1358, the routine transfers to FIG. 13A to monitor further requests to enable the second cylinder group. In this way, it is possible to allow for improved re-enablement of cylinder fuel cut operation to properly establish the oxygen storage not only in the upstream three-way catalyst, but also in the downstream three-way catalyst without operating more cylinders rich than is necessary. As described above, this can be accomplished using an estimate of stored oxygen in an exhaust emission control device. However, alternatively, or in addition, it is also possible to use information from a centrally mounted air-fuel ratio sensor. For example, a sensor that is mounted at a location along the length of the emission control device, such as before the last brick in the canister, can be used. In still another approach, downstream sensor(s) can be used to determine when regeneration of the oxygen storage is sufficiently completed. Example operation of FIG. 13C is illustrated in the graphs of FIGS. 13D1 and 13D2. Like FIGS. 13B1 and B2, FIG. 13D1 shows the air-fuel ratio of the first cylinder group and FIG. 13D2 shows the air-fuel ratio of the second cylinder group. At time T0, both cylinder groups are operating to carry out combustion about the stoichiometric air-fuel ratio. Then, at time T1, it is requested to disable fuel injection in both cylinder groups. As such, both cylinder groups are shown to operate at a substantially infinite lean air-fuel ratio until time T2. At time T2, it is requested to enable combustion in both cylinder groups. As such, both cylinder groups are shown operating at a rich air-fuel ratio. As illustrated in the figures, the level richness of this air-fuel ratio can vary depending on operating conditions. From times T2 to T3, the oxygen saturated upstream first and second three-way catalysts are having the excess oxygen reduced to establish a desired amount of stored oxygen in both the catalysts. At time T3, the upstream three-way catalyst coupled to the second group has reached the desired amount of stored oxygen and therefore the second cylinder is transitioned to operate about stoichiometry. However, since the downstream three-way catalyst has not yet had its excess oxygen reduced, the first cylinder group continues at a rich air-fuel ratio to reduce all the stored oxygen in the upstream three-way catalyst coupled to the first group, and therefore provide reductants to reduce some of the stored oxygen in the downstream three-way catalyst. Thus, at time T4, the rich operation of the first cylinder group has ended since the downstream three-way catalyst has reached its desired amount of stored oxygen. However, at this point, since the upstream three-way catalyst is saturated at substantially no oxygen storage, the first cylinder groups operate slightly lean for a short duration until T5 to reestablish the stored oxygen in the upstream three-way catalyst. At time T5, then both cylinder groups operate about stoichiometry until time T6, at which time again is desired to operate both cylinders without fuel injection. This operation continues to time T7 at which point it is desired to re-enable only one of the cylinder groups to carry out combustion. Thus, the first cylinder group is operated at a rich air-fuel ratio for a short duration until the oxygen storage has been reestablished in the first upstream three-way catalyst coupled to the first cylinder group. Then, the first cylinder group returns to stoichiometric operation until time T8. At time T8, it is desired to re-enable the second cylinder group. At this time, the second cylinder group operates at a rich air-fuel ratio that varies depending on the engine operating conditions to reestablish the stored oxygen in the downstream three-way catalyst. Then, at time T9, the second cylinder group operates slightly lean for a short duration to reestablish some stored oxygen in the upstream three-way catalyst coupled to the second group. Then, both cylinder groups are operated to oscillate above stoichiometry. In this way, improved operation into and out of cylinder fuel cut conditions can be achieved. Note that regarding the approach taken in FIG. 13—by re-enabling with rich combustion, any NOx generated during the re-enablement can be reacted in the three way catalyst with the rich exhaust gas, further improving emission control. Referring now to FIGS. 14 and 15, example emission controls device are described which can be used as devices 300 and/or 302 from FIG. 2. As discussed above, fuel economy improvements can be realized on engines (for example, large displacement engines) by disabling cylinders under conditions such as, for example, low load, or low torque request conditions. Cylinder deactivation can take place by either deactivating valves so the cylinders do not intake or exhaust air or by deactivating fuel injectors to the inactive cylinders pumping air. In the latter scheme, the bifurcated catalyst described in FIGS. 14 and 15 has the advantage that they can keep the exhaust from the firing cylinders separate from the non-firing cylinders so that the emission control device (such as, for example, a 3-way catalyst) can effectively convert the emissions from the firing cylinders. This is true even when used on an uneven firing V8 engine (where disabling cylinders to still give a torque pulse every 180 crank angle degrees requires disabling half of the cylinders on one bank and half of the cylinders on the other bank). The bifurcated catalyst approach thus avoids the need to pipe the air cylinders to one catalyst and the firing cylinders to another catalyst with a long pipe to cross the flow from one side of the engine to the other. As such, it is possible, if desired, to maintain current-catalyst package space without requiring complicated crossover piping. Specifically, FIG. 14 shows a bifurcated catalyst substrate 1410 with a front face 1420 and a rear face (not shown). The substrate is divided into an upper portion 1422 and a lower portion 1424. The substrate is generally oval in cross-sectional shape; however, other shapes can be used, such as circular. Further, the substrate is formed with a plurality of flow paths formed from a grid in the substrate. In one particular example, the substrate is comprised of metal, which helps heat conduction from one portion of the device to the other, thereby improving the ability to operate one group of cylinders in a fuel-cut state. However, a ceramic substrate can also be used. The substrate is constructed with one or more washcoats applied having catalytic components, such as ceria, platinum, palladium, rhodium, and/or other materials, such as precious metals (e.g., metals from Group-8 of the periodic table). However, in one example, a different washcoat composition can be used on the upper portion of the substrate and the lower portion of the substrate, to accommodate the different operating conditions that may be experienced between the two portions. In other words, as discussed above, one or the other of the upper and lower portions can be coupled to cylinders that are pumping air without injected fuel, at least during some conditions. Further, one portion or the other may be heated from gasses in the other portion, such as during the above described cylinder fuel-cut operation. As such, the optimal catalyst washcoat for the two portions may be different. In this example, the two portions are symmetrical. This may allow for the situation where either group of cylinders coupled to the respective portions can be deactivated if desired. However, in an alternative embodiment, the portions can be asymmetrical in terms of volume, size, length, washcoats, or density. Referring now to FIG. 15, an emission control device 1510 is shown housing substrate 1410. The device is shown in this example with an inlet cone 1512 an inlet pipe 1514, an exit cone 1516, and an exit pipe 1618. The inlet pipe and inlet cone are split into two sides (shown here as a top and bottom portion; however, any orientation can be used) each via dividing plates 1520 and 1522. The two sides may be adjacent, as shown in the figure, but neither portion encloses the other portion, in this example. The dividing plates keep a first and second exhaust gas flow stream (1530 and 1532) separated up to the point when the exhaust gas streams reach the substrate portions 1422 and 1424, respectively. The dividing plates are located so that a surface of the plate is located parallel to the direction of flow, and perpendicular to a face of the substrate 1410. Further, as discussed above, because the paths through the substrate are separated from one another, the two exhaust gas streams stay separated through substrate 1410. Also, exit cone 1516 can also have a dividing plate, so that the exhaust streams are mixed after entering exit pipe 1518. Continuing with FIG. 15, four exhaust gas oxygen sensors are illustrated (1540, 1542, 1544, and 1546), however only a subset of these sensors can be used, if desired. As shown by FIG. 15, sensor 1540 measures the oxygen concentration, which can be used to determine an indication of air-fuel ratio, of exhaust stream 1530 before it is treated by substrate 1410. Sensor 1542 measures the oxygen concentration of exhaust stream 1532 before it is treated by substrate 1410. Sensor 1544 measures the oxygen concentration of exhaust stream 1530 after it is treated by substrate 1410, but before it mixes with stream 1532. Likewise, sensor 1546 measures the oxygen concentration of exhaust stream 1532 after it is treated by substrate 1410, but before it mixes with stream 1530. Additional downstream sensors can also be used to measure the mixture oxygen concentration of streams 1530 and 1532, which can be formed in pipe 1518. FIG. 15 also shows cut-away views of the device showing an oval cross-section of the catalyst substrate, as well as the inlet and outlet cones and pipes. However, circular cross-sectional pipe, as well as substrate, can also be used. Referring now to FIG. 16, a routine is described for selecting a desired idle speed control set-point for idle speed control which takes into account whether cylinders are deactivated, or whether split ignition timing is utilized. Specifically, as shown in step 1610, the routine determines a desired idle speed set-point, used for feedback control of idle speed via fuel and/or airflow adjustment, based on the exhaust temperature, time since engine start, and/or the cylinder cut state. This allows for improved NVH control, and specifically provides, at least under some conditions, a different idle speed set-point depending on cylinder cut-operation to better consider vehicle resonances. The control strategy of desired idle rpm may also be manipulated to improve the tolerance to an excitation type. For example, in split ignition mode, a higher rpm set-point may reduce NVH by moving the excitation frequency away from that which the vehicle is receptive. Thus, the split ignition idle rpm may be higher than that of a non-split ignition mode. Referring now to FIG. 17, a routine is described for coordinating cylinder deactivation with diagnostics. Specifically, cylinder deactivation is enabled and/or affected by a determination of whether engine misfires have been identified in any of the engine cylinders. For example, in the case of a V-6 engine as shown in FIG. 2F, if it is determined that an ignition coil has degraded in one of the cylinders in group 250, then this information can be utilized in enabling, and selecting, cylinder deactivation. Specifically, if the control routine alternatively selects between group 250 and 252 to be deactivated, then the routine could modify this selection based on the determination of degradation of a cylinder in group 250 to select cylinder deactivation of group 250 repeatedly. In other words, rather than having the ability to deactivate ether group 250 or group 252, the routine could deactivate the group which has a cylinder identified as being degraded (and thus potentially permanently deactivated until repair). In this way, the routine could eliminate, at least under some conditions, the option of deactivating group 252. Otherwise, if group 252 were selected to be deactivated, then potentially four out of six cylinders would be deactivated, and reduced engine output may be experienced by the vehicle operator. Likewise, if diagnostics indicate that at least one cylinder from each of groups 250 and 252 should be disabled due to potential misfires, the cylinder cut-out operation is disabled, and all cylinders (except those disabled due to potential misfires) are operated to carry out combustion. Thus, if the control system has the capability to operate on less than all the engine's cylinders and still produce driver demanded torque in a smooth fashion, then such a mode may be used to disable misfiring cylinders with minimal impact to the driver. This decision logic may also include the analysis of whether an injector cutout pattern would result in all the required cylinders being disabled due to misfire. FIG. 17 describes an example routine for carryout out this operation. Specifically, in step 1710, the routine determines whether the engine diagnostics have identified a cylinder or cylinders to have potential misfire. In one example, when the diagnostic routines identify cylinder or cylinders to have a potential misfire condition, such as due to degraded ignition coils, those identified cylinders are disabled and fuel to those cylinders is deactivated until serviced by a technician. This reduces potential unburned fuel with excess oxygen in the exhaust that can generate excessive heat in the exhaust system and degrade emission control devices and/or other exhaust gas sensors. When the answer to step 1710 is no, the routine ends. Alternatively, when the answer to step 1710 is yes, the routine continues to step 1712, where a determination is made as to whether there is a cylinder cutout pattern for improved fuel economy that also satisfies the diagnostic requirement that a certain cylinder, or cylinders, be disabled. In other words, in one example, the routine determines whether there is a cylinder cutout mode that can be used for fuel economy in which all of the remaining active cylinders are able to be operated with fuel and air combusting. When the answer to step 1712 is yes, the routine continues to step 1714 in which the patterns that meet the above criteria are available for injector cutout operation. Patterns of cylinder cutout in which cylinders that were selected to remain active have been identified to have potential misfire, are disabled. In this way, it is possible to modify the selection and enablement of cylinder cutout operation to improve fuel economy, while still allowing proper deactivation of cylinders due to potential engine misfires. As described in detail above, various fuel deactivation strategies are described in which some, or all, of the cylinders are operated in a fuel-cut state depending on a variety of conditions. In one example, all or part of the cylinders can be operated in a fuel-cut state to provide improved vehicle deceleration and fuel economy since it is possible to provide engine braking beyond closed throttle operation. In other words, for improved vehicle deceleration and improved fuel economy, it may be desirable to turn the fuel to some or all of the engine cylinders engine off under appropriate conditions. However, one issue that may be encountered is whether the engine speed may drop too much after the fuel is disabled due to the drop in engine torque. Depending on the state of accessories on the engine, the state of the torque converter, the state of the transmission, and other factors discussed below, the fuel-off torque can vary. In one example, an approach can be used in which a threshold engine speed can be used so that in worst case conditions, the resulting engine speed is greater than a minimum allowed engine speed. However, in an alternative embodiment, if desired, a method can be used that calculates, or predicts, the engine speed after turning off the fuel for a vehicle in the present operating conditions, and then uses that predicted speed to determine whether the resulting engine speed will be acceptable (e.g., above a minimum allowed speed for those conditions). For example, the method can include the information of whether the torque converter is locked, or unlocked. When unlocked, a model of the torque converter characteristics may be used in such predictions. Further, the method may use a minimum allowed engine speed to determine a minimum engine torque that will result from fuel shut off operation to enable/disable fuel shut off. Examples of such control logic are described further below with regard to FIG. 18. Such a method could also be used to screen other control system decisions that will affect production of engine torque in deceleration conditions, such as whether to enable/disable lean operation in cylinders that remain combusting when others are operated without fuel injection. Examples of such control logic are described further below with regard to FIG. 19. Furthermore, such an approach can be useful during tip-out conditions in still other situations, other than utilizing full or partial cylinder fuel deactivation, and other than enabling/disabling alternative control modes. Specifically, it can also be used to adjust a requested engine torque during deceleration conditions in which other types of transitions may occur, such as transmission gear shifts. This is described in further detail below with regard to FIGS. 20-21. Referring now to FIG. 18, a model based screening (via a torque converter model, for example) for whether to enable (full or partial) fuel shut off operation to avoid excessive engine speed drop is described. First, in step 1810, the routine determines whether the torque converter is in the locked or partially locked condition. The partially locked condition can be encountered when the lock up clutch is being applied across the torque converter, yet has not fully coupled the torque converter input and output. In one example, the determination of step 1810 is based upon whether the slip ratio between the input torque converter speed and the output torque converter speed is approximately one. When the answer to step 1810 is yes, the routine continues to step 1822, as discussed in further detail below. When the answer to step 1810 is no, the routine continues to step 1812. In step 1812, the routine calculates the minimum allowed engine speed during a deceleration condition. In one example, deceleration condition is indicated by a driver tipout of the accelerator pedal (i.e., an accelerator pedal position less than a threshold value). The minimum allowed engine speed calculated in step 1812 can be based on a variety of operating conditions, or selected to be a single value. When the minimum allowed engine speed is dependent upon operating conditions, it can be calculated based on conditions such as, for example: vehicle speed, engine temperature, and exhaust gas temperature. Continuing with FIG. 18, in step 1814, the routine predicts a turbine speed at a future interval using vehicle deceleration rate. This prediction can be preformed utilizing a simple first order rate of change model where the current turbine speed, and current rate of change, are used to project a turbine speed at a future instant based on a differential in time. Next, in step 1816, the routine calculates a minimum engine torque required to achieve the calculated minimum allowed engine speed with the predicted turbine speed. Specifically, the routine uses a model of the torque converter to calculate the minimum amount of engine torque that would be necessary to maintain the engine speed at the minimum allowed speed taking into account the predicted turbine speed. The details of this calculation are described below with regard to FIG. 20. Next, in step 1818, the routine calculates the maximum engine brake torque available to be produced in a potential new control mode that is being considered to be used. For example, if the potential new control mode utilizes cylinder cut operation, this calculation takes into account that some or all of the cylinders may not be producing positive engine torque. Alternatively, if the new control mode includes lean operation, then again the routine calculates the maximum engine brake torque available taking into account the minimum available lean air fuel ratio. Make a note that regarding step 1818, the first example is described in more detail below with regard to FIG. 19. Next, in step 1820, the routine determines whether the calculated maximum engine brake torque in the potential new control mode is greater than the engine torque required to achieve, or maintain, the minimum allowed engine speed. If the answer to step 1820 is yes, the routine continues to step 1822 to enable the new control mode based on this engine speed criteria. Alternatively, when the answer to step 1820 is no, the routine continues to step 1824 to disable the transition to the new control mode based on this engine speed criteria. In this way, it is possible to enable or disable alternative control modes taking into account their effect on maintaining a minimum acceptable engine speed during the deceleration condition, and thereby reduce engine stalls. Make a note before the description of step 1810 that the routine to FIG. 18 may be preformed during tipout deceleration conditions. Referring now to FIG. 19, the routine of FIG. 18 has been modified to specifically apply to the cylinder fuel cut operating scenario. Steps 1910-1916 are similar to those described in steps 1810-1816. From step 1916, the routine continues to step 1918 where the routine calculates the engine brake torque that will result from turning off fuel at the minimum engine speed. Specifically, the routine calculates the engine brake torque that will be produced after turning fuel injection off to part or all of the cylinders. Further, this calculation of brake torque is preformed at the minimum engine speed. Then, in stop 1920, the routine determines whether this resulting engine torque at the minimum engine speed during fuel cut operation is greater then the engine torque required to achieve, or maintain, the minimum allowed engine speed. If so, then the engine torque is sufficient in the fuel cut operation, and therefore the fuel cut operation is enabled based on this engine speed criteria in step 1922. Alternatively, when the answer to step 1920 is no, then the engine torque that can be produced in the full or partial fuel cut operation at the minimum engine speed is insufficient to maintain the minimum engine speed, and therefore the fuel shut-off mode is disable based on this engine speed criteria. In this way, it is possible to selectively enable/disable full and/or partial fuel deactivation to the cylinders in a way that maintains engine speed at a minimum allowed engine speed. In this way, engine stalls can be reduced. Note that in this way, at least under some conditions, it is possible to enable (or continue to perform) fuel deactivation to at least one cylinder at a lower engine speed when the torque converter is locked than when the torque converter is unlocked. Thus, fuel economy can be improved under some conditions, without increasing occurrence of engine stalls. Referring now to FIGS. 20 and 21, a routine is described for clipping a desired engine torque request to maintain engine speed at or above a minimum allowed engine speed during vehicle tip-out conditions utilizing torque converter characteristics. In this way, it is possible to reduce dips in engine speed that may reduce customer feel. For example, in calibrating a requested impeller torque as a function of vehicle speed for one or more of the engine braking modes, it is desirable to select torque values that give good engine braking feel and are robust in the variety of operating conditions. However, this can be difficult since a variety of factors affect engine braking, and such variations can affect the resulting engine speed. Specifically, it can be desirable to produce less than the required torque to idle under deceleration conditions to provide a desired deceleration trajectory. However, at the same time, engine speed should be maintained above a minimum allowed engine speed to reduce stall. In other words, one way to improve the system efficiency (and reduce run-on feel) under deceleration conditions is to produce less engine torque than needed to idle the engine. Yet at the same time, engine speed drops should be reduced that let engine speed fall below a minimum allowed value. In one example, for vehicles with torque converters, a model of the open torque converter can be used to determine the engine torque that would correspond to a given engine speed (target speed or limit speed), and thus used to allow lower engine torques during deceleration, yet maintain engine speed above a minimum value. In this case, if there is a minimum allowed engine speed during deceleration, the controller can calculate the engine torque required to achieve at least that minimum engine speed based on turbine speed. The routine below uses two 2-dimensional functions (fn_conv_cpc and fn_conv_tr) to approximate the K-factor and torque ratio across the torque converter as a function of speed ratio. This approximation includes coasting operation where the turbine is driving the impeller. In an alternative approach, more advanced approximations can be used to provide increased accuracy, if necessary. Note that it is known to use a model of the open torque converter to determine the engine torque that would correspond to a given engine speed in shift scheduling for preventing powertrain hunting. I.e., it is known to forecast the engine speed (and torque converter output speed) after a shift to determine whether the engine can produce enough torque to maintain tractive effort after an upshift (or downshift) in the future conditions. Thus, during normal driving, it is known to screen shift requests to reduce or prevent less than equal horsepower shifts (including a reserve requirement factor), except for accelerations. Further, it is known to include cases where the torque converter is locked, and to include calculations of maximum available engine torque. Referring now to FIG. 20, a routine is described for calculating the engine brake torque required to spin the engine at a specified engine speed and turbine speed. First, in step 2010, temporary parameters are initialized. Specifically, the following 32-bit variables are set to zero: tq_imp_ft_lbf_tmp (temporary value of impeller torque in lbf), tq_imp_Nm_tmp (temporary value of impeller torque in Nm), cpc_tmp (temporary value of K-factor), and tr_tmp (temporary value of torque ratio). Further, the temporary value of the speed ratio (speed_ratio_tmp)=is calculated as a ratio of the temporary turbine speed (nt_tmp) and the temporary engine speed (ne_tmp), clipped to 1 to reduce noise in the signals. Then, in step 2012, the routine calculates the temporary K-factor (cpc_tmp) as a function of the speed ratio and converter characteristics stored in memory using a look-up function, for example. Then, in step 2014, a determination is made as to whether the speed ratio (e.g., speed_ratio_tmp>1.0?). If so, this signifies that the vehicle is coasting, and positive engine torque is not being transmitted through the torque converter. When the answer to step 2014 is Yes, the routine continues to step 2016. In step 2016, the routine uses a K-factor equation that uses turbine speed and torque as inputs. Specifically, the impeller torque is calculated from the following equations: tq—imp—ft—lbf—tmp=nt—tmp*nt—tmp/max((cpc_tmp*cpc—tmp), 10000.0) tr—tmp=f(speed—ratio—tmp); tq—imp—ft—lbf_tmp=−tq—imp—ft—lbf—tmp/tr—tmp; where the function f stores data about the torque converter to generate the torque ratio (tr) based on the speed ratio. Otherwise, when the answer to step 2014 is No, then the K-factor equation uses engine speed and torque as inputs, and the routine continues to step 2018. In step 2018, the impeller torque is calculated from the following equations: tq—imp—ft—lbf—tmp=ne—tmp*ne—tmp/max((cpc—tmp*cpc—tmp), 10000.0) Then, these can be converted to NM units, and losses included, via the following equation in step 2020. tq—imp—Nm—tmp=tq—imp—ft—lbf—tmp*1.3558+tq—los—pmp; In this way, it is possible to calculate a required torque (tq_imp_Nm_tmp) to maintain engine speed as desired. Example operation is illustrated in FIG. 21. Specifically, FIG. 21 demonstrates the performance of this torque request clipping/screening during vehicle testing. At approximately 105.5 seconds the accelerator pedal is released and the torque based deceleration state machine enters hold small positive mode (where a small positive torque is maintained on the drivetrain) followed by an open loop braking mode, where negative engine torque is provided in an open-loop fashion. Soon after the tip-out, the transmission controls command a 3-4 up-shift which will lower the turbine speed below the minimum engine speed target of ˜850 rpm in this example, placing a torque load on the engine. This transmission up-shift may result in more engine torque being required to hold 850 rpm engine speed and tqe_decel_req_min (the lower clip applied to the tqe_decel_req value) therefore jumps to 42 Nm to reflect the higher torque request. The value of tqe_decel_req_min is calculated based on the torque converter model described above. By keeping the deceleration torque request from dropping too low, the engine speed behaves as desired. Referring now to FIGS. 22-27, a method for managing the cycle averaged torque during transitions between different cylinder cut-out modes is described. Specifically, such an approach may provide improved torque control during these transitions. Before describing the control routine in detail, the following description and graphs illustrate an example situation in which it is possible to better control cycle averaged torque during the transition (note that this is just one example situation in which the method can be used). These graphs use the example of an eight cylinder engine where the cylinders on the engine are numbered in firing order. When the system transitions from firing 1, 3, 5, 7 to 2, 4, 6, 8, for example, two cylinders may fire in succession. If the torque produced by all the cylinders during the transition is substantially the same, the cycle-average torque produced during the transition may be higher than desired, even though no one cylinder produces substantially more or less torque, and over a cycle, the same number of cylinders is still being fired. In other words, there is a single, effective shift of half of the cylinders firing earlier in the overall engine cycle. This torque disturbance may also result in an engine speed disturbance if occurring during idle speed control conditions. The following figures illustrate an example of this torque disturbance. Note that the following description illustrates a simplified example, and is not meant to define operation of the system. FIG. 22 shows the crankshaft torque for an 8 cylinder engine with all cylinders firing, where the crankshaft torque resulting from the sum of the power strokes on the engine are modeled as simple sine waves. For the example where four cylinders are operated to produce the same net torque as all 8 in FIG. 22, then the torque production of each cylinder would double as shown in FIG. 23. If this same level of torque was produced by the firing cylinders in 4 cylinder mode but the system transitioned from firing 1-3-5-7 to 2-4-6-8 with the last cylinder fired before the transition being 3 and the first cylinder fired after the transition being 4, then crankshaft torque would be as illustrated in FIG. 24. As shown in FIG. 24, the summing of the torques from cylinders 3 and 4 may produce a torque increase during this transition point and an increase in the average torque over an engine cycle. The increase could be as much as 12.5% for an 8 cylinder engine, or 16.7% for a 6 cylinder engine due to this overlapping torque addition effect. By recognizing this behavior, the control system can be redesigned to reduce the torque produced by the off-going cylinder (3 in this example) and the on-coming cylinder (4 in this example) such that the average torque over a cycle is not increased during a transition. For an 8 cylinder engine, if the torque produced by cylinders 3 and 4 were reduced by approximately 25% each, then the torque profile would resemble FIG. 25, with the cycle average torque approximately matching the steady 4 or 8 cylinder operation. In this way, it is possible to improve torque control when transitioning between operating in a first mode with the first group combusting inducted air and injected fuel and the second group operating with inducted air and substantially no injected fuel, and operation in a second mode with the second group combusting inducted air and injected fuel and the first group operating with inducted air and substantially no injected fuel. As indicated in the example, above, before the transition, engine torque of a last to be combusted cylinder in the first group is reduced compared with a previously combusted cylinder in that group. Further, after the transition, engine torque of a first to be combusted cylinder in the second group is reduced compared with a next combusted cylinder in that group. The reduction of one or both of the cylinder can be accomplished in a variety of ways, such as, for example: ignition timing retard, or enleanment of the combusted air and fuel mixture. Further, using electric valve actuation, variable valve lift, an electronic throttle valve, etc., the reduction could be performed by reducing air charge in the cylinders. In an alternative embodiment, it may be possible to provide improve torque control during the transition by reducing torque of only one of the last to be fired cylinder in the first group and the first to be fired cylinder in the second group. Further, it may be possible to provide improve torque control during the transition by providing unequal torque reduction in both the last to be fired cylinder in the first group and the first to be fired cylinder in the second group. For example, the torque reduction for the last cylinder of the old firing order (in the example discussed above, cylinder 3) and the first cylinder of the new firing order (cylinder 4) could be implemented in any way such that the total indicated torque produced by these two cylinders was reduced by approximately 25%. For example, if the torque reduction of the last cylinder in the firing order is X*50% and the reduction of the first cylinder in the new firing order is (1−X)*50%, average torque could be maintained. For the example reduction of 25% each, X=0.5. If all the torque were reduced on the last old firing order cylinder (X=1), the results would be similar to those shown in FIG. 26. Alternatively, if all the torque reduction was accomplished with the first cylinder of the new firing order (X=0), then the results would be similar to those shown in FIG. 27. These are just two example, and X could be selected anywhere between 0 and 1. Referring now to FIGS. 28-33, an approach to reduce engine NVH during mode transitions between full cylinder operation and partial cylinder operation (between full cylinder operation and split ignition timing operation). FIG. 28 shows the frequency content of the engine at 600 RPM with all cylinders firing at stoichiometry and optimal ignition timing. The figure shows a dominant peak at firing frequency of all cylinders firing (FF). This can be compared with FIG. 29, which shows the frequency content of the engine at 600 RPM operating in cylinder cut out mode (e.g., fuel to one bank of a V-6 deactivated, or fuel to two cylinders on each bank of a V-8 deactivated), or operating with split ignition timing between groups of cylinders. This shows a dominant peak at ½ FF, and a smaller peak at firing frequency due to compression of all cylinders, since deactivated cylinders still pump air. And both FIGS. 28 and 29 can be compared with FIG. 30, which shows the frequency content of the engine at 600 RPM with all cylinders firing at a lean air-fuel ratio and/or with regarded ignition timing. FIG. 30 shows a dominant peak at FF, but with a wider spread due to increased combustion variability due to lean, and/or retarded ignition timing. When abruptly transitioning between these modes, there may be a broad band excitation due to the change in fundamental frequency content of the engine torque. This may excite resonance frequencies of the vehicle, such as a vehicle's body resonance, as shown by FIG. 31. Therefore, in one example when such NVH concerns are present, the engine can be operated to gradually make the transition (e.g., by gradually reducing torque in combusting cylinders and gradually increasing torque in deactivated cylinders when enabling combustion in deactivated cylinders). For example, this can be performed via split airflow control between the cylinder groups. Alternative, enleanment and/or ignition timing retard can also be used. In this way, the frequency excitation of any vehicle frequencies may be reduced. In other words, ramping to and from different modes may allow jumping over body resonances so that injector cut-out (or split ignition timing) can operate at lower engine speeds (e.g., during idle) while reducing vibration that may be caused by crossing and excite a body resonance. This is discussed in more detail below with regard to FIGS. 32-33. Specifically, FIG. 32 shows the frequency content at a mid-point of a transition in which there are two smaller, broader peaks centered about FF and ½ FF. In this example, the engine transitions from operating with split ignition timing to operating all cylinders with substantially the same ignition timing. For example, the controller reduces airflow, or retards ignition timing, or enleans, cylinders generating power, and advanced ignition timing of the cylinders with significant ignition timing retard. FIG. 33 shows the frequency content near the end of the transition when all of the cylinders are carrying out combustion at substantially the same, retarded, ignition timing. Thus, by using ramping, it may be possible to operate at a lower idle rpm by reducing potential NVH consequence and gradually changing torque frequency content, rather than abruptly stepping to and from different modes with the resultant broad band excitation due to frequency impulses. Further, this may be preferable to an approach that changes engine speed through a resonance before making a transition, which may increase NVH associated with running at a body resonance frequency. Note that these figures show a single body resonance, however, there could also be drive line or mount resonances that vary with vehicle speed and gear ratio. Referring now to FIG. 34, an example control strategy is described for use with a system such as in FIG. 2Q, for example. This strategy could be used with any even fire V-type engine such as, for example: a V-6 engine, a V-10 engine, a V-12 engine, etc. Specifically, this strategy uses a stoichiometric injector cut-out operation where one group of cylinders is operated to induct air with substantially no fuel injection, and the remaining cylinders are operating to combust a near stoichiometric air-fuel mixture. In this case, such as in the example of FIG. 2Q, catalysts 222 and 224 can be three-way type catalysts. Also note that a third catalyst can be coupled further downstream in an underbody location, which can also be a three-way catalyst. In this way, it is possible to disable the cylinder group without an upstream three-way catalyst (e.g., group 250), while continuing to operate the other group (group 252) in a stoichiometric condition. In this way, catalyst 222 can effectively reduce exhaust emissions from group 252. Further, when both groups are combusting a stoichiometric mixture, both catalysts 222 and 224 (as well as any further downstream catalysts) can be used to effectively purify exhaust emissions. This exhaust system has a further advantage in that it is able to improve maintenance of catalyst temperatures even in the injector cut-out mode. Specifically, during cylinder fuel injection cut-out, catalyst 222 can convert emissions (e.g. HC, CO and NOx) in the stoichiometric exhaust gas mixture (which can oscillate about stoichiometry). The relatively cool air from bank 250 mixes with the hot stoichiometric exhaust gases before being fed to catalyst 224. However, this mixture is approximately the same temperature in the fuel injection cut-out mode as it would be in stoichiometric operation where both cylinders 250 and 252 carry out combustion. Specifically, when in the injector cut-out mode, the stoichiometric cylinder load is approximately twice the exhaust temperature in the mode of both groups carrying out combustion. This raises the exhaust temperature coming out of the cylinders in group 252 to nearly twice that of the cylinders carrying out combustion at an equivalent engine load. Thus, when excess air is added to the hotter exhaust gas in the cylinder cut-out mode, the overall temperature is high enough to keep catalysts 224 in a light-off mode. Therefore, when the engine exits the injector cut-out mode, both catalysts 222 and 224 are in a light-off mode and can be used to reduce emissions. If, however, the exhaust system design is such that in the injector cut-out mode catalyst 224 still cools below a desired catalyst temperature, then split ignition operation can be used when re-enabling combustion to both cylinder groups as described above with regard to FIG. 8. Specifically, when transitioning from operating with group 250 in the cylinder in the fuel cut mode, and group 252 operating about stoichiometry to operating both groups about stoichiometry, group 250 can be re-enabled with fuel injection to carry out combustion with a significantly retarded ignition timing. In this way, catalysts 224 can be rapidly heated due to the large amount of heat generated by group 250. Further, the significantly less retarded combustion of group 252 maintains the engine output smoothly about a desired value. As described above, the configuration of FIG. 2Q can provide significant advantages in the fuel cut mode, however, the inventors herein have recognized that during cold starting conditions, catalyst 224 reaches a light off temperature slower than catalyst 222 due to the further distance from cylinder Group 250 and being in the downstream position relative to catalyst 222. Therefore, in one example, it is possible to provide better catalyst light off operation during a start using the split ignition timing approach described above herein. This is described in further detail below with regard to FIG. 34. Referring now specifically to FIG. 34, a routine as described before regarding engine starting operation with an unequal exhaust path to the first catalyst such as in the system of FIG. 2Q, for example. First, in step 3410, the routine determines whether the exhaust configuration is one having unequal exhaust paths to a first catalyst. If the answer to step 3410 is “yes”, the routine continues to step 3412. In step 3412, the routine determines whether the current conditions are a “cold engine start.” This can be determined based on a time-sensitive last engine operation, engine coolant temperature and/or various other parameters. If the answer to step 3412 is “yes”, the routine continues to step 3414 to operate the engine in a crank mode. In the crank mode, the engine starter rotates the engine up to a speed at which it is possible to identify cylinder position. At this point, the engine provides for fuel injection to all the cylinders in a sequential mode, or in a “big bang” mode. In other words, the routine sequentially provides fuel injection to each of the engine cylinders in the desired fire mode to start the engine. Alternatively, the routine fires off fuel injectors simultaneously to all the cylinders and sequentially fires the ignition into each cylinder in the firing order to start the engine. The routine then continues to step 3416 as the engine runs up to the desired idle speed. During the run-up mode, it is possible again to operate all of the cylinders to carry out combustion to run the engine up to a desired engine idle speed. At this point, the routine continues to step 3418, where the power-heat mode (e.g., split ignition timing) is used. In this mode, the cylinder group coupled to an upstream emission control device (e.g., Group 252) is operated with potentially a slightly lean air-fuel mixture, and slightly retarded ignition timing from maximum torque timing to maintain the cylinders at a desired engine speed. However, the other group (Group 250) is then operated with significant ignition timing retard to produce little engine torque output that provide significant amount of heat. While this combustion may be past the combustion stability limit, smooth engine operation can be maintained via the combustion in Group 252. The large amount of heat from Group 250 thereby quickly brings catalysts in the downstream position past a Y-pipe (e.g., catalyst 224) to a desired light-off temperature. In this way, both catalysts can be rapidly brought to a desired temperature, at which the engine can transition to operating both cylinder groups with substantially the same ignition timing. Note that in an alternative embodiment, the split ignition timing between the cylinder groups can be commenced during the run-up mode or even during engine cranking. It will be appreciated that the configurations and routines disclosed herein are exemplary in nature, and that these specific embodiments are not to be considered in a limiting sense, because numerous variations are possible. The subject matter of the present disclosure includes all novel and nonobvious combinations and subcombinations of the various system and exhaust configurations, fuel vapor purging estimate algorithms, and other features, functions, and/or properties disclosed herein. The following claims particularly point out certain combinations and subcombinations regarded as novel and nonobvious. These claims may refer to “an” element or “a first” element or the equivalent thereof. Such claims should be understood to include incorporation of one or more such elements, neither requiring nor excluding two or more such elements. Other combinations and subcombinations of the disclosed features, functions, elements, and/or properties may be claimed through amendment of the present claims or through presentation of new claims in this or a related application. Such claims, whether broader, narrower, equal, or different in scope to the original claims, also are regarded as included within the subject matter of the present disclosure.
<SOH> BACKGROUND AND SUMMARY <EOH>Engines are usually designed with the ability to deliver a peak output, although most engine operation is performed well below this peak value. As such, it can be beneficial to operate with some cylinders inducting air without fuel injection as described in U.S. Pat. No. 6,568,177. Engines are also designed to purge fuel vapors generated in the fuel delivery system through combustion in the cylinders. The approach for such operation described in U.S. Pat. No. 6,568,177 advantageously disables the partial cylinder operating mode when such fuel vapor purging is requested. However, the inventors herein have recognized that it can be advantageous to deliver fuel vapors to a subset of the engine cylinders, thereby prolonging the ability to operate in a fuel-cut state even when fuel vapor purging is required. However, in such cases, exhaust gasses between cylinders with and without fuel vapor purge can mix. Thus, when attempting to estimate the amount of fuel vapors in the purge flow, the error is diluted since some of the exhaust gasses measured are from cylinders without any fuel vapors. Therefore, a new method for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders is used. The method comprises operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; mixing exhaust gas from the first and second set; and determining an indication of fuel vapors from a sensor measuring said mixed exhaust gas based on the operation of the second set of cylinders. In this way, it is possible to take into account the cylinders without fuel vapors.
<SOH> BACKGROUND AND SUMMARY <EOH>Engines are usually designed with the ability to deliver a peak output, although most engine operation is performed well below this peak value. As such, it can be beneficial to operate with some cylinders inducting air without fuel injection as described in U.S. Pat. No. 6,568,177. Engines are also designed to purge fuel vapors generated in the fuel delivery system through combustion in the cylinders. The approach for such operation described in U.S. Pat. No. 6,568,177 advantageously disables the partial cylinder operating mode when such fuel vapor purging is requested. However, the inventors herein have recognized that it can be advantageous to deliver fuel vapors to a subset of the engine cylinders, thereby prolonging the ability to operate in a fuel-cut state even when fuel vapor purging is required. However, in such cases, exhaust gasses between cylinders with and without fuel vapor purge can mix. Thus, when attempting to estimate the amount of fuel vapors in the purge flow, the error is diluted since some of the exhaust gasses measured are from cylinders without any fuel vapors. Therefore, a new method for estimating a fuel vapor quantity from a fuel vapor recovery system for a vehicle having an engine with a first set of cylinders and a second set of cylinders is used. The method comprises operating the first set of cylinders with injected fuel and inducted fuel vapors from the fuel vapor recovery system; operating the second set of cylinders without fuel vapors from the fuel vapor recovery system; mixing exhaust gas from the first and second set; and determining an indication of fuel vapors from a sensor measuring said mixed exhaust gas based on the operation of the second set of cylinders. In this way, it is possible to take into account the cylinders without fuel vapors.
20040305
20060711
20050908
94698.0
0
CASTRO, ARNOLD
SYSTEM AND METHOD FOR ESTIMATING FUEL VAPOR WITH CYLINDER DEACTIVATION
UNDISCOUNTED
0
ACCEPTED
2,004
10,794,478
ACCEPTED
Memory controller, flash memory system, and method of controlling operation for data exchange between host system and flash memory
There is disclosed a controller included in a flash memory system attachable to a memory interface of a host system. The controller performs a process for minimizing the maximum number of defective blocks to be classified into each zone, by using a plurality of replacement tables or a plurality of functions. Specifically, a dispersion process unit included in the controller associates virtual block addresses VBA with physical block addresses PBA so as to minimize the maximum number of defective blocks to be classified into each zone. The flash memory system may have a plurality of replacement tables describing correspondence between virtual block addresses VBA and physical block addresses PBA. Or, in the flash memory system, plural kinds of functions for setting correspondence between virtual block addresses VBA and physical block addresses PBA may be defined by the controller.
1. A memory controller comprising: a managing module which is so constituted as to manage a correspondence between a virtual address space of a flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification controlling module which determines blocks to be classified into each of said plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of said plurality of zones. 2. The memory controller according to claim 1, wherein said classification controlling module: has in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by referring to one of said plurality of association tables. 3. The memory controller according to claim 2, wherein said classification controlling module: selects one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of said plurality of zones; and determines blocks to be classified into each of said plurality of zones, by referring to said selected association table. 4. The memory controller according to claim 1, wherein said classification controlling module: has in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by using the function. 5. The memory controller according to claim 4, wherein the function has a predetermined mapping cycle. 6. The memory controller according to claim 5, wherein said classification controlling module determines blocks to be classified into each of said plurality of zones, by setting a number of times conversion by the function is performed. 7. The memory controller according to claim 4, wherein the function is a function for generating a tent mapping. 8. The memory controller according to claim 7, wherein in a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of said plurality of zones is N, T and N satisfy a following relationship N=2(T−1). 9. The memory controller according to claim 4, wherein said classification controlling module: has in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by using one of the plurality of functions. 10. The memory controller according to claim 9, wherein said classification controlling module: selects one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of said plurality of zones; and determines blocks to be classified into each of said plurality of zones by using the selected function. 11. The memory controller according to claim 1, further comprising a main processor which supplies a logical address of a block to said managing module in order to request an access to said flash memory. 12. A flash memory system comprising: a non-volatile flash memory; a managing module which is so constituted as to manage a correspondence between a virtual address space of said flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification managing module which determines blocks to be classified into each of said plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of said plurality of zones. 13. The flash memory system according to claim 12, wherein said classification controlling module: has in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by referring to one of said plurality of association tables. 14. The flash memory system according to claim 13, wherein said classification controlling module: selects one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of said plurality of zones; and determines blocks to be classified into each of said plurality of zones, by referring to said selected association table. 15. The flash memory system according to claim 12, wherein said classification controlling module: has in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by using the function. 16. The flash memory system according to claim 15, wherein the function has a predetermined mapping cycle. 17. The flash memory system according to claim 16, wherein said classification controlling module determines blocks to be classified into each of said plurality of zones, by setting a number of times conversion by the function is performed. 18. The flash memory system according to claim 15, wherein the function is a function for generating a tent mapping. 19. The flash memory system according to claim 18, wherein in a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of said plurality of zones is N, T and N satisfy a following relationship N=2(T−1). 20. The flash memory system according to claim 15, wherein said classification controlling module: has in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determines blocks to be classified into each of said plurality of zones, by using one of the plurality of functions. 21. The flash memory system according to claim 20, wherein said classification controlling module: selects one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of said plurality of zones; and determines blocks to be classified into each of said plurality of zones by using the selected function. 22. A method of controlling an operation for exchanging data between a host system and a flash memory, said method comprising: managing a correspondence between a virtual address space of said flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in said host system; and determining blocks to be classified into each of said plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of said plurality of zones. 23. The method according to claim 22, comprising: having in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determining blocks to be classified into each of said plurality of zones, by referring to one of said plurality of association tables. 24. The method according to claim 22, comprising: having in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of said plurality of zones with physical addresses in said flash memory; and determining blocks to be classified into each of said plurality of zones, by using the function.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a flash memory controller, a flash memory system having the controller, and a method of controlling an operation for data exchange between a host system and a flash memory. 2. Description of the Related Art Recently, a flash memory is widely employed as a semiconductor memory used in a memory system such as a memory card and a silicon disk. The flash memory is one type of non-volatile memories. It is required that the data stored in the flash memory be retained in the flash memory even when electricity is not supplied to the flash memory. A NAND type flash memory is one type of flash memories often used in the aforementioned memory system. Each of a plurality of memory cells included in a NAND type flash memory can be changed from an erase state where data representing a logical value “1” is stored, to a write state where data representing a logical value “0” is stored, independently from the other memory cells. On the contrary, in a case where at least one of the plurality of memory cells needs to be changed from the write state to the erase state, each memory cell can not be changed independently from the other memory cell. In this case, all of a predetermined number of memory cells which are collectively referred to as a block need to be changed to the erase state. This simultaneous erasing operation is generally referred to as “block erasing”. The block on which the block erasing has been performed is referred to as an erased block. Due to the above-described characteristic, overwriting of data is not available in the NAND type flash memory. In order to rewrite data stored in a memory cell, block data including new data needs to be written in an erased block first, and then block erasing needs to be performed on the block storing the old data. The rewritten data is stored in a block which is different from the block in which the data before being rewritten was stored. Therefore, the correspondence between a logical block address specified by an address signal supplied from a host system and a physical block address representing the actual block address in the flash memory is dynamically adjusted by a controller each time data is rewritten in the flash memory. For example, the correspondence between the logical block address and the physical block address is described in an address translation table prepared in the controller. If the correspondence between the logical block addresses and the physical block addresses of all the blocks included in the flash memory is described in an address translation table, the address translation table has to have a large size in accordance with the flash memory having a large data capacity. In order to generate an address translation table having a large size, a large system resource and a long process time are consumed. To solve this problem, Unexamined Japanese Patent Application KOKAI Publication No. 2000-284996 discloses a technique for dividing a memory space in the flash memory into a plurality of zones, and generating an address translation table for the blocks assigned to each zone. Unexamined Japanese Patent Application KOKAI Publication No. 2002-73409 discloses an address translation method for preventing an increase in the memory capacity that is required for using the address translation table, by copying a part of the address translation table stored in the flash memory to a memory space in a RAM. Unexamined Japanese Patent Application KOKAI Publication No. 2003-15946 discloses a memory controller which can perform a series of data writing operations in a flash memory parallely. The memory controller disclosed in this publication is designed to use a plurality of virtual blocks which are formed by virtually combining a plurality of physical blocks belonging to different blocks from each other. In such a flash memory as disclosed in Unexamined Japanese Patent Application KOKAI Publication No. 2000-284996 having a memory space which is divided into a plurality of zones, existence of a defective block should be taken into consideration for assigning the zones to data areas included in a host system. In other words, it is preferred that the storage capacity of a zone to be assigned to a data area in a predetermined range included in the host system is designed larger than the upper limit of the amount of data to be handled in the data area. At this time, at least one spare block (redundant block) is provided in each zone, such that the ratio of the spare block to all the blocks in the zone is a predetermined value. However, if many defective blocks exist in one part of a flash memory, the defective blocks concentrate in a zone to which this part is assigned. In a case where the number of defective blocks included in a zone is larger than the number of spare blocks included in this zone, no erased block can be secured and the operation is forced to stop. In a case where many defective blocks concentrate in a specific zone as described above, even though the total number of defective blocks in the flash memory does not exceed the tolerable number for the proper operation, there might be caused a zone that can not store data properly. SUMMARY OF THE INVENTION An object of the present invention is to suppress occurrence of an error in a flash memory, in a case where many defective blocks exist in one part of the flash memory. A memory controller according to a first aspect of the present invention comprises: a managing module which is so constituted as to manage a correspondence between a virtual address space of a flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification controlling module which determines blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The classification controlling module may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The classification controlling module may select one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones, by referring to the selected association table. The classification controlling module may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function. The function may have a predetermined mapping cycle. The classification controlling module may determine blocks to be classified into each of the plurality of zones, by setting a number of times conversion by the function is performed. The function may be a function for generating a tent mapping. In a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of the plurality of zones is N, T and N may satisfy a following relationship N=2(T−1). The classification controlling module may have in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using one of the plurality of functions. The classification controlling module may select one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones by using the selected function. The memory controller may further comprise a main processor which supplies a logical address of a block to the managing module in order to request an access to the flash memory. A flash memory system according to a second aspect of the present invention comprises: a non-volatile flash memory; a managing module which is so constituted as to manage a correspondence between a virtual address space of the flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification managing module which determines blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The classification controlling module may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The classification controlling module may select one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones, by referring to the selected association table. The classification controlling module may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function. The function may have a predetermined mapping cycle. The classification controlling module may determine blocks to be classified into each of the plurality of zones, by setting a number of times conversion by the function is performed. The function may be a function for generating a tent mapping. In a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of the plurality of zones is N, T and N may satisfy a following relationship N=2(T−1). The classification controlling module may have in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using one of the plurality of functions. The classification controlling module may select one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones by using the selected function. A method according to a third aspect of the present invention is a method of controlling an operation for exchanging data between a host system and a flash memory, and comprises: managing a correspondence between a virtual address space of the flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in the host system; and determining blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The method may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The method may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function. BRIEF DESCRIPTION OF THE DRAWINGS These objects and other objects and advantages of the present invention will become more apparent upon reading of the following detailed description and the accompanying drawings in which: FIG. 1 is a block diagram of a flash memory system according to the present invention; FIG. 2 is a cross sectional view schematically showing a structure of a memory cell; FIG. 3 is a cross sectional view showing a memory cell in a write state; FIG. 4 is a schematic diagram showing an address space in a flash memory; FIG. 5 is a schematic diagram showing how zones are assigned; FIG. 6 is a schematic diagram showing a process for classifying blocks; FIG. 7 is a schematic diagram showing one example of a correlation among logical block addresses, virtual block addresses, and physical block addresses; FIG. 8 is a block diagram showing a dispersion process unit, an address register, a process setting registers, etc.; FIG. 9 is a schematic diagram showing an operation for converting a virtual page address into a physical page address; FIG. 10 is a schematic diagram showing a case where a virtual block address is directly assigned to a physical block address; FIG. 11 is a schematic diagram showing an example of how a replacement table is constituted; FIG. 12 is a schematic diagram showing an example of a list of defective blocks; FIG. 13 is a schematic diagram showing an operation in which a virtual block address is associated with a physical block address by a dispersion process; FIG. 14 is a schematic diagram showing an example of a structure including a monitor register; FIG. 15 is a schematic diagram showing an example of an address translation table; and FIG. 16 are schematic diagrams showing an example of a search table. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT FIG. 1 is a block diagram schematically showing a flash memory system 1 according to the present invention. The flash memory system 1 comprises a flash memory 2 and a controller 3. The flash memory system 1 can be attached to a memory interface owned by a host system 4. The host system 4 can activate the flash memory system 1 as an external storage device, by the flash memory system 1 being attached thereto. The host system 4 may be an information processing system represented by a personal computer and a digital camera, for processing various information such as character information, audio information, image information, etc. For example, the host system 4 may include a main processor such as a CPU (Central Processing Unit). The flash memory 2 shown in FIG. 1 is a non-volatile memory. A data reading operation and a data writing operation are both executed on the flash memory 2 in a so-called page unit, while data stored in the flash memory 2 is erased in a so-called block unit. One block includes, for example, 32 pages. One page includes a data area 25 (shown in FIG. 4) having 512 bytes, and a redundant area 26 (shown in FIG. 4) having 16 bytes. In FIG. 1, the controller 3 comprises a host interface control block 5, a microprocessor 6, a host interface block 7, a work area 8, a buffer 9, a flash memory interface block 10, an ECC block 11, and a flash sequencer block 12. For example, the controller 3 is integrated on a single semiconductor chip. The function of each component of the controller 3 will hereinafter be described. The host interface control block 5 is a functional block for controlling the operation of the host interface block 7. The host interface control block 5 includes a plurality of registers (not shown). The host interface control block 5 controls the operation of the host interface block based on information set in each register. The microprocessor 6 is a functional block for controlling the operation of the entire controller 3. The host interface block 7 is a functional block for exchanging information representing data, an address, a status, an external command, etc. with the host system 4, under the control of the microprocessor 6. When the flash memory system 1 is attached to the host system 4, the flash memory system 1 and the host system 4 are connected to each other via an external bus 13. Information supplied from the host system 4 to the flash memory system 1 is acquired into inside of the controller 3 via the host interface block 7. Information supplied from the flash memory system 1 to the host system 4 is output to the host system 4 via the host interface block 7. The work area 8 is a memory module for temporarily storing data used for controlling the flash memory 2. For example, the work area 8 includes a plurality of SRAM (Static Random Access Memory) cells. The buffer 9 is a functional block for retaining data read from the flash memory 2 and data to be written into the flash memory 2. Data read from the flash memory 2 is retained in the buffer 9 until it is output to the host system 4. Data to be written into the flash memory 2 is retained in the buffer 9 until the flash memory 2 is prepared for the data writing operation. The flash memory interface block 10 is a functional block for exchanging information representing data, an address, a status, an internal command, etc. with the flash memory 2 via an internal bus 14. An internal command is a command to be fed from the controller 3 to the flash memory 2, and is distinguished from an external command to be fed from the host system 4 to the flash memory system 1. The ECC block 11 is a functional block for generating an error correction code to be added to data to be written into the flash memory 2. In addition, the ECC block 11 detects and corrects any error included in data read out from the flash memory 2, based on an error correction code included in the read data. The flash sequencer block 12 is a functional block for controlling the operation of the flash memory based on an internal command. The flash sequencer block 12 includes a plurality of registers (not shown). The flash sequencer block 12 sets information to be used for executing an internal command in the plurality of registers under the control of the microprocessor 6. After setting information in the plurality of registers, the flash sequencer block 12 performs an operation corresponding to an internal command, based on the information set in each register. In addition, the flash sequencer block 12 performs a dispersion process for dispersing a plurality of blocks assigned to one zone in the flash memory 2. With reference to FIG. 2 and FIG. 3, the structure of a memory cell 16 included in the flash memory 2 will be explained. FIG. 2 and FIG. 3 are cross sectional views schematically showing the structure of one memory cell 16 included in the flash memory 2. In FIG. 2, no data is written in the memory cell 16. In FIG. 3, data is written in the memory cell 16. As shown in FIG. 2 and FIG. 3, the memory cell 16 includes a P type semiconductor substrate 17, an N type source diffusion region 18, an N type drain diffusion region 19, a tunnel oxide film 20, a floating gate electrode 21, an insulation film 22, and a control gate electrode 23. The source diffusion region 18 and the drain diffusion region 19 are both formed on the P type semiconductor substrate 17. The tunnel oxide film 20 covers the P type semiconductor substrate 17 between the source diffusion region 18 and the drain diffusion region 19. The floating gate electrode 21 is formed on the tunnel oxide film 20. The insulation film 22 is formed on the floating gate electrode 21. The control gate electrode 23 is formed on the insulation film 22. In the flash memory 2, a plurality of memory cells 16 are connected in series. One memory cell 16 stores data of 1 bit. When the floating gate electrode 21 is not charged with electrons as shown in FIG. 2, the memory cell 16 is in the erase state. On the other hand, when the floating gate electrode 21 is charged with electrons, the memory cell 16 is in the write state. When in the erase state, the memory cell 16 stores data representing a logical value “1”. When in the write state, the memory cell 16 stores data representing a logical value “0”. When a predetermined reading voltage for reading data stored in the memory cell 16 is not applied to the control gate electrode 23 of the memory cell 16 in the erase state, no channel is formed on the surface of the P type semiconductor substrate 17 between the source diffusion region 18 and the drain diffusion region 19. Thus, the source diffusion region 18 and the drain diffusion region 19 are electrically insulated from each other. On the contrary, when a reading voltage is applied to the control gate electrode 23 of the memory cell 16 in the erase state, a channel (not shown) is formed on the surface of the P type semiconductor substrate 17 between the source diffusion region 18 and the drain diffusion region 19. The source diffusion region 18 and the drain diffusion region 19 are electrically connected to each other via the channel. As described above when a reading voltage is not applied to the control gate electrode 23 of the memory cell 16 in the erase state, the source diffusion region 18 and the drain diffusion region 19 are electrically insulated. And when a reading voltage is applied to the control gate electrode 23 of the memory cell 16 in the erase state, the source diffusion region 18 and the drain diffusion region 19 are electrically connected. When the floating gate electrode 21 is charged with electrons as shown in FIG. 3, the memory cell 16 is in the write state. The floating gate electrode 21 is sandwiched between the tunnel oxide film 20 and the insulation film 22. Because of this, once electrons are injected into the floating gate electrode 21, the electrons remain inside the floating gate electrode 21 for quite a long time due to a potential barrier. In the memory cell 16 which is in the write state due to the floating gate electrode 21 being charged with electrons, a channel 24 is formed on the surface of the P type semiconductor substrate 17 between the source diffusion region 18 and the drain diffusion region 19, irrespective of whether a reading voltage is applied to the control gate electrode 23. Thus, when the memory cell 16 is in the write state, the source diffusion region 18 and the drain diffusion region 19 are electrically connected to each other irrespective of whether a reading voltage is applied to the control gate electrode 23. A data reading operation for specifying whether the memory cell 16 is in the erase state or in the write state will be explained below. In the flash memory 2, the plurality of memory cells 16 are connected in series. One of the plurality of memory cells 16 is selected by the controller 3 for reading the data stored therein. A predetermined low level voltage is applied to the control gate electrode 23 attached to the selected one memory cell 16. A predetermined high level voltage (reading voltage) which is higher than the low level voltage is applied to the control gate electrode 23 attached to another memory cell 16 in the plurality of memory cells 16. In this state, a predetermined detector detects whether the series of memory cells 16 are electrically continuous. If the detector detects an electrically continuous state, the selected memory cell 16 is in the write state. If the detector detects an electrically discontinuous state, the selected memory cell 16 is in the erase state. As described above, the flash memory 2 is designed such that stored data representing a logical value “0” or a logical value “1” is read from an arbitrary one of the plurality of memory cells 16 connected in series. For changing the state of the memory cell 16 between the erase state and the write state, an erasing voltage or a writing voltage that is higher than the voltage used for the data reading operation on the memory cell 16 is used. In order to change a memory cell 16 in the erase state to the write state, a writing voltage is applied to the control gate electrode 23 so that the potential of the control gate electrode 23 is higher than the potential of the floating gate electrode 21. Due to this writing voltage, an FN (Fowler-Nordhaim) tunnel current flows between the P type semiconductor substrate 17 and the floating gate electrode 21 via the tunnel oxide film 20. As a result, electrons are injected into the floating gate electrode 21. On the other hand, in order to change a memory cell 16 in the write state to the erase state, an erasing voltage is applied to the control gate electrode 23 so that the potential of the control gate electrode 23 is lower than the potential of the floating gate electrode 21. Due to this erasing voltage, the electrons charged in the floating gate electrode 21 are discharged to the P type semiconductor substrate 17 via the tunnel oxide film 20. A structure for storing data in the flash memory 2 will be explained below. FIG. 4 schematically shows an address space of the flash memory 2. In the structure shown in FIG. 4, the address space of the flash memory 2 is divided based on the units of “page” and “block”. A page is a process unit for a data reading operation and a data writing operation performed in the flash memory 2. A block is a process unit for a data erasing operation performed in the flash memory 2. One page includes a data area 25 having 512 bytes and a redundant area 26 having 16 bytes. The data area 25 stores user data supplied from the host system 4. The redundant area 26 stores additional information representing an error correction code (ECC), a corresponding logical block address, a block status, etc. The error correction code is used for correcting an error included in the data stored in the data area 25. If the number of errors included in the data stored in the data area 25 is equal to or smaller than a predetermined threshold, the errors can be corrected by the error correction code. In this case, the data read from the data area 25 is corrected to proper data by the error correction code. The corresponding logical block address indicates the address of a logical block corresponding to a given block, in a case where this given block includes at least one data area 25 that stores effective data. The logical block address is a block address which is determined based on a host address supplied from the host system 4. On the other hand, an actual block address in the flash memory 2 is referred to as physical block address. In a case where no effective data is stored in any of the data areas 25 included in one block, no corresponding logical block address is stored in the redundant areas 26 included in the block. Therefore, by determining whether a corresponding logical block address is stored in a redundant area 26 or not, it is possible to determine whether or not data has been erased in the block in which this redundant area 26 is included. When no corresponding logical block address is stored in a redundant area 26, the block in which this redundant area 26 is included is in a state where data has been erased. The block status shows whether each block is a defective block that can not properly store data. For example, if a given block is a defective block, a block status flag prepared for the block is set to an on state. In the flash memory 2, the memory cells 16 can not be changed from the write state to the erase state in the cell unit. This state change is available only in the block unit. Therefore, in order to store new data in a given page, block data including the new data has to be written into an erased block first, and then the block erasing has to be performed on the block storing the old data. The block erasing is performed in the block unit. Therefore, in the block including the page that stores the old data, the data stored in all the pages are erased. Accordingly, in order to rewrite stored data in a given page, a process for relocating stored data in the other pages included in the block in which the given page is included to an erased block is required. The block in which the new data for the rewriting is stored is different from the block storing the old data. Therefore, the correspondence between a logical block address specified by an address signal supplied from the host system 4 and a physical block address representing an actual block address in the flash memory 2 needs to be dynamically adjusted by the controller 3, each time data is rewritten in the flash memory 2. From this aspect, the controller 3 can manage the correspondence between a logical block address and a physical block address, by writing additional information representing a logical block address (corresponding logical block address) in the redundant area 26 in accordance with a data writing operation to the data area 25. In the address space of the flash memory 2, a plurality of blocks are classified into one of a plurality of zones. An example of assigning the zones of the flash memory 2 to a logical block address space in the host system 4 will now be explained. In an example shown in FIG. 5, one zone includes 1024 blocks #0 to #1023. Each of the blocks #0 to #1023 includes 32 pages P00 to P31. A block is a process unit for a data erasing operation. A page is a process unit for a data reading operation and a data writing operation. The zone shown in FIG. 5 is assigned to a logical block address space in a predetermined range in the host system 4. For example, the zone including 1024 blocks is assigned to a logical block address space having a data capacity amounting to 1000 blocks. In this example, the storage capacity of one zone is larger than the data capacity of the logical block address space to which the zone is assigned, by a data amount corresponding to 24 blocks. In this assigning manner, defective blocks are taken into consideration. When stored data is rewritten in the flash memory 2, one spare block for writing new data is required. Accordingly, substantially 23 blocks are treated as spare blocks in one zone. The number of blocks included in one zone may be arbitrarily set based on the usage of the flash memory system 1, the specification of the flash memory 2, or the like. An example of how the plurality of blocks are classified into the zones will now be explained. The plurality of blocks in the flash memory 2 may be classified into the zones in the order of physical block addresses. However, in this case, many defective blocks might be classified into a specific zone, due to that the defective blocks are overconcentrated in one part of the flash memory 2. In the flash memory system 1 according to the present invention, a plurality of blocks included in one zone is dispersedly allocated in the flash memory 2, in order to prevent overconcentration of defective blocks in a specific zone. FIG. 6 is a schematic diagram showing a process for classifying the plurality of blocks included in the flash memory 2 to one of a plurality of zones. In FIG. 6, a logical block address LBA supplied from the host system 4 is translated into a virtual block address VBA based on an address translation table 31. For example, the address translation table 31 is stored in the work area 8, and is referred to by the host interface control block 5. The virtual block address VBA is associated with a physical block address PBA by a dispersion process unit 32. For example, it is preferred that the flash sequencer block 12 functions as the dispersion process unit 32 shown in FIG. 6 by executing a predetermined program. A virtual block address VBA is obtained by adding a serial number assigned to each of the plurality of blocks included in one zone to an offset value prepared for the zone. In the example shown in FIG. 7, 1024 blocks are classified into one zone. Thus, in one zone, serial numbers of “0” to “1023” are assigned to the respective blocks. The offset value for the respective zones are as shown below. Zone #0: 0, Zone #1: 1024×1, Zone #2: 1024×2, - - - Zone #N: 1024×N. In a virtual block address space, all the blocks in the flash memory 2 are allocated such that the virtual block address VBA increments by one. In a case where the serial number of the block and the virtual block address VBA are described in a bit data (binary data) format, the virtual block address VBA is obtained by inserting a zone number (binary data) assigned to each zone to higher-order bits than bits for the serial number of the block. In a case where each of the zones #0 to #7 includes 1024 blocks, the serial numbers of the blocks are represented by 10-bit data (from “00 0000 0000” to “11 1111 1111”). 3-bit data (from “000” to “111”) is assigned to the eight zones #0 to #7 as the zone number. In this case, by inserting the zone number to higher-order bits than bits for the serial number of the block, a virtual block address VBA of 13 bits is generated. For example, the virtual block address VBA of the block having a serial number “16” (“00 0001 0000” in the binary notation) in the zone #4 having a zone number “100” is “1 0000 0001 0000” in the binary notation. The dispersion process unit 32 refers to a function or a table prepared in advance, in order to associate the virtual block address VBA with a physical block address PBA. FIG. 7 shows a correlation among the logical block address LBA, the virtual block address VBA, and the physical block address PBA In FIG. 7, a plurality of logical block address spaces each including 1000 blocks are assigned to a plurality of zones #0 to #N each including 1024 blocks, respectively. The minimum value of the virtual block address VBA in a zone #K is larger by 1 than the maximum value of the virtual block address VBA in a zone #(K−1) (1≦K≦N). By this setting of the virtual block address VBA, in the virtual block address space, arbitrary two zones adjacent to each other in the zones #0 to #N are combined via the virtual block address VBA. The virtual block address VBA is associated with the physical block address PBA by the dispersion process unit 32 in accordance with the setting of the function or the table prepared in advance. The function or the table referred to by the dispersion process unit 32 should be set in such a manner as to classify a plurality of blocks having physical block addresses PBA which are greatly different from each other into one of the zones #0 to #7. As a result, zones each including 1024 blocks which are dispersedly allocated in the flash memory 2 can be assigned to logical block address spaces each including 1000 blocks. The dispersion process performed by the dispersion process unit 32 will now be explained below. By performing the dispersion process, a plurality of blocks dispersedly allocated in the flash memory 2 are classified into one of the plurality of zones. In this dispersion process, the dispersion process unit 32 associates the virtual block address VBA with the physical block address PBA. In order to perform the dispersion process, the dispersion process unit 32 uses an address register 33 and a process setting register 34 shown in FIG. 8. For example, the address register 33 and the process setting register 34 may be included in the flash sequencer block 12. The virtual block address VBA is included in each of a plurality of virtual page address assigned to the plurality of pages in the virtual address space in the flash memory 2. A virtual page address includes a virtual block address VBA and a page number of 5 bits. The page number having 5 bits is used for identifying each of 32 pages included in one block. The address register 33 temporarily stores the virtual page addresses. The process setting register 34 stores information representing the correspondence between the virtual block address VBA and the physical block address PBA. The dispersion process unit 32 reads the virtual block address VBA included in the virtual page address stored in the address register 33. Then, the dispersion process unit 32 replaces the virtual block address VBA stored in the address register 33 with a physical block address PBA based on the information stored in the process setting register 34. A physical page address is generated by adding the page number included in the virtual page address stored in the address register 33 to the physical block address PBA generated by the dispersion process unit 32. The generated physical page address is provided to a memory space 35 of the flash memory 2. FIG. 9 shows an operation for generating a physical page address based on a virtual page address stored in the address register 33. The virtual page address shown in FIG. 9 is divided into lowest-order 5-bit data representing the page number, and highest-order 13-bit data representing the virtual block address VBA. The dispersion process unit 32 replaces the highest-order 13-bit data representing the virtual block address VBA with another 13-bit data representing the physical block address PBA. In the example shown in FIG. 9, the highest-order 13-bit data included in the virtual page address represents “0 0001 0001 0001” as the virtual block address VBA. “0 0001 0001 0001” is replaced with “1 1001 1001 1001” as the physical block address PBA by the dispersion process unit 32. In the dispersion process performed by the dispersion process unit 32, the bit data representing the virtual block address VBA is replaced with bit data representing a physical block address PBA, but the 5-bit data representing the page number is not changed. The number of bits representing the virtual block address VBA in the virtual page address is determined in accordance with the number of blocks provided in the flash memory 2. The number of bits representing the page number in the virtual page address is determined in accordance with the number of pages included in one block. For example, in a case where the memory space in the flash memory 2 is divided into 8192 blocks and each block includes 32 pages, the virtual block address VBA is identified by 13-bit data and the page number is identified by 5-bit data. Next, a process for setting the correspondence between the virtual block address VBA and the physical block address PBA will be explained. FIG. 10 shows the correspondence between the virtual block address VBA and the physical block address PBA of a case where the virtual block address VBA is directly assigned to the physical block address PBA. In the example shown in FIG. 10, the dispersion process unit 32 does not perform the dispersion process. In this case, the physical block address PBA owned by each block in the flash memory 2 coincides with the virtual block address VBA. Therefore, the zones #0 to #7 in the virtual address space are assigned to a plurality of physical areas in the flash memory 2 respectively in accordance with the physical block addresses PBA. In this case, for example, if 30 defective blocks are included in a memory area including 1024 memory cells 16 to which “0 0100 0000 0000 (1024)” to “0 0111 1111 1111 (2047)” are assigned as physical block addresses PBA, the 30 defective blocks are classified into the zone #1. In this case, it can not be ensured that all the data supplied to a logical block address space in the host system 4 that corresponds to the zone #1 are properly stored in the flash memory 2. If the defective blocks are eliminated from effective blocks used for storing data, the blocks used as effective blocks in the zone #1 are short. If a defective block is assigned to a part of the logical block address space, the data that the host system 4 supplies to this part can not be properly stored in the flash memory 2. The flash memory system 1 according to the present invention sets the correspondence between the virtual block address VBA and the physical block address PBA in a manner that the number of defective blocks to be classified into each of the plurality of zones is averaged. For example, the flash memory system 1 has a plurality of replacement tables describing the correspondence between virtual block addresses VBA and physical block addresses PBA. The plurality of replacement tables may be pre-stored in a ROM (Read Only Memory) for storing fixed data and programs in the controller 3. Or, the plurality of replacement tables may be pre-stored in a predetermined storage area in the flash memory 2 and read by the controller 3. FIG. 11 shows an example of a replacement table. The replacement table associates virtual block addresses VBA with physical block addresses PBA. In order to perform the dispersion process, the flash memory system 1 selects one of the replacement tables that minimizes the maximum number of defective blocks to be classified into each zone. To select one of the plurality of replacement tables, the controller 3 detects all the defective blocks in the flash memory 2, and specifies the virtual block address VBA corresponding to each defective block in accordance with one of the replacement tables. Then, the controller 3 counts the number of defective blocks included in each zone, based on the physical block addresses VBA corresponding to the defective blocks. The controller 3 detects the replacement table that minimizes the maximum number of defective blocks classified into each zone, by referring to the counting result of each replacement table. In order to specify zones into which defective blocks are classified, the controller 3 searches for the physical block addresses PBA assigned to the defective blocks in the replacement table. When a physical block address PBA assigned to a defective block is detected, the virtual block address VBA associated with the detected physical block address PBA is read from the replacement table. Each set of 1024 virtual block addresses VBA is assigned to one of the plurality of zones. Therefore, one zone is specified for one virtual block address VBA assigned to one defective block. For example, defective blocks detected by the controller 3 have physical block addresses PBA shown in FIG. 12. “0 0100 0000 0001” indicated at the top as a physical block address PBA of a defective block in the list of defective blocks shown in FIG. 12 is described in the replacement table shown in FIG. 11 in the eighth row from the top in the column indicating the physical block addresses PBA. Accordingly, “0 0000 0000 0111” is specified as the virtual block address VBA of the defective block corresponding to “0 0100 0000 0001” as the physical block address PBA. “0 0100 0000 0001” as the physical block address PBA is included in a virtual address range of “0 0000 0000 0000” to “0 0011 1111 1111” assigned to the zone #0. In this manner, the defective block indicated at the top in FIG. 12 is specified as being classified into the zone #0. In a case where 8192 blocks in the flash memory 2 are classified into 8 zones as shown in FIG. 13, variables Nb0 to Nb7 are calculated as the total numbers of defective blocks classified into the zones #0 to #7, respectively. The maximum value among the variables Nb0 to Nb7 represents the maximum number of defective blocks to be classified into each zone. For example, each of the variables Nb0 to Nb7 is calculated as follows. Nb0=5, Nb1=3, Nb2=8, Nb3=2, Nb4=6, Nb5=4, Nb6=9, Nb7=7. In this case, the variable Nb6 representing the number of defective blocks to be classified into the zone #6 is the maximum value among the variables Nb0 to Nb7. Therefore, “9” represented by the variable Nb6 is the maximum number of defective blocks to be classified into each zone. After the maximum number of defective blocks to be classified into each zone is specified for all of the plurality of replacement tables, one of the replacement tables that minimizes the maximum number is selected for performing the dispersion process. For example, the flash memory system 1 has five replacement tables Tb1 to Tb5. The maximum value among the variables Nb0 to Nb7 calculated for the replacement table Tb1 is Nb3=9. The maximum value among the variables Nb0 to Nb7 calculated for the replacement table Tb2 is Nb6=8. The maximum value among the variables Nb0 to Nb7 calculated for the replacement table Tb3 is Nb7=10. The maximum value among the variables Nb0 to Nb7 calculated for the replacement table Tb4 is Nb0=15. The maximum value among the variables Nb0 to Nb7 calculated for the replacement table Tb5 is Nb4=6. In this case, the replacement table Tb5 is selected as the table that minimizes the maximum number of defective blocks. The replacement table selected for performing the dispersion process is specified by the information stored in the process setting register 34 shown in FIG. 8. The replacement table selected in this manner is referred to by the dispersion process unit 32 for replacing the virtual block addresses VBA with physical block addresses PBA. The correspondence between the virtual block address VBA and the physical block address PBA may be set by a function prepared in advance. In this case, the controller 3 pre-stores information defining plural kinds of functions in the flash memory system 1. The controller 3 selects the function that minimizes the maximum number of defective blocks to be classified into each zone. The functions defined in the controller 3 are for generating a one to one mapping between the virtual block address space and the physical block address space. The zones into which defective blocks are classified can be specified by an inverse function of the function used in the dispersion process performed by the dispersion process unit 32. It is preferred that the mapping generated by the functions defined in the controller 3 draws a cyclic orbit. In other words, it is preferred that the functions defined in the controller 3 have a predetermined mapping cycle. As one example of a mapping for generating a cyclic orbit, a tent mapping may be employed. A tent mapping is performed by using a function F(x) which is defined by the following equations (1) and (2). In a case where a variable “x” satisfies 0≦x<2(n−1), F(x)=2x (1) In a case where a variable “x” satisfies 2(n−1)≦x<2n, F(x)=−2x+2(n+b) (2) The blocks, which are the target of dispersion process, are assigned serial numbers sequentially from 0. In the equations (1) and (2), the variable “n” is substituted for by a number of digits necessary for representing the serial numbers assigned to the blocks in the format of binary code. For example, in a case where 8192 blocks are the target of the dispersion process, the maximum value “8191” among the serial numbers assigned to the blocks is represented as “1 1111 1111 1111” in the format of binary code. At this time, “13” is substituted for the variable “n”. The functional value obtained by performing n+1 times of conversions using the function F(x) represented by the equations (1) and (2) coincides with the original value. In other words, the mapping generated by the function F(x) represented by the equations (1) and (2) has a recurring cycle T=n+1. For example, when “4” is substituted for the variable “n” and “1” as the original value is substituted for the variable “x”, the functional value obtained by performing conversion five times using the function F(x) coincides with the original value “1”, as shown below. F(1)=2×1=2, F(2)=2×2=4, F(4)=2×4=8, F(8)=−2×8+32−1=15, F(15)=−2×15+32−1=1. Let it be assumed that variables “a” and “b” representing the number of times conversion using the function F(x) is performed have a relationship represented by the following equation (3). a+b=n+1 (3) In this case, since the mapping generated by the function F(x) represented by the equations (1) and (2) has the recurring cycle T=n+1, “a” times of conversions using the function F(x) are the inverse conversion of the “b” times of conversions. For example, when “4” is substituted for the variable “n” and “1” is substituted for the variable “x” as the original value, a functional value “4” is obtained by performing conversion using the function F(x) twice. And when “4” is substituted for the variable “n” and “4” is substituted for the variable “x” as the original value, a functional value “1” is obtained by performing conversion using the function F(x) three times. It is preferred that the recurring cycle T of the mapping generated by the function F(x) and the total number M of blocks classified into each zone satisfy the relationship represented by the following equation (4). M=2(T−1) (4) FIG. 13 shows an example of a mapping using the function F(x) represented by the equations (1) and (2) between the virtual block address space and the physical block address space. In FIG. 13, the physical block address space in the flash memory 2 is divided into 8192 blocks. In order to perform the dispersion process using the function F(x) represented by the equations (1) and (2), a monitor register 36 shown in FIG. 14 for checking an output from the dispersion process unit 32 is used. Information representing a conversion performance number, which indicates the number of times conversion using the function F(x) is performed, is stored in the process setting register 34. In a case where 8192 blocks are included in the flash memory 2, the variable in the function F(x) is set to “13”. The conversion performance number represented by the information stored in the process setting register 34 exists in the range of “0” to “13”. The conversion performance number is set to a value that minimizes the maximum number of defective blocks to be classified into each zone. The conversion performance number that minimizes the maximum number of defective blocks to be classified into each zone is determined in a manner described below. First, the controller 3 detects all the defective blocks included in the flash memory 2. In this detection process, information representing “0” is set in the process setting register 34 as the conversion performance number. That is, in a state where the virtual block addresses VBA are directly converted to the physical block addresses PBA, the controller 4 detects defective blocks by erasing, writing, reading, etc. of data in the flash memory 2. Then, the dispersion process unit 32 sets information representing “1” in the process setting register 34 as the conversion performance number, and after this, generates the mapping of the function F(x) by setting the physical block addresses PBA assigned to the defective blocks detected in the above-described detection process as the variable “x”. The monitor register 36 stores results of conversion performed by the dispersion process unit 32. The values stored in the monitor register 36 are read as the virtual block addresses VBA of the defective blocks. The controller 3 counts the number of defective blocks included in each zone based on the virtual block addresses VBA of the defective blocks. The controller 3 updates the information stored in the process setting register 34 in a manner that the conversion performance number increments by 1. Each time a mapping group corresponding to the conversion performance number represented by the information stored in the process setting register 34 is generated by the dispersion process unit 32, the controller 3 counts the number of defective blocks included in each zone. The controller 3 detects the conversion performance number that minimizes the maximum number of defective blocks to be classified into each zone, by referring to the results of counting corresponding to the respective conversion performance numbers. For example, let it be assumed that the maximum number of defective blocks in each zone is specified as described below in accordance with the respective numbers of times the conversion using the function F(x) is performed. When the conversion performance number is 1, the maximum number among the variables Nb0 to Nb7 is Nb4=8. When the conversion performance number is 2, the maximum number among the variables Nb0 to Nb7 is Nb6=10. When the conversion performance number is 3, the maximum number among the variables Nb0 to Nb7 is Nb1=9. When the conversion performance number is 4, the maximum number among the variables Nb0 to Nb7 is Nb5=11. When the conversion performance number is 5, the maximum number among the variables Nb0 to Nb7 is Nb3=13. When the conversion performance number is 6, the maximum number among the variables Nb0 to Nb7 is Nb2=9. When the conversion performance number is 7, the maximum number among the variables Nb0 to Nb7 is Nb0=8. When the conversion performance number is 8, the maximum number among the variables Nb0 to Nb7 is Nb6=6. When the conversion performance number is 9, the maximum number among the variables Nb0 to Nb7 is Nb4=8. When the conversion performance number is 10, the maximum number among the variables Nb0 to Nb7 is Nb7=10. When the conversion performance number is 11, the maximum number among the variables Nb0 to Nb7 is Nb2=7. When the conversion performance number is 12, the maximum number among the variables Nb0 to Nb7 is Nb0=9. When the conversion performance number is 13, the maximum number among the variables Nb0 to Nb7 is Nb3=12. In this case, the maximum number of defective blocks to be classified into each zone is minimized when the conversion performance number is 8. When the number of defective blocks classified into each zone is counted, the physical block addresses PBA of the defective blocks are converted to the virtual block addresses VBA. On the contrary, when the virtual block addresses VBA are converted to the physical block addresses PBA, inverse conversion of the conversion performed the number of times corresponding to the above-described conversion performance number is performed. Based on the variable “a” and variable “b” satisfying the equation (3), the mapping obtained by repeating the conversion using the function F(x) “b” times is the inverse mapping of the mapping obtained by repeating the conversion using the function F(x) “a” times. Accordingly, when the conversion performance number which is specified by the conversion from the physical block addresses PBA to the virtual block addresses VBA and which minimizes the maximum number of defective blocks is represented by the variable “a”, the virtual block addresses VBA are converted to the physical block addresses PBA in a manner that the maximum number of defective blocks is minimized, by repeating the conversion the number of times corresponding to the variable “b” which is specified by the following equation (5). b=n+1−a (5) In the above-described example, the variable “b” is specified as “6” in accordance with the variable n=13, and the variable a=8. Thus, information representing “6” is set in the process setting register 34 as the conversion performance number. When there is a request from the host system 4 for access to the flash memory 2, the controller 3 sets information representing the conversion performance number in the process setting register 34, and after this, starts a data reading operation, a data writing operation, etc. based on the information set in the address register 33 and representing the virtual page addresses. The dispersion process unit 32 replaces the part representing the virtual block addresses VBA in the virtual page addresses with the physical block addresses PBA, in accordance with the request from the host system 4. The physical page addresses generated by the dispersion process unit 32 are supplied to the memory space 35 of the flash memory 2. When block erasing is to be executed, by setting information representing the virtual block addresses VBA in the address register 33, the physical block addresses PBA are supplied to the memory space 35 of the flash memory 2. When the virtual block address space is divided into many zones, each zone may be classified into one of a plurality of groups. In this case, the dispersion process unit 32 may perform conversion between the virtual block addresses VBA and the physical block addresses PBA in the unit of group. For example, in a case where 32 zones are classified into 4 groups, the dispersion process unit 32 performs conversion between the virtual block addresses VBA and the physical block addresses PBA by each 8 zones. In a case where the flash memory 2 includes a plurality of memory chips, the dispersion process unit 32 may perform conversion between the virtual block addresses VBA and the physical block addresses PBA chip by chip. The settings for the replacement tables, the function, the conversion performance number, etc, may be different group by group or chip by chip. The function for defining the correspondence between the virtual block addresses VBA and the physical block addresses PBA may be arbitrarily set. For example, the function may be an arbitrary mapping function for forming a cyclic orbit, such as a Bernoulli mapping. When a data reading operation or a data writing operation is performed based on the information stored in the address register 33 shown in FIG. 14, it is preferred that the controller 3 provides the host system 4 with access to the flash memory 2 by using an address translation table representing the correspondence between the logical block addresses LBA and the virtual block addresses VBA. The address translation table is generated by the controller 3 in accordance with each of the plurality of zones. For example, in the address translation table, the serial numbers assigned to the respective blocks in the virtual block address space are described in the order of the logical block addresses LBA as shown in FIG. 15. The serial numbers assigned to the respective blocks in the virtual block address space are converted to the virtual block addresses VBA by inserting the zone number into the higher-order bits than the bits for the serial numbers. For example, in the zone #0, a virtual block address VBA corresponding to the zone #0 is generated by inserting “000” in the format of binary code into the higher-order bits than the bits for the serial number. The address translation table also includes information representing an “empty” flag. The empty flag makes it possible to identify whether data is stored in a block corresponding to a logical block address LBA. In the example shown in FIG. 15, by the empty flag indicating “1”, it is identified that there is no virtual block address VBA that corresponds to a logical block address LBA. No data is stored in the logical block address LBA that has no associated virtual block address VBA in the address translation table. When the controller 3 generates such an address translation table as shown in FIG. 15, first, an area for storing serial numbers and empty flags corresponding to 1,000 blocks are secured in the work area 8. At this time, the stored data in the secured area are all set to a logical value “1”. Then, in the range for which the address translation table manages the correspondence between the virtual block addresses VBA and the logical block addresses LBA, the stored data in the redundant areas 26 are read in the order of the virtual block addresses VBA. If the stored data in a give redundant area 26 represents a specific logical block address LBA as the corresponding logical block address, the serial number of the block is written in the row of this logical block address in the address translation table. Further, the empty flag corresponding to the logical block address LBA is set to a logical block value “0”. The controller 3 can convert the virtual block address VBA into the serial number of the block by removing the bits representing the zone number from the virtual block address VBA. In the address translation table, in the row of a logical block address LBA which is not represented by the stored data in any redundant area 26, the empty flag is kept at the logical value “1” as the initial setting. When the stored data in the flash memory 2 is rewritten, an erased block in which data for rewriting that includes new data is to be written needs to be specified. A process for specifying an erased block will now be explained below. In this process, a search table 40 shown in FIG. 16A is used. In this search table 40, each of a plurality of bits shown is associated with one of the virtual block addresses VBA of the plurality of blocks which are classified into specific zones respectively. It is preferred that a plurality of the search tables 40 are generated by the controller 3 in accordance with the plurality of zones. In the example shown in FIG. 16A, the virtual block addresses VBA increments in the rightward direction and in the downward direction in the search table 40. For example, the bit in the uppermost and leftmost section in the search table 40 shown in FIG. 16A is associated with the first virtual block address VBA in the zone corresponding to this search table 40. The bit in the lowermost and rightmost section in the search table 40 shown in FIG. 16A is associated with the last virtual block address VBA in the zone corresponding to this search table 40. The bit representing a logical value “0” in the search table 40 shown in FIG. 16A indicates that the block having the virtual block address VBA which is associated with this bit either stores data or is a defective block. The bit representing a logical value “1” in the search table 40 indicates that the block having the virtual block address VBA which is associated with this bit is in the erased state. The search table 40 can be generated at the same time as the address translation table is generated. For example, in the search table 40, the logical value “0” is set for all the bits as the initial state. After this, the controller 3 determines for each block having the virtual block address VBA associated with one of the bits whether a corresponding logical block address or a block status, which represents that the concerned block is a defective block, is stored in the redundant area 26 or not. If the controller 3 determines that neither a corresponding logical block address nor a block status representing that the block is a defective block is stored, the bit corresponding to the virtual block address VBA of the concerned block is set to the logical value “1”. In this manner, in the search table 40, only the bits which are associated with erased blocks are set to the logical value “1”, while the other bits are kept at the logical value “0”. When data is written in an erased block after the search table 40 is generated, the bit associated with this block is updated from the logical value “1” to the logical value “0” in the search table 40. When block erasing is executed on the block which has been storing data, the bit associated with this block is updated from the logical value “0” to the logical value “1” in the search table 40. A process for searching for an erased block by using the search table 40 will now be explained with reference to FIG. 16B. In this process, the controller 3 scans the search table 40 in the direction advancing from the bit in the upper/leftmost section which is associated with the first virtual block address VBA in a specific zone towards the bit in the lower/rightmost section which is associated with the last virtual block address VBA in the zone. For example, the controller 3 sequentially checks the bits from the left to the right in a given row in the search table 40, and then likewise checks the bits in the row right under the given row. The controller 3 detects a bit that represents the logical value “1” corresponding to an erased block. In the search table 40 shown in FIG. 16B, a bit representing the logical value “1” is detected in the fourth row, the fifth column. In response to that the bit representing the logical value “1” is detected, the controller 3 finishes searching in the search table 40. At this time, the controller 3 specifies the virtual block address VBA associated with this bit representing the logical value “1”. The controller 3 writes data for rewriting that includes new data in the block having the thusly specified virtual block address VBA. The bit next to the end point of the searching may be the start point in the next searching process. For example, in the search table 40 shown in FIG. 16B, the next searching process is started with the start point set in the fourth row, sixth column. In the searching process, after the lower/rightmost bit is checked, the checking operation returns to the upper/leftmost bit. A data reading operation for reading data from the flash memory 2 in response to a request from the host system 4 will now be explained below. In this data reading operation, a logical block address LBA which is designated by an address signal output from the host system 4 to the controller 3 is converted into a virtual block address VBA with the use of the address translation table shown in FIG. 15. The following information is set in the plurality of registers owned by the flash sequencer block 12. First, an internal read command is set as an internal command in a predetermined first register (not shown) in the flash sequencer block 12. Second, a virtual page address including a virtual block address VBA specified by the address translation table and 5-bit data (in case of one block including 32 pages) representing a page number is set in the address register 33 shown in FIG. 8 and in FIG. 14. Based on the above-described information set for the data reading operation, the flash sequencer block 12 controls the flash memory interface 10 in accordance with the internal command. The flash memory interface block 10 supplies information representing the internal command, information representing the address, etc. to the flash memory 2 via the internal bus 14. The virtual page address is converted into a physical page address by the dispersion process unit 32 shown in FIG. 8 and FIG. 14. Accordingly, the information supplied to the flash memory 2 represents a physical page address. In the flash memory 2, data stored in a data area corresponding to the physical page address specified by the information supplied from the controller 3 is read. The data read from the flash memory 2 is transferred to the buffer 9 via the internal bus 14. As a result, the data which has been stored in the data area having the physical page address associated with the virtual page address set in the address register 33 is retained in the buffer 9. Next, a data writing operation for writing data in the flash memory 2 in response to a request from the host system 4 will now be explained below. In this data writing operation, the following information is set in the plurality of registers owned by the flash sequencer block 12. First, an internal write command is written in the first register in the flash sequencer block 12 as an internal command. Second, a virtual page address including a virtual block address VBA of an erased block which is specified by the search table 40 and 5-bit data (in case of one block including 32 pages) representing a page number is set in the address register 33 shown in FIG. 8 and FIG. 14. Based on the above-described information set for the data writing operation, the flash sequencer block 12 controls the flash memory interface block 10 in accordance with the internal command. The flash memory interface block 10 supplies the information representing the internal command, the information representing the address, etc. to the flash memory 2 via the internal bus 14. The virtual page address is converted into a physical page address by the dispersion process unit 32 shown in FIG. 8 and FIG. 14. or a plurality of functions. Due to this, even in a case where many defective blocks exist in a certain part of the flash memory 2, the controller 3 can properly store data supplied from the host system 4 in each of the plurality of zones. Modifications and applications of the present invention are available in various manners. For example, the dispersion process unit 32 shown in FIG. 6 may be provided in the flash memory 2. The controller 3 may control data exchange between the flash memory 2 and the host system 4 independently from the flash memory system 1. The controller 3 may be built in the host system 4. The address register 33 and the process setting register 34 may be replaced with arbitrary memories such as an SRAM, a DRAM (Dynamic RAM), etc. Various embodiments and changes may be made thereunto without departing from the broad spirit and scope of the invention. The above-described embodiment is intended to illustrate the present invention, not to limit the scope of the present invention. The scope of the present invention is shown by the attached claims rather than the embodiment. Various modifications made within the meaning of an equivalent of the claims of the invention and within the claims are to be regarded to be in the scope of the present invention. This application is based on Japanese Patent Application No. 2003-435662 filed on Dec. 26, 2003 and including specification, claims, drawings and summary. The disclosure of the above Japanese Patent Application is incorporated herein by reference in its entirety. Accordingly, the information supplied to the flash memory 2 represents a physical page address. The flash memory interface block 10 transfers data in the buffer 9 to the flash memory 2 via the internal bus 14. As a result, the data supplied from the controller 3 to the flash memory 2 is written in the data area having the physical page address associated with the virtual page address set in the address register 33. In the above-described data writing operation, if old data that should be erased is stored in the flash memory 2, a data erasing operation for the block storing the old data is performed after the data writing operation. The virtual block address VBA of the block storing the old data can be specified by using the address translation table shown in FIG. 15. In this data erasing operation, the following information is set in the plurality of registers of the flash sequencer block 12. First, an internal erase command is registered in the first register of the flash sequencer block 12 as an internal command. Second, a virtual page address including a virtual block address VBA of the block storing the old data and 5-bit data (in case of one block including 32 pages) representing a page number is set in the address register 33 shown in FIG. 8 and FIG. 14. Based on the above-described information set for the data erasing operation, the flash sequencer block 12 controls the flash memory interface block 10 in accordance with the internal command. The flash memory interface block 10 supplies the information representing the internal command corresponding to the data erasing operation, the information representing the address, etc. to the flash memory 2 via the internal bus 14. The virtual page address is converted into a physical page address by the dispersion process unit 32 shown in FIG. 8 and FIG. 14. Accordingly, the information supplied to the flash memory 2 represents a physical page address. As a result, the controller 3 completes the data erasing operation on the block which has been storing the old data in the flash memory 2. The controller 3 performs a process for minimizing the maximum number of defective blocks to be classified into each zone by using a plurality of replacement tables
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a flash memory controller, a flash memory system having the controller, and a method of controlling an operation for data exchange between a host system and a flash memory. 2. Description of the Related Art Recently, a flash memory is widely employed as a semiconductor memory used in a memory system such as a memory card and a silicon disk. The flash memory is one type of non-volatile memories. It is required that the data stored in the flash memory be retained in the flash memory even when electricity is not supplied to the flash memory. A NAND type flash memory is one type of flash memories often used in the aforementioned memory system. Each of a plurality of memory cells included in a NAND type flash memory can be changed from an erase state where data representing a logical value “1” is stored, to a write state where data representing a logical value “0” is stored, independently from the other memory cells. On the contrary, in a case where at least one of the plurality of memory cells needs to be changed from the write state to the erase state, each memory cell can not be changed independently from the other memory cell. In this case, all of a predetermined number of memory cells which are collectively referred to as a block need to be changed to the erase state. This simultaneous erasing operation is generally referred to as “block erasing”. The block on which the block erasing has been performed is referred to as an erased block. Due to the above-described characteristic, overwriting of data is not available in the NAND type flash memory. In order to rewrite data stored in a memory cell, block data including new data needs to be written in an erased block first, and then block erasing needs to be performed on the block storing the old data. The rewritten data is stored in a block which is different from the block in which the data before being rewritten was stored. Therefore, the correspondence between a logical block address specified by an address signal supplied from a host system and a physical block address representing the actual block address in the flash memory is dynamically adjusted by a controller each time data is rewritten in the flash memory. For example, the correspondence between the logical block address and the physical block address is described in an address translation table prepared in the controller. If the correspondence between the logical block addresses and the physical block addresses of all the blocks included in the flash memory is described in an address translation table, the address translation table has to have a large size in accordance with the flash memory having a large data capacity. In order to generate an address translation table having a large size, a large system resource and a long process time are consumed. To solve this problem, Unexamined Japanese Patent Application KOKAI Publication No. 2000-284996 discloses a technique for dividing a memory space in the flash memory into a plurality of zones, and generating an address translation table for the blocks assigned to each zone. Unexamined Japanese Patent Application KOKAI Publication No. 2002-73409 discloses an address translation method for preventing an increase in the memory capacity that is required for using the address translation table, by copying a part of the address translation table stored in the flash memory to a memory space in a RAM. Unexamined Japanese Patent Application KOKAI Publication No. 2003-15946 discloses a memory controller which can perform a series of data writing operations in a flash memory parallely. The memory controller disclosed in this publication is designed to use a plurality of virtual blocks which are formed by virtually combining a plurality of physical blocks belonging to different blocks from each other. In such a flash memory as disclosed in Unexamined Japanese Patent Application KOKAI Publication No. 2000-284996 having a memory space which is divided into a plurality of zones, existence of a defective block should be taken into consideration for assigning the zones to data areas included in a host system. In other words, it is preferred that the storage capacity of a zone to be assigned to a data area in a predetermined range included in the host system is designed larger than the upper limit of the amount of data to be handled in the data area. At this time, at least one spare block (redundant block) is provided in each zone, such that the ratio of the spare block to all the blocks in the zone is a predetermined value. However, if many defective blocks exist in one part of a flash memory, the defective blocks concentrate in a zone to which this part is assigned. In a case where the number of defective blocks included in a zone is larger than the number of spare blocks included in this zone, no erased block can be secured and the operation is forced to stop. In a case where many defective blocks concentrate in a specific zone as described above, even though the total number of defective blocks in the flash memory does not exceed the tolerable number for the proper operation, there might be caused a zone that can not store data properly.
<SOH> SUMMARY OF THE INVENTION <EOH>An object of the present invention is to suppress occurrence of an error in a flash memory, in a case where many defective blocks exist in one part of the flash memory. A memory controller according to a first aspect of the present invention comprises: a managing module which is so constituted as to manage a correspondence between a virtual address space of a flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification controlling module which determines blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The classification controlling module may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The classification controlling module may select one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones, by referring to the selected association table. The classification controlling module may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function. The function may have a predetermined mapping cycle. The classification controlling module may determine blocks to be classified into each of the plurality of zones, by setting a number of times conversion by the function is performed. The function may be a function for generating a tent mapping. In a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of the plurality of zones is N, T and N may satisfy a following relationship in-line-formulae description="In-line Formulae" end="lead"? N= 2 (T−1) . in-line-formulae description="In-line Formulae" end="tail"? The classification controlling module may have in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using one of the plurality of functions. The classification controlling module may select one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones by using the selected function. The memory controller may further comprise a main processor which supplies a logical address of a block to the managing module in order to request an access to the flash memory. A flash memory system according to a second aspect of the present invention comprises: a non-volatile flash memory; a managing module which is so constituted as to manage a correspondence between a virtual address space of the flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in a host system; and a classification managing module which determines blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The classification controlling module may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The classification controlling module may select one of the plurality of association tables so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones, by referring to the selected association table. The classification controlling module may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function. The function may have a predetermined mapping cycle. The classification controlling module may determine blocks to be classified into each of the plurality of zones, by setting a number of times conversion by the function is performed. The function may be a function for generating a tent mapping. In a case where a recurring cycle of the tent mapping is T, and a total number of blocks to be classified into any of the plurality of zones is N, T and N may satisfy a following relationship in-line-formulae description="In-line Formulae" end="lead"? N= 2 (T−1) . in-line-formulae description="In-line Formulae" end="tail"? The classification controlling module may have in advance a plurality of functions for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using one of the plurality of functions. The classification controlling module may select one of the plurality of functions, so as to minimize a maximum number of defective blocks to be classified into each of the plurality of zones, and may determine blocks to be classified into each of the plurality of zones by using the selected function. A method according to a third aspect of the present invention is a method of controlling an operation for exchanging data between a host system and a flash memory, and comprises: managing a correspondence between a virtual address space of the flash memory which is divided into a plurality of zones each including a predetermined number of blocks, and a logical address space in the host system; and determining blocks to be classified into each of the plurality of zones, by managing a correspondence between virtual addresses and physical addresses of blocks to be classified into each of the plurality of zones. The method may have in advance a plurality of association tables for associating virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by referring to one of the plurality of association tables. The method may have in advance a function for generating a one-to-one mapping, so as to associate virtual addresses of blocks to be classified into each of the plurality of zones with physical addresses in the flash memory, and may determine blocks to be classified into each of the plurality of zones, by using the function.
20040304
20071009
20050630
65349.0
0
YU, JAE UN
MEMORY CONTROLLER, FLASH MEMORY SYSTEM, AND METHOD OF CONTROLLING OPERATION FOR DATA EXCHANGE BETWEEN HOST SYSTEM AND FLASH MEMORY
UNDISCOUNTED
0
ACCEPTED
2,004
10,794,612
ACCEPTED
Headwear piece with associated rim
A headwear piece has a crown defining a receptacle for the head of a wearer and a rim projecting angularly away from the crown. The rim has a core layer that is made from at least one of an animal hide and a synthetic animal hide, and a second layer. The core layer has an upwardly facing surface and a downwardly facing surface and at least part of one of the upwardly facing surfaces and downwardly facing surfaces is covered by the second layer.
1. A headwear piece comprising: a crown defining a receptacle for the head of a wearer; and a rim projecting angularly away from the crown, wherein the rim comprises: i) a core layer that is made from at least one of: a) an animal hide, and b) a synthetic animal hide, and ii) a second layer, wherein the core layer has an upwardly facing surface and a downwardly facing surface, and at least a part of one of the upwardly and downwardly facing surfaces is covered by the second layer. 2. The headwear piece according to claim 1 wherein the first layer has a thickness in the range of 1/16- 1/4 inch. 3. The headwear piece according to claim 1 wherein the second layer is applied to the upwardly facing surface of the core layer. 4. The headwear piece according to claim 3 wherein the second layer comprises a cloth material. 5. The headwear piece according to claim 3 wherein the second layer comprises at least one of: a) an animal hide; and b) a synthetic animal hide. 6. The headwear piece according to claim 1 wherein the second layer is applied to the downwardly facing surface of the core layer. 7. The headwear piece according to claim 6 wherein the second layer comprises a cloth material. 8. The headwear piece according to claim 3 wherein there is a third layer applied to the downwardly facing surface of the core layer and at least one of the second and third layers comprises a cloth material. 9. The headwear piece according to claim 8 wherein both of the second and third layers comprise a cloth material. 10. The headwear piece according to claim 2 wherein the upwardly facing surface of the rim has an area and the core layer extends continuously over substantially the entire area of the upwardly facing surface of the rim. 11. The headwear piece according to claim 1 wherein the rim extends fully around the crown. 12. The headwear piece according to claim 1 wherein the rim extends around only a portion of the crown. 13. The headwear piece according to claim 1 wherein the headwear piece is a baseball-style cap. 14. The headwear piece according to claim 1 wherein the crown has a top opening through which a top region of a wearer's head is exposed with the headwear piece operatively positioned on a wearer's head. 15. The headwear piece according to claim 3 wherein the core and second layers are joined to each other. 16. The headwear piece according to claim 3 wherein the core and second layers are joined to each other by at least one of an adhesive and stitching. 17. The headwear piece according to claim 6 wherein the core and second layers are joined to each other by at least one of an adhesive and stitching. 18. The headwear piece according to claim 8 wherein the core layer is joined to each of the second and third layers by at least one of an adhesive and stitching. 19. The headwear piece according to claim 1 wherein the rim has a thickness and the core layer has a thickness equal to at least 12 of the thickness of the rim. 20. The headwear piece according to claim 19 wherein the core layer has a thickness equal to at least ⅔ the thickness of the rim. 21. The headwear piece according to claim 1 wherein the core layer comprises a dressed animal hide. 22. The headwear piece according to claim 1 wherein the second layer is made from at least one of: a) an animal hide; and b) a synthetic animal hide. 23. The headwear piece according to claim 1 wherein the second layer covers substantially the entirety of the at least one of the upwardly and downwardly facing surfaces.
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to headwear and, more particularly, to a headwear piece having a crown and a rim projecting angularly away from an external surface of the crown. 2. Background Art One of the most popular pieces of headwear is the baseball-style cap. The baseball-style cap has an inverted, cup-shaped crown to receive the head of a wearer and a forwardly projecting bill/rim which is directed angularly away from the crown at a front portion thereof. Baseball-style caps have continued to evolve, appealing to an ever-increasing base of consumers. What once was designed primarily for baseball players has become regular garb for many on a day-to-day basis. The popularity of the baseball-style cap has made it the focus of many headwear designers. While the basic configuration has remained the same over the decades, many modifications have been devised in terms of the materials used to construct the cap, the manner of assembling the cap, the adornment thereon, etc. The market for baseball-style caps is highly competitive and continues to inspire those involved therein to make new developments to appeal to an even larger consumer group. One particularly desirable feature of the baseball-style cap is that, while highly functional, it has an unobtrusive configuration and is light in weight. The crown affords the wearer an effective barrier against the elements, with the rim, in addition to shielding the user's face from rain, and the like, shades the user's eyes from sunlight in a manner that does not significantly obstruct the user's forward and peripheral vision. By reason of its construction, the baseball-style cap also lends itself to being compactly transported by the wearer, when not in use. Typically, the crown is constructed from sewn cloth gores. The crown can be very simply folded or pressed into a compact state. Once the cap is replaced on the wearer's head, the crown assumes a neat conforming shape that generally does not appear wrinkled, creased, or otherwise disfigured to evidence the compaction. The most significant impediment to compaction of the baseball-style cap is the rim. Typically, the rim includes a core layer that is sufficiently shape retentive that the crown will have a relatively consistent, bowed shape which produces a convex curvature at the top, exposed surface of the rim. It is common to construct the core layer of the rim from plastic, cardboard, or other like material that tends to retain a shape into which it is formed at manufacture. In competition with the objective of having a shape-retaining rim is that of allowing the rim to be reconfigured compactly when the headwear is not in use. Ideally, the rim would be either foldable or rollable towards, or into, a compact cylindrical shape around a fore-and-aft axis. However, as the rim is folded or bent towards the cylindrical shape, there is a significant resistance due to the stiff nature of the material defining the core layer of the rim. As a result, a significant compaction of the rim may cause a permanent deformation of the core layer. In a worst case, the core layer may rupture. In either event, a permanent deformation of the rim may be imparted, which detracts significantly from the appearance of the cap. One solution to this problem is presented in U.S. Pat. No. 6,076,192, owned by the assignee herein. In this patent, the core of the bill/rim is made from a resilient layer which has shape-retentive characteristics but is also readily conformable. The industry continues to seek out rim constructions that will be sufficiently shape retentive to maintain a desired appearance for the headwear, yet which can be deformed for compaction, as when it is desired to store or transport the cap. SUMMARY OF THE INVENTION The invention is directed to a headwear piece having a crown defining a receptacle for the head of a wearer and a rim projecting angularly away from the crown. The rim has a core layer, that is made from at least one of an animal hide and a synthetic animal hide, and a second layer. The core layer has an upwardly and downwardly facing surface. At least part of one of the upwardly and downwardly facing surfaces is covered by the second layer. In one form, the core layer has a thickness in the range of 1/16- 1/4 inch. In one form, the second layer is applied to the upwardly facing surface of the core layer. The second layer may be a cloth material. Alternatively, the second layer may be at least one of an animal hide and a synthetic animal hide. In another form, the second layer is applied to the downwardly facing surface of the core layer. The second layer applied to the downwardly facing surface of the core layer may be a cloth material. In one form, there are separate layers applied to the upwardly facing surface and the downwardly facing surface of the core layer. One or both of the layers applied to the core layer may be made from a cloth material. In one form, an upwardly facing surface of the rim has an area and the core layer extends continuously over substantially the entire area of the upwardly facing surface of the rim. The rim may extend around only a portion of the crown or fully around the crown. In one form, the headwear piece is a baseball-style cap. The crown may have a top opening through which a top region of a wearer's head is exposed with the headwear piece operatively positioned on the wearer's head. In one form, the core and second layers are joined to each other, as by use of an adhesive or stitching. The core and second and third layers may likewise be joined to each other, as by use of an adhesive or stitching. In one form, the rim has a thickness, with the core layer having a thickness equal to at least ½ of the thickness of the rim. The core layer may have a thickness equal to at least ⅔ the thickness of the rim. The animal hide defining the core layer may be dressed. In one form, the rim has a second layer that is made from at least one of an animal hide and a synthetic animal hide. In one form, the second layer covers substantially the entirety of the at least one of the upwardly and downwardly facing surfaces of the core layer. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a front elevation view of a conventional baseball-style cap having a crown and a rim extending forwardly from the crown; FIG. 2 is an enlarged, fragmentary, front elevation view of the cap in FIG. 1 with the rim broken away to identify its component layers; FIG. 3 is a view as in FIG. 1 of a headwear piece, according to the present invention, and including a crown and rim projecting angularly from the crown at the front thereof; FIG. 4 is an enlarged, fragmentary, front elevation view of the headwear piece in FIG. 3 and broken away to expose the component layers defining the rim; FIG. 5 is an enlarged, cross-sectional view of the rim taken along 5-5 of FIG. 4; FIG. 6 is schematic representation of one form of rim, according to the present invention, defined by layers joined by an adhesive; FIG. 7 is a side elevation view of the inventive headwear piece in FIGS. 3 and 4 with the rim thereon being grasped and reconfigured by a user for compaction of the headwear piece; FIG. 8 is a front elevation view of the headwear piece in FIGS. 3, 4 and 7 and with the rim rolled into a compact cylindrical shape; FIGS. 9-17 correspond to FIG. 5 and show different compositions for the inventive rim with: FIG. 9 showing a layer of animal hide or synthetic animal hide with one surface partially covered by a cloth layer; FIG. 10 showing a cloth layer applied to the downwardly facing surface of a hide layer; FIG. 11 showing a cloth layer applied to the upwardly facing surface of a hide layer; FIG. 12 showing two hide layers; FIG. 13 showing a cloth layer applied to the upwardly facing surface of the combined hide layers of FIG. 12; FIG. 14 showing the layers in FIG. 10 joined by an adhesive; FIG. 15 showing the layers in FIG. 10 joined by stitching; FIG. 16 showing hide layers joined by stitching and a cloth layer adhesively bonded to the downwardly facing surface of the combined hide layers; and FIG. 17 showing three hide layers; FIG. 18 is a fragmentary, plan view of a baseball-style cap with a modified form of rim, according to the present invention, wherein the core layer does not occupy the full areal extent of the rim; FIG. 19 is a perspective view of a further modified form of rim, according to the present invention, and including two hide layers, with one layer only partially covering the other layer; FIG. 20 is a perspective view of another form of headwear piece, in the form of a visor, into which a rim, according to the present invention, is incorporated; FIG. 21 is a perspective view of another form of headwear piece into which a rim, according to the present invention, is incorporated, and on which the rim extends fully around a crown; and FIG. 22 is a schematic representation of headwear piece with the inventive rim incorporated therein. DETAILED DESCRIPTION OF THE DRAWINGS In FIGS. 1 and 2, a conventional baseball-style cap is shown at 10. The cap 10 consists of a crown 12 and a rim/bill 14 projecting forwardly from the crown 12 at the front thereof. The crown 12 has a plurality of cloth gores 16,18,20,22, sewn edge-to-edge to cooperatively produce an inverted, cup-shaped receptacle 24 for the head of a wearer. The rim 14 is defined by a core layer 26 that is made from a shape-retentive material, such as hard plastic, cardboard, or the like. The plastic may be, for example, extruded polyethylene foam having a thickness on the order of 1/16 inch. The core layer 26 is sandwiched between two cloth layers 28,30, which extend rearwardly to beyond the core layer 26 for attachment to a front wall 32 on the crown 12. Lines of stitching 34 pass through the cloth layers 28,30 and core layer 26 to securely join the layers 28,30 and layer 26. The cloth layers 28,30 and core layer 26 are united with each other and the crown 12 in such a manner that the rim 14 assumes an inverted, bowed, or “U” shape, as viewed from the front of the cap 10. As noted in the Background portion herein, it is common for a wearer of a baseball-style cap, of the type shown at 10, to compact the cap 10 by forming the rim towards a cylindrical shape around a fore-and-aft axis, as shown in FIGS. 1 and 2. While the conventional materials used for the rim 14 have a certain amount of shape memory, the core layer 26 is prone to becoming permanently deformed. As shown in this particular embodiment, the deformation of the rim 14 towards a cylindrical shape, as indicated by the arrows A in FIGS. 1 and 2, can produce a permanent crease at 36. The crease 36 may result from a partial rupture of the material defining the core layer 26 or by reason of a molecular rearrangement that compromises the elasticity of the material defining the core layer 26. As a result, a residual peak may be formed in the rim 14, which precludes its ability to maintain the desired curved shape that is set at the time of manufacture. One form of headwear piece, according to the present invention, is shown at 40 in FIGS. 3-5 in the form of a baseball-style cap. As explained in greater detail below, the inventive concept is not limited to incorporation into a baseball-style cap. The cap 40 has a crown 42 defined by cloth gores 44,46,48,50, sewn edge-to-edge as on the prior art crown 12, to produce an inverted cup shape defining a receptacle 52 for the head of a wearer. A rim 54 projects angularly away from the crown 42 at the front region 56 thereof. The rim 54, as seen also in FIG. 5, consists of a core layer 58 that is made from either an animal hide or a synthetic animal hide. Preferably, an animal hide that has been dressed is utilized for the core layer 58. The animal hide can be treated and incorporated into the rim 54 in such a manner that the rim 54 has good shape-retentive properties. At the same time, the animal hide lends itself to being conveniently rolled towards, and into, a cylindrical shape without significantly diminishing its shape-retentive capabilities. At the same time, the hide material is not prone to being damaged by water, or other environmental conditions typically encountered in normal use by a wearer. The core layer 58 has an upwardly facing surface 60 and a downwardly facing surface 62 to which cloth layers 64,66 are respectively applied. In this case, adjacent lines of stitching 70 are formed through all of the layers 58,64,66 to join the layers so as to define a unitary rim structure. The layers 64,66, when joined in this manner to each other and the core layer 58, add rigidity to the rim 54 and add to its shape-retentive properties, without significantly affecting the ability of the rim 54 to be rolled compactly into a cylindrical shape about a fore-and-aft axis. The cloth layers 64,66 can be made of the same material, or different materials. Cloth materials suitable for use in the layers 64,66 are well known to those skilled in this art. Layers, to be applied to the core layer 58, made from virtually a limitless number of other, different materials are also contemplated. For simplicity, layers identified as “cloth” herein are intended to encompass not only what is technically under the definition of a “cloth”, but any thin conformable layer made from any other type of material such as plastic, cardboard, etc., and potentially even an applied coating that cures as a discrete “layer”. The rim 54 has an overall thickness T, with the core layer 58 having a thickness T1. The thickness T1 is preferably in the range of 1/16- 1/4 inch. However, thicknesses lesser than 1/16 inch and greater than 1/4 inch are contemplated. The thickness T1 is preferably at least ½ of the overall thickness T and may be on the order of ⅔ the thickness T, or greater. As shown in FIG. 6, as an alternative means of joining the layers 58,64,66, an adhesive 74 may be employed. With the above-described structure, and that described in other embodiments below, compacting of the rim 54, in the manner shown in FIGS. 7 and 8, is facilitated. As seen in those figures, a user can grasp and compact the rim 54 in his/her hand 76 in a manner that the rim 54 tends towards a cylindrical shape about a fore-and-aft axis 78. The user's hand 76 functions as a constrictable loop. Whereas conventional caps have rims that tend to be less compliant as the rims thereon are deformed towards a cylindrical shape, the rim 54 tends to “roll”, under a surrounding, constricting force, into a cylindrical shape. As shown in FIG. 8, the rim 54 ultimately assumes a continuous cylindrical shape that can be reduced to a relatively small diameter. The invention contemplates many other compositions for the rim 54, as shown in FIGS. 9-17. In FIG. 9, a rim 54′ is shown defined by the core layer 58, with a cloth layer 64, 66 applied to only a portion of at least one of the upwardly and downwardly facing surfaces 60,62 thereon. In FIG. 10, a rim 54″ is shown wherein the core layer 58 has a cloth layer 66 applied to the downwardly facing surface 62 thereon. The upwardly facing surface 60 on the rim 54″ remains exposed. In FIG. 11, a rim 54′″ is shown wherein a cloth layer 64 is applied to the upwardly facing surface 60 of the core layer 58, with the downwardly facing surface 62 on the core layer uncovered and, therefore, exposed. In FIG. 12, a rim 54′″ is shown wherein a layer 80 is applied to the downwardly facing surface 62 of the core layer 58. The layer 80 is made from an animal hide or a synthetic animal hide, with the former preferably dressed. The layer 80 is shown to have a thickness T2 that is substantially less than the thickness T1 of the core layer 58. The thickness T2 may be increased to be equal to, and potentially greater than, the thickness T1. In FIG. 13, a rim 545x′ is shown incorporating the layers 58,80, as in FIG. 12, and further including a cloth layer 82 applied to the upwardly facing surface 60 of the core layer 58. In all of the embodiments herein, it is contemplated that the joining of layers can be effected through stitching, adhesive, or other means, such as the use of fasteners, etc. These and other joining means may also be used in combination. As shown in FIG. 14, the rim 54″ may be formed by joining the layers 58,66 through use of an adhesive layer 84. Alternatively, as shown in FIG. 15, the layers 58,66 may be joined by stitching 84. In FIG. 16, a rim at 546x′ is shown wherein the layers 58,80 are joined as in FIG. 12 through stitching 86, with a cloth layer 88 applied to the exposed, downwardly facing surface 90 of the layer 80 through an adhesive 92. The invention contemplates many other combinations of components to define a rim, in conjunction with a core layer having the animal hide or synthetic animal hide composition. The above are just exemplary component layers and combinations of components layers. Many other combinations are contemplated. For example, as shown in FIG. 17, a rim 547x′ has a core layer 58 and an animal hide/synthetic animal hide layer 80 applied to the downwardly facing surface 62 thereof, with a separate layer 96, made from animal hide or synthetic animal hide, applied to the upwardly facing surface 60 on the layer 58. Another variation contemplated by the invention is shown for a baseball-style cap 40′ in FIG. 18. The cap 40′ has a rim 548x′ including a core layer 58′ made from animal hide or a synthetic animal hide, wherein the core layer 58′ has a different configuration, as viewed from above or below, than that of the overall rim. Whereas in the prior embodiments, the core layer 58 extends over substantially the entire areal extent of the exposed upwardly facing rim surface 100 (see FIGS. 3 and 4), the core layer 58′ occupies substantial less than the areal extent of the upwardly facing surface 102 on the rim 588x′. The area of the surface 102 that is not underlaid by the layer 58′ may include a separate layer of material, or may be defined entirely by one or more cloth layers over-/underlying the core layer 58′. Alternatively, the entire surface 102 could be defined by the core layer 58 having an over-/underlying layer 104 having less than the same areal extent, but being made from the same or a like animal hide or synthetic animal hide, as shown in FIG. 19. The core layer 58,58′ may have a uniform thickness over its entire extent or may have a strategically controlled variable thickness to produce the desired properties for the associated rim 54-548x′. The invention is not limited to incorporation into baseball-style caps. For example, as shown in FIG. 20, a headwear piece is shown at 110 in the form of a visor. The visor 110 has a crown 112 defining a receptacle 114 for the wearer's head. An exemplary, inventive rim 54 is incorporated into the crown 112 to project angularly away therefrom at the forward region 116 of the crown 112. The crown 112 has an opening 118 through which the top portion of a wearer's head is exposed with the visor operatively placed on the wearer's head. In FIG. 21, another headwear piece, in which the present invention is incorporated, is shown at 130. The headwear piece 130 has a crown 132 and a rim 154, corresponding to the inventive rims 54-548x′, described above, which rim 154 extends fully around the crown 132. The rim 154 can be constructed in the same manner as described for the rims 54-548x′, described above. As shown generically in FIG. 22, the invention contemplates incorporation of a rim 254, made as previously described, into any type of headwear piece having a crown/head engaging structure, as shown generically at 256. While the invention has been described with particular reference to the drawings, it should be understood that various modifications could be made without departing from the spirit and scope of the present invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention This invention relates to headwear and, more particularly, to a headwear piece having a crown and a rim projecting angularly away from an external surface of the crown. 2. Background Art One of the most popular pieces of headwear is the baseball-style cap. The baseball-style cap has an inverted, cup-shaped crown to receive the head of a wearer and a forwardly projecting bill/rim which is directed angularly away from the crown at a front portion thereof. Baseball-style caps have continued to evolve, appealing to an ever-increasing base of consumers. What once was designed primarily for baseball players has become regular garb for many on a day-to-day basis. The popularity of the baseball-style cap has made it the focus of many headwear designers. While the basic configuration has remained the same over the decades, many modifications have been devised in terms of the materials used to construct the cap, the manner of assembling the cap, the adornment thereon, etc. The market for baseball-style caps is highly competitive and continues to inspire those involved therein to make new developments to appeal to an even larger consumer group. One particularly desirable feature of the baseball-style cap is that, while highly functional, it has an unobtrusive configuration and is light in weight. The crown affords the wearer an effective barrier against the elements, with the rim, in addition to shielding the user's face from rain, and the like, shades the user's eyes from sunlight in a manner that does not significantly obstruct the user's forward and peripheral vision. By reason of its construction, the baseball-style cap also lends itself to being compactly transported by the wearer, when not in use. Typically, the crown is constructed from sewn cloth gores. The crown can be very simply folded or pressed into a compact state. Once the cap is replaced on the wearer's head, the crown assumes a neat conforming shape that generally does not appear wrinkled, creased, or otherwise disfigured to evidence the compaction. The most significant impediment to compaction of the baseball-style cap is the rim. Typically, the rim includes a core layer that is sufficiently shape retentive that the crown will have a relatively consistent, bowed shape which produces a convex curvature at the top, exposed surface of the rim. It is common to construct the core layer of the rim from plastic, cardboard, or other like material that tends to retain a shape into which it is formed at manufacture. In competition with the objective of having a shape-retaining rim is that of allowing the rim to be reconfigured compactly when the headwear is not in use. Ideally, the rim would be either foldable or rollable towards, or into, a compact cylindrical shape around a fore-and-aft axis. However, as the rim is folded or bent towards the cylindrical shape, there is a significant resistance due to the stiff nature of the material defining the core layer of the rim. As a result, a significant compaction of the rim may cause a permanent deformation of the core layer. In a worst case, the core layer may rupture. In either event, a permanent deformation of the rim may be imparted, which detracts significantly from the appearance of the cap. One solution to this problem is presented in U.S. Pat. No. 6,076,192, owned by the assignee herein. In this patent, the core of the bill/rim is made from a resilient layer which has shape-retentive characteristics but is also readily conformable. The industry continues to seek out rim constructions that will be sufficiently shape retentive to maintain a desired appearance for the headwear, yet which can be deformed for compaction, as when it is desired to store or transport the cap.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention is directed to a headwear piece having a crown defining a receptacle for the head of a wearer and a rim projecting angularly away from the crown. The rim has a core layer, that is made from at least one of an animal hide and a synthetic animal hide, and a second layer. The core layer has an upwardly and downwardly facing surface. At least part of one of the upwardly and downwardly facing surfaces is covered by the second layer. In one form, the core layer has a thickness in the range of 1/16- 1/4 inch. In one form, the second layer is applied to the upwardly facing surface of the core layer. The second layer may be a cloth material. Alternatively, the second layer may be at least one of an animal hide and a synthetic animal hide. In another form, the second layer is applied to the downwardly facing surface of the core layer. The second layer applied to the downwardly facing surface of the core layer may be a cloth material. In one form, there are separate layers applied to the upwardly facing surface and the downwardly facing surface of the core layer. One or both of the layers applied to the core layer may be made from a cloth material. In one form, an upwardly facing surface of the rim has an area and the core layer extends continuously over substantially the entire area of the upwardly facing surface of the rim. The rim may extend around only a portion of the crown or fully around the crown. In one form, the headwear piece is a baseball-style cap. The crown may have a top opening through which a top region of a wearer's head is exposed with the headwear piece operatively positioned on the wearer's head. In one form, the core and second layers are joined to each other, as by use of an adhesive or stitching. The core and second and third layers may likewise be joined to each other, as by use of an adhesive or stitching. In one form, the rim has a thickness, with the core layer having a thickness equal to at least ½ of the thickness of the rim. The core layer may have a thickness equal to at least ⅔ the thickness of the rim. The animal hide defining the core layer may be dressed. In one form, the rim has a second layer that is made from at least one of an animal hide and a synthetic animal hide. In one form, the second layer covers substantially the entirety of the at least one of the upwardly and downwardly facing surfaces of the core layer.
20040304
20070130
20050908
78662.0
0
TOMPKINS, ALISSA JILL
HEADWEAR PIECE WITH ASSOCIATED RIM
SMALL
0
ACCEPTED
2,004
10,794,750
ACCEPTED
Shippable in-assembly bolt
A shippable in-assembly bolt having a head portion, a threaded portion containing threads and a gripper portion, wherein said gripper portion preferably comprises a grooved structure and an o-ring. The o-ring is intended to sit between the inner wall of a clearance hole in an assembly/subassembly and the grooved structure of the gripper portion. When the o-ring is in position between the inner wall of the clearance hole and the grooved structure of the gripper portion, the o-ring is in both compression and tension and acts to retain the bolt in the assembly during shipping operations. The invention can be used with any type of mechanical fastener, such as bolts, screws, pins, rivets, etc.
1. A shippable in-assembly fastener comprising: a head section; a threaded section containing threads; and a gripper section, wherein said gripper section comprises an irregular surface structure and an o-ring. 2. The in-assembly fastener of claim 1, wherein said irregular surface structure is a helical groove structure that contains crest portions that are shallower than crest portions of said threaded section. 3. The in-assembly fastener of claim 1, wherein said o-ring composes a nitrile material. 4. The in-assembly fastener of claim 1, wherein said head section contains a hex-head configuration. 5. The in-assembly fastener of claim 1, wherein said head section contains a torx-head configuration. 6. The in-assembly fastener of claim 1, wherein said head section contains an integral washer. 7. The in-assembly fastener of claim 2, wherein said crest portions of said helical structure terminate at substantially the pitch diameter of said threads. 8. An assembly comprising: at least one clearance hole used to connect said assembly to a mating assembly; a fastener partially located within said clearance hole, said fastener comprising a head section, a threaded section and a gripper section; said gripper section comprising an irregular surface structure and an o-ring, wherein said o-ring sits between said gripper section and an internal wall of said clearance hole and wherein said o-ring is in compression and tension. 9. The assembly of claim 8, wherein said assembly is a subassembly. 10. The assembly of claim 8, wherein said irregular surface is a helical structure that contains crest portions that are shallower than crest portions of said threaded section. 11. The assembly of claim 8, wherein said o-ring comprises a nitrile material. 12. The assembly of claim 8 wherein, said head section contains a hex-head configuration. 13. The assembly of claim 8, wherein said head section contains a torx-head configuration. 14. The assembly of claim 8, wherein said head section contains an integral washer. 15. The assembly of claim 8, wherein said crest portions of said helical structure terminate at substantially the pitch diameter of said threads. 16. A shippable in-assembly fastener comprising: a head section; a threaded section containing threads; a fastener retention section, wherein said fastener retention system contains an o-ring. 17. The in-assembly fastener of claim 16, wherein said fastener retention system further comprises a gripping portion, wherein said gripping portion acts to grip said o-ring when the fastener is placed into a clearance hole of an assembly. 18. The in-assembly fastener of claim 17, wherein said gripping portion comprises grooves. 19. The in-assembly fastener of claim 18, wherein said grooves are helical grooves. 20. The in-assembly fastener of claim 18, wherein the grooves contains crest portions that are shallower than crest portions of said threaded section
FIELD OF INVENTION This invention relates generally mechanical fasteners, and more particularly to fasteners, such as bolts, that can be used in shippable assemblies. BACKGROUND OF INVENTION In the manufacturing industry, and in particular manufacturing industries that rely on assembly lines, such as the automotive industry, it has become commonplace for automobile manufactures to assemble cars using modular assemblies/subassemblies (including, without limitation, housings, brackets, plates, panels, heads, blocks, rails, harnesses, frames, etc.) that are shipped to the automobile manufactures from outside vendors. Using modular assemblies/subassemblies allows the automobile manufacturer to increase productivity by reducing the amount of assembly that needs to occur at the manufacturing plant. In order to further facilitate the manufacturing process, it is common for modular assemblies/subassemblies to include the bolts or other fasteners that the manufacturer will use to attach the modular assembly/subassembly to another component in the automobile. These bolts are placed in their respective clearance holes in the modular assembly/subassembly before shipping to the manufacturer and thus eliminate the need for a line technician at the assembly plant to retrieve the appropriate-sized bolt and use it to connect the subassembly to the main assembly. Thus, using a modular assembly/subassembly with connecting bolts already in place allows the assembly plant to merely align the assembly/subassembly with its mating structure, advance the bolts by hand until the threads on the bolt and the threads in the mating structure engage and then use whatever tool is typically used to tighten the bolts (i.e., ratchets, pneumatic wrenches, screwdrivers, etc.). A problem that has plagued manufactures of these modular assemblies/subassemblies that are shipped to automobile manufactures is that the bolts used to connect the modular assemblies to other mating components of the automobile very often fall out of their respective clearance holes due to the shipping process. Although bolt retention systems have been used by these manufacturers, such as polymer compositions extruded onto threads of a bolt, failures nonetheless occur, which is unacceptable to the automobile manufactures and can be costly to the particular vendor. Indeed, if an automobile manufacturer receives modular assemblies/subassemblies with missing or misplaced connecting bolts, such an occurrence could lead to the automobile manufacturer canceling a particular vendor's contract or, if such missing or misplaced bolts cause an assembly line to shut down, the automobile manufacturer can charge the vendor for the amount of money lost for the down time, which can be on the order of magnitude of $1000 per minute. Besides the shipping process, which can cause severe oscillations that tend to cause shippable in-assembly bolts to fall out of their clearance holes, the bolt retention system must be chemically inert so that it maintains its retention properties in environments such as petroleum-based lubricants, which are common in the automotive field. A retention material that deteriorates in chemical environments typically found in these assemblies/subassemblies will invariable lose their retention properties, leading to failures of the retention system. Also, a retention material that is not chemically inert can cause the opposite effect and freeze the bolt (because the retention system bonds to the clearance holes in the assembly/subassembly) or increase the coefficient of friction, thus making it very difficult for a manufacturer to use the bolt and assembly/subassembly. Because an assembly bolt will typically have to be advanced at least 1/4 of an inch before the threads can engage, it is important that whatever retention system is used with in-assembly bolts not have axial forces that prevent an assembler from pushing the bolt within its clearance hole by hand to engage the threads. Also, due to efficiency concerns, a retention system must not need to be removed by an assembly worker prior to installation. In other words, the retention system must be able to remain in the assembly/subassembly for the life of the part without interfering with the operation of the assembly/subassembly or the automobile as a whole. Accordingly, automobile manufacturers have demanded that manufactures of assemblies/subassemblies develop so-called shippable in-assembly bolts have certain minimum characteristics, namely that the bolts (i) remain in their respective assembly/subassembly clearance holes during shipment and subsequent handling; (ii) retain ease of installation with their mating assemblies or subassemblies; (iii) not contain any components that need to be removed prior to assembly with their respective assemblies or subassemblies; (iv) the bolt retention materials must be chemically inert with chemicals, adhesives, grease or other petroleum-based lubricants, or any other chemical used in the mating assembly/subassembly; (v) be compatible with hand assembly operations as well as semi-automated and automated assembly operations; and (iv) substantially maintain its axial retention and torsional force values for at least 30 days. Lastly, the retention system on the shippable in-assembly bolts must not be too expensive, otherwise the cost of the assembly/subassembly will not be palatable to the automobile manufacturer and/or the vendor will have to reduce its profit margins. Accordingly, there is a need for a shippable in-assembly bolt that addresses the above identified problems. Other needs will become apparent based on a review of the specification, claims and drawings herein. SUMMARY OF THE INVENTION One embodiment of the invention comprises a shippable in-assembly bolt having a head portion, a threaded portion containing threads and a gripper portion, wherein said gripper portion preferably comprises a grooved structure and an o-ring. The o-ring is intended to sit between the inner wall of a clearance hole in an assembly/subassembly and the grooved structure of the gripper portion. When the o-ring is in position between the inner wall of the clearance hole and the grooved structure of the gripper portion, the o-ring is in both compression and tension and acts to retain the bolt in the assembly during shipping operations. The invention can be used with any type of mechanical fastener, such as bolts, screws, pins, rivets, etc. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a side elevational view of a shippable in-assembly bolt of one embodiment of the present invention. FIG. 2 is a top plan view of the shippable in-assembly bolt of FIG. 1. FIG. 3 is a side elevational view of a shippable in-assembly bolt of one embodiment of the present invention. FIG. 4 is a top plan view of the shippable in-assembly bolt of FIG. 3. FIG. 5 is a cross-sectional side view of a shippable in-assembly bolt of one embodiment of the present invention when the bolt is placed within a clearance hole DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT While the present invention is capable of embodiment in various forms, there is shown in the drawings and will be hereinafter described a presently preferred embodiment with the understanding that the present disclosure is to be considered as an exemplification of the invention, and is not intended to limit the invention to the specific embodiment illustrated. With reference to FIGS. 1 and 2, there is shown a shippable in-assembly bolt 10 in accordance with one embodiment of the present invention. The bolt 10 comprises three main sections: a head section 12, a threaded section 14 and an in-assembly bolt retention system 16. In one embodiment of the present invention, the head section comprises a hex head with an integral washer. However, those with skill in the art will recognize that head section can comprise any structure that allows a tool to engage and turn the bolt 10, such as hex heads, torx heads, alien heads, phillips heads, slotted heads, etc. For example, a torx head structure is shown in FIGS. 3 and 4. Also, the head section need not be configured to be turned and tightened by a tool, but can instead have structures thereon that facilitate use of the bolt 10 using hand tightening and loosening techniques. In addition, the head section 12 need not contain an integrated washer, or any washer whatsoever. Thus, those will skill in the art will appreciate that the selection of head structures for head section 12 will vary depending on the intended use for the bolt 10. Threaded section 14 comprises a metal shaft with threads preferably machined into the outside thereof. The threads can be of any type and will vary depending on the intended use for the bolt 10. The threads need not, however, be machined into the threaded section 14, but can also be cast, rolled or stamped into the threaded section, depending on the application that the bolt 10 will be used for. In one embodiment of the present invention, the bolt retention system 16 comprises helical grippers 18 and an o-ring 20. The helical grippers are formed by taking a portion of the threaded section 14 and removing a portion of the crest 22 of the threads at approximately the pitch diameter 24 of the threads, as shown in FIG. 5. For simplicity, the removal of the portion of the crest can be done after the bolt 10 has been threaded. Thus, after the bolt 10 has been threaded by techniques known in the art, a portion of the crest can be removed by any technique, but preferably by using a form tool in a grinding and/or turning operation. However, it is within the scope of the invention that the threads and the helical grippers can be formed by a molding, rolling and/or stamping process without any subsequent machining steps. After a portion of the crest 22 is removed, the remaining structure is a helical groove gripper structure 26 that is shallower than the helical grooves for the remainder of the threaded section 14. In other words, the distance from the root to the crest of the groove in the threaded section 14 is greater than the distance from the root to the crest of the groove in the helical grove gripper structure 26, thus creating a slotted structure when viewing the bolt 10 from the side, as shown in FIGS. 1, 3, and 5. Although a slotted structure is preferred in one embodiment of the present invention, it should be noted that is possible to use a non-slotted structure with the present invention. It should be noted that the term “crest” and “root” as used herein are intended to describe the top and bottom of a grooved structure, respectively, and is not intended to describe any shape of the crest and root structure. Accordingly,.the crest and root of the helical groove structure of the present invention can be rounded, flat, peaked, etc. It should be noted that the in-assembly bolt retention system 16 need not contain a helical groove structure. Indeed any structure that has the capability of gripping the o-ring 20 can be used in the practice of the present invention. Thus, for example, a plurality of parallel, non-helical grooves, a knurled structure or any other type of irregular (i.e., non- smooth) surface structure can be used as a gripper structure instead of the helical grooves described above. Also, it is possible that a smooth surface could be used as a gripper structure, under the theory that the coefficient of friction between an o-ring and the smooth surface when placed under pressure will be sufficient to grip and stretch the o-ring as it is inserted into a clearance hole. However, in the practice of one embodiment of the present invention, it is preferred to use the helical groove structure as the gripper structure to reduce manufacturing costs because the helical grooves utilize the already existing thread structure in the bolt. In one embodiment of the present invention, the gripper structure is ten (10) millimeters in length and begins approximately seventeen (17) millimeters from the distal tip 28 of the bolt 10. The distal tip 28 can be of any configuration, and in a preferred embodiment is a tapered shape to facilitate the threading of the bolt 10 into a mating structure. After the gripper structure is created, the o-ring 22 is placed in position by sliding the o-ring 20 over the distal tip 28 of the bolt 10 until the o-ring 20 sits at the beginning of the gripper structure 26, as shown in FIGS. 1 and 3. In order to provide the desired chemical resistance to the retention system, it is preferred that o-ring 20 comprises a nitrile material, which is a copolymer of butadiene and acrylonitrile. In a preferred embodiment, nitrile o-rings manufactured by the Able O Rings and Seals™ Corporation of Toronto, Ontatrio, Canada are used. However, any other type of o-ring could be used with the o-ring 22 of the present invention that possesses the desired chemical inertness, as discussed above. In the operation of one embodiment of the present invention, when the bolt 10 is placed in a clearance hole 30 (FIG. 5) of a modular assembly/subassembly, the o-ring 20 becomes twisted as it rolls between the walls of the clearance hole and the gripper structure 26. Also, as the bolt 10 is inserted the o-ring stretches and becomes elliptical due to the helical grippers 10, because the o-ring 20 tends to follow and sit within the roots 30 of the helical grippers. This stretching and twisting places the o-ring 20 in tension. Moreover, due to the fact that the clearance hole, by definition, is only slightly larger than the major diameter of the threads, the o-ring 20, which preferably has a diameter greater than the diameter of the clearance hole, is compressed. This compression acts to hold the bolt 10 in the assembly/subassembly clearance hole. Moreover, due to the fact that there is tension in the o-ring 20, as well as compression, there is a substantial elimination of sheering forces which could develop in the o-ring and therefore prevents any significant damage to the o-ring. Also, because the o-ring is placed in tension and compression as it is advanced in a clearance hole, the o-ring tends to flatten in one embodiment of the invention. As the o-ring become more flat, the insertion forces becomes less due to a lower coefficient of friction. However, if the bolt is reversed in axial direction (and begins to be extracted from the clearance hole), the o-ring tends to expand from its flattened state. Accordingly, as the bolt 10 is extracted from a clearance hole in one embodiment of the present invention, the coefficient of friction becomes greater and thereby leads to greater extraction forces than the insertion forces. Thus, in one embodiment of the present invention, the bolt 10 develops inversely proportional axial forces when the initial insertion direction of the bolt 10 in a clearance hole is reversed into an extraction direction. In a preferred embodiment, 007 o-ring and helical gripper diameter of 7.1 mm on a M8×1.25−6 g thread profile was used. However, it will be appreciated that other size o-rings, gripper diameters and thread profiles can be used with the practice of the present invention, which those with skill in the art will recognize will depend on the particular application for the bolt 10. Also, as discussed above, other gripper structures other than a helical structure can be used with the practice of the present invention. As will be appreciated, the bolt 10 of the present invention can be used with any type of assembly/subassembly in an automobile. One possible use for the bolt of the present invention is for axle and drive assemblies for automobiles. It will be appreciated, however, that the bolt 10 can also be used with assemblies/subassemblies in fields other than the automotive field. Indeed, the bolt 10 of the present invention can be used in any subassembly/assembly that requires connecting bolts to be included in the subassembly/assembly and remain in the assembly/subassembly during a shipping operation. Also, the present invention can be used with any type of mechanical fastener, and is not limited to use with bolts. Thus, the present invention can also be used with screws, pins, rivets, etc. The foregoing description of a preferred embodiment of the invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or to limit the invention to the precise form disclosed. The description was selected to best explain the principles of the invention and their practical application to enable others skilled in the art to best utilize the invention in various embodiments and various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention not be limited by the specification, but be defined by the claims set forth below.
<SOH> BACKGROUND OF INVENTION <EOH>In the manufacturing industry, and in particular manufacturing industries that rely on assembly lines, such as the automotive industry, it has become commonplace for automobile manufactures to assemble cars using modular assemblies/subassemblies (including, without limitation, housings, brackets, plates, panels, heads, blocks, rails, harnesses, frames, etc.) that are shipped to the automobile manufactures from outside vendors. Using modular assemblies/subassemblies allows the automobile manufacturer to increase productivity by reducing the amount of assembly that needs to occur at the manufacturing plant. In order to further facilitate the manufacturing process, it is common for modular assemblies/subassemblies to include the bolts or other fasteners that the manufacturer will use to attach the modular assembly/subassembly to another component in the automobile. These bolts are placed in their respective clearance holes in the modular assembly/subassembly before shipping to the manufacturer and thus eliminate the need for a line technician at the assembly plant to retrieve the appropriate-sized bolt and use it to connect the subassembly to the main assembly. Thus, using a modular assembly/subassembly with connecting bolts already in place allows the assembly plant to merely align the assembly/subassembly with its mating structure, advance the bolts by hand until the threads on the bolt and the threads in the mating structure engage and then use whatever tool is typically used to tighten the bolts (i.e., ratchets, pneumatic wrenches, screwdrivers, etc.). A problem that has plagued manufactures of these modular assemblies/subassemblies that are shipped to automobile manufactures is that the bolts used to connect the modular assemblies to other mating components of the automobile very often fall out of their respective clearance holes due to the shipping process. Although bolt retention systems have been used by these manufacturers, such as polymer compositions extruded onto threads of a bolt, failures nonetheless occur, which is unacceptable to the automobile manufactures and can be costly to the particular vendor. Indeed, if an automobile manufacturer receives modular assemblies/subassemblies with missing or misplaced connecting bolts, such an occurrence could lead to the automobile manufacturer canceling a particular vendor's contract or, if such missing or misplaced bolts cause an assembly line to shut down, the automobile manufacturer can charge the vendor for the amount of money lost for the down time, which can be on the order of magnitude of $1000 per minute. Besides the shipping process, which can cause severe oscillations that tend to cause shippable in-assembly bolts to fall out of their clearance holes, the bolt retention system must be chemically inert so that it maintains its retention properties in environments such as petroleum-based lubricants, which are common in the automotive field. A retention material that deteriorates in chemical environments typically found in these assemblies/subassemblies will invariable lose their retention properties, leading to failures of the retention system. Also, a retention material that is not chemically inert can cause the opposite effect and freeze the bolt (because the retention system bonds to the clearance holes in the assembly/subassembly) or increase the coefficient of friction, thus making it very difficult for a manufacturer to use the bolt and assembly/subassembly. Because an assembly bolt will typically have to be advanced at least 1 / 4 of an inch before the threads can engage, it is important that whatever retention system is used with in-assembly bolts not have axial forces that prevent an assembler from pushing the bolt within its clearance hole by hand to engage the threads. Also, due to efficiency concerns, a retention system must not need to be removed by an assembly worker prior to installation. In other words, the retention system must be able to remain in the assembly/subassembly for the life of the part without interfering with the operation of the assembly/subassembly or the automobile as a whole. Accordingly, automobile manufacturers have demanded that manufactures of assemblies/subassemblies develop so-called shippable in-assembly bolts have certain minimum characteristics, namely that the bolts (i) remain in their respective assembly/subassembly clearance holes during shipment and subsequent handling; (ii) retain ease of installation with their mating assemblies or subassemblies; (iii) not contain any components that need to be removed prior to assembly with their respective assemblies or subassemblies; (iv) the bolt retention materials must be chemically inert with chemicals, adhesives, grease or other petroleum-based lubricants, or any other chemical used in the mating assembly/subassembly; (v) be compatible with hand assembly operations as well as semi-automated and automated assembly operations; and (iv) substantially maintain its axial retention and torsional force values for at least 30 days. Lastly, the retention system on the shippable in-assembly bolts must not be too expensive, otherwise the cost of the assembly/subassembly will not be palatable to the automobile manufacturer and/or the vendor will have to reduce its profit margins. Accordingly, there is a need for a shippable in-assembly bolt that addresses the above identified problems. Other needs will become apparent based on a review of the specification, claims and drawings herein.
<SOH> SUMMARY OF THE INVENTION <EOH>One embodiment of the invention comprises a shippable in-assembly bolt having a head portion, a threaded portion containing threads and a gripper portion, wherein said gripper portion preferably comprises a grooved structure and an o-ring. The o-ring is intended to sit between the inner wall of a clearance hole in an assembly/subassembly and the grooved structure of the gripper portion. When the o-ring is in position between the inner wall of the clearance hole and the grooved structure of the gripper portion, the o-ring is in both compression and tension and acts to retain the bolt in the assembly during shipping operations. The invention can be used with any type of mechanical fastener, such as bolts, screws, pins, rivets, etc.
20040305
20071106
20050908
58349.0
0
MITCHELL, KATHERINE W
SHIPPABLE IN-ASSEMBLY BOLT
SMALL
0
ACCEPTED
2,004
10,794,961
ACCEPTED
Camera module
A camera module comprising an image sensor array, a gain amplifier, an indicator set to indicate whether a first flash device or a second flash device is present, and a plurality of storage locations. The plurality of storage locations is configured to store an exposure time and a gain. The exposure time and the gain are associated with the first flash device in response to the indicator indicating the presence of the first flash device, and the exposure time and the gain are associated with the second flash device in response to the indicator indicating the presence of the second flash device. The image sensor array is configured to capture an image using the exposure time, and the gain amplifier is configured to perform processing on the image using the gain.
1. A camera module comprising: an image sensor array; a gain amplifier; an indicator set to indicate whether a first flash device or a second flash device is present; and a plurality of storage locations; wherein the plurality of storage locations is configured to store an exposure time and a gain, wherein the exposure time and the gain are associated with the first flash device in response to the indicator indicating the presence of the first flash device, wherein the exposure time and the gain are associated with the second flash device in response to the indicator indicating the presence of the second flash device, wherein the image sensor array is configured to capture an image using the exposure time, and wherein the gain amplifier is configured to perform processing on the image using the gain. 2. The camera module of claim 1 wherein the first flash device comprises an LED flash device, and wherein the second flash device comprises a xenon flash device. 3. The camera module of claim 2 wherein the exposure time is calculated using a flash time in response to the indicator indicating the presence of the LED flash device. 4. The camera module of claim 2 wherein the plurality of storage locations are configured to store a plurality of white balance coefficients in response to the indicator indicating the presence of the LED flash device. 5. The camera module of claim 2 wherein the gain is calculated using an exposure time in response to the indicator indicating the presence of the xenon flash device. 6. The camera module of claim 1 further comprising: a control circuit; wherein the control circuit is configured to generate a flash signal in accordance with the indicator, wherein the control circuit is configured to provide the flash signal to the first flash device in response to the indicator indicating the presence of the first flash device, and wherein the control circuit is configured to provide the flash signal to the second flash device in response to the indicator indicating the presence of the second flash device. 7. The camera module of claim 6 wherein the flash signal has a first duration in response to the indicator indicating the presence of the first flash device, and wherein the flash signal has a second duration in response to the indicator indicating the presence of the second flash device. 8. The camera module of claim 1 further comprising: a processor; and firmware executable by the processor; wherein the firmware is configured to cause the processor to generate the exposure time and the gain in accordance with the indicator, and wherein the firmware is configured to cause the processor to store the exposure time and the gain in the plurality of storage locations. 9. The camera module of claim 1 wherein the exposure time is greater than a frame time of the image sensor array. 10. The camera module of claim 1 wherein the exposure time is less than or equal to a frame time of the image sensor array. 11. The camera module of claim 1 wherein the plurality of storage locations comprises at least a first register and a second register. 12. A system comprising: a camera module comprising an image sensor array, a gain amplifier, and an indicator; a flash device coupled to the camera module; a processor coupled to the camera module; and firmware executable by the processor; wherein the firmware is executable by the processor to cause the indicator to be accessed to determine a type of the flash device, wherein the firmware is executable by the processor to cause an exposure time and a gain associated with the type of the flash device to be provided to the camera module, wherein in response to the camera module receiving a snapshot signal: the image sensor array is configured to capture an image using the exposure time, the camera module is configured to provide a flash signal to the flash device, and the gain amplifier is configured to amplify image data associated with the image using the gain. 13. The system of claim 12 further comprising: a host comprising the processor and the firmware; wherein the firmware is executable by the processor to cause the host to provide the snapshot signal to the camera module. 14. The system of claim 12 further comprising: a host coupled to the camera module and configured to provide the snapshot signal to the camera module; wherein the camera module comprises the processor and the firmware. 15. The system of claim 12 wherein the flash device comprises an LED flash device. 16. The system of claim 15 wherein the firmware is executable by the processor to cause the exposure time to be calculated using the gain. 17. The system of claim 15 wherein the firmware is executable by the processor to cause a flash time to be calculated using the gain, wherein the firmware is executable by the processor to cause the flash time to be provided to the camera module, and wherein the camera module is configured to provide the flash signal to the flash device for a duration associated with the flash time. 18. The system of claim 15 further comprising: an image processing circuit; wherein the firmware is executable by the processor to cause at least one white balance coefficient to be provided to the camera module, and wherein the image processing circuit is configured to perform processing on the image data using the at least one white balance coefficient. 19. The system of claim 12 wherein the flash device comprises a xenon flash device. 20. The system of claim 19 wherein the firmware is executable by the processor to cause the gain to be calculated using the exposure time. 21. The system of claim 19 wherein the image sensor array is operated as a rolling shutter. 22. The system of claim 19 wherein the image sensor array is operated as a non-rolling shutter. 23. A method of operating a camera module coupled to an LED flash device, the camera module comprising an image sensor array configured to operate as a rolling shutter, comprising: calculating an exposure time using a gain; providing the exposure time and the gain to the camera module; and in response to receiving a snapshot signal: capturing an image using the image sensor array in accordance with the exposure time; providing a flash signal to the LED flash device; and amplifying image data associated with the image in accordance with the gain. 24. The method of claim 23 further comprising: calculating a flash time using the gain and an exposure-gain product calculated using an auto exposure function; calculating the exposure time using the flash time; and providing the flash time to the camera module. 25. The method of claim 23 further comprising: calculating a plurality of white balance coefficients using interpolation; providing plurality of white balance coefficients to the camera module; and processing the image data using the plurality of white balance coefficients. 26. A method of operating a camera module coupled to a xenon flash device, the camera module comprising an image sensor array, comprising: calculating a gain using an exposure time and an exposure-gain product associated with a viewfinder mode; providing the gain and the exposure time to the camera module; and in response to receiving a snapshot signal: capturing a first image using the image sensor array in accordance with the exposure time; providing a flash signal to the xenon flash device; and amplifying image data associated with the image in accordance with the gain. 27. The method of claim 26 further comprising: calculating the exposure gain product using an auto exposure function. 28. The method of claim 26 further comprising: capturing the first image using the image sensor array in accordance with the exposure time by operating the image sensor array as a rolling shutter. 29. The method of claim 26 further comprising: capturing the first image using the image sensor array in accordance with the exposure time by operating the image sensor array as a fixed shutter.
BACKGROUND Some portable electronic devices, such as mobile telephones, include image capture capabilities similar to those associated with a digital camera. These devices, however, may be smaller and/or more compact than many digital cameras, and as a result, do not have the space that is needed to accommodate all of the components of a conventional standalone digital camera. Accordingly, certain features that may be common in digital cameras may be difficult to include in portable electronic devices. In addition, portable electronic devices that include image capture capabilities may be offered at prices less than those associated with digital cameras. As a result, certain features that may be common in digital cameras may be omitted from portable electronic devices to allow desired price targets of the electronic devices to be met. It would be desirable to be able to provide additional image capture features in portable electronic devices while minimizing the size and cost associated with the features. SUMMARY In an exemplary embodiment, the present disclosure provides a camera module comprising an image sensor array, a gain amplifier, an indicator set to indicate whether a first flash device or a second flash device is present, and a plurality of storage locations. The plurality of storage locations is configured to store an exposure time and a gain. The exposure time and the gain are associated with the first flash device in response to the indicator indicating the presence of the first flash device, and the exposure time and the gain are associated with the second flash device in response to the indicator indicating the presence of the second flash device. The image sensor array is configured to capture an image using the exposure time, and the gain amplifier is configured to perform processing on the image using the gain. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram illustrating an embodiment of a system that comprises a camera module. FIG. 2 is a diagram illustrating an embodiment of a set of registers. FIGS. 3a, 3b, and 3c are diagrams illustrating an embodiment of operating an image sensor array using a first exposure time. FIGS. 4a, 4b, and 4c are diagrams illustrating an embodiment of operating an image sensor array using a second exposure time. FIG. 5 is a flow chart illustrating a first embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 6 is a timing diagram illustrating a first example of signals used to capture an image in a snapshot mode of operation. FIG. 7 is a flow chart illustrating a second embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 8 is a timing diagram illustrating a second example of signals used to capture an image in a snapshot mode of operation. FIG. 9 is a flow chart illustrating a third embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 10 is a timing diagram illustrating a third example of signals used to capture an image in a snapshot mode of operation. FIG. 11 is a block diagram illustrating an embodiment of a system that comprises the embodiment of FIG. 1. FIG. 12 is a block diagram illustrating an alternative embodiment of the system of FIG. 1. DETAILED DESCRIPTION In the following Detailed Description, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. In this regard, directional terminology, such as “top,” “bottom,” “front,” “back,” “leading,” “trailing,” etc., is used with reference to the orientation of the Figure(s) being described. Because components of embodiments of the present invention can be positioned in a number of different orientations, the directional terminology is used for purposes of illustration and is in no way limiting. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. The following Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims. FIG. 1 is a block diagram illustrating an embodiment of a system 100 that comprises a camera module 112. System 100 comprises a host 110 and a flash device 114 coupled to camera module 112. Host 110 comprises a processor 116, firmware 118, and a memory 120. Camera module 112 comprises an interface 122, a set of registers 124, a control circuit 126, an image sensor array 128, a gain amplifier 130, an analog-to digital converter (ADC) 132, and an image processing circuit 134. Host 110 is configured to operate camera module 112 in a viewfinder mode and a snapshot mode by communicating with camera module 112 using a connection 142. In one embodiment, connection 142 comprises an I2C bus and other signals. In other embodiments, connection 142 may comprise other types of busses or signals. In the viewfinder mode of operation, host 110 causes camera module 112 to continuously capture images and provide those images to host 110 using connection 142. In the snapshot mode of operation, host 110 causes camera module 112 to capture a single image and provide that image to host 110 using connection 142 in response to a snapshot signal from host 110. Host 110 may cause camera module 112 to provide a flash signal to flash device 114 to generate a flash according to environmental light conditions in snapshot mode. Host 110 provides parameters to camera module 112 in viewfinder mode and snapshot mode to determine how camera module 112 captures images as will be described in additional detail below. In the embodiment of FIG. 1, processor 116 executes firmware 118 to allow host 110 to operate camera module 112. Firmware 118 comprises instructions configured to cause functions to be performed in response to being executed by processor 116. These functions include accessing information from camera module 112, generating signals and parameters, and providing signals and parameters to camera module 112. Memory 120 stores images received by host 110 from camera module 112. Camera module 112 captures images in either viewfinder mode or snapshot mode in response to signals from host 110. Host 110 provides the signals to camera module 112 using interface 122 and stores parameters in registers 124. As shown in FIG. 2, registers 124 comprise registers 200 through 216. Register 200 is configured to store a flash enable/flash type indicator. The flash enable/flash type indicator indicates whether or not a flash device 114 is present and enabled and, if present, the type of flash device, e.g. an LED flash device or a xenon flash device. Register 202 is configured to store a flash time. The flash time may be used by camera module 128 as the amount of time to turn on flash device 114. Register 204 is configured to store an exposure time. The exposure time is used by control circuit 126 to control how long an image is exposed in image sensor array 128. Register 206 is configured to store a gain. The gain is provided to gain amplifier 130 to control the amount of gain that is applied to image data by gain amplifier 130. Register 208 is configured to store a flash exposure-gain-product (EGP). Register 210 is configured to store a flash EGP threshold. The flash EGP threshold may be used by host 110 to determine whether or not to cause a flash to be generated by flash device 114 while capturing an image. Register 212 is configured to store a flash maximum time. The flash maximum time indicates the maximum amount of time that a flash may be used during an image exposure. Register 214 is configured to store a flash red coefficient. The flash red coefficient is provided to image processing circuit 134 to adjust the white balance of an image when a flash is used during image exposure. Register 216 is configured to store a flash blue coefficient. The flash blue coefficient is provided to image processing circuit 134 to adjust the white balance of an image when a flash is used during image exposure. In response to the signals and parameters from host 110, control circuit 126 operates camera module 112 in viewfinder mode (continuous images) or snapshot mode (single image with or without flash). To capture an image in either mode, control circuit 126 provides signals to image sensor array 128 to cause an image to be captured according to one or more parameters provided by host 110. The parameters include an exposure time from register 204 and a gain from register 212 as will be described in additional detail below. Image sensor array 128 comprises an array of photo diodes and associated optics for focusing an image onto the array. The array is arranged in rows and columns of photo diodes. Each photo diode discharges a capacitor in response to the amount of light that is exposed on the photo diode. To capture an image, control circuit 126 causes the capacitors to be reset by charging the capacitors to a supply voltage. The photo diodes are then exposed to a light source on a row-by-row basis for the amount of time associated with the exposure time in register 204 to cause the capacitors to discharge in response to the amount of light from the light source. After the time period elapses, control circuit 126 causes the capacitors in a row to be sampled to capture the image data from that row. Image sensor array 128 provides the image data for each row to gain amplifier 130. Gain amplifier 130 comprises a programmable gain amplifier. Gain amplifier 130 receives the image data from image sensor array 128 and amplifies the image data using the gain provided from register 206 by control circuit 126. Gain amplifier 130 provides the amplified image data to ADC 132. ADC 132 receives the amplified image data from gain amplifier 130. ADC 132 converts the amplified image data from an analog form to a digital form and provides the digital image data to image processing circuit 134. Image processing circuit 134 receives the digital image data from ADC 132 and performs various processing functions on the digital image data to generate an image that is displayable on a display. The processing functions may include an auto white balance function where the red and blue portions of the image may be adjusted using the flash red coefficient from register 214 and the flash blue coefficient from register 216 to compensate for the color temperature of the light illuminating the image. Image processing circuit 134 provides the image to host 110 using interface 122. Host 110 causes the image to be stored in memory 120. Host 110 may cause the image to be displayed on a display (not shown) integrated with the host or transmitted to another electronic device using a wired or wireless connection (not shown). In the embodiment of FIG. 1, flash device 114 comprises either an LED flash device or a xenon flash device. In other embodiments, flash device 114 may comprise other types of flash devices. Flash device 114 is operable in response to a flash signal from camera module 112 on connection 144. The flash signal may vary in duration according to the type of flash device 114 as will be described with respect to FIGS. 6 and 8 below. Control circuit 126 generates the flash signal and provides the flash signal to flash device 114 in response to a snapshot signal from host 110. FIGS. 3a, 3b, and 3c illustrate additional details of the operation of image sensor array 128 using a first exposure time. In the embodiment shown in FIGS. 3a through 3c, image sensor array 128 is operated as a rolling shutter such that the rows of image sensor array 128 are exposed sequentially starting at the top of the array and proceeding downward as indicated by the direction of an arrow 304. A shaded box 302a in FIG. 3a illustrates a first set of rows of image sensor array 128 being exposed at a first time. At a second, subsequent time, the first set of rows has finished being exposed, and a second set of rows is being exposed as illustrated by a shaded box 302b in FIG. 3b. Finally, at a third time subsequent to the second time, the first and second sets of rows have finished being exposed, and a third set of rows of image sensor array 128 is being exposed as illustrated by a shaded box 302c in FIG. 3c. As shown by the example in FIGS. 3a through 3c, different rows may be exposed at different times in response to a relatively short exposure time. FIGS. 4a, 4b, and 4c illustrate additional details of the operation of image sensor array 128 using a second exposure time that is longer in duration than the first exposure time illustrated in FIGS. 3a through 3c. As with FIGS. 3a through 3c, image sensor array 128 is operated as a rolling shutter such that the rows of image sensor array 128 are exposed sequentially starting at the top of the array and proceeding downward as indicated by the direction of an arrow 404. A shaded box 402a in FIG. 4a illustrates a first portion of the rows of image sensor array 128 being exposed at a first time. At a second, subsequent time, all of the rows in image sensor array 128 are being exposed simultaneously as illustrated by a shaded box 402b in FIG. 4b. Finally, at a third time subsequent to the second time, the last rows of image sensor array 128 being exposed as illustrated by a shaded box 402c in FIG. 4c. As shown by the example in FIGS. 4a through 4c, all rows in image sensor array 128 may be exposed simultaneously in response to a relatively long exposure time. The frame time of image sensor array 128 is the amount of time it takes to begin exposing all rows in image sensor array 128. In FIGS. 3a through 3c, the exposure time is less than the frame time as evidenced by the exposure of the first and second sets of rows completing prior to exposing the third set of rows. In FIGS. 4a through 4c, however, the exposure time is greater than the frame time as evidenced by all rows being exposed simultaneously as shown in FIG. 4b. In the viewfinder mode of operation and in the snapshot mode of operation where a flash is not used, image sensor array 128 may be operated with an exposure time that is greater than, less than, or equal to the frame time of image sensor array 128. In the snapshot mode of operation where a flash is used and image sensor array 128 operates as a rolling shutter, however, image sensor array 128 is operated with an exposure time that is greater than the frame time of image sensor array 128 to ensure that all rows of image sensor array 128 received the flash from flash device 114. When a flash is used in snapshot mode, host 110 calculates parameters such as flash time, exposure time, gain, and white balance coefficients to compensate for the increased light that the flash adds to an image. As described in FIGS. 5-10 below, host 110 calculates these parameters differently depending on the type of flash device and the operation of image sensor array 128. Accordingly, the parameters are associated with the type of flash device and the operation of image sensor array 128. FIGS. 5 and 6 illustrate an embodiment of system 100 in the snapshot mode of operation where flash device 114 is an LED flash device and image sensor array 128 operates as a rolling shutter. FIG. 5 is a flow chart illustrating a first embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 6 is a timing diagram 600 illustrating a first example of signals used to capture an image in a snapshot mode of operation. In the snapshot mode, host 110 determines whether a flash is desired by analyzing the one or more images received from camera module 112 during viewfinder mode. In response to determining that a flash is desired, host 110 accesses the flash enable/flash type register 200 to enable flash device 114. Host 110 also detects that the flash type of flash device 114 is an LED flash device. Camera module 112 provides a flash signal to the LED flash device to cause the flash to be activated or turned on for the amount of time specified by the flash time in register 202. Host 110 calculates the flash time and stores it in register 202 as described below. Referring to FIG. 5, host 110 calculates exposure time for the snapshot as indicated by a block 502. To calculate exposure time, host 110 calculates M—the ratio of flash illumination, IF, to viewfinder illumination, IV. Host 110 calculates M using the viewfinder exposure-gain product, EGPV, and the flash exposure-gain product, EGPF. To maintain proper exposure, the product of EGP and I are a constant. Therefore, the product of EGPV and IV is equal to the product of EGPF and IF as shown in equation [1]. EGPV·IV=EGPF·IF [1] Using equation [1], M can be calculated from EGPV and EGPF as shown in equation [2]. M = I F I V = EGP V EGP F [ 2 ] An auto exposure function in host 110 (not shown) measures EGPV during viewfinder mode. EGPF is programmed into register 206 by a user of system 100 and accessed by host 110. Accordingly, host 110 calculates M using these values in equation [2]. The exposure time in snapshot mode, ES, with an LED flash device is the sum of the FrameTime, i.e., the amount of time it takes to begin exposing all rows in image sensor array 128, and the FlashTime, i.e., the amount of time that the LED flash device is on, as shown in equation [3]. ES=FlashTime+FrameTime [3] FrameTime is programmed into host 110 by a user of system 100. FlashTime is deduced from equation [4] as follows. EV·GV·IV=FlashTime·GS·IF+(FlashTime+FrameTime)·GS·IV [4] In equation [4], the exposure-gain product times the illumination in viewfinder mode is equal to the sum of the product of FlashTime, the snapshot gain, GS, and the flash illumination, IF, and the product of the snapshot exposure time, ES, (with FlashTime+FrameTime substituted for ES in equation [4] using equation [3]), the snapshot gain, GS, and the viewfinder illumination. On the right side of the equation, the first product (FlashTime, GS, and IF) represents the amount of light added by flash device 114 and the second product (ES, GS, and IV) represents the amount of light present in viewfinder mode. As shown in equation [5], the flash illumination, IF, is replaced with M and the viewfinder illumination, IV, using equation [2]. EV·GV·IV=FlashTime·GS·M·IV+(FlashTime+FrameTime)·GS·IV [5] The viewfinder illumination, IV, values cancel on each side of equation [5] to give equation [6]. EV·GV=FlashTime·GS·M+(FlashTime+FrameTime)·GS [6] The snapshot gain, GS, is moved from the right side of equation [6] to give equation [7]. E V · G V G S = FlashTime · ( 1 + M ) + FrameTime [ 7 ] FlashTime can then be solved for as shown in equation [8]. FlashTime = E V · G V G S - FrameTime 1 + M [ 8 ] As noted above, an auto exposure function in host 110 measures EGPV, i.e., EV·GV, during viewfinder mode. Host calculates M using equation [2] above. FrameTime is programmed by a user of system 100, and host 110 calculates the snapshot gain, GS. Accordingly, host 110 calculates FlashTime using equation [8]. Host 110 also calculates white balance coefficients as indicated by a block 504. Host 110 calculates the white balance coefficients by interpolating between the white balance coefficients for viewfinder mode and for flash device 114. In particular, host 110 calculates a red coefficient, REDS, and a blue coefficient, BLUES, using M from equation [2] and red and blue coefficients for viewfinder mode, REDV and BLUEV, respectively, and for flash device 114, REDF and BLUEF, respectively, as indicated in equations [9] and [10], respectively. RED S = ( RED V · 1 1 + M ) + ( RED F · M 1 + M ) [ 9 ] BLUE S = ( BLUE V · 1 1 + M ) + ( BLUE F · M 1 + M ) [ 10 ] The flash time, exposure time, gain, and white balance coefficients are stored in registers 124 by host 110 as indicated by a block 506. A determination is made as to whether a snapshot signal has been received from host 110 by camera module 112 as indicated by a block 508. If a snapshot signal has not been received, then the determination of block 508 is made again at a later time. If a snapshot signal has been received, then an exposure is begun to capture an image using image sensor array 128 as indicated by a block 510. A flash signal is provided to flash device 114 to cause the LED flash to be turned on as indicated by a block 512. The exposure is finished according to the exposure time as indicated by a block 514. Processing is performed on the image by gain amplifier 130 and image processing circuit 134 using the gain and the white balance coefficients, respectively, as indicated by a block 516. The processed image is stored in memory 120 on host 110 as indicated by a block 518. FIG. 6 illustrates the operation of snapshot mode with an LED flash device. Timing diagram 600 illustrates a snapshot signal 602, a first row exposure signal 604, a last row exposure signal 606, an LED flash device on signal 608, and a data out signal 610. At a time t1, host 110 provides a snapshot signal to camera module 112. At a time t2, the first row of image sensor array 128 begins exposing, and at time t3, the last row of image sensor array 128 begins exposing. Thus, the FrameTime, in FIG. 6, is the amount of time between t2 and t3. The LED flash is turned on at time t3 in response to a flash signal from camera module 112 and remains on until time t4 when the first row of image sensor array 128 finishes exposing. The duration of the flash signal is determined using the flash time in register 202. At time t4, data output from image sensor array 128 to gain amplifier 130 begins and continues until time t5 when the last row of image sensor array 128 finishes exposing. FIGS. 7 and 8 illustrate an embodiment of system 100 in the snapshot mode of operation where flash device 114 is a xenon flash device and image sensor array 128 operates as a rolling shutter. FIG. 7 is a flow chart illustrating a second embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 8 is a timing diagram 800 illustrating a second example of signals used to capture an image in a snapshot mode of operation. In snapshot mode, host 110 determines whether a flash is desired by analyzing the one or more images received from camera module 112 during viewfinder mode. In response to determining that a flash is desired, host 110 accesses the flash enable/flash type register 200 to enable flash device 114. Host 110 also detects that the flash type of flash device 114 is a xenon flash device. Camera module 112 provides a flash signal to the xenon flash device to cause the flash to be fired. With a xenon flash device, all of the flash energy is discharged in a relatively short time period. Referring to FIG. 7, a snapshot gain, GS, is calculated as indicated in a block 702. The snapshot gain is derived as follows. For proper exposure, the exposure-gain product times the illumination in snapshot mode is set equal to the exposure-gain product times the illumination in viewfinder mode as shown in equation [11]. EV·GV·IV=ES·GS·IS [11] In equation [12], the exposure-gain product times the illumination in viewfinder mode is equal to the sum of the product of the exposure time of the flash, EF, the snapshot gain, GS, and the flash illumination, IF, and the product of the snapshot exposure time, ES, the snapshot gain, GS, and the viewfinder illumination, IV. On the right side of the equation, the first product (EF, GS, and IF) represents the amount of light added by flash device 114 and the second product (ES, GS, and IV) represents the amount of light present in viewfinder mode. EV·GV·IV=EF·GS·IF+ES·GS·IV [12] GS is solved for in equation [12] to get equation [13]. G S = E V · G V · I V E F · I F + E S · I V [ 13 ] To remove the (EF·IF) term in the denominator of equation [13], equation [14] is used. EF·GF·IF=EV·GV·IV [14] The (EF·IF) term of equation [14] is solved for to get equation [15]. E F · I F = E V · G V G F · I V [ 15 ] The ( E V · G V G F · I V ) term is substituted into equation [13] for the (EF·IF) term to get equation [16]. G S = E V · G V · I V E V · G V G F · I V + E S · I V [ 16 ] The viewfinder illumination, IV, on the right side of equation [16] cancels to get equation [17]. G S = E V · G V E V · G V G F + E S [ 17 ] An auto exposure function in host 110 measures EGPV, i.e., EV·GV, during viewfinder mode. The snapshot exposure time, ES, is programmed by a user of system 100 and is set to be slightly longer than the frame time of image sensor array 128. The flash gain, GF, is also programmed by a user of system 100 according to the flash gain of the xenon flash device. Accordingly, host 110 calculates the snapshot gain using equation [17]. The snapshot gain, GS, and exposure time, ES, are stored in registers 124 as indicated by a block 704. A determination is made as to whether a snapshot signal has been received from host 110 by camera module 112 as indicated by a block 706. If a snapshot signal has not been received, then the determination of block 706 is made again at a later time. If a snapshot signal has been received, then an exposure is begun to capture an image using image sensor array 128 as indicated by a block 708. A flash signal is provided to flash device 114 to cause the xenon flash to be fired as indicated by a block 710. The exposure is finished according to the exposure time as indicated by a block 712. Processing is performed on the image by gain amplifier 130 using the gain as indicated by a block 714. The processed image is stored in memory 120 on host 110 as indicated by a block 716. FIG. 8 illustrates the operation of snapshot mode with a xenon flash device. Timing diagram 800 illustrates a snapshot signal 802, a first row exposure signal 804, a last row exposure signal 806, a xenon flash trigger signal 808, and a data out signal 810. At a time t1, host 110 provides a snapshot signal to camera module 112. At a time t2, the first row of image sensor array 128 begins exposing, and at time t3, the last row of image sensor array 128 begins exposing. Thus, the frame time in FIG. 8 is the amount of time between t2 and t3. The xenon flash is fired at time t4 in response to a flash signal from camera module 112. With a xenon flash, the flash signal comprises a pulse with a relatively short duration. The first row of image sensor array 128 finishes exposing at time t5. At time t5, data output from image sensor array 128 to gain amplifier 130 begins and continues until time t6 when the last row of image sensor array 128 finishes exposing. FIGS. 9 and 10 illustrate an embodiment of system 100 in the snapshot mode of operation where flash device 114 is a xenon flash device and image sensor array 128 operates as a fixed, i.e., non-rolling, shutter. With a fixed or non-rolling shutter, all rows of image sensor array 128 are exposed simultaneously. FIG. 9 is a third embodiment of a method for capturing an image in a snapshot mode of operation. FIG. 10 is a timing diagram 1000 illustrating a third example of signals used to capture an image in a snapshot mode of operation. In snapshot mode, host 110 determines whether a flash is desired by analyzing the one or more images received from camera module 112 during viewfinder mode. In response to determining that a flash is desired, host 110 accesses the flash enable/flash type register 200 to enable flash device 114. Host 110 also detects that the flash type of flash device 114 is a xenon flash device. Camera module 112 provides a flash signal to the xenon flash device to cause the flash to be fired. With a xenon flash device, all of the flash energy is discharged in a relatively short time period. Referring to FIG. 9, a snapshot exposure time, ES, is calculated as indicated in a block 902. The snapshot exposure time is derived as follows. For proper exposure, the exposure-gain product times the illumination in snapshot mode is set equal to the exposure-gain product times the illumination in viewfinder mode as shown in equation [18]. EV·GV·IV=ES·GS·IS [18] In equation [19], the exposure-gain product times the illumination in viewfinder mode is equal to the sum of the product of the exposure time of the flash, EF, the snapshot gain, GS, and the flash illumination, IF, and the product of the snapshot exposure time, ES, the snapshot gain, GS, and the viewfinder illumination, IV. On the right side of the equation, the first product (EF, GS, and IF) represents the amount of light added by flash device 114 and the second product (ES, GS, and IV) represents the amount of light present in viewfinder mode. EV·GV·IV=EF·GS·IF+ES·GS·IV [19] To remove the flash illumination, IF, from equation [19], equation [20] is used. EF·GF·IF=EV·GV·IV [20] The flash illumination, IF, is solved for in equation [20] to get equation [21]. I F = E V · G V · I V E F · G F [ 21 ] The ( E V · G V · I V E F · G F ) term from equation [21] is substituted into equation [19] for IV to get equation [22]. E V · G V · I V = E F · G S · E V · G V · I V E F · G F + E S · G S · I V [ 22 ] The viewfinder illumination, IV, on both sides of equation [22] cancels and the flash exposure time, EF, on the right side of equation [22] cancels to get equation [23]. E V · G V = E V · G V · G S G F + E S · G S [ 23 ] The snapshot exposure time, ES, is solved for in equation [23] to get equation [24]. E S = E V · G V G S - E V · G V G F [ 24 ] The terms of equation [24] are rearranged to get equation [25]. E S = E V · G V ⁡ ( G F - G S G F · G S ) [ 25 ] An auto exposure function in host 110 measures EGPV, i.e., EV·GV, during viewfinder mode. The snapshot gain, GS, is programmed by a user of system 100. The flash gain, GF, is programmed by a user of system 100 according to the flash gain of the xenon flash device. Accordingly, host 110 calculates the snapshot gain using equation [25]. The snapshot gain, GS, and exposure time, ES, are stored in registers 124 as indicated by a block 904. A determination is made as to whether a snapshot signal has been received from host 110 by camera module 112 as indicated by a block 906. If a snapshot signal has not been received, then the determination of block 906 is made again at a later time. If a snapshot signal has been received, then an exposure is begun to capture an image using image sensor array 128 as indicated by a block 908. A flash signal is provided to flash device 114 to cause the xenon flash to be fired as indicated by a block 910. The exposure is finished according to the exposure time as indicated by a block 912. Processing is performed on the image by gain amplifier 130 using the gain as indicated by a block 914. The processed image is stored in memory 120 on host 110 as indicated by a block 916. FIG. 10 illustrates the operation of snapshot mode with a xenon flash device. Timing diagram 1000 illustrates a snapshot signal 1002, a rows exposed signal 1004, a xenon flash trigger signal 1006, and a data out signal 1008. At a time t1, host 110 provides a snapshot signal to camera module 112. At a time t2, all rows of image sensor array 128 begin exposing. The xenon flash is fired at time t3 in response to a flash signal from camera module 112. With a xenon flash, the flash signal comprises a pulse with a relatively short duration. The rows of image sensor array 128 finish exposing at time t4. At time t4, data output from image sensor array 128 to gain amplifier 130 begins and continues until time t5 when all of the row data has been output. FIG. 11 is a block diagram illustrating an embodiment of a mobile telephone 1100 that comprises the embodiment of FIG. 1. Mobile telephone 1100 comprises system 100 as shown in FIG. 1. Mobile telephone 1100 is configured to allow a user to place and receive telephone calls and other voice and data transmissions using a wireless network. Mobile telephone 1100 illustrates one embodiment of a system that includes system 100. In other embodiments, system 100 may be included in other types of portable devices such as personal digital assistants (PDAs), laptop computer systems, handheld electronic devices, or other portable processing systems. System 100 may also be included in other types of non-portable devices such as desktop computer systems, video game machines, or other non-portable processing systems. FIG. 12 is a block diagram illustrating an alternative embodiment of the system of FIG. 1. In FIG. 12, system 1200 is configured to perform the same functions of system 100 described above. System 1200 comprises host 110, a camera module 1202, and flash device 114. Camera module 1202 comprises interface 122, registers 124, control circuit 126, image sensor array 128, gain amplifier 130, analog-to digital converter 132, image processing circuit 134, a processor 1204, and firmware 1206. In the embodiment of FIG. 12, camera module 1202 performs many of the functions described above in FIGS. 5, 7, and 9 with respect to host 110 using processor 1204 and firmware 1206. In particular, processor 1204 and firmware 1206 generate parameters used in the viewfinder and snapshot modes of operation of camera module 1202. These parameters include exposure time, gain, and white balance coefficients. System 1200 may be used in place of system 100 in system 1100 shown in FIG. 11. The embodiments described above used various combinations of hardware and software components to implement the features described above. In other embodiments, other combinations of hardware and software components may be used. Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that a variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described without departing from the scope of the present invention. This application is intended to cover any adaptations or variations of the specific embodiments discussed herein. Therefore, it is intended that this invention be limited only by the claims and the equivalents thereof.
<SOH> BACKGROUND <EOH>Some portable electronic devices, such as mobile telephones, include image capture capabilities similar to those associated with a digital camera. These devices, however, may be smaller and/or more compact than many digital cameras, and as a result, do not have the space that is needed to accommodate all of the components of a conventional standalone digital camera. Accordingly, certain features that may be common in digital cameras may be difficult to include in portable electronic devices. In addition, portable electronic devices that include image capture capabilities may be offered at prices less than those associated with digital cameras. As a result, certain features that may be common in digital cameras may be omitted from portable electronic devices to allow desired price targets of the electronic devices to be met. It would be desirable to be able to provide additional image capture features in portable electronic devices while minimizing the size and cost associated with the features.
<SOH> SUMMARY <EOH>In an exemplary embodiment, the present disclosure provides a camera module comprising an image sensor array, a gain amplifier, an indicator set to indicate whether a first flash device or a second flash device is present, and a plurality of storage locations. The plurality of storage locations is configured to store an exposure time and a gain. The exposure time and the gain are associated with the first flash device in response to the indicator indicating the presence of the first flash device, and the exposure time and the gain are associated with the second flash device in response to the indicator indicating the presence of the second flash device. The image sensor array is configured to capture an image using the exposure time, and the gain amplifier is configured to perform processing on the image using the gain.
20040305
20080219
20050908
62609.0
1
HENDERSON, ADAM
CAMERA MODULE
UNDISCOUNTED
0
ACCEPTED
2,004
10,795,217
ACCEPTED
Portable power inverter with pass through device
A portable power inverter having a pass through device to facilitate connection and operation of both A.C. and D.C. power consuming devices to a single outlet of a single D.C. power source. Inverter circuitry is electrically coupled to the external D.C. power source for inverting D.C. voltage to an A.C. voltage source. A.C. electrical outlets are provided to facilitate a connection to an external A.C. power-consuming device. The pass through device provides an independent and simultaneous connection to an additional D.C. outlet to allow connection an external D.C. power-consuming device. The pass through device allows connection of D.C. consuming devices that would otherwise be connected directly to the external D.C. power source while the inverter is so connected thus allowing connection and operation of both A.C. and D.C power consuming devices through a single external D.C. power outlet of a single D.C. power source.
1. A power inverter comprising: a housing; a first electrical connector for connecting said inverter to an external D.C. voltage source; a circuit assembly supported within said housing and electrically coupled to said first electrical connector to facilitate a connection to said D.C. power source, said circuit assembly comprising an inverter circuit equipped with electrical components for converting said external D.C. voltage source to an A.C. voltage source; an A.C. electrical outlet connected to said housing provided to facilitate a connection to an external A.C. power consuming device, said A.C. electrical outlet being powered by said A.C. voltage source when said first electrical connector is connected to said external D.C. power source; and a pass through device having a D.C. electrical outlet to facilitate a connection to and providing a D.C. voltage source to an external D.C. power consuming device when said first electrical connector is connected to said external D.C. power source. 2. The inverter according to claim 2, wherein said first electrical connector is a male plug connector adapted to mate with a female socket of said external D.C. voltage source, said D.C. electrical outlet is a female socket correspondingly dimensioned to accommodate said male plug connector thereby mirroring said female socket of said external D.C. voltage source. 3. The inverter according to claim 1, wherein said first electrical connector is a male cigarette-type 12 volt plug connector adapted to mate with a female cigarette-type 12 volt socket of said external D.C. voltage source, said D.C. electrical outlet is a female cigarette-type 12 volt socket connector thereby mirroring said female cigarette-type 12 volt socket of said external D.C. voltage source. 4. The inverter according to claim 1 wherein said A.C. electrical outlet includes a plurality of A.C. electrical outlets. 5. The inverter according to claim 1, wherein said D.C. electrical outlet and said inverter circuitry are connected to said first electrical connector in parallel. 6. The inverter according to claim 5, wherein said circuit assembly includes a printed circuit board, said first electrical connector being electrically coupled to said printed circuit board and thereby establishing a connection from a positive and a ground line of said external D.C. voltage source to corresponding leads of said printed circuit board, said corresponding leads of said printed circuit board each being electrically connected to each of said D.C. electrical outlet and said inverter circuitry thereby simultaneously providing power to each of said D.C. electrical outlet and said A.C. electrical outlet. 7. The power inverter according to claim 1, further comprising a front end plate and a rear end plate secured to said housing in a manner so as to enclose said circuit assembly within said housing, wherein at least one of said front end plate and said rear end plate include a plurality of ventilation holes through which air can pass to and from the interior of the housing. 8. The power inverter according to claim 7, further comprising an intake fan mounted to one of said front end plate and said rear end plate to intake cooling air and circulate air within the housing to increase heat dissipation from the heat sink plate to the air and then to the housing. 10. The power inverter according to claim 7, wherein said first electrical connector extends through a first one of said front end plate and said rear end plate, and said A.C. electrical outlet and said D.C. electrical outlet being mounted through a second one of said front end plate and said rear end plate.
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention is related to a power inverting device and more particularly to a portable power inverting device having a pass through device for connection and operation of both A.C. and D.C. power consuming devices to a single outlet of a single power source. 2. Background of the Related Art Portable power inverter devices are well known in the art. These devices often provide a source of A.C. electrical power to run A.C. devices when in an environment where only a D.C. voltage source is available such as in an automobile. Power inverters provide the ability to power A.C. consuming devices when only such D.C. power sources are available. Examples of such power inverters are disclosed in the following U.S. patents, each of which are herein incorporated by reference: U.S. Pat. Nos. 6,411,514; 5,742,478; and 5,170,336. However, while these and other prior art inverters are connected to the D.C. power source, that connection/D.C. source is no longer useable while the inverter is connected. SUMMARY OF THE INVENTION The present invention is directed to a portable power inverter having a housing enclosing power inverting circuitry. An electrical connector connects the housing to an external D.C. voltage source. The circuit assembly supported within said housing is electrically coupled to the external D.C. power source. The circuit assembly includes inverter circuit equipped with electrical components for inverting the supplied D.C. voltage to an A.C. voltage source. A.C. electrical outlets are provided to facilitate a connection to an external A.C. power consuming device. A pass through device provides an independent and simultaneous connection to an additional D.C. outlet to allow connection of an external D.C. power consuming device. The pass through device allows connection of D.C. consuming devices that would otherwise be connected directly to the external D.C. power source while the inverter is so connected thus allowing connection and operation of both A.C. and D.C power consuming devices through a single external D.C. power outlet of a single D.C. power source. BRIEF DESCRIPTION OF THE DRAWINGS The above mentioned and other features and objects of this invention, and the manner of attaining them, will become more apparent and the invention itself will be better understood by reference to the following description of an embodiment of the invention taken in conjunction with the accompanying drawings, wherein: FIG. 1 is a perspective view of the Power Inverter according to the present invention. FIG. 2 is a bottom side view of the Power Inverter of FIG. 1. FIG. 3 is a front side view of the Power Inverter of FIG. 1. FIG. 4 is a back side view of the Power Inverter of FIG. 1. FIG. 5 is a left side view of the Power Inverter of FIG. 1. FIG. 6 is a right side view of the Power Inverter of FIG. 1. FIG. 7 is a top side view of the Power Inverter according to the present invention. FIG. 8a is an exploded view of the power inverter according to the present invention. FIG. 8b is an isolated view showing a rear side portion of the printed circuit board. DESCRIPTION OF THE PRESENT INVENTION FIG. 1. depicts a persective view of the pwer inverter according to the present invention. FIGS. 2-7 depict the six side views of the inverter of FIG. 1. A housing 11 made of aluminum or other suitable hard material encloses much of the working components of the inverter 1 with a pair of end plates 3,13 form to enclose the housing. As shown in FIG. 1, the end plate 3 has multiple outlets; two A.C. outlets 5a, 5b, a D.C. outlet 7 and a power switch 9. The D.C. outlet represents a pass-through outlet to maintain an available D.C. power source and will be discussed in further detail below. FIG. 8a depicts an exploded view of the inverter of FIG. 1 exposing the essential working components. It is first to be understood, that power inverters for converting a 12 volt power source to an available 110 volt A.C. source is old and well known in the art. Conventionally, these components are mounted on a printed circuit board such as shown in FIG. 8a. The printed circuit board has the essential components to convert a 12-volt power source for running an A.C. current consuming device. Such off the shelf circuitry is readily available to one of ordinary skill in the art. Thus no further details regarding the component circuitry or details regarding power inverting in general need to be discussed in further detail. Any power inverting circuitry for inverting 12 volts to A.C. voltage to run an A.C. consuming device may be employed. It is also understood the inverter circuitry can be designed for various power ratings over a range of watts. For example, a small 100 watt power inverter may be desirable for extreme portability to power low power consuming A.C. devices such as a clock or radio. The wattage rating may be increased to exceed 1000 watts depending on the intended application for the inverter. Such arrangements are well known in the art and are readily available. The present invention is primarily directed to the arrangement of power inverter components employing a pass through device to maintain the availability of the 12-volt source which powers the inverter. Thus the remaining discussion will be directed to such an arrangement. As previously mentioned, the present invention includes two A.C. outlets 5a, 5b mounted on the end plate 3. The outlets 5a, 5b are intended to power two different A.C. consuming devices by inverting a 12 volt (or other low voltage D.C. source) to A.C. Such a D.C. voltage source is often found in automobiles. For such use, the present invention includes a male plug type cigarette electrical connector 17 for insertion into a female cigarette outlet commonly found in automobiles as well as other 12-volt power sources. Power leads (positive and ground) 19 extend from the male plug 17 through a rear end plate 21 to connect the D.C. voltage source to the printed circuit board 15. The power leads may first pass through a fuse box 23 prior to connecting to printed circuit board 15 as is conventionally known in the art. The power leads 19 include a positive lead 19a and ground lead 19b which are connected/soldered to corresponding points on the printed circuit board 15. Preferably the leads 19a, 19b are connected via removable connectors 25a, 25b which extend through the printed circuit board and are soldered to corresponding positive lines 27/28 at two points 27a,27b and 28a,28b to ensure a secure connection to the circuit board. Thus the leads 19 bring power from an external D.C. voltage source to the inverter circuitry. The A.C. outlets 5a,5b are connected to corresponding points on the printed circuit board as is conventional in the art and generally depicted in FIG. 8a. As the connection and supply of A.C. current to A.C. outlets in an inverter is well within the knowledge of one of ordinary skill in the art, no further elaboration is necessary. As previously discussed, it is desirable to make available a D.C. receptacle outlet to maintain a D.C. power source otherwise occupied by male plug 17. Thus the inverter of the present invention includes a pass through device to maintain the availability of a D.C. outlet while the inverter is connected to the external D.C. power source. The present invention includes a female cigarette plug type outlet 7 disposed on end plate 3 adjacent A.C. outlets 5a, 5b. The D.C. outlet 7 is comprised of a common female receptacle as commonly employed as cigarette lighters in vehicles. The female outlet 7 is correspondingly dimensioned to accommodate the male plug 17 connecter and thus mirrors the female socket of the external D.C. voltage source to which the male plug 17 is normally connected. To power the D.C. female outlet 7, a positive lead 39a is connected through the printed circuit board and connected to positive line 27 at point 27c as shown in FIGS. 8A & 8B. Similarly ground line 39b extends from the female outlet 7 through the printed circuit board 15 and is connected to ground line 28 at point 28c. Thus the female outlet 7 draws current directly from external D.C. power source in parallel to the inverter circuitry. Such an arrangement facilitates simultaneous use of the A.C. outlets and the D.C. outlet to the extent the load is not excessive relative to the rating of the external D.C. voltage source to which the inverter is connected. Should the load exceed a predetermined value, the fuse 23 would open the circuit isolating the inverter circuitry and female D.C. outlet 7 from the power source. Thus the present invention provides a compact portable arrangement for inverting a D.C. voltage source to power an A.C. consuming device and incorporate a pass through device to simultaneously maintain the availability of a D.C. power source. The inverter unit effectively provides outlets to run both A.C. power consuming devices as well as D.C. power consuming devices simultaneously without having to make or break any connection between the inverter and original external D.C. power source. To further enhance the performance of the inverter circuitry, each end plate are provided with ventilation holes to allow air to pass through the housing 11 and cool the electrical components during use. A fan 51 may also be employed to positively force air through the housing and may be connected to the inverter assembly as is commonly known in the art. While this invention has been described as having an exemplary design, the present invention may be further modified within the spirit and scope of this disclosure. This application is therefore intended to cover any variations, uses, or adaptations of the invention using its general principles. Further, this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains. For example, only a portion of the printed lines are depicted in FIG. 8B sufficient to demonstrate the connection of lead lines 19 to the circuit as well as the connection of the D.C. receptacle to appropriate lines on the board. Other printed circuitry arrangements may be employed to facilitate a parallel connection between the D.C. outlet and inverting circuitry.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The invention is related to a power inverting device and more particularly to a portable power inverting device having a pass through device for connection and operation of both A.C. and D.C. power consuming devices to a single outlet of a single power source. 2. Background of the Related Art Portable power inverter devices are well known in the art. These devices often provide a source of A.C. electrical power to run A.C. devices when in an environment where only a D.C. voltage source is available such as in an automobile. Power inverters provide the ability to power A.C. consuming devices when only such D.C. power sources are available. Examples of such power inverters are disclosed in the following U.S. patents, each of which are herein incorporated by reference: U.S. Pat. Nos. 6,411,514; 5,742,478; and 5,170,336. However, while these and other prior art inverters are connected to the D.C. power source, that connection/D.C. source is no longer useable while the inverter is connected.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention is directed to a portable power inverter having a housing enclosing power inverting circuitry. An electrical connector connects the housing to an external D.C. voltage source. The circuit assembly supported within said housing is electrically coupled to the external D.C. power source. The circuit assembly includes inverter circuit equipped with electrical components for inverting the supplied D.C. voltage to an A.C. voltage source. A.C. electrical outlets are provided to facilitate a connection to an external A.C. power consuming device. A pass through device provides an independent and simultaneous connection to an additional D.C. outlet to allow connection of an external D.C. power consuming device. The pass through device allows connection of D.C. consuming devices that would otherwise be connected directly to the external D.C. power source while the inverter is so connected thus allowing connection and operation of both A.C. and D.C power consuming devices through a single external D.C. power outlet of a single D.C. power source.
20040309
20070918
20050915
98338.0
3
DINH, TUAN T
PORTABLE POWER INVERTER WITH PASS THROUGH DEVICE
UNDISCOUNTED
0
ACCEPTED
2,004
10,795,407
ACCEPTED
MEMS differential actuated nano probe and method for fabrication
A MEMS differential actuated nano probe includes four suspension beams arranged in parallel, a connecting base connecting to the suspension beams, a nano probe. Two of the suspension beams elongate due to thermal expansion to allow the deflection of the probe. By heating the suspension beams at different positions, the MEMS differential actuated nano probe can move in two directions with two degrees of freedom. The deflection of the MEMS differential actuated nano probe can be also achieved in piezoelectric or electrostatic way.
1. A MEMS differential actuated nano probe, comprising: a MEMS actuator, comprising: a connecting base; and two suspension beams arranged in parallel and connected to a first side of the connecting base; and a probe, mounted on a second side of the connecting base adjacent to the first side; by heating one of the suspension beams, the heated suspension beam extended in order to deflect the MEMS differential actuated nano probe toward the other suspension beam, so that the MEMS differential actuated nano probe has one degree of freedom. 2. The probe of claim 1, further comprising two other suspension beams, the suspension beams and the other suspension beams arranged in a rectangular shape and connected to the first side of the connecting base, wherein the probe having two degrees of freedom by heating the suspension beams and the other suspension beams at different positions. 3. The probe of claim 1, wherein the probe is applicable in scanning tunneling microscope (STM), atomic force microscope (AFM), electric force microscope (EFM), Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM). 4. A MEMS differential actuated nano probe, comprising: a MEMS actuator, comprising: a connecting base; and two suspension beams arranged in parallel and connected to a first side of the connecting base, the suspension beams are formed of a piezoelectric material; and a probe, mounted on a second side of the connecting base adjacent to the first side; by applying a voltage to one of the suspension beams, the suspension beam extended or shortened in order to deflect the MEMS differential actuated nano probe toward the other suspension beam, so that the MEMS differential actuated nano probe has one degree of freedom. 5. The probe of claim 4, wherein the piezoelectric material is selected from a group consisting of quartz, ZnO and (Pb(Zr,Ti)O3(PZT). 6. The probe of claim 4, further comprising two other suspension beams, the suspension beams and the other suspension beams arranged in a rectangular shape and connected to the first side of the connecting base, wherein the probe having two degrees of freedom by applying a voltage to the suspension beams and the other suspension beams at different positions. 7. A MEMS differential actuated nano probe, comprising: a MEMS actuator, comprising: a connecting base; and two suspension beams arranged in parallel and connected to a first side of the connecting base, the suspension beams are formed of a piezoelectric material; a probe, mounted on a second side of the connecting base adjacent to the first side; and at least one electrode plate, adjacent to upper, lower, left and right sides of the connecting base; by applying a positive voltage to the connecting base, and the electrode plate grounded, the electrostatic force generated between the connecting base and the electrode plate deflect the MEMS differential actuated nano probe, so that the MEMS differential actuated nano probe has one degree of freedom. 8. The probe of claim 7, further comprising two other suspension beams, the suspension beams and the other suspension beams arranged in a rectangular shape and connected to the first side of the connecting base, wherein the probe having two degrees of freedom by applying a positive voltage to connecting base and grounding the electrode plate at different positions. 9. A method for fabrication a MEMS differential actuated nano probe, comprising the following steps: (a) providing a silicon chip with a major flat indicating the <100> direction, a first insulation layer is deposited on the silicon chip to define a probe pattern; (b) forming a trench by dry etching the probe pattern as an upper portion of the probe; (c) forming a second insulation layer over the first insulation layer and the trench; (d) forming a cone-shaped recess under the trench by wet etching; (e) forming a third insulation layer over the trench and the recess; (f) depositing a first structural layer on the third insulation layer to fill up the trench and the recess in order to form the probe structure, the first structural layer is used to define at least one first suspension beam and a connecting base pattern connecting to the first suspension beam, the connecting base pattern is corresponding to the probe; (g) depositing a first sacrificial layer on the first structural layer, then defining and etching the first sacrificial layer to form the connecting base; (h) depositing a second structural layer on the first sacrificial layer to form at least one second suspension beams and the connecting base structure; (i) depositing a second sacrificial layer on the second structural layer as a protection layer during wet etching; (j) immersing the silicon chip in KOH solution to etch the back side of the silicon chip in order to release the probe and a standoff; and (k) performing wet etching to remove the first sacrificial layer and the second sacrificial layer to suspend the first and the second suspension beams above the standoff. 10. The method of claim 9, wherein the first insulation layer is SiO2. 11. The method of claim 9, wherein the step (b), a trench is formed at a location of the probe pattern by using deep reactive ion etching machine. 12. The method of claim 9, wherein the first insulation layer is SiO2. 13. The method of claim 9, wherein the step (d), a cone-shaped recess is formed under the trench by using TMAH solution. 14. The method of claim 9, wherein the third insulation layer is SiO2. 15. The method of claim 9, wherein the step (f), a polysilicon layer is deposited on the third insulation layer to form the first structural layer by low-pressure chemical vapor deposition. 16. The method of claim 9, wherein the step (g), a silicon phosphorus glass is deposited on the first structural layer as the first sacrificial layer. 17. The method of claim 9, wherein the step (h), a polysilicon layer is deposited on the first sacrificial layer by low-pressure chemical vapor deposition to form a second structural layer. 18. The method of claim 9, wherein the step (i), a silicon phosphorus glass layer is deposited on the second structural layer by low-pressure chemical vapor deposition as a protection layer during wet etching. 19. The method of claim 9, wherein the step (k), the first and second sacrificial layers are removed by wet etching using HF solution.
BACKGROUND OF THE INVENTION 1. Field of Invention The present invention relates to a MEMS differential actuated nano probe applicable in data storage, nanolithography and scanning probe microscope such as a scanning tunneling microscope (STM), atomic force microscope (AFM), electric force microscope (EFM), Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM), and more particularly to a MEMS differential actuated nano probe. 2. Related Art The currently available nano probe technology is based on a work platform of an atomic force microscope (AFM). The principle of the AFM uses the force lower than 1 nano Newton (about 10×−7 g) to finely sketch a structure of a sample to be tested with horizontal resolution below 10 nanometers and vertical resolution below 1 nanometer. The nano probe has cured the disadvantages regarding to diffraction limitation encountered in the conventional optical microscope, and has great contribution in micrometer and nanometer scale technology. However, most of the currently available nano probes are of passive types using an additional high-precision positioning platform to achieve topography scanning in a nanometer scale. In an IBM journal “Journal of Research and Development”, Vol. 44, No. 3, 2000, titled “The Millipede-more than one thousand tips for future AFM data storage”, probes are driven in a thermo-mechanical way to perform reading and writing on a polymer film. The positioning of the probes is operated via a driver that is controlled piezoelectrically or electromagnetically. The probes server to heat at fixed position. The driver drives the probes to move so as to write data on a polymer data storage medium. In a paper published in MEMS Conference in January, 2003, titled “Micromachined arrayed DIP PEN nanolithography probes for sub-100 nm direct chemistry patterning”, disclosed an active nano probe made of Si3N4 and Au respectively having different thermal expansion coefficients. When the nano probe is heated, the nano probe deflects toward the material having a smaller thermal expansion coefficient. Furthermore, the nano probe has characteristics of moving in single direction with one degree of freedom. In the above or other current disclosures, passive nano probes only serve to heat, without movement. Therefore, an additional actuator is needed to drive the probe to move for scanning. The active nano probes only have single direction with one degree of freedom. Both of them are not convenient in use. SUMMARY OF THE INVENTION It is an object of the invention to provide a MEMS differential actuated nano probe including a MEMS differential actuator. The MEMS differential actuator includes four suspension beams and a connecting base. The four suspension beams are arranged in parallel and respectively connected to corners at one side of the connecting base. The probe is mounted on the connecting base away from the suspension beams. Deflection of the MEMS differential actuator allows the movement of the probe in different directions. The MEMS differential actuated nano prober can be driven thermally, piezoelectrically or electrostatically. When the MEMS differential actuated nano probe is driven thermally, two suspension beams elongate due to thermal expansion so that the actuator deflects toward the non-heated portions of the suspension beams and thus the probe is driven to move. By means of heating the suspension beams at different positions, the MEMS differential actuated nano probe deflects in two directions with two degrees of freedom, i.e., vertical and horizontal motion. In the case that the electrostatic force is used to drive the nano probe to deflect, an electrode plate is mounted respectively at upper, lower, right and left sides of the connecting base. When the connecting base is applied with a positive voltage, the electrode plates are grounded to allow the MEMS differential actuated nano probe to deflect in vertical and horizontal directions. In the case that the MEMS differential actuated nano probe is driven piezoelectrically, the four suspension beams are made of piezoelectric materials such as quartz, ZnO or Pb(Zr,Ti)O3(PZT). By means of applying voltage, two of the suspension beams elongate or shortened, and the MEMS differential actuated nano probe deflects in directions. As described above, the MEMS differential actuator can reflect in vertical and horizontal directions, which is contrast to the prior art that only moves in one direction. Therefore, the application thereof is broadened. The MEMS differential actuated nano probe applicable in a scanning probe microscope, such as a scanning tunneling microscope (STM), an atomic force microscope (AFM), electric force microscope (EFM), a Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM). When the scanning probe microscope (SPM) is applied in data storage, the MEMS differential actuated nano probe can deflect vertically with increased force constant tolerance. The probe also deflects in horizontally to increase the capability of local scanning. In the applications of data storage and nanolithography, the MEMS actuator heats the tip of the nano probe while in operation for data writing and reading and performing nanolithography. Furthermore, the MEMS differential actuated nano probe can be also applied in dip pen nanolithography as a molecule self-assembling mechanism. Further scope of applicability of the present invention will become apparent from the detailed description given hereinafter. However, it should be understood that the detailed description and specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will become apparent to those skilled in the art from this detailed description. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will become more fully understood from the detailed description given herein below illustration only, and is thus not limitative of the present invention, wherein: FIG. 1 is a perspective view of a MEMS differential actuated nano probe according to one embodiment of the invention; FIG. 2A to FIG. 2D are schematic views of a vertical and horizontal movement of a nano probe that is driven electrostatically according to one embodiment of the invention; FIG. 3A to FIG. 3D are schematic views illustrating the vertical and horizontal movements of a MEMS differential actuated nano probe by means of thermally expanding of the different suspension beams, according to one embodiment of the invention; FIG. 4A to FIG. 4K are flowcharts of production of the MEMS differential actuated nano probe according to one embodiment of the invention; FIG. 5 is a schematic view of a MEMS differential actuated nano probe used in a scanning tunneling microscope (STM) according to one embodiment of the invention; FIG. 6 is a schematic view illustrating the MEMS differential actuated nano probe operating under AFM, FFM and MFM; FIG. 7 is a schematic view of the MEMS differential actuator applied in an electriostatical force microscope (EFM); and FIG. 8 is a schematic view of a MEMS differential actuator applied in SNOM. The SNOM is based on the AFM system that controls the distance between the probe and the samples by the feedback system. DETAILED DESCRIPTION OF THE INVENTION FIG. 1 is a perspective view of a MEMS differential actuated nano probe according to one embodiment of the invention. The MEMS differential actuated nano probe is an active probe including a nano probe 20 and a MEMS differential actuator capable of moving in two directions with two degrees of freedom. The MEMS differential actuated nano probe is fabricated by a MEMS process. The MEMS differential actuator 10 includes four suspension beams 11 and a connecting base 12. The four suspension beams 11 are arranged in parallel and respectively connected to corners at one side of the connecting base 12. The nano probe 20 is mounted on the connecting base 12 away from the suspension beams 11. The nano probe 20 is driven by the MEMS differential actuator 10 to move in different directions. The MEMS differential actuated nano probe is actuated thermally, electrostatically or piezoelectrically. FIG. 2A through FIG. 2D illustrate vertical and horizontal movements of a nano probe that is driven electrostatically. Electrode plates are mounted on upper, lower, right and left sides of the connecting base 12. Referring to FIG. 2A, the connecting base 12 is applied with a positive voltage and an upper electrode plate is grounded to deflect the actuator 10 upward. Referring to FIG. 2B to FIG. 2D, the lower, left and right electrode plates 110 are grounded to respectively deflect the actuator 10 downward, left and right. Similarly, if the actuator 10 is driven piezoelectrically, then the suspension beams 11 are made of piezoelectric materials. By applying voltage, two of them elongate to achieve vertical or horizontal deflection of the actuator 10. The piezoelectric material can be, for example, quartz, ZnO or Pb(Zr,Ti)O3(PZT). When the actuator 10 is actuated thermally, two of the suspension beams 11 thermally expand, and the whole structure of the actuator 10 inclines toward the remaining non-heated suspension beams 11, thereby deflecting the probe 20. In practice, the suspension beams are controlled via a control circuit to change the direction of probe deflection. FIG. 3A to FIG. 3D are schematic views illustrating vertical and horizontal movements of a MEMS differential actuated nano probe by means of thermally expanding of the suspension beams 11A, 11B, 11C and 11D at different positions. FIG. 3A illustrates the upward deflection of the probe when the suspension beams 11C and 11D are heated. When the control circuit acts to heat the suspension beams 11C and 11D, the suspension beams 11C and 11D elongate to allow the actuator 10 to deflect upward, thereby driving the probe 20 upward. When the probe is to move downward, as shown in FIG. 3B, the suspension beams 11A and 11B are heated under control of the control circuit and elongate due to thermal expansion so that the actuator 10 deflects downward and the probe 20 thereby deflects downward. FIG. 3C shows the probe 20 deflected out to the paper. When the suspension beams 11B and 11D are heated under control of the control circuit, they elongate due to thermal expansion so that the actuator 10 deflects and thus the probe 20 thereby deflects out to the paper. Referring to FIG. 3D, the probe is to move in a direction normal to the surface of the paper, the suspension beams 11A and 11C are heated under control of the control circuit and elongate due to thermal expansion, so that the actuator 10 and thus the probe 20 deflect in the direction, normal to the surface of the paper sheet. The MEMS differential actuated nano probe is an active probe. Thereby, the structure and operation of the nano probe can be simplified. FIG. 4A to FIG. 4K illustrate flowcharts of the fabrication of a MEMS differential actuated nano probe according to an embodiment of the invention. Referring to FIG. 4A, a silicon chip 30 with a crystal surface (100) is provided. A first insulation layer 40 is deposited on the silicon chip 30. The first insulation layer 40 can be, for example, SiO2. Referring to FIG. 4B, a probe pattern is defined on the insulation layer 40 by lithography. Then, a dry etching is performed using a deep reactive ion etching (DRIE) machine to form a trench 41 at the location of the probe pattern as an upper portion of a probe. Referring to FIG. 4C, a second insulation layer 50 is formed over the first insulation layer 40 and the trench 41 to protect sidewalls of the trench 41 during wet etching of the silicon chip 30 in subsequent processes. The material of the second insulation layer 50 is, for example, SiO2. Referring to FIG. 4D, the whole silicon chip 30 is immersed in TMAH or KOH solution for wet etching to form a cone-shaped recess 42. The trench 41 and the recess 42 are parts forming the nano probe structures. Referring to FIG. 4E, a third insulation layer 60 is formed over the trench 41 and the recess 42. The material of the third insulation layer 60 is, for example, SiO2. Referring to FIG. 4F, a polysilicon layer is deposited on the third insulation layer 60 by low-pressure chemical vapor deposition as a first structural layer 70. The part where the third insulation layer 60 fills up the trench 41 and the recess 42, forms a tip 71 of the probe. Patterns of two suspension beams 72 and a connecting base 73 are defined on the first structural layer 70 by lithography. The patterns are chemically etched to form two suspension beams 72 connected via the connecting base 73. The position of the connecting base 73 corresponds to the position of the probe 71. Referring to FIG. 4G, a PSG layer is deposited on the first structural layer 70 by low-pressure chemical vapor deposition as a first sacrificial layer 80. The first sacrificial layer 80 is defined by lithography and etched to form a contact hole connecting the first structural layer 70 and a second structural layer 90 formed later. Referring to FIG. 4H, another polysilicon layer is deposited on the first sacrificial layer 80 as the second structural layer 90. Patterns of two suspension beams 91 and another connecting base 73 are defined on the second structural layer 90 by lithography. The patterns are chemically etched to form two suspension beams 91 and a connecting base 73. The suspension beams 91 correspond to the suspension beams 72 on the first structural layer 70 so that the suspension beams 72 are arranged parallel to the suspension beams 91. Referring to FIG. 4I, a second sacrificial layer 100 is deposited on the second structural layer 90 by low-pressure chemical vapor deposition. The second sacrificial layer 100 performed as a protective layer in subsequent processes. Referring to FIG. 4J, the silicon chip 30 is immersed in a TMAH or KOH solution to etch a rear portion of the silicon chip 30 and expose the horn-shaped probe 71, and a standoff 31 on the silicon chip 30. Referring to FIG. 4K, the silicon chip 30 is immersed in an HF solution to remove the first and second sacrificial layers 80, 100 so that the suspension beams 72, 91, the connecting base 73 and the probe 71 are suspended above the standoff 31. Thereby, the MEMS differential actuated nano probe is accomplished. The MEMS differential actuated nano probe according to the invention can be used as a scanning probe microscope such as a scanning tunneling microscope (STM), an atomic force microscope (AFM), electric force microscope (EFM), a Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM). When the SPM is applied in data storage, the MEMS differential actuator can vertically move with broadened force constant design, and horizontally move with increased local scanning performance. In the applications of data storage and nano lithography, the MEMS differential actuator heats the tip of the probe in operation, for nano lithography and data writing and reading. The MEMS differential actuator can be applied in dip pen nanolithography for molecule self-assembly. FIG. 5 is a schematic view of MEMS differential actuated nano probe 10 used in a scanning tunneling microscope (STM). The MEMS differential actuator 10 has a nano probe 20 of scanning tunneling microscope at its front end. The scanning tunneling microscope includes a power supply for supplying a tunneling voltage between the probe 20 and a sample. According to the quantum theory, when a gap between the sample and the probe reaches a critical distance, the electrons pass through the energy barrier and then generate a tunneling current. The tunneling current I and the gap Z between the sample and the probe match the relationship below: I ∝ Exp ( - A ⁢ ( ϕ - V 2 ) · Z ) A = h π ⁢ 2 ⁢ ⁢ m wherein h is a Planck Constant, m is the mass of an electron, φ is a potential energy of tunneling gap, and V is an applied potential energy. The scanning tunneling microscope includes a current amplifier used to amplify the tunneling current. Since the tunneling current and the gas between the probe and the sample have an exponential relationship, the amplified tunneling current must pass through a LOG amplifier to compare with a predetermined current in a current comparator. Finally, the driving electronics drives the MEMS differential actuator 10 according to the result of comparison to achieve the scanning tunneling microscope. In general, the scanning tunneling microscope retrieves images in two modes: constant-current mode or constant-height mode. The constant-current mode is performed by a feedback scanning mechanism, and is suitable for samples having a highly rippling topography as shown in FIG. 5. The scanning speed of the constant-current mode is slow. Different from the constant-current mode, the constant-height mode performs scanning at a predetermined height and records tunneling currents at various positions. This method is suitable for samples having a lowly rippling topography with fast scanning speed. The MEMS differential actuated nano probe can be operated under these two modes. FIG. 6 is a schematic view illustrating the MEMS differential actuated nano probe operating under AFM, FFM and MFM. When a force is generated between the samples and the probe 20, the four suspension beams 11 constituting the MEMS differential actuated nano probe are slightly deformed by the generated force. The slight deformation will be detected by the light, emitted from a low-power laser and reflected to a photodiode via a mirror. A signal generated from the photodiode is amplified via a lock-in amplifier to control the movement of the MEMS differential actuator and the samples by means of a feedback circuit. The theory of the AFM is based on the Van Der Waals force. AFM includes a contact model and a non-contact model. The contact model is similar to the scanning tunneling microscope and comprising constant-force or constant-height mode. A constant-force mode controls the distance between the MEMS differential actuated nano probe and the samples by the feedback mechanism. The feedback mechanism of the constant-height mode is a close-loop control system. By detecting signal generated by light emitted on the nano probe from the low-power laser and reflected to the photodiode via the mirror to measure the surface profile with atomic-scale. In the non-contact AFM model, the MEMS differential actuator vibrates with small amplitude to approach the surface of the samples. The atomic-scale topography is measured with the change in amplitude, frequency and phase. A modulation unit sends a signal to the MEMS differential actuator via driving electronics to generate small amplitude. The change in frequency or phase can be sensed via the detection signal. The detection signal is amplified via the amplifier and locked at a predetermined frequency in a lock-in amplifier. After noise is filtered off, the detection signal is compared with initial data in the modulation unit for the control of the distance between the MEMS differential actuated nano probe and the samples. Thereby, AFM image retrieving is accomplished with the feedback mechanism. FFM is also called as a lateral force microscope (LFM), which is based on frictional force generated when the probe comes in contact with the samples. The MEMS differential actuated nano probe operates in a similar way as the contact model of AFM. The MFM is based on a magnetic film coated on the probe for measuring the distribution of magnetic force over the surfaces of the samples. The MFM operation is similar to that of AFM. FIG. 7 is a schematic view of the MEMS differential actuator applied in an electrostatic force microscope (EFM). The EFM is mainly used in measuring the distribution of electrostatic charges and electric field over the surfaces of the samples. It is based on an AC signal (V=VDC+VAC sin(ωt)) applied between the MEMS differential actuated nano probe and the samples. By detecting the detection signal generated by light emission on the nano probe 20 from the low-power laser and reflected to the photodiode, the deformation of the MEMS differential actuator is sensed. The control circuit keeps the constant distance between the MEMS differential actuator nano probe and the samples. The amplitude of the MEMS differential actuator at vibration frequency {overscore (ω)} is obtained by using the lock-in amplifier. The distributions of the electrostatic charges and the electric field are therefore obtained. FIG. 8 is a schematic view of a MEMS differential actuator applied in SNOM. The SNOM is based on an AFM system that controls the distance between the probe and the samples by the feedback control system. The SNOM performs scanning with a non-contact model to measure the topography and to achieve near-field imaging of the samples. Referring to FIG. 8, the control circuit controls the vibration of the MEMS differential actuated nano probe at a resonance frequency. The feedback control is performed in a way similar to the AFM. That is, the low-power laser emits the light on the nano probe. The light is then reflected onto the photodiode to generate a detection signal. With the use of the detection signal and the lock-in amplifier, the amplitude of the vibration of the MEMS differential actuated nano probe is obtained. Thereby, the topographies of the samples are measured. In addition, a laser is focused on a pinhole of the MEMS differential actuated nano probe to achieve the near-field optical microscope. The light passes through the samples and a photomultiplier tube, and is amplified via the lock-in amplifier. The images of a near-field microscope are obtained. Knowing the invention being thus described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the spirit and scope of the invention, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of Invention The present invention relates to a MEMS differential actuated nano probe applicable in data storage, nanolithography and scanning probe microscope such as a scanning tunneling microscope (STM), atomic force microscope (AFM), electric force microscope (EFM), Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM), and more particularly to a MEMS differential actuated nano probe. 2. Related Art The currently available nano probe technology is based on a work platform of an atomic force microscope (AFM). The principle of the AFM uses the force lower than 1 nano Newton (about 10× −7 g) to finely sketch a structure of a sample to be tested with horizontal resolution below 10 nanometers and vertical resolution below 1 nanometer. The nano probe has cured the disadvantages regarding to diffraction limitation encountered in the conventional optical microscope, and has great contribution in micrometer and nanometer scale technology. However, most of the currently available nano probes are of passive types using an additional high-precision positioning platform to achieve topography scanning in a nanometer scale. In an IBM journal “Journal of Research and Development”, Vol. 44, No. 3, 2000, titled “The Millipede-more than one thousand tips for future AFM data storage”, probes are driven in a thermo-mechanical way to perform reading and writing on a polymer film. The positioning of the probes is operated via a driver that is controlled piezoelectrically or electromagnetically. The probes server to heat at fixed position. The driver drives the probes to move so as to write data on a polymer data storage medium. In a paper published in MEMS Conference in January, 2003, titled “Micromachined arrayed DIP PEN nanolithography probes for sub-100 nm direct chemistry patterning”, disclosed an active nano probe made of Si 3 N 4 and Au respectively having different thermal expansion coefficients. When the nano probe is heated, the nano probe deflects toward the material having a smaller thermal expansion coefficient. Furthermore, the nano probe has characteristics of moving in single direction with one degree of freedom. In the above or other current disclosures, passive nano probes only serve to heat, without movement. Therefore, an additional actuator is needed to drive the probe to move for scanning. The active nano probes only have single direction with one degree of freedom. Both of them are not convenient in use.
<SOH> SUMMARY OF THE INVENTION <EOH>It is an object of the invention to provide a MEMS differential actuated nano probe including a MEMS differential actuator. The MEMS differential actuator includes four suspension beams and a connecting base. The four suspension beams are arranged in parallel and respectively connected to corners at one side of the connecting base. The probe is mounted on the connecting base away from the suspension beams. Deflection of the MEMS differential actuator allows the movement of the probe in different directions. The MEMS differential actuated nano prober can be driven thermally, piezoelectrically or electrostatically. When the MEMS differential actuated nano probe is driven thermally, two suspension beams elongate due to thermal expansion so that the actuator deflects toward the non-heated portions of the suspension beams and thus the probe is driven to move. By means of heating the suspension beams at different positions, the MEMS differential actuated nano probe deflects in two directions with two degrees of freedom, i.e., vertical and horizontal motion. In the case that the electrostatic force is used to drive the nano probe to deflect, an electrode plate is mounted respectively at upper, lower, right and left sides of the connecting base. When the connecting base is applied with a positive voltage, the electrode plates are grounded to allow the MEMS differential actuated nano probe to deflect in vertical and horizontal directions. In the case that the MEMS differential actuated nano probe is driven piezoelectrically, the four suspension beams are made of piezoelectric materials such as quartz, ZnO or Pb(Zr,Ti)O 3 (PZT). By means of applying voltage, two of the suspension beams elongate or shortened, and the MEMS differential actuated nano probe deflects in directions. As described above, the MEMS differential actuator can reflect in vertical and horizontal directions, which is contrast to the prior art that only moves in one direction. Therefore, the application thereof is broadened. The MEMS differential actuated nano probe applicable in a scanning probe microscope, such as a scanning tunneling microscope (STM), an atomic force microscope (AFM), electric force microscope (EFM), a Kelvin force microscope (KFM), scanning Maxwell force microscope (SMM), frictional force microscope (FFM), lateral force microscope (LFM), magnetic force microscope (MFM), magnetic resonance force microscope (MRFM), scanning capacitance microscope (SCM), scanning thermal microscope (SThM) and scanning near-field optical microscope (SNOM). When the scanning probe microscope (SPM) is applied in data storage, the MEMS differential actuated nano probe can deflect vertically with increased force constant tolerance. The probe also deflects in horizontally to increase the capability of local scanning. In the applications of data storage and nanolithography, the MEMS actuator heats the tip of the nano probe while in operation for data writing and reading and performing nanolithography. Furthermore, the MEMS differential actuated nano probe can be also applied in dip pen nanolithography as a molecule self-assembling mechanism. Further scope of applicability of the present invention will become apparent from the detailed description given hereinafter. However, it should be understood that the detailed description and specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will become apparent to those skilled in the art from this detailed description.
20040309
20060207
20050421
78306.0
0
NGUYEN, KIET TUAN
MEMS DIFFERENTIAL ACTUATED NANO PROBE AND METHOD FOR FABRICATION
UNDISCOUNTED
0
ACCEPTED
2,004
10,795,483
ACCEPTED
AUTOMATIC PET DOOR
An automatic pet door system is disclosed. The automatic pet door system has a rectangular frame mounted between studs of a wall defining a passage for entry and exit of a pet. A door slidably moves within the frame between a lower closed position for closing the passage and an upper open position for opening the passage. The door is lifted by a drive means having a motor pulling a cable attached to the door. The motor is energized by a control means in response to a signal received from a magnetic transmitter worn by a pet when the pet approaches the door. A locking means prevents movement of the door upwardly from the closed position unless the door is moved by way of the drive means.
1. An automatic pet door system comprising: (a) a rectangular frame comprising: two substantially parallel columns mounted vertically between studs of a wall, each of the columns comprising a channel disposed along the length of the column, such that openings of the channels are facing each other; a top plate disposed between top portions of the columns; a bottom plate disposed between bottom portions of the columns; wherein a lower portion of the frame defines a passage between opposite sides of the wall; (b) a door slidably movable within the channels between a lower closed position for closing the passage and an upper open position for opening the passage; (c) a drive means lifting the door between the closed and open positions, comprising: a motor disposed on one of the columns; a primary pulley mounted on the motor; a secondary pulley mounted on the top plate; a pivot pin means disposed on the door; a locking means disposed on the door, the locking means preventing movement of the door upwardly from the closed position unless the door is moved by way of the drive means; a cable having a first end fixedly attached to the primary pulley and a second end fixedly attached to the locking means, such that the cable is rising at a substantially 30 degree angle from horizontal from the primary pulley to the secondary pulley, feeding over the secondary pulley, descending at a substantially 90 degree angle from horizontal to the pivot pin means, feeding through the pivot pin means and leading, substantially horizontally, from the pivot pin means to the locking means; wherein the motor, when energized, spinning the primary pulley thereby causing the cable to pull the door up to the open position, and wherein the motor, when not energized, allowing the door to move down to the closed position by way of the force of gravity; (d) a magnetic transmitter worn by a pet, the magnetic transmitter producing a predetermined transmitter signal; (e) a detector means located proximate the frame, the detector means generating a detector signal in response to the transmitter signal when the pet approaches the frame from one side of the wall at a predetermined distance from the frame; (f) a control means electrically connected to the detector means and to the motor energizing the motor in response to the detector signal. 2. The automatic pet door system as in claim 1, wherein the locking means comprises: a U-shaped bracket having a pair of holes in its flanges; a pin having a proximate end and a distal end, the pin disposed substantially horizontally within the holes, such that the proximate and distal ends project outside the flanges; a compression spring disposed between the flanges, the compression spring biasing the pin towards the distal end; a tension spring having one end attached to the proximate end and the other end attached to the second end of the cable; an opening disposed in the column for receiving and engaging with the distal end when the door is lowered in the closed position, thereby preventing lifting the door by an external force. 3. The automatic pet door system as in claim 2, wherein the detector means comprises an induction coil having about ten thousand windings, such that the induction coil generates the detector signal at an induction coil output in the form of a voltage induced by movement of the magnetic transmitter with respect to the induction coil. 4. The automatic pet door system as in claim 3, wherein the control means comprises: an AC amplifier having an amplifier input and an amplifier output, the amplifier input connected to the induction coil output, the amplifier output connected to an AC power switch that can be placed in an “on” position and in an “off” position; wherein the voltage applied to the amplifier input causes the AC amplifier to output a switching signal at the amplifier output, the switching signal causing the AC power switch to be placed in the “on” position; wherein placing the AC power switch in the “on” position causes the motor to be energized; wherein the AC amplifier is tuned to the frequency of about 1 Hz. 5. The automatic pet door system as in claim 4, wherein the control means further comprises a timer means maintaining the motor energized for a predetermined period of time following energizing in response to the detector signal. 6. The automatic pet door system as in claim 5, wherein the predetermined period of time ranges from about one second to about ten seconds. 7. The automatic pet door system as in claim 6, wherein the predetermined distance from the frame ranges from about six inches to about four feet. 8. The automatic pet door system as in claim 7, wherein the frame has a width not greater than approximately 14.25 inches for installation between a pair of studs. 9. The automatic pet door system as in claim 8, wherein the door is formed of a rigid translucent polymer. 10. The automatic pet door system as in claim 7, wherein the frame has a width not less than approximately 8 inches. 11. The automatic pet door system as in claim 10, wherein the door is formed of a rigid translucent polymer. 12. The automatic pet door system as in claim 7, wherein the frame has a width of approximately 12 inches. 13. The automatic pet door system as in claim 12, wherein the door is formed of a rigid translucent polymer. 14. The automatic pet door system as in claim 7, wherein the frame has a width of approximately 14 inches. 15. The automatic pet door system as in claim 14, wherein the door is formed of a rigid translucent polymer. 16. The automatic pet door system as in claim 7, wherein the frame has a width of approximately 16 inches. 17. The automatic pet door system as in claim 16, wherein the door is formed of a rigid translucent polymer. 18. The automatic pet door system as in claim 7, wherein the frame has a width of approximately 18 inches. 19. The automatic pet door system as in claim 18, wherein the door is formed of a rigid translucent polymer.
FIELD OF THE INVENTION The present invention pertains to an automatic pet door that opens automatically without the pet having to physically touch or push against the door mechanism. BACKGROUND OF THE INVENTION Pet doors available on the market today generally consist of soft plastic or aluminum materials which hang by gravity, typically from a swingably mounted utility door, and are sealed by magnetic means. Other doors have an overlapping of plastic material in such a way as to prevent excessive weather penetration. Both of these pet door devices operate by means of the pet having to push against the door or flap with its head in order to enter or exit. A significant disadvantage of these pet doors of the prior art is that some pets (especially small pets) simply will not push against the door for one reason or another. Most other pet doors are installed in the rear swinging door of the garage. Another disadvantage is the inconvenience of having a flap door mechanism extending from a utility door with the possibility of snagging or catching the operator. Another disadvantage is that swinging doors of the prior art take up valuable wall space when they are opened, in addition to posing the hazards of snagging or injuring those nearby. A further disadvantage is that the magnetic flaps or plastic materials used for weatherproofing many prior art pet doors do not match to the intended correct closed position. For this reason, installation of these conventional pet doors in the main living quarters of the house is not practical. Moreover, conventional pet doors of the prior art also permit access to potential thieves and other animals and rodents. Many of the above disadvantages have been overcome in the automatic pet door disclosed in the U.S. Pat. No. 5,177,900 to Solowiej. The U.S. Pat. No. 5,177,900 patent discloses an automatic pet door apparatus with a door vertically slidable within the frame between closed and open positions by way of a driver in response to a signal. A pet wears a radiation transmitter that produces the signal activating a transducer, causing the driver to be energized and raise the door. However, the automatic pet door apparatus disclosed in the U.S. Pat. No. 5,177,900 patent has disadvantages in that the driver disclosed therein is unreliable and does not provide efficient way to prevent unauthorized opening of the door, and also, the radiation transmitter requires a battery to operate, which makes it unreliable (due to battery discharge, exposure to water and shock), as well as bulky to wear for small pets. Thus, there is a need for a pet door that overcomes the above disadvantages, being operated without the pet having to force it open, yet being secure against thieves and is reliably weatherproof, and is inexpensive to provide and install. SUMMARY OF THE INVENTION The present invention is directed to an automatic pet door system that satisfies this need. The automatic pet door system according to this invention has a rectangular frame having two substantially parallel columns mounted vertically between studs of a wall, each of the columns comprising a channel disposed along the length of the column, such that openings of the channels are facing each other. The frame also has a top plate disposed between top portions of the columns and a bottom plate disposed between bottom portions of the columns. A lower portion of the frame defines a passage between opposite sides of the wall for a pet to enter of exit through the passage. There is provided a door, formed of a rigid translucent polymer, slidably movable within the channels between a lower closed position for closing the passage and an upper open position for opening the passage. There is also provided a drive means lifting the door between the closed and open positions. The drive means has a motor disposed on one of the columns; a primary pulley mounted on the motor; a secondary pulley mounted on the top plate; a pivot pin means disposed on the door; a locking means disposed on the door. The locking means prevents movement of the door upwardly from the closed position unless the door is moved by way of the drive means. There is provided a cable having a first end fixedly attached to the primary pulley and a second end fixedly attached to the locking means, such that the cable rises at a substantially 30 degree angle from horizontal from the primary pulley to the secondary pulley, feeding over the secondary pulley. The cable then descends at a substantially 90 degree angle from horizontal to the pivot pin means, feeding through the pivot pin means and leading, substantially horizontally, from the pivot pin means to the locking means. The motor, when energized, spins the primary pulley thereby causing the cable to pull the door up to the open position. When the motor is not energized, it allows the door to move down to the closed position by way of the force of gravity. There is provided a magnetic transmitter worn by a pet. The magnetic transmitter produces a predetermined transmitter signal. The magnetic transmitter requires no battery and is water-proof and shock-proof. There is also provided a detector means located proximate the frame. The detector means generates a detector signal in response to the transmitter signal when the pet approaches the frame from one side of the wall at a predetermined distance from the frame. A control means electrically connected to the detector means and to the motor energizes the motor in response to the detector signal. The control means comprises a timer means maintaining the motor energized for a predetermined period of time following energizing in response to the transducer signal. The locking means comprises a U-shaped bracket having a pair of holes in its flanges; a pin having a proximate end and a distal end, the pin disposed substantially horizontally within the holes, such that the proximate and distal ends project outside the flanges; a compression spring disposed between the flanges, the compression spring biasing the pin towards the distal end; a tension spring having one end attached to the proximate end and the other end attached to the second end of the cable; an opening disposed in the column for receiving and engaging with the distal end when the door is lowered in the closed position, thereby preventing lifting the door by an external force. To summarize, the present invention provides the following advantages over the pet doors of the prior art: 1. It works for pets that will not push against conventional doors by opening automatically; 2. It provides good weather seal in that the door operated by sliding in the channels: 3. The combination of the magnetic transmitter the detector means prevents entrance of strange animals; 4. An owner is enabled to make the automatic pet door system available only to the selected pets wearing the magnetic transmitter; 5. The automatic pet door system fits between wall studs and can be installed in many new and existing structures such as dwellings; 6. The moving parts of the automatic pet door system are concealed and hidden inside the wall for preventing damage or harm to either the pet or its owner; 7. The transparent or translucent material of the door permits the pet to see where it wants to go; and 8. The mechanism of the automatic pet door system automatically locks in the closed position of the door, and unlocks only when the motor is activated. 9. No batteries are required for the magnetic transmitter, which is also water-proof and shock-proof. 10. The door can be opened from a distance of up to 4 feet. 11. The magnetic transmitter utilizes tiny magnets, which makes it small enough for small dogs and cats. BRIEF DESCRIPTION OF THE DRAWINGS FIGURES FIG. 1 is an isometric view of an automatic pet door system according to the present invention; FIG. 2 is a view of the magnetic transmitter being carried by a pet for actuating the pet door system according to the present invention; FIG. 3 is a side elevational view of the locking means for use with the pet door system according to the present invention. FIG. 4 is a block diagram of a control means for use with the pet door system according to the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT This invention will be better understood with the reference to the drawing figures FIG. 1 through FIG. 3. The same numerals indicate the same elements in all drawing figures. Viewing FIG. 1, there is shown an isometric view of an automatic pet door system according to the present invention. Numeral 10 indicates a frame. Frame 10 has a rectangular shape approximately 30″ high and 14″ wide and is formed of extruded aluminum or other suitable material such as plastic or wood. The size of frame 10 can vary to accommodate small or large pets. The height can vary from approximately 24″ to approximately 45″. The width can vary from approximately 8″ to approximately 18″. Frame 10 comprises columns indicated by numeral 20. Columns 20 are substantially parallel and are mounted vertically between studs of a wall. In the preferred embodiment shown in FIG. 1, frame 10 has a width not greater than approximately 14.25″ for installation between a pair of studs. The studs in FIG. 1 are shown as standard 2×4 lumber measuring approximately 1.5″ by 3.5″ in cross-section and having a spacing of 16″ on center (it can also be 2×6 lumber measuring approximately 1.5″ by 5.5″). Installation of frame 10 between studs of a wall is readily apparent to the persons knowledgeable in the pertinent arts. Needless to say, the width of frame 10 can vary to accommodate the size of the pet, it can be 8″ or more, for example, 12″, 14″, 16″ or 18″. Each of columns 20 comprises a channel indicated by numeral 30. Each channel 30 is disposed along the length of column 20, such that openings of channels 30 are facing each other. Numeral 40 indicates a top plate. Top plate 40 is disposed between top portions of columns 20. Numeral 50 indicates a bottom plate. Bottom plate is disposed between bottom portions of columns 20. A lower portion of frame 10 defines a passage between opposite sides of the wall. This passage is used by pets entering and exiting through the pet door system according to the present invention. Columns 20, top plate 40 and bottom plate 50 can be made from lengths of an aluminum extrusion, having channels 30 formed within a thin-wall rectangular cross-section (approximately 2.0″ by approximately 3.88″) and may include grooved bosses for receiving suitable self-tapping fasteners by which the components of the frame 10 are rigidly connected. Numeral 60 indicates a door. Door 60 is slidably movable within channels 30 between a lower closed position for closing the passage and an upper open position for opening the passage. In the preferred embodiment shown in FIG. 1, door 60 is shown as formed of a rigid translucent polymer. However, door 60 can be formed of any suitable material, such transparent to translucent plastic material such as RTM, Lexan, as well as wood or metal. The advantage of having door 60 formed of a translucent material is that it permits the pet to see where it wants to go. Door 60 is lifted between the closed and open positions by way of a drive means comprising motor indicated by numeral 70. Motor 70 is disposed on one of columns 20. Numeral 80 indicates a primary pulley. Primary pulley 80 is mounted on motor 70. Numeral 90 indicates a secondary pulley. Secondary pulley 90 is mounted on top plate 40. Numeral 100 indicates a pivot pin means. Pivot pin means 100 is disposed on door 60. In the preferred embodiment shown in FIG. 1, pivot pin means 100 is disposed on the upper portion of door 60, substantially in the middle of door 60. Numeral 110 indicates a locking means. Locking means 110 is disposed on door 60. In the preferred embodiment shown in FIG. 1, locking means 110 is disposed on the upper corner of door 60. Locking means 110 prevents movement of door 60 upwardly from the closed position unless door 60 is moved by way of the drive means. Locking means 110 will be described in more detail below, in reference to FIG. 3. Numeral 120 indicates a cable. Cable 120 has a first end fixedly attached to primary pulley 80 and a second end fixedly attached to locking means 110, such that cable 120 rises at a substantially 30 degree angle from horizontal from primary pulley 80 to secondary pulley 90, feeding over secondary pulley 90. Cable 120 then descends at a substantially 90 degree angle from horizontal to pivot pin means 100, feeding through pivot pin means 100. Cable 120 then leads, substantially horizontally, from pivot pin means 100 to locking means 110. Motor 70, when energized, spins primary pulley 80, thereby causing cable 120 to pull door 60 up to the open position. In the preferred embodiment shown in FIG. 1, there is provided a clutch between motor 70 and primary pulley 80 (not shown). The clutch permits motor 70 to continue operation at limited power by slipping when door 60 is lifted in the open position. The operation of the clutch is readily apparent to the persons knowledgeable in the pertinent arts. Motor 70, when not energized, allows door 60 to move down to the closed position by way of the force of gravity. Viewing now FIG. 2, there is shown a magnetic transmitter indicated by numeral 130. Magnetic transmitter 130 is worn by a pet (shown in FIG. 2 as a dog), preferably attached to the color worn by the pet. Magnetic transmitter 130 produces a predetermined transmitter signal. Viewing again FIG. 1, numeral 140 indicates a detector means. Detector means 140 is located proximate frame 10 and is shown in FIG. 1 near bottom plate 50. Detector means 140 generates a detector signal in response to the transmitter signal when the pet approaches frame 10 from one side of the wall at a predetermined distance from frame 10. In the preferred embodiment shown in FIG. 1, the predetermined distance from frame 10 ranges from about six inches to about four feet. Viewing now FIG. 4, there is shown a block diagram of a control means. The control means is electrically connected to detector means 140 and to motor 70. Detector means 140 is shown in FIG. 4 as an induction coil. Numeral 140a indicates an induction coil output. Induction coil 140 generates the detector signal at induction coil output 140a in the form of a voltage induced by movement of magnetic transmitter 130 with respect to induction coil 140. Numeral 220 indicates an AC amplifier. AC amplifier 220 has an amplifier input indicated by numeral 220a and an amplifier output indicated by numeral 220b. Amplifier input 220a is connected to induction coil output 140a. Amplifier output 220b is connected to an AC power switch indicated by numeral 230. AC power switch 230 can be placed in an “on” position and in an “off” position. The voltage applied to amplifier input 220a causes AC amplifier 220 to output a switching signal at amplifier output 220b. The switching signal causes AC power switch 230 to be placed in the “on” position. Placing AC power switch 230 in the “on” position causes motor 70 to be energized. AC power switch 230 is preferably a solid-state switch that applies 120 Vac line power to motor 70. By way of experiments, it has been discovered that a domestic pet moves its head at a rate of about 1 Hz, while approaching door 60. Keeping in mind that magnetic transmitter 130 is attached to the pet's collar, to insure that the pet will successfully use door 60, it is required to open door 60 while the pet is approaching (if door 60 were to fail to open, the pet might not try again). Magnetic transmitter 130 comprises a water-proof and shock-proof magnet that comes in different sizes depending on the size of the pet. Smaller dogs and cats can use a tiny (literally sugar-size) magnets. Accordingly, it is nearly impossible to detect the small magnetic field produced by these tiny magnets by using a Hall-effect or a similar magnetic field transducer due to the extremely high-gain amplification required of a tiny DC sensed voltage. In fact, drift in the Earth's magnetic field can cause induced voltages in induction coil 140 of the same magnitude as the magnets used in magnetic transmitter 130 at a 4 foot distance, causing unintended opening of door 60. That is why the present invention uses a tuned AC amplifier instead of a DC amplifier. Specifically, in the preferred embodiment described in reference to FIG. 4, AC amplifier 220 is tuned to the frequency of about 1 Hz. As the persons knowledgeable in the pertinent arts will recognize, this can be done by way of a filter. Further, by way of experiments, it has been discovered that a large number of windings in induction coil 140 is required to enable magnetic tuning of 1 Hz. In the preferred embodiment described in reference to FIG. 4, the number of windings in induction coil 140 is about 10,000. As seen from this disclosure, this invention successfully allows only intended pets (i.e. those equipped with magnetic transmitter 130) to open door 60, while discriminating against ambient magnetic disturbances that may cause unintended opening of door 60. In the preferred embodiment shown in FIG. 1, the control means further comprises a timer means maintaining motor 70 energized for a predetermined period of time following energizing in response to the detector signal. This maintains door 60 in the open position, allowing the pet sufficient time to enter or exit through the passage. The time can be adjusted, depending on behavior of a particular pet. In the preferred embodiment shown in FIG. 1, the predetermined period of time ranges from about one second to about ten seconds. If desired, the predetermined period of time can be set to more than 10 seconds. Electrical power for operating the automatic pet door system according to this invention is typically available in the wall from electrical lines that power conventional wall plug boxes (not shown). Viewing now FIG. 3, there is shown locking means 110. Numeral 150 indicates a U-shaped bracket. U-shaped bracket 150 has flanges indicated by numeral 160 and holes indicated by numeral 170 disposed in flanges 160. Numeral 180 indicates a pin. Pin 180 has a proximate end indicated by numeral 180a and a distal end indicated by numeral 180b. Pin 180 is disposed substantially horizontally within holes 170, such that proximate end 180a and distal ends 180b project outside flanges 160. Numeral 190 indicates a compression spring. Compression spring 190 is disposed between flanges 160. Compression spring 190 biases pin 180 towards distal end 180b. Numeral 200 indicates a tension spring. Tension spring 200 has one end attached proximate end 180a and the other end attached to the second end the cable 120. Numeral 210 indicates an opening. Opening 210 is disposed in column 20. Opening 210 receives and engages with distal end 180b when door 60 is lowered in the closed position, thereby preventing lifting door 60 by an external force. When motor 70 is energized, cable 120 pulls on tension spring 200 causing pin 180 to retract from opening 210 and allowing door 60 to be lifted in the open position. While the present invention has been described and defined by reference to the preferred embodiment of the invention, such reference does not imply a limitation on the invention, and no such limitation is to be inferred. The invention is capable of considerable modification, alteration, and equivalents in form and function, as will occur to those ordinarily skilled and knowledgeable in the pertinent arts. The depicted and described preferred embodiment of the invention is exemplary only, and is not exhaustive of the scope of the invention. Consequently, the invention is intended to be limited only by the spirit and scope of the appended claims, giving full cognizance to equivalents in all respects.
<SOH> BACKGROUND OF THE INVENTION <EOH>Pet doors available on the market today generally consist of soft plastic or aluminum materials which hang by gravity, typically from a swingably mounted utility door, and are sealed by magnetic means. Other doors have an overlapping of plastic material in such a way as to prevent excessive weather penetration. Both of these pet door devices operate by means of the pet having to push against the door or flap with its head in order to enter or exit. A significant disadvantage of these pet doors of the prior art is that some pets (especially small pets) simply will not push against the door for one reason or another. Most other pet doors are installed in the rear swinging door of the garage. Another disadvantage is the inconvenience of having a flap door mechanism extending from a utility door with the possibility of snagging or catching the operator. Another disadvantage is that swinging doors of the prior art take up valuable wall space when they are opened, in addition to posing the hazards of snagging or injuring those nearby. A further disadvantage is that the magnetic flaps or plastic materials used for weatherproofing many prior art pet doors do not match to the intended correct closed position. For this reason, installation of these conventional pet doors in the main living quarters of the house is not practical. Moreover, conventional pet doors of the prior art also permit access to potential thieves and other animals and rodents. Many of the above disadvantages have been overcome in the automatic pet door disclosed in the U.S. Pat. No. 5,177,900 to Solowiej. The U.S. Pat. No. 5,177,900 patent discloses an automatic pet door apparatus with a door vertically slidable within the frame between closed and open positions by way of a driver in response to a signal. A pet wears a radiation transmitter that produces the signal activating a transducer, causing the driver to be energized and raise the door. However, the automatic pet door apparatus disclosed in the U.S. Pat. No. 5,177,900 patent has disadvantages in that the driver disclosed therein is unreliable and does not provide efficient way to prevent unauthorized opening of the door, and also, the radiation transmitter requires a battery to operate, which makes it unreliable (due to battery discharge, exposure to water and shock), as well as bulky to wear for small pets. Thus, there is a need for a pet door that overcomes the above disadvantages, being operated without the pet having to force it open, yet being secure against thieves and is reliably weatherproof, and is inexpensive to provide and install.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention is directed to an automatic pet door system that satisfies this need. The automatic pet door system according to this invention has a rectangular frame having two substantially parallel columns mounted vertically between studs of a wall, each of the columns comprising a channel disposed along the length of the column, such that openings of the channels are facing each other. The frame also has a top plate disposed between top portions of the columns and a bottom plate disposed between bottom portions of the columns. A lower portion of the frame defines a passage between opposite sides of the wall for a pet to enter of exit through the passage. There is provided a door, formed of a rigid translucent polymer, slidably movable within the channels between a lower closed position for closing the passage and an upper open position for opening the passage. There is also provided a drive means lifting the door between the closed and open positions. The drive means has a motor disposed on one of the columns; a primary pulley mounted on the motor; a secondary pulley mounted on the top plate; a pivot pin means disposed on the door; a locking means disposed on the door. The locking means prevents movement of the door upwardly from the closed position unless the door is moved by way of the drive means. There is provided a cable having a first end fixedly attached to the primary pulley and a second end fixedly attached to the locking means, such that the cable rises at a substantially 30 degree angle from horizontal from the primary pulley to the secondary pulley, feeding over the secondary pulley. The cable then descends at a substantially 90 degree angle from horizontal to the pivot pin means, feeding through the pivot pin means and leading, substantially horizontally, from the pivot pin means to the locking means. The motor, when energized, spins the primary pulley thereby causing the cable to pull the door up to the open position. When the motor is not energized, it allows the door to move down to the closed position by way of the force of gravity. There is provided a magnetic transmitter worn by a pet. The magnetic transmitter produces a predetermined transmitter signal. The magnetic transmitter requires no battery and is water-proof and shock-proof. There is also provided a detector means located proximate the frame. The detector means generates a detector signal in response to the transmitter signal when the pet approaches the frame from one side of the wall at a predetermined distance from the frame. A control means electrically connected to the detector means and to the motor energizes the motor in response to the detector signal. The control means comprises a timer means maintaining the motor energized for a predetermined period of time following energizing in response to the transducer signal. The locking means comprises a U-shaped bracket having a pair of holes in its flanges; a pin having a proximate end and a distal end, the pin disposed substantially horizontally within the holes, such that the proximate and distal ends project outside the flanges; a compression spring disposed between the flanges, the compression spring biasing the pin towards the distal end; a tension spring having one end attached to the proximate end and the other end attached to the second end of the cable; an opening disposed in the column for receiving and engaging with the distal end when the door is lowered in the closed position, thereby preventing lifting the door by an external force. To summarize, the present invention provides the following advantages over the pet doors of the prior art: 1. It works for pets that will not push against conventional doors by opening automatically; 2. It provides good weather seal in that the door operated by sliding in the channels: 3. The combination of the magnetic transmitter the detector means prevents entrance of strange animals; 4. An owner is enabled to make the automatic pet door system available only to the selected pets wearing the magnetic transmitter; 5. The automatic pet door system fits between wall studs and can be installed in many new and existing structures such as dwellings; 6. The moving parts of the automatic pet door system are concealed and hidden inside the wall for preventing damage or harm to either the pet or its owner; 7. The transparent or translucent material of the door permits the pet to see where it wants to go; and 8. The mechanism of the automatic pet door system automatically locks in the closed position of the door, and unlocks only when the motor is activated. 9. No batteries are required for the magnetic transmitter, which is also water-proof and shock-proof. 10. The door can be opened from a distance of up to 4 feet. 11. The magnetic transmitter utilizes tiny magnets, which makes it small enough for small dogs and cats.
20040309
20051122
20050915
88822.0
1
REDMAN, JERRY E
AUTOMATIC PET DOOR
SMALL
0
ACCEPTED
2,004
10,795,552
ACCEPTED
Treatment of hypertension
Polyphenol-containing compositions, for example procyanidins and derivatives thereof, and their use for treating hypertension are disclosed. Compositions may be used for human and veterinary use, and may be, for example, in a form of a food, a dietary supplement or a pharmaceutical.
1-208. (canceled) 209. A method of treating hypertension comprising administering to a subject in need thereof an effective amount of a polymeric compound of the formula An, or a pharmaceutically acceptable salt, derivative, or oxidation product thereof: wherein n is an integer from 2 to 18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; bonding between adjacent monomers takes place at positions selected from the group consisting of 4, 6 and 8; a bond of an additional monomeric unit in position 4 has alpha or beta stereochemistry; X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the provisos that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and optionally Y=Z=hydrogen; the sugar is optionally substituted with a phenolic moiety; wherein the subject is a human or a veterinary animal. 210. The method of claim 209, wherein the adjacent monomers bind at positions 4→6 or 4→8 211. The method of claim 210, wherein the subject is a human. 212. The method of claim 211, wherein n is 2-10. 213. The method of claim 211, wherein n is 5-10. 214. The method of claim 211, wherein n is 3-12. 215. The method of claim 211, wherein n is 5-12. 216. The method of claim 216, wherein the polymeric compound is in the form of a cocoa extract. 217. The method of claim 216, whcrcin the polymeric compound is in the form of a cocoa extract fraction. 218. The method of claim 211, wherein the effective amount of the polyphenolic compound of the formula An is administered to a subject in need thereof: wherein n is an integer from 2 to 18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is 3-(α)-OH, 3-(β)-OH; bonding between adjacent monomers takes place at positions selected from the group consisting of 4, 6 and 8; a bond of an additional monomeric unit in position 4 has alpha or beta stereochemistry; and X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the provisos that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and optionally Y=Z=hydrogen. 219. The method of claim 218, wherein n is 2-10. 220. The method of claim 218, wherein n is 5-10. 221. The method of claim 218, wherein n is 3-12. 222. The method of claim 218, wherein n is 5-12. 223. The method of claim 210, wherein the subject is a veterinary animal. 224. The method of claim 223, wherein n is 2-10. 225. The method of claim 223, wherein n is 5-10. 226. The method of claim 223, wherein n is 3-12. 227. The method of claim 223, wherein n is 5-12. 228. The method of claim 223, wherein the polymeric compound is in the form of a cocoa extract. 229. The method of claim 223, wherein the polymeric compound is in the form of a cocoa extract fraction. 230. A method of treating or preventing hypertension comprising administering to a subject in need thereof an effective amount of a polymeric compound of the formula Ahd n: wherein n is an integer from 2-18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is an ester moiety; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the proviso that as to the at least one terminal nionomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen; and wherein the subject is a human or veterinary animal. 231. The method of claims 230, wherein the polymeric compound of thc formula An comprises a 4→6 linkage. 232. The method of claims 230, wherein the polymeric compound of the formula An comprises a 4→8 linkage. 233. The method of claim 230, wherein the subject is a human. 234. The method of claim 230, wherein the polymeric compound of the formula An comprises a (4β→6) linkage. 235. The method of claims 230, wherein the polymeric compound of the formula An comprises a (4β→8) linkage. 236. The method of claim 233, wherein n=2-12 and R is —O-gallate. 237. The method of claim 233, wherein n=3-12 and R is —O-gallate. 238. The method of claim 233, wherein n=2-5 and R is O-gallate. 239. The method of claim 233, wherein n=12 and R is —O-gallate. 240. The method of claim 233, wherein n=5-12 and R is —O-gallate. 241. The method of claim 230, wherein the polymeric compound is included in a food product. 242. A method of treating or preventing hypertension comprising administering to a subject in need thereof an effective amount of a polymeric compound of the formula An: wherein n is an integer from 2-18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is an ester moiety; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are monomeric unit A or hydrogen, with the proviso that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen, and wherein the subject is a human or veterinary animal. 243. The method of claim 242, wherein the polymeric compound of the formula An comprises a 4→6 linkage. 244. The method of claim 242, wherein the polymeric compound of the formula An comprises a 4→8 linkage. 245. The method of claim 242, wherein the subject is a human. 246. The method of claim 242, wherein the polymeric compound of the formiula An comprises a (4β→6) linkage. 247. The method of claim 242, wherein the polymeric compound of the formula An comprises a (4β→8) linkage. 248. The method of claim 245, wherein n=2-12 and R is —O-gallate. 249. The method of claim 245, wherein n=3-12 and R is —O-gallate. 250. The method of claim 245, wherein n=2-5 and R is —O-gallate. 251. The method of claim 245, wherein n=4-12 and R is —O-gallate. 252. The method of claim 245, wherein n=5-12 and R is —O-gallate. 253. The method of claim 242, wherein the polymeric compound is included in a food product. 254. A method of modulating NO comprising administering to a subject in need thereof an effective amount of a polymeric compound of the formula An: wherein n is an integer from 2-18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is an ester moiety; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are selected from the group consisting of monorneric unit A, hydrogen, and a sugar, with the proviso that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen; and wherein the subject is a human or veterinary animal. 255. The method of claim 254, wherein the polymeric compound of the formula An comprises a 4→6 linkage. 256. The method of claim 254, wherein the polymeric compound of the formula An comprises a 4→8 linkage. 257. The method of claim 254, wherein the subject is a human. 258. The method of claim 254, wherein the polymeric compound of the formula An comprises a (4β→6) linkage. 259. The method of claim 254, wherein the polymeric compound of the formula An comprises a (4β→8) linkage. 260. The method of claim 257, wherein n=2-12 and R is —O-gallate. 261. The method of claim 257, wherein n=3-12 and R is —O-gallate. 262. The method of claim 257, wherein n=2-5 and R is —O-gallate. 263. The method of claim 257, wherein n=4-12 and R is —O-gallate. 264. The method of claim 257, wherein n=5-12 and R is —O-gallate. 265. The method of claim 254 wherein the polymeric compound is included in a food product. 266. A method of modulating NO comprising administering to a subject in need thereof an effective amount of a polymeric compound of the formula An: wherein n is an integer firom 2-18, such that there is at least one terminal monomeric unit A, and one or a plurality of additional monomeric units; R is an ester moiety; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are monomeric unit A or hydrogen, with the proviso that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen; and wherein the subject is a human or veterinary animal. 267. The method of claim 266, wherein the polymeric compound of the formula An comprises a 4→6 linkage. 268. The method of claim 266, wherein the polymeric compound of the formula An comprises a 4→linkage. 269. The method of claim 266, wherein the subject is a human. 270. The method of claim 266, wherein the polymeric compound of the formula An comprises a (4β→6) linkage. 271. The method of claim 266, wherein the polymeric compound of the formula An comprises a (4β→8) linkage. 272. The method of claim 269, wherein n=2-12 and R is —O-gallate. 273. The method of claim 269, wherein n=3-12 and R is —O-gallate. 274. The method of claim 260, wherein n=2-5 and R is —O-gallate. 275. The method of claim 269, wherein n=4-12 and R is —O-gallate. 276. The method of claim 269, wherein n=5-12 and R is —O-gallate. 277. The method of claim 266 wherein the polymeric compound is included in a food product.
REFERENCE TO RELATED APPLICATION Reference is made to copending U.S. application Ser. Nos. 08/709,406, filed Sep. 6, 1996, 08/631,661, filed Apr. 2, 1996, and 08/317,226, filed Oct. 3, 1994 (now U.S. Pat. No. 5,554,645) and PCT/US96/04497, each of which is incorporated herein by reference. FIELD OF THE INVENTION This invention relates to cocoa extracts and compounds therefrom such as polyphenols preferably polyphenols enriched with procyanidins. This invention also relates to methods for preparing such extracts and compounds, as well as to uses for them; for instance, as antineoplastic agents, antioxidants, DNA topoisomerase II enzyme inhibitors, cyclo-oxygenase and/or lipoxygenase modulators, NO (Nitric Oxide) or NO-synthase modulators, as non-steroidal antiinflammatory agents, apoptosis modulators, platelet aggregation modulators, blood or in vivo glucose modulators, antimicrobials, and inhibitors of oxidative DNA damage. Documents are cited in this disclosure with a full citation for each appearing thereat or in a References section at the end of the specification, preceding the claims. These documents pertain to the field of this invention; and, each document cited herein is hereby incorporated herein by reference. BACKGROUND OF THE INVENTION Polyphenols are an incredibly diverse group of compounds (Ferreira et al., 1992) which widely occur in a variety of plants, some of which enter into the food chain. In some cases they represent an important class of compounds for the human diet. Although some of the polyphenols are considered to be nonnutrative, interest in these compounds has arisen because of their possible beneficial effects on health. For instance, quercetin (a flavonoid) has been shown to possess anticarcinogenic activity in experimental animal studies (Deshner et al., 1991 and Kato et al., 1983). (+)-Catechin and (−)-epicatechin (flavan-3-ols) have been shown to inhibit Leukemia virus reverse transcriptase activity (Chu et al., 1992). Nobotanin (an oligomeric hydrolyzable tannin) has also been shown to possess anti-tumor activity (Okuda et al., 1992). Statistical reports have also shown that stomach cancer mortality is significantly lower in the tea producing districts of Japan. Epigallocatechin gallate has been reported to be the pharmacologically active material in green tea that inhibits mouse skin tumors (Okuda et al., 1992). Ellagic acid has also been shown to possess anticarcinogen activity in various animal tumor models (Bukharta et al., 1992). Lastly, proanthocyanidin oligomers have been patented by the Kikkoman Corporation for use as antimutagens. Indeed, the area of phenolic compounds in foods and their modulation of tumor development in experimental animal models has been recently presented at the 202nd National Meeting of The American Chemical Society (Ho et al., 1992; Huang et al., 1992). However, none of these reports teaches or suggests cocoa extracts or compounds therefrom, any methods for preparing such extracts or compounds therefrom, or, any uses for cocoa extracts or compounds therefrom, as antineoplastic agents, antioxidants, DNA topoisomerase II enzyme inhibitors, cyclo-oxygenase and/or lipoxygenase modulators, NO (Nitric Oxide) or NO-synthase modulators, as non-steroidal antiinflammatory agents, apoptosis modulators, platelet aggregation modulators, blood or in vivo glucose modulators, antimicrobials, or inhibitors of oxidative DNA damage. OBJECTS AND SUMMARY OF THE INVENTION Since unfermented cocoa beans contain substantial levels of polyphenols, the present inventors considered it possible that similar activities of and uses for cocoa extracts, e.g., compounds within cocoa, could be revealed by extracting such compounds from cocoa and screening the extracts for activity. The National Cancer Institute has screened various Theobroma and Herrania species for anti-cancer activity as part of their massive natural product selection program. Low levels of activity were reported in some extracts of cocoa tissues, and the work was not pursued. Thus, in the antineoplastic or anti-cancer art, cocoa and its extracts were not deemed to be useful; i.e., the teachings in the antineoplastic or anti-cancer art lead the skilled artisan away from employing cocoa and its extracts as cancer therapy. Since a number of analytical procedures were developed to study the contributions of cocoa polyphenols to flavor development (Clapperton et al., 1992), the present inventors decided to apply analogous methods to prepare samples for anti-cancer screening, contrary to the knowledge in the antineoplastic or anti-cancer art. Surprisingly, and contrary to the knowledge in the art, e.g., the National Cancer Institute screening, the present inventors discovered that cocoa polyphenol extracts which contain procyanidins, have significant utility as anti-cancer or antineoplastic agents. Additionally, the inventors demonstrate that cocoa extracts containing procyanidins and compounds from cocoa extracts have utility as antineoplastic agents, antioxidants, DNA topoisomerase II enzyme inhibitors, cyclo-oxygenase and/or lipoxygenase modulators, NO (Nitric Oxide) or NO-synthase modulators, as non-steroidal antiinflammatory agents, apoptosis modulators, platelet aggregation modulators, blood or in vivo glucose modulators, antimicrobials, and inhibitors of oxidative DNA damage. It is an object of the present invention to provide a method for producing cocoa extract and/or compounds therefrom. It is another object of the invention to provide a cocoa extract and/or compounds therefrom. It is still another object of the present invention to provide a polymeric compound of the formula An, wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, such that there is at least one terminal monomeric unit A, and a plurality of additional monomeric units; R is 3-(α)-OH, 3-(B)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the provisos that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen; the sugar is optionally substituted with a phenolic moiety at any position, for instance, via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). It is still a further object of the present invention to provide a polymeric compound of the formula An, wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, e.g., 3 to 18; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; adjacent monomers bind at position 4 by (4→6) or (4→8); each of X, Y and Z is H, a sugar or an adjacent monomer, with the provisos that if X and Y are adjacent monomers, Z is H or sugar and if X and Z are adjacent monomers, Y is H or sugar, and that as to at least one of the two terminal monomers, bonding of the adjacent monomer is at position 4 and optionally, Y=Z=hydrogen; a bond at position 4 has α or β stereochemistry; the sugar is optionally substituted with a phenolic moiety at any position, for instance, via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). It is another object of the invention to provide an antioxidant composition. It is another object of the invention to demonstrate inhibition of DNA topoisomerase II enzyme activity. It is yet another object of the present invention to provide a method for treating tumors or cancer. It is still another object of the invention to provide an anti-cancer, anti-tumor or antineoplastic compositions. It is still a further object of the invention to provide an antimicrobial composition. It is yet another object of the invention to provide a cyclo-oxygenase and/or lipoxygenase modulating composition. It is still another object of the invention to provide an NO or NO-synthase-modulating composition. It is a further object of the invention to provide a non-sterbidal antiinflammatory composition. It is another object of the invention to provide a blood or in vivo glucose-modulating composition. It is yet a further object of the invention to provide a method for treating a patient with an antineoplastic, antioxidant, antimicrobial, cyclo-oxygenase and/or lipoxygenase modulating or NO or NO-synthase modulating non-steroidal antiinflammatory modulating and/or blood or in vivo glucose-modulating composition. It is an additional object of the invention to provide compositions and methods for inhibiting oxidative DNA damage. It is yet an additional object of the invention to provide compositions and methods for platelet aggregation modulation. It is still a further object of the invention to provide compositions and methods for apoptosis modulation. It is a further object of the invention to provide a method for making any of the aforementioned compositions. And, it is an object of the invention to provide a kit for use in the aforementioned methods or for preparing the aforementioned compositions. It has been surprisingly discovered that cocoa extract, and compounds therefrom, have anti-tumor, anti-cancer or antineoplastic activity or, is an antioxidant composition or, inhibits DNA topoisomerase II enzyme activity or, is an antimicrobial or, is a cyclo-oxygenase and/or lipoxygenase modulator or, is a NO or NO-synthase modulator, is a non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator or, is a blood or in vivo glucose modulator, or is an inhibitor of oxidative DNA damage. Accordingly, the present invention provides a substantially pure cocoa extract and compounds therefrom. The extract or compounds preferably comprises polyphenol(s) such as polyphenol(s) enriched with cocoa procyanidin(s), such as polyphenols of at least one cocoa procyanidin selected from (−) epicatechin, (+) catechin, procyanidin B-2, procyanidin oligomers 2 through 18, e.g., 3 through 18, such as 2 through 12 or 3 through 12, preferably 2 through 5 or 4 through 12, more preferably 3 through 12, and most preferably 5 through 12, procyanidin B-5, procyanidin A-2 and procyanidin C-1. The present invention also provides an anti-tumor, anti-cancer or antineoplastic or antioxidant or DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, nonsteroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator, blood or in vivo glucose modulator, or oxidative DNA damage inhibitory composition comprising a substantially pure cocoa extract or compound therefrom or synthetic cocoa polyphenol(s) such as polyphenol(s) enriched with procyanidin(s) and a suitable carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier. The extract or compound therefrom preferably comprises cocoa procyanidin(s). The cocoa extract or compounds therefrom is preferably obtained by a process comprising reducing cocoa beans to powder, defatting the powder and, extracting and purifying active compound(s) from the powder. The present invention further comprehends a method for treating a patient in need of treatment with an anti-tumor, anti-cancer, or antineoplastic agent or an antioxidant, or a DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator, blood or in vivo glucose modulator or inhibitor of oxidative DNA damage, comprising administering to the patient a composition comprising an effective quantity of a substantially pure cocoa extract or compound therefrom or synthetic cocoa polyphenol(s) or procyanidin(s) and a carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier. The cocoa extract or compound therefrom can be cocoa procyanidin(s); and, is preferably obtained by reducing cocoa beans to powder, defatting the powder and, extracting and purifying active compound(s) from the powder. Additionally, the present invention provides a kit for treating a patient in need of treatment with an anti-tumor, anti-cancer, or antineoplastic agent or antioxidant or DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator inhibitor of oxidative DNA damage, or blood or in vivo glucose modulator comprising a substantially pure cocoa extract or compounds therefrom or synthetic cocoa polyphenol(s) or procyanidin(s) and a suitable carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier, for admixture with the extract or compound therefrom or synthetic polyphenol(s) or procyanidin(s). The present invention provides compounds as illustrated in FIGS. 38A to 38P and 39A to 39AA; and linkages of 4→6 and 4→8 are presently preferred. The invention even further encompasses food preservation or preparation compositions comprising an inventive compound, and methods for preparing or preserving food by adding the composition to food. And, the invention still further encompasses a DNA topoisomerase II inhibitor comprising an inventive compound and a suitable carrier or diluent, and methods for treating a patient in need of such treatment by administration of the composition. Considering broadly the aforementioned embodiments involving cocoa extracts, the invention also includes such embodiments wherein an inventive compound is used instead of or as the cocoa extracts. Thus, the invention comprehends kits, methods, and compositions analogous to those above-stated with regard to cocoa extracts and with an inventive compound. These and other objects and embodiments are disclosed or will be obvious from the following Detailed Description. BRIEF DESCRIPTION OF THE DRAWINGS The following Detailed Description will be better understood by reference to the accompanying drawings wherein: FIG. 1 shows a representative gel permeation chromatogram from the fractionation of crude cocoa procyanidins; FIG. 2A shows a representative reverse-phase HPLC chromatogram showing the separation (elution profile) of cocoa procyanidins extracted from unfermented cocoa; FIG. 2B shows a representative normal phase HPLC separation of cocoa procyanidins extracted from unfermented cocoa; FIG. 3 shows several representative procyanidin structures; FIGS. 4A-4E show representative HPLC chromatograms of five fractions employed in screening for anti-cancer or antineoplastic activity; FIGS. 5 and 6A-6D show the dose-response relationship between cocoa extracts and cancer cells ACHN (FIG. 5) and PC-3 (FIGS. 6A-6D) (fractional survival vs. dose, μg/mL); M&M2 F4/92, M&MA+E U12P1, M&MB+E Y192P1, M&MC+E U12P2, M&MD+E U12P2; FIGS. 7A to 7H show the typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, A+B, A+E, and A+D, and the PC-3 cell line (fractional survival vs. dose, μg/mL); MM-1A 0212P3, MM-1 B 0162P1, MM-1 C 0122P3, MM-1 D 0122P3, MM-1 E 0292P8, MM-1 A/B 0292P6, MM-1 A/E 0292P6, MM-1 A/D 0292P6; FIGS. 8A to 8H show the typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, A+B, B+E, and D+E and the KB Nasopharyngeal/HeLa cell line (fractional survival vs. dose, μg/mL); MM-1A092K3, MM-1 B 0212K5, MM-1 C 0162K3, MM-1 D 0212K5, MM-1 E 0292K5, MM-1 A/B 0292K3, MM-1 B/E 0292K4, MM-1 D/E 0292K5; FIGS. 9A to 9H show the typical dose response relationship between cocoa procyanidin fractions A, B, C, D, E, B+D, A+E and D+E and the HCT-116 cell line (fractional survival vs. dose, μg/mL); MM-1 C 0192H5, D 0192H5, E 0192H5, MM-1 B&D 0262H2, A/E 0262H3, MM-1 D&E 0262H1; FIGS. 10A to 10H show typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, B+D, C+D and A+E and the ACHN renal cell line (fractional survival vs. dose, μg/mL); MM-1 A 092A5, MM-1 B 092A5, MM-1 C 0192A7, MM-1 D 0192A7, M&Ml E 0192A7, MM-1 B&D 0302A6, MM-1 C&D 0302A6, MM-1 A&E 0262A6; FIGS. 11A to 11H show typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, A+E, B+E and C+E and the A-549 lung cell line (fractional survival vs. dose, μg/mL); MM-1-A 019258, MM-1 B 09256, MM-1 C 019259, MM-1 D 019258, MM-1 E 019258, A/E 026254, MM-1 B&E 030255, MM-1 C&E N6255; FIGS. 12A to 12H show typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, B+C, C+D and D+E and the SK-5 melanoma cell line (fractional survival vs. dose μg/mL); MM-1 A 0212S4, MM-1 B 0212S4, MM-1 C 0212S4, MM-1 D 0212S4, MM-1 E N32S1, MM-1 B&C N32S2, MM-1 C&D N32S3, MM-1 D&E N32S3; FIGS. 13A to 13H show typical dose response relationships between cocoa procyanidin fractions A, B, C, D, E, B+C, C+E, and D+E and the MCF-7 breast cell line (fractional survival vs. dose, μg/mL); MM-1 A N22M4, MM-1 B N22M4, MM-1 C N22M4, MM-1 D N22M3, MM-1 E 0302M2, MM-1 B/C 0302M4, MM-1 C&E N22M3, MM-1 D&E N22M3; FIG. 14 shows typical dose response relationships for cocoa procyanidin (particularly fraction D) and the CCRF-CEM T-cell leukemia cell line (cells/mL vs. days of growth; open circle is control, darkened circle is 125 μg fraction D, open inverted triangle is 250 μg fraction D, darkened.inverted triangle is 500 μg fraction D); FIG. 15A shows a comparison of the XTT and Crystal Violet cytotoxicity assays against MCF-7 p168 breast cancer cells treated with fraction D+E (open circle is XTT and darkened circle is Crystal Violet); FIG. 15B shows a typical dose response curve obtained from MDA MB231 breast cell line treated with varying levels of crude polyphenols obtained from UIT-1 cocoa genotype (absorbance (540 nm) vs. Days; open circle is control, darkened circle is vehicle, open inverted triangle is 250 μg/mL, darkened inverted triangle is 100 μg/mL, open square is 10 μg/mL; absorbance of 2.0 is maximum of plate reader and may not be necessarily representative of cell number); FIG. 15C shows a typical dose response curve obtained from PC-3 prostate cancer cell line treated with varying levels of crude polyphenols obtained from UIT-1 cocoa genotype (absorbance (540 nm) vs. Days; open circle is control, darkened circle is vehicle, open inverted triangle is 250 μg/mL, darkened inverted triangle is 100 μg/mL and open square is 10 μg/mL); FIG. 15D shows a typical dose-response curve obtained from MCF-7 p168 breast cancer cell line treated with varying levels of crude polyphenols obtained from UIT-1 cocoa genotype (absorbance (540 nm) vs. Days; open circle is control, darkened circle is vehicle, open inverted triangle is 250 g/mL, darkened inverted triangle is 100 μg/mL, open square is 10 μg/mL, darkened square is 1 μg/mL; absorbance of 2.0 is maximum of plate reader and may not be necessarily representative of cell number); FIG. 15E shows a typical dose response curve obtained from Hela cervical cancer cell line treated with varying levels of crude polyphenols obtained from UIT-1 cocoa genotype (absorbance (540 nm) vs. Days; open circle is control, darkened circle is vehicle, open inverted triangle is 250 μg/mL, darkened inverted triangle is 100 μg/mL, open square is 10 μg/mL; absorbance of 2.0 is maximum of plate reader and may not be necessarily representative of cell number); FIG. 15F shows cytotoxic effects against Hela cervical cancer cell line treated with different cocoa polyphenol fractions (absorbance (540 nm) vs. Days; open circle is 100 μg/mL fractions A-E, darkened circle is 100 μg/mL fractions A-C, open inverted triangle is 100 μg/mL fractions D&E; absorbance of 2.0 is maximum of plate reader and not representative of cell number); FIG. 15G shows cytotoxic effects at 100 ul/mL against SKBR-3 breast cancer cell line treated with different cocoa polyphenol fractions (absorbance (540 nm) vs. Days; open circle is fractions A-E, darkened circle is fractions A-C, open inverted triangle is fractions D&E); FIG. 15H shows typical dose-response relationships between cocoa procyanidin fraction D+E on Hela cells (absorbance (540 nm) vs. Days; open circle is control, darkened circle is 100 μg/mL, open inverted triangle is 75 μg/mL, darkened inverted triangle is 50 μg/mL, open square is 25 μg/mL, darkened square is 10 μg/mL; absorbance of 2.0 is maximum of plate reader and is not representative of cell number); FIG. 15I shows typical dose-response relationship between cocoa procyanidin fraction D+E on SKBR-3 cells (absorbance (540 nm) vs. Days; open circle is control, darkened circle is 100 μg/mL, open inverted triangle is 75 μg/mL, darkened inverted triangle is 50 μg/mL, open square is 25 μg/mL, darkened square is 10 μg/mL); FIG. 15J shows typical dose-response relationships between cocoa procyanidin fraction D+E on Hela cells using the Soft Agar Cloning assay (bar chart; number of colonies vs. control, 1, 10, 50, and 100 μg/mL); FIG. 15K shows the growth inhibition of Hela cells when treated with crude polyphenol extracts obtained from eight different cocoa genotypes (% control vs. concentration, μg/mL; open circle is C-1, darkened circle is C-2, open inverted triangle is C-3, darkened inverted triangle is C-4, open square is C-5, darkened square is C-6, open triangle is C-7, darkened triangle is C-8; C-1=UF-12: horti race=Trinitario and description is crude extracts of UF-12 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-2=NA-33: horti race=Forastero and description is crude extracts of NA-33 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-3=EEG-48: horti race=Forastero and description is crude extracts of EEG-48 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-4=unknown: horti race=Forastero and description is crude extracts of unknown (W. African) cocoa polyphenols (decaffeinated/detheobrominated); C-5=UF-613: horti race=Trinitario and description is crude extracts of UF-613 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-6=ICS-100: horti race=Trinitario (to Nicaraguan Criollo ancestor) and description is crude extracts of ICS-100 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-7=ICS-139: horti race=Trinitario (Nicaraguan Criollo ancestor) and description is crude extracts of ICS-139 (Brazil) cocoa polyphenols (decaffeinated/detheobrominated); C-8=UIT-1: horti race=Trinitario and description is crude extracts of UIT-1 (Malaysia) cocoa polyphenols (decaffeinated/detheobrominated); FIG. 15L shows the growth inhibition of Hela cells when treated with crude polyphenol extracts obtained from fermented cocoa beans and dried cocoa beans (stages throughout fermentation and sun drying; % control vs. concentration, μg/mL; open circle is day zero fraction, darkened circle is day 1 fraction, open inverted triangle is day 2 fraction, darkened inverted triangle is day 3 fraction, open square is day 4 fraction and darkened square is day 9 fraction); FIG. 15M shows the effect of enzymatically oxidized cocoa procyanidins against Hela cells (dose response for polyphenol oxidase treated crude cocoa polyphenol; % control vs. concentration, μg/mL; darkened square is crude UIT-1 (with caffeine and theobromine), open circle crude UIT-1 (without caffeine and theobromine) and darkened circle is crude UIT-1 (polyphenol oxidase catalyzed); FIG. 15N shows a representative semi- preparative reverse phase HPLC separation for combined cocoa procyanidin fractions D and E; FIG. 15O shows a representative normal phase semi-preparative HPLC separation of a crude cocoa polyphenol extract; FIG. 16 shows typical Rancimat Oxidation curves for cocoa procyanidin extract and fractions in comparison to the synthetic antioxidants BHA and BHT (arbitrary units vs. time; dotted line and cross (+) is BHA and BHT; * is D-E; x is crude; open square is A-C; and open diamond is control); FIG. 17 shows a typical Agarose Gel indicating inhibition of topoisomerase II catalyzed decatenation of kinetoplast DNA by cocoa procyanidin fractions (Lane 1 contains 0.5 μg of marker (M) monomer-length kinetoplast DNA circles; Lanes 2 and 20 contain kinetoplast DNA that was incubated with Topoisomerase II in the presence of 4% DMSO, but in the absence of any cocoa procyanidins. (Control -C); Lanes 3 and 4 contain kinetoplast DNA that was incubated with Topoisomerase II in the presence of 0.5 and 5.0 μg/mL cocoa procyanidin fraction A; Lanes 5 and 6 contain kinetoplast DNA that was incubated with Topoisomerase II in the presence of 0.5 and 5.0 μg/mL cocoa procyanidin fraction B; Lanes 7, 8, 9, 13, 14 and 15 are replicates of kinetoplast DNA that was incubated with Topoisomerase II in the presence of 0.05, 0.5 and 5.0 μg/mL cocoa procyanidin fraction D; Lanes 10, 11, 12, 16, 17 and 18 are replicates of kinetoplast DNA that was incubated with Topoisomerase II in the presence of 0.05, 0.5, and 5.0 μg/mL cocoa procyanidin fraction E; Lane 19 is a replicate of kinetoplast DNA that was incubated with Topoisomerase II in the presence of 5.0 μg/mL cocoa procyanidin fraction E); FIG. 18 shows dose response relationships of cocoa procyanidin fraction D against DNA repair competent and deficient cell lines (fractional survival vs. μg/mL; left side xrs-6 DNA Deficient Repair Cell Line, MM-1 D D282X1; right side BR1 Competent DNA Repair Cell Line, MM-1 D D282B1); FIG. 19 shows the dose-response curves for Adriamycin resistant MCF-7 cells in comparison to a MCF-7 p168 parental cell line when treated with cocoa fraction D+E (% control vs. concentration, μg/mL; open circle is MCF-7 pl68; darkened circle is MCF-7 ADR); FIGS. 20A and B show the dose-response effects on Hela and SKBR-3 cells when treated at 100 μg/mL and 25 μg/mL levels of twelve fractions prepared by Normal phase semi-preparative HPLC (bar chart, % control vs. control and fractions 1-12); FIG. 21 shows a normal phase HPLC separation of crude, enriched and purified pentamers from cocoa extract; FIGS. 22A, B and C show MALDI-TOF/MS of pentamer enriched procyanidins, and of Fractions A-C and of Fractions D-E, respectively; FIG. 23A shows an elution profile of oligomeric procyanidins purified by modified semi-preparative HPLC; FIG. 23B shows an elution profile of a trimer procyanidin by modified semi-preparative HPLC; FIGS. 24A-D each show energy minimized structures of all (4-8) linked pentamers based on the structure of epicatechin; FIG. 25A shows relative fluorescence of epicatechin upon thiolysis with benzylmercapten; FIG. 25B shows relative fluorescence of catechin upon thiolysis with benzylmercapten; FIG. 25C shows relative fluorescence of dimers (B2 and B5) upon thiolysis with benzylmercapten; FIG. 26A shows relative fluorescence of dimer upon thiolysis; FIG. 26B shows relative fluorescence of B5 dimer upon thiolysis of dimer and subsequent desulphurization; FIG. 27A shows the relative tumor volume during treatment of MDA MB 231 nude mouse model treated with pentamer; FIG. 27B shows the relative survival curve of pentamer treated MDA 231 nude mouse model; FIG. 28 shows the elution profile from halogen-free analytical separation of acetone extract of procyanidins from cocoa extract; FIG. 29 shows the effect of pore size of stationary phase for normal phase HPLC separation of procyanidins; FIG. 30A shows the substrate utilization during fermentation of cocoa beans; FIG. 30B shows the metabolite production during fermentation; FIG. 30C shows the plate counts during fermentation of cocoa beans; FIG. 30D shows the relative concentrations of each component in fermented solutions of cocoa beans; FIG. 31 shows the acetylcholine-induced relaxation of NO-related phenylephrine-precontracted rat aorta; FIG. 32 shows the blood glucose tolerance profiles from various test mixtures; FIGS. 33A-B show the effects of indomethacin on COX-1 and COX-2 activities; FIGS. 34A-B show the correlation between the degree of polymerization and IC50 vs. COX-1/COX-2 (μM); FIG. 35 shows the correlation between the effects of compounds on COX-1 and COX-2 activities expressed as μM; FIGS. 36A-V show the IC50 values (μM) of samples containing procyanidins with COX-1/COX-2; FIG. 37 shows the purification scheme for the isolation of procyanidins from cocoa; FIG. 38A to 38P shows the preferred structures of the pentamer; FIGS. 39A-AA show a library of stereoisomers of pentamers; FIGS. 40A-B show 70 minute gradients for normal phase HPLC separation of procyanidins, detected by UV and fluorescence, respectively; FIGS. 41A-B show 30 minute gradients for normal phase HPLC separation of procyanidins, detected by UV and fluorescence, respectively; FIG. 42 shows a preparation normal phase HPLC separation of procyanidins; FIGS. 43A-G show CD (circular dichroism) spectra of procyanidin dimers, trimers, tetramers, pentamers, hexamers, heptamers and octamers, respectively; FIG. 44A shows the structure and 1H/13C NMR data for epicatechin; FIGS. 44B-F show the APT, COSY, XHCORR, 1H and 13C NMR spectra for epicatechin; FIG. 45A shows the structure and 1H/13C NMR data for catechin; FIGS. 45B-E show the 1H, APT, XHCORR and COSY NMR spectra for catechin; FIG. 46A shows the structure and 1H/13C NMR data for B2 dimer; FIGS. 46B-G show the 13C, APT, 1H, HMQC, COSY and HOHAHA NMR spectra for the B2 dimer; FIG. 47A shows the structure and 1H/13C NMR data for B5 dimer; FIGS. 47B-G show the 1H, 13C, APT, COSY, HMQC and HOHAHA NMR spectra for B5 dimer; FIGS. 48A-D show the 1H, COSY, HMQC and HOHAHA NMR spectra for epicatechin/catechin trimer; FIGS. 49A-D show the 1H, COSY, HMQC and HOHAHA NMR spectra for epicatechin trimer; FIGS. 50A and B show the effects of cocoa procyanidin fraction A and C, respectively, on blood pressure; blood pressure levels decreased by 21.43% within 1 minute after administration of fraction A, and returned to normal after 15 minutes, while blood pressure decreased by 50.5% within 1 minute after administration of fraction C, and returned to normal after 5 minutes; FIG. 51 shows the effect of cocoa procyanidin fractions on arterial blood pressure in anesthetized guinea pigs; FIG. 52 shows the effect of L-NMMA on the alterations of arterial blood pressure in anesthetized guinea pigs induced by cocoa procyanidin fraction C; FIG. 53 shows the effect of bradykinin on NO production by HUVEC; FIG. 54 shows the effect of cocoa procyanidin fractions on macrophage NO production by HUVEC; FIG. 55 shows the effect of cocoa procyanidin fractions on macrophage NO production; FIG. 56 shows the effect of cocoa procyanidin fraction on LPS induced and gamma-Interferon primed macrophages. FIG. 57 shows a micellar electrokinetic capillary chromatographic separation of cocoa procyanidin oligomers; FIG. 58 A-F show MALDI-TOF mass spectra for Cu+2—, Zn+2—, Fe+2—, Fe+3—, Ca+2—, and Mg+2— ions, respectively, complexed to a trimer; FIG. 59 shows a MALDI-TOF mass spectrum of cocoa procyanidin oligomers (tetramers to octadecamers); FIG. 60 shows the dose-response relationship of cocoa procyanidin oligomers and the feline FeA lymphoblastoid cell line producing leukemia virus; FIG. 61 shows the dose-response relationship of cocoa procyanidin oligomers and the feline CRFK normal kidney cell line; FIG. 62 shows the dose-response relationship of cocoa procyanidin oligomers and the canine MDCK normal kidney line; FIG. 63 shows the dose-response relationship between cocoa procyanidin oligomers and the canine GH normal kidney cell line; FIG. 64 shows time-temperature effects on hexamer hydrolysis; and FIG. 65 shows time-temperature effects on triter formation. DETAILED DESCRIPTION Compounds of the Invention As discussed above, it has now been surprisingly found that cocoa extracts or compounds derived therefrom exhibit anti-cancer, anti-tumor or antineoplastic activity, antioxidant activity, inhibit DNA topoisomerase II enzyme and oxidative damage to DNA, and have antimicrobial, cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase, apoptosis, platelet aggregation and blood or in vivo glucose, modulating activities, as well as efficacy as a non-steroidal antiinflammatory agent. The extracts, compounds or combination of compounds derived therefrom are generally prepared by reducing cocoa beans to a powder, defatting the powder, and extracting and purifying the active compound(s) from the defatted powder. The powder can be prepared by freeze-drying the cocoa beans and pulp, depulping and dehulling the freeze-dried cocoa beans and grinding the dehulled beans. The extraction of active compound(s) can be by solvent extraction techniques. The extracts comprising the active compounds can be purified, e.g., to be substantially pure, for instance, by gel permeation chromatography or by preparative High Performance Liquid Chromatography (HPLC) techniques or by a combination of such techniques. With reference to the isolation and purification of the compounds of the invention derived from cocoa, it will be understood that any species of Theobroma, Herrania or inter- and intra-species crosses thereof may be employed. In this regard, reference is made to Schultes, “Synopsis of Herrania,” Journal of the Arnold Arboretum, Vol. XXXIX, pp. 217 to 278, plus plates I to XVII (1985), Cuatrecasas, “Cocoa and Its Allies, A Taxonomic Revision of the Genus Theobroma,” Bulletin of the United States National Museum, Vol. 35, part 6, pp. 379 to 613, plus plates 1 to 11 (Smithsonian Institution, 1964), and Addison, et all., “Observations on the Species of the Genus Theobroma Which Occurs in the Amazon,” Bol. Tech. Inst. Agronomico de Nortes, 25(3) (1951). Additionally, Example 25 lists the heretofore never reported concentrations of the inventive compounds found in Theobroma and Herrania species and their inter- and intra-species crosses; and Example 25 also describes methods of modulating the amounts of the inventive compounds which may be obtained from cocoa by manipulating cocoa fermentation conditions. An outline of the purification protocol utilized in the isolation of substantially pure procyanidins is shown in FIG. 37. Steps 1 and 2 of the purification scheme are described in Examples 1 and 2; steps 3 and 4 are described in Examples 3, 13 and 23; step 5 is described in Examples 4 and 14; and step 6 is described in Examples 4, 14 and 16. The skilled artisan would appreciate and envision modifications in the purification scheme outlined in FIG. 37 to obtain the active compounds without departing from the spirit or scope thereof and without undue experimentation. The extracts, compounds and combinations of compounds derived therefrom having activity, without wishing to necessarily be bound by any particular theory, have been identified as cocoa polyphenol(s), such as procyanidins. These cocoa procyanidins have significant anti-cancer, anti-tumor or antineoplastic activity; antioxidant activity; inhibit DNA topoisomerase II enzyme and oxidative damage to DNA; possess antimicrobial activity; have the ability to modulate cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase, apoptosis, platelet aggregation and blood or in vivo glucose, and have efficacy as non-steroidal antiinflammatory agents. The present invention provides a compound of the formula: wherein: n is an integer from 2 to 18, e.g., 3 to 12, such that there is a first monomeric unit A, and a plurality of other monomeric units; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; position 4 is alpha or beta stereochemistry; X, Y and Z represent positions for bonding between monomeric units, with the provisos that as to the first monomeric unit, bonding of another monomeric unit thereto is at position 4 and Y=Z=hydrogen, and, that when not for bonding monomeric units, X, Y and Z are hydrogen, or Z, Y are sugar and X is hydrogen, or X is alpha or beta sugar and Z, Y are hydrogen, or combinations thereof. The compound can have n as 5 to 12, and certain preferred compounds have n as 5. The sugar can be selected from the group consisting of glucose, galactose, xylose, rhamnose, and arabinose. The sugar of any or all of R, X, Y and Z can optionally be substituted with a phenolic moiety via an ester bond. Thus, the invention can provide a compound of the formula: wherein: n is an integer from 2 to 18, e.g., 3 to 12, advantageously 5 to 12, and preferably n is 5, such that there is a first monomeric unit A, and a plurality of other monomeric units of A; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; position 4 is alpha or beta stereochemistry; X, Y and Z represent positions for bonding between monomeric units, with the provisos that as to the first monomeric unit, bonding of another monomeric unit thereto is at position 4 and Y=Z=hydrogen, and, that when not for bonding monomeric units, X, Y and Z are hydrogen or Z, Y are sugar and X is hydrogen, or X is alpha or beta sugar and Z and Y are hydrogen, or combinations thereof; and said sugar is optionally substituted with a phenolic moiety via an ester bond. Accordingly, the present invention provides a polymeric compound of the formula An, wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, such that there is at least one terminal monomeric unit A, and at least one or a plurality of additional monomeric units; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has a or B stereochemistry; X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the provisos that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto (i.e., the bonding of the monomeric unit adjacent the terminal monomeric unit) is at position 4 and optionally, Y=Z=hydrogen; the sugar is optionally substituted with a phenolic moiety at any position, for instance via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). In preferred embodiments, n can be 3 to 18, 2 to 18, 3 to 12, e.g., 5 to 12; and, advantageously, n is 5. The sugar is selected from the group consisting of glucose, galactose, xylose, rhamnose and arabinose. The sugar of any or all of R, X, Y and Z can optionally be substituted at any position with a phenolic moiety via an ester bond. The phenolic moiety is selected from the group consisting of caffeic, cinnamic, coumaric, ferulic, gallic, hydroxybenzoic and sinapic acids. Additionally, the present invention provides a polymeric compound of the formula An, wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, e.g., 3 to 18, advantageously 3 to 12, e.g., 5 to 12, preferably n is 5; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; adjacent monomers bind at position 4 by (4→6) or (4→8); each of X, Y and Z is H, a sugar or an adjacent monomer, with the provisos that if X and Y are adjacent monomers, Z is H or sugar and if X and Z are adjacent monomers, Y is H or sugar, and that as to at least one of the two terminal monomers, bonding of the adjacent monomer is at position 4 and optionally, Y=Z=hydrogen; a bond at position 4 has a or B stereochemistry; the sugar is optionally substituted with a phenolic moiety at any position, for instance, via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). With regard to the recitation of “at least one terminal monomeric unit A”, it will be understood that the inventive compounds have two terminal monomeric units, and that the two terminal monomeric unit A may be the same or different. Additionally, it will be understood that the recitation of “at least one terminal monomeric unit A” includes embodiments wherein the terminal monomeric unit A is referred to as a “first monomeric unit”, with the recitation of “first monomeric unit” relating to that monomer to which other monomeric units are added, resulting in a polymeric compound of the formula An. Moreover, with regard to the at least one of the two terminal monomers, bonding of the adjacent monomer is at position 4 and optionally, Y=Z=hydrogen. As to the recitation of the term “combinations thereof”, it will be understood that one or more of the inventive compounds may be used simultaneously, e.g., administered to a subject in need of treatment in a formulation comprising one or more inventive compounds. The inventive compounds or combinations thereof display the utilities noted above for cocoa extracts; and throughout the disclosure, the term “cocoa extract” may be substituted by compounds of the invention or combinations thereof, such that it will be understood that the inventive compounds or combinations thereof can be cocoa extracts. The term “oligomer”, as used herein, refers to any compounds or combinations thereof of the formula presented above, wherein n is 2 through 18. When n is 2, the oligomer is termed a “dimer”; when n is 3, the oligomer is termed a “trimer”; when n is 4, the oligomer is termed a “tetramer”; when n is 5, the oligomer is termed a “pentamer”; and similar recitations may be designated for oligomers having n up to and including 18, such that when n is 18, the oligomer is termed an “octadecamer”. The inventive compounds or combinations thereof can be isolated, e.g., from a natural source such as any species of Theobroma, Herrania or inter- or intra-species crosses thereof; or, the inventive compounds or combinations thereof can be purified, e.g., compounds or combinations thereof can be substantially pure; for instance, purified to apparent homogeneity. Purity is a relative concept, and the numerous Examples demonstrate isolation of inventive compounds or combinations thereof, as well as purification thereof, such that by methods exemplified a skilled artisan can obtain a substantially pure inventive compound or combination thereof, or purify them to apparent homogeneity (e.g., purity by separate, distinct chromatographic peak). Considering the Examples (e.g., Example 37), a substantially pure compound or combination of compounds is at least about 40% pure, e.g., at least about 50% pure, advantageously at least about 60% pure, e.g., at least about 70% pure, more advantageously at least about 75-80% pure, preferably, at least about 90% pure, more preferably greater than 90% pure, e.g., at least 90-95% pure, or even purer, such as greater than 95% pure, e.g., 95-98% pure. Further, examples of the monomeric units comprising the oligomers used herein are (+)-catechin and (−)-epicatechin, abbreviated C and EC, respectively. The linkages between adjacent monomers are from position 4 to position 6 or position 4 to position 8; and this linkage between position 4 of a monomer and position 6 and 8 of the adjacent monomeric units is designated herein as (4→6) or (4→8). There are four possible stereochemical linkages between position 4 of a monomer and position 6 and 8 of the adjacent monomer; and the stereochemical linkages between monomeric units is designated herein as (4α→6) or (4β→6) or (4α→8) or (4β→8). When C is linked to another C or EC, the linkages are designated herein as (4α→6) or (4α→8). When EC is linked to another C or EC, the linkages are designated herein as (4β→6) or (4β→8). Examples of compounds eliciting the activities cited above include dimers, EC-(4β→8)-EC and EC-(4β→6)-EC, wherein EC-(4β→8)-EC is preferred; trimers [EC-(4β→8)]2-EC, [EC-(4β→8)]2-C and [EC-(4β→6)]2-EC, wherein [EC-(4β→8)]2-EC is preferred; tetramers [EC-(4β→8)]3-EC, [EC-(4β→8)]3-C and [EC-(4β→8)]2-EC-(4β→6)-C, wherein [EC-(4β→8)]3-EC is preferred; and pentamers [EC-(4β→8)]4-EC, [EC-(4β→8)]3-EC-(4β→6)-EC, [EC-(4β→8)]3-EC-(4β→8)-C and [EC-(4β→8)]3-EC-(4β→6)-C, wherein the 3-position of the pentamer terminal monomeric unit is optionally derivatized with a gallate or β-D-glucose; [EC-(4β→8)]4-EC is preferred. Additionally, compounds which elicit the activities cited above also include hexamers to dodecamers, examples of which are listed below: A hexamer, wherein one monomer (C or EC) having linkages to another monomer (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]5-EC, [EC-(4β→8)]4-EC-(4β→6)-EC, [EC-(4β→8)]4-EC-(4β→8)-C, and [EC-(4β→8)]4-EC-(4β→6)-C, wherein the 3-position of the hexamer terminal monomeric unit is optionally derivatized with a gallate or a B-D-glucose; in a preferred embodiment, the hexamer is [EC-(4β→8)]5-EC; A heptamer, wherein any combination of two monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]6-EC, [EC-(4β→8)]5-EC-(4β→6)-EC, [EC-(4β→8)]5-EC-(4β→8)-C, and [EC-(4β→8)]5-EC-(4β→6)-C, wherein the 3-position of the heptamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the heptamer is [EC-(4β→8)]6-EC; An octamer, wherein any combination of three monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [(EC-(4β→8)]7-EC, [EC-(4β→8)]6-EC-(4β→6)-EC, [EC-(4β→8)]6-EC-(4β→8)-C, and [EC-(4β→8)]6-EC-(4β→6)-C, wherein the 3-position of the octamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the octamer is [EC-(4β→8)]7-EC; A nonamer, wherein any combination of four monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]8-EC, [EC-(4β→8)]7-EC-(4β→6)-EC, [EC-(4β→8)]7-EC-(4β→8)-C, and [EC-(4β→8)]7-EC-(4β→6)-C, wherein the 3-position of the nonamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the nonamer is [EC-(4β→8)]8-EC; A decamer, wherein any combination of five monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]9-EC, [EC-(4β→8)]8-EC-(4β→6)-EC, [EC-(4β→8)]8-EC-(4β→8)-C, and [EC-(4β→8)]8-EC-(4β→6)-C, wherein the 3-position of the decamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the decamer is [EC-(4β→8)]9-EC; An undecamer, wherein any combination of six monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]10-EC, [EC-(4β→8)]9-EC-(4β→6)-EC, [EC-(4β→8)]9-EC-(4β→8)-C, and [EC-(4β→8)]9-EC-(4β→6)-C, wherein the 3-position of the undecamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the undecamer is [EC-(4β→8)]10-EC; and A dodecamer, wherein any combination of seven monomers (C and/or EC) having linkages to one another (4β→8) or (4β→6) for EC linked to another EC or C, and (4α→8) or (4α→6) for C linked to another C or EC; followed by a (4β→8) linkage to a pentamer compound listed above, e.g., [EC-(4β→8)]11-EC, [EC-(4β→8)]10-EC-(4β→6)-EC, [EC-(4β→8)]10-EC-(4β→8)-C, and [EC-(4β→8)]10-EC-(4β→6)-C, wherein the 3-position of the dodecamer terminal monomeric unit is optionally derivatized with a gallate or a β-D-glucose; in a preferred embodiment, the dodecamer is [EC-(4β→8)]11-EC. It will be understood from the detailed description that the aforementioned list is exemplary and provided as an illustrative source of several non-limiting examples of compounds of the invention, which is by no means an exhaustive list of the inventive compounds encompassed by the present invention. Examples 3A, 3B, 4, 14, 23, 24, 30 and 34 describe methods to separate the compounds of the invention. Examples 13, 14A-D and 16 describe methods to purify the compounds of the invention. Examples 5, 15, 18, 19, 20 and 29 describe methods to identify compounds of the invention. FIGS. 38A-P and 39A-AA illustrate a stereochemical library for representative pentamers of the invention. Example 17 describes a method to molecularly model the compounds of the invention. Example 36 provides evidence for higher oligomers in cocoa, wherein n is 13 to 18. Furthermore, while the invention is described with respect to cocoa extracts preferably comprising cocoa procyanidins, from this disclosure the skilled organic chemist will appreciate and envision synthetic routes to obtain and/or prepare the active compounds (see e.g., Example 11). Accordingly, the invention comprehends synthetic cocoa polyphenols or procyanidins or their derivatives and/or their synthetic precursors which include, but are not limited to glycosides, gallates, esters, etc. and the like. That is, the inventive compounds can be prepared from isolation from cocoa or from any species within the Theobroma or Herrania genera, as well as from synthetic routes; and derivatives and synthetic precursors of the inventive compounds such as glycosides, gallates, esters, etc. are included in the inventive compounds. Derivatives can also include compounds of the above formulae wherein a sugar or gallate moiety is on the terminal monomer at positions Y or Z, or a substituted sugar or gallate moiety is on the terminal monomer at Y or Z. For example, Example 8, Method C describes the use of cocoa enzymes to oxidatively modify the compounds of the invention or combinations thereof to elicit improved cytotoxicity (see FIG. 15M) against certain cancer cell lines. The invention includes the ability to enzymatically modify (e.g., cleavage or addition of a chemically significant moiety) the compounds of the invention, e.g., enzymatically with polyphenol oxidase, peroxidase, catalase combinations, and/or enzymes such as hydrolases, esterases, reductases, transferases, and the like and in any combination, taking into account kinetic and thermodynamic factors (see also Example 41 regarding hydrolysis). With regard to the synthesis of the inventive compounds, the skilled artisan will be able to envision additional routes of synthesis, based on this disclosure and the knowledge in the art, without undue experimentation. For example, based upon a careful retrosynthetic analysis of the polymeric compounds, as well as the monomers. For instance, given the phenolic character of the inventive compounds, the skilled artisan can utilize various methods of selective protection/deprotection, coupled with organometallic additions, phenolic couplings and photochemical reactions, e.g., in a convergent, linear or biomimetic approach, or combinations thereof, together with standard reactions known to those well-versed in the art of synthetic organic chemistry, as additional synthetic methods for preparing the inventive compounds, without undue experimentation. In this regard, reference is made to W. Carruthers, Some Modern Methods of Organic Synthesis, 3rd ed., Cambridge University Press, 1986, and J. March, Advanced Organic Chemistry, 3rd ed., John Wiley & Sons, 1985, van Rensburg et al., Chem. Comm., 24: 2705-2706 (Dec. 21, 1996), Ballenegger et al., (Zyma SA) European Patent 0096 007 B1, and documents in the References section below, all of which are hereby incorporated herein by reference. UTILITIES OF COMPOUNDS OF THE INVENTION With regard to the inventive compounds, it has been surprisingly found that the inventive compounds have discrete activities, and as such, the inventive compounds have broad applicability to the treatment of a variety of disease conditions, discussed hereinbelow. COX/LOX-ASSOCIATED UTILITIES Atherosclerosis, the most prevalent of cardiovascular diseases, is the principle cause of heart attack, stroke and vascular circulation problems. Atherosclerosis is a complex disease which involves many cell types, biochemical events and molecular factors. There are several aspects of this disease, its disease states and disease progression which are distinguished by the interdependent consequences of Low Density Lipoprotein (LDL) oxidation, cyclo-oxygenase (COX)/lipoxygenase (LOX) biochemistry and Nitric Oxide (NO) biochemistry. Clinical studies have firmly established that the elevated plasma concentrations of LDL are associated with accelerated atherogenesis. The cholesterol that accumulates in atherosclerotic lesions originate primarily in plasma lipoproteins, including LDL. The oxidation of LDL is a critical event in the initiation of atheroma formation and is associated with the enhanced production of superoxide anion radical (O2.—). Oxidation of LDL by O2.— or other reactive species (e.g., .OH, ONOO.—, lipid peroxy radical, copper ion, and iron based proteins) reduces the affinity of LDL for uptake in cells via receptor mediated endocytosis. Oxidatively modified LDLs are then rapidly taken up by macrophages which subsequently transform into cells closely resembling the “foam cells” observed in early atherosclerotic lesions. Oxidized lipoproteins can also promote vascular injury through the formation of lipid hydroperoxides within the LDL particle. This event initiates radical chain oxidation reactions of unsaturated LDL lipids, thus producing more oxidized LDL for macrophage incorporation. The collective accumulation of foam cells engorged with oxidized LDL from these processes results in early “fatty streak” lesions, which eventually progress to the more advanced complex lesions of atherosclerosis leading to coronary disease. As discussed generally by Jean Marx at page 320 of Science, Vol. 265 (Jul. 15, 1994), each year about 330,000 patients in the United States undergo coronary and/or peripheral angioplasty, a procedure designed to open up blood vessels, e.g., coronary arteries, clogged by dangerous atherosclerotic plaques (atherosclerosis) and thereby restore normal blood flow. For a majority of these patients, the operation works as intended. Nearly 33% of these patients (and maybe more by some accounts), however, develop restenosis, wherein the treated arteries become quickly clogged again. These patients are no better off, and sometimes worse off, than they were before angioplasty. Excessive proliferation of smooth muscle cells (SMCs) in blood vessel walls contributes to restenosis. Increased accumulation of oxidized LDL within lesion SMCs might contribute to an atherogenic-related process like restenosis. Zhou et al., “Association Between Prior Cytomegalovirus Infection And The Risk Of Restenosis After Coronary Atherectomy,” Aug. 29, 1996, New England Journal of Medicine, 335:624-630, and documents cited therein, all incorporated herein by reference. Accordingly, utility of the present invention with respect to atherosclerosis can apply to restenosis. With regard to the inhibition by the inventive compounds of cyclooxygenases (COX; prostaglandin endoperoxide synthase), it is known that cyclooxygenases are central enzymes in the production of prostaglandins and other arachidonic acid metabolites (i.e., eicosanoids) involved in many physiological processes. COX-1 is a constitutive enzyme expressed in many tissues, including platelets, whereas COX-2, a second isoform of the enzyme, is inducible by various cytokines, hormones and tumor promoters. COX 1 produces thromboxane A2, which is involved in platelet aggregation, which in turn is involved in the progression of atherosclerosis. Its inhibition is the basis for the prophylactic effects on cardiovascular disease. The activity of COX-1 and COX-2 is inhibited by aspirin and other nonsteroidal antiinflammatory drugs (NSAIDs), and the gastric side effects of NSAIDs are believed to be associated with the inhibition of COX-1. Moreover, it has been found that patients taking NSAIDs on a regular basis have a 40 to 50% lower risk of contracting colorectal cancer when compared to persons not being administered these type of medications; and COX-2 mRNA levels are markedly increased in 86% of human colorectal adenocarcinomas. One significant property of COX-2 expressing cell lines is the enhanced expression of genes which participate in the modulation of apoptosis, i.e., programmed cell death. Several NSAIDs have been implicated in increased cell death and the induction of apoptosis in chicken embryo fibroblasts. Cellular lipoxygenases are also involved in the oxidative modification of LDL through the peroxidation of unsaturated lipids. The generation of lipid peroxy radicals contributes to the further radical chain oxidation of unsaturated LDL lipids, producing more oxidized LDL for macrophage incorporation. It has been surprisingly found that the inventive compounds have utility in the treatment of diseases associated with COX/LOX. In Example 28, COX was inhibited by individual inventive compounds at concentrations similar to a known NSAID, indomethacin. For COX inhibition, the inventive compounds are oligomers, where n is 2 to 18. In a preferred embodiment, the inventive compounds are oligomers where n is 2 to 10, and more preferably, the inventive compounds are oligomers where n is 2 to 5. Examples of compounds eliciting the inhibitory activity with respect to COX/LOX cited above include dimers, trimers, tetramers and pentamers, discussed above. Hence, given the significant inhibitory potency of the inventive compounds on COX-2, coupled with the cytotoxic effects on a putative COX-2 expression colon cancer cell line, the inventive compounds possess apoptotic activity as inhibitors of the multistep progression leading to carcinomas, as well as activity as members of the NSAID family of medications possessing a broad spectrum of prophylactic activities (see, e.g., Example 8, FIGS. 9D to 9H). Further, prostaglandins, the penultimate products of the COX catalyzed conversion of arachidonic acid to prostaglandin H2, are involved in inflammation, pain, fever, fetal development, labor and platelet aggregation. Therefore, the inventive compounds are efficacious for the same conditions as NSAIDs, e.g., against cardiovascular disease, and stroke, etc. (indeed, the inhibition of platelet COX-1, which reduces thromboxane A2 production, is the basis for the prophylactic effects of aspirin on cardiovascular disease). Inflammation is the response of living tissues to injury. It involves a complex series of enzyme activation, mediator release, extravasation of fluid, cell migration, tissue breakdown and repair. Inflammation is activated by phospholipase A2, which liberates arachidonic acid, the substrate for COX and LOX enzymes. COX converts arachidonic acid to the prostaglandin PGE2, the major eicosanoid detected in inflammatory conditions ranging from acute edema to chronic arthritis. Its inhibition by NSAIDs is a mainstay for treatment. Arthritis is one of the rheumatic diseases which encompass a wide range of diseases and pathological processes, most of which affect joint tissue. The basic structure affected by these diseases is the connective tissue which includes synovial membranes, cartilage, bone, tendons, ligaments, and interstitial tissues. Temporary connective tissue syndromes include sprains and strains, tendonitis, and tendon sheath abnormalities. The most serious forms of arthritis are rheumatoid arthritis, osteoarthritis, gout and systemic lupus erythematosus. In addition to the rheumatic diseases, other diseases are characterized by inflammation. Gingivitis and periodontitis follows a pathological picture resembling rheumatoid arthritis. Inflammatory bowel disease refers to idiopathic chronic inflammatory conditions of the intestine, ulcerative colitis and Crohn's disease. Spondylitis refers to chronic inflammation of the joints of the spine. There is also a high incidence of osteoarthritis associated with obesity. Thus, the inventive compounds have utility in the treatment of conditions involving inflammation, pain, fever, fetal development, labor and platelet aggregation. The inhibition of COX by the inventive compounds would also inhibit the formation of postaglandins, e.g., PGD2, PGE2. Thus, the inventive compounds have utility in the treatment of conditions associated with prostaglandin PGD2, PGE2. NO-ASSOCIATED UTILITIES Nitric oxide (NO) is known to inhibit platelet aggregation, monocyte adhesion and chemotaxis, and proliferation of vascular smooth muscle tissue which are critically involved in the process of atherogenesis. Evidence supports the view that NO is reduced in atherosclerotic tissues due to its reaction with oxygen free radicals. The loss of NO due to these reactions leads to increased platelet and inflammatory cell adhesion to vessel walls to further impair NO mechanisms of relaxation. In this manner, the loss of NO promotes atherogenic processes, leading to progressive disease states. Hypertension is a leading cause of cardiovascular diseases, including stroke, heart attack, heart failure, irregular heart beat and kidney failure. Hypertension is a condition where the pressure of blood within the blood vessels is higher than normal as it circulates through the body. When the systolic pressure exceeds 150 mm Hg or the diastolic pressure exceeds 90 mm Hg for a sustained period of time, damage is done to the body. For example, excessive systolic pressure can rupture blood vessels anywhere. When it occurs within the brain, a stroke results. It can also cause thickening and narrowing of the blood vessels which can lead to atherosclerosis. Elevated blood pressure can also force the heart muscle to enlarge as it works harder to overcome the elevated resting (diastolic) pressure when blood is expelled. This enlargement can eventually produce irregular heart beats or heart failure. Hypertension is called the “silent killer” because it causes no symptoms and can only be detected when blood pressure is checked. The regulation of blood pressure is a complex event where one mechanism involves the expression of constitutive Ca+2/calmodulin dependent form of nitric oxide synthase (NOS), abbreviated eNOS. NO produced by this enzyme produces muscle relaxation in the vessel (dilation), which lowers the blood pressure. When the normal level of NO produced by eNOS is not produced, either because production is blocked by an inhibitor or in pathological states, such as atherosclerosis, the vascular muscles do not relax to the appropriate degree. The resulting vasoconstriction increases blood pressure and may be responsible for some forms of hypertension. Vascular endothelial cells contain eNOS. NO synthesized by eNOS diffuses in diverse directions, and when it reaches the underlying vascular smooth muscle, NO binds to the heme group of guanylyl cyclase, causing an increase in cGMP. Increased cGMP causes a decrease in intracellular free Ca+2. Cyclic GMP may activate a protein kinase that phosphorylates Ca+2 transporters, causing Ca+2 to be sequestered in intracellular structures in the muscle cells. Since muscle contraction requires Ca+2, the force of the contraction is reduced as the Ca+2 concentration declines. Muscle relaxation allows the vessel to dilate, which lowers the blood pressure. Inhibition of eNOS therefore causes blood pressure to increase. When the normal level of NO is not produced, either because production is blocked by administration of an NOS inhibitor or possibly, in pathological states, such as atherosclerosis, the vascular muscles do not relax to the appropriate degree. The resulting vasoconstriction increases blood pressure and may be responsible for some forms of hypertension. There is considerable interest in finding therapeutic ways to increase the activity of eNOS in hypertensive patients, but practical therapies have not been reported. Pharmacological agents capable of releasing NO, such as nitroglycerin or isosorbide dinitrate, remain mainstays of vasorelaxant therapy. Although the inventive compounds inhibit the oxidation of LDL, the more comprehensive effects of these compounds is their multidimensional effects on atherosclerosis via NO. NO modulation by the inventive compounds brings about a collage of beneficial effects, including the modulation of hypertension, lowering NO affected hypercholesterolemia, inhibiting platelet aggregation and monocyte adhesion, all of which are involved with the progression of atherosclerosis. The role of NO in the immune system is different from its function in blood vessels. Macrophages contain a form of NOS that is inducible, rather than constitutive, referred to as iNOS. Transcription of the iNOS gene is controlled both positively and negatively by a number of biological response modifiers called cytokines. The most important inducers are gamma-interferon, tumor necrosis factor, interleukin-1, interleukin-2 and lipopolysaccharide (LPS), which is a component of the cell walls of gram negative bacteria. Stimulated macrophages produce enough NO to inhibit ribonuclease reductase, the enzyme that converts ribonucleotides to the deoxyribonucleotides necessary for DNA synthesis. Inhibition of DNA synthesis may be an important way in which macrophages and other tissues possessing iNOS can inhibit the growth of rapidly dividing tumor cells or infectious bacteria. With regard to the effects of NO and infectious bacteria, microorganisms play a significant role in infectious processes which reflect body contact and injury, habits, profession, environment of the individual, as well as food borne diseases brought about by improper storage, handling and contamination. The inventive compounds, combinations thereof and compositions containing the same are useful in the treatment of conditions associated with modulating NO concentrations. Example 9 described the antioxidant activity (as inhibitors of free radicals) of the inventive compounds. Given that NO is a free radical and that the inventive compounds are strong antioxidants, it was suspected that the administration of the inventive compounds to experimental in vitro and in vivo models would have caused a reduction in NO levels. Any reduction in NO would have resulted in a hypertensive, rather than a hypotensive effect. Contrary to expectations, the inventive compounds elicited increases in NO from in vitro experiments and produced a hypotensive effect from in vivo studies (Examples 31 and 32). These results were unanticipated and completely unexpected. Example 27 describes an erythmia (facial flush) shortly after drinking a solution containing the inventive compounds and glucose, thus implying a vasodilation effect. Example 31 describes the hypotensive effects elicited by the inventive compounds in an in vivo animal model, demonstrating the efficacy of the inventive compounds in the treatment of hypertension. In this example, the inventive compounds, combinations thereof and compositions comprising the same comprise oligomers wherein n is 2 to 18, and preferably, n is 2 to 10. Example 32 describes the modulation of NO production by the inventive compounds in an in vitro model. In this example, the inventive compounds, combinations thereof and compositions comprising the same comprise oligomers wherein n is 2 to 18, and preferably n is 2 to 10. Further, Example 35 provides evidence for the formation of Cu+2—, Fe+2— and Fe+3-oligomer complexes detected by MALDI/TOF/MS. These results indicate that the inventive compounds can complex with copper and/or iron ions to minimize their effects on LDL oxidation. Moreover, the inventive compounds have useful anti-microbial activities for the treatment of infections and for the prevention of food spoilage. Examples 22 and 30 describe the antimicrobial activity of the inventive compounds against several representative microbiota having clinical and food significance, as outlined below. CLINICAL/FOOD MICROORGANISM TYPE RELEVANCE Helicobacter pylori gram negative gastritis, ulcers, gastric cancer Bacillus species gram positive food poisoning, wound infections, bovine mastitis, septicemia Salmonella species gram negative food poisoning, diarrhea Staphylococcus gram positive boils, carbuncles, aureus wound infection, septicemia, breast abscesses Escherichia coli gram negative infant diarrhea, urinary tract infection Pseudomonas species gram negative urinary tract infections, wound infections, “swimmer's ear” Saccharomyces yeast food spoilage cervisea Acetobacter gram negative food spoilage pasteurianus Example 33 describes the effects of the inventive compounds on macrophage NO production. In this example, the results demonstrate that the inventive compounds induce monocyte/macrophage NO production, both independent and dependent of stimulation by lipopolysaccharide (LPS) or cytokines. Macrophages producing NO can inhibit the growth of infectious bacteria. Compounds of the invention eliciting antimicrobial activity are oligomers, where n is 2 to 18, and preferably, are oligomers where n is 2, 4, 5, 6, 8 and 10. Examples of compounds eliciting the antimicrobial activity with respect to NO cited above include dimers, tetramers, pentamers, hexamers, octamers and decamers, discussed above. ANTI-CANCER UTILITIES Cancers are classified into three groups: carcinomas, sarcomas and lymphomas. A carcinoma is a malignancy that arises in the skin, linings of various organs, glands and tissues. A sarcoma is a malignancy that arises in the bone, muscle or connective tissue. The third group comprises leukemias and lymphomas because both develop within the blood cell forming organs. The major types of cancer are prostate, breast, lung, colorectal, bladder, non-Hodgkin's lymphoma, uterine, melanoma of the skin, kidney, leukemia, ovarian and pancreatic. The development of cancer results from alterations to the DNA of cells which is brought about by many factors such as inheritable genetic factors, ionizing radiation, pollutants, radon, and free radical damage to the DNA. Cells carrying mutations produce a defect in the ordered process of cell division. These cells fail to undergo apoptosis (programmed cell death) and continue to divide which either marks the beginnings of a malignant tumor or allows more mutations to occur over time to result in a malignancy. There are three major features common to the many different cancers. These are (1) the ability to proliferate indefinitely; (2) invasion of the tumor into the surrounding tissue; and (3) the process of metastasis. Certain types of cancer metastasize in characteristic ways. For example, cancers of the thyroid gland, lung, breast, kidney and prostate gland frequently metastasize to the bones. Lung cancer commonly spreads to the brain and adrenal glands and colorectal cancer often metastasizes to the liver. Leukemia is considered to be a generalized disease at the onset, where it is found in the bone marrow throughout the body. It has been surprisingly found that the inventive compounds are useful in the treatment of a variety of cancers discussed above. Examples 6, 7, 8 and 15 describe the inventive compounds which elicit anti-cancer activity against human HeLa (cervical), prostate, breast, renal, T-cell leukemia and colon cancer cell lines. Example 12 (FIG. 20) illustrates the dose response effects on HeLa and SKBR-3 breast cancer cell lines treated with oligomeric (dimers—dodecamers) procyanidins, which were substantially purified by HPLC. Cytotoxicity against these cancer cell lines were dependent upon pentamer through dodecamer procyanidins, with the lower oligomers showing no effect. While not wishing to be bound by any theory, there appeared to be a minimum structural motif that accounts for the effects described above. Example 37 also shows the same cytotoxic effects of the higher oligomers (pentamer—decamer) against a feline lymphoblastoid cancer cell line. Cytotoxicity was also observed with higher oligomers (FIGS. 58 to 61) against normal canine and feline cell lines. In Example 8 (FIGS. 9D-H), the inventive compounds were shown to elicit cytotoxicity against a putative COX-2 expressing human colon cancer cell line (HCT 116). Example 9 describes the antioxidant activity by the inventive compounds. The compounds of the invention inhibit DNA strand breaks, DNA-protein cross-links and free radical oxidation of nucleotides to reduce and/or prevent the occurrence of mutations. Example 10 describes the inventive compounds as topoisomerase II inhibitors, which is a target for chemotherapeutic agents, such as doxorubicin. Example 21 describes the in vivo effects of a substantially pure pentamer which elicited anti-tumor activity against a human breast cancer cell line (MDA-MB-231/LCC6) in a nude mouse model (average weight of a mouse is approximately 25 g). Repeat in vivo experiments with the pentamer at higher dosages (5 mg) have not entirely been successful, due to unexpected animal toxicity. It is currently believed that this toxicity may be related to the vasodilation effects of the inventive compounds. Example 33 describes the effects of the inventive compounds on macrophage NO production. Macrophages which produce NO can inhibit the growth of rapidly dividing tumor cells. Still further, the invention includes the use of the inventive compounds to induce the inhibition of cellular proliferation by apoptosis. For anti-cancer activity, the inventive compounds are oligomers, where n is 2 to 18, e.g., 3 to 18, such as 3 to 12, and preferably, n is 5 to 12, and most preferably n is 5. Compounds which elicit the inhibitory activity with respect to cancer cited above include pentamers to dodecamers, discussed above. FORMULATIONS AND METHODS Therefore, collectively, the inventive compounds, combinations thereof and compositions comprising the same have exhibited a wide array of activities against several aspects of atherosclerosis, cardiovascular disease, cancer, blood pressure modulation and/or hypertension, inflammatory disease, infectious agents and food spoilage. Hence, the compounds of the invention, combinations thereof and compositions containing the same are COX inhibitors which affect platelet aggregation by inhibiting thromboxane A2 formation, thus reducing the risk for thrombosis. Further, the inhibition of COX leads to decreased platelet and inflammatory cell adhesion to vessel walls to allow for improved NO mechanisms of relaxation. These results, coupled with the inhibition of COX at concentrations similar to a known NSAID, indomethacin, indicates antithrombotic efficacy. Moreover, the compounds of the invention, combinations thereof and compositions containing the same are antioxidants which suppress the oxidation of LDL by reducing the levels of superoxide radical anion and lipoxygenase mediated lipid peroxy radicals. The inhibition of LDL oxidation at this stage slows macrophage activation and retards foam cell formation to interrupt further progression of atherosclerosis. The inhibition of LDL oxidation can also slow the progression of restenosis. Thus, compounds of the invention or combinations thereof or compositions containing compounds of the invention or combinations thereof can be used for prevention and/or treatment of atherosclerosis and/or restenosis. And thus, the inventive compounds can be administered before or after angioplasty or similar procedures to prevent or treat restenosis in patients susceptible thereto. For treatment or prevention of restenosis and/or atherosclerosis, an inventive compound or compounds or a composition comprising an inventive compound or compounds, alone or with other treatment, may be administered as desired by the skilled medical practitioner, from this disclosure and knowledge in the art, e.g., at the first signs or symptoms of restenosis and/or atherosclerosis, immediately prior to, concomitant with or after angioplasty, or as soon thereafter as desired by the skilled medical practitioner, without any undue experimentation required; and the administration of the inventive compound or compounds or a composition thereof, alone or with other treatment, may be continued as a regimen, e.g., monthly, bi-monthly, biannually, annually, or in some other regimen, by the skilled medical practitioner for such time as is necessary, without any undue experimentation required. Further, the compounds of the invention, combinations thereof and compositions comprising the same have been shown to produce a hypotensive effect in vivo and induce NO in vitro. These results have practical application in the treatment of hypertension and in clinical situations involving hypercholesterolemia, where NO levels are markedly reduced. Formulations of the inventive compounds, combinations thereof and compositions comprising the same can be prepared with standard techniques well known to those skilled in the pharmaceutical, food science, medical and veterinary arts, in the form of a liquid, suspension, tablet, capsule, injectable solution or suppository, for immediate or slow-release of the active compounds. The carrier may also be a polymeric delayed release system. Synthetic polymers are particularly useful in the formulation of a composition having controlled release. An early example of this was the polymerization of methyl methacrylate into spheres having diameters less than one micron to form so-called nano particles, reported by Kreuter, J., Microcapsules and Nanoparticles in Medicine and Pharmacology, M. Donbrow (Ed). CRC Press, p. 125-148. A frequent choice of a carrier for pharmaceuticals and more recently for antigens is poly (d,1-lactide-co-glycolide) (PLGA). This is a biodegradable polyester that has a long history of medical use in erodible sutures, bone plates and other temporary prostheses where it has not exhibited any toxicity. A wide variety of pharmaceuticals have been formulated into PLGA microcapsules. A body of data has accumulated on the adaption of PLGA for controlled, for example, as reviewed by Eldridge, J. H., et al. Current Topics in Microbiology and Immunology, 1989, 146:59-66. The entrapment in PLGA microspheres of 1 to 10 microns in diameter can have an effect when administered orally. The PLGA microencapsulation process uses a phase separation of a water-in-oil emulsion. The inventive compound or compounds is or are prepared as an aqueous solution and the PLGA is dissolved in a suitable organic solvents such as methylene chloride and ethyl acetate. These two immiscible solutions are co-emulsified by high-speed stirring. A non-solvent for the polymer is then added, causing precipitation of the polymer around the aqueous droplets to form embryonic microcapsules. The microcapsules are collected, and stabilized with one of an assortment of agents (polyvinyl alcohol (PVA), gelatin, alginates, methyl cellulose) and the solvent removed by either drying in vacuo or solvent extraction. Additionally, with regard to the preparation of slow-release formulations, reference is made to U.S. Pat. Nos. 5,024,843, 5,091,190, 5,082,668, 4,612,008 and 4,327,725, hereby incorporated herein by reference. Additionally, selective processing coupled with the identification of cocoa genotypes of interest could be used to prepare Standard-of-Identity (SOI) and non-SOI chocolate products as vehicles to deliver the active compounds to a patient in need of treatment for the disease conditions described above, as well as a means for the delivery of conserved levels of the inventive compounds. In this regard, reference is made to copending U.S. application Ser. No. 08/709,406, filed Sep. 6, 1996, hereby incorporated herein by reference. U.S. Ser. No. 08/709,406 relates to a method of producing cocoa butter and/or cocoa solids having conserved levels of polyphenols from cocoa beans using a unique combination of processing steps which does not require separate bean roasting or liquor milling equipment, allowing for the option of processing cocoa beans without exposure to severe thermal treatment for extended periods of time and/or the use of solvent extraction of fat. The benefit of this process lies in the enhanced conservation of polyphenols in contrast to that found in traditional cocoa processing, such that the ratio of the initial amount of polyphenol found in the unprocessed bean to that obtainable after processing is less than or equal to 2. Compositions of the invention include one or more of the above noted compounds in a formulation having a pharmaceutically acceptable carrier or excipient, the inventive compounds having anti-cancer, anti-tumor or antineoplastic activities, antioxidant activity, inhibit DNA topoisomeriase II enzyme, inhibit oxidative damage to DNA, induce monocyte/macrophage NO production, have antimicrobial, cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase, apoptosis, platelet aggregation and blood or in vivo glucose modulating activities, and have efficacy as non-steroidal antiinflammatory agents. Another embodiment of the invention includes compositions comprising the inventive compounds or combinations thereof, as well as at least one additional antineoplastic, blood pressure reducing, antiinflammatory, antimicrobial, antioxidant and hematopoiesis agents, in addition to a pharmaceutically acceptable carrier or excipient. Such compositions can be administered to a subject or patient in need of such administration in dosages and by techniques well known to those skilled in the medical, nutritional or veterinary arts taking into consideration the data herein, and such factors as the age, sex, weight, genetics and condition of the particular subject or patient, and the route of administration, relative concentration of particular oligomers, and toxicity (e.g., LD50). The compositions can be co-administered or sequentially administered with other antineoplastic, anti-tumor or anti-cancer agents, antioxidants, DNA topoisomerase II enzyme inhibiting agents, inhibitors of oxidatively damaged DNA or cyclo-oxygenase and/or lipoxygenase, apoptosis, platelet aggregation, blood or in vivo glucose or NO or NO-synthase modulating agents, non-steroidal antiinflammatory agents and/or with agents which reduce or alleviate ill effects of antineoplastic, anti-tumor, anti-cancer agents, antioxidants, DNA topoisomerase II enzyme inhibiting agents, inhibitors of oxidatively damaged DNA, cyclo-oxygenase and/or lipoxygenase, apoptosis, platelet aggregation, blood or in vivo glucose or NO or NO-synthase modulating and/or non-steroidal antiinflammatory agents; again, taking into consideration such factors as the age, sex, weight, genetics and condition of the particular subject or patient, and, the route of administration. Examples of compositions of the invention for human or veterinary use include edible compositions for oral administration, such solid or liquid formulations, for instance, capsules, tablets, pills and the like, as well as chewable solid or beverage formulations, to which the present invention may be well-suited since it is from an edible source (e.g., cocoa or chocolate flavored solid or liquid compositions); liquid preparations for orifice, e.g., oral, nasal, anal, vaginal etc., administration such as suspensions, syrups or elixirs (including cocoa or chocolate flavored compositions); and, preparations for parental, subcutaneous, intradermal, intramuscular or intravenous administration (e.g., injectable administration) such as sterile suspensions or emulsions. However, the active ingredient in the compositions may complex with proteins such that when administered into the bloodstream, clotting may occur due to precipitation of blood proteins; and, the skilled artisan should take this into account. In such compositions the active cocoa extract may be in admixture with a suitable carrier, diluent, or excipient such as sterile water, physiological saline, glucose, DMSO, ethanol, or the like. The active cocoa extract of the invention can be provided in lyophilized form for reconstituting, for instance, in isotonic aqueous, saline, glucose or DMSO buffer. In certain saline solutions, some precipitation has been observed; and, this observation may be employed as a means to isolate inventive compounds, e.g., by a “salting out” procedure. Example 38 describes the preparation of the inventive compounds in a tablet formulation for application in the pharmaceutical, supplement and food areas. Further, Example 39 describes the preparation of the inventive compounds in capsule formulations for similar applications. Still further, Example 40 describes the formulation of Standard of Identity (SOI) and non-SOI chocolates containing the compounds of the invention or cocoa solids obtained from methods described in copending U.S. application Ser. No. 08/709,406, hereby incorporated herein by reference. KITS Further, the invention also comprehends a kit wherein the active cocoa extract is provided. The kit can include a separate container containing a suitable carrier, diluent or excipient. The kit can also include an additional anti-cancer, anti-tumor or antineoplastic agent, antioxidant, DNA topoisomerase II enzyme inhibitor or an inhibitor of oxidative DNA damage or antimicrobial, or cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase non-steroidal antiinflammatory, apoptosis and platelet aggregation modulating or blood or in vivo glucose modulating agent and/or an agent which reduces or alleviates ill effects of antineoplastic, anti-tumor or anti-cancer agents, antioxidant, DNA topoisomerase II enzyme inhibitor or antimicrobial, or cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase, apoptosis, platelet aggregation and blood or in vivo glucose modulating and/or non-steroidal antiinflammatory agents for co- or sequential-administration. The additional agent(s) can be provided in separate container(s) or in admixture with the active cocoa extract. Additionally, the kit can include instructions for mixing or combining ingredients and/or administration. IDENTIFICATION OF GENES A further embodiment of the invention comprehends the modulation of genes expressed as a result of intimate cellular contact by the inventive compounds or a combination of compounds. As such, the present invention comprehends methods for the identification of genes induced or repressed by the inventive compounds or a combination of compounds which are associated with several diseases, including but not limited to atherosclerosis, hypertension, cancer, cardiovascular disease, and inflammation. Specifically, genes which are differentially expressed in these disease states, relative to their expression in “normal” nondisease states are identified and described before and after contact by the inventive compounds or a combination of compounds. As mentioned in the previous discussion, these diseases and disease states are based in part on free radical interactions with a diversity of biomolecules. A central theme in these diseases is that many of the free radical reactions involve reactive oxygen species, which in turn induce physiological conditions involved in disease progression. For instance, reactive oxygen species have been implicated in the regulation of transcription factors such as nuclear factor (NF)-κB. The target genes for NF-κB comprise a list of genes linked to coordinated inflammatory response. These include genes encoding tumor necrosis factor (TNF)-α, interleukin (IL)-I, IL-6, IL-8, inducible NOS, Major Histocompatabilty Complex (MHC) class I antigens, and others. Also, genes that modulate the activity of transcription factors may in turn be induced by oxidative stress. Oxidative stress is the imbalance between radical scavenging and radical generating systems. Several known examples (Winyard and Blake, 1997) of these conditions include gaddl53 (a gene induced by growth arrest and DNA damage), the product of which has been shown to bind NF-IL6 and form a heterodimer that cannot bind to DNA. NF-IL6 upregulates the expression of several genes, including those encoding interleukins 6 and 8. Another example of oxidative stress inducible genes are gadd45 which regulates the effects of the transcription factor p53 in growth arrest. p53 codes for the p53 protein which can halt cell division and induce abnormal cells (e.g. cancer) to undergo apoptosis. Given the full panoply of unexpected, nonobvious and novel utilities for the inventive compounds or combination of compounds for utility in a diverse array of diseases based in part by free radical mechanisms, the invention further comprehends strategies to determine the temporal effects on gene(s) or gene product(s) expression by the inventive compounds in animal in vitro and/or in vivo models of specific disease or disease states using gene expression assays. These assays include, but are not limited to Differential Display, sequencing of cDNA libraries, Serial Analysis of Gene Expression (SAGE), expression monitoring by hybridization to high density oligonucleotide arrays and various reverse transcriptase-polymerization chain reaction (RT-PCR) based protocols or their combinations (Lockhart et al., 1996). The comprehensive physiological effects of the inventive compounds or combination of compounds embodied in the invention, coupled to a genetic evaluation process permits the discovery of genes and gene products,. whether known or novel, induced or repressed. For instance, the invention comprehends the in vitro and in vivo induction and/or repression of cytokines (e.g. IL-1, IL-2, IL-6, IL-8, IL-12, and TNF-α) in lymphocytes using RT-PCR. Similarly, the invention comprehends the application of Differential Display to ascertain the induction and/or repression of select genes; for the cardiovascular area (e.g. superoxide dismutase, heme oxidase, COX 1 and 2, and other oxidant defense genes) under stimulated and/or oxidant stimulated conditions (e.g. TNF-α or H2O2) conditions. For the cancer area, the invention comprehends the application of Differential Display to ascertain the induction and/or repression of genes or gene products such as CuZn-superoxide dismutase, Mn-superoxide dismutase, catalase, etc., in control and oxidant stressed cells. The following non-limiting Examples are given by way of illustration only and are not to be considered a limitation of this invention, many apparent variations of which are possible without departing from the spirit or scope thereof. EXAMPLES Example 1 Cocoa Source and Method of Preparation Several Theobroma cacao genotypes which represent the three recognized horticultural races of cocoa (Enriquez, 1967; Engels, 1981) were obtained from the three major cocoa producing origins of the world. A list of those genotypes used in this study are shown in Table 1. Harvested cocoa pods were opened and the beans with pulp were removed for freeze drying. The pulp was manually removed from the freeze dried mass and the beans were subjected to analysis as follows. The unfermented, freeze dried cocoa beans were first manually dehulled, and ground to a fine powdery mass with a TEKMAR Mill. The resultant mass was then defatted overnight by Soxhlet extraction using redistilled hexane as the solvent. Residual solvent was removed from the defatted mass by vacuum at ambient temperature. TABLE 1 Description of Theobroma cacao Source Material GENOTYPE ORIGIN HORTICULTURAL RACE UIT-1 Malaysia Trinitario Unknown West Africa Forastero ICS-100 Brazil Trinitario (Nicaraguan Criollo ancestor) ICS-39 Brazil Trinitario (Nicaraguan Criollo ancestor) UF-613 Brazil Trinitario EEG-48 Brazil Forastero UF-12 Brazil Trinitario NA-33 Brazil Forastero Example 2 Procyanidin Extraction Procedures A. Method 1 Procyanidins were extracted from the defatted, unfermented, freeze dried cocoa beans of Example 1 using a modification of the method described by Jalal and Collin (1977). Procyanidins were extracted from 50 gram batches of the defatted cocoa mass with 2×400 mL 70% acetone/deionized water followed by 400 mL 70% methanol/deionized water. The extracts were pooled and the solvents removed by evaporation at 45° C. with a rotary evaporator held under partial vacuum. The resultant aqueous phase was diluted to 1L with deionized water and extracted 2× with 400 mL CHCl3. The solvent phase was discarded. The aqueous phase was then extracted 4× with 500 mL ethyl acetate. Any resultant emulsions were broken by centrifugation on a Sorvall RC 28S centrifuge operated at 2,000 ×g for 30 min. at 10° C. To the combined ethyl acetate extracts, 100-200 mL deionized water was added. The solvent was removed by evaporation at 45° C. with a rotary evaporator held under partial vacuum. The resultant aqueous phase was frozen in liquid N2 followed by freeze drying on a LABCONCO Freeze Dry System. The yields of crude procyanidins that were obtained from the different cocoa genotypes are listed in Table 2. TABLE 2 Crude Procyanidin Yields GENOTYPE ORIGIN YIELDS (g) UIT-1 Malaysia 3.81 Unknown West Africa 2.55 ICS-100 Brazil 3.42 ICS-39 Brazil 3.45 UF-613 Brazil 2.98 EEG-48 Brazil 3.15 UF-12 Brazil 1.21 NA-33 Brazil 2.23 B. Method 2 Alternatively, procyanidins are extracted from defatted, unfermented, freeze dried cocoa beans of Example 1 with 70% aqueous acetone. Ten grams of defatted material was slurried with 100 mL solvent for 5-10 min. The slurry was centrifuged for 15 min. at 4° C. at 3000 xg and the supernatant passed through glass wool. The filtrate was subjected to distillation under partial vacuum and the resultant aqueous phase frozen in liquid N2, followed by freeze drying on a LABCONCO Freeze Dry System. The yields of crude procyanidins ranged from 15-20%. Without wishing to be bound by any particular theory, it is believed that the differences in crude yields reflected variations encountered with different genotypes, geographical origin, horticultural race, and method of preparation. Example 3 Partial Purification of Cocoa Procyanidins A. Gel Permeation Chromatography Procyanidins obtained from Example 2 were partially purified by liquid chromatography on Sephadex LH-20 (28×2.5 cm). Separations were aided by a step gradient from deionized water into methanol. The initial gradient composition started with 15% methanol in deionized water which was followed step wise every 30 min. with 25% methanol in deionized water, 35% methanol in deionized water, 70% methanol in deionized water, and finally 100% methanol. The effluent following the elution of the xanthine alkaloids (caffeine and theobromine) was collected as a single fraction. The fraction yielded a xanthine alkaloid free subfraction which was submitted to further subfractionation to yield five subfractions designated MM2A through MM2E. The solvent was removed from each subfraction by evaporation at 45° C. with a rotary evaporator held under partial vacuum. The resultant aqueous phase was frozen in liquid N2 and freeze dried overnight on a LABCONCO Freeze Dry System. A representative gel permeation chromatogram showing the fractionation is shown in FIG. 1. Approximately, 100 mg of material was subfractionated in this manner. Chromatographic Conditions: Column; 28×2.5 cm Sephadex LH-20, Mobile Phase: Methanol/Water Step Gradient, 15:85, 25:75, 35:65, 70:30, 100:0 Stepped at ½ Hour Intervals, Flow Rate; 1.5 mL/min, Detector; UV at λ1=254 nm and λ2=365 nm, Chart Speed: 0.5 mm/min, Column Load; 120 mg. B. Semi-Preparative High Performance Liquid Chromatography (HPLC) Method 1. Reverse Phase Separation Procyanidins obtained from Example 2 and/or 3A were partially purified by semi-preparative HPLC. A Hewlett Packard 1050 HPLC System equipped with a variable wavelength detector, Rheodyne 7010 injection valve with 1 mL injection loop was assembled with a Pharmacia FRAC-100 Fraction Collector. Separations were effected on a Phenomenex Ultracarb™ 10μ ODS column (250×22.5 mm) connected with a Phenomenex 10μ ODS Ultracarb™ (60×10 mm) guard column. The mobile phase composition was A=water; B=methanol used under the following linear gradient conditions: [Time, % A]; (0,85), (60,50), (90,0), and (110,0) at a flow rate of 5 mL/min. Compounds were detected by UV at 254 nm A representative Semi-preparative HPLC trace is shown in FIG. 15N for the separation of procyanidins present in fraction D+E. Individual peaks or select chromatographic regions were collected on timed intervals or manually by fraction collection for further purification and subsequent evaluation. Injection loads ranged from 25-100 mg of material. Method 2. Normal Phase Separation Procyanidin extracts obtained from Examples 2 and/or 3A were partially purified by semi-preparative HPLC. A Hewlett Packard 1050 HPLC system, Millipore-Waters Model 480 LC detector set at 254 nm was assembled with a Pharmacia Frac-100 Fraction Collector set in peak mode. Separations were effected on a Supelco 5 μm Supelcosil LC-Si column (250×10 mm) connected with a Supelco 5 μm Supelguard LC-Si guard column (20×4.6 mm). Procyanidins were eluted by a linear gradient under the following conditions: (Time, % A, % B); (0,82,14), (30, 67.6, 28.4), (60, 46, 50), (65, 10, 86), (70, 10, 86) followed by a 10 min. re-equilibration. Mobile phase composition was A=dichloromethane; B=methanol; and C=acetic acid: water (1:1). A flow rate of 3 mL/min was used. Components were detected by UV at 254 nm, and recorded on a Kipp & Zonan BD41 recorder. Injection volumes ranged from 100-250 μL of lomg of procyanidin extracts dissolved in 0.25 mL 70% aqueous acetone. A representative semi-preparative HPLC trace is shown in FIG. 15O. Individual peaks or select chromatographic regions were collected on timed intervals or manually by fraction collection for further purification and subsequent evaluation. HPLC 250 × 10 mm Supelco Supelcosil LC-Si Conditions: (5μm) Semipreparative Column 20 × 4.6 mm Supelco Supelcosil LC-Si (5μm) Guard Column Detector: Waters LC Spectrophotometer Model 480 @ 254 nm Flow rate: 3 mL/min, Column Temperature: ambient, Injection: 250μL of 70% aqueous acetone extract. Gradient: Time Acetic (min) CH2Cl2 Methanol Acid:H20 (1:1) 0 82 14 4 30 67.6 28.4 4 60 46 50 4 65 10 86 4 70 10 86 4 The fractions obtained were as follows: FRACTION TYPE 1 dimers 2 trimers 3 tetramers 4 pentamers 5 hexamers 6 heptamers 7 octamers 8 nonamers 9 decamers 10 undecamers 11 dodecamers 12 higher oligomers Example 4 Analytical HPLC Analysis of Procyanidin Extracts Method 1. Reverse Phase Separation Procyanidin extracts obtained from Example 3 were filtered through a 0.45μ filter and analyzed by a Hewlett Packard 1090 ternary HPLC system equipped with a Diode Array detector and a HP model 1046A Programmable Fluorescence Detector. Separations were effected at 45° C. on a Hewlett-Packard 5μ Hypersil ODS column (200×2.1 mm). The flavanols and procyanidins were eluted with a linear gradient of 60% B into A followed by a column wash with B at a flow rate of 0.3 mL/min. The mobile phase composition was B =0.5% acetic acid in methanol and A=0.5% acetic acid in nanopure water. Acetic acid levels in A and B mobile phases can be increased to 2%. Components were detected by fluorescence, where λex=276 nm and λex=316 nm and by UV at 280 nm. Concentrations of (+)-catechin and (−)-epicatechin were determined relative to reference standard solutions. Procyanidin levels were estimated by using the response factor for (−)-epicatechin. A representative HPLC chromatogram showing the separation of the various components is shown in FIG. 2A for one cocoa genotype. Similar HPLC profiles were obtained from the other cocoa genotypes. HPLC Column: 200 × 2.1 mm Hewlett Packard Conditions: Hypersil ODS (5μ) Guard column: 20 × 2.1 mm Hewlett Packard Hypersil ODS (5μ) Detectors: Diode Array @ 280 nm Fluorescence λex = 276 nm; λem = 316 nm. Flow rate: 0.3 mL/min. Column Temperature: 45° C. Gradient: 0.5% Acetic Acid 0.5% Acetic acid Time (min) in nanopure water in methanol 0 100 0 50 40 60 60 0 100 Method 2. Normal Phase Separation Procyanidin extracts obtained from Examples 2 and/or 3 were filtered through a 0.45μ filter and analyzed by a Hewlett Packard 1090 Series II HPLC system equipped with a HP model 1046A Programmable Fluorescence detector and Diode Array detector. Separations were effected at 37° C. on a 5μ Phenomenex Lichrosphere® Silica 100 column (250×3.2 mm) connected to a Supelco Supelguard LC-Si 5μ guard column (20×4.6 mm). Procyanidins were eluted by linear gradient under the following conditions: (Time, % A, % B); (0, 82, 14), (30, 67.6, 28.4), (60, 46, 50), (65, 10, 86), (70, 10, 86) followed by an 8 min. re-equilibration. Mobile phase composition was A=dichloromethane, B=methanol, and C=acetic acid: water at a volume ratio of 1:1. A flow rate of 0.5 mL/min. was used. Components were detected by fluorescence, where λex=276 nm and λem=316 nm or by UV at 280 nm. A representative HPLC chromatogram showing the separation of the various procyanidins is shown in FIG. 2B for one genotype. Similar HPLC profiles were obtained from other cocoa genotypes. HPLC 250 × 3.2 mm Phenomenex Lichrosphere ® Silica 100 Conditions: column (5μ) 20 × 4.6 mm Supelco Supelguard LC-Si (5μ) guard column Detectors: Photodiode Array @ 280 nm Fluorescence λex = 276 nm; λem = 316 nm. Flow rate: 0.5 mL/min. Column Temperature: 37° C. Gradient: Acetic Time Acid/Water (min.) CH2—Cl2 Methanol (1:1) 0 82 14 4 30 67.6 28.4 4 60 46 50 4 65 10 86 4 70 10 86 4 Example 5 Identification of Procyanidins Procyanidins were purified by liquid chromatography on Sephadex LH-20 (28×2.5 cm) columns followed by semi-preparative HPLC using a 10μ Bondapak C18 (100×8 mm) column or by semi-preparative HPLC using a 5μ Supelcosil LC-Si (250×10 mm) column. Partially purified isolates were analyzed by Fast Atom Bombardment—Mass Spectrometry (FAB-MS) on a VG ZAB-T high resolution MS system using a Liquid Secondary Ion Mass Spectrometry (LSIMS) technique in positive and negative ion modes. A cesium ion gun was used as the ionizing source at 30 kV and a “Magic Bullet Matrix” (1:1 dithiothreitol/dithioerythritol) was used as the proton donor. Analytical investigations of these fractions by L'SIMS revealed the presence of a number of flavan-3-ol oligomers as shown in Table TABLE 3 LSIMS (Positive Ion) Data from Cocoa Procyanidin Fractions (M + 1)+ (M + Na)+ Oligomer m/z m/z Mol. Wt. Monomers 291 313 290 (catechins) Dimer(s) 577/579 599/601 576/578 Trimer(s) 865/867 887/889 864/866 Tetramer(s) 1155 1177 1154 Pentamer(s) 1443 1465 1442 Hexamer(s) 1731 1753 1730 Heptamer(s) — 2041 2018 Octamer(s) — 2329 2306 Nonamer(s) — 2617 2594 Decamer(s) — 2905 2882 Undecamer(s) — — 3170 Dodecamer(s) — — 3458 The major mass fragment ions were consistent with work previously reported for both positive and negative ion FAB-MS analysis of procyanidins (Self et al., 1986 and Porter et al., 1991). The ion corresponding to m/z 577 (M+H)+ and its sodium adduct at m/z 599 (M+Na)+ suggested the presence of doubly linked procyanidin dimers in the isolates. It was interesting to note that the higher oligomers were more likely to form sodium adducts (M+Na)+ than their protonated molecular ions (M+H)+. The procyanidin isomers B-2, B-5 and C-1 were tentatively identified based on the work reported by Revilla et al. (1991), Self et al. (1986) and Porter et al. (1991). Procyanidins up to both the octamer and decamer were verified by FAB-MS in the partially purified fractions. Additionally, evidence for procyanidins up to the dodecamer were observed from normal phase HPLC analysis (see FIG. 2B). Table 4 lists the relative concentrations of the procyanidins found in xanthine alkaloid free isolates based on reverse phase HPLC analysis. Table 5 lists the relative concentrations of the procyanidins based on normal phase HPLC analysis. TABLE 4 Relative Concentrations of Procyanidins in the Xanthine Alkaloid Free Isolates Component Amount (+)-catechin 1.6% (−)-epicatechin 38.2% B-2 Dimer 11.0% B-5 Dimer 5.3% C-1 Trimer 9.3% Doubly linked 3.0% dimers Tetramer(s) 4.5% Pentamer-Octamer 24.5% Unknowns and 2.6% higher oligomers TABLE 5 Relative Concentrations of Procyanidins in Aqueous Acetone Extracts Component Amount (+)-catechin and 41.9% (−)-epicatechin B-2 and B-5 Dimers 13.9% Trimers 11.3% Tetramers 9.9% Pentamers 7.8% Hexamers 5.1% Heptamers 4.2% Octamers 2.8% Nonamers 1.6% Decamers 0.7% Undecamers 0.2% Dodecamers <0.1% FIG. 3 shows several procyanidin structures and FIGS. 4A-4E show the representative HPLC chromatograms of the five fractions employed in the following screening for anti-cancer or antineoplastic activity. The HPLC conditions for FIGS. 4A-4E were as follows: HPLC Conditions: Hewlett Packard 1090 ternary HPLC System equipped with HP Model 1046A Programmable Fluorescence Detector. Column: Hewlett Packard 5β Hypersil ODS (200×2.1 mm) Linear Gradient of 60% B into A at a flow rate of 0.3 mL/min. B=0.5% acetic acid in methanol; A=0.5% acetic acid in deionized water. λex=280 nm; λem=316 nm. FIG. 15O shows a representative semi-prep HPLC chromatogram of an additional 12 fractions employed in the screening for anticancer or antineoplastic activity (HPLC conditions stated above). Example 6 Anti-Cancer, Anti-Tumor or Antineoplastic Activity of Cocoa Extracts (Procyanidins) The MTT (3-[4,5-dimethyl thiazol-2yl]-2,5-diphenyltetrazolium bromide)—microtiter plate tetrazolium cytotoxicity assay originally developed by Mosmann (1983) was used to screen test samples from Example 5. Test samples, standards (cisplatin and chlorambucil) and MTT reagent were dissolved in 100% DMSO (dimethyl sulfoxide) at a 10 mg/mL concentration. Serial dilutions were prepared from the stock solutions. In the case of the test samples, dilutions ranging from 0.01 through 100 μg/mL were prepared in 0.5% DMSO. All human tumor cell lines were obtained from the American Type Culture Collection. Cells were grown as mono layers in alpha-MEM containing 10% fetal bovine serum, 100 units/mL penicillin, 100 μg/mL streptomycin and 240 units/mL nystatin. The cells were maintained in a humidified, 5% CO2 atmosphere at 37° C. After trypsinization, the cells are counted and adjusted to a concentration of 50×105 cells/mL (varied according to cancer cell line). 200 μL of the cell suspension was plated into wells of 4 rows of a 96-well microtiter plate. After the cells were allowed to attach for four hours, 2 μL of DMSO containing test sample solutions were added to quadruplicate wells. Initial dose-response finding experiments, using order of magnitude test sample dilutions were used to determine the range of doses to be examined. Well absorbencies at 540 nm were then measured on a BIO RAD MP450 plate reader. The mean absorbance of quadruplicate test sample treated wells was compared to the control, and the results expressed as the percentage of control absorbance plus/minus the standard deviation. The reduction of MTT to a purple formazan product correlates in a linear manner with the number of living cells in the well. Thus, by measuring the absorbance of the reduction product, a quantitation of the percent of cell survival at a given dose of test sample can be obtained. Control wells contained a final concentration of 1% DMSO. Two of the samples were first tested by this protocol. Sample MM1 represented a very crude isolate of cocoa procyanidins and contained appreciable quantities of caffeine and theobromine. Sample MM2 represented a cocoa procyanidin isolate partially purified by gel permeation chromatography. Caffeine and theobromine were absent in MM2. Both samples were screened for activity against the following cancer cell lines using the procedures previously described: HCT 116 colon cancer ACHN renal adenocarcinoma SK-5 melanoma A498 renal adenocarcinoma MCF-7 breast cancer PC-3 prostate cancer CAPAN-2 pancreatic cancer Little or no activity was observed with MM1 on any of the cancer cell lines investigated. MM2 was found to have activity against HCT-116, PC-3 and ACHN cancer cell lines. However, both MM1 and MM2 were found to interfere with MTT such that it obscured the decrease in absorbance that would have reflected a decrease in viable cell number. This interference also contributed to large error bars, because the chemical reaction appeared to go more quickly in the wells along the perimeter of the plate. A typical example of these effects is shown in FIG. 5. At the high concentrations of test material, one would have expected to observe a large decrease in survivors rather than the high survivor levels shown. Nevertheless, microscopic examinations revealed that cytotoxic effects occurred, despite the MTT interference effects. For instance, an IC50 value of 0.5 μg/mL for the effect of MM2 on the ACHN cell line was obtained in this manner. These preliminary results, in the inventors' view, required amendment of the assay procedures to preclude the interference with MTT. This was accomplished as follows. After incubation of the plates at 37° C. in a humidified, 5% CO2 atmosphere for 18 hours, the medium was carefully aspirated and replaced with fresh alpha-MEM media. This media was again aspirated from the wells on the third day of the assay and replaced with 100 μL of freshly prepared McCoy's medium. 11 μL of a 5 mg/mL stock solution of MTT in PBS (Phosphate Buffered Saline) were then added to the wells of each plate. After incubation for 4 hours in a humidified, 5% CO2 atmosphere at 37° C., 100 μL of 0.04 N HCl in isopropanol was added to all wells of the plate, followed by thorough mixing to solubilize the formazan produced by any viable cells. Additionally, it was decided to subfractionate the procyanidins to determine the specific components responsible for activity. The subfractionation procedures previously described were used to prepare samples for further screening. Five fractions representing the areas shown in FIG. 1 and component(s) distribution shown in FIGS. 4A-4E were prepared. The samples were coded MM2A through MM2E to reflect these analytical characterizations and to designate the absence of caffeine and theobromine. Each fraction was individually screened against the HCT-116, PC-3 and ACHN cancer cell lines. The results indicated that the activity did not concentrate to any one specific fraction. This type of result was not considered unusual, since the components in “active” natural product isolates can behave synergistically. In the case of the cocoa procyanidin isolate (MM2), over twenty detectable components comprised the isolate. It was considered possible that the activity was related to a combination of components present in the different fractions, rather than the activity being related to an individual component(s). On the basis of these results, it was decided to combine the fractions and repeat the assays against the same cancer cell lines. Several fraction combinations produced cytotoxic effects against the PC-3 cancer cell lines. Specifically, IC50 values of 40 μg/mL each for MM2A and MM2E combination, and of 20 μg/mL each for MM2C and MM2E combination, were obtained. Activity was also reported against the HCT-116 and ACHN cell lines, but as before, interference with the MTT indicator precluded precise observations. Replicate experiments were repeatedly performed on the HCT-116 and ACHN lines to improve the data. However, these results were inconclusive due to bacterial contamination and exhaustion of the test sample material. FIGS. 6A-6D show the dose-response relationship between combinations of the cocoa extracts and PC-3 cancer cells. Nonetheless, from this data, it is clear that cocoa extracts, especially cocoa polyphenols or procyanidins, have significant anti-tumor; anti-cancer or antineoplastic activity, especially with respect to human PC-3 (prostate), HCT-116 (colon) and ACHN (renal) cancer cell lines. In addition, those results suggest that specific procyanidin fractions may be responsible for the activity against the PC-3 cell line. Example 7 Anti-Cancer, Anti-Tumor or Antineoplastic Activity of Cocoa Extracts (Procyanidins) To confirm the above findings and further study fraction combinations, another comprehensive screening was performed. All prepared materials and procedures were identical to those reported above, except that the standard 4-replicates per test dose was increased to 8 or 12-replicates per test dose. For this study, individual and combinations of five cocoa procyanidin fractions were screened against the following cancer cell lines. PC-3 Prostate KB Nasopharyngeal/HeLa HCT-116 Colon ACHN Renal MCF-7 Breast SK-5 Melanoma A-549 Lung CCRF-CEM T-cell leukemia Individual screenings consisted of assaying different dose levels (0.01-100 μg/mL) of fractions A, B, C, D, and E (See FIGS. 4A-4E and discussion thereof, supra) against each cell line. Combination screenings consisted of combining equal dose levels of fractions A+B, A+C, A+D, A+E, B+C, B+D, B+E, C+D, C+E, and D+E against each cell line. The results from these assays are individually discussed, followed by an overall summary. A. PC-3 Prostate Cell Line FIGS. 7A-7H show the typical dose response relationship between cocoa procyanidin fractions and the PC-3 cell line. FIGS. 7D and 7E demonstrate that fractions D and E were active at an IC50 value of 75 μg/mL. The IC50 values that were obtained from dose-response curves of the other procyanidin fraction combinations ranged between 60-80 μg/mL when fractions D or E were present. The individual IC50 values are listed in Table 6. B. KB Nasopharyngeal/HeLa Cell Line FIGS. 8A-8H show the typical dose response relationship between cocoa procyanidin fractions and the KB Nasopharyngeal/HeLa cell line. FIGS. 8D and 8E demonstrate that fractions D and E were active at an IC50 value of 75 μg/mL. FIGS. 8F-8H depict representative results obtained from the fraction combination study. In this case, procyanidin fraction combination A+B had no effect, whereas fraction combinations B+E and D+E were active at an IC50 value of 60 μg/mL. The IC50 values that were obtained from other dose response curves from other fraction combinations ranged from 60-80 μg/mL when fractions D or E were present. The individual IC50 values are listed in Table 6. These results were essentially the same as those obtained against the PC-3 cell line. C. HCT-116 Colon Cell Line FIG. 9A-9H show the typical dose response relationships between cocoa procyanidin fractions and the HCT-116 colon cell line. FIGS. 9D and 9E demonstrate that fraction E was active at an IC50 value of approximately 400 μg/mL. This value was obtained by extrapolation of the existing curve. Note that the slope of the dose response curve for fraction D also indicated activity. However, no IC50 value was determined from this plot, since the slope of the curve was too shallow to obtain a reliable value. FIGS. 9F-9H depict representative results obtained from the fraction combination study. In this case, procyanidin fraction combination B+D did not show appreciable activity, whereas fraction combinations A+E and D+E were active at IC50 values of 500 μg/mL and 85 μg/mL, respectively. The IC50 values that were obtained from dose response curves of other fraction combinations averaged about 250 μg/mL when fraction E was present. The extrapolated IC50 values are listed in Table 6. D. ACHN Renal Cell Line FIG. 10A-10H show the typical dose response relationships between cocoa procyanidin fractions and the ACHN renal cell line. FIGS. 10A-10E indicated that no individual fraction was active against this cell line. FIGS. 10F-10H depict representative results obtained from the fraction combination study. In this case, procyanidin fraction combination B+C was inactive, whereas the fraction combination A+E resulted in an extrapolated IC50 value of approximately 500 μg/mL. Dose response curves similar to the C+D combination were considered inactive, since their slopes were too shallow. Extrapolated IC50 values for other fraction combinations are listed in Table 6. E. A-549 Lung Cell Line FIGS. 11A-11H show the typical dose response relationships between cocoa procyanidin fractions and the A-549 lung cell line. No activity could be detected from any individual fraction or combination of fractions at the doses used in the assay. However, procyanidin fractions may nonetheless have utility with respect to this cell line. F. SK-5 Melanoma Cell Line FIG. 12A-12H show the typical dose response relationships between cocoa procyanidin fractions and the SK-5 melanoma cell line. No activity could be detected from any individual fraction or combination of fractions at the doses used in the assay. However, procyanidin fractions may nonetheless have utility with respect to this cell line. G. MCF-7 Breast Cell Line FIGS. 13A-13H show the typical dose response relationships between cocoa procyanidin fractions and the MCF-7 breast cell line. No activity could be detected from any individual fraction or combination of fractions at the doses used in the assay. However, procyanidin fractions may nonetheless have utility with respect to this cell line. H. CCRF-CEM T-Cell Leukemia Line A typical dose response curves were originally obtained against the CCRF-CEM T-cell leukemia line. However, microscopic counts of cell number versus time at different fraction concentrations indicated that 500 μg of fractions A, B and D effected an 80% growth reduction over a four day period. A representative dose response relationship is shown in FIG. 14. I. Summary The IC50 values obtained from these assays are collectively listed in Table 6 for all the cell lines except for CCRF-CEM T-cell leukemia. The T-cell leukemia data was intentionally omitted from the Table, since a different assay procedure was used. A general summary of these results indicated that the most activity was associated with fractions D and E. These fractions were most active against the PC-3 (prostate) and KB (nasopharyngeal/HeLa) cell lines. These fractions also evidenced activity against the HCT-116 (colon) and ACHN (renal) cell lines, albeit but only at much higher doses. No activity was detected against the MCF-7 (breast), SK-5 (melanoma) and A-549 (lung) cell lines. However, procyanidin fractions may nonetheless have utility with respect to these cell lines. Activity was also shown against the CCRF-CEM (T-cell leukemia) cell line. It should also be noted that fractions D and E are the most complex compositionally. Nonetheless, from this data it is clear that cocoa extracts, especially cocoa procyanidins, have significant anti-tumor, anti-cancer or antineoplastic activity. TABLE 6 IC50 Values for Cocoa Procyanidin Fractions Against Various Cell Lines FRAC- (IC50 values in μg/mL) TION PC-3 KB HCT-116 ACHN MCF-7 SK-5 A-549 A B C D 90 80 E 75 75 400 A + B A + C 125 100 A + D 75 75 A + E 80 75 500 500 B + C B + D 75 80 B + E 60 65 200 C + D 80 75 1000 C + E 80 70 250 D + E 80 60 85 Values above 100 μg/mL were extrapolated from dose response curves Example 8 Anti-Cancer, Anti-Tumor or Antineoplastic Activity of Cocoa Extracts (Procyanidins) Several additional in vitro assay procedures were used to complement and extend the results presented in Examples 6 and 7. Method A. Crystal Violet Staining Assay All human tumor cell lines were obtained from the American Type Culture Collection. Cells were grown as monolayers in IMEM containing 10% fetal bovine serum without antibiotics. The cells were maintained in a humidified, 5% CO2 atmosphere at 37° C. After trypsinization, the cells were counted and adjusted to a concentration of 1,000-2,000 cells per 100 mL. Cell proliferation was determined by plating the cells (1,000-2,000 cells/well) in a 96 well microtiter plate. After addition of 100 μL cells per well, the cells were allowed to attach for 24 hours. At the end of the 24 hour period, various cocoa fractions were added at different concentrations to obtain dose response results. The cocoa fractions were dissolved in media at a 2 fold concentration and 100 μL of each solution was added in triplicate wells. On consecutive days, the plates were stained with 50 μL crystal violet (2.5 g crystal violet dissolved in 125 mL methanol, 375 mL water), for 15 min. The stain was removed and the plate was gently immersed into cold water to remove excess stain. The washings were repeated two more times, and the plates allowed to dry. The remaining stain was solubilized by adding 100 μL of 0.1M sodium citrate/50% ethanol to each well. After solubilization, the number of cells were quantitated on an ELISA plate reader at 540 nm (reference filter at 410 nm). The results from the ELISA reader were graphed with absorbance on the y-axis and days growth on the x-axis. Method B. Soft Agar Cloning Assay Cells were cloned in soft agar according to the method described by Nawata. et al. (1981). Single cell suspensions were made in media containing 0.8% agar with various concentrations of cocoa fractions. The suspensions were aliquoted into 35 mm dishes coated with media containing 1.0% agar. After 10 days incubation, the number of colonies greater than 60 μm in diameter were determined on an Ominicron 3600 Image Analysis System. The results were plotted with number of colonies on the y-axis and the concentrations of a cocoa fraction on the x-axis. Method C. XTT-Microculture Tetrazolium Assay The XTT assay procedure described by Scudiero et al. (1988) was used to screen various cocoa fractions. The XTT assay was essentially the same as that described using the MTT procedure (Example 6) except for the following modifications. XTT ((2,3-bis(2-methoxy-4-nitro-5-sulfophenyl)-5-((phenylamino)carbonyl)-2H-tetrazolium hydroxide) was prepared at 1 mg/mL medium without serum, prewarmed to 37° C. PMS was prepared at 5 mM PBS. XTT and PMS were mixed together; 10 μL of PMS per mL XTT and 50 μL PMS-XTT were added to each well. After an incubation at 37° C. for 4 hr, the plates were mixed 30 min. on a mechanical shaker.and the absorbance measured at 450-600 nm. The results were plotted with the absorbance on the y-axis and days growth or concentration on the x-axis. For methods A and C, the results were also plotted as the percent control as the y-axis and days growth or concentration on the x-axis. A comparison of the XTT and Crystal Violet Assay procedures was made with cocoa fraction D & E (Example 3B) against the breast cancer cell line MCF-7 p168 to determine which assay was most sensitive. As shown in FIG. 15A, both assays showed the same dose-response effects for concentrations >75 μg/mL. At concentrations below this value, the crystal violet assay showed higher standard deviations than the XTT assay results. However, since the crystal violet assay was easier to use, all subsequent assays, unless otherwise specified, were performed by this procedure. Crystal violet assay results are presented (FIGS. 15B-15E) to demonstrate the effect of a crude polyphenol extract (Example 2) on the breast cancer cell line MDA MB231, prostate cancer cell line PC-3, breast cancer cell line MCF-7 p163, and cervical cancer cell line Hela, respectively. In all cases a dose of 250 μg/mL completely inhibited all cancer cell growth over a period of 5-7 days. The Hela cell line appeared to be more sensitive to the extract, since a 100 μg/mL dose also inhibited growth. Cocoa fractions from Example 3B were also assayed against Hela and another breast cancer cell line SKBR-3. The results (FIGS. 15F and 15G) showed that fraction D & E has the highest activity. As shown in FIGS. 15H and 15I, IC50 values of about 40 μg/mL D & E were obtained from both cancer cell lines. The cocoa fraction D & E was also tested in the soft agar cloning assay which determines the ability of a test compound(s) to inhibit anchorage independent growth. As shown in FIG. 15J, a concentration of 100 μg/mL completely inhibited colony formation of Hela cells. Crude polyphenol extracts obtained from eight different cocoa genotypes representing the three horticultural races of cocoa were also assayed against the Hela cell line. As shown in FIG. 15K all cocoa varieties showed similar dose-response effects. The UIT-1 variety exhibited the most activity against the Hela cell line. These results demonstrated that all cocoa genotypes possess a polyphenol fraction that elicits activity against at least one human cancer cell line that is independent of geographical origin, horticultural race, and genotype. Another series of assays were performed on crude polyphenol extracts prepared on a daily basis from a one ton scale traditional 5-day fermentation of Brazilian cocoa beans, followed by a 4-day sun drying stage. The results shown in FIG. 15L showed no obvious effect of these early processing stages, suggesting little change in the composition of the polyphenols. However, it is known (Lehrian and Patterson, 1983) that polyphenol oxidase (PPO) will oxidize polyphenols during the fermentation stage. To determine what effect enzymatically oxidized polyphenols would have on activity, another experiment was performed. Crude PPO was prepared by extracting finely ground, unfermented, freeze dried, defatted Brazilian cocoa beans with acetone at a ratio of lgm powder to 10 mL acetone. The slurry was centrifuged at 3,000 rpm for 15 min. This was repeated three times, discarding the supernatant each time with the fourth extraction being poured through a Buchner filtering funnel. The acetone powder was allowed to air dry, followed by assay according to the procedures described by McLord and Kilara, (1983). To a solution of crude polyphenols (100 mg/10 mL Citrate-Phosphate buffer, 0.02M, pH 5.5) 100 mg of acetone powder (4,000 units activity/mg protein) was added and allowed to stir for 30 min. with a stream of air bubbled through the slurry. The sample was centrifuged at 5,000xg for 15 min. and the supernatant extracted 3× with 20 mL ethyl acetate. The ethyl acetate extracts were combined, taken to dryness by distillation under partial vacuum and 5 mL water added, followed. by lyophilization. The material was then assayed against Hela cells and the dose-response compared to crude polyphenol extracts that were not enzymatically treated. The results (FIG. 15M) showed a significant shift in the dose-response curve for the enzymatically oxidized extract, showing that the oxidized products were more inhibitory than their native forms. Example 9 Antioxidant Activity of Cocoa Extracts Containing Procyanidins Evidence in the literature suggests a relationship between the consumption of naturally occurring antioxidants (Vitamins C, E and Beta-carotene) and a lowered incidence of disease, including cancer (Designing Foods, 1993; Caragay, 1992). It is generally thought that these antioxidants affect certain oxidative and free radical processes involved with some types of tumor prqmotion. Additionally, some plant polyphenolic compounds that have been shown to be anticarcinogenic, also possess substantial antioxidant activity (Ho et al., 1992; Huang et al., 1992). To determine whether cocoa extracts containing procyanidins possessed antioxidant properties, a standard Rancimat method was employed. The procedures described in Examples 1, 2 and 3 were used to prepare cocoa extracts which were manipulated further to produce two fractions from gel permeation chromatography. These two fractions are actually combined fractions A through C, and D and E (See FIG. 1) whose antioxidant properties were compared against the synthetic antioxidants BHA and BHT. Peanut Oil was pressed from unroasted peanuts after the skins were removed. Each test compound was spiked into the oil at two levels, ˜100 ppm and ˜20 ppm, with the actual levels given in Table 7. 50 μL of methanol solubilized antioxidant was added to each sample to aid in dispersion of the antioxidant. A control sample was prepared with 50 μL of methanol containing no antioxidant. The samples were evaluated in duplicate, for oxidative stability using the Rancimat stability test at 100° C. and 20 cc/min of air. Experimental parameters were chosen to match those used with the Active Oxygen Method (AOM) or Swift Stability Test (Van Oosten et al., 1981). A typical Rancimat trace is shown in FIG. 16. Results are reported in Table 8 as hours required to reach a peroxide level of 100 meq. TABLE 7 Concentrations of Antioxidants LEVEL 1 LEVEL 2 SAMPLE ppm Butylated Hydroxytoluene 24 120 (BHT) Butylated Hydroxyanisole 24 120 (BHA) Crude Ethyl Acetate Fraction 22 110 of Cocoa Fraction A-C 20 100 Fraction D-E 20 100 TABLE 8 Oxidative Stability of Peanut Oil with Various Antioxidants 20 ppm 100 ppm SAMPLE average Control 10.5 ± 0.7 BHT 16.5 ± 2.1 12.5 ± 2.1 BHA 13.5 ± 2.1 14.0 ± 1.4 Crude Cocoa Fraction 18.0 ± 0.0 19.0 ± 1.4 Fraction A-C 16.0 ± 6.4 17.5 ± 0.0 Fraction D-E 14.0 ± 1.4 12.5 ± 0.7 These results demonstrated increased oxidative stability of peanut oil with all of the additives tested. The highest increase in oxidative stability was realized by the sample spiked with the crude ethyl acetate extract of cocoa. These results demonstrated that cocoa extracts containing procyanidins have antioxidant potential equal to or greater than equal amounts of synthetic BHA and BHT. Accordingly, the invention may be employed in place of BHT or BHA in known utilities of BHA or BHT, for instance as an antioxidant and/or food additive. And, in this regard, it is noted too that the invention is from an edible source. Given these results, the skilled artisan can also readily determine a suitable amount of the invention to employ in such “BHA or BHT” utilities, e.g., the quantity to add to food, without undue experimentation. Example 10 Topoisomerase II Inhibition Study DNA topoisomerase I and II are enzymes that catalyze the breaking and rejoining of DNA strands, thereby controlling the topological states of DNA (Wang, 1985). In addition to the study of the intracellular function of topoisomerase, one of the most significant findings has been the identification of topoisomerase II as the primary cellular target for a number of clinically important antitumor compounds (Yamashita et al., 1990) which include intercalating agents (m-AMSA, Adriamycin® and ellipticine) as well as nonintercalating epipodophyllotoxins. Several lines of evidence indicate that some antitumor drugs have the common property of stabilizing the DNA—topoisomerase II complex (“cleavable complex”) which upon exposure to denaturing agents results in the induction of DNA cleavage (Muller et al., 1989). It has been suggested that the cleavable complex formation by antitumor drugs produces bulky DNA adducts that can lead to cell death. According to this attractive model, a specific new inducer of DNA topoisomerase II cleavable complex is useful as an anti-cancer, anti-tumor or antineoplastic agent. In an attempt to identify cytotoxic compounds with activities that target DNA, the cocoa procyanidins were screened for enhanced cytotoxic activity against several DNA—damage sensitive cell lines and enzyme assay with human topoisomerase II obtained from lymphoma. A. Decatenation of Kinetoplast DNA by Topoisomerase II The in vitro inhibition of topoisomerase II decatenation of kinetoplast DNA, as described by Muller et al. (1989), was performed as follows. Nuclear extracts containing topoisomerase II activity were prepared from human lymphoma by modifications of the methods of Miller et al. (1981) and Danks et al. (1988). One unit of purified enzyme was enough to decatenate 0.25 μg of kinetoplast DNA in 30 min. at 34° C. Kinetoplast DNA was obtained from the trypanosome Crithidia fasciculata. Each reaction was carried out in a 0.5 mL microcentrifuge tube containing 19.5 μL H20, 2.5 μL 10× buffer (1× buffer contains 50 mM tris-HCl, pH 8.0, 120 mM KCl, 10 mM MgCl2, 0.5 mM ATP, 0.5 mM dithiothreitol and 30 μg BSA/mL), 1 μL kinetoplast DNA (0.2 μg), and 1 μL DMSO-containing cocoa procyanidin test fractions at various concentrations. This combination was mixed thoroughly and kept on ice. One unit of topoisomerase was added immediately before incubation in a waterbath at 34° C. for 30 min. Following incubation, the decatenation assay was stopped by the addition of 5 μL stop buffer (5% sarkosyl, 0.0025% bromophenol blue, 25% glycerol) and placed on ice. DNA was electrophoresed on a 1% agarose gel in TAE buffer containing ethidium bromide (0.5 μg/mL). Ultraviolet illumination at 310 nm wavelength allowed the visualization of DNA. The gels were photographed using a Polaroid Land camera. FIG. 17 shows the results of these experiments. Fully catenated kinetoplast DNA does not migrate into a 1% agarose gel. Decatenation of kinetoplast DNA by topoisomerase II generates bands of monomeric DNA (monomer circle, forms I and II) which do migrate into the gel. Inhibition of the enzyme by addition of cocoa procyanidins is apparent by the progressive disappearance of the monomer bands as a function of increasing concentration. Based on these results, cocoa procyanidin fractions A, B, D, and E were shown to inhibit topoisomerase II at concentrations ranging from 0.5 to 5.0 μg/mL. These inhibitor concentrations were very similar to those obtained for mitoxanthrone and m-AMSA (4′-(9-acridinylamino)methanesulfon-m-anisidide). B. Drug Sensitive Cell Lines Cocoa procyanidins were screened for cytotoxicity against several DNA-damage sensitive cell lines. One of the cell lines was the xrs-6 DNA double strand break repair mutant developed by P. Jeggo (Kemp et al., 1984). The DNA repair deficiency of the xrs-6 cell line renders them particularly sensitive to x-irradiation, to compounds that produce DNA double strand breaks directly, such as bleomycin, and to compounds that inhibit topoisomerase II, and thus may indirectly induce double strand breaks as suggested by Warters et al. (1991). The cytotoxicity toward the repair deficient line was compared to the cytotoxicity against a DNA repair proficient CHO line, BR1. Enhanced cytotoxicity towards the repair deficient (xrs-6) line was interpreted as evidence for DNA cleavable double strand break formation. The DNA repair competent CHO line, BR1, was developed by Barrows et al. (1987) and expresses 06-alkylguanine—DNA—alkyltransferase in addition to normal CHO DNA repair enzymes. The CHO double strand break repair deficient line (xrs-6) was a generous gift from Dr. P. Jeggo and co-workers (Jeggo et al., 1989). Both of these lines were grown as monolayers in alpha-MEM containing serum and antibiotics as described in Example 6. Cells were maintained at 37° C. in a humidified 5% CO2 atmosphere. Before treatment with cocoa procyanidins, cells grown as monolayers were detached with trypsin treatment. Assays were performed using the MTT assay procedure described in Example 6. The results (FIG. 18) indicated no enhanced cytotoxicity towards the xrs-6 cells suggesting that the cocoa procyanidins inhibited topoisomerase II in a manner different from cleavable double strand break formation. That is, the cocoa procyanidins interact with topoisomerase II before it has interacted with the DNA to form a noncleavable complex. Noncleavable complex forming compounds are relatively new discoveries. Members of the anthracyclines, podophyllin alkaloids, anthracenediones, acridines, and ellipticines are all approved for clinical anti-cancer, anti-tumor or antineoplastic use, and they produce cleavable complexes (Liu, 1989). Several new classes of topoisomerase II inhibitors have recently been identified which do not appear to produce cleavable complexes. These include amonafide (Hsiang et al., 1989), distamycin (Fesen et al., 1989), flavanoids (Yamashita et al., 1990), saintopin (Yamashita et al., 1991), membranone (Drake et al., 1989), terpenoids (Kawada et al., 1991), anthrapyrazoles (Fry et al., 1985), dioxopiperazines (Tanabe et al., 1991), and the marine acridine—dercitin (Burres et al., 1989). Since the cocoa procyanidins inactivate topoisomerase II before cleavable complexes are formed, they have chemotherapy value either alone or in combination with other known and mechanistically defined topoisomerase II inhibitors. Additionally, cocoa procyanidins also appear to be a novel class of topoisomerase II inhibitors, (Kashiwada et al., 1993) and may thus be less toxic to cells than other known inhibitors, thereby enhancing their utility in chemotherapy. The human breast cancer cell line MCF-7 (ADR) which expresses a membrane bound glycoprotein (gp170) to confer multi-drug resistance (Leonessa et al., 1994) and its parental line MCF-7 p168 were used to assay the effects of cocoa fraction D & E. As shown in FIG. 19, the parental line was inhibited at increasing dose levels of fraction D & E, whereas the Adriamycin (ADR) resistant line was less effected at the higher doses. These results show that cocoa fraction D & E has an effect on multi-drug resistant cell lines. Example 11 Synthesis of Procyanidins The synthesis of procyanidins was performed according to the procedures developed by Delcour et al. (1983), with modification. In addition to condensing (+)-catechin with dihydroquercetin under reducing conditions, (−)-epicatechin was also used to reflect the high concentrations of (−)-epicatechin that naturally occur in unfermented cocoa beans. The synthesis products were isolated, purified, analyzed, and identified by the procedures described in Examples 3, 4 and 5. In this manner, the biflavanoids, triflavanoids and tetraflavanoids are prepared and used as analytical standards and, in the manner described above with respect to cocoa extracts. Example 12 Assay of Normal Phase Semi-Preparative Fractions Since the polyphenol extracts are compositionally complex, it was necessary to determine which components were active against cancer cell lines for further purification, dose-response assays and comprehensive structural identification. A normal phase semi preparative HPLC separation (Example 3B) was used to separate cocoa procyanidins on the basis of oligomeric size. In addition to the original extract, twelve fractions were prepared (FIGS. 2B and 15O) and assayed at 100 μg/mL and 25 μg/mL doses against Hela and SKBR-3 cancer cell lines to determine which oligomer possessed the greatest activity. As shown in FIGS. 20A and B, fractions 4-11 (pentamer-dodecamer) significantly inhibited HeLa and SKBr-3 cancer cell lines at the 100 μg/mL level. These results indicated that these specific oligomers had the greatest activity against Hela and SKBR-3 cells. Additionally, normal phase HPLC analysis of cocoa fraction D & E indicated that this fraction, used in previous investigations, e.g., Example 7, was enriched with these oligomers. Example 13 HPLC Purification Methods Method A. GPC Purification Procyanidins obtained as in Example 2 were partially purified by liquid chromatography on Sephadex LH 20 (72.5×2.5 cm), using 100% methanol as the eluting solvent, at a flow rate of 3.5 mL/min. Fractions of the eluent were collected after the first 1.5 hours, and the fractions were concentrated by a rotary evaporator, redissolved in water and freeze dried. These fractions were referred to as pentamer enriched fractions. Approximately 2.00 g of the extract obtained from Example 2 was subfractionated in this manner. Results are shown in Table 9. TABLE 9 Composition of Fractions Obtained: Dimer Trimer Fraction Monomer (% (% Tetramer Pentamer Hexamer Heptamer Octamer Nonamer Decamer Undecamer Others (Time) (% Area) Area) Area) (% Area) (% Area) (% Area) (% Area) (% Area) (% Area) (% Area) (% Area) (% Area) 1:15 73 8 16 3 ND ND ND ND ND ND ND ND 1:44 67 19 10 3 1 tr tr tr tr tr tr tr 2:13 30 29 24 11 4 1 tr tr tr tr tr tr 2:42 2 16 31 28 15 6 2 tr tr tr tr tr 3:11 1 12 17 25 22 13 7 2 1 tr tr tr 3:40 tr 18 13 18 20 15 10 5 2 tr tr tr 4:09 tr 6 8 17 21 19 14 8 4 2 tr tr ND = not detected tr = trace amount Method B. Normal Phase Separation Procyanidins obtained as Example 2 were separated purified by normal phase chromatography on Supelcosil LC-Si, 100 Å 5 μm (250×4.6 mm), at a flow rate of 1.0 mL/min, or, in the alternative, Lichrosphere® Silica 100, 100 Å, 5 μm (235×3.2 mm), at a flow rate of 0.5 mL/min. Separations were aided by a step gradient under the following conditions: (Time, % A, % B); (0, 82, 14), (30, 67.6, 28.4), (60, 46, 50), (65, 10, 86), (70, 10, 86). Mobile phase composition was A=dichloromethane; B=methanol; and C=acetic acid:water (1:1). Components were detected by fluorescence where λex=276 nm and λem=316 nm, and by UV at 280 nm. The injection volume was 5.0 μL (20 mg/mL) of the procyanidins obtained from Example 2. These results are shown in FIGS. 40A and 40B. In the alternative, separations were aided by a step gradient under the following conditions: (Time, % A, % B); (0, 76, 20); (25, 46, 50); (30, 10, 86). Mobile phase composition was A=dichloromethane; B=methanol; and C=acetic acid:water (1:1). The results are shown in FIGS. 41A and 41B. Method C. Reverse—Phase Separation Procyanidins obtained as in Example 2 were separated purified by reverse phase chromatography on Hewlett Packard Hypersil ODS 5 μm. (200×2.1 mm), and a Hewlett Packard Hypersil ODS 5 μm guard column (20×2.1 mm). The procyanidins were eluted with a linear gradient of 20% B into A in 20 minutes, followed by a column wash with 100% B at a flow rate of 0.3 mL/min. The mobile phase composition was a degassed mixture of B=1.0% acetic acid in methanol and A=2.0% acetic acid in nanopure water. Components were detected by UV at 280 nm, and fluorescence where λex=276 nm and λem=316 nm; and the injection volume was 2.0 μL (20 mg/mL). Example 14 HPLC Separation of Pentamer Enriched Fractions Method A. Semi-Preparative Normal Phase HPLC The pentamer enriched fractions were further purified by semi-preparative normal phase HPLC by a Hewlett Packard 1050 HPLC system equipped with a Millipore—Waters model 480 LC detector set at 254 nm, which was assembled with a Pharmacia Frac-100 Fraction Collector set to peak mode. Separations were effected on a Supelco 5 μm Supelcosel LC-Si, 100 Å column (250×10 mm) connected with a Supelco 5μ Supelguard LC-Si guard column (20×4.6 mm). Procyanidins were eluted by a linear gradient under the following conditions: (Time, % A, % B); (0, 82, 14), (30, 67.6, 28.4), (60, 46, 50), (65, 10, 86), (70, 10, 86) followed by a 10 minute re-equilibration. Mobile phase composition was A=dichloromethane; B=methanol; and C=acetic acid:water (1:1). A flow rate of 3 mL/min was used. Components were detected by UV at 254 nm; and recorded on a Kipp & Zonan BD41 recorder. Injection volumes ranged from 100-250 μl of 10 mg of procyanidin extracts dissolved in 0.25 mL 70% aqueous acetone. Individual peaks or select chromatographic regions were collected on timed intervals or manually by fraction collection for further purification and subsequent evaluation. HPLC conditions: 250 × 100 mm Supelco Supelcosil LC-Si (5 μm) Semipreparative Column 20 × 4.6 mm Supelco Supelcosil LC-Si (5 μm) Guard Column Detector: Waters LC Spectrophotometer Model 480 @ 254 nm Flow rate: 3 mL/min., Column Temperature: ambient, Injection: 250 μL of pentamer enriched extract acetic acid:water Gradient: CH2Cl2 methanol (1:1) 0 82 14 4 30 67.6 28.4 4 60 46 50 4 65 10 86 4 70 10 86 4 Method B. Reverse Phase Separation Procyanidin extracts obtained as in Example 13 were filtered through a 0.45μ nylon filter and analyzed by a Hewlett Packard 1090 ternary phase HPLC system equipped with a Diode Array detector and a HP model 1046A Programmable Fluorescence Detector. Separations were effected at 45° C. on a Hewlett Packard 5μ Hypersil ODS column (200×2.1 mm). The procyanidins were eluted with a linear gradient of 60% B into A followed by a column wash with B at a flow rate of 0.3 mL/min. The mobile phase composition was a de-gassed mixture of B=0.5% acetic acid in methanol and A=0.5% acetic acid in nanopure water. Acetic acid levels in A and B mobile phases can be increased to 2%. Components were detected by fluorescence, where λex=276 nm and λem=316 nm, and by UV at 280 nm. Concentrations of (+)-catechin and (−)-epicatechin were determined relative to reference standard solutions. Procyanidin levels were estimated by using the response factor for (−)-epicatechin. Method C. Normal Phase Separation Pentamer enriched procyanidin extracts obtained as in Example 13 were filtered through a 0.45μ nylon filter and analyzed by a Hewlett Packard 1090 Series II HPLC system equipped with a HP Model 1046A Programmable Fluorescence detector and Diode Array detector. Separations were effected at 37° C. on a 5μ Phenomenex Lichrosphere® Silica 100 column (250×3.2 mm) connected to a Supelco Supelguard LC-Si 5μ guard column (20×4.6 mm). Procyanidins were eluted by linear gradient under the following conditions: (time, % A, % B); (0, 82, 14), (30, 67.6, 28.4), (60, 46, 50), (65, 10, 86), (70, 10, 86), followed by an 8 minute re-equilibration. Mobile phase composition was A=dichloromethane, B=methanol, and C=acetic acid:water at a volume ratio of 1:1. A flow rate of 0.5 mL/min was used. Components were detected by fluorescence, where λex=276 nm and λem=316 nm or by UV at 280 nm. A representative HPLC chromatogram showing the separation of the various procyanidins is shown in FIG. 2 for one genotype. Similar HPLC profiles were obtained from other Theobroma, Herrania and/or their inter or intra specific crosses. HPLC conditions: 250 × 3.2 mm Phenomenex Lichrosphere ® Silica 100 column (5 μ) 20 × 4.6 mm Supelco Supelguard LC-Si (5 μ) guard column Detectors: Photodiode Array @ 280 nm Fluorescence λex = 276 nm; λem = 316 nm Flow rate: 0.5 mL/min. Column temperature: 37° C. acetic acid:water Gradient: CH2Cl2 methanol (1:1) 0 82 14 4 30 67.6 28.4 4 60 46 50 4 65 10 86 4 70 10 86 4 Method D. Preparative Normal Phase Separation The pentamer enriched fractions obtained as in Example 13 were further purified by preparative normal phase chromatography by modifying the method of Rigaud et al., (1993) J. Chrom. 654, 255-260. Separations were affected at ambient temperature on a 5μ Supelcosil LC-Si 100 Å column (50×2 cm), with an appropriate guard column. Procyanidins were eluted by a linear gradient under the following conditions: (time, % A, % B, flow rate); (0, 92.5, 7.5, 10); (10, 92.5, 7.5, 40); (30, 91.5, 18.5, 40); (145, 88, 22, 40); (150, 24, 86, 40); (155, 24, 86, 50); (180, 0, 100, 50). Prior to use, the mobile phase components were mixed by the following protocol: Solvent A preparation (82% CH2Cl2, 14% methanol, 2% acetic acid, 2% water): 1. Measure 80 mL of water and dispense into a 4L bottle. 2. Measure 80 mL of acetic acid and.dispense into the same 4L bottle. 3. Measure 560 mL of methanol and dispense into the same 4L bottle. 4. Measure 3280 mL of methylene chloride and dispense into the 4L bottle. 5. Cap the bottle and mix well. 6. Purge the mixture with high purity Helium for 5-10 minutes to degas. Repeat steps 1-6 two times to yield 8 volumes of solvent A. Solvent B preparation (96% methanol, 2% acetic acid, 2% water): 1. Measure 80 mL of water and dispense into a 4L bottle. 2. Measure 80 mL of acetic acid and dispense into the same 4L bottle. 3. Measure 3840 mL of methanol and dispense 3840 mL of methanol and dispense into the same 4L bottle. 4. Cap the bottle and mix well. 5. Purge the mixture with high purity Helium for 5-10 minutes to degas. Repeat steps 1-5 to yield 4 volumes of solvent B. Mobile phase composition was A=methylene chloride with 2% acetic acid and 2% water; B=methanol with 2% acetic acid and 2% water. The column load was 0.7 g in 7 mL. components were detected by UV at 254 nm. A typical preparative normal phase HPLC separation of cocoa procyanidins is shown in FIG. 42. HPLC Conditions: Column: 50 × 2 cm 5 μ Supelcosil LC-Si run @ ambient temperature. Mobile Phase: A = Methylene Chloride with 2% Acetic Acid and 2% Water. B = Methanol with 2% Acetic Acid and 2% Water. Gradient/Flow Profile: TIME FLOW RATE (MIN) % A % B (mL/min) 0 92.5 7.5 10 10 92.5 7.5 40 30 91.5 8.5 40 145 88.0 22.0 40 150 24.0 86.0 40 155 24.0 86.0 50 180 0.0 100.0 50 Example 15 Identification of Procyanidins Procyanidins obtained as in Example 14, method D were analyzed by Matrix Assisted Laser Desorption. Ionization-Time of Flight/Mass Spectrometry (MALDI-TOF/MS) using a HP G2025A MALDI-TOF/MS system equipped with a Lecroy 9350 500 MHz Oscilloscope. The instrument was calibrated in accordance with the manufacturer's instructions with a low molecular weight peptide standard (HP Part No. G2051A) or peptide standard (HP Part No. G2052A) with 2,5-dihydroxybenzoic acid (DHB)(HP Part No. G2056A) as the sample matrix. One (1.0) mg of sample was dissolved in 500 μL of 70/30 methanol/water, and the sample was then mixed with DHB matrix, at a ratio of 1:1, 1:10 or 1:50 (sample:matrix) and dried on a mesa under vacuum. The samples were analyzed in the positive ion mode with the detector voltage set at 4.75 kV and the laser power set between 1.5 and 8 μJ. Data was collected as the sum of a number of single shots and displayed as units of molecular weight and time of flight. A representative MALDI-TOF/MS is shown in FIG. 22A. FIGS. 22 and C show MALDI-TOF/MS spectra obtained from partially purified procyanidins prepared as described in Example 3, Method A and used for in vitro assessment as described in Examples 6 and 7, and whose results are summarized in Table 6. This data illustrates that the inventive compounds described herein were predominantly found in fractions D-E, but not A-C. The spectra were obtained as follows: The purified D-E fraction was subjected to MALDI-TOF/MS as described above, with the exception that the fraction was initially purified by SEP-PACK® C-18 cartridge. Five (5) mg of fraction D-E in 1 mL nanopure water was loaded onto a pre-equilibrated SEP-PACK® cartridge. The column was washed with 5 mL nanopure water to eliminate contaminants, and procyanidins were eluted with 1 mL 20% methanol. Fractions A-C were used directly, as they were isolated in Example 3, Method A, without further purification. These results confirmed and extended earlier results (see Example 5, Table 3, FIGS. 20A and B) and indicate that the inventive compounds have utility as sequestrants of cations. In particular, MALDI-TOF/MS results conclusively indicated that procyanidin oligomers of n=5 and higher (see FIGS. 20A and B; and formula under Objects and Summary of the Invention) were strongly associated with anti-cancer activity with the HeLa and SKBR-3 cancer cell line model. Oligomers of n=4 or less were ineffective with these models. The pentamer structure apparently has a structural motif which is present in it and in higher oligomers which provides the activity. Additionally, it was observed that the MALDI-TOF/MS data showed strong M+ ions of Na+, 2 Na+, K+, 2 K+, Ca++, demonstrating the utility as cation sequestrants. Example 16 Purification of Oligomeric Fractions Method A. Purification by Semi-Preparative Reverse Phase HPLC Procyanidins obtained from Example 14, Method A and B and D were further separated to obtain experimental quantities of like oligomers for further structural identification and elucidation (e.g., Example 15, 18, 19, and 20). A Hewlett Packard 1050 HPLC system equipped with a variable wavelength detector, Rheodyne 7010 injection valve with lmL injection loop was assembled with a Pharmacia FRAC-100 Fraction Collector. Separations were effected on a Phenomenex Ultracarb® 10μ ODS column (250×22.5 mm) connected with a Phenomenex 10μ ODS Ultracarb® (60×10 mm) guard column. The mobile phase composition was A=water; B=methanol used under the following linear gradient conditions: (time, % A); (0,85), (60,50), (90,0 and (110,0) at a flow rate of 5 mL/min. Individual peaks or select chromatographic regions were collected on timed intervals or manually by fraction collection for further evaluation by MALDI-TOF/MS and NMR. Injection loads ranged from 25-100 mg of material. A representative elution profile is shown in FIG. 23b. Method B. Modified Semi-Preparative HPLC Procyanidins obtained from Example 14, Method A and B and D were further separated to obtain experimental quantities of like oligomers for further structural identification and elucidation (e.g., Example 15, 18, 19, and 20). Supelcosil LC-Si 5μ column (250×10 mm) with a Supelcosil LC-Si 5μ (20×2 mm) guard column. The separations were effected at a flow rate of 3.0 mL/min, at ambient temperature. The mobile phase composition was A=dichloromethane; B=methanol; and C=acetic acid:water (1:1); used under the following linear gradient conditions: (time, % A, % B); (0, 82, 14); (22, 74, 21); (32, 74, 21); (60, 74, 50, 4); (61, 82, 14), followed by column re-equilibration for 7 minutes. Injection volumes were 60 μL containing 12 mg of enriched pentamer. Components were detected by UV at 280 nm. A representative elution profile is shown in FIG. 23A. Example 17 Molecular Modeling of Pentamers Energy minimized structures were determined by molecular modeling using Desktop Molecular Modeller, version 3.0, Oxford University Press, 1994. Four representative views of [EC(4→8)]4-EC (EC=epicatechin) pentamers based on the structure of epicatechin are shown in FIGS. 24 A-D. A helical structure is suggested. In general when epicatechin is the first monomer and the bonding is 4→8, a beta configuration results, when the first monomer is catechin and the bonding is 4→8, an alpha configuration results; and, these results are obtained regardless of whether the second monomer is epicatechin or catechin (an exception is ent-EC(4→8)ent-EC). FIGS. 38A-38P show preferred pentamers, and, FIGS. 39A to 39P show a library of stereoisomers up to and including the pentamer, from which other compounds within the scope of the invention can be prepared, without undue experimentation. Example 18 NMR Evaluation of Pyrocyanidins 13C NMR spectroscopy was deemed a generally useful technique for the study of procyanidins, especially as the phenols usually provide good quality spectra, whereas proton NMR spectra are considerably broadened. The 13C NMR spectra of oligomers yielded useful information for A or B ring substitution patterns, the relative stereochemistry of the C ring and in certain cases, the position of the interflavanoid linkages. Nonetheless, 1H NMR spectra yielded useful information. Further, HOHAHA, makes use of the pulse technique to transfer magnetization of a first hydrogen to a second in a sequence to obtain cross peaks corresponding to alpha, beta, gamma or delta protons. COSY is a 2D-Fourier transform NMR technique wherein vertical and horizontal axes provide 1H chemical shift and 1D spectra; and a point of intersection provides a correlation between protons, whereby spin-spin couplings can be determined. HMQC spectra enhances the sensitivity of NMR spectra of nuclei; other than protons and can reveal cross peaks from secondary and tertiary carbons to the respective protons. APT is a 13C technique used in determining the number of hydrogens present at a carbon. An even number of protons at a carbon will result in a positive signal, while an odd number of protons at a carbon will result in a negative signal. Thus 13C NMR, 1H NMR, HOHAHA (homonuclear Hartmann-Hahn), HMQC (heteronuclear multiple quantum coherence), COSY (Homonuclear correlation spectroscopy), APT (attached proton test), and XHCORR (a variation on HMQC) spectroscopy were used to elucidate the structures of the inventive compounds. Method A. Monomer All spectra were taken in deuterated methanol, at room temperature, at an approximate sample concentration of 10 mg/mL. Spectra were taken on a Bruker 500 MHZ NMR, using methanol as an internal standard. FIGS. 44A-E represent the NMR spectra which were used to characterize the structure of the epicatechin monomer. FIG. 44A shows the 1H and 13C chemical shifts, in tabular form. FIGS. 44B-E show 1H, APT, XHCORR and COSY spectra for epicatechin. Similarly, FIGS. 45A-F represent the NMR spectra which were used to characterize the structure of the catechin monomer. FIG. 45A shows the 1H and 13C chemical shifts, in tabular form. FIGS. 44B-F show 1H, 13C, APT, XHCORR and COSY spectra for catechin. Method B. Dimers All spectra were taken in 75% deuterated acetone in D2O, using acetone as an internal standard, and an approximate sample concentration of 10 mg/mL. FIGS. 46A-G represent the spectra which were used to characterize the structure of the B2 dimer. FIG. 46A shows 1H and 13C chemical shifts, in tabular form. The terms T and B indicate the top half of the dimer and the bottom half of the dimer. FIGS. 46B and C show the 13C and APT spectra, respectively, taken on a Bruker 500 MHZ NMR, at room temperature. FIGS. 46D-G show the 1H, HMQC, COSY and HOHAHA, respectively, which were taken on AMZ-360 MHZ NMR at a −7° C. The COSY spectrum was taken using a gradient pulse. FIGS. 47A-G represent the spectra which were used to characterize the structure of the B5 dimer. FIG. 47A shows the 13C and 1H chemical shifts, in tabular form. FIGS. 47B-D show the 1H, 13C and APT, respectively, which were taken on a Bruker 500 MHZ NMR, at room temperature. FIG. 47E shows the COSY spectrum, taken on an AMX-360, at room temperature, using a gradient pulse. FIGS. 47F and G show the HMQC and HOHAHA, respectively, taken on an AMX-360 MHZ NMR, at room temperature. Method C. Trimer—Epicatechin/Catechin All spectra were taken in 75% deuterated acetone in D2O, at −3° C. using acetone as an internal standard, on an AMX-360 MHZ NMR, and an appropriate sample concentration of 10 mg/mL. FIGS. 48A-D represent the spectra which were used to characterize the structure of the epicatechin/catechin trimer. These figures show 1H, COSY, HMQC and HOHAHA, respectively. The COSY spectrum was taken using a gradient pulse. Method D. Trimer—All Epicatechin All spectra were taken in 70% deuterated acetone in D2O, at −1.8° C., using acetone as an internal standard, on an AMX-360 MHZ NMR, and an appropriate sample concentration of 10 mg/mL. FIGS. 49A-D represent the spectra which were used to characterize the structure of all epicatechin trimer. These figures show 1H, COSY, HMQC and HOHAHA, respectively. The COSY spectrum was taken using a gradient pulse. Example 19 Thiolysis of Procyanidins In an effort to characterize the structure of procyanidins, benzyl mercaptan (BM) was reacted with catechin, epicatechin or dimers B2 and B5. Benzyl mercaptan, as well as phloroglucinol and thiophenol, can be utilized in the hydrolysis (thiolysis) of procyanidins in an alcohol/acetic acid environment. Catechin, epicatechin or dimer (1:1 mixture of B2 and B5 dimers) (2.5 mg) was dissolved in 1.5 mL ethanol, 100 μL BM and 50 μL acetic acid, and the vessel (Beckman amino acid analysis vessel) was evacuated and purged with nitrogen repeatedly until a final purge with nitrogen was followed by sealing the reaction vessel. The reaction vessel was placed in a heat block at 95° C., and aliquots of the reaction were taken at 30, 60, 120 and 240 minutes. The relative fluorescence of each aliquot is shown in FIGS. 25A-C, representing epicatechin, catechin and dimers, respectively. Higher oligomers are similarly thiolyzed. Example 20 Thiolysis and Desulfurization of Dimers Dimers B2 and B5 were hydrolyzed with benzylmercaptan by dissolving dimer (B2 or B5; 1.0 mg) in 600 μl ethanol, 40 μL BM and 20 μL acetic acid. The mixture was heated at 95° C. for 4 hours under nitrogen in a Beckman Amino Acid Analysis vessel. Aliquots were removed for analysis by reverse-phase HPLC, and 75 μL of each of ethanol Raney Nickel and gallic acid (10 mg/mL) were added to the remaining reaction medium in a 2 mL hypovial. The vessel was purged under hydrogen, and occasionally shaken for 1 hour. The product was filtered through a 0.45μ filter and analyzed by reverse-phase HPLC. Representative elution profiles are shown in FIGS. 26A and B. Higher oligomers are similarly desulfurized. This data suggests polymerization of epicatechan or catechin and therefore represents a synthetic route for preparation of inventive compounds. Example 21 In Vivo Activity of Pentamer in MDA MB 231 Nude Mouse Model MDA-MB-231/LCC6 cell line. The cell line was grown in improved minimal essential medium (IMEM) containing 10% fetal bovine serum and maintained in a humidified, 5% CO2 atmosphere at 37° C. Mice. Female six to eight week old NCr nu/nu (athymic) mice were purchased through NCI and housed in an animal facility and maintained according to the regulations set forth by the United States Department of Agriculture, and the American Association for the Accreditation of Laboratory Animal Care. Mice with tumors were weighed every other day, as well as weekly to determine appropriate drug dosing. Tumor implantation. MDA-MD-231 prepared by tissue culture was diluted with IMEM to 3.3×106 cells/mL and 0.15 mL (i.e. 0.5×106 cells) were injected subcutaneously between nipples 2 and 3 on each side of the mouse. Tumor volume was calculated by multiplying: length×width×height×0.5. Tumor volumes over a treatment group were averaged and Student's t test was used to calculate p values. Sample preparation. Plasma samples were obtained by cardiac puncture and stored at −70° C. with 15-20 mM EDTA for the purposes of blood chemistry determinations. No differences were noted between the control group and experimental groups. Fifteen nude mice previously infected with 500,000 cells subcutaneously with tumor cell line MDA-MB- 231, were randomLy separated into three groups of 5 animals each and treated by.intraperitoneal injection with one of: (i) placebo containing vehicle alone (DMSO); (ii) 2 mg/mouse of purified pentameric procyanidin extract as isolated in Example 14 method D in vehicle (DMSO); and (iii) 10 mg/mouse purified pentameric procyanidin extract as isolated in Example 14, method D in vehicle (DMSO). The group (iii) mice died within approximately 48 to 72 hours after administration of the 10 mg, whereas the group (ii) mice appeared normal. The cause of death of the group (iii) mice was undetermined; and, cannot necessarily be attributed to the administration of inventive compounds. Nonetheless, 10 mg was considered an upper limit with respect to toxicity. Treatment of groups (i) and (ii) was repeated once a week, and tumor growth was monitored for each experimental and control group. After two weeks of treatment, no signs of toxicity were observed in the mice of group (ii) and, the dose administered to this group was incrementally increased by ½ log scale each subsequent week. The following Table represents the dosages administered during the treatment schedule for mice of group (ii): Dose Week (mg/mouse) 1 2 2 2 3 4 4 5 5 5 6 5 7 5 The results of treatment are shown in FIGS. 27A and B and Table 10. TABLE 10 IN VIVO ANTI-CANCER RESULTS % SURVIVAL % SURVIVAL % SURVIVAL DAY GROUP (i) GROUP (ii) GROUP (iii) 1 100 100 100 2 100 100 100 3 100 100 0 4 100 100 5 100 100 6 100 100 7 100 100 8 100 100 9 100 100 10 100 100 11 100 100 12 100 100 13 100 100 14 100 100 15 100 100 16 100 100 17 100 100 18 100 100 19 100 100 20 100 100 21 100 100 22 75 100 23 75 100 24 75 100 25 75 100 26 75 100 27 75 100 28 75 100 29 50 100 30 50 100 31 50 100 32 50 100 33 50 100 34 50 100 35 50 100 36 25 100 37 25 100 38 25 100 39 25 100 40 25 100 41 25 100 42 25 100 43 25 80 44 25 80 45 25 80 46 25 80 47 25 80 48 25 80 49 25 80 50 25 60 51 25 60 52 25 60 53 25 60 54 25 60 55 25 60 56 25 60 57 0 40 58 40 59 40 60 40 61 40 62 40 63 40 64 40 These results demonstrate that the inventive fractions and the inventive compounds indeed have utility in antineoplastic compositions, and are not toxic in low to medium dosages, with toxicity in higher dosages able to be determined without undue experimentation. Example 22 Antimicrobial Activity of Cocoa Extracts Method A: A study was conducted to evaluate the antimicrobial activity of crude procyanidin extracts from cocoa beans against a variety of microorganisms important in food spoilage or pathogenesis. The cocoa extracts from Example 2, method A were used in the study. An agar medium appropriate for the growth of each test culture (99 mL) was seeded with 1 mL of each cell culture suspension in 0.45% saline (final population 102-104 cfu/mL), and poured into petri dishes. Wells were cut into hardened agar with a #2 cork borer (5 mm diameter). The plates were refrigerated at 4° C. overnight, to allow for diffusion of the extract into the agar, and subsequently incubated at an appropriate growth temperature for the text organism. The results were as follows: Sample Zone of Inhibition (mm) Extract Concentration B. B. S. P. B. (mg/mL) sphericus cereus aureus aeruginosa subtilis 0 NI NI NI NI NI 25 NI 12 NI 11 NI 250 12 20 19 19 11 500 14 21 21 21 13 NI = no inhibition Antimicrobial activity of purified procyanidin extracts from cocoa beans was demonstrated in another study using the well diffusion assay described above (in Method A) with Staphylococcus aureus as the text culture. The results were as follows: cocoa extracts: 10 mg/100 μL decaffeinated/ detheobrominated acetone extract as in Example 13, method A 10 mg/100 μL dimer (99% pure) as in Example 14, method D 10 mg/100 μL tetramer (95% pure) as in Example 14, method D 10 mg/100 μL hexamer (88% pure) as in Example 14, method D 10 mg/100 μL octamer/nonamer (92% pure) as in Example 14, method D 10 mg/100 μL nonamer & higher (87% pure) as in Example 14, method D Sample Zone of Inhibition (mm) 0.45% saline 0 Dimer 33 Tetramer 27 Hexamer 24 0.45% saline 0 Octamer 22 Nonamer 20 Decaff./detheo. 26 Method B: Crude procyanidin extract as in Example 2, method 2 was added in varying concentrations to TSB (Trypticase Soy Broth) with phenol red (0.08 g/L), The TSB were inoculated with cultures of Salmonella enteritidis or S. newport (105 cfu/mL), and were incubated for 18 hours at 35° C. The results were as follows: S. enteritidis S. Newport 0 mg/mL + + 50 + + 100 + + 250 + − 500 − − 750 − − where +=outgrowth, and −=no growth, as evidenced by the change in broth culture from red to yellow with acid production. Confirmation of inhibition was made by plating from TSB tubes onto XLD plates. This Example demonstrates that the inventive compounds are useful in food preparation and preservation. This Example further demonstrates that gram negative and gram positive bacterial growth can be inhibited by the inventive compounds. From this, the inventive compounds can be used to inhibit Helicobacter pylori. Helicobacter pylori has been implicated in causing gastric ulcers and stomach cancer. Accordingly, the inventive compounds can be used to treat or prevent these and other maladies of bacterial origin. Suitable routes of administration, dosages, and formulations can be determined without undue experimentation considering factors well known in the art such as the malady, and the age, weight, sex, general health of the subject. Example 23 Halogen-Free Analytical Separation of Extract Procyanidins obtained from Example 2 were partially purified by Analytical Separation by Halogen-free Normal Phase Chromatography on 100 Å Supelcosil LC-Si 5 μm (250×4.6 mm), at a flow rate of 1.0 mL/min, and a column temperature of 37° C. Separations were aided by a linear gradient under the following conditions: (time, % A, % B); (0, 82, 14); (30, 67.6, 28.4); (60, 46, 50). Mobile phase composition was A=30/70 % diethyl ether/Toluene; B=Methanol; and C=acetic acid/water (1:1). Components were detected by UV at 280 nm. A representative elution profile is shown in FIG. 28. Example 24 Effect of Pore Size of Stationary Phase for Normal Phase HPLC Separation of Procyanidins To improve the separation of procyanidins, the use of a larger pore size of the silica stationary phase was investigated. Separations were effected on Silica-300, 5 μm, 300 Å (250×2.0 mm), or, in the alternative, on Silica-1000, 5 μm, 1000 Å (250×2.0 mm). A linear gradient was employed as mobile phase composition was: A=Dichloromethane; B=Methanol; and C=acetic acid/water (1:1). Components were detected by fluorescence, wherein λex=276 nm and λem=316 nm, by UV detector at 280 nm. The flow rate was 1.0 mL/min, and the oven temperature was 37° C. A representative chromatogram from three different columns (100 Å pore size, from Example 13, Method D) is shown in FIG. 29. This shows effective pore size for separation of procyanidins. Example 25 Obtaining Desired Procyanidins Via Manipulating Fermentation Microbial strains representative of the succession associated with cocoa fermentation were selected from the M&M/Mars cocoa culture collection. The following isolates were used: Acetobacter aceti ATCC 15973 Lactobacillus sp. (BH 42) Candida cruzii (BA 15) Saccharomyces cerevisiae (BA 13) Bacillus cereus (BE 35) Bacillus sphaericus (ME 12) Each strain was transferred from stock culture to fresh media. The yeasts and Acetobacter were incubated 72 hours at 26° C. and the bacilli and Lactobacillus were incubated 48 hours at 37° C. The slants were harvested with 5 mL phosphate buffer prior to use. Cocoa beans were harvested from fresh pods and the pulp and testa removed. The beans were sterilized with hydrogen peroxide (35%) for 20 seconds, followed by treatment with catalase until cessation of bubbling. The beans were rinsed twice with sterile water and the process repeated. The beans were divided into glass jars and processed according to the regimens detailed in the following Table: Fermentation Model Water Ethanol/acid infusate Fermentation daily daily transfer to daily transfer bench scale transfer solutions of to fermented model to fresh alcohol and acid pulp fermentation in water corresponding to pasteurized on sterile pulp levels determined each successive coinoculated at each stage of day of with test a model pulp fermentation strains fermentation The bench scale fermentation was performed in duplicate. All treatments were incubated as indicated below: Day 1: 26° C. Day 2: 26° C. to 50° C. Day 3: 50° C. Day 4: 45° C. Day 5: 40° C. The model fermentation was monitored over the duration of the study by plate counts to assess the microbial population and HPLC analysis of the fermentation medium for the production of microbial metabolites. After treatment, the beans were dried under a laminar flow hood to a water activity of 0.64 and were roasted at 66° C. for 15 min. Samples were prepared for procyanidin analysis. Three beans per treatment were ground and defatted with hexane, followed by extraction with an acetone:water:acetic acid (70:29.5:0.5%) solution. The acetone solution extract was filtered into vials and polyphenol levels were quantified by normal phase HPLC as in Example 13, method B. The remaining beans were ground and tasted. The cultural and analytical profiles of the model bench-top fermentation process is shown in FIGS. 30A-C. The procyanidin profiles of cocoa beans subjected to various fermentation treatments is shown in FIG. 30D. This Example demonstrates that the invention need not be limited to any particular cocoa genotype; and, that by manipulating fermentation, the levels of procyanidins produced by a particular Theobroma or Herrania species or their inter or intra species specific crosses thereof can be modulated, e.g., enhanced. The following Table shows procyanidin levels determined in specimens which are representative of the Theobroma genus and their inter and intra species specific crosses. Samples were prepared as in Examples 1 and 2 (methods 1 and 2), and analyzed as in Examples 13, method B. This data illustrates that the extracts containing the inventive compounds are found in Theobroma and Herrania species, and their intra and inter species specific crosses. Theobroma and Herrania Species Procyanidin Levels ppm (μg/g) in defatted powder Oligomer Mono- Tri- Tetra- Hex- SAMPLE mer Dimer mer mer Pentamer amer Heptamer Octamer Nonamer Decamer Undecamer Total T. grandiflorum × 3822 3442 5384 4074 3146 2080 850 421 348 198 tr+ 23,765 T. obovatum 11 T. grandiflorum × 3003 4098 5411 3983 2931 1914 1090 577 356 198 tr 23,561 T. obovatum 21 T. grandiflorum × 4990 4980 7556 5341 4008 2576 1075 598 301 144 tr 31,569 T. obovatum 3A1 T. grandiflorum × 3880 4498 6488 4930 3706 2560 1208 593 323 174 tr 28,360 T. obovatum 3B1 T. grandiflorum × 2647 3591 5328 4240 3304 2380 1506 815 506 249 tr 24,566 T. obovatum 41 T. grandiflorum × 2754 3855 5299 3872 2994 1990 1158 629 359 196 88 23,194 T. obovatum 61 T. grandiflorum × 3212 4134 7608 4736 3590 2274 936 446 278 126 ND* 23,750 T. obovatum SIN1 T. obovatum 11 3662 5683 9512 5358 3858 2454 1207 640 302 144 ND 32,820 T. grandiflorum 2608 2178 3090 2704 2241 1586 900 484 301 148 tr 16,240 TEFFE2 T. grandiflorum 4773 4096 5289 4748 3804 2444 998 737 335 156 tr 27,380 TEFFE × T. grandiflorum2 T. grandiflorum × 4752 3336 4916 3900 3064 2039 782 435 380 228 ND 23,832 T. subincanum1 T. obovatum × 3379 3802 5836 3940 2868 1807 814 427 271 136 tr 23,280 T. subincanum1 T. speciosum × 902 346 1350 217 152 120 60 tr tr ND ND 3,147 T. sylvestris1 T. microcarpum2 5694 3250 2766 1490 822 356 141 tr ND ND ND 14,519 T. cacao, 21,929 10,072 10,106 7788 5311 3242 1311 626 422 146 tr 60,753 SIAL 659, t0 T. cacao, 21,088 9762 9119 7094 4774 2906 1364 608 361 176 tr 57,252 SIAL 659, t24 T. cacao, 20,887 9892 9474 7337 4906 2929 1334 692 412 302 tr 58,165 SIAL 659, t48 T. cacao, 9552 5780 5062 3360 2140 1160 464 254 138 tr ND 27,910 SIAL 659, t96 T. cacao, 8581 4665 4070 2527 1628 888 326 166 123 tr ND 22,974 SIAL 659, t120 Pod Rec. 10/96, 869 1295 545 347 175 97 tr *ND ND 3329 Herrania mariae Sample Rec. 130 354 151 131 116 51 tr ND ND 933 prior to 10/96, Herrania mariae ND = none detected 1sample designated CPATU +tr = trace (<50 μg/g) 2sample designated EAJON Example 26 Effect of Procyanidins on NO Method A The purpose of this study is to establish the relationship between procyanidins (as in Example 14, method D) and NO, which is known to induce cerebral vascular dilation. The effects of monomers and higher oligomers, in concentrations ranging from 100 μg/mL to 0.1 82 g/mL, on the production of nitrates (the catabolites of NO), from HUVEC (human umbilical vein endothelial cells) is evaluated. HUVEC (from Clonetics) is investigated in the presence or absence of each procyanidin for 24 to 48 hours. At the end of the experiments, the supernatants are collected and the nitrate content determined by calorimetric assay. In separate experiments, HUVEC is incubated with acetylcholine, which is known to induce NO production, in the presence or absence of procyanidins for 24 to 48 hours. At the end of the experiments, the supernatants are collected and nitrate content is determined by calorimetric assay. The role of NO is ascertained by the addition of nitroarginine or (1)-N-methyl arginine, which are specific blockers of NO synthase. Method B. Vasorelaxation of Phenylephrine-Induced Contracted Rat Artery The effects of each of the procyanidins (100 μg/mL to 0.1 μg/mL on the rat artery is the target for study of vasorelaxation of phenylephrine-induced contracted rat artery. Isolated rat artery is incubated in the presence or absence of procyanidins (as in Example 14, method D) and alteration of the muscular tone is assessed by visual inspection. Both contraction or relaxation of the ray artery is determined. Then, using other organs, precontraction of the isolated rat artery is induced upon addition of epinephrine. Once the contraction is stabilized, procyanidins are added and contraction or relaxation of the rat artery is determined. The role of NO is ascertained by the addition of nitroarginine or (1)-N-methyl arginine. The acetylcholine-induced relaxation of NO, as it is effected by phenylephrine-precontracted rat aorta is shown in FIG. 31. Method C. Induction of Hypotension in the Rat This method is directed to the effect of each procyanidin (as in Example 14, method D) on blood pressure. Rats are instrumented in order to monitor systolic and diastolic blood pressure. Each of the procyanidins are injected intravenously (dosage range=100-0.1 μg/kg), and alteration of blood pressure is assessed. In addition, the effect of each procyanidin on the alteration of blood pressure evoked by epinephrine is determined. The role of NO is ascertained by the addition of nitroarginine or (1)-N-methyl arginine. These studies, together with next Example, illustrate that the inventive compounds are useful in modulating vasodilation, and are further useful with respect to modulating blood pressure or addressing coronary conditions, and migraine headache conditions. Example 27 Effects of Cocoa Polyphenols on Satiety Using blood glucose levels as an indicator for the signal events which occur in vivo for the regulation of appetite and satiety, a series of simple experiments were conducted using a healthy male adult volunteer age 48 to determine whether cocoa polyphenols would modulate;glucose levels. Cocoa polyphenols were partially purified from Brazilian cocoa beans according to the methods described by Clapperton et al. (1992). This material contained no caffeine or theobromine. Fasting blood glucose levels were analyzed on a timed basis after ingestion of 10 fl. oz of Dexicola 75 (caffeine free) Glucose tolerance test beverage (Curtin Matheson 091-421) with and without 75 mg cocoa polyphenols. This level of polyphenols represented 0.1% of the total glucose of the test beverage and reflected the approximate amount that would be present in a standard 100 g chocolate bar. Blood glucose levels were determined by using the Accu-Chek III blood glucose monitoring system (Boehringer Mannheim Corporation). Blood glucose levels were measured before ingestion of test beverage, and after ingestion of the test beverage at the following timed intervals: 15, 30, 45, 60, 75, 90, 120 and 180 minutes. Before the start of each glucose tolerance test, high and low glucose level controls were determined. Each glucose tolerance test was performed in duplicate. A control test solution containing 75 mg cocoa polyphenols dissolved in 10 fl. oz. distilled water (no glucose) was also performed. Table 11 below lists the dates and control values obtained for each glucose tolerance experiment performed in this study. FIG. 32 represents plots of the average values with standard deviations of blood glucose levels obtained throughout a three hour time course. It is readily apparent that there is a substantial increase in blood sugar levels was obtained after ingestion of a test mixture containing cocoa polyphenols. The difference between the two principal glucose tolerance profiles could not be resolved by the profile obtained after ingestion of a solution of cocoa polyphenols alone. The addition of cocoa polyphenols to the glucose test beverage raised the glucose tolerance profile significantly. This elevation in blood glucose levels is within the range considered to be mildly diabetic, even though the typical glucose tolerance profile was considered to be normal (Davidson, I. et al., Eds. Todd—Sandford Clinical Diagnosis by Laboratory Methods 14th edition; W.B. Saunders Co.; Philadelphia, Pa. 1969 Ch. 10, pp. 550-9). This suggests that the difference in additional glucose was released to the bloodstream, from the glycogen stores, as a result of the inventive compounds. Thus, the inventive compounds can be used to modulate blood glucose levels when in the presence of sugars. TABLE 11 Glucose Tolerance Test Dates and Control Results HIGH LOW WEEK DESCRIPTION CONTROLa CONTROLb 0 Glucose Tolerance 265 mg/dL 53 mg/dL 1 Glucose Tolerance 310 68 with 0.1% polyphenols 2 Glucose Tolerance 315 66 4 Glucose Tolerance 325 65 with 0.1% polyphenols 5 0.1% polyphenols 321 66 a= Expected range: 253-373 mg/dL b= Expected range: 50-80 mg/dL The subject also experienced a facial flush (erythema) and lightheadedness following ingestion of the inventive compounds, indicating modulation of vasodilation. The data presented in Tables 12 and 13 illustrates the fact that extracts of the invention pertaining to cocoa raw materials and commercial chocolates, and inventive compounds contained therein can be used as a vehicle for pharmaceutical, veterinary and food science preparations and applications. TABLE 13 Procyanidin Levels in Commercial Chocolates μg/g Heptamers and Sample Monomers Dimers Trimers Tetramers Pentamers Hexamers Higher Total Brand 1 366 166 113 59 56 23 18 801 Brand 2 344 163 111 45 48 ND* ND 711 Brand 3 316 181 100 41 40 7 ND 685 Brand 4 310 122 71 27 28 5 ND 563 Brand 5 259 135 90 46 29 ND ND 559 Brand 6 308 139 91 57 47 14 ND 656 Brand 7 196 98 81 58 54 19 ND 506 Brand 8 716 472 302 170 117 18 ND 1,795 Brand 9 1,185 951 633 298 173 25 21 3,286 Brand 10 1,798 1,081 590 342 307 93 ND 4,211 Brand 11 1,101 746 646 372 347 130 75 3,417 Brand 12 787 335 160 20 10 8 ND 1,320 ND* = None detected. TABLE 14 Procyanidin Levels in Cocoa Raw Materials μg/g Heptamers and Sample Monomers Dimers Trimers Tetramers Pentamers Hexamers Higher Total Unfermented 13,440 6,425 6,401 5,292 4,236 3,203 5,913 44,910 Fermented 2,695 1,538 1,362 740 470 301 277 7,383 Roasted 2,656 1,597 921 337 164 ND* ND 5,675 Choc. Liquor 2,805 1,446 881 442 184 108 ND 5,866 Cocoa Hulls 114 53 14 ND ND ND ND 181 Cocoa Powder 1% Fat 506 287 112 ND ND ND ND 915 Cocoa Powder 11% Fat 1,523 1,224 680 46 ND ND ND 3,473 Red Dutch Cocoa 1,222 483 103 ND ND ND ND 1,808 Powder, pH 7.4, 11% fat Red Dutch Cocoa 168 144 60 ND ND ND ND 372 Powder, pH 8.2, 23% fat ND* = None detected. Example 28 The Effect of Procyanidins on Cyclooxygenase 1 & 2 The effect of procyanidins on cyclooxygenase 1 & 2 (COX1/COX2) activities was assessed by incubating the enzymes, derived from ram seminal vesicle and sheep placenta, respectively, with arachidonic acid (5 μM) for 10 minutes at room temperature, in the presence of varying concentrations of procyanidin solutions containing monomer to decamer and procyanidin mixture. Turnover was assessed by using PGE2 EIA kits from Interchim (France). Indomethacin was used as a reference compound. The results are presented in the following Table, wherein the IC50 values are expressed in units of μM (except for S11, which represents a procyanidin mixture prepared from Example 13, Method A and where the samples S1 to S10 represent sequentially procyanidin oligomers (monomer through decamer) as in Example 14, Method D, and IC50 is expressed in units of mg/mL). IC50 COX-1 IC50 COX-2 RATIO IC50 SAMPLE # (*) (*) COX2/COX1 1 0.074 0.197 2.66 2 0.115 0.444 3.86 3 0.258 0.763 2.96 4 0.154 3.73 24.22 5 0.787 3.16 4.02 6 1.14 1.99 1.75 7 1.89 4.06 2.15 8 2.25 7.2 3.20 9 2.58 2.08 0.81 10 3.65 3.16 0.87 11 0.0487 0.0741 1.52 Indomethacin 0.599 13.5 22.54 (*) expressed as uM with the exception of sample 11, which is mg/mL. The results of the inhibition studies are presented in FIGS. 33A and B, which shows the effects of Indomethacin on COX1 and COX2 activities. FIGS. 34A and B shows the correlation between the degree of polymerization of the procyanidin and IC50 with COX1 and COX2; FIG. 35 shows the correlation between IC50 values on COX1 and COX2. And, FIGS. 36A through Y show the IC50 values of each sample (S1-S11) with COX1 and COX2. These results indicate that the inventive compounds have analgesic, anti-coagulant, and anti-inflammatory utilities. Further, COX2 has been linked to colon cancer. Inhibition of COX2 activity by the inventive compounds illustrates a plausible mechanism by which the inventive compounds have antineoplastic activity against colon cancer. COX1 and COX2 are also implicated in the synthesis of prostaglandins. Thus, the results in this Example also indicate that the inventive compounds can modulate renal functions, immune responses, fever, pain, mitogenesis, apoptosis, prostaglandin synthesis, ulceration (e.g., gastric), and reproduction. Note that modulation of renal function can affect blood pressure; again implicating the inventive compounds in modulating blood pressure, vasodilation, and coronary conditions (e.g., modulation of angiotensin, bradykinin). Reference is made to Seibert et al., PNAS USA 91:12013-12017 (December, 1994), Mitchell et al., PNAS USA 90:11693-11697 (December 1994), Dewitt et al., Cell 83:345-348 (Nov. 3, 1995), Langenbach et al., Cell 83:483-92 (Nov. 3, 1995) and Sujii et al., Cell 83:493-501 (Nov. 3, 1995), Morham et al., Cell 83:473-82 (Nov. 3, 1995). Reference is further made to Examples 9, 26, and 27. In Example 9, the anti-oxidant activity of inventive compounds is shown. In Example 26, the effect on NO is demonstrated. And, Example 27 provides evidence of a facial vasodilation. From the results in this Example, in combination with Examples 9, 26 and 27, the inventive compounds can modulate free radical mechanisms driving physiological effects. Similarly, lipoxygenase mediated free radical type reactions biochemically directed toward leukotriene synthesis can be modulated by the inventive compounds, thus affecting subsequent physiological effects (e.g., inflammation, immune response, coronary conditions, carcinogenic mechanisms, fever, pain, ulceration). Thus, in addition to having analgesic properties, there may also be a synergistic effect by the inventive compounds when administered with other analgesics. Likewise, in addition to having antineoplastic properties, there may also be a synergistic effect by the inventive compounds when administered with other antineoplastic agents. Example 29 Circular Dichroism/Study of Procyanidins CD studies were undertaken in an effort to elucidate the structure of purified procyanidins as in Example 14, Method D. The spectra were collected at 25° C. using CD spectrum software AVIV 60DS V4.1f. Samples were scanned from 300 nm to 185 nm, every 1.00 nm, at 1.50 nm bandwidth. Representative CD spectra are shown in FIGS. 43A through G, which show the CD spectra of dimer through octamer. These results are indicative of the helical nature of the inventive compounds. Example 30 Inhibitory Effects of Cocoa Procyanidins on Helicobacter pylori and Staphylococcus aureus A study was conducted to evaluate the antimicrobial activity of procyanidin oligomers against Helicobacter pylori and Staphylococcus aureus. Pentamer enriched material was prepared as described in Example 13, Method A and analyzed as described in Example 14, Method C, where 89% was pentamer, and 11% was higher oligomers (n is 6 to 12). Purified pentamer (96.3%) was prepared as described in Example 14, Method D. Helicobacter pylori and Staphylococcus aureus were obtained from the American Type Culture Collection (ATCC). For H. pylori, the vial was rehydrated with 0.5 mL Trypticase Soy broth and the suspension transferred to a slant of fresh TSA containing 5% defibrinated sheep blood. The slant was incubated at 37° C. for 3 to 5 days under microaerophilic conditions in anaerobic jars (5 to 10% carbon dioxide; CampyPakPlus, BBL). When good growth was established in the pool of broth at the bottom of the slant, the broth was used to inoculate additional slants of TSA with sheep blood. Because viability decreased with continued subculturing, the broth harvested from the slants was pooled and stored at −80° C. Cultures for assay were used directly from the frozen vials. The S. aureus culture was maintained on TSA slants and transferred to fresh slants 24 h prior to use. A cell suspension of each culture was prepared (H. pylori, 108 to 109 cfu/mL; S. aureus 106 to 107 cfu/mL) and 0.5 mL spread onto TSA plates with 5% sheep blood. Standard assay disks (Difco) were dipped into filter sterilized, serial dilutions of pentamer (23 mg/mL into sterile water). The test disks and the blank control disks (sterile water) were placed on the inoculated plates. Control disks containing 80 ug metronidazole (inhibitory to H. pylori) or 30 ug vancomycin (inhibitory to S. aureus) (BBL Sensidiscs) were also placed on the appropriate set of plates. The H. pylori inoculated plates were incubated under microaerophilic conditions. The S. aureus set was incubated aerobically. Zones of inhibition were measured following outgrowth. TABLE 14 Bioassays with pentamer against Helicobacter pylori and Staphylocuccus aureus Pentamer Enriched S. aureus H. pylori Fraction (mg/ml) Inhibition (mm) Inhibition (mm) 0 NI NI 15 0 10 31 10 10 62 11 11 125 13 13 250 15 13 Vancomycin 15 — standard Metronidazole — 11 standard 96% pure pentamer 15 11 NI = no inhibition Example 31 No Dependent Hypotension in the Guinea Pig The effect of five cocoa procyanidin fractions on guinea pig blood pressure were investigated. Briefly, guinea pigs (approximately 400 g body weight; male and female) were anesthetized upon injection of 40 mg/kg sodium pentobarbital. The carotid artery was cannulated for monitoring of the arterial blood pressure. Each of the five cocoa procyanidin fractions was injected intravenously (dose range 0.1 mg/kg-100 mg/kg) through the jugular vein. Alterations of blood pressure were recorded on a polygraph. In these experiments, the role of NO was ascertained by the administration of L-N-methylarginine (1 mg/kg) ten minutes prior to the administration of cocoa procyanidin fractions. Cocoa procyanidin fractions were prepared and analyzed according to the procedures described in U.S. Pat. No. 5,554,645, hereby incorporated herein by reference. Fraction A: Represents a preparative HPLC fraction comprised of monomers-tetramers. HPLC analysis revealed the following composition: Monomers 47.2% Dimers 23.7 Trimers 18.7 Tetramers 10.3 Fraction B: Represents a preparative HPLC fraction comprised of pentamers-decamers. HPLC analysis revealed the following composition: Pentamers 64.3% Hexamers 21.4 Heptamers 7.4 Octamers 1.9 Nonamers 0.9 Decamers 0.2 Fraction C: Represents an enriched cocoa procyanidin fraction used in the preparation of Fractions A and B (above). HPLC analysis revealed the following composition: Monomers 34.3% Dimers 17.6 Trimers 16.2 Tetramers 12.6 Pentamers 8.5 Hexamers 5.2 Heptamers 3.1 Octamers 1.4 Nonamers 0.7 Decamers 0.3 Fraction D: Represents a procyanidin extract prepared from a milk chocolate. HPLC analysis revealed a composition similar to that listed in the Table 12 for Brand 8. Additionally, caffeine 10% and theobromine 6.3% were present. Fraction E: Represents a procyanidin extract prepared from a dark chocolate prepared with alkalized liquor. HPLC analysis revealed a composition similar to that listed in the Table 12 for Brand 12. Additionally, caffeine 16.0% and theobromine 5.8% were present. In three separate experiments, the effects of administering 10 mg/kg cocoa procyanidin fractions on arterial blood pressure of anesthetized guinea pigs was investigated. Upon intravenous injection, procyanidin fractions A and E evoked a decrease in blood pressure of about 20%. This decrease was only marginally different from that obtained from a solvent (DMSO) control (15±5%, n=5). In contrast, procyanidin fractions B, C and D (10 mg/kg) induced marked decreases in blood pressure, up to 50-60% for C. In these experiments the order of hypotensive effect was as follows: C>B>D>>A=E. Typical recordings of blood pressure elicited after injection of procyanidin fractions appear in FIG. 50A for fraction A and FIG. 50B for fraction C. FIG. 51 illustrates the comparative effects on blood pressure by these fractions. The possible contribution of NO in the hypotension in the guinea pig induced by administration of fraction C was analyzed using L-N-methyl arginine (LNMMA). This pharmacological agent inhibits the formation of No by inhibiting NO synthase. L-NMMA was administered at the dose of 1 mg/kg, ten minutes prior to injection of the cocoa procyanidin fractions. As shown in FIG. 52, treatment of the animals with L-NMMA completely blocked the hypotension evoked by the procyanidin fraction C. Indeed, following treatment with this inhibitor, the alterations of blood pressure produced by fraction C were similar to those noted with solvent alone. Example 32 Effect of Cocoa Procyanidin Fractions on NO Production in Human Umbilical Vein Endothelial Cells Human umbilical vein endothelial cells (HUVEC) were obtained from Clonetics and cultures were carried out according to the manufacturer's specifications. HUVEC cells were seeded at 5,000 cells/cm2 in 12-well plates (Falcon). After the third passage under the same conditions, they were allowed to reach confluence. The supernatant was renewed with fresh medium containing defined concentrations of bradykinin (25, 50 and 100 nM) or cocoa procyanidin fractions A-E (100 μg/mL) as described in example 31. The culture was continued for 24 hr. and the cell free supernatants were collected and stored frozen prior to assessment of NO content as described below. In selected experiments, the NO synthase (NOS) antagonist, Nw-nitro-L-arginine methyl ester (L-NAME, 10 μM) was added to assess the involvement of NOS in the observed NO production. HUVEC NO production was estimated by measuring nitrite concentration in the culture supernatant by the Griess reaction. Griess reagent was 1% sulfanilamide, 0.1% N-(1-naphthyl)-ethylenediamine dihydrochloride. Briefly, 50 μL aliquots were removed from the various supernatants in quadruplicate and incubated with 150 μL of the Griess reagent. The absorbency at 540 nm was determined in a multiscan (Labsystems Multiskans MCC/340) apparatus. Sodium nitrite was used at defined concentrations to establish standard curves. The absorbency of the medium without cells (blank) was subtracted from the value obtained with the cell containing supernatants. FIG. 53 illustrates the effect of bradykinin on NO production by HUVEC where a dose dependent release of NO was observed. The inhibitor L-NAME completely inhibited the bradykinin induced NO release. FIG. 54 illustrates the effect of the cocoa procyanidin fractions on NO production by HUVEC cells. Fractions B, C and D induced a moderate but significant amount of NO production by HUVEC. By far, Fraction C was the most efficient fraction to induce NO formation as assessed by the production of nitrites, while Fraction E was nearly ineffective. The effect of Fraction C on NO production was dramatically reduced in the presence of L-NAME. Interestingly, Fractions B, C and D contained higher amounts of procyanidin oligomers than Fractions A and E. A distinguishing difference between Fractions D and E was that E was prepared from a dark chocolate which used alkalized cocoa liquor as part of the chocolate recipe. Alkalization leads to a base catalyzed polymerization of procyanidins which rapidly depletes the levels of these compounds. An analytical comparison of procyanidin levels found in these types of chocolate appear in the Table 12, where Brand 12 is a dark chocolate prepared with alkalized cocoa liquor and Brand 11 is a typical milk chocolate. Thus, extracts obtained from milk chocolates contain high proportions of procyanidin oligomers which are capable of inducing NO. The addition of the NO inhibitor L-NMMA to the Fraction C sample clearly led to the inhibition of NO. The results obtained from the procyanidin fractions were consistent to those observed with the bradykinin induced NO experiment (see FIG. 53). As in the case of the HUVEC results, cocoa procyanidin fraction C elicited a major hypotensive effect in guinea pigs, whereas fractions A and E were the least effective. Again, the presence of high molecular weight procyanidin oligomers were implicated in the modulation of NO production. Example 33 Effect of Cocoa Procyanidin Fractions on Macrophage No Production Fresh, human heparinized blood (70 mL) was added with an equal volume of phosphate buffer saline (PBS) at room temperature. A Ficoll-Hypaque solution was layered underneath the blood-PBS mixture using a 3 mL Ficoll-Hypaque to 10 mL blood-PBS dilution ratio. The tubes were centrifuged for 30 minutes at 2,000 rpm at 18-20° C. The upper layer containing plasma and platelets was discarded. The mononuclear cell layer was transferred to another centrifuge tube and the cells were washed 2× in Hanks balanced saline solution. The mononuclear cells were resuspended in complete RPMI 1640 supplemented with 10% fetal calf serum, counted and the viability determined by the trypan blue exclusion method. The cell pellet was resuspended in complete RPMI 1640 supplemented with 20% fetal calf serum to a final concentration of 1×106 cells/mL. Aliquots of the cell suspension were plated into a 96 well culture plate and rinsed 3× with RPMI 1640 supplemented with 10% fetal calf serum and the nonadherent cells (lymphocytes) were discarded. These cells were incubated for 48 hours in the presence or absence of five procyanidin fractions described in Example 31. At the end of the incubation period, the culture media were collected, centrifuged and cell free supernatants were stored frozen for nitrate assay determinations. Macrophage NO production was determined by measuring nitrite concentrations by the Greiss reaction. Greiss reagent was 1% sulfanilamide, 0.1% N-(1-naphthyl)-ethylenediamine dihydrochloride. Briefly, 50 μL aliquots were removed from the supernatants in quadruplicate and incubated with 150 μL of the Greiss reagent. The absorbency at 540 nm was determined in a multiscan (Labsystems Multiskans MCC/340) apparatus. Sodium nitrite was used at defined concentrations to establish standard curves. The absorbency of the medium without cells (blank) was subtracted from the value obtained with the cell containing supernatants. In a separate experiment, macrophages were primed for 12 hours in the presence of 5U/mL gamma-interferon and then stimulated with 10 g/mL LPS for the next 36 hours in the presence or absence of 100 μg/mL of the five procyanidin fractions. FIG. 55 indicates that only procyanidin fraction C, at 100 μg/mL, could induce NO production by monocytes/macrophages. Basal NO production by these cells was undetectable and no nitrite could be detected in any of the cocoa procyanidin fractions used at 100 μg/mL. FIG. 56 indicates that procyanidin fractions A and D enhanced LPS-induced No production by T-interferon primed monocytes/macrophages. Procyanidin fraction C was marginally effective, since LPS-stimulated monocytes/macrophages cultured in the absence of procyanidin fractions produced only 4 μmole/105 cells/48 hours. T-Interferon alone was ineffective in inducing NO. Collectively, these results demonstrate that mixtures of the inventive compounds used at specific concentrations are capable of inducing monocyte/macrophage NO production both independent and dependent of stimulation by LPS or cytokines. From the foregoing, it is clear that the extract and cocoa polyphenols, particularly the inventive compounds, as well as the compositions, methods, and kits, of the invention have significant and numerous utilities. The antineoplastic utility is clearly demonstrated by the in vivo and in vitro data herein and shows that inventive compounds can be used instead of or in conjunction with conventional antineoplastic agents. The inventive compounds have antioxidant activity like that of BHT and BHA, as well as oxidative stability. Thus, the invention can be employed in place of or in conjunction with BHT or BHA in known utilities of BHA and BHT, such as an antioxidant, for instance, an antioxidant; food additive. The invention can also be employed in place of or in conjunction with topoisomerase II-inhibitors in the presently known utilities therefor. The inventive compounds can be used in food preservation or preparation, as well as in preventing or treating maladies of bacterial origin. Simply the inventive compounds can be used as an antimicrobial. The inventive compounds can also be used as a cyclo-oxygenase and/or lipoxygenase, NO or NO-synthase, or blood or in vivo glucose modulator, and are thus useful for treatment or prevention or modulation of pain, fever, inflammation coronary conditions, ulceration, carcinogenic mechanisms, vasodilation, as well as an analgesic, anti-coagulant anti-inflammatory and an immune response modulator. Further, the invention comprehends the use of the compounds or extracts as a vehicle for pharmaceutical preparations. Accordingly, there are many compositions and methods envisioned by the invention. For instance, antioxidant or preservative compositions, topoisomerase II-inhibiting compositions, methods for preserving food or any desired item such as from oxidation, and methods for inhibiting topoisomerase II. The compositions can comprise the inventive compounds. The methods can comprise contacting the food, item or topoisomerase II with the respective composition or with the inventive compounds. Other compositions, methods and embodiments of the invention are apparent from the foregoing. In this regard, it is mentioned that the invention is from an edible source and, that the activity in vitro can demonstrate at least some activity in vivo; and from the in vitro and in vivo data herein, doses, routes of administration, and formulations can be obtained without undue experimentation Example 34 Micellar Electrokinetic Capillary Chromatography of Cocoa Procyanidins A rapid method was developed using micellar electrokinetic capillary chromatography (MECC) to separate procyanidin oligomers. The method is a modification of that reported by Delgado et ai., 1994. The MECC method requires only 12 minutes to achieve the same separation as that obtained by a 70 minute normal phase HPLC analysis. FIG. 57 represents a MECC separation of cocoa procyanidins obtained by Example 2. MECC Conditions: The cocoa procyanidin extract was prepared by the method described in Example 2 and dissolved at a concentration of 1 mg/mL in MECC buffer consisting of 200 mM boric acid, 50 mM sodium dodecyl sulfate (electrophoresis pure) and NaOH to adjust to pH=8.5. The sample was passed through a 0.45 um filter and electrophoresed using a Hewlett Packard HP-3D CZE System operated at the following conditions: Inlet buffer: Run buffer as described above Outlet buffer: Run buffer as described above Capillary: 50 cm × 75 um i.d. uncoated fused silica Detection: 200 nm, with Diode Array Detector Injection: 50 mBar for 3 seconds (150 mBar sec) Voltage: 6 watts Amperage: System limit (<300 uA) Temperature: 25° C. Capillary Condition: 5 min flush with run buffer before and after each run. This method can be modified by profiling temperature, pressure, and voltage parameters, as well as including organic modifiers and chiral selective agents in the run buffer. Example 35 MALDI-TOF/MS Analysis of Procyanidin Oligomers with Metal Salt Solutions A series of MALDI-TOF/MS analyses were performed on trimers combined with various metal salt solutions to determine whether cation adducts of the oligomer could be detected. The significance of the experiment was to provide evidence that the procyanidin oligomers play a physiological role in vitro and in vivo by sesquestering or delivering metal cations important to physiological processes and disease. The method used was as described in Example 15. Briefly, 2 uL of 10 mM solutions of zinc sulfate dihydrate, calcium chloride, magnesium sulfate, ferric chloride hexahydrate, ferrous sulfate heptahydrate, and cupric sulfate were individually combined with 4 uL of a trimer (10 mg/mL) purified to apparent homogeneity as described in Example 14, and 44 uL of DHB added. The results (FIGS. 58A-F) showed [Metal-Trimer+H]+ ions for copper and iron (ferrous and ferric) whose m/z values matched ±1 amu standard deviation value for the theoretical calculated masses. The [Metal-Trimer+H]+ masses for calcium and magnesium could not be unequivocally resolved from the [Metal-Trimer+H]+ masses for sodium and potassium, whose m/z values were within the ±1 amu standard deviation values. No [Zn+2−Trimer+H]+ ion could be detected. Since some of these cations are multi-valent, the possibility for multimetal-oligomer(s) ligand species and/or metal-multioligomer species were possible. However, scanning for these adducts at their predicted masses proved unsuccessful. The results shown above for copper, iron, calcium, magnesium and zinc may be used as general teachings for subsequent analysis of the reaction between other metal ions and the inventive compounds, taking into account such factors as oxidation state and the relative position in the periodic table of the ion in question. Example 36 MALDI-TOF/MS Analysis of High Molecular Weight Procyanidin Oligomers An analytical examination was made on GPC eluants associated with high molecular weight procyanidin oligomers as prepared in Example 3, Method A. The objective was to determine whether procyanidin oligomers with n>12 were present. If present, these oligomers represent additional compounds of the invention. Adjustments to existing methods of isolation, separation and purification embodied in the invention can be made to obtain these oligomers for subsequent in vitro and in vivo evaluation for anti-cancer, anti-tumor or antineoplastic activity, antioxidant activity, inhibit DNA topoisomerase II enzyme, inhibit oxidative damage to DNA, and have antimicrobial, NO or NO-synthase, apoptosis, platelet aggregation, and blood or in vivo glucose modulating activities, as well as efficacy as non-steroidal antiinflammatory agents. FIG. 59 represents a MALDI-TOF mass spectrum of the GPC eluant sample described above. The [M+Na]+ and/or [M+K]+ and/or [M+2Na]+ ions characterizing procyanidin oligomers representative of tetramers through octadecamers are clearly evident. It was learned that an acid and heat treatment will cause the hydrolysis of procyanidin oligomers. Therefore, the invention comprehends the controlled hydrolysis of high molecular weight procyanidin oligomers (e.g. where n is 13 to 18) as a method to prepare lower molecular weight procyanidin oligomers (e.g. where n is 2 to 12). Example 37 Dose Response Relationships of Procyanidin Oligomers and Canine and Feline Cell Lines The dose respone effects of procyanidin oligomers were evaluated against several canine and feline cell lines obtained from the Waltham Center for Pet Nutrition, Waltham on-the-Wolds, Melton Mowbray, Leicestershire, U.K. These cell lines were Canine normal kidney GH cell line; Canine normal kidney MDCK cell line; Feline normal kidney CRFK cell line; and Feline lymphoblastoid FeA cell line producing leukemia virus which were cultured under the conditions described in Example 8, Method A. Monomers and procyanidin oligomers, where n is 2 to 10 were purified as described in Example 14, Method D. The oligomers were also examined by analytical normal phase HPLC as described in Example 14, Method C, where the following results were obtained. Procyanidin % Purity by HPLC Monomers 95.4 Dimers 98.0 Trimers 92.6 Tetramers 92.6 Pentamers 93.2 Hexamers 89.2 (Contains 4.4% pentamers) Heptamers 78.8 (Contains 18.0% hexamers) Octamers 76.3 (contains 16.4% heptamers) Nonamers 60.3 (Contains 27.6% octamers) Decamers 39.8 (Contains 22.2% nonamers, 16.5% octamers, and 13.6% heptamers) In those cases where the purity of the oligomer is <90%, methods embodied in the invention are used for their repurification. Each cell line was dosed with monomers and each procyanidin oligomer at 10 ug/mL, 50 ug/mL and 100 ug/mL and the results shown in FIGS. 60-63. As shown in the Figures, high dose (100 ug/mL) administration of individual oligomers produced similar inhibitory effects on the feline FeA lymphoblastoid and feline normal kidney CRFK cell lines. In these cases, cytotoxicity appeared with the tetramer, and increasingly higher oligomers elicited increasingly higher cytotoxic effects. By contrast, high dose (100 ug/mL) administration of individual oligomers to canine GH and MDCK normal kidney cell lines required a higher oligomer to initiate the appearance of cytotoxicity. For the canine GH normal kidney cell line, cytotoxicity appeared with the pentamer. For the canine MDCK normal kidney cell line, cytotoxicity appeared with the hexamer. In both of these cases, the administration of higher oligomers produced increasing levels of cytotoxicity. Example 38 Tablet Formulations A tablet formulation was prepared using cocoa solids obtained by methods described in U.S. application Ser. No. 08/709,406 filed 6 Sep. 1996, hereby incorporated herein by reference. Briefly, this edible material is prepared by a process which enhances the natural occurrence of the compounds of the invention in contrast to their levels found in traditionally processed cocoa, such that the ratio of the initial amount of the compounds of the invention found in the unprocessed bean to that obtained after processing is less than or equal to 2. For simplicity, this cocoa solids material is designated herein as CP-cocoa solids. The inventive compound or compounds, e.g., in isolated and/or purified form may be used in tablets as described in this Example, instead of or in combination with CP-cocoa solids. A tablet formula comprises the following (percentages expressed as weight percent): CP-cocoa solids 24.0% 4-Fold Natural vanilla extract 1.5% (Bush Boake Allen) Magnesium stearate 0.5% (dry lubricant) (AerChem, Inc.) Dipac tabletting sugar 37.0% (Amstar Sugar Corp.) Xylitol (American Xyrofin, Inc.) 37.0% 100.0% The CP-cocoa solids and vanilla extract are blended together in a food processor for 2 minutes. The sugars and magnesium stearate are gently mixed together, followed by blending in the CP-cocoa solids/vanilla mix. This material is run through a Manesty Tablet Press (B3B) at maximum pressure and compaction to produce round tablets (15 mm×5 mm) weighing 1.5-1.8 gram. Another tablet of the above mentioned formula was prepared with a commercially available low fat natural cocoa powder (11% fat) instead of the CP-cocoa solids (11% fat). Both tablet formulas produced products having acceptable flavor characteristics and texture attributes. An analysis of the two tablet formulas was performed using the procedures described in Example 4, Method 2. In this case, the analysis focused on the concentration of the pentamer and the total level of monomers and compounds of the invention where n is 2 to 12 which are reported below. pentamer total Tablet pentamer total (ug/1.8 g (ug/1.8 g sample (ug/g) (ug/g) serving) serving) tablet with CP- 239 8,277 430 14,989 cocoa solids tablet with ND 868 ND 1563 commercial low fat cocoa powder ND = not detected The data clearly showed a higher level of pentamer and total level of compounds of the invention in the CP-cocoa solids tablet than in the other tablet formula. Thus, tablet formulas prepared with CP-cocoa solids are an ideal delivery vehicle for the oral administration of compounds of the invention, for pharmaceutical, supplement and food applications. The skilled artisan in this area can readily prepare other tablet formulas covering a wide range of flavors, colors, excipients, vitamins, minerals, OTC medicaments, sugar fillers, UV protectants (e.g., titanium dioxide, colorants, etc.), binders, hydrogels, and the like except for polyvinyl pyrrolidone which would irreversibly bind the compounds of the invention or combination of compounds. The amount of sugar fillers may be adjusted to manipulate the dosages of the compounds of the invention or combination of compounds. Many apparent variations of the above are self-evident and possible without departing from the spirit and scope of the example. Example 39 Capsule Formulations A variation of Example 38 for the oral delivery of the compounds of the invention is made with push-fit capsules made of gelatin, as well as soft sealed capsules made of gelatin and a plasticizer such as glycerol. The push-fit capsules contain the compound of the invention or combination of compounds or CP-cocoa solids as described in Examples 38 and 40 in the form of a powder which can be optionally mixed with fillers such as lactose or sucrose to manipulate the dosages of the compounds of the invention. In soft capsules, the compound of the invention or combination of compounds or CP-cocoa solids are suspended in a suitable liquid such as fatty oils or cocoa butter or combinations therein. Since an inventive compound or compounds may be light-sensitive, e.g., sensitive to UV, a capsule can contain UV protectants such as titanium dioxide or suitable colors to protect against UV. The capsules can also contain fillers such as those mentioned in the previous Example. Many apparent variations of the above are self-evident and possible to one skilled in the art without departing from the spirit and scope of the example. Example 40 Standard of Identity (SOI) and Non-Standard of Identity (Non-SOI) Dark and Milk Chocolate Formulations Formulations of the compounds of the invention or combination of compounds derived by methods embodied in the invention can be prepared into SOI and non-SOI dark and milk chocolates as a delivery vehicle for human and veterinary applications. Reference is made to copending U.S. application Ser. No. 08/709,406, filed Sep. 6, 1996, hereby incorporated herein by reference. U.S. Ser. No. 08/709,406 relates to a method of producing cocoa butter and/or cocoa solids having conserved levels of the compounds of the invention from cocoa beans using a unique combination of processing steps. Briefly, the edible cocoa solids obtained by this process conserves the natural occurrence of the compounds of the invention in contrast to their levels found in traditionally processed cocoa, such that the ratio of the initial amount of the compounds of the invention found in the unprocessed bean to that obtained after processing is less than or equal to 2. For simplicity, this cocoa solids material is designated herein as CP-cocoa solids. The CP-cocoa solids are used as a powder or liquor to prepare SOI and non-SOI chocolates, beverages, snacks, baked goods, and as an ingredient for culinary applications. The term “SOI chocolate” as used herein shall mean any chocolate used in food in the United States that is subject to a Standard of Identity established by the U.S. Food and Drug Administration under the Federal Food, Drug and Cosmetic Act. The U.S. definitions and standards for various types of chocolate are well established. The term “non-SOI chocolate” as used herein shall mean any nonstandardized chocolates which have compositions which fall outside the specified ranges of the standardized chocolates. Examples of nonstandardized chocolates result when the cocoa butter or milk fat are replaced partially or completely; or when the nutrative carbohydrate sweetener is replaced partially or completely; or flavors imitating milk, butter, cocoa powder, or chocolate are added or other additions or deletions in the formula are made outside the U.S. FDA Standards of Identity for chocolate or combinations thereof. As a confection, chocolate can take the form of solid pieces of chocolate, such as bars or novelty shapes, and can also be incorporated as a component of other, more complex confections where chocolate is optionally combined with any Flavor & Extract Manufacturers Association (FEMA) material, natural juices, spices, herbs and extracts categorized as natural-flavoring substances; nature-identical substances; and artificial flavoring substances as defined by FEMA GRAS lists, FEMA and FDA lists, Council of Europe (CoE) lists, International Organization of the Flavor Industry (IOFI) adopted by the FAO/WHO Food Standard Programme, Codex Alimentarius, and Food Chemicals Codex and generally coats other foods such as caramel, nougat, fruit pieces, nuts, wafers or the like. These foods are characterized as microbiologically shelf-stable at 65-85° F. under normal atmospheric conditions. Other complex confections result from surrounding with chocolate soft inclusions such as cordial cherries or peanut butter. Other complex confections result from coating ice cream or other frozen or refrigerated desserts with chocolate. Generally, chocolate used to coat or surround foods must be more fluid than chocolates used for plain chocolate solid bars or novelty shapes. Additionally, chocolate can also be a low fat chocolate comprising a fat and nonfat solids, having nutrative carbohydrate sweetener(s), and an edible emulsifier. As to low fat chocolate, reference is made to U.S. Pat. Nos. 4,810,516, 4,701,337, 5,464,649, 5,474,795, and WO 96/19923. Dark chocolates derive their dark color from the amount of chocolate liquor, or alkalized liquor or cocoa solids or alkalized cocoa solids used in any given formulation. However, the use of alkalized cocoa solids or liquor would not be used in the dark chocolate formulations in the invention, since Example 27, Table 13 teaches the loss of the compounds of the invention due to the alkalization process. Examples of formulations of SOI and non-SOI dark and milk chocolates are listed in Tables 16 and 17. In these formulations, the amount of the compounds of the invention present in CP-cocoa solids was compared to the compounds of the invention present in commercially available cocoa solids. The following describes the processing steps used in preparing these chocolate formulations. Process for Non-SOI Dark Chocolate 1. Keep all mixers and refiners covered throughout process to avoid light. 2. Batch all the ingredients excluding 40% of the free fat (cocoa butter and anhy. milk fat) maintaining temperature between 30-35° C. 3. Refine to 20 microns. 4. Dry conche for 1 hour at 35° C. 5. Add full lechithin and 10% cocoa butter at the beginning of the wet conche cycle; wet conche for 1 hour. 6. Add all remaining fat, standardize if necessary and mix for 1 hour at 35° C. 7. Temper, mould and package chocolate. Process for SOI Dark Chocolate 1. Batch all ingredients excluding milk fat at a temperature of 60° C. 2. Refine to 20 microns. 3. Dry conche for 3.5 hours at 60° C. 4. Add lecithin and milk fat and wet conche for 1 hour at 60° C. 5. Standardize if necessary and mix for 1 hour at 35° C. Temper, mould and package chocolate. Process for Non-SOI Milk Chocolate 1. Keep all mixers and refiners covered throughout process to avoid light. 2. Batch sugar, whole milk powder, malted milk powder, and 66% of the cocoa butter, conche for 2 hours at 75° C. 3. Cool batch to 35° C. and add cocoa powder, ethyl vanillin, chocolate liquor and 21% of cocoa butter, mix 20 minutes at 35° C. 4. Refine to 20 microns. 5. Add remainder of cocoa butter, dry conche for 1.5 hour at 35° C. 6. Add anhy. milk fat and lecithin, wet conche for 1 hour at 35° C. 7. Standardize, temper, mould and package the chocolate. Process for SOI Milk Chocolate 1. Batch all ingredients excluding 65% of cocoa butter and milk fat at a temperature of 60° C. 2. Refine to 20 microns. 3. Dry conche for 3.5 hours at 60° C. 4. Add lecithin, 10% of cocoa butter and anhy. milk fat; wet conche for 1 hour at 60° C. 5. Add remaining cocoa butter, standardize if necessary and mix for 1 hour at 35° C. 6. Temper, mould and package the chocolate. The CP-cocoa solids and commercial chocolate liquors used in the formulations were analyzed for the pentamer and total level of monomers and compounds of the invention where n is 2 to 12 as described in Method 2, Example 4 prior to incorporation in the formulations. These values were then used to calculate the expected levels in each chocolate formula as shown in Tables 16 and 17. In the cases for the non-SOI dark chocolate and non-SOI milk chocolate, their products were similarly analyzed for the pentamer, and the total level of monomers and the compounds of the invention where n is 2 to 12. The results appear in Tables 16 and 17. The results from these formulation examples indicated that SOI and non-SOI dark and milk chocolates formulated with CP-cocoa solids contained approximately 6.5 times more expected pentamer, and 3.5 times more expected total levels in the SOI and non-SOI dark chocolates; and approximately 4.5; 7.0 times more expected pentamer and 2.5; 3.5 times more expected total levels in the SOI and non-SOI milk chocolates, respectively. Analyses of some of the chocolate products were not performed since the difference between the expected levels of the compounds of the invention present in finished chocolates prepared with CP-cocoa solids were dramatically higher than those formulas prepared with commercially available cocoa solids. However, the effects of processing was evaluated in the non-SOI dark and milk chocolate products. As shown in the tables, a 25-50% loss of the pentamer occurred, while slight differences in total levels were observed. Without wishing to be bound by any theory, it is believed that these losses are due to heat and/or low chain fatty acids from the milk ingredient (e.g. acetic acid, propionic acid and butyric acid) which can hydrolyze the oligomers (e.g. a trimer can hydrolyze to a monomer and dimer). Alternatively, time consuming processing steps can allow for oxidation or irreversible binding of the compounds of the invention to protein sources within the formula. Thus, the invention comprehends altering methods of chocolate formulation and processing to address these effects to prevent or minimize these losses. The skilled artisan will recognize many variations in these examples to cover a wide range of formulas, ingredients, processing, and mixtures to rationally adjust the naturally occurring levels of the compounds of the invention for a variety of chocolate applications. TABLE 16 Dark Chocolate Formulas Prepared with non-Alkalized Cocoa Ingredients Non-SOI Dark Chocolate Using CP-cocoa SOI Dark Chocolate Using Commercial Cocoa solids SOI Dark Chocolate Using CP-Cocoa Solids Solids Formulation: Formulation: Formulation: 41.49% Sugar 41.49% sugar 41.49% sugar 3% whole milk powder 3% whole milk powder 3% whole milk powder 26% CP-cocoa solids 52.65% CP-liquor 52.65% com. liquor 4.5% com. liquor 2.35% anhy. milk fat 2.35% anhy. milk fat 21.75% cocoa butter 0.01% vanillin 0.01% vanillin 2.75% anhy. milk fat 0.5% lecithin 0.5% lecithin 0.01% vanillin 0.5% lecithin Total fat: 31% Total fat: 31% Total fat: 31% Particle size: 20 microns Particle size: 20 microns Particle size: 20 microns Expected Levels of pentamer and total oligomeric procyanidins (monomers and n = 2-12; units of ug/g) Pentamer: 1205 Pentamer: 1300 Pentamer: 185 Total: 13748 Total: 14646 Total: 3948 Actual Levels of pentamer and total oligomeric procyandins (monomers and n = 2-12; units of ug/g) Pentamer: 561 Not performed Not performed Total: 14097 TABLE 17 Milk Chocolate Formulas Prepared with non-Alkalized Cocoa Ingredients Non-SOI Milk Chocolate Using CP-cocoa SOI Milk Chocolate Using Commercial Cocoa solids SOI Milk Chocolate Using CP-Cocoa Solids Solids Formulation: Formulation: Formulation: 46.9965% Sugar 46.9965% sugar 46.9965% sugar 15.5% whole milk powder 15.5% whole milk powder 15.5% whole milk powder 4.5% CP-cocoa solids 13.9% CP-liquor 13.9% com. liquor 5.5% com. liquor 1.6% anhy. milk fat 1.60% anhy. milk fat 21.4% cocoa butter 0.0035% vanillin 0.0035% vanillin 1.6% anhy. milk fat 0.5% lecithin 0.5% lecithin 0.035% vanillin 17.5% cocoa butter 17.5% cocoa butter 0.5% lecithin 4.0% malted milk powder 4.0% malted milk powder 4.0% malted milk powder Total fat: 31.75% Total fat: 31.75% Total fat: 31.75% Particle size: 20 microns Particle size: 20 microns Particle size: 20 microns Expected Levels of pentamer and total oligomeric procyanidins (monomers and n = 2-12; units of ug/g) Pentamer: 225 Pentamer: 343 Pentamer: 49 Total: 2734 Total: 3867 Total: 1042 Actual Levels of pentamer and total oligomeric procyandins (monomers and n = 2-12; units of ug/g) Pentamer: 163 Not performed Not performed Total: 2399 Example 41 Hydrolysis of Procyanidin Oligomers Example 14, Method D describes the preparation normal phase HPLC procedure to purify the compounds of the invention. The oligomers are obtained as fractions dissolved in mobile phase. Solvent is then removed by standard vacuum distillation (20-29 in. Hg: 40° C.) on a Rotovap apparatus. It was observed that losses of a particular oligomer occurred with increases in smaller oligomers when the vacuum distillation residence time was prolonged or temperatures >40° C. were used. The losses of a particular oligomer with accompanying increases in smaller oligomers was attributed to a time-temperature acid hydrolysis from residual acetic acid present in the mobile phase solvent mixture. This observation was confirmed by the following experiment where 100 mg of hexamer was dissolved in 50 mL of the mobile phase containing methylene chloride, acetic acid, water, and methanol (see Example 14, Method D for solvent proportions) and subjected to a time-temperature dependent distillation. At specific times, an aliquot was removed for analytical normal phase HPLC analysis as described in Example 4, Method 2. The results are illustrated in FIGS. 64 and 65, where hexamer levels decreased in a time-temperature dependent fashion. FIG. 65 illustrates the appearance of one of the hydrolysis products (Trimer) in a time-temperature dependent fashion. Monomer and other oligomers (dimer to pentamer) also appeared in a time-temperature dependent fashion. These results indicated that extreme care and caution must be taken during the handling of the inventive polymeric compounds. The results provided above, together with that found in Examples 5, 15, 18, 19, 20 and 29, demonstrate that the method described above can be used to complement other methods embodied in the invention to identify any given oligomer of the invention. For instance, the complete hydrolysis of any given oligomer which yields exclusively (+)-catechin or (−)-epicatechin eliminates many “mixed” monomer-based oligomer structure possibilities and reduces the stereochemical linkage possibilities characteristic for each monomer comprising any given oligomer. Further, the complete hydrolysis of any given oligomer which yields both (+)-catechin and (−)-epidatechin in specific proportions provides the skilled artisan with information on the monomer composition of any given oligomer, and hence, the stereochemical linkage possibilities characteristic for each monomer comprising the oligomer. The skilled artisan would recognize the fact that acid catalyzed epimerization of individual monomers can occur and suitable control experiments and nonvigorous hydrolysis conditions should be taken into account (e.g., the use of an organic acids, such as acetic acid, in lieu of concentrated HCl, HNO3, etc). Having thus described in detail the preferred embodiments of the present invention, it is to be understood that the invention defined by the appended claims is.not to be limited by particular details set forth in the above descriptions as many apparent variations thereof are possible without departing from the spirit or scope of the present invention. REFERENCES 1. Barrows, L. R., Borchers, A. H., and Paxton, M. B., Transfectant CHO Cells Expressing 06—alkylguanine—DNA-alkyltransferase Display Increased Resistance to DNA Damage Other than O6-guanine Alkylation, Carcinogenesis, 8:1853 (1987). 2. Boukharta, M., Jalbert, G. and Castonguay, A., Efficacy of Ellagitannins and Ellagic Acid as Cancer Chemopreventive Agents—Presented at the XVIth International Conference of the Groupe Polyphenols, Lisbon, Portugal, Jul. 13-16, 1992. 3. Burres, N. S., Sazesh, J., Gunawardana, G. P., and Clement, J. J., Antitumor Activity and Nucleic Acid Binding Properties of Dercitin, a New Acridine Alkaloid Isolated from a Marine Dercitus species Sponge, Cancer Research, 49, 5267-5274 (1989). 4. Caragay, A. B., Cancer Preventive Foods and Ingredients, Food Technology, 46:4, 65-79 (1992). 5. Chu, S. -C., Hsieh, Y. -S. and Lim, J. -Y., Inhibitory Effects of Flavonoids on Maloney Murine Leukemia Virus Reverse Transcriptase Activity, J. of Natural Products, 55:2, 179-183 (1992). 6. Clapperton, J., Hammerstone, J. F. Jr., Romanczyk, L. J. Jr., Chan, J., Yow, S., Lim, D. and Lockwood, R., Polyphenols and Cocoa Flavor—Presented at the XVIth International Conference of the Groupe Polyphenols, Lisbon, Portugal, Jul. 13-16, 1992. 7. Danks, M. K., Schmidt, C. A., Cirtain, M. C., Suttle, D. P., and Beck, W. T., Altered Catalytic Activity of and DNA Cleavage by DNA Topoisomerase II from Human Leukemic Cells Selected for Resistance to VM-26, Biochem., 27:8861 (1988). 8. Delcour, J. A., Ferreira, D. and Roux, D. G., Synthesis of Condensed Tannins, Part 9, The Condensation Sequence of Leucocyanidin with (+)-Catechin and with the Resultant Procyanidins, J. Chem. Soc. Perkin Trans. I, 1711-1717 (1983). 9. Deschner, E. E., Ruperto, J., Wong, G. and Newmark, H. L., Quercetin and Rutin as Inhibitors of Azoxymethanol—Induced Colonic Neoplasia, Carcinogenesis, 7, 1193-1196 (1991). 10. Designing Foods, Manipulating Foods to Promote Health, Inform, 4:4, 344-369 (1993). 11. Drake, F. H., Hofmann, G. A., Mong., S. -M., Bartus, J. O., Hertzberg, R. P., Johnson, R. K., Mattern, M. R., and Mirabelli, C. K., in vitro and Intercellular Inhibition of Topoisomerase II by the Antitumor Agent Membranone, Cancer Research, 49, 2578-2583 (1989). 12. Engels J. M. M., Genetic Resources of Cacao: A Catalogue of the CATIE Collection, Tech. Bull. 7, Turrialba, Costa Rica (1981). 13. Enriquez G. A. and Soria J. V., Cocoa Cultivars Register IICA, Turrialba, Cost Rica (1967). 14. Ferreira, D., Steynberg, J. P., Roux, D. G. and Brandt, E. V., Diversity of Structure and Function in oligomeric Flavanoids, Tetrahedron, 48:10, 1743-1803 (1992). 15. Fesen, M. and Pommier, Y., Mammalian Topoisomerase II Activity is Modulated by the DNA Minor Groove Binder—Distainycin in Simian Virus 40 DNA, J. Biol. Chem., 264, 11354-11359 (1989). 16. Fry, D. W., Boritzki, T. J., Besserer, J. A., and Jackson, R. C., in vitro Strand Scission and Inhibition of Nucleic Acid Synthesis on L1210 Leukemia Cells by a New Class of DNA Complexes, the anthra [1, 9-CD]pyrazol-6(2H)-ones (anthrapyrazoles), Biochem. Pharmacol., 34, 3499-3508 (1985). 17. Hsiang, Y. -H., Jiang, J. B., and Liu, L. F., Topoisomerase II Mediated DNA Cleavage by Amonafide and Its Structural Analogs, Mol. Pharmacol., 36, 371-376 (1989). 18. Jalal, M. A. F. and Collin, H. A., Polyphenols of Mature Plant, Seedling and Tissue Cultures of Theobroma Cacoa, Phytochemistry, 6, 1377-1380 (1978). 19. Jeggo, P. A., Caldecott, K., Pidsley, S., and Banks, G. R., Sensitivity of Chinese Hamster Ovary Mutants Defective in DNA Double Strand Break Repair to Topoisomerase II Inhibitors, Cancer Res., 49:7057 (1989). 20. Kashiwada, Y., Nonaka, G. -I., Nishioka, I., Lee, K. J. -H., Bori, I., Fukushima, Y., Bastow, K. F., and Lee, K. -H., Tannin as Potent Inhibitors of DNA Topoisomerase II in vitro, J. Pharm. Sci., 82:5, 487-492 (1993). 21. Kato, R., Nakadate, T., Yamamoto, S. and Sugimura, T., Inhibition of 12-O-tetradecanoylphorbol-13-acetate Induced Tumor Promotion and Ornithine Decarboxylase Activity by Quercitin: Possible Involvement of Lipoxygenase Inhibition, Carcinogenesis, 4, 1301-1305 (1983). 22. Kawada, S. -Z., Yamashita, Y., Fujii, N. and Nakano, H., Induction of Heat Stable Topoisomerase II-DNA Cleavable Complex by Nonintercalative Terpenoids, Terpentecin and Clerocidin, Cancer Research, 51, 2922-2929 (1991). 23. Kemp, L. M., Sedgwick, S. G. and Jeggo, P. A., X-ray Sensitive Mutants of Chinese Hamster Ovary Cells Defective in Double Strand Break Rejoining, Mutat. Res., 132:189 (1984). 24. Kikkoman Corporation, Antimutagenic Agent Containing Proanthocyanidin Oligomer Preferably Having Flavan-3-ol-Diol Structure, JP 04190774-A, Jul. 7, 1992. 25. Lehrian, D. W.; Patterson, G. R. In Biotechnology; Reed, G., Ed.; Verlag Chemie: Weinheim, 1983, Vol.5, Chapter 12. 26. Leonessa, F., Jacobson, M., Boyle, B., Lippman, J., McGarvey, M., and Clarke, R. Effect of Tamoxifen on the Multidrug-Resistant Phenotype in Human Breast Cancer Cells: Isobolograms, Drug Accumulation, and Mr 170,000 Glycoprotein (gp 170) Binding Studies, Cancer Research, 54, 441-447 (1994). 27. Liu, L. F., DNA Toposimerase Poisons as Antitumor Drugs, Ann.. Rev. Biochem., 58, 351-375 (1989). 28. McCord, J. D. and Kilara A. Control of Enzymatic Browning in Processed Mushrooms (Agaricus bisporus). J. Food Sci., 48:1479 (1983). 29. Miller, K. G., Liu, L. F. and Englund, P. A., Homogeneous Type II DNA Topoisomerase from Hela Cell Nuclei, J. Biol. Chem., 256:9334 (1981). 30. Mosmann, T., Rapid Colorimetric Assay for Cellular Growth and Survival: Application to Proliferation and Cytoxicity Assays, J. Immunol. Methods, 65, 55 (1983). 31. Muller, M. T., Helal, K., Soisson, S. and Spitzer, J. R., A Rapid and Quantitative Microtiter Assay for Eukaryotic Topoisomerase II, Nuc. Acid Res., 17:9499 (1989). 32. Nawata, H., Chong, M. T., Bronzert, D. and Lippman, M. E. Estradiol-Independent growth of a Subline of MCF-7 Human Breast Cancer Cells in Culture, J. Biol. Chem., 256:13, 6895-6902 (1981). 33. Okuda, T., Yoshida, T., and Hatano, T., Molecular Structures and Pharmacological Activities of Polyphenols—Oligomeric Hydrolyzable Tannins and Others—Presented at the XVIth International Conference of the Groupe Polyphenols, Lisbon, Portugal, Jul. 13-16, 1992. 34. Phenolic Compounds in Foods and Their Effects on Health II. Antioxidants & Cancer Prevention, Huang, M. -T., Ho, C. -T., and Lee, C. Y. editors, ACS Symposium Series 507, American Chemical Society, Washington, D.C. (1992). 35. Phenolic Compounds in Foods and Their Effects on Health I, Analysis, Occurrence & Chemistry, Ho, C. -T., Lee, C. Y., and Huang, M. -T editors, ACS Symposium Series 506, American Chemical Society, Washington, D.C. (1992). 36. Porter, L. J., Ma, Z. and Chan, B. G., Cocoa Procyanidins: Major Flavanoids and Identification of Some Minor Metabolites, Phytochemistry, 30, 1657-1663 (1991). 37. Revilla, E., Bourzeix, M. and Alonso, E., Analysis of Catechins and Procyanidins in Grape Seeds by HPLC with Photodiode Array Detection, Chromatographia, 31, 465-468 (1991). 38. Scudiero, D. A., Shoemaker, R. H., Paull, K. D., Monks, A., Tierney, S., Nofziger, T. H., Currens, M. J., Seniff, D., and Boyd, M. R. Evaluation of a Soluble Tetrazolium/Formazan Assay for Cell Growth and Drug Sensitivity in Culture Using Human and Other Tumor Cell Lines, Canur Research, 48, 4827-4833 (1988). 39. Self, R., Eagles, J., Galletti, G. C., Mueller-Harvey, I., Hartley, R. D., Lee, A. G. H., Magnolato, D., Richli, U., Gujur, R. and Haslam, E., Fast Atom Bombardment Mass Spectrometry of Polyphenols (syn. Vegetable Tannins), Biomed Environ. Mass Spec. 13, 449-468 (1986). 40. Tanabe, K., Ikegami, Y., Ishda, R. and Andoh, T., Inhibition of Topoisomerase II by Antitumor Agents bis(2,6-dioxopiperazine) Derivatives, Cancer Research, 51, 4903-4908 (1991). 41. Van Oosten, C. W., Poot, C. and A. C. Hensen, The Precision of the Swift Stability Test, Fette, Seifen, Anstrichmittel, 83:4, 133-135 (1981). 42. Wang, J. C., DNA Topoisomerases, Ann. Rev. Biochem., 54, 665-697 (1985). 43. Warters, R. L., Lyons, B. W., Li, T. M. and Chen, D. J., Topoisomerase II Activity in a DNA Double-Strand Break Repair Deficient Chinese Hamster Ovary Cell Line, Mutat. Res., 254:167 (1991). 44. Yamashita, Y., Kawada, S. -Z. and Nakano, H., Induction of Mammalian Topoismerase II Dependent DNA Cleavage by Nonintercalative Flavanoids, Genistein and Orbol., Biochem Pharm, 39:4, 737-744 (1990). 45. Yamashita, Y., Kawada, S. -Z., Fujii, N. and Nakano, H., Induction of Mammalian DNA Topoisomerase I and II Mediated DNA Cleavage by Saintopin, a New Antitumor Agent from Fungus, Biochem., 30, 5838-5845 (1991). 46. Feldman, P. L., Griffith, O. W., and Stuehr, D. J. The Surprising Life of Nitric Oxide, Chem. & Eng. News, Dec. 20, 1993, p. 26-38. 47. Jia, L., Bonaventura, C. and Stamler, J. S., S-Nitrosohaemoglobin: A Dynamic Activity of Blood Involved in Vascular Control, Nature, 380, 221-226 (1996). 48. Radomski, M. W., Palmer, R. M. J. and Moncada, S. Comparative Pharmacology of Endothelium Derived Relaxing Factor, Nitric Oxide and Prostacyclin in Platelets, Brit. J. Pharmacol, 92, 789-795 (1989). 49. Stamler, J. S., Mendelshon, M. E., Amarante, P., Smick, D., Andon, N., Davies, P. F., Cooke, J. P., and Loscalzo, N-Acetylcysteine Potentiates Platelet Inhibitio By Edothelium - Derived Relaxing Factor, J. Circ. Research, 65, 789-795 (1989). 50. Bath, P. M. W., Hassaid, D. G., Gladwin, A. M., Palmer, R. M. J. and Martin, J. F., Nitric Oxide and Prostacyclin. Divergence of Inhibitory Effects on Monocyte Chemotaxis and Adhesion to endothelium In Vitro. Arterioscl. Throm., 11, 254-260 (1991). 51. Garg, U. C. and Hassid, A. Nitric Oxide Generating Vasodilators and 8-Bromo-Cyclicguanosine Monophosphate Inhibit Mitogenesis and Proliferation of Cultured Rat Vascular Smoothe Muscle Cells, J. Clin. Invest., 83, 1774-1777 (1989). 52. Creager, M. A., Cooke, J. P., Mendelsohn, M. E., Gallagher, S. J., Coleman, S. M., Loscalzo, J. and Dzau, V. J. Impaired Vasodilation of Forearm Resistance Vessels in Hypercholesterolemic Humans, J. Clin. Invest., 86, 228-234 (1990). 53. Steinberg, D., Parthasarathy, S., Carew, T. E., Khoo, J. C. and Witztum, J. L. Beyond Cholesterol. Modifications of Low Density Lipoproteins that Increase its Atherogenicity. The New England J. of Med,320, 915-924 (1989). 54. Tsuiji, M. and DuBois, R. N. Alterations in Cellular Adhesion and Apoptosis in Epithelial Cells overexpressing Prostaglandin Endoperoxide Synthase 2, Cell, 83, 493-501 (1995). 55. Marcus, A. J. Aspirin as Prophylaxis Colorectal Cancer, The New Eng. J. Med., 333: 10, 656-658 (1995). 56. P. J. Pastricha, Bedi, A., O'Connor, K., Rashid, A., Akhatar, A. J., Zahurak, M. L., Piantadosi, S., Hamilton, S. R. and Giardiello, F. M. The Effects of Sulindac on Colorectal Proliferation and Apoptosis in Familial Adenomatous Polyopsis. Gastroenterology, 109, 994-998 (1995). 57. Lu, X., Xie, W., Reed, D., Bradshaw, W. and Simmons, D. Nonsteroidal Anti Inflammatory Drugs Cause Apoptosis and Induce Cyclooxygenase in Chicken Embryo Fibroblasts. P.N.A.S. U.S.A., 92, 7961-7965 (1995). 58. Gajewski, T. F. and Thompson, C. B. Apoptosis Meets Signal Transduction: Elimination of A BAD Influence. Cell, 87, 589-592 (1996). 59. Funk, C. D., Funk, L. B., Kennedy, M. E., Pong, A. S. and Fitzgerald, G. A. Human Platelet/Erythroleukemiz Cell Prostaglandin G/H Synthase: cDNA Cloning, Expression and Gene Chromosomal Assignment, FASEB J., 5: 2304-2312 (1991). 60. Patrono, C. Aspirin as an Antiplatelet Drug. The New Eng. J. Med., 333: 18, 1287-1294 (1994). 61. Howell, T. H. and Williams, R. C. Nonsteroidal Antiinflammatory Drugs as Inhibitors of Periodonal Disease Progression. Crit. Rev. of Oral Biol & Med., 4: 2, 117-195 (1993). 62. Brisham, M. B. Oxidants and Free Radicals in Inflammatory Bowel Disease. Lancet, 344, 859-861 (1994). 63. Oates, J. A. The 1982 Nobel Prize in Physiology and Medicine, Science, 218, 765-768 (1996). 64. Hunter, T. and Pines, J. Cyclins and Cancer II: Cyclin D and CDK Inhibitors Come of Age, Cell, 79, 573-582 (1994). 65. King, R. W., Jackson, P. K. and Kirschner, M. W. Mitosis in Transition, Cell, 79, 563-571 (1994). 66. Sherr, C. J. G1 Phase Progession: Cycling on Cue, Cell, 79, 551-555 (1994). 67. Nurse, P. Ordering S Phase and M Phase in the Cell Cycle, Cell, 79, 547-550 (1994). 68. DeCross, A. J., Marshall, B. J., McCallum, R. W., Hoffman, S. R., Barrett, L. J. and Guerrant, R. L. Metronidazole Susceptibility Testing for Helicobacter pylori: Comparison of Disk, Broth and Agar Dilution Methods and Their Clinical Relevance, J. Clin. Microbiol., 31, 1971-1974 (1993). 69. Anon., Flavor and Fragrance Materials -1981: Worldwide reference list of materials used in compounding flavors and fragrances, Chemical Sources Association, Allured Publishing Corp. 70. van Rensburg, H., van Heerden, P. S., Bezuidenhoudt, B. C. B. and Ferreira, D., The first enantioselective synthesis of trans- and cis-dihydroflavanols, Chem. Comm. 24, 2705-2706 (1996). 71. Lockhart, D. J., Dong, H., Byrne, M. C., Follettre, M. T., Gallo, M. V., Chee, M. S., Mittmann, M., Wang, C., Kobayashi, M., Horton, H., Brown, E. L. Expression Monitoring by Hybridization to High-Density Oligonucleotide Assays, Nature Biotechnology, 14, 1675-1680 (1996). 72. Winyard, P. G. and Blake, D. R. Antioxidants, Redox-Regulated Transcription Factors, and Inflammation, Advances in Pharmacology, 38, 403-421 (1997). 73. Schwartz, M. A., Rose, B. F., Holton, R. A., Scott, S. W. and Vishnuvajjala, B. Intramolecular Oxidative Coupling of Diphenolic, Monophenolic and Nonphenolic Substrates, J. Am. Chem. Soc. 99: 8, 2571-2575 (1977). 74. Greene, T. W. “Protecting Groups in Organic Synthesis”, Wiley, N.Y. (1981). 75. Warren, S. “Designing Organic Syntheses. A Programmed Introduction to the Synthon Approach”, Wiley, N.Y. (1978). 76. Collman, J. P., Hegedus, L. S., Norton, J. R. and Finke, R. G. “Principles and Applications of Organotransition Metal Chemistry”, University Science Books (1987). 77. Tsujii, M. and DuBois, R. N. Alterations in Cellular Adhesion and Apoptosis in Epithelial Cells Overexpressing Prostaglandin Endoperoxide Synthase 2, Cell, 83, 493-501 (1995). 78. Pashricha, P. J., Bedi, A., O'Connor, K., Rashid, A., Akhtar, D. J., Zahurak, M. L., Piantadosi, S., Hamilton, S. R. and Giardiello, F. M. The Effects of Sulindac on Colorectal Proliferation and Apoptosis in Familial Adenomatous Polyposis, Gastroenterology, 109, 994-998 (1995). 79. Verhagan, J. V., Haenen, G. R. M. M. and Bast, A. Nitric Oxide Radical Scavenging by Wines, J. Agric. Food Chem. 44, 3733-3734 (1996). 80. ArUoma, O. I. Assessment of Potential Prooxidant and Antioxidant Actions, J.A.O.C.S., 73: 12, 1617-1625. 81. Stoner, G. D. and Mukhtar, H. Polyphenols as Cancer Chemopreventive Agents, J. Cell. Biochem. 22, 169-180 (1995). 82. Gali, H. U., Perchellet, E. M., Klish, D. S., Johnson, J. M. and Perchellet, J -P. Antitumor-promoting activities of hydrolyzable tannins in mouse skin, carcinogenesis, 13: 4, 715-718 (1992). 83. Tabib, K., Besancon, P. and Rouanet, J -M. Dietary Grape Seed Tannins Affect Lipoproteins, Lipoprotein Lipases and Tissue Lipids in Rats Fed Hypercholesterolemic Diets, J. Nutrition, 124:12, 2451-2457. 84. Paolino, V. J. and Kashket, S. Inhibition by Cocoa Extracts of Biosynthesis of Extracellular Polysaccharide by Human Oral Bacteria, Archs. Oral Biol. 30:4, 359-363 (1985). 85. Lockhart, D. J., Dong, H., Byrne, M. C., Follettie, M. T., Gallo, M. V., Chee, M. S., Mittmann, M., Wang, C., Kobayashi, M., Horton, H., and Brown, E. L., Expression monitoring by hybridization to high-density oligonucleotide arrays, Nature Biotech., 14, 1675-1680 (1996). 86. Kreiner, T. Rapid genetic sequence analysis using a DNA probe array system, Am. Lab., March, 1996. 87. Lipshutz, R. J., Morris, D., Chee, M., Hubbell, E., Kozal, M. J., Shah, N., Shen, N., Yang, R. and Fodor, S.P.A. Using oligonucleotide Probe Arrays to Access Genetic Diversity, Biotechniques, 19: 3, 442-447 (1995). 88. Borman, S. DNA Chips Come of Age, Chem. & Eng. News, 42-43, Dec. 9, 1996 89. Tahara, H., Mihara, Y., Ishii, Y., Fujiwara, M., Endo, H., Maeda, S and Ide, T. Telomerase Activity in Cellular Immortalization, Cell Structure and Function, 20: 6, 1B-1615 (1995). 90. Heller, K., Kilian, A., Paityszek, M. A., and Kleinhofs, A. Telomerase activity in plant extracts, Mol. Gen. Genet. 252, 342-345 (1996). 91. Goffeau, A. Molecular fish on chips, Nature, 385, 202-203 (1997). 92. Friedrich, G. A. Moving beyond the genome projects, Nature Biotechnology, 14, 1234-1237 (1996). 93. Blanchard, R. K. and Cousins, R. J. Differential display of intestingal mRNAs regulated by dietary zinc., Proc. Natl. Acad. Sci. USA, 93, 6863-6868 (1996). 94. Pennisi, E. Opening the Way to Gene Activity, Science, 275: 155-157 (1997). 95. Medlin, J. The Amazing Shrinking Laboratory, Environmental Healt Perspectives, 103: 3, 244-246. 96. Luehrsen, K. R., Marr, L. L., van der Knaap, E. and Cumberledge, S. Analysis of Differential Display RT-PCR Products Using Fluorescent Primers and GENESCAN Software, Biotechniques, 22: 1, 168-174. 97. Geiss, F., Heinrich, M., Hunkler, D. and Rimpler, H. Proanthocyanidins with (+)-Epicatechin Units from Byronima Crassifolia Bark, Phytochemistry, 39: 1, 635-643 (1995). 98. Iibuchi, S., Minoda, Y. and Yamada, K. Studies on Tannin Acyl Hydrolase of Microorganisms, Part II. A New Method Determining the Enzyme Activity Using the Change of Ultra Violet Absorption, Agr. Biol. Chem. 31: 5, 513-518 (1967). 99. Ferreira, D., Steynberg, J. P., Roux, D. G. and Brandt, E. V. Diversity of Structure and Function in Oligomeric Flavanoids, Tetrahedron, 48: 10, 1743-1803 (1992).
<SOH> BACKGROUND OF THE INVENTION <EOH>Polyphenols are an incredibly diverse group of compounds (Ferreira et al., 1992) which widely occur in a variety of plants, some of which enter into the food chain. In some cases they represent an important class of compounds for the human diet. Although some of the polyphenols are considered to be nonnutrative, interest in these compounds has arisen because of their possible beneficial effects on health. For instance, quercetin (a flavonoid) has been shown to possess anticarcinogenic activity in experimental animal studies (Deshner et al., 1991 and Kato et al., 1983). (+)-Catechin and (−)-epicatechin (flavan-3-ols) have been shown to inhibit Leukemia virus reverse transcriptase activity (Chu et al., 1992). Nobotanin (an oligomeric hydrolyzable tannin) has also been shown to possess anti-tumor activity (Okuda et al., 1992). Statistical reports have also shown that stomach cancer mortality is significantly lower in the tea producing districts of Japan. Epigallocatechin gallate has been reported to be the pharmacologically active material in green tea that inhibits mouse skin tumors (Okuda et al., 1992). Ellagic acid has also been shown to possess anticarcinogen activity in various animal tumor models (Bukharta et al., 1992). Lastly, proanthocyanidin oligomers have been patented by the Kikkoman Corporation for use as antimutagens. Indeed, the area of phenolic compounds in foods and their modulation of tumor development in experimental animal models has been recently presented at the 202nd National Meeting of The American Chemical Society (Ho et al., 1992; Huang et al., 1992). However, none of these reports teaches or suggests cocoa extracts or compounds therefrom, any methods for preparing such extracts or compounds therefrom, or, any uses for cocoa extracts or compounds therefrom, as antineoplastic agents, antioxidants, DNA topoisomerase II enzyme inhibitors, cyclo-oxygenase and/or lipoxygenase modulators, NO (Nitric Oxide) or NO-synthase modulators, as non-steroidal antiinflammatory agents, apoptosis modulators, platelet aggregation modulators, blood or in vivo glucose modulators, antimicrobials, or inhibitors of oxidative DNA damage.
<SOH> OBJECTS AND SUMMARY OF THE INVENTION <EOH>Since unfermented cocoa beans contain substantial levels of polyphenols, the present inventors considered it possible that similar activities of and uses for cocoa extracts, e.g., compounds within cocoa, could be revealed by extracting such compounds from cocoa and screening the extracts for activity. The National Cancer Institute has screened various Theobroma and Herrania species for anti-cancer activity as part of their massive natural product selection program. Low levels of activity were reported in some extracts of cocoa tissues, and the work was not pursued. Thus, in the antineoplastic or anti-cancer art, cocoa and its extracts were not deemed to be useful; i.e., the teachings in the antineoplastic or anti-cancer art lead the skilled artisan away from employing cocoa and its extracts as cancer therapy. Since a number of analytical procedures were developed to study the contributions of cocoa polyphenols to flavor development (Clapperton et al., 1992), the present inventors decided to apply analogous methods to prepare samples for anti-cancer screening, contrary to the knowledge in the antineoplastic or anti-cancer art. Surprisingly, and contrary to the knowledge in the art, e.g., the National Cancer Institute screening, the present inventors discovered that cocoa polyphenol extracts which contain procyanidins, have significant utility as anti-cancer or antineoplastic agents. Additionally, the inventors demonstrate that cocoa extracts containing procyanidins and compounds from cocoa extracts have utility as antineoplastic agents, antioxidants, DNA topoisomerase II enzyme inhibitors, cyclo-oxygenase and/or lipoxygenase modulators, NO (Nitric Oxide) or NO-synthase modulators, as non-steroidal antiinflammatory agents, apoptosis modulators, platelet aggregation modulators, blood or in vivo glucose modulators, antimicrobials, and inhibitors of oxidative DNA damage. It is an object of the present invention to provide a method for producing cocoa extract and/or compounds therefrom. It is another object of the invention to provide a cocoa extract and/or compounds therefrom. It is still another object of the present invention to provide a polymeric compound of the formula A n , wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, such that there is at least one terminal monomeric unit A, and a plurality of additional monomeric units; R is 3-(α)-OH, 3-(B)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; bonding between adjacent monomers takes place at positions 4, 6 or 8; a bond of an additional monomeric unit in position 4 has α or β stereochemistry; X, Y and Z are selected from the group consisting of monomeric unit A, hydrogen, and a sugar, with the provisos that as to the at least one terminal monomeric unit, bonding of the additional monomeric unit thereto is at position 4 and Y=Z=hydrogen; the sugar is optionally substituted with a phenolic moiety at any position, for instance, via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). It is still a further object of the present invention to provide a polymeric compound of the formula A n , wherein A is a monomer having the formula: wherein n is an integer from 2 to 18, e.g., 3 to 18; R is 3-(α)-OH, 3-(β)-OH, 3-(α)-O-sugar, or 3-(β)-O-sugar; adjacent monomers bind at position 4 by (4→6) or (4→8); each of X, Y and Z is H, a sugar or an adjacent monomer, with the provisos that if X and Y are adjacent monomers, Z is H or sugar and if X and Z are adjacent monomers, Y is H or sugar, and that as to at least one of the two terminal monomers, bonding of the adjacent monomer is at position 4 and optionally, Y=Z=hydrogen; a bond at position 4 has α or β stereochemistry; the sugar is optionally substituted with a phenolic moiety at any position, for instance, via an ester bond, and pharmaceutically acceptable salts or derivatives thereof (including oxidation products). It is another object of the invention to provide an antioxidant composition. It is another object of the invention to demonstrate inhibition of DNA topoisomerase II enzyme activity. It is yet another object of the present invention to provide a method for treating tumors or cancer. It is still another object of the invention to provide an anti-cancer, anti-tumor or antineoplastic compositions. It is still a further object of the invention to provide an antimicrobial composition. It is yet another object of the invention to provide a cyclo-oxygenase and/or lipoxygenase modulating composition. It is still another object of the invention to provide an NO or NO-synthase-modulating composition. It is a further object of the invention to provide a non-sterbidal antiinflammatory composition. It is another object of the invention to provide a blood or in vivo glucose-modulating composition. It is yet a further object of the invention to provide a method for treating a patient with an antineoplastic, antioxidant, antimicrobial, cyclo-oxygenase and/or lipoxygenase modulating or NO or NO-synthase modulating non-steroidal antiinflammatory modulating and/or blood or in vivo glucose-modulating composition. It is an additional object of the invention to provide compositions and methods for inhibiting oxidative DNA damage. It is yet an additional object of the invention to provide compositions and methods for platelet aggregation modulation. It is still a further object of the invention to provide compositions and methods for apoptosis modulation. It is a further object of the invention to provide a method for making any of the aforementioned compositions. And, it is an object of the invention to provide a kit for use in the aforementioned methods or for preparing the aforementioned compositions. It has been surprisingly discovered that cocoa extract, and compounds therefrom, have anti-tumor, anti-cancer or antineoplastic activity or, is an antioxidant composition or, inhibits DNA topoisomerase II enzyme activity or, is an antimicrobial or, is a cyclo-oxygenase and/or lipoxygenase modulator or, is a NO or NO-synthase modulator, is a non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator or, is a blood or in vivo glucose modulator, or is an inhibitor of oxidative DNA damage. Accordingly, the present invention provides a substantially pure cocoa extract and compounds therefrom. The extract or compounds preferably comprises polyphenol(s) such as polyphenol(s) enriched with cocoa procyanidin(s), such as polyphenols of at least one cocoa procyanidin selected from (−) epicatechin, (+) catechin, procyanidin B-2, procyanidin oligomers 2 through 18, e.g., 3 through 18, such as 2 through 12 or 3 through 12, preferably 2 through 5 or 4 through 12, more preferably 3 through 12, and most preferably 5 through 12, procyanidin B-5, procyanidin A-2 and procyanidin C-1. The present invention also provides an anti-tumor, anti-cancer or antineoplastic or antioxidant or DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, nonsteroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator, blood or in vivo glucose modulator, or oxidative DNA damage inhibitory composition comprising a substantially pure cocoa extract or compound therefrom or synthetic cocoa polyphenol(s) such as polyphenol(s) enriched with procyanidin(s) and a suitable carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier. The extract or compound therefrom preferably comprises cocoa procyanidin(s). The cocoa extract or compounds therefrom is preferably obtained by a process comprising reducing cocoa beans to powder, defatting the powder and, extracting and purifying active compound(s) from the powder. The present invention further comprehends a method for treating a patient in need of treatment with an anti-tumor, anti-cancer, or antineoplastic agent or an antioxidant, or a DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator, blood or in vivo glucose modulator or inhibitor of oxidative DNA damage, comprising administering to the patient a composition comprising an effective quantity of a substantially pure cocoa extract or compound therefrom or synthetic cocoa polyphenol(s) or procyanidin(s) and a carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier. The cocoa extract or compound therefrom can be cocoa procyanidin(s); and, is preferably obtained by reducing cocoa beans to powder, defatting the powder and, extracting and purifying active compound(s) from the powder. Additionally, the present invention provides a kit for treating a patient in need of treatment with an anti-tumor, anti-cancer, or antineoplastic agent or antioxidant or DNA topoisomerase II inhibitor, or antimicrobial, or cyclo-oxygenase and/or lipoxygenase modulator, or an NO or NO-synthase modulator, non-steroidal antiinflammatory agent, apoptosis modulator, platelet aggregation modulator inhibitor of oxidative DNA damage, or blood or in vivo glucose modulator comprising a substantially pure cocoa extract or compounds therefrom or synthetic cocoa polyphenol(s) or procyanidin(s) and a suitable carrier, e.g., a pharmaceutically, veterinary or food science acceptable carrier, for admixture with the extract or compound therefrom or synthetic polyphenol(s) or procyanidin(s). The present invention provides compounds as illustrated in FIGS. 38A to 38 P and 39 A to 39 AA; and linkages of 4→6 and 4→8 are presently preferred. The invention even further encompasses food preservation or preparation compositions comprising an inventive compound, and methods for preparing or preserving food by adding the composition to food. And, the invention still further encompasses a DNA topoisomerase II inhibitor comprising an inventive compound and a suitable carrier or diluent, and methods for treating a patient in need of such treatment by administration of the composition. Considering broadly the aforementioned embodiments involving cocoa extracts, the invention also includes such embodiments wherein an inventive compound is used instead of or as the cocoa extracts. Thus, the invention comprehends kits, methods, and compositions analogous to those above-stated with regard to cocoa extracts and with an inventive compound. These and other objects and embodiments are disclosed or will be obvious from the following Detailed Description.
20040308
20061017
20050421
62410.0
1
SOLOLA, TAOFIQ A
TREATMENT OF HYPERTENSION
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,795,655
ACCEPTED
Facsimile to E-mail communication system with local interface
A fax to E-mail system and related method are shown, whereby a hardcopy document is sent via a fax device to its recipient via electronic mail through a data network (such as the Internet), and is delivered in such a manner that it can be retrieved by the recipient at an E-mail device, in the ordinary course of retrieving the E-mail, and displayed on the screen of the E-mail device. The invention provides for and accomplishes the delivery of a document, which begins as a hardcopy, as an electronic file retrieved through E-mail recipient's terminal and displayed on the computer screen of the E-mail recipient's terminal. The system and method also provides for an interface device which connects to a conventional fax device for communicating E-mail addresses and routing hardcopy documents to the E-mail network. The invention provides a means for embedding the functions of the interface device into conventional fax devices. The system can also be used in cooperation with Internet Web service for reporting, accounting, information services, and user interaction.
1. A method of communicating information, comprising the step of delivering facsimile information from a facsimile generating device to a user supplied e-mail address in computer readable image data format which is capable of being viewed on a computer screen.
BACKGROUND OF THE INVENTION The present invention relates generally to the field of communications associated with the communication of facsimile messages and associated with the uniting of traditionally distinct message delivery systems such as facsimile delivery and electronic mail delivery. The popularity of the quick and easy facsimile delivery of messages and the popularity of low cost delivery of messages via electronic mail (also referred to as “E-mail”) messaging systems have for quite some time enticed attempts to mingle the two technologies, and efforts have become even more fervent in the wake of the recent explosive increase in use of the global computer data network known as the “Internet”. An early attempt to mingle facsimile and Email message delivery technologies is represented by the Facsimile Transmission System of U.S. Pat. No. 4,941,170 (Herbst). Herbst appears to show a system which uses an E-mail system to route a facsimile file between controllers associated with the E-mail network in order to accomplish, in the end result, a facsimile input and a facsimile output. U.S. Pat. No. 4,837,798 (Cohen, el al.) discloses a system whose stated goal is to provide a single, “unified” electronic mailbox for storing either messages or notification of the existence of messages of different types. Cohen, et al. does mention the integration of facsimile mail messages, but does not appear to clearly discuss how the system would handle such fax messages. U.S. Pat. No. 5,339,156 (Ishii) discloses a system where a data communication center and a facsimile mail center are linked in a manner to accomplish the delivery of E-mail messages by way of facsimile, but not visa versa. At the same time, the facsimile industry has seen a growth in the use of interactive communication with remote store and forward facilities (“SAFF”) for storage in a “fax mailbox” in digital image form and managed delivery of facsimile messages, as exemplified by U.S. Pat. No. 5,291,203 (Gordon, et al.); and further, the art includes the use of locally appended devices to the sending fax device to intercept commands and route facsimile messages, in facsimile form, to a remote SAFF for subsequent delivery to a destination facsimile device, as exemplified by U.S. Pat. No. 5,555,100 Bloomfield, et al. Each of the above-mentioned references appears dedicated to the ultimate delivery of the message to a destination fax machine or fax capable device such as an equipped personal computer (“PC”). SUMMARY OF THE INVENTION Briefly described, the present invention comprises a fax to E-mail system and related method whereby a facsimile transmission is sent to its recipient via electronic mail (such as through the “Internet”) rather than via another facsimile machine, and is delivered in such a manner that it can be retrieved by the recipient at his/her E-mail device, in the ordinary course of retrieving the E-mail, and viewed on the screen of the E-mail device. The invention provides for and accomplishes the delivery of a document, which begins as a hardcopy, as an electronic file retrieved through an E-mail recipient's terminal and read at the computer screen of the E-mail recipient's terminal. The system of the present invention includes, in its most preferred apparatus and method embodiments, among other elements, a “local interface” and a remotely located Facsimile/E-mail server system (FEM-GATEWAY) which cooperate to provide a Facsimile/E-mail service whereby hardcopy information, including textual and/or graphical portions, is communicated between a facsimile device and an E-mail device, while still allowing conventional operation of the facsimile device. More specifically, the present invention comprises apparatus and methods for the input of an E-mail address locally to a facsimile machine, for directing the transmission of the image to a remotely located FEM-GATEWAY, for receiving and converting data representative of an image scanned by the facsimile device (referred to herein as facsimile information) into a computer-readable data file formatted in an image data file format, for creating an addressed E-mail message to which the computer-readable data file is attached, and for delivering the E-mail and attachment to a desired recipient over a data network such as a global computer network, such as the “Internet”. In its preferred embodiments, the interface device of the present invention uniquely receives an alphanumeric E-mail address, displaying the address for verification by the user, is specially configured to command the FEM-GATEWAY to transmit a fax document via E-mail, and conveys an E-mail address and fax message (through the attached fax device) to the FEM-GATEWAY. The interface device allows any pre-existing fax machine to function as the sending machine of the invented system, with no modification to the fax machine itself. The present invention's handling of the fax message by converting the message to a computer-readable image file and attaching it to a system generated E-mail message, and the system's cooperative interaction between the interface device and the FEM-GATEWAY uniquely allow the present invention to accomplish its intended goal of delivering fax messages via the E-mail system. In at least one alternate embodiment, the functions of the interface device are embedded into a conventional fax device. The present invention bridges two networks, interacting first in the telephone network (PTN) to transmit as telephony signals a facsimile message to the FEM-GATEWAY and then interacting in the E-mail network (through the “Internet” or other data networks) to deliver an E-mail message to its intended E-mail address. A sender wishing to send a facsimile message selectively activates the interface device locally associated with the sending fax machine which results in the fax being sent differently than a normal fax transmission. In accordance with the preferred embodiments, the interface device initiates a connection through the PTN to a server at a remote FEM-GATEWAY, and the interface device interacts with that server to generate and deliver to the intended recipient's E-mail address an E-mail message to which is attached the facsimile document formatted as a computer-readable image file compatible with the recipient's E-mail terminal. Numerous features, objects and advantages of the present invention in addition to those mentioned or implied above, will become apparent upon reading and understanding this specification, read in conjunction with the appended drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a facsimile-to-electronic mail communication system according to a preferred embodiment of the present invention. FIG. 2 is a block diagram of a Fax-Server of the system depicted in FIG. 1. FIG. 3 is a block diagram of the process and data architecture of E-mail server depicted in FIG. 1. FIG. 4 is a schematic representation of an E-mail message in accordance with the preferred embodiment of the present invention. FIG. 5 is an example of a recipient viewed message portion of an E-mail message generated and forwarded in accordance with the preferred embodiment of the present invention. FIG. 6 is a block diagram of a fax interface device of the system depicted in FIG. 1. FIG. 7 is a block diagram of a facsimile-to-electronic mail communication system according to an alternative embodiment of the present invention. FIG. 8 is a flow chart depicting an overview of a preferred method of the present invention. FIG. 9A is a flow chart of the front end process depicting the facsimile-to-electronic mail communication system waiting for user input. FIG. 9B is a flow chart of the front end process depicting the facsimile-to-electronic mail communication system interfacing with the fax server. FIG. 9C is a flow chart of the front end process depicting the facsimile-to-electronic mail communication system receiving a message from the FEM-GATEWAY. FIG. 10 is a chart displaying a column of alphanumeric and other characters with suffixes commonly encountered in E-mail addresses used by the present invention. FIG. 10A is a schematic diagram of a fax interface device user keypad. FIG. 11A is a flowchart of the COMCON process in accordance with the preferred method of the present invention. FIG. 11B is a flowchart of the COMCON process in accordance with the preferred method of the present invention specifically illustrating the check sum matching process. FIG. 11C is a flowchart of the COMCON process in accordance with the preferred method of the present invention specifically illustrating the end of signal determination process. FIG. 12 is a flowchart of a SENDMAIL process in accordance with the preferred method of the present invention. FIG. 13 is a schematic block diagram of a facsimile-to-electronic mail communication system according to an alternate embodiment of the present invention, referred to herein as an in-series embodiment. FIG. 14 is a schematic block diagram of a fax interface device of the system depicted in the alternate embodiment of FIG. 13. FIG. 15 is a schematic block diagram of a facsimile-to-electronic mail communication system according to an alternate embodiment of the present invention, including a combined unit fax/fax-to-e-mail sending device. FIG. 16 is a schematic block diagram of a facsimile-to-electronic mail communication system according to the embodiments of FIGS. 1-14 and depicting an exemplary, alternate communication link. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Refer now in greater detail to the drawings in which like numerals represent like components throughout the several views and in which lower letter reference numeral suffixes differentiate similar components referred to collectively without such suffixes. FIG. 1 displays a Facsimile-to-Electronic mail communication system 100 (also referred to herein as a “Fax/E-mail communication system 100”) comprising a facsimile interface device 102 (also referred to herein as “fax interface device 102”), having a keypad 342, and a Facsimile-to-E-mail server 104 (also referred to herein as a “FEM-GATEWAY 104”). The fax interface device 102 is associated with a fax device 106, and both devices 102, 106 connect to the FEM-GATEWAY 104 through a common communication line 107 (also sometimes referred to herein as “fax phone line 107” or as “fax line 107”) and the telephone network (PTN) 108. In accordance with the preferred embodiment of the present invention, the common communication line 107 is a central office (“CO”) telephone line having dial tone generated thereon and having tip and ring capabilities all generated and managed by a local exchange carrier central office of the telephone network 108. Note that “PTN” is a common designation considered to be generally understood by those skilled in the telecommunications industry as including any number of local exchange carrier central offices, access tandems, long distance toll offices, and other telecommunication switching systems. In a first preferred embodiment of the present invention, the fax interface device 102 is connected by an accessory line 109 (which, in the preferred embodiment is a standard telephone cable) to the standard “telephone out” RJ-11 jack 113 (also, sometimes referred to as the “accessory jack” 113) of a standard fax device 106 (for example, conventional stand alone fax machine or multifunction machine with fax capabilities). Alternatively, the accessory line 109′ by-passes the accessory jack 113 and connects at, for example, a line splitter 117, directly to the common communication line 107. As would be understood by one skilled in the art, this places the fax interface device 102 “on line” with the fax device 106 such that both the fax interface device 102 and fax device 106 are serviced in what might be termed a “parallel relationship” by the same communication line 107 to the public network 108. The FEM-GATEWAY 104 comprises a Fax-Server 110, a Web Server 111, an E-mail-server 112, and a data network 114. The Fax-Server 110 connects to the E-mail-server 112, and a data network 114. The Fax-Server 110 connects to the data network 114 which includes, in accordance with the preferred embodiment of the present invention, use of a TCP/IP protocol running on Ethernet hardware and includes, but is not limited to routers, hubs, cabling, and other hardware and software necessary for proper connection to the E-mail network and to the E-mail server). It should be understood that the scope of the present invention includes other data networks 1114, including local and wide area data networks which utilize other network protocols and network hardware. The E-mail-server 112 connects to an E-mail network 116 (i.e., a network such as the Internet, a satellite network, a cable network, a telephony network, a wireless network, or other data network) which enables the communication of electronic mail (referred to herein as “E-mail”) to an E-mail device 118. An E-mail interface device 120 (including, for example and not limitation, hardware and software systems known as E-mail servers) (hereinafter also referred to as E-mail server 120) connects the E-mail device 118 to the E-mail network 116 and, hence, to the gateway E-mail-server 12 through the E-mail network 116. The Web Server 111 connects to Fax-Server 110, gateway E-Mail-server 112, and data network 114, and hence to the E-mail network 116. It should be understood that the connecting lines shown in FIG. 1 represent many types of communication links, including standard telephone lines, data communication networks, wireless communication networks, cable communication networks, or other networks. As will be understood by those skilled in the art, a user of the E-mail network 116 is provided with an “e-mail address” which corresponds to an electronic “mailbox” “associated with” the user and residing on the E-mail server 120 or elsewhere along the E-mail network. While only one fax device 106 and only one fax interface device 102 are shown in FIG. 1, the fax device 106 and the fax interface device 102 are, respectively, representative of a plurality of fax devices 106 and a plurality of fax interface devices 102 wherein each fax device 106 of the plurality of fax devices 106 is associated with a single fax interface device 102 of the plurality of fax interface devices 102. It should be understood that the plurality of fax devices 106 includes any fax-capable device, including for example and not limitation, conventional facsimile machines, multi-function machines which can operate as fax machines, or image scanners which can operate as fax sending devices. It should be noted that while only one E-mail device 118 and only one E-mail server 120 are shown in FIG. 1, the E-mail device 1118 and E-mail server 120 are, respectively, representative of a plurality of E-mail devices 118 and a plurality of E-mail servers 120 wherein each E-mail device 118 of the plurality of E-mail devices 118 is associated with a single E-mail server 120 of the plurality of E-mail servers 120. In accordance with the preferred embodiment of the present invention, the E-mail devices 118 comprise personal computers which execute software programs (including, for example and not limitation, software programs known in the industry as “browsers” and “E-mail readers”—sometimes collectively referred to herein as “E-mail browsers”) that enable an E-mail recipient to receive E-mail delivered to the recipient via the E-mail network 116, to display E-mail messages and image data files, and optionally, to print E-mail messages and image data files on a connected printer. It should be understood that E-mail devices 118 include all sorts of stationary and portable, local and network, computer-related devices executing software programs that provide E-mail communication and display capabilities. It should also be understood that E-mail servers 120 include, for example and not limitation, hardware, software, communication programs, analog communication interfaces, digital communication interfaces, optical communication interfaces, wired and wireless communication interfaces, cable communication interfaces, various modems, and other E-mail communication enabling hardware adapters and software programs located either on the user's premises or located in the network or both. Furthermore, it should be understood that the scope of the present invention includes E-mail servers 120 which consist of units separate from their associated E-mail devices 118 and E-mail servers 120 which are incorporated into their associated E-mail devices 118. FIG. 2 displays, in a block diagram representation, the Fax-Server 110 according to the preferred embodiment of the present invention. The Fax-Server 110 comprises a plurality of fax/data communication interfaces 130 which connect to the PN 108 through a PN communication link and to a bus 134 for interchange of signals with other components of the Fax-Server 110. Preferably, the PN communication link 132 is a standard T-1 digital communication link providing multiplexed, encoded carrier service. Alternately, the PN communication link 132 includes a linking or network system (see, for example, that communication link 132″ depicted in and discussed in connection with FIG. 16, below). The fax/data communication interfaces 130 provide a plurality of fax and data communication channels for communication of data between the Fax-Server 110 and fax interface devices 102. Each fax/data communication interface 130 is capable of performing a variety of functions on each fax communication channel including, for example: answering a phone line; hanging-up a phone line; dialing a phone number; sending fax data; receiving fax data; sending data signals; receiving data signals; generating DTMF (dual tone multi-frequency) tones; detecting DTMF tones; receiving ANI (automatic number identification—the number from which a caller initiates a call) and DNIS (dialed number identification service—the number dialed by the caller) information via, preferably, for example, Feature Group D; playing voice messages; and, converting voice signals between analog and digital formats. An example of a fax/data communication interface 130, acceptable in accordance with the preferred embodiment of the present invention, is a model VFX40ESC voice/fax/modem communication interface available from Dialogic of Parsippany, N.J. It should be understood that the connecting lines shown in FIG. 2 represent many types of communication links, including direct links defined by direct contact between components and indirect links defined by various cables, wires, etc. Other components of the Fax-Server 110 shown in FIG. 2 include: a central processing unit (CPU) 136 with random access memory (RAM); a mass storage 140 which provides program and data storage (including storage of fax image data and information received from a fax device 106 connected to and communicating with the Fax-Server 110; a video display 146, keyboard 150, and power supply 152—all of the foregoing components configured and inter-operating in a manner that will be clearly understood by one skilled in the art. The Fax-Server 110, as seen in FIG. 2, also includes a data network interface 154 by which the Fax-Server 110 exchanges data with the data network 114, via cable 156, to enable communication of data between the Fax-Server 110 and the E-mail-Server 112. The data network interface 154 performs the signal conditioning and format conversions which are necessary to communicate data through the data network 114. A data network interface 154, acceptable in accordance with the preferred embodiment of the present invention, is a model SMC9332DST available from Standard Microsystems Corporation of Hauppauge, N.Y., which is compatible with the 100Base T Ethernet standard and the TCP/IP protocol. It should be understood that the scope of the present invention includes other data network interfaces 154 including, for example and without limitation, wired and wireless data network interfaces, analog data network interfaces, digital data network interfaces, optical data network interfaces, and data network interfaces compatible with other hardware and software standards and protocols. The Fax-Server 110 monitors its fax/data communication channels for a call from a fax interface device 102. Upon receiving such a call on its fax/data communication channel, the Fax-Server 110 services the call by, among other tasks: verifying (against a stored list of valid identification codes of fax interface devices 102) that the call is to be processed; receiving from the fax interface device 102, an E-mail address associated with a desired recipient of a document; optionally receiving information identifying the sender; receiving fax image data representative of the document to be communicated to the desired recipient; optionally preparing and forwarding a confirmation (i.e., a fax document comprising a single page having text which indicates that the recipient's E-mail address and the fax image data representing the document were received by the Fax-Server 110) to the fax device 106; and, preparing and forwarding an E-mail message 270 (see FIG. 4), having an E-mail message portion 272 and an attached image data file 274 including data representative of the document, to the E-mail-Server 112. The Fax-Server 110 processes the fax image data received from a fax device 106, along with information received from the fax interface device 102, and converts the fax image data to image data (hereinafter sometimes referred to as the “formatted image data”) formatted in any one of several industry-standard formats for images or bit-mapped graphic images, including, for example and not limitation, formats such as “GIF” “PCX”, “DCX” “TIFF”, and “BMP”, “JPEG”, “PNG”, “AWD”. In accordance with the preferred embodiment of the present invention, the Fax-Server 110 is programmed to convert fax image data received from all of the plurality of fax devices 106 which deliver to the Fax-Server into the same, pre-selected industry-standard format, as selected by the administrator of the FEM-GATEWAY 104. It is intended, as part of the preferred embodiment of the present invention, that the selected format into which the Fax-Server 110 is preferably programmed to convert fax image data is a format which will be automatically compatible with major E-mail readers and browsers available on the market at a given period of time. Thus, at the time of the writing of this disclosure, the preferred format is the “TIFF format”. In accordance with the preferred embodiments of the present invention, the selected format into which the fax image data is to be converted is periodically changed (and the Fax-Server 110 processes appropriately modified) by the administrator to be compatible with the automatic de-coding and re-assembling software utilized by, for example, a majority (or selected plurality) of browsers and E-mail readers on the “then current” market for E-mail devices 118. Thus, in accordance with the preferred methods of the present invention, the Fax-Server 104, upon receiving a fax message delivered from a fax device 106, automatically converts the received fax image data to a TIFF formatted file, naming the TIFF file with the appropriate “.TIF” file extension. FIG. 3 displays, in a block diagram representation, the E-mail Server 112 according to the preferred embodiment of the present invention. The E-mail Server comprises an E-mail network interface 200 which connects to the E-mail network 116 through a communication link 202 and to a bus 204 for interexchange of signals with other components of the E-mail Server 112. Preferably, the communication link 202 is a standard Ethernet communication link providing high-speed TCP/IP communication carrier services. The E-mail network interface 200 is capable of multiplexed, encoded communication exchanges to the E-mail network. The E-mail Server 112 is considered readily understood by those skilled in the art and performs, as is critical to the present invention, functions of receiving the addressed E-mail with attachment (the E-mail message 270) and routing the E-mail message to the appropriate network address along the E-mail network 116, using, for example, TCP/IP and appropriate domain addressing and domain name services. FIG. 3 further schematically depicts other basic components of a standard E-mail Server including a data network interface 224 through which the E-mail Server interacts with the data network 114, a central bus 204, CPU with RAM memory 206, mass storage 210, a video display 216, keyboard 220, and power supply 222—all of the foregoing components being configured and inter-operating in a manner that will be clearly understood by one skilled in the art. Though deemed unnecessary in light of the relevant skill in the art, the following are given by way of example as acceptable components of the E-mail Server 112: E-mail network interface 200 as a model 1400FXSA modem available from Practical Peripherals, Inc. of Thousand Oaks, Calif.; data network interface 224 as a model SMC9332DST available from Standard Microsystems Corporation of Hauppauge, N.Y. which is compatible with the 100BaseT Ethernet Standard and the TCP/IP protocol; and “Microsofl Exchange Mail” or “UNIX SENDMAIL” operating on the CPU 206. In alternate embodiments of the present invention, all or some of the E-mail functions of the gateway E-mail Server 112 are incorporated as part of and performed by the Fax-Server 110. Furthermore, in alternate embodiments, the data network 114 is simply the bus of a single PC which hosts the appropriate hardware and software of both the Fax-Server 110 and the E-mail Server 112, and the CPU/RAM, storage, video, keyboard and power supply are common, all as would be understood to one skilled in the art. Further explanation of the E-mail Server 112 is deemed not necessary as the appropriate hardware, software and operation thereof is considered well known to those skilled in the art. FIG. 4 displays a schematic representation of an E-mail message 270 in accordance with the preferred embodiment of the present invention. The E-mail message 270 comprises a message portion 272, described below, and attached image data file 274. The attached image data file 274 includes image data representative of the document being communicated, via E-mail, from the sender's fax machine 106 to the recipient's E-mail device 118 by the FAX/Email communication system 100. The image data stored in the attached image data file 274 is, preferably, the previously mentioned formatted image data, and, as previously mentioned, preferably in a selected format of wide compatibility with then current browsers and E-mail readers. The message portion 272, of the E-mail message 270 is generated by the Fax-Server 110 and forwarded to the gateway E-mail Server 112 for delivery to the E-mail network 116. The message portion 272 comprises a plurality of information which corresponds to that same information displayed in the message portion 272′ depicted in FIG. 5. The message portion 272′ is depicted in FIG. 5 in an exemplary manner as it would appear on the user's screen at the E-mail device 118, and shall be referred to sometimes herein as the recipient viewed message portion 272′, as distinguished from the Fax-Server 110 generated message portion 272. The exemplary recipient viewed message portion 272′, comprises a header portion 276, a body portion 280, and an attachment portion, 284. The header portion 276 of the recipient viewed message portion 272′ includes a plurality of descriptive text labels and associated fields. A “TO” field 282, adjacent to a “To” descriptive text label 283, indicates the E-mail address of the intended recipient of the E-mail message 270 as input by the sender using the keypad 342 of the fax interface device 102. The recipient viewed message portion 272′ includes a “FROM” field 286, adjacent a “From:” descriptive text label 288, which indicates generically, the sender's identity as known to the Fax/E-mail communication system 100. (For example, the name of the entity where the sender's fax device 106 and fax interface device 102 are located). A preferred alternative embodiment which is optional to the sender as input by the sender using the keypad 342 of the fax interface device 102 is to include beside the sender's generic identity in text field 286, the name of the individual sender as known to the Fax/E-mail communication system 100. A “REPLY TO” field 290, adjacent a “Reply To:” descriptive text label 292 provides an E-mail address of the FEM-GATEWAY 104 and a transaction code associated with the sender's fax interface device 102 which code is generated by the FEM-GATEWAY system for job tracking and problem reporting. The recipient viewed message portion 272′ also includes a “SUBJECT” field 294, adjacent a “Subject:” descriptive text label 296, which contains a notice to the recipient that the E-mail message 270 includes an incoming fax as an attached image file. The body portion 280 of the exemplary recipient viewed message portion 272′, as seen in FIG. 5, includes text 300 which provides advertising and instructs the recipient of the E-mail message 270 on how to view the attached image data file 274 (i.e. document). The text 300 also instructs the recipient on how to access additional information about the services provided through the communication system 100, including, if required, how to receive a compatible viewer software program capable of displaying the attached image data file 274. The body portion 280 includes, in this displayed embodiment, a link 297 to a location along the E-mail network 116, such as an HTML link 297 which references and enables access to an Internet web page where information and access to viewer software is available to the recipient. The use of an “HTLM link” as a reference to a protocol used to interface to Internet web pages is considered to be well-known to those skilled in the art. The use of a “web page” as a reference to a communications medium as associated with the Internet global computer network is considered to be well-known to those skilled in the art. The attachment portion 284 of the exemplary recipient viewed message portion 272′, as seen in FIG. 5, includes a “handle” 298 which references and enables access to the image data file 274 attached to the message portion 272. The handle 298 is that assigned by the browser of the E-mail device 118 at the time that the attachment is downloaded by and stored at the E-mail device. The use of a “handle” as a reference to a file is considered to be well-known to those skilled in the art. The image data file 274, as noted, includes a representation of the document sent by the sender for receipt by the recipient of the E-mail message 270. A descriptive textual portion 299, adjacent to the handle portion 298, provides informative data to the recipient regarding the type, encoding scheme, description, and other information relative to the attachment 274. The information and data used to populate the “fields” 282, 286, 290, of the header portion 276, as well as the text 300 and link data 297 of the body portion 280, as well as the informative data found in the textual portion 299 is all information and data received by the Fax-Server 110 during steps 1034 and 1036 of the process described below (see FIG. 11A) and/or generated at step 1074 of the process (see FIG. 11C), and is that information and data which constitutes the message portion 272 of the E-mail message 270 depicted in FIG. 4. FIG. 6 displays a block diagram representation of a fax interface device 102 in accordance with the apparatus of the preferred embodiment of the present invention. The device performs a variety of functions including accepting inputs at the keypad 342, displaying information at a Display 344, interfacing to the communication line 107, and engaging in interactive communications with the FEM-GATEWAY 104. The fax interface device 102 comprises telephony circuitry 320 which connects to and interacts with DSP circuitry 322 and Codec circuitry 321 to provide telephony interface support. The Telephony Circuitry connects through a phone line surge protector 326, a phone line coupler 332 and the accessory telephone line 109 to the communication line 107, which also connects to a fax device 106. As mentioned earlier, the fax interface device 102 is preferably connected (in “parallel relationship” with the fax device 106) to the common communication line 107 through connection to the accessory RJ-11 jack 113 of a standard fax machine or fax modem, and, alternatively, through connection of accessory telephone line 109 via splitter 117 to communication line 107. The Codec circuitry 321 connects to the telephony circuitry 320 and to the DSP circuitry 322, performing analog to digital conversions for tone generation and detection. An example of this Codec is a Texas Instruments TCM29C16 available from Texas Instruments, located in Houston Tex. The DSP circuitry 322, according to the preferred embodiment of the present invention, comprises a Digital Signal Processor with integrated flash memory for program storage, RAM for temporary data storage, a Codec interface for audio input and output, and an expansion bus to connect other needed peripherals. An example of this DSP is a Texas Instruments TMS320F206 available from Texas Instruments in Houston, Tex. The DSP circuitry 322 is connected to serial nonvolatile memory, NVRam 323, to the Display 344 comprised, for example, of a Liquid Crystal Display (LCD) with built-in controller, and to the keypad (FIG. 10a) 342 comprising a standard telephony-styled DTMF keypad and custom control buttons. The NVRam 323 performs memory functions such as storage of E-mail addresses and serial number information regarding the interface device 102. An example of this type of NVRAM is 24c65/sm-ND available from Microchip Technology located in Chandler Ariz. An example of the Display is the DMC-24227NYU available from Optrex, located in Torrence, Calif. The telephony circuitry 320 is connected to Codec 321, speaker 346, and to surge protection circuitry 326. The telephony circuitry 320 performs a variety of functions including ring detection, loop current, and on and off hook control. An example of this circuitry is the TS117 available from CP Clare, located in Wakefield Mass. The Speaker 346 provides line monitoring and program control audio feedback. An example of Speaker 346 as an amplifier is the LM380 available from National Semiconductor located in Santa Clara, Calif. The phone line coupler 332 connects to the Surge protection 326 and provides a telephony jack for interfacing to accessory telephone line 109 which is connected to fax device 106. An example of such a suitable coupler is 555979-1 from AMP Incorporated, located in Harrisburg, Pa. A power supply 341 connects through power adapter 340 to a source of a AC power and supplies necessary power to the components of the interface device 102. In a configuration and manner of operation that would be understood by those skilled in the art, the telephony circuitry 320, Codec 321 and DSP circuitry 322 cooperate and interact to perform the functions which include, but are not limited to, those mentioned above. By way of example, in accordance with the preferred embodiment of the present invention: the Codec 321 connects to and communicates with the DSP 322 through Codec signal bus 316; signal bus 318 carries analog signals which originate from a telephone company central office (i.e., part of the PTN 108) and which are received by the fax interface device 102 through the accessory telephone line 109; the Codec 321 de-modulates the analog signals and produces digital representations of the analog signals which are communicated, through Codec signal bus 316, for analysis by the DSP 322; the analog signals commonly include, for example and not limitation, dial tone signals, DTMF signals and fax tone signals; after the digital representations of the analog signals are analyzed and identified by the DSP (according to programming stored within ROM memory of the DSP circuitry), the DSP determines whether or not a response is necessary and, if so, determines the appropriate response to the analog signal; the DSP 322, to respond, generates appropriate digital signals which are modulated by the Codec 321 to produce analog signals which are output along signal bus 318 to the telephone circuitry 320 and eventually to the fax line 107; according to the preferred embodiment, the Codec 321 can modulate and de-modulate analog signals in the Bell 202 communication format (which is a standard AT&T frequency shift key communication scheme) and in the V.21 communication format (which is a standard CCITT Group 3 fax negotiation and control procedure). As an example of the interaction between the Codec 321 and the DSP circuitry 322, consider a sender wishing to communicate a document to a desired recipient via fax/E-mail, in accordance with the preferred embodiment of the present invention. Reference may be had here to the process charts and description related to FIGS. 9A-9C. In response to the entry of the “GO” command at the fax interface device 102 by the sender, the fax interface device 102 and, hence, the DSP circuitry 322 (according to step 924 (FIG. 9B) of the preferred method described below) establishes a telephonic connection with the Fax-Server 110 by calling the Fax-Server via telephone line 107. To do so, the DSP circuitry 322 must monitor the signal bus 318 (which reflects the activity on accessory phone line 109, which is the extension of fax line 107) for the presence of an analog dial tone signal by analyzing digital representations (produced by the Codec 321 and communicated to the DSP circuitry 322 through Codec signal bus 316) of the analog signals. Upon receiving and identifying the dial tone signal, the DSP circuitry 322 responds in accordance with programming residing in memory portions of the DSP circuitry to generate DTMF digits corresponding to the telephone number of the Fax-Server 110. After receiving digital representations of the digits of the telephone number from the DSP 322 through Codec signal bus 316, the Codec 321 modulates the digital data to produce the appropriate DTMF digits for output, through signal bus 318, to the telephone circuitry 320 and, ultimately, to telephone line 107. Note that the Codec 321 and the DSP circuitry 322 cooperate in many other instances, using similar hand-shaking methods, to communicate signals to and from the PTN 108 via telephone line 107 (and accessory line 109) in order to provide the functionality necessary for the fax interface device 102 and, hence, the Fax/E-mail communication system 100, to communicate documents to E-mail recipients. According to an alternate embodiment of the present invention shown in FIG. 7, a fax interface device 102′ and a fax device 106′ connect to a private branch exchange (PBX) 115 before connecting to the Public Network 108′. It will be understood that the common communication line 107, in this alternate embodiment, is a PBX line providing dial tone generated at the PBX 115 and functioning, for purposes of the present invention, similarly to the CO line 107 of FIG. 1. It should be understood that the scope of this alternate embodiment of the present invention includes a fax interface device 102′ incorporated into a PBX 115. It should also be understood that the alternate embodiment of FIG. 7 in a manner substantially similar to the preferred embodiment, comprises fax devices 106′ including any fax-capable devices, including for example and not limitation, conventional facsimile machines, multi-function machines which can operate as fax machines, or image scanners which can operate as fax sending devices. In accordance with other alternate embodiments of the present invention, the Public Telephone Network 108 and E-mail network 116 are replaced by any of a variety of different interconnecting networks, including any combination of public, private, switched, non-switched, wireline, non-wireline, digital, analog, in-band signaling, out-of-band signaling, voice, data, local or wide area networks. In addition, although DTMF signaling and transfer of information through DTMF and data signaling formats are disclosed in the preferred embodiment of the present invention, other alternate embodiments of the present invention include methods and apparatus which accommodate signaling and transferring of information through alternate signaling networks and formats, including modem communications, integrated services digital network (ISDN) and other out-of-band and in-band signaling methods, whereby signals and information are communicated between a FEM-GATEWAY 104 and a fax interface device 102. According to still other alternate embodiments of the present invention, the apparatus of the Fax/E-mail communication system 100 comprises a FEM-GATEWAY 104 which employs only one computer that includes necessary hardware, and executes necessary programs present on the Fax-Server 110 and the E-mail-Server 112 of the preferred embodiment of the present invention. In still other alternate embodiments of the present invention, the apparatus of the Fax/E-mail communication system 100 comprises multiple computers, which include the necessary hardware and software present on the Fax-Server 110 of the preferred embodiment, and multiple computers which include the necessary hardware and software present on the E-mail-Server 112 of the preferred embodiment. It should be understood that it is within the scope of the present invention that indicated subsystems (servers 110, 112, 111) of the FEM-GATEWAY 104 are, acceptably, either geographically separated or geographically co-located. Represented in FIGS. 1 and 11, is a Web Server 111, 111′. The Web Server 111, 111′ is an optional computer (or computer based program) which provides user access to information regarding transactions processed through the FAX/E-mail communication system 100. The Web Server communicates with the Fax-Server 110 and the E-mail Server 112 over data network 114. As will be understood by those skilled in the art, a Web Server provides access to users using computers connected to a data network (such as the Internet) for the purpose of accessing information from and interacting with computers connected directly or indirectly to the Web Server. By way of example, the Web Server 111, 111′ permits a user of the communications system 100 access to information on their account such as accounting information, billing information, service information, as well as current and historical data on Fax-to-E-mail transactions generated from the user's fax device 102. Additionally, the Web Server permits a user to interact with the communication system 100 to add, delete, or change user preferences. By way of example, a user could change a passcode, or the priority of a pending Fax-to-E-mail message. FIG. 8 displays an overview of a preferred method of the present invention and illustrates a plurality of steps which are necessary to communicate a hard-copy document (also referred to herein as a “document” and including any item which can be communicated by a fax device 106 or equivalent thereof) to a desired recipient using the Fax/E-mail communication system 100 disclosed herein. The individual steps of the method are performed by various elements, and combinations of elements, of the system 100 working in concert and are detailed by the figures that follow. After starting at step 800, the method proceeds to step 802 where the system 100 receives, from the sender of the document, an E-mail address which has been previously associated with, or assigned to, the desired recipient of the document and, optionally, saves the recipient's E-mail address for future use. According to the preferred embodiment of the present invention, the recipient's E-mail address is input, or recalled from memory storage, to the system 100, by the sender of the document through interaction with the telephone-style keypad 342 of the sender's fax interface device 102 connected to the PTN 108. Continuing at step 804, the system 100 receives and saves fax image data which is generated by the sender's fax device 106 and which represents the document to be communicated to the desired recipient via E-mail. The fax image data is, typically, created by a rasterizing process performed at the sender's fax device 106 by hardware, by software, or by cooperation between hardware and software and is, typically communicated in what is known as “G3 protocol”, all of which is well-known to those skilled in the art. Upon receiving and storing the fax image data, the system 100, at step 806, provides an optional confirmation (sender selectable) to the sender which indicates that the E-mail address and fax image data have been received by the system 100. The confirmation is, for example, in the form of a single page which is transmitted by the FEM-GATEWAY 104 for receipt by the sender's fax device 106 as if the confirmation were a conventional fax document received by the sender's fax device 106. An alternative manner of providing confirmation to the sender is to update the Web Server 111 in a manner that allows the sender of the original facsimile (who is a registered user of the communication system 100) to access information at the Web Server which will indicate the status of facsimile-to-E-mail messages which that sender has sent through the system. Still other alternative methods of sending confirmation are acceptable, such as, for example, providing a notice of the successful delivery to a registered sender's E-mail address. Advancing to step 808, the system 100 creates an E-mail message 270, addressed to the recipient at the previously received E-mail address, which includes a message portion 272 and an attached image data file 274 containing the previously received fax image data stored in an industry-standard format for storing graphical data. In accordance with the preferred embodiment, encoding of the attachment 274 is also performed at this step (as well as, optionally, the earlier mentioned image processing). The processes of attaching an image data file 274 to an E-mail message 270 (for example, compliant with MIME encoding), of storing graphical data in industry-standard formats and encoding the file are considered to be well-known to those skilled in the art. At step 810, the system 100 delivers the E-mail message 270 to an E-mail network 116, with its associated image data in attached, preferably encoded, image data file 274, for delivery to the E-mail address associated with the recipient and included in the message portion 272. Once the recipient receives the E-mail message 270, the recipient, at step 812, views the E-mail message 270, including its message portion 272. Viewing of the attached document (represented by the fax image data of the attached image data file 274), through conventional use of an appropriate computer program known as “browser”, “viewer”, or “e-mail reader” is accomplished, at least, by “clicking” on the file attachment located in the handle portion 298 located in the attachment portion 284 of the message portion 272. (See discussion above regarding FIG. 5). After viewing of the E-mail message 270 by the recipient, the method ends at step 814. In accordance with the preferred embodiment of the present invention, because the attachment 274 has been converted to a widely popular image format (e.g., TIFF) which is, desirably, compatible with a majority of browsers and E-mail readers in the then current market, and because the image data file is appropriately encoded, then, in accordance with the preferred embodiment of the present invention, viewing is accomplished by simply “clicking” on the file attachment handle portion 298 found in the attachment portion 284 of the message portion 272 of the E-mail message 270). When the E-mail device 118 is operating a browser or E-mail reader which is not immediately compatible with the image data format/encoding into which the attachment has been converted/encoded, it is understood that additional user interaction will be necessary to appropriately decode the attachment prior to viewing. In order to enable Fax-to-E-mail service by performing some of the various steps of the plurality of steps described above with respect to FIG. 8, the fax interface device 102 of the present invention executes a front end process 830 and the Fax-Server 110 executes a process 1020, which shall be referred to herein as the COMCON process 1020. FIGS. 9 and 11, respectively, display the front-end process 830 and the COMCON process 1020 in accordance with the preferred method of the present invention. Referring now to FIG. 9A, the front-end process 830 starts at step 832 and advances to step 834 where the fax interface device 102 shows an idle-time message on its display 344 while the fax interface device 102 waits for a sender wishing to communicate a document to a recipient via E-mail. (The idle-time message might include, for example, information identifying the manufacturer of the fax interface device 102, information instructing a user on how to send a document to a recipient via E-mail, information advertising other available services, etc.) At step 836, the fax interface device 102 monitors the keypad 342 for input activity to detect input by a user and potential sender of a Fax-to-E-mail document. Preferably, the Fax-to-E-mail command includes DTMF digits entered at the fax device's keypad 342; for example, entry of the keystrokes “A”, or “QDial”. (Refer, please, to FIG. 10A for further keypad details). Next, at step 838, the fax interface device 102 determines whether or not it has received input at the keypad 342. If input has not been received by the fax interface device 102, the front-end process 830 loops back to step 834 and again displays an idle-time message. If input has been received by the fax interface device 102, the fax interface device 102, at step 840, prompts the sender for an E-mail address associated with the desired recipient of a document by displaying prompt text, on display 344, which instructs the sender to enter an E-mail address for the recipient or to recall a previously stored E-mail address from fax interface device 102 memory. After prompting the sender to enter an E-mail address, the fax interface device 102 (at step 842) receives the characters of the E-mail address input by the sender, displays the characters, as they are received, on display 344, and retains the E-mail address for future use (stored in memory). According to the preferred method of the present invention and as previously noted, an E-mail address associated with a desired recipient is input by the sender (at step 842), using the telephone-style keypad 342 of the sender's fax interface device 102, after being prompted for the recipient's E-mail address on a first row (or line) (e.g, the bottom line 334a) of display 344. Because the standard telephone keypad as represented by keypad 342 are restricted to 12 input keys 342a, multiple alphanumeric characters must be associated with each one of the 12 available keys 342a to provide all characters required to create a valid E-mail address. This is accomplished by associating characters with keys 342a either in alphabetical, numeric, or common trait order such that a sender can “spell” an E-mail address using the reduced-set keypad 342 without limitation to the required character set. In accordance with the preferred embodiment of the present invention, the sender enters the recipient's E-mail address using the fax interface device's keypad 342 (FIG. 10A) and using the character association chart of FIG. 10 as a guide. FIG. 10 displays an association and sequence chart showing the available characters (Col. 1), the associated key (Col. 2), and the input sequence to advance to the desired character (Col. 3). In addition to singular characters being associated with a particular key 342a, groups of characters commonly used in the creation of E-mail addresses are also associated with particular keys to simplify the steps required for user input, and in addition, certain other groups of characters such as, for example, email suffixes .com, net, .gov, org, .edu are stored in memory and associated with the EXT key 342g. Frequently dialed domains, for example, aol.com. prodigy.com. netcom.com. worldnet.com are stored in memory and associated with the DOM key 342e. To advance through the available characters associated with a particular key, the sender repeatedly presses the desired key, without pause (timeout). The character in sequence associated with the key will be displayed on a second line (e.g., the top line 344b) of display 344. Once a time-out occurs, the fax interface device 102 will settle upon the selected character or group of characters, and will display the selected character and move to the next cursor position. This process permits multiple characters associated with the same key to be selected simply by pausing momentarily between key presses for greater than the allowable timeout period. For example, to enter an “A”, the sender presses the “ABC1” key one time. To enter a “C” the sender presses the “ABC1” key three times. To enter “AC” the sender presses the “ABC1” key one time, pauses one second, and presses the “ABC1” key three times. Continued pressing of a character key scrolls the characters in a endless-loop fashion. The BACK/CLR 342b is character destructive key and deletes the last character input (or character group) and backspaces the cursor one position in sequence for each time the button is pressed. Pressing the BACK/CLR 342b button for extended time (2 seconds or more) deletes an entire entry and returns the user to the idle state condition or can be used in deleting characters or groups of characters stored in memory. QDIAL button 342c is used to store E-mail addresses which can be recalled rapidly from memory and eliminates the repetitive input of commonly used E-mail addresses during the addressing process. With the cursor at its first position on the display 344 of the fax interface device 102, the fax interface device begins accepting keypad entries and each time the sender waits more than the preset time (e.g., one second), the interface device records a “time-out”. If the sender presses a single key 342a repeatedly before there is a time-out, then the fax interface device will select the respective character or character group from the chart of FIG. 10 corresponding to the number of times the key was pressed. The fax interface device will consider the address entry to be complete when the sender has pressed the “GO” button 342d. Upon completion of the entry of the E-mail address, the sender presses the “GO” button 342d on the keypad 342 to begin a process whereby the interface device 106 interacts with the Fax-Server 110 of the FEM-GATEWAY 104 to forward the received E-mail address and to pre-condition the FEM-GATEWAY system for delivery of the fax image data from the fax device 106. With further reference to FIGS. 9A-9C, once the “GO” command is received (see step 846), the interface device 102 goes off-hook and dials the FEM-GATEWAY 104 (step 924). To facilitate interaction between the Fax-Server 110 and the fax interface device 102, a process (see COMCON process 1020 of FIG. 11) executes on the Fax-Server 110 which is complimentary to the following process executing on the fax interface device 102 and the two processes communicate through the fax line 107 (and accessory line 109), public network 108, communication link 132 and a fax communication interface 130, as described below, to deliver to the Fax-Server 110 the E-mail address associated with the desired recipient. To that end, it can be seen that steps 924 through 950 of FIG. 9B-9C are complimentary to and inter-communicate with steps 1026 through 1057 of FIG. 11. The fax interface device 102 continues its processing at step 926 where the fax interface device monitors the communications with the Fax-Server 110 to determine whether or not an acknowledgment “ACK” as been received from the Fax-Server 110. If not, the process 830 branches to step 928 where the fax interface device 102 determines whether or not a time-out condition exists (i.e., the fax interface device 102 has been waiting for an “ACK” for an excessive period of time). If the fax interface device 102 has determined that a time-out condition exists, the fax interface device 102 goes on hook, at step 930, without communicating the recipient's E-mail address nor the fax image data to the Fax-Server 110. If the fax interface device 102 determines, at step 928, that a time-out condition does not exist, the front-end process 830 loops back to step 926. If, at step 926, the fax interface device 102 detects an “ACK”, the process 830 advances to step 932 where the fax interface device 102 sends a Fax-to-E-mail command to the Fax-Server 110. Then, the fax interface device 102 sends, at step 934, its unique identification code (ID) to the Fax-Server 110. Advancing to steps 936 and 938 of the front-end process 830, the fax interface device 102 sends the recipient E-mail address, received previously from the sender, optionally, the sender's ID, and a check sum to the Fax-Server 110. At step 940, the fax interface device 102 determines whether or not an “error-free ACK” has been received from the Fax-Server 110 on fax line 107. If so, the front-end process 830 continues at step 948 described below. If not, the process 830 branches to step 942 where the fax interface device 102 determines whether or not an “error ACK” has been received from the Fax-Server 110 on fax line 107 instead of an “error-free ACK”. If the fax interface device 102 determines that a “error ACK” has been received (i.e., indicating that the Fax-Server 110 is requesting that the fax interface device 102 re-send the fax-to-E-mail command, its own identification code, the recipient's E-mail address, and an associated check sum), the front-end process 830 loops back to step 932. If the fax interface device 102 determines that an “error ACK” has not been received, then the process 830 moves to step 944 where the fax interface device 102 determines whether or not a time-out condition has occurred. If not, the process 830 loops back to step 940 to continue waiting for an “ACK”. If so, the fax interface device 102 goes on-hook and the front-end process 830 returns to its “idle time”. According to the preferred method of the present invention, and as seen in FIG. 9C, the fax interface device 102, at step 948, receives a message from the FEM-GATEWAY 104 to display the message “PRESS SEND ON FAX DEVICE NOW”, and the message is displayed (see step 950) at the fax interface device's display 344. Next, at step 952, the front-end process 830 determines if there is a drop or absence of CO line current. For example, in the preferred embodiment where the fax interface device 102 is connected by line 109 to the accessory phone RJ-11 jack on the fax device 106, then, in accordance with standard functioning procedures, the connection of the fax line 107 to the accessory line 109 will be “locked out” and the accessory line 109 will “go dead”—this is the “absence of CO line current” to be determined at step 952. If no CO line current is detected, the process returns to “idle time”. Alternately, for example, in an embodiment where the connection between accessory line 109 and fax line 107 is not automatically locked-out by activation of the fax device 106 SEND command (e.g., connection of accessory line 109′ at line splitter 117), then step 952 is, for example, replaced by the decision step of “detect fax tones?”, and, if fax tones are detected, the fax device 102 is placed on-hook and the process 830 returns to “idle time” at step 834. As mentioned above, a process referred to herein as the COMCON process 1020 (see FIG. 11) executes on the Fax-Server 110; and, in accordance with preferred embodiments of the invention, a separate COMCON process 1020 services each fax communication channel of a fax communication interface 130 (see FIG. 2) of the Fax-Server 110 by communicating, in a hand-shaking manner, with a front-end process 830 (see FIGS. 9B, 9C) of a fax interface device 102 when a sender attempts to communicate a document via E-mail to a recipient. FIGS. 11A-11C display a COMCON process 1020 in accordance with the preferred method of the present invention. The COMCON process 1020 is started at step 1022. After starting, the COMCON process 1020 advances to step 1024 where the fax communication interface 130 and fax communication channel associated with the COMCON process 1020 are initialized. Then, at step 1026 of the COMCON process 1020, the Fax-Server 110 determines whether or not an incoming telephone call has been received from the public telephone network (PTN) 108 on the fax communication channel serviced by the COMCON process 1020. If the Fax-Server 110 determines that no incoming call is present, the COMCON process 1020 loops back to step 1026 to continue waiting for an incoming call. If the Fax-Server 110 determines that an incoming call is present, the COMCON process 1020 advances to step 1028 where the Fax-Server 110 answers the incoming telephone call from a fax interface device 102. Next, at step 1030, the Fax-Server 110 sends an acknowledgment “ACK” to the fax interface device 102 through the fax communication interface 130, the public telephone network 108, and the fax line 107 (and the accessory line 109). The “ACK” informs the fax interface device 102 that the Fax-Server 110 has received its telephone call and that the Fax-Server 110 is ready to interact with the front-end process 830 of the fax interface device 102. Once communication has been established with a calling fax interface device 102, the COMCON process 1020 advances to step 1032 where, as seen in FIG. 11A, the Fax-Server 110 receives a fax-to-E-mail command from the fax interface device 102. Then, at step 1034, the Fax-Server 110 receives the identification code of the calling fax interface device 102 followed, at step 1036, by receipt of the E-mail address, and optionally the sender ID as input by the sender on the fax interface device 102. Continuing at step 1038, the Fax-Server 110 receives a check sum from the fax interface device 102. Advancing to step 1040 (FIG. 11B) of the COMCON process 1020, the Fax-Server 110 determines whether or not the check sum matches (i.e., is okay) a check sum which it has computed based upon the data received during steps 1032 through 1038. If the Fax-Server 110 determines that the check sum is not okay (i.e., there was an error during communication with the fax interface device 102), the COMCON process 1020 branches to step 1042 where the Fax-Server 110 determines whether or not a time-out condition exists (i.e., determines whether or not a maximum number of re-send requests have been exceeded). If no time-out condition exists, the Fax-Server 110, at step 1044, sends a an “ERROR ACK” command to the fax interface device 102 to request that the fax interface device 102 re-send the data referred to in steps 1032 through 1038 described above. The COMCON process 1020 then loops back to step 1032. If the Fax-Server 110 determines, at step 1042, that a time-out condition exists, the COMCON process 1020 causes the fax communication interface 130 to go on-hook, thereby hanging-up the telephone call from the fax interface device 102, before looping back to step 1026. Referring back to step 1040, if the Fax-Server 110 determines that the check sum is okay (i.e., there was no error during communication with the fax interface device 102), the Fax-Server 110 determines, at step 1048, whether or not the identification code received from the fax interface device 102 is okay by comparing the received identification code with a list of fax interface device identification codes which are stored in a database of the Fax-Server 110. If the Fax-Server 110 determines that the received identification code is not valid for any fax interface device 102, the COMCON process 1020 branches to step 1050 where the Fax-Server 110 determines whether or not a time-out condition exists (i.e., determines whether or not a maximum number of re-send requests have been exceeded). If no time-out condition exists, the Fax-Server 110, at step 1052, sends a an “ERROR ACK” command to the fax interface device 102 to request that the fax interface device 102 re-send the information received at steps 1032 through 1038. The COMCON process 1020 then loops back to step 1032. If the Fax-Server 110 determines, at step 1050, that a time-out condition exists, the COMCON process 1020 causes the fax communication interface 130 to go on-hook, thereby hanging-up the telephone call from the fax interface device 102, before looping back to step 1026. If, at step 1048, the Fax-Server 110 determines that the identification code of the fax interface device 102 is okay, the COMCON process 1020 advances to step 1056 where the Fax-Server 110 sends an “ERROR FREE ACK” to the fax interface device 102 to indicate to the fax interface device 102 that it has received a fax-to-E-mail command, a valid fax interface device identification code, and an E-mail address associated with a desired E-mail recipient. The Fax-Server 110 then, at step 1057, sends a command to the fax interface device 102 to display the message “Press Send on Fax Device Now” on the display 344, which instructs the sender to initiate communications with the Fax-Server by pressing the “SEND” (or “START”, etc.) button on the fax device 106. The Fax-Server 110 then, at step 1058, sends fax tones along the fax line 107 to the fax device 106 and receives fax data from the fax device 106 at step 1060. Continuing at step 1062 (FIG. 11C), the Fax-Server 110, in accordance with the COMCON process 1020, determines whether or not it has received an end-of-fax signal from the fax device 106 connected to the fax communication channel 132 supported by the COMCON process 1020. If no end-of-fax signal has been received, the Fax-Server 110 continues to store the fax data, in its native format (G3) as fax image data in a database on the Fax-Server 110, until such time that either an error or an end of fax signal has been received. The COMCON process 1020 then loops back to step 1060 where the Fax-Server 110 continues to receive fax data from the fax device 106. If the Fax-Server 110 determines, at step 1062, that it has received an end-of-fax signal, the COMCON process 1020 advances to step 1066 where the Fax-Server 110 acknowledges receiving the end-of-fax signal from the fax device 106. In accordance with the preferred method of the present invention, the COMCON process 1020, as seen in FIG. 11C, continues at step 1068 where the Fax-Server 110 COMCON process hangs up the fax communications interface 130 and thereby terminates the call with the fax device 106. The process 1020 continues at step 1070 where the Fax-Server 110 stores the E-mail address sent by the sender of fax interface device 106 in a database on Fax-Server 110. Then at step 1072 the Fax-Server 110 processes the stored fax images received from fax device 106 by converting the images to the formatted image data, being, as mentioned earlier, in a standard image data format for viewing on an E-mail terminal screen. Copies of the converted fax image (the formatted image data) are stored in respective databases on Fax-Server 110. Then, at step 1074, the Fax-Server 110 generates and stores in a database on the Fax-Server an E-mail message portion 272 to accompany the fax image data. The process 1020 advances to step 1076 where the Fax-Server 110 retrieves the message portion 272 and the fax image data from the respective databases on the Fax-Server 110. Then, at step 1078, the Fax-Server 110 attaches the formatted fax image data file 274 to the E-mail message portion 272 and, preferably, encodes the packaged E-mail message 270 an encoding technique acceptable for the intended E-mail network 116. For example but not limitation, the packaged message 270 with message portion 272 and attachment portion 274 is encoded using Internet MIME formatting, thereby creating a MIME E-mail message 270. MIME, or Multi-purpose Internet Mail Extensions, defines the protocol for the Interexchange of text and multi-media E-mail via the Internet (global computer network) and is considered well-known to those reasonably skilled in the art. Continuing at step 1080, the Fax-Server 110 sends the E-mail message 270 to the E-mail server 112 and to the SENDMAIL process 1120 (FIG. 12), over data network 114. After sending the E-mail message 270 to the SENDMAIL process 1120 through interprocess communication, the COMCON process 1020 invokes the SENDMAIL process 1120 on the E-mail server 112, and then the process 1020 ends at step 1084. FIG. 12 displays a SENDMAIL process 1120 which executes on the E-mail-Server 112 in accordance with the preferred method of the present invention. Upon being invoked by the COMCON process 1020 at step 1082 (FIG. 11), being step 1122 of FIG. 12, the SENDMAIL process 1120 advances to step 1124 where it receives the E-mail message 270 from the COMCON process 1020 via interprocess communication. Continuing at step 1126, the SENDMAIL process 1120 directs the gateway E-mail-Server 112 to communicate the E-mail message 270 to the E-mail network 116. Then, at step 1128, the SENDMAIL process 1120 ends. By way of example but not limitation, in the preferred embodiment, steps 1076-1084 of the COMCON process 1020 are performed in accordance with what is commonly known as the UNIX METAMAIL process, and the SENDMAIL processes 1120 of FIG. 12 are performed in accordance with what is commonly known as the UNIX SENDMAIL process. The UNIX METAMAIL and UNIX SENDMAIL processes are considered well-known to those skilled in the art and are considered to not require further explanation herein. Once sent to the E-mail network 116, the E-mail message 270 is conveyed in accordance with the handling processes of the E-mail network (such as the Internet Global Computer Network) to, for example, the “mailbox” associated with the recipient address 282. The message 270 is retrieved and viewed as discussed above regarding step 812 of FIG. 8. As previously mentioned, FIG. 5 is an exemplary recipient viewed message portion 272′ as would be viewed at an E-mail device 1118, with the fields populated with information and data collected, generated, and communicated in accordance with the processes described above. In accordance with an alternate, preferred embodiment of the present invention, as depicted in FIG. 13, the fax interface device 102″ is placed in what might be termed a “series relationship” on communication link 107 between the fax device 106 and the public network 108 (as opposed to the configuration of the above-described embodiments for which I have used the term “parallel relationship”). An exemplary fax interface device 102″ used in accordance with this in-series embodiment of FIG. 13 is depicted in FIG. 14 in schematic fashion. The telephony circuitry 320″ of this fax interface device 102″ connects through a phone line surge protector and phone line coupler to the public network 108 along phone line 107, and connects through a fax phone line coupler to the fax device 106 along phone line 107′. The DSP circuitry 322″ is provided with enhanced processing capability whereby the fax interface device receives and processes signals generated by keystroke entry made at the fax device keypad 105 (thus eliminating the need for a separate keypad at the fax interface device) and whereby the fax interface device 102″ acts as an intermediary between the fax device 106 and the public network 108 to separately process signals from each, to electively pass signals from one to the other, and to separately interact with each of the fax device and public network. The operation of this alternate embodiment of FIG. 13 is in accordance with the process outline in connection with FIG. 8 of the previous embodiments. However, in the detailed processing, the fax interface device 102″ takes control of the interaction between the fax device 106 and the public network 108 to eliminate the need for user monitoring of the “SEND” function. For example, with reference to FIG. 9A, the fax interface device 102″, at step 836, monitors the fax side communication line 107′ for activity at the fax device keypad 105, which activity is, for example, in the form of a pre-established entry which alerts the fax interface device 102″ that the user at the fax device desires to send a fax-to-e-mail (for example, by entry of the keystrokes “*4”). Absent such fax-to-e-mail alerting entry, the fax interface device 102″ would, for example, simply pass communications between the public network 108 and the fax device 106 directly through its telephony circuitry, for example, not interfering with the communication. Once the fax-to-e-mail entry is received, the fax interface device 102″ begins with the user similar steps 840 and 842 of FIG. 9A. Furthermore, preferred embodiments of the in-series system 100″ maintain control at step 948 (FIG. 9C) such that, rather than receiving a user prompt from the FEM-GATEWAY at step 948 (step 1057 of FIG. 11B), the FEM-GATEWAY sends and the fax interface device 102″ receives an acknowledgment signal, in response to which the fax interface device 102″ connects a communication channel within its telephony circuitry between the telephone line 107 and the fax phone line 107′, and communicates fax tones from the fax server 110 through the communication channel to the fax device. By standard handshaking and delivery techniques, the fax device 106 then delivers its fax data along communication lines 107′ and 107, through the fax interface device telephony circuitry, to the fax server 110. When the fax has been completed, the fax interlace device 102″ detects the end-of-fax signal and communicates the same to the fax-server 110, disconnects communication channel, and awaits a future fax-to-e-mail signal from the fax device 106. Whereas the present invention has been depicted and described in relationship to embodiments in which the fax interface device 102 and the fax device 106 are embodied in separate chassis interconnected by an accessory communication line 109, alternate embodiments of the facsimile-to-electronic mail communication system 100 of the present invention comprise a combined unit fax/fax-to E-mail sending device (hereinafter also identified as the “combined unit 358”) which incorporates within a single chassis the functionality of both the fax interface device 102 and the fax device 106, with necessary component parts. In a first embodiment of such combined unit 102/106′, the fax interface device 102 of the embodiment of FIG. 1 hereof, is simply physically embodied within a single chassis with the fax device 106 of the embodiment of FIG. 1, and necessary external modifications are made to the chassis in order to acquire access to the necessary keypads to effect operation of the two combined devices within the combined unit. In a preferred embodiment of the combined unit sending device, however, the functionality of the fax interface device 102 and the fax device 106 of the embodiment of FIG. 1 hereof are embodied within a single chassis and components which perform duplicate functions are eliminated to provide an efficiency of structure. With reference to FIG. 15, this preferred embodiment of the combined unit fax/fax-to-E-mail sending device 358 comprises a single keypad 360 and single display 361, which replace the two keypads and two displays of the fax interface device 102 and fax device 106 The keypad 360 of the combined unit 358 acts as a dual function keypad which accepts user input and interfaces with software logic 364 to alternately perform the functions of a standard fax device keypad or the functions of the fax interface device keypad 342. Preferably, the dual function keypad 342 includes all of the dial and function keys necessary to effect the functions of the fax device 106 and the fax interface device 102. A physical button (or command key) 362 which is software-enabled selectively switches the combined unit sending device 358 between a fax mode (during which the device functions as a standard fax machine delivering information from a hard copy document to a remote recipient fax machine) and a fax-to-E-mail mode (during which the information from a hard copy document is sent to its recipient via electronic mail, in accordance with previously discussed processes of the present invention). When switched to the fax mode, the dual function keypad 360 and display 361 receive and display keypad entries as a standard fax machine, and when the device 358 is in the fax-to-E-mail mode, the dual function keypad 360 and the display device 361 receive and display user keypad entries in a manner described previously in connection with the fax interface device 102. In the drawing of FIG. 15, the number 366 schematically represents the combined hardware/software functionality of the combined unit sending device 358 divided schematically into a fax interface device function 366a and a fax device function 366b. These functions are shown in this schematic manner to represent their separate functionality but their sharing of certain operational components. A user desiring to use the combined unit sending device 358 as a standard fax machine, depresses the command key button 362 to place the sending device in the fax mode, after which the user will enter digits at the keypad 360 which will be interpreted as standard facsimile machine keypad entries, resulting in the receipt and display of a telephone number which number will be sent (through operation of the combined units fax device function 36b) along communication line 107 to the public telephone network 108 to effect a telephone connection with a remote fax machine for fax-to-fax delivery of the hard copy information placed in the device. Other features and functionalities which are standard to typical prior art fax machines are acceptably provided. When the user desires to send a hard copy document to a recipient via electronic mail, the user depresses the command key button 362 to switch the combined unit sending device 358 to the fax-to-E-mail mode, in which mode the user entries at the dual function keypad 360 are interpreted in accordance with the prior described scheme of the present invention to input and display alphanumeric E-mail addresses. With reference to the prior disclosure, the combined unit sending device 358 operating through its fax interface device functionality 366a communicates with the FEM-GATEWAY 104 in a manner similar to the process described in connection with FIGS. 9A-9C previously. Once the “SEND” key is depressed on the keypad of the combined unit sending device 358 in response to the prompt at step 950 of FIG. 9C, the combined unit sending device switches to the fax device functionality 366b to deliver the fax image data along communication line 107 to the FEM-GATEWAY 104. The structure and functionality of the FEM-GATEWAY 104 is substantially similar to that previously described in connection with FIGS. 1-12 and the interactive processes of FIGS. 11A-11C are substantially as described previously. Furthermore, the remaining components (E-mail network 116, E-mail Server 120 and E-mail device 118) of the facsimile-to-E-mail communication system 100′″ are substantially similar to those described in connection with the embodiment of FIGS. 1-12. Further explanation of the hardware and software components of this combined unit fax/fax-to-E-mail sending device 358 is deemed unnecessary, as it will be readily understood by those skilled in the art having reference to the previous detailed descriptions of this specification. It is understood that new and various communications techniques and systems are available and becoming available which communications techniques and systems are acceptably utilized to provide the “communication links” (e.g., link 132, link 202, link 203, link 205) of the previously described preferred embodiments. By way of example, FIG. 16 depicts schematically an acceptable alternative communication link system 132′ utilized as an acceptable communication link 132 between the PSTN 108 and the FEM-GATEWAY 104. The communication link system 132′ includes what is commonly termed an “Internet Telephony Gateway” 400 and a computer network 116′ (which is acceptably, though not necessarily, that same computer network described herein as the e-mail network 116). The Internet Telephony Gateway 400 is, for example, based on a gateway model currently developed by Dialogic Corporation of Parsippany, N.J. and VocalTec Communications. This Internet Telephony Gateway 400 functions, utilizing for example the developing protocol known as Voice Over Internet Protocol (VoIP), to bridge the circuit-switched PSTN 108 with the regional or global computer network 116′ to which the FEM-SERVER 110 (FEM-GATEWAY 104) is connected as a server, and to, thereby, provide real time communication across the computer network 1116′ (e.g., the Internet) between the fax locale (e.g., devices 102, 106—generically depicted in FIG. 16) and the FEM-SERVER. Thus, the standard telephone and standard fax signals are communicated by the fax device 106 and/or fax interface device 102 (in accordance with one or more of the preferred embodiments discussed above) to the PSTN 108, which passes the signals to the Internet Telephony Gateway 400, which gateway digitizes the telephony signal, compresses it, packetizes it for the computer network (for example, the Internet using Internet Protocol), and routs it to the FEM-SERVER 110 over the computer network (e.g., Internet) 116′. The operation is reversed for packets being communicated from the FEM-SERVER 110 (in accordance with the above described preferred embodiments of the present invention) to the fax locale. Within the context of the broader scope of the present invention, the PSTN 108 and communication link system 132′ (e.g., gateway 400 and computer network 116′) function as a first communication network through which the fax locale (devices 102, 106) and the FEM-GATEWAY 104′ communicate. While the embodiments of the present invention which have been disclosed herein are the preferred forms, other embodiments of the present invention will suggest themselves to persons skilled in the art in view of this disclosure. Therefore, it will be understood that variations and modifications can be effected within the spirit and scope of the present invention and that the scope of the present invention should only be limited by the claims below. Furthermore, the equivalents of all means-or-step-plus-function elements in the claims below are intended to include any structure, material, or acts for performing the function as specifically claimed and as would be understood by persons skilled in the art of this disclosure, without suggesting that any of the structure, material, or acts are more obvious by virtue of their association with other elements.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention relates generally to the field of communications associated with the communication of facsimile messages and associated with the uniting of traditionally distinct message delivery systems such as facsimile delivery and electronic mail delivery. The popularity of the quick and easy facsimile delivery of messages and the popularity of low cost delivery of messages via electronic mail (also referred to as “E-mail”) messaging systems have for quite some time enticed attempts to mingle the two technologies, and efforts have become even more fervent in the wake of the recent explosive increase in use of the global computer data network known as the “Internet”. An early attempt to mingle facsimile and Email message delivery technologies is represented by the Facsimile Transmission System of U.S. Pat. No. 4,941,170 (Herbst). Herbst appears to show a system which uses an E-mail system to route a facsimile file between controllers associated with the E-mail network in order to accomplish, in the end result, a facsimile input and a facsimile output. U.S. Pat. No. 4,837,798 (Cohen, el al.) discloses a system whose stated goal is to provide a single, “unified” electronic mailbox for storing either messages or notification of the existence of messages of different types. Cohen, et al. does mention the integration of facsimile mail messages, but does not appear to clearly discuss how the system would handle such fax messages. U.S. Pat. No. 5,339,156 (Ishii) discloses a system where a data communication center and a facsimile mail center are linked in a manner to accomplish the delivery of E-mail messages by way of facsimile, but not visa versa. At the same time, the facsimile industry has seen a growth in the use of interactive communication with remote store and forward facilities (“SAFF”) for storage in a “fax mailbox” in digital image form and managed delivery of facsimile messages, as exemplified by U.S. Pat. No. 5,291,203 (Gordon, et al.); and further, the art includes the use of locally appended devices to the sending fax device to intercept commands and route facsimile messages, in facsimile form, to a remote SAFF for subsequent delivery to a destination facsimile device, as exemplified by U.S. Pat. No. 5,555,100 Bloomfield, et al. Each of the above-mentioned references appears dedicated to the ultimate delivery of the message to a destination fax machine or fax capable device such as an equipped personal computer (“PC”).
<SOH> SUMMARY OF THE INVENTION <EOH>Briefly described, the present invention comprises a fax to E-mail system and related method whereby a facsimile transmission is sent to its recipient via electronic mail (such as through the “Internet”) rather than via another facsimile machine, and is delivered in such a manner that it can be retrieved by the recipient at his/her E-mail device, in the ordinary course of retrieving the E-mail, and viewed on the screen of the E-mail device. The invention provides for and accomplishes the delivery of a document, which begins as a hardcopy, as an electronic file retrieved through an E-mail recipient's terminal and read at the computer screen of the E-mail recipient's terminal. The system of the present invention includes, in its most preferred apparatus and method embodiments, among other elements, a “local interface” and a remotely located Facsimile/E-mail server system (FEM-GATEWAY) which cooperate to provide a Facsimile/E-mail service whereby hardcopy information, including textual and/or graphical portions, is communicated between a facsimile device and an E-mail device, while still allowing conventional operation of the facsimile device. More specifically, the present invention comprises apparatus and methods for the input of an E-mail address locally to a facsimile machine, for directing the transmission of the image to a remotely located FEM-GATEWAY, for receiving and converting data representative of an image scanned by the facsimile device (referred to herein as facsimile information) into a computer-readable data file formatted in an image data file format, for creating an addressed E-mail message to which the computer-readable data file is attached, and for delivering the E-mail and attachment to a desired recipient over a data network such as a global computer network, such as the “Internet”. In its preferred embodiments, the interface device of the present invention uniquely receives an alphanumeric E-mail address, displaying the address for verification by the user, is specially configured to command the FEM-GATEWAY to transmit a fax document via E-mail, and conveys an E-mail address and fax message (through the attached fax device) to the FEM-GATEWAY. The interface device allows any pre-existing fax machine to function as the sending machine of the invented system, with no modification to the fax machine itself. The present invention's handling of the fax message by converting the message to a computer-readable image file and attaching it to a system generated E-mail message, and the system's cooperative interaction between the interface device and the FEM-GATEWAY uniquely allow the present invention to accomplish its intended goal of delivering fax messages via the E-mail system. In at least one alternate embodiment, the functions of the interface device are embedded into a conventional fax device. The present invention bridges two networks, interacting first in the telephone network (PTN) to transmit as telephony signals a facsimile message to the FEM-GATEWAY and then interacting in the E-mail network (through the “Internet” or other data networks) to deliver an E-mail message to its intended E-mail address. A sender wishing to send a facsimile message selectively activates the interface device locally associated with the sending fax machine which results in the fax being sent differently than a normal fax transmission. In accordance with the preferred embodiments, the interface device initiates a connection through the PTN to a server at a remote FEM-GATEWAY, and the interface device interacts with that server to generate and deliver to the intended recipient's E-mail address an E-mail message to which is attached the facsimile document formatted as a computer-readable image file compatible with the recipient's E-mail terminal. Numerous features, objects and advantages of the present invention in addition to those mentioned or implied above, will become apparent upon reading and understanding this specification, read in conjunction with the appended drawings.
20040308
20081104
20050120
61668.0
5
SAFAIPOUR, HOUSHANG
FACSIMILE TO E-MAIL COMMUNICATION SYSTEM WITH LOCAL INTERFACE
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,795,720
ACCEPTED
Asset tag with event detection capabilities
Described herein are a transient event detector comprising electrical circuitry suitable to detect a transient event, and a container having a wall with at least two electrically conductive contacts that are electrically connected to the electrical circuitry, each of the at least two electrically conductive contacts being electrically isolated from each other, and a movable electrically conductive piece that intermittently connects at least two of the at least two electrically conductive contacts when the electrically conductive piece is in motion, said movable electrically conducting piece having a mass that is low enough such that if the movable electrically conducting piece is at rest and bridges two of the at least two electrically conductive contacts no transient event is detected by the electrical circuitry, methods of use and methods of manufacture.
1) A transient event detector comprising a container comprising at least one detecting area located on or in at least one wall of the container and at least one movable piece contained within the container, wherein at least one of the at least one detecting areas changes state when the movable piece enters or leaves a predetermined distance from the detecting area and an electronic circuit that is suitable to detect a transient change of state of the at least one detecting area. 2) The transient event detector according to claim 1 wherein there are at least two movable pieces. 3) The transient event detector according to claim 2 where at least one of the at least two movable pieces is electronically, magnetically, chemically, physically or structurally different from at least one of the remaining movable pieces. 4) The transient event detector according to claim 1 wherein at least one of the at least one event detecting areas detects electrical change events, magnetic change events, chemical change events, physical change events or structural change events. 5) The transient event detector according to claim 4 having at least two event detecting areas, at least one of the at least two event detecting areas being different from at least one of the remaining event detecting areas. 6) The transient event detector according to claim 1 wherein the container has at least two walls. 7) The transient event detector according to claim 10 where there are at least two event detection areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls. 8) The transient event detector according to claim 1 comprising at least two walls, at least two event detecting areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls, at least one of the at least two event detecting areas being different from at least one of the remaining event detecting areas and able to detect electrical change events, magnetic change events, chemical change events, physical change events or structural change events, and wherein there are at least two movable pieces and at least one of the at least two movable pieces is electronically, magnetically, chemically, physically or structurally different from at least one of the remaining movable pieces. 9) A transient event detector comprising electrical circuitry suitable to detect a transient event, and a container having a wall with at least two electrically conductive contacts that are electrically connected to the electrical circuitry, each of the at least two electrically conductive contacts being electrically isolated from each other, and a movable electrically conductive piece that intermittently connects at least two of the at least two electrically conductive contacts when the electrically conductive piece is in motion, said movable electrically conducting piece having a mass that is low enough such that if the movable electrically conducting piece is at rest and bridges two of the at least two electrically conductive contacts no transient event is detected by the electrical circuitry. 10) The transient event detector according to claim 9 comprising at least first, second and third electrically conductive contacts and the container is configured such that there is at least one movement barrier that prevents the movable electrically conducting piece from freely moving between a position that bridges first and second conductive contacts and a position that bridges first and third conductive contacts. 11) The transient event detector according to claim 10 wherein the movement barrier is the container's configuration. 12) The transient event detector according to claim 11 wherein the first electrically conductive contact is located between the second and third electrically conductive contacts and the second and third electrically conductive contacts are located at opposite ends of the container. 13) The transient event detector according to claim 12 wherein the second and third electrically conductive contacts are parallel to each other and substantially perpendicular to the first electrically conductive contact. 14) The transient event detector according to claim 12 wherein the second and third electrically conductive contacts are parallel to each other and the first conductive contact is angled relative to at least one of the second or third electrically conductive contacts. 15) The transient event detector according to claim 14 wherein the first conductive contact is angled relative to the second and third electrically conductive contacts. 16) The transient event detector according to claim 11 wherein the first and second electrically conductive contacts are on the same surface, the third electrically conductive contact is perpendicular to both the first and second electrically conductive contacts, and the first electrically conductive contact is located between the second and third electrically conductive contacts and is raised relative to the second electrically conductive contact.
FIELD OF THE INVENTION The present invention relates generally to asset tags with event detection capabilities. More specifically, the present invention relates to asset tags with event detection capabilities wherein the events are tilt, motion, acceleration, temperature, breakage, button presses, or the like. BACKGROUND The identification, measurement and/or control of physical assets are important aspects of modem business practices. Frequently, assets are misidentified, misplaced or incorrectly dispensed, thereby leading to incorrect inventory and/or receivables. A common modem method for dealing with asset control is the use of bar codes. These bar codes can be used to both identify a product and support the determination of the time and location of dispensation. Another increasingly common method for asset control is the use of radio frequency tags (RF tags). These are tags that are attached to inventory and that include at least a radio transmitter and identification circuit. The identification circuit continually, periodically, or after an interrogatory is sent from a receiver sends the identification of the product. These systems, while excellent for product identification, are not optimized for tracking events that may occur to the products. These events may be movement of the asset, tilting of the asset, acceleration of the asset, changes in temperature of the asset, breakage of the asset (or associated tag), button presses, and the like. Therefore, there is a present and continuing need for improved asset tags used for the identification, measurement and/or control of physical assets. SUMMARY OF INVENTION It is an object of the present invention to provide a transient event detector comprising at least one detecting area located on or in at least one wall of the container and at least one movable piece contained within the container, wherein at least one of the at least one detecting areas changes state when the movable piece enters or leaves a predetermined distance from the detecting area and an electronic circuit that is suitable to detect a transient change of state of the at least one detecting area. It is another object of the present invention to provide a transient event detector, as above, that comprises at least one movable piece contained within a container. It is a yet another object of the present invention to provide a transient event detector, as above, comprising at least two movable pieces. It is still yet another object of the present invention to provide a transient event detector, as above, that has at least one event detecting area that can interact with at least one movable pieces. It is a further object of the present invention to provide a transient event detector, as above, that comprises at least two event detection areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls. It is a yet a further object of the present invention to provide a transient event detector, as above, comprising at least two walls, at least two event detecting areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls, at least one of the at least two event detecting areas being different from at least one of the remaining event detecting areas and able to detect electrical change events, magnetic change events, chemical change events, physical change events or structural change events, and wherein there are at least two movable pieces and at least one of the at least two movable pieces is electronically, magnetically, chemically, physically or structurally different from at least one of the remaining movable pieces. It is still yet a further object of the present invention to provide a transient event detector comprising electrical circuitry suitable to detect a transient event, and a container having a wall with at least two electrically conductive contacts that are electrically connected to the electrical circuitry, each of the at least two electrically conductive contacts being electrically isolated from each other, and a movable electrically conductive piece that intermittently connects at least two of the at least two electrically conductive contacts when the electrically conductive piece is in motion, said movable electrically conducting piece having a mass that is low enough such that if the movable electrically conducting piece is at rest and bridges two of the at least two electrically conductive contacts no transient event is detected by the electrical circuitry. It is an additional object of the present invention to provide a transient event detector, as above, comprising at least first, second and third electrically conductive contacts and the container is configured such that there is at least one movement barrier that prevents the movable electrically conducting piece from freely moving between a position that bridges first and second conductive contacts and a position that bridges first and third conductive contacts. It is yet an additional object of the present invention to provide a transient event detector, as above, wherein the movement barrier is the container's configuration. It is yet an additional object of the present invention to provide a transient event detector, as above, wherein the first electrically conductive contact is located between the second and third electrically conductive contacts and the second and third electrically conductive contacts are located at opposite ends of the container. It is still yet an additional object of the present invention to provide a transient event detector, as above, wherein the second and third electrically conductive contacts are parallel to each other and substantially perpendicular to the first electrically conductive contact. It is another object of the present invention to provide a transient event detector, as above, wherein the second and third electrically conductive contacts are parallel to each other and the first conductive contact is angled relative to at least one of the second or third electrically conductive contacts. It is yet another object of the present invention to provide a transient event detector, as above, wherein the first conductive contact is angled relative to the second and third electrically conductive contacts. It is still yet another object of the present invention to provide a transient event detector, as above, wherein the first and second electrically conductive contacts are on the same surface, the third electrically conductive contact is perpendicular to both the first and second electrically conductive contacts, and the first electrically conductive contact is located between the second and third electrically conductive contacts and is raised relative to the second electrically conductive contact. It is another object of the present invention to provide an improved tilt sensor. It is yet another object of the present invention to provide an improved event detector. It is a further object of the present invention to provide an asset tag that can detect the tilt each time a bottle is poured and the elapsed time of the pour. It is still a further object of the present invention to provide an asset tag with a user interface for communicating information about an asset. It is still yet another object of the present invention to provide an asset tag that can communicate information in a reliable, accurate, and timely manner with minimum user hassle, overhead, and expense. It is another object of the present invention to provide an asset tag that is easy and cost effective to manufacture. It is a further object of the present invention to provide an asset tag that is durable and can survive impacts and exposure to water, alcohol, heat, and cold. It is an additional object of the present invention to provide an asset tag with a long battery life. It is yet another object of the present invention to provide an asset tag that will not significantly affect the ambiance of an establishment. The novel features that are considered characteristic of the invention are set forth with particularity in the appended claims. The invention itself, however, both as to its structure and its operation together with the additional object and advantages thereof will best be understood from the following description of the preferred embodiment of the present invention. Unless specifically noted, it is intended that the words and phrases in the specification and claims be given the ordinary and accustomed meaning to those of ordinary skill in the applicable art or arts. If any other meaning is intended, the specification will specifically state that a special meaning is being applied to a word or phrase. Likewise, the use of the words “function” or “means” in the Description of Preferred Embodiments is not intended to indicate a desire to invoke the special provision of 35 U.S.C. §112, paragraph 6 to define the invention. To the contrary, if the provisions of 35 U.S.C. §112, paragraph 6, are sought to be invoked to define the invention(s), the claims will specifically state the phrases “means for” or “step for” and a function, without also reciting in such phrases any structure, material, or act in support of the function. Even when the claims recite a “means for” or “step for” performing a function, if they also recite any structure, material or acts in support of that means of step, then the intention is not to invoke the provisions of 35 U.S.C. §112, paragraph 6. Moreover, even if the provisions of 35 U.S.C. §112, paragraph 6, are invoked to define the inventions, it is intended that the inventions not be limited only to the specific structure, material or acts that are described in the preferred embodiments, but in addition, include any and all structures, materials or acts that perform the claimed function, along with any and all known or later-developed equivalent structures, materials or acts for performing the claimed function. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view of a device according to the present invention. FIG. 2a is a top view of the bottom board according to the present invention illustrating a preferred electrical circuit trace for the top side of the bottom board. FIG. 2b is a bottom view of the bottom board according to the present invention illustrating a preferred circuit trace for the bottom side of the bottom board. FIG. 3a is a top view of the middle board according to the present invention illustrating a preferred electrical circuit trace for the top side of the middle board. FIG. 3b is a bottom view of the middle board according to the present invention illustrating a preferred electrical circuit trace for the bottom side of the middle board. FIG. 4a is a top view of the top board according to the present invention illustrating a preferred circuit trace for the top side of the top board. FIG. 4b is a bottom view of the top board according to the present invention illustrating a preferred circuit trace for the bottom side of the top board. FIG. 5 is a simplified hardware diagram of the electrical components for the circuit of the present invention. FIG. 6 is a flowchart describing the preferred manufacturing method according to the present invention. FIG. 6a is an example of an array of board locations in a panel, specifically a middle panel. FIG. 7 is a cut-away view of the device according to the present invention illustrating battery and spring contact placements. FIG. 8 is a cut-away view of the device according to the present invention clearly illustrating placement of the movable pieces in the event detection structures. FIG. 9 is a flow chart of the functionality of the software for the device according to the present invention. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS The present invention is a device 10 that is useful for measuring events that occur to assets. More specifically the device is useful for measuring events such as motion, tipping, acceleration, temperature changes, breakage, button presses or the like using a transient event detector. With reference to the Figures, and initially FIG. 1, the present invention is an asset tag device 10 that is removably or permanently associatable with an asset. This device 10 functions to track physical properties of the associated asset such as location, motion, tilting, changes in temperature, breakage, or the like. The device 10 according to the present invention primarily comprises a body 15 that contains at the least one event detection and reporting circuitry 50 that further comprises at least one event detection structure 35 and an electromagnetic transmitter, such as a radio transmitter. In one preferred embodiment, the device 10, according to the present invention, further includes at least one attachment structure 17. In the most preferred embodiment, the attachment structure is an aperture or opening in the body 15 that is suitably sized to receive a projecting or elongate portion of the asset, such as a neck of a bottle or the like. Other structures that are capable of being received by the aperture 17, such as a suitably sized spheres and the like, are considered to fall within the scope of the present invention. Additionally, other attachment structures, both chemical or mechanical, that function to associate the body 15 to an asset may be used and are also considered to fall within the scope of the present invention. In the preferred embodiment, the body 15 specifically comprises a top section 11, a bottom section 12, and an intermediate section 13 that is sandwiched between the top and bottom sections, 11 and 12, and contains at least one cavity 14 that further contains the event detecting and reporting circuitry 50. Preferably, the event detecting and reporting circuitry 50 is securely either built directly into the cavity 14 or built separately and then attached to an interior surface of the cavity 14 to prevent unwanted movement or breakage of the circuitry 50. In a more preferred embodiment, the top section 11 is a top circuit board 41, FIGS. 4a and 4b, the bottom section 12 is a bottom circuit board 21, FIGS. 2a and 2b, and the intermediate section 13 is a middle circuit board 31, FIGS. 3a and 3b, which are assembled to form a composite body 15. These circuit boards, 21, 31, and 41 are preferably printed circuit boards, which, together, form a complete circuit, outlined in FIG. 5. Materials other than printed circuit boards may be used for the top, bottom and intermediate sections, 11, 12 and 13, and circuit boards other than printed circuit boards may be used for these sections, and still fall within the scope of the present invention. In order for two or more, and preferably all three boards, 21, 31 and 41, to form a complete electrical circuit, each board includes one or more electrical through connections, referred to generally as 32. The bottom circuit board 21 includes a plurality of small apertures 28 used for electrically connecting the event detection and reporting circuitry 50 to a circuit printed on one or both sides of the bottom board 21. In this preferred embodiment, elements of the event detection and reporting circuitry 50 are surface mounted to a top surface of the bottom board 21 (thereby defining which board is considered the bottom board). As can be seen from FIGS. 2a and 2b, the preferred embodiment include circuit traces on both top and bottom surface of the bottom board 21. The surface mounting of elements of the event detection and reporting circuitry 50 is accomplished using any of a number of readily available methods well known to one of ordinary skill in the arts. The middle circuit board 31 includes an aperture or channel that forms the cavity 14 that will ultimately contain the event detection and reporting circuitry 50. The middle circuit board 31 further contains at least one event detection structure 35, which in this embodiment comprises at least one aperture 34 that will contain a movable piece 36 for each aperture 34. The at least one event detection structure 35 and/or aperture 34 is electrically connected to the top and bottom circuit boards, 41 and 21, through the apertures 32 that electrically extend through the middle board 31. As can be seen from FIGS. 3a and 3b, the preferred embodiment include circuit traces on both top and bottom surface of the middle board 21. Referring to FIGS. 4a and 4b, the preferred circuit trace on the top surface of the top board 41 comprises a battery ground contact 43 electrically connected to a first of the at least two through holes 32a for electrically connecting the top, middle, and bottom boards, 41, 31 and 21. The preferred circuit trace on the bottom surface of the top board 41 has at least one first printed contact configuration 44 that is electrically connected 45 to any additional printed contact configurations 44 and further electrically connected to a second of the at least two through holes 32b for electrical connection to the middle and bottom boards, 31 and 21. Referring to FIGS. 2a and 2b, the preferred circuit trace on the top surface of the bottom board 21 comprises a circuit trace 22 that electrically connects the various elements of the event detection and reporting circuitry 50. The exact configuration depends upon the exact circuitry used. However, in a preferred embodiment of the present invention, the printed circuit found on the top surface further comprises at least one second contact configuration 23 that is electrically connected 24 to the circuit trace 22. Also, there is a loop antenna 25 that is tuned by an antenna tuning capacitor 26 electrically connected to the circuit trace 22 that forms a part of a preferred radio transmitter for event detection information transmission. These electrical connections to the circuit trace 22 allow the second contact configuration 23 and loop antenna 25 and antenna tuning capacitor 26 to be utilized by the event detecting and reporting circuitry 50. In the preferred embodiment, a switch, such as a button type single pole switch is included by electrically attaching the switch to the event detecting and reporting circuitry 50 by electrical leads that extend through at least two of the through the holes 28 located in the bottom board 21. Preferably, however, a second circuit 51 is created on a bottom surface of the bottom board 21. This second circuit 51 is in electrical contact with the circuit trace 22 through some of the small apertures 28. Additionally, there may be a ground plane 29, and preferably the second circuit 51 and the ground plane 29 form an independent switch circuit, whereby the temporary electrical shorting of the independent switch circuit (ground plane 29 to the second circuit 51), such as using an electrically conductive polymer concave button, would constitute a measurable transient event. As can be seen from FIG. 5, the electrical circuit is preferably powered by a battery, most preferably a lithium coin cell. The batter is electrically connected to a microprocessor/transmitter that preferably has the microcontroller and transmitter physically integrated and a built in periodic wakeup mechanism, 1024 instructions of non-violate “code” memory, 41 bytes of violate “ram” memory, an RC oscillator and an integrated Real Time Reference. Electrically connected to the transmitter portion is a loop antenna with an antenna tuning capacitor. Also connected to the microcontroller are a crystal and, optionally, a push button that is electrically connected to an input pin of the microcontroller. Finally, there are at least one event detectors that are electronically connected to an input pin of the microcontroller. The at least one event detection structure 35 according to the present invention may detect any of a number of individual or multiple events. In the preferred embodiment, the event detection structure 35 is a motion/tilt sensor that is comprised of the above discussed aperture 34 in the middle board 31, and the first and second contact configurations 44 and 23 printed on the top and bottom circuit boards 41 and 21. These form a container for a movable, electrically conducting piece 36 such as a metal bearing or the like. The aperture 34 may assume any number of alternate shapes, such as a square hole, a rectangular hole, an octagonal hole, or the like, and still fall within the scope of the present invention so long as it is capable of forming a container for the movable, electrically conducting piece 36. In an alternate embodiment, the aperture 34 may be beveled, yielding a shape like a frustum. In this embodiment, the event detection structure 35, which is a tilt detector, is able to detect different tilt angles, depending upon the angle of the bevel. The container may be of any suitable shape sufficient to contain the movable piece, but is not limited to a singe chamber, lobe or other size/waist variation. While a single event detection structure 35 is sufficient for event detection, the preferred embodiment utilizes four for statistical accuracy and cost efficiency. The configuration of the first and second contact configurations 44 and 23 have at least one edge, preferably two, that are electrically contactable with the electrically conducting piece 36 at any given rest position. Further, this at least one edge is positioned and sized such that the electrically conducting piece 36 is capable of making electrical contact between the at least one edge and conductive plating 38 on the inside surface of the aperture 34. The first and second contact configurations, 44 and 23, are preferably star type configurations comprising a central node with at least two, preferably eight radially extending arms. In the preferred embodiment, the first contact configuration 44 is rotated by 22.5 degrees relative to the second contact configuration 23 (in order to maximize movement perturbation of the electrically conducting piece 36). Other configurations, symmetrical, non-symmetrical, matching and/or non-matching, may be used for the first and second contact configurations 44 and 23 and still fall within the scope of the present invention. Other event detection structures 35 may be used and still fall within the scope of the present invention. In an alternate embodiment the event detection structure 35 is a motion sensor, such as can be formed by changing the contact configurations to merely measure a simple change in state. In another alternate embodiment, the event detection structure 35 is a temperature sensor, such as can be accomplished by using a thermistor or changes in a crystal oscillator or the like. In use, the asset tag device 10, according to the present invention, is associated with an asset. This association may be either permanent, such as by adhesive or the like, or removable, such as placement, attachment by hook and loop fasteners, or the like. When a transient event, such as motion, tilting, acceleration, temperature change, breakage, button press or the like occurs, the tag 10 detects the transient event and reports the transient event to a remote receiver through the event detection and reporting circuitry 50. In the preferred embodiment of the event detection structure 35, the motion/tilt detector, the transient event is a change of state that is detected when electrical continuity between the conductive plating 38 and the first contact configuration 44 is removed and replaced by electrical continuity between the metallic plating 38 and the second contact configuration 23 (or vice-versa), such as occurs when the tag is moved or tilted. In the most preferred embodiment, the electrically conductive piece 36 is light enough such that when it is at rest and in contact with the conductive plating 38 and either the first or second contact configurations 44 or 23, there is effectively no measurable conduction. Conduction only occurs when the conductive piece 36 is moved across the aperture 34 and stopped by the other side (the sudden reversal of the travel direction of the conductive piece 36 allows current to flow from the conductive plating 38 through the conductive piece 36 and to the contact configurations, 44 or 23). This allows the detector to be made much smaller that previously possible and lowers manufacturing costs. Generally, the event detection structure 35 is a dynamic event detector, which is a multi-piece detector that detects a change in state caused by the movement of one of the pieces. In its most general form, the dynamic event detector is a container that has at least one event detection areas within the container. The container holds at least one movable piece. An event is detected when at least one of the movable pieces moves to within a predetermined distance from at least one of the event detection areas. Critically, there needs to be electrical circuitry sufficient to detect a dynamic event. The circuitry must be sophisticated enough to discriminate the difference between the state of the movable piece at rest and bridging two contacts and the movable piece in motion and bridging two contacts, regardless of whether a rest state is measured or not. A dynamic or transient event includes, but is not limited to, a change in resistance caused by the contact of a movable piece on or near a suitable detection area, a current caused by the movement of a movable piece across a detection area, a current caused by the contact of a movable piece between two detection areas, a magnetic spin change caused by a magnetic movable piece moving near or across a detection area, a temporary change in crystal structure caused by impact of a movable piece on a detection area, a temporary change in chemical configuration, such as a cis-trans shift, caused by a movable piece, or the like. Additionally, there may be multiple different event detectors, such as an electrical event detector and a magnetic event detector, which may utilize either the same movable piece or different movable pieces. As a specific example, the following description of the operation of the present invention relates to use of the present invention in an environment where alcoholic beverages are sold and consumed. This description is not to be taken in a limiting sense but is made merely for the purpose of describing the general operating principles of the invention. Asset tag devices 10 are physically attached to assets, such as bottles of wine or to bottles of distilled spirits, typically using an aperture type attachment structure 17. The asset tag devices 10 are then able to detect and report transient events that occur to the bottles, such as movement, tipping, temperature changes or the like. Such asset tags may be used in systems including, but not limited to the one disclosed in co-pending U.S. application Ser. No. ______, filed simultaneously herewith, the disclosure of which is incorporated herein by reference. The preferred method for manufacturing the device 10, according to the present invention, see FIG. 6, begins with three distinct panels, top panels, bottom panels and middle panels, 141, 121, and 131, respectively. These three distinct panels comprise arrays of top, bottom, and middle boards, 41, 21, and 31, which are the preferred forms of the top, bottom and intermediate sections, 11, 12, and 13 discussed above. Preferably, top panels 141 correspond to and are used to manufacture multiple top boards, 41, middle panels 131 correspond to and are used to manufacture multiple middle boards, 31, and bottom panels 121 correspond to and are used to manufacture multiple bottom boards, 21. Preferably, the bottom panels 121 are 30 mil 12×9 inch panels of 0.5 oz FR4 (Fire Retardant Type 4) or other materials that are commonly used as circuit boards in the industry. Preferably, the middle panels 131 are 160 mil 12×9 inch panels of 0.5 oz FR4 or other materials that are commonly used as circuit boards in the industry. Preferably, the top panels 141 are 30 mil 12×9 inch panels of 0.5 oz FR4 or other materials that are commonly used as circuit boards in the industry. Preferably, multiple individual panels are manipulated simultaneously in stacks, and multiple stacks of panels are also manipulated simultaneously. However, individual panels or individual stacks of panels may be manipulated separately and at different times from other panels or stacks and still fall within the scope of the present invention. The top, middle, and bottom panels, 141, 131, and 121, are stacked and then drilled for tooling holes 180. Blocks 100 and 110, FIG. 6. The stacks of panels are then placed onto pin registered frames for further processing. Block 120, FIG. 6. In the stack of top panels, at least two electrical through connections 32 are drilled into each top board location for electrical connection between the top, middle and bottom circuit board locations, 41, 31, and 21. In the stack of middle panels, the at least two electrical through connections 32 are drilled into each middle board location for electrical connection between the top, middle and bottom circuit boards. There are also at least one, preferably four apertures 34 drilled, one for each event detection structure 35. In the stack of bottom panels, two electrical through connections 32 are drilled into each bottom board location for electrical connection between the top, middle and bottom circuit boards and a plurality of small apertures 28 for electrical connection to event detection and reporting circuitry 50 in each bottom board location. Block 130, FIG. 6. The stacks of panels are separated into individual panels and circuit traces, whether located on one or both sides of the boards, are created onto individual board locations using techniques common in the circuit board industry. These circuit traces include at least conductive plating of the electrical through connections 32 and event detection structure apertures 34 and are created onto each top, middle, and bottom board location of top, middle, and bottom panels 141, 131, and 121. Block 140, FIG. 6. The separated and circuited panels are reassembled into stacks and placed onto a routing machine using a pin registered frame. Block 150, FIG. 6. At least one, preferably four, notches are routed into bottom and middle panel stacks around each individual bottom and middle board location, respectively. The notches in the bottom panel stacks should match and register with the notches in the middle panel stacks. Additionally, a component cavity 14 is routed into each middle board location in each middle panel stack. Block 160, FIG. 6. Alternatively, this notching step could be performed on the top and middle panels. If the above steps are performed on macro-panels (panels larger than 12×9 and typically sized to accommodate four 12×9 panels), the stacked macro-panels are cut or otherwise separated into 12×9 panel stacks. Block 170, FIG. 6. Next, the top and middle panels, 141 and 131, are re-separated from their stacks and an individual middle panel 131 is placed bottom down in a pin registered frame and an adhesive, preferably two-component epoxy, is stenciled onto the top surface of the middle panel 141 on each middle board location. Block 180 and 190, FIG. 6. A top panel 141 is mated on top of the middle panel using the pin registered frame to form a top/middle composite assembly. Block 200, FIG. 6. Multiple top/middle composite assemblies may be stacked and pressed for epoxy curing. After curing, the individual composite assemblies are reseparated from the stacks for further processing. Separately, whether before, simultaneously or after the top/middle composite assemblies are formed, the event detecting and reporting circuitry 50 is surface mounted onto each individual bottom board location 21 of separated bottom panels 121. This process is accomplished using methods that are common to the industry. Block 210, FIG. 6. The bottom panels 121 are then placed into a pin registered programming/test fixture to program and test the surface mounted event detecting and reporting circuitry 50. Circuits 50 with bad tests are noted for exclusion from use as ultimate product. Block 220, FIG. 6. At least one, preferably two, test capacitors 190 located on each of the bottom panels 121, preferably located at each of the four corners of the bottom panels 121, are measured to determine proper antenna tuning capacitor target size adjustments for the antenna tuning capacitors 26. After the antenna tuning capacitor target size adjustments are determined, the capacitance of each of the antenna tuning capacitors 26 is adjusted by drilling a hole in each of the antenna tuning capacitors with a size that brings the antenna tuning capacitors generally equal to the target size, thereby creating an antenna tuning capacitor 26 that tunes the antenna 55 to the specific frequencies used by the devices 10 according to the present invention. The bottom panels 121 may be stacked during this step, especially when the adjustment drill size of each of the individual panels is the same. In a preferred embodiment of this tuning method, there are at least two differently sized tuning capacitors 190 that are measured and used to calculate the target size adjustments. In an even more preferred embodiment, there are four pairs of two differently sized test capacitors 190, one pair located adjacent to each corner of the bottom panel 121 (thus allowing for compensation for dielectric, thickness and other manufacturing variations across the board). Block 230, FIG. 6. Either simultaneously, or before or after the event detecting and reporting circuitry 50 is surface mounted to the bottom board locations, the reseparated top/middle composite assemblies are turned over and replaced in a pin registered frame, thereby exposing the electrical component cavity 14. For each top/middle board location in the top/middle composite assembly, batteries are placed into the component cavity 14 and tilt/motion sensing pieces 36 are placed into their appropriate positions in the at least one aperture 34. Block 240, FIG. 6, see also FIGS. 7 and 8. After these components are appropriately placed, the exposed surface of the top/middle panel assembly is stenciled with two-component epoxy at each top/middle board location and a bottom panel 121 with surface mounted circuitry 50 is mated to the top/middle composite assembly using the pin register frame thereby creating a top/middle/bottom composite assembly. Multiple top/middle/bottom composite assemblies are then stacked together and placed into a press for epoxy curing. Block 250, FIG. 6. After curing, the top/middle/bottom composite assemblies are reseparated and the electrical through connections 32 are soldered together, thereby creating an electrical connection between the top, middle and bottom board locations. Block 260, FIG. 6. In an alternative embodiment, spring contact components are used instead of soldering for electrical connection between the top, middle, and bottom boards, 41, 31, and 21, respectively. Next, a double backed adhesive sheet, stenciled epoxy, stenciled adhesive, or other adhesive is used to adhere a polyester overlay to both top and bottom surfaces of the top/middle/bottom composite assemblies. Preferably, a pin registered frame is used. The polyester overlay for the bottom surface may include, in an alternate embodiment, a conductive button portion for shorting (activating) a switch circuit, such as previously described and illustrated above. Block 270, FIG. 6. A final route on the top/middle/bottom board assemblies is performed routing everywhere except for where the notches are located in the middle and bottom board locations, thereby creating one or more devices 10 that are attached to the panel matrix via at least one small tab connecting the top boards 41 sections to the top panel matrices. Block 280, FIG. 6. An attachment structure 17, such a bottle mounting hole can be routed into the second composite assembly at this time and any exposed interior surface may be painted to match the exterior (rubber or plastic inserts may be used instead of paint). Block 290, FIG. 6. Preferably, the attachment structure is routed during the final route of Block 280. Each individual device 10 in the array may be tested by flipping the top/middle/bottom composite assembly quickly several times. Block 300, FIG. 6. A receiver receives and records signals for each of the devices 10 in the array. This verifies operation of the circuitry and more specifically the transmitter signal strength and verifies tilt sensor 35 accuracy. Preferably, this may be performed on several stacked top/middle/bottom composite assemblies simultaneously. Additional vibration and or heat/cold cycle testing can be performed at this time. The test date may optionally be recorded on each panel prior to separation of the tags from the array. Programming of the device 10 according to the present invention includes several critical functions, as described below. First, the device 10 must accurately be able to detect each transient event, such as a pour of a bottle, and the elapsed time of each event. Second, the device 10 must relay pour information and any other predetermined information reliably, accurately, and timely to one or more receivers with minimum user hassle, overhead, and expense. Third, preferably, there is a button than can be used to indicate when an associated asset is empty. This button can also be used during setup to assign the device 10 to a specific asset, a receiver, or host software. Alternately, the button can be used to transmit an information request to a receiver or host software. The preferred embodiment of the device 10 is designed with a three year functional lifetime for practical and reliability reasons. To support the limited functional lifetime, the device 10 preferably comprises an internal 32-Bit Life Timer that starts at zero and increments when the device 10 is in an unused or untilted position. This allows users to store currently unused devices 10 in a used/tilted position until they are needed. After the 32-Bit Life Timer counts little more than three years, software in the device 10 will disable functionality of the device 10. Other time durations may be used and still considered to fall within the scope of the present invention. In the preferred embodiment, the device 10 has at least two discrete event detection sensors, preferably a tilt sensor and a button. To minimize the latency of data transmission to the host, when collecting event data the device 10 transmits the event detection data immediately after detection. In the case of a button press, this means as soon the button is pressed without waiting for it to be released. For a tilt event, it is after the device 10 is tilted and then untilted. Preferably, event data for a tilt event includes the length of the tilt. In alternative embodiments, only one event detection sensor may be used. Other event detection sensors may be used, such as motion, temperature, acceleration, breakage (of the asset or the device 10), and the like. All such options are considered to fall within the scope of the present invention. This immediate data transmission is called an Immediate Mode Transmission. It includes the immediate event data as well as a multitude of other data, which may include but is not limited to, a unique preferably 32-bit tag identification number (ID), multiple (preferably 15) previous events, a current event number, a life timer value (to determine the age of the device 10), and a cyclic redundancy check (“CRC”). When the device 10 is located within a realistic range from a receiver, typically about 50 feet, then a large majority (95% or more) of Immediate Mode Transmissions will be successfully received by the receiver. Reasons for unsuccessful reception include, but are not limited to, transmission collisions with another simultaneous transmission or spurious interference from other unrelated radio energy sources. In order to prevent the loss of data, the device 10 program comprises an event buffer that stores a number of the most recent, preferably 16, events. Therefore, each Immediate Mode Transmission not only contains the most recent events but also the previous 15. Because there may be long time durations between detected events, if only Immediate Mode Transmissions were sent, then there could be an indefinite latency in transferring data if an Immediate Mode Transmission was not successfully received. Therefore, there are Beacon Mode Transmissions that are periodically transmitted, whether there are new events or not. There are two types of Beacon Mode Transmission, slow and fast, with the only difference being the frequency of transmission. Preferably, device 10 will always transmit a Slow Beacon Transmission for a first fixed duration, preferably every five minutes, when untilted. However, after an event occurs (and an Immediate Mode Transmission Occurs) the device 10 switches to Fast Beacon Mode. The device 10 then sends a Fast Beacon Transmission for a second, short duration, preferably every ten seconds, for a third intermediate duration, preferably for one minute, and then switches back to Slow Beacon Mode. This decreases any latency of any new event data being collected by the system. It also allows more accurate “time-stamping” of the detected event. Lastly, it dramatically decreases the likelihood of losing event data. Other durations may be used and still considered to fall within the scope of the present invention. Beacon Mode Transmissions provide another function in addition to handling data latency problems. It also prevents data loss from occurring when devices 10 are moved temporarily out of the range of the receiver. For example, in a single receiver system, the device 10 may be temporarily moved out of receiver range to pour a drink. Because the event is stored in the memory of the device 10, when the device 10 is brought back in range, the receiver will collect the new data during the next successful Beacon Mode Transmission. Thus, no data will be lost as long as less than 16 events occur before a successful Beacon Mode Transmission. This allows an asset to be used or stored out of range as long as it is periodically moved into receiver range. In order to facilitate the event buffer mechanism, the device 10 also maintains a (preferably 24-bit) Event Number that starts out at 0 when the device 10 is first manufactured. Each time there is a new event, this Event Number is incremented. In each transmission, Immediate and Beacon, not only are the data for the 16 stored events included in the transmission but also the entire 24-bit Event Number. This serves several purposes. First, since the 16 event buffer is continually reused in a circular fashion, the lower 4 bits of the Event Number will always be pointing to the oldest event entry in the event buffer. For instance, before any events have occured, when the device 10 is first manufactured, the Event Number will be 0 meaning there were no events, ever, for this device 10. After a first event, the event data will be stored in roll-over buffer location 0 and the Event Number will be incremented to 1. After the 16th new event the new data will be stored in the 16th location and the Event Number will be 16. The 17th new event is then stored in location 0 and the Event Number will be 17. Based on the Event Number, the receiver can determine how many new events are contained in the device 10. This is accomplished because the very first time a receiver receives a transmission from particular device 10; it records all 16 stored events and then stores the current Event Number for that device 10. Subsequently, every time a transmission is successfully received by the receiver from that device 10, the receiver or host software compares the Event Number in the transmission to the stored Event Number for that device. If the Event Number does not change, then there were no new events. If, for example, the Event Number increases by three, then receiver records the three new events. The Event Number is also stored with the data for that event in the host software. This facilitates multi-receiver systems because in many cases more than one receiver may store the same events from the same devices 10. However, the host software can determine duplicates because it also keeps track of the Event Numbers. For example, if device #123 has a current Event Number of 55, and is in range of two receivers, then both receivers will have stored that the last event for device #123 was 55. If the device #123 is then tilted, the Event Number will increment to 56. If both receivers successfully received a transmission from device #123, then they will both store the new event data and both update the current Event Number for device #123 to 56. When the host software collects data from the first receiver, it will verify and determine that it does not have Event Number 56 from device #123 yet. However, when it collects the data from the second receiver, it will know it already has that event data and not save the duplicate. The Event Number also allows the system to detect if more than 16 events have occurred since a successful transmission reception from the device 10. For example, if a device 10 is taken out of realistic range of any receiver and 19 events occur and then it is brought back into range of at least one receiver, that receiver will detect that there are 19 new events but knows that only the latest 16 are in the transmission and will only store those data. After the host software collects the data from all receivers it will detect that there are 3 missing events for that device 10. It can then generate a warning on any reports where this would be relevant. The receiver stamps and records the time each transmission is received. In addition, the receiver stamps and records a value for each event that represents the time the event occurred or may have occurred (“Possible Age”). The Immediate Mode, Slow Beacon, and Fast Beacon Transmission all are exactly the same except for an identifier at the beginning that tells the receiver which type of transmission is being received. The main reason for this is to allow the receiver to time stamp the events more accurately. In order to conserve memory in the device 10, the preferred device 10 does not keep track of the chronological time an event occurs but only the order. Because an Immediate Mode Transmission is sent right after the event and it has a field indicating to the receiver it is an Immediate Mode Transmission, the receiver time stamps the new event with a Possible Age equal to the time the transmission was received. In rare cases, the Immediate Mode Transmission may not be successfully received. If that occurs, then if the next Beacon Mode Transmission a receiver receives is a Fast Beacon Transmission, the receiver knows the latest event happened less than one minute ago. The receiver still time stamps the data with the current time but also stores a value called Possible Age indicating the event happened up to a minute before. The receiver also checks if it had heard from the device 10 less than a minute ago and sets the Possible Age to whichever is less. If an Immediate Mode Transmission is not received and the next received transmission is a Slow Beacon Transmission, then the Possible Age for the new event is set to the length of time since the device 10 was last heard from by that receiver. If there is more than one new event, then all the events before the newest event get time stamped with the current time and the Possible Age of the length of time since the device 10 was last heard from by that receiver. The additional transmission of the chronological time of the event is an option that is considered to fall within the scope of the present invention. In addition, the calculation and storage of system data can be performed in devices 10, receivers, host software, or a combination thereof, and all such options are considered to fall within the scope of the present invention. The current device 10 has a 16 Event Buffer, each one byte in length. This means all events must be encoded in one byte (a number between 0 and 255). Preferably, the current device 10 stores a Button Press Event as the value 255. Event times are stored with a resolution of 1/16th seconds. This means the largest duration of an event could be is 254/16ths or 15.875 seconds. To support times longer than this, the value 254 is also reserved to indicate that the time is 253/16ths or greater. The remainder of 16ths is stored in the next event. Unless this is also larger than 253/16ths. Preferably, events of up to 127 seconds are cascaded in this manner. The Event Number is incremented for each entry even though it is part of the same event. The host software combines these cascaded events into one record in the software database. In the preferred embodiment, if the time is 127 or larger only a total of 127 is stored. The host software considers this a special case that is stored as 127 or more and it would be an exception noted to the user on any relevant reports. Different numbers may be used and would be considered to fall within the scope of the present invention. The system can determine when a device 10 stops being heard from. To allow for this, a receiver stores the last time it heard a transmission from a device 10 even if no new event is transmitted. If no receiver hears from a device 10 for a length of time that may be predefined or set by a user, preferably 15 minutes, then the host software can generate a warning that the device 10 is missing. The system can inform the user of the last time the device 10 was received. If a device 10 is heard from again, the system can indicate the time the device 10 was found. This is important because it allows a user to have confidence that all assets are where they should be, that all devices 10 are functioning, and that all data has been collected (at least all data that occurred in the last 15 minutes or other configured warning time). Since it is important for the device 10 to last as long as possible with as small as possible of battery, many design features are used to minimize power consumption. One power reduction method is that the device 10 hardware and software are designed so that, in general, the device 10 is always “sleeping” or in a powered down mode that minimized power consumption. However, the device 10 has a “wake timer mechanism” that “wakes” the device 10 after a predetermined duration. Preferably, this is about 1/27th of a second. If no event occurs, the device 10 wakes about each 1/27th of a second and if untilted just updates the Life Timer with the time it was sleeping. If the device 10 is currently tilted then it increments the Tilt Timer by how long it was sleeping. To facilitate lower cost, lower power usage, and smaller size, the preferred wakeup mechanism is a simple RC (resistor-capacitor) timer or RC oscillator. By itself, the RC timer is not very accurate and would be slightly different between different devices 10 and would also vary for the same device 10 based on temperature. Because the device 10 needs to keep the life timer and determine tilt times as accurately as possible, it uses a unique method to determine the current time constant of the RC timer. It does this by periodically comparing it to an accurate crystal oscillator. Preferably, the current device 10 does this once per hour and whenever an event is detected (in order to calculate event times as accurate as possible in the cases where temperature may have changed in the last hour). This method does not increase the cost, size, or component count of the device 10 because it already has a crystal oscillator to support the radio transmitting function. The crystal oscillator takes more power than the RC timer but it only takes a few thousandths of seconds to do the comparison (and preferably only once per hour), so the overall power consumption is only minutely more than the RC timer. A potentially useful function of this RC timer/crystal method is the device 10 also can measure temperature variations. While stored, the device 10 can be turned over to a tilted state. While in this tilted state, the device 10 does not transmit Beacon Transmissions. In addition, after 127 seconds in a tilted state, the device 10 switches the RC timer to wake it up less often to have even lower power consumption, preferably every 2 seconds. Preferably, when the device 10 wakes up, it supplies voltage to the tilt sensor contact configurations, 23 and 44, on the top and bottom boards to determine whether a sensor is shorted. This is used to determine static tilt. However, no static short may exist while the device 10 is temporarily awake. Therefore, the device 10 also determines dynamic tilt by having a short to a sensor wake it up. Preferably, this is accomplished by having each sensor connected to the In-Out pins of the microcontroller on the device 10. The device 10 software only enables the contact configuration on the opposite side to wake it. In other words, if currently untilted, then the device 10 only enables the contact configuration on currently the “top” (tilted) side to wake it up. If the device 10 is flipped over, then a dynamic short will wake it up. The device 10 knows if it was woken up by the pin change feature so even if no static short is detected it knows it must now be tilted. It then reverses the contact configuration so that the one on the bottom (untilted) side will be the active one. This saves power because the inactive contact configuration will have no voltage applied to it so no power is wasted in the case that there is a static short. The current device 10 transmission protocol for Immediate/Slow Beacon/Fast Beacon Transmissions is formatted as follows: 48 bit synchronization (sync) sequence composed of “b 11110000 11110000 11110000 11110000 11110000 11100010”; 6-bit packet type (preferably 0); 2-bit transmission type (preferably, 00 means immediate, 01 means slow beacon, and 10 means fast beacon); 32-bit device 10 ID number; 8-bit life timer (only the most significant 8 bits of the 32-bit internal value); 8-bit timer calibration value (this may be converted to temperature by the host software because it will vary linearly with temperature); 24-bit Event Number; Sixteen 8-bit event buffer entries; 16-bit CRC in the CCITT-16 convention (used to make sure the transmission was received correctly by the receiver); and 4-bit sequence of “0011” used to be able to determine signal strength by the receiver. It does this by taking a signal strength sample during the 0's and then during the 1's and comparing the difference. Of course, different bit lengths, different amounts, different numbers, and different sequences may be used and all such options are considered to fall within the scope of the invention. Preferably, with the exception of the initial 48-bit sync sequence and the last 4-bit sequence, all actual data is Manchester Encoded. This means that each data bit is actually converted to a 2 bit Manchester sequence of “01” or “10”. A data bit of “0” is converted to a two bit “raw” sequence of “01” and a data bit of “1” is converted to a two bit “raw” sequence of “10”. This is for many reasons. First the preferred transmission method for the device 10 is On-Off-Keying (OOK). This means that radio frequency energy is being generated to transmit a “1” and no radio frequency energy is being sent to transmit a “0”. Because, from the receiver's point of view there is always background radio noise even when no device 10 in range is transmitting, the receiver “averages” the current radio frequency energy received in the last 1/100th of a second or so and then compares the instantaneous received RF energy to this average. If it is greater, than it assumes a raw bit “1” and, if lower, it assumes a raw bit “0”. Preferably, all device 10 transmissions contain an equal number of “raw” 0's versus “raw” 1's. Converting each data bit to a “raw” two bit balanced sequence (“01” and “10”) accomplishes this. This is also the reason the transmission starts with the 48 bit balanced (equal number of “raw” 0's and 1's) sync sequence. This gives the averaging mechanism in the receiver time to stabilize. Additionally, the sync sequence used by the system will ensure that the receiver will not mistake the sync sequence for valid data. If a proper sync sequence is received, the use of Manchester Encoding helps the receiver determine whether a transmission is being successfully received. This is because the only valid “raw” sequence after the synchronization sequence will be “01” or “10” for each actual data bit. Therefore, the receiver knows there is a reception error if “00” or “11” occurs in any “raw” two bit sequence following the sync sequence, and it abandons the decoding. If all the data bits (each two bit raw sequence) are received, the transmission is further validated by the receiver using the 16-bit CRC value. Other methods of transmission and encoding may be used and are considered to fall under the scope of the present invention. Because, in the preferred embodiment, devices 10 transmit for a very short time period (typically 1/100ths of a second) and only every five minutes or when an event occurs, collisions between two device 10 transmissions will be rare. If a collision does occur between two transmissions, it would be expected that the system would not decode either transmission. However, the present invention is designed to more likely receive a transmission from closer devices 10 in the event of a collision. For example, in one potential application, a user may have multiple bar areas each with multiple devices 10 attached to bottles and at least one receiver in each bar area. Depending on how close the bar areas are to each other, a transmission from a device 10 may be picked up by a receiver not only in that bar area but also in other bar areas. If a device 10 is transmitting and a receiver starts to hear a transmission from another device 10 that is further away, depending on the strength of the signal (or energy of the transmission) of the two devices 10, the receiver will continue to decode the proximate device 10 and ignore the distal device 10. Conversely, if a distal device 10 is picked up by a receiver and a proximate device 10 starts to transmit, the distal device's 10 transmission will be abandoned in favor of the proximate 10 device. The sync sequence used guarantees that an invalid data bit sequence will occur during the reception of the distant device when the proximate device 10 starts to transmit. The receiver can then stop decoding the transmission from the distal device 10 and instead decode the transmission from the proximate device 10. Advantageously, the protocol used by the system allows a user to have more devices 10 in an area by adding additional receivers in the area. In implementing this functionality and protocol, software with specific functionality is programmed into the circuitry 50 of the present invention. More specifically with reference to FIG. 9, the preferred software begins upon first powerup, Block 500, which clears a 24-bit event number, clears a 32-bit Life Timer, sets the slow beacon mode in effect, and sets the untilted configuration or mode. A calibration value is calculated, Block 510. Then the device 10 goes into untilted sleep state, but will wakeup upon a tilt event, a button press, or after 1/27ths of a second. Block 520. Upon a button press, event 522, the event is stored in the first available memory location. Block 530. After the event is stored, an Immediate Mode Transmission is triggered, thereby transmitting event data to a receiver Block 540 and the device returns back to untilted sleep state Block 520. Upon 1/27th of a second time duration, event 524, the Life Timer is incremented Block 550. The elapsed time is checked Block 560. If the elapsed time is 2560 or more seconds, then return to recalculate the calibration value Block 510. If the Slow Beacon Mode is in effect and 5 minutes have elapsed, then trigger a Slow Beacon Transmission and return to the sleep state Block 520. If the Fast Beacon Mode is in effect and 10 seconds have elapsed, then check to see if Fast Beacon Mode should be changed to Slow Beacon Mode (and, if so, unflag Fast Beacon Mode and flag Slow Beacon Mode) Block 570, trigger a Fast Beacon Transmission, and then return to the sleep state Block 520. Upon a tilt, event 526, clear the tilt time timer and set the state to tilted Block 580; calculate a calibration value Block 590; and enter a tilted sleep state Block 600. After 1/27ths of a second has elapsed, event 602, increment the tilt timer by 1/16ths of a second, until the maximum time of 127 seconds has been reached, Block 610 and return to the tilted sleep state Block 600. After the device 10 has been untilted, event 604, the tilt time is checked Block 620. If the time is less than 253 1/16ths of a second, then store the number of 1/16ths of a second for the event duration Block 630 and trigger an Immediate Mode Transmission. If the time is more than 253 1/16ths of a second, store a cascaded event Block 640 (one event for each 254 1/16ths seconds with the remainder in the last event) and trigger an Immediate Mode Transmission. After triggering the Immediate Mode Transmission, return to the sleep state Block 510. This flow is followed until the Life Timer is exceeded, the battery runs down, or the circuitry 50 is broken or destroyed. The preferred embodiment of the invention is described above in the Detailed Description of Preferred Embodiments. While these descriptions directly describe the above embodiments, it is understood that those skilled in the art may conceive modifications and/or variations to the specific embodiments shown and described herein. Any such modifications or variations that fall within the purview of this description are intended to be included therein as well. Unless specifically noted, it is the intention of the inventor that the words and phrases in the specification and claims be given the ordinary and accustomed meanings to those of ordinary skill in the applicable art(s). The foregoing description of a preferred embodiment and best mode of the invention known to the applicant at the time of filing the application has been presented and is intended for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and many modifications and variations are possible in the light of the above teachings. The embodiment was chosen and described in order to best explain the principles of the invention and its practical application and to enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated.
<SOH> BACKGROUND <EOH>The identification, measurement and/or control of physical assets are important aspects of modem business practices. Frequently, assets are misidentified, misplaced or incorrectly dispensed, thereby leading to incorrect inventory and/or receivables. A common modem method for dealing with asset control is the use of bar codes. These bar codes can be used to both identify a product and support the determination of the time and location of dispensation. Another increasingly common method for asset control is the use of radio frequency tags (RF tags). These are tags that are attached to inventory and that include at least a radio transmitter and identification circuit. The identification circuit continually, periodically, or after an interrogatory is sent from a receiver sends the identification of the product. These systems, while excellent for product identification, are not optimized for tracking events that may occur to the products. These events may be movement of the asset, tilting of the asset, acceleration of the asset, changes in temperature of the asset, breakage of the asset (or associated tag), button presses, and the like. Therefore, there is a present and continuing need for improved asset tags used for the identification, measurement and/or control of physical assets.
<SOH> SUMMARY OF INVENTION <EOH>It is an object of the present invention to provide a transient event detector comprising at least one detecting area located on or in at least one wall of the container and at least one movable piece contained within the container, wherein at least one of the at least one detecting areas changes state when the movable piece enters or leaves a predetermined distance from the detecting area and an electronic circuit that is suitable to detect a transient change of state of the at least one detecting area. It is another object of the present invention to provide a transient event detector, as above, that comprises at least one movable piece contained within a container. It is a yet another object of the present invention to provide a transient event detector, as above, comprising at least two movable pieces. It is still yet another object of the present invention to provide a transient event detector, as above, that has at least one event detecting area that can interact with at least one movable pieces. It is a further object of the present invention to provide a transient event detector, as above, that comprises at least two event detection areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls. It is a yet a further object of the present invention to provide a transient event detector, as above, comprising at least two walls, at least two event detecting areas, at least one of the at least two event detection areas is on or in one of the at least one wall and at least one of the at least two event detection areas is on or in another of the at least two walls, at least one of the at least two event detecting areas being different from at least one of the remaining event detecting areas and able to detect electrical change events, magnetic change events, chemical change events, physical change events or structural change events, and wherein there are at least two movable pieces and at least one of the at least two movable pieces is electronically, magnetically, chemically, physically or structurally different from at least one of the remaining movable pieces. It is still yet a further object of the present invention to provide a transient event detector comprising electrical circuitry suitable to detect a transient event, and a container having a wall with at least two electrically conductive contacts that are electrically connected to the electrical circuitry, each of the at least two electrically conductive contacts being electrically isolated from each other, and a movable electrically conductive piece that intermittently connects at least two of the at least two electrically conductive contacts when the electrically conductive piece is in motion, said movable electrically conducting piece having a mass that is low enough such that if the movable electrically conducting piece is at rest and bridges two of the at least two electrically conductive contacts no transient event is detected by the electrical circuitry. It is an additional object of the present invention to provide a transient event detector, as above, comprising at least first, second and third electrically conductive contacts and the container is configured such that there is at least one movement barrier that prevents the movable electrically conducting piece from freely moving between a position that bridges first and second conductive contacts and a position that bridges first and third conductive contacts. It is yet an additional object of the present invention to provide a transient event detector, as above, wherein the movement barrier is the container's configuration. It is yet an additional object of the present invention to provide a transient event detector, as above, wherein the first electrically conductive contact is located between the second and third electrically conductive contacts and the second and third electrically conductive contacts are located at opposite ends of the container. It is still yet an additional object of the present invention to provide a transient event detector, as above, wherein the second and third electrically conductive contacts are parallel to each other and substantially perpendicular to the first electrically conductive contact. It is another object of the present invention to provide a transient event detector, as above, wherein the second and third electrically conductive contacts are parallel to each other and the first conductive contact is angled relative to at least one of the second or third electrically conductive contacts. It is yet another object of the present invention to provide a transient event detector, as above, wherein the first conductive contact is angled relative to the second and third electrically conductive contacts. It is still yet another object of the present invention to provide a transient event detector, as above, wherein the first and second electrically conductive contacts are on the same surface, the third electrically conductive contact is perpendicular to both the first and second electrically conductive contacts, and the first electrically conductive contact is located between the second and third electrically conductive contacts and is raised relative to the second electrically conductive contact. It is another object of the present invention to provide an improved tilt sensor. It is yet another object of the present invention to provide an improved event detector. It is a further object of the present invention to provide an asset tag that can detect the tilt each time a bottle is poured and the elapsed time of the pour. It is still a further object of the present invention to provide an asset tag with a user interface for communicating information about an asset. It is still yet another object of the present invention to provide an asset tag that can communicate information in a reliable, accurate, and timely manner with minimum user hassle, overhead, and expense. It is another object of the present invention to provide an asset tag that is easy and cost effective to manufacture. It is a further object of the present invention to provide an asset tag that is durable and can survive impacts and exposure to water, alcohol, heat, and cold. It is an additional object of the present invention to provide an asset tag with a long battery life. It is yet another object of the present invention to provide an asset tag that will not significantly affect the ambiance of an establishment. The novel features that are considered characteristic of the invention are set forth with particularity in the appended claims. The invention itself, however, both as to its structure and its operation together with the additional object and advantages thereof will best be understood from the following description of the preferred embodiment of the present invention. Unless specifically noted, it is intended that the words and phrases in the specification and claims be given the ordinary and accustomed meaning to those of ordinary skill in the applicable art or arts. If any other meaning is intended, the specification will specifically state that a special meaning is being applied to a word or phrase. Likewise, the use of the words “function” or “means” in the Description of Preferred Embodiments is not intended to indicate a desire to invoke the special provision of 35 U.S.C. §112, paragraph 6 to define the invention. To the contrary, if the provisions of 35 U.S.C. §112, paragraph 6, are sought to be invoked to define the invention(s), the claims will specifically state the phrases “means for” or “step for” and a function, without also reciting in such phrases any structure, material, or act in support of the function. Even when the claims recite a “means for” or “step for” performing a function, if they also recite any structure, material or acts in support of that means of step, then the intention is not to invoke the provisions of 35 U.S.C. §112, paragraph 6. Moreover, even if the provisions of 35 U.S.C. §112, paragraph 6, are invoked to define the inventions, it is intended that the inventions not be limited only to the specific structure, material or acts that are described in the preferred embodiments, but in addition, include any and all structures, materials or acts that perform the claimed function, along with any and all known or later-developed equivalent structures, materials or acts for performing the claimed function.
20040308
20070313
20050908
74058.0
1
TRIEU, VAN THANH
ASSET TAG WITH EVENT DETECTION CAPABILITIES
SMALL
0
ACCEPTED
2,004
10,795,783
ACCEPTED
Polyester polymer particles having a small surface to center molecular weight gradient
There is now provided a polyester polymer particle having an It.V., a surface, and a center, wherein the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. The polyester polymer particle is desirably crystalline to prevent the particles from sticking to each other while drying, and desirably contains less than 10 ppm acetaldehyde. A polyester container, preferably a preform or beverage bottle, is made by feeding crystallized polyester particles having an It.V. of at least 0.70 dL/g to an extrusion zone, melting the particles in the extrusion zone to form a molten polyester polymer composition, and forming a sheet or a molded part from extruded molten polyester polymer, wherein at least a portion of the polyester particles have an It.V. at their surface which does not vary from their It.V. at their center by more than 0.25 dL/g, and the particles have not been solid state polymerized. Such polyester compositions have an It.V. suitable for containers, yet lose less It.V. during melt processing than existing polyesters.
1. A polyester polymer particle comprising a polyester polymer comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, wherein said particle has an It.V. of at least 0.70 dL/g , and the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. 2. The particle of claim 1, wherein the particle has an It.V. of at least 0.74 dL/g. 3. The particle of claim 2, wherein the particle has an It.V. of at least 0.77 dL/g. 4. The particle of claim 2, wherein the It.V at the surface of the particle is less than 0.2 dL/g higher than the It.V. at the center of the particle. 5. The particle of claim 1, wherein the It.V. at the surface of the particle is less than 0.15 dL/g higher than the It.V. at the center of the particle. 6. The particle of claim 1, wherein the particle has a degree of crystallinity of at least 25%. 7. The particle of claim 1, wherein the particle contains less than 10 ppm acetaldehyde. 8. Polyester particles having a number average weight of at least 1.0 g per 100 particles, wherein each particle is the polyester particle of claim 1. 9. The polyester particle of claim 1, wherein said polyester particle is a virgin polyester polymer. 10. The polyester particle of claim 1, wherein the polyester polymer contains at least: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of the polycarboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer. 11. The particle of claim 1, wherein the It.V. of the particle at the surface does not vary from the It.V. of the particle at its center by more than 0.10 dL/g. 12. The particle of claim 11, wherein the It.V. of the particle at the surface does not vary from the It.V. of the particle at its center by more than 0.20 dL/g. 13. The particle of claim 11, wherein the polyester polymer contains at least: (a) a carboxylic acid component comprising at least 96 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 96 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer. 14. The particle of claim 13, wherein the particle has a degree of crystallinity of at least 25%. 15. The particle of claim 1, comprising a bulk of said particles having a volume of at least 1 cubic meter. 16. The particle of claim 15, wherein the It.V. average of the differences between the It.V. of the surface of the particles and the It.V. of the center of the particles in the bulk is not greater than 0.20 dL/g. 17. The particle of claim 16, wherein the It.V. average of the differences is not greater than 0.10 dL/g. 18. A blow molded container obtained from the polyester polymer particles of any one of claims 1 through 17. 19. A beverage bottle obtained from the polyester polymer particles of claim 1. 20. A polyester particle having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g , said particle having an It.V. at its surface and an It.V. at its center, wherein the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. 21. The particle of claim 20, wherein the polyester polymer contains: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid residues and 100 mole percent hydroxyl residues in the polyester polymer. 22. The polyester particle of claim 21, wherein the degree of crystallinity is at least 35%, and the It.V. of the particle is at least 0.74 dL/g. 23. The polyester particle of claim 21, wherein the difference between the It.V. of the particle at its surface and its center is 0.15 dL/g or less. 24. The polyester particle of claim 23, wherein the difference is 0.05 dL/g or less. 25. A blow molded container obtained from the polyester particles of claim 1 having an degree of crystallinity of at least 35%, and an It.V. of at least 0.77 dL/g, said blow molded container obtained without increasing the molecular weight of the pellets by solid state polymerization. 26. A process for making a container from a polyester(s) polymer, comprising feeding polyester particles having a degree of crystallinity of at least 15% and an It.V. of at least 0.70 dL/g to an extrusion zone, melting the particles in the extrusion zone to form a molten polyester polymer composition, and forming a sheet or a molded part from extruded molten polyester polymer, wherein the polyester particles fed to the extrusion zone have an It.V. at their surface which is less than 0.25 dL/g higher than the It.V. at their center. 27. The process of claim 26, wherein the It.V. at the surface of the particles is less than 0.20 dL/g higher than the It.V. at the center of the particles. 28. The process of claim 27, wherein the wherein the difference between the It.V. of the particles at their surface and their center is 0.10 dL/g or less. 29. The process of claim 28, wherein the difference is 0.05 dL/g or less. 30. The process of claim 26, wherein the molded part is a container preform. 31. The process of claim 30, comprising stretch blow molding the preform into a beverage container. 32. The process of claim 31, wherein the container has a volume of 3 liters or less. 33. The process of claim 27, comprising drying the particles in a drying zone at temperature of at least 140° C. before melting the particles in the extrusion zone. 34. The process of claim 26, further comprising drying the particles before feeding the particles to the extrusion zone, wherein the particles are not solid state polymerized before drying. 35. The process of claim 34, wherein the particles have an acetaldehyde level of 10 ppm or less prior to melting in the extrusion zone. 36. The process of claim 26, wherein the polyester polymer particles comprise: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, and at least 75% of the polyester polymer is virgin polymer. 37. The process of claim 36, wherein the polyester polymer particles comprises: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer. 38. The process of claim 37, wherein the degree of crystallinity is at least 25%. 39. The process of claim 26, wherein the degree of crystallinity is at least 35%. 40. The process of claim 26, comprising a bulk of said particles having a volume of at least 1 cubic meter. 41. The particle of claim 40, wherein the It.V. average of the differences between the It.V. of the surface of the particles and the It.V. of the center of the particles in the bulk is not greater than 0.20 dL/g. 42. The particle of claim 41, wherein the It.V. average of the differences is not greater than 0.10 dL/g. 43. A blow molded container obtained from the particles of claim 26. 44. A preform obtained from the particles of claim 26. 45. Polyester particles having a particle weight of greater than 1.0 g per 100 particles and less than 100 g per 100 particles, said particles, comprising at least 75% virgin polyester polymer, comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, the particles having a degree of crystallinity of at least 25%, an It.V. of at least 0.77 dL/g, an It.V. at their surface and an It.V. at their center wherein the It.V. at the surface of the particles is not greater than 0.15 dL/g higher than the It.V. at the center of the particles, and having an acetaldehyde level of 10 ppm or less. 46. The particles of claim 45, wherein the particles comprise a bulk having a volume of at least 1.0 cubic meter. 47. The particles of claim 46, wherein in the It.V. average of the differences between the It.V. of the surface of the particles and the It.V. of the center of the particles in the bulk is not greater than 0.15 dL/g. 48. The particles of claim 47, wherein the It.V. average of the differences is not greater than 0.10 dL/g. 49. The particles of claim 48, wherein the It.V. average is not greater than 0.05 dL/g. 50. A blow molded container obtained from the particles of claim 45. 51. A beverage bottle obtained from the particles of claim 45. 52. A perform obtained from the particles of claim 45
1. FIELD OF THE INVENTION This invention relates to polyester polymer pellets suitable for use in the manufacture of polyester containers, and more specifically, to polyester polymer particles having a small surface to center molecular weight gradient. 2. BACKGROUND OF THE INVENTION Polyester polymer pellets, and in particular polyethylene terephthalate homopolymers and copolymers (PET), experience a loss of intrinsic viscosity (It.V.) during melt processing in, for example, an injection molding extruder. As a result of losing It.V., the physical properties of the polymer also degrade. One cause of It.V. loss is the hydrolytic degradation of the polymer caused by water absorbed in the polymer prior to melt processing. To prevent hydrolysis, the polymer is thoroughly dried prior to melt processing. While drying the polymer reduces the loss of It.V., nevertheless, some drop in It.V. is experienced, thereby requiring the use of a polymer having an It.V. higher than the target container It.V. to compensate for It.V. losses during extrusion. The use of higher than target It.V. polymers has the added disadvantage of higher costs due to more energy consumption required to heat the polymer for a longer time and to agitate a more viscous material, and/or due to the extension of the residence time during melt phase polymerization to bring the It.V. up to the desired level, resulting in a decreased production rate. The use of higher than target It.V. polyester polymers also has the disadvantage of requiring more energy to feed the polymer along the screw in the extruder. It would be desirable to reduce the loss in It.V. experienced by the polyester polymer during melt processing for making containers. 3. SUMMARY OF THE INVENTION We have discovered a polyester composition that has an It.V. suitable for containers, yet loses less It.V. during melt processing than existing polyesters. There is now provided a polyester polymer particle comprising a polyester polymer comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, wherein said particle has an It.V. of at least 0.7 dL/g , and the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. There is also provided a polyester particle having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g , said particle having an It.V. at its surface and an It.V. at its center, wherein the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. In addition, there is provided a process for making a polyester container, comprising feeding polyester particles having a degree of crystallinity of at least 15% and an It.V. of at least 0.70 dL/g to an extrusion zone, melting the particles in the extrusion zone to form a molten polyester polymer composition, and forming a sheet or a molded part from extruded molten polyester polymer, wherein the polyester particles fed to the extrusion zone have an It.V. at their surface which is less than 0.25 dL/g higher than the It.V. at their center. In yet another embodiment, there is provided polyester particles having a particle weight of greater than 1.0 g per 100 particles and less than 100 g per 100 particles, said particles comprising at least 75% virgin polyester polymer comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, the particles having a degree of crystallinity of at least 25%, an It.V. of at least 0.77 dL/g, an It.V. at their surface and an It.V. at their center wherein the It.V. at the surface of the particles is not greater than 0.15 dL/g higher than the It.V. at the center of the particles, and having an acetaldehyde level of 10 ppm or less. 4. DETAILED DESCRIPTION OF THE INVENTION The present invention may be understood more readily by reference to the following detailed description of the invention and the examples provided therein. It must also be noted that, as used in the specification and the appended claims, the singular forms “a,” “an” and “the” include plural referents unless the context clearly dictates otherwise. For example, reference to processing or making a “polymer,” a “particle,” “preform,” “article,” “container,” or “bottle” is intended to include the processing or making of singular and a plurality of polymers, preforms, articles, containers or bottles. References to a composition containing “an” ingredient or “a” polymer is intended to include other ingredients or other polymers, respectively, in addition to the one named. By “comprising” or “containing” is meant that at least the named compound, element, particle, or method step etc must be present in the composition or article or method, but does not exclude the presence of other compounds, catalysts, materials, particles, method steps, etc, even if the other such compounds, material, particles, method steps etc. have the same function as what is named, unless expressly excluded in the claims. It is also to be understood that the mention of one or more method steps does not preclude the presence of additional method steps before or after the combined recited steps or intervening method steps between those steps expressly identified. Moreover, the lettering of process steps is a convenient means for identifying discrete activities or steps, and unless otherwise specified, recited process steps can be arranged in any sequence. Moreover, unless specifically stated, the recited steps can be carried out in any sequence. A stated range includes all integers and fractions thereof within the range. A polyester polymer composition is any thermoplastic polyester polymer in any state (e.g. solid or molten), and in any shape, each as the context in which the phrase is used dictates, and includes the composition of matter resulting from the melt phase, or as a solid, or the molten composition of matter in an extrusion zone, a sheet or bottle preform, or in the form of a stretch blow molded bottle. The polyester polymer composition may contain any type and number of additives. The intrinsic viscosity values described throughout this description to describe the pellet It.V. are set forth in dL/g units as calculated from the inherent viscosity measured at 25° C. in 60/40 wt/wt phenol/tetrachloroethane. The It.V. of the pellets is determined by measuring the weight-average molecular weight of the polyester by gel permeation chromatography (G PC) from which the It.V. can be calculated as described below. The GPC analysis is used to estimate the molecular weight of the polyester pellets for determining the molecular weight gradient from the surface to the center of the particles: Solvent: 95/5 by volume methylene chloride/hexafluoroisopropanol +0.5 g/L tetraethylammonium bromide Temperature: ambient Flow rate: 1 mL/min Sample Solution: 4 mg polyester polymer in 10 mL methylene chloride/hexafluoroisopropanol azeotrope (˜70/30 by vol)+10 μl toluene flow rate marker. For filled materials, the sample mass is increased so that the mass of polymer is about 4 mg, and the resulting solution is passed through a 0.45 μm Teflon filter. Injection volume: 10 μL Column set: Polymer Laboratories 5 μm PLgel, Guard+Mixed C Detection: UV absorbance at 255 nm Calibrants: monodisperse polystyrene standards, MW=580 to 4,000,000 g/mole, where MW is the peak molecular weight Universal calibration parameters: PS K=0.1278 a=0.7089 PET K=0.4894 a=0.6738 The universal calibration parameters are determined by linear regression to yield the correct weight average molecular weights for a set of five polyester polymer samples previously characterized by light scattering. The calculation of inherent viscosity at 0.5 g/dL in 60/40 phenol/tetrachloroethane from the weight-average molecular weight, <M>w, is determined as follows: Ih.V.=4.034×10−4<M>w0.691 The intrinsic viscosity (It.V. or ηint) may then be calculated from the inherent viscosity using the Billmeyer equation as follows: It.V.=0.5[e0.5×Ih.V.−1]+(0.75×Ih.V.) The solution viscosity relates to the composition and molecular weight of a polyester polymer. Although the IhV numbers for the crystallized products to determine the molecular weight gradient are calculated by GPC, solution viscosity measurements are made to determine the It.V. of the pellets and preforms. The following equations describe such solution viscosity measurements and subsequent calculations: ηinh=[In (ts/to)]/C where ηinh=Inherent viscosity at 25° C. at a polymer concentration of 0.50 g/100 mL of 60% phenol and 40% 1,1,2,2-tetrachloroethane In=Natural logarithm ts=Sample flow time through a capillary tube to=Solvent-blank flow time through a capillary tube C=Concentration of polymer in grams per 100 mL of solvent (0.50%)— The intrinsic viscosity is the limiting value at infinite dilution of the specific viscosity of a polymer. It is defined by the following equation: η int = lim C → 0 ⁢ ( η sp / C ) = lim C → 0 ⁢ ⁢ ln ⁡ ( η r / C ) where ηint=Intrinsic viscosity ηr=Relative viscosity=ts/to ηsp=Specific viscosity=ηr−1 Instrument calibration involves replicate testing of a standard reference material and then applying appropriate mathematical equations to produce the “accepted” I.V. values. Calibration Factor=Accepted IV of Reference Material/Average of Replicate Determinations Corrected IhV=Calculated IhV×Calibration Factor The intrinsic viscosity (ItV or ηint) may be estimated using the Billmeyer equation as follows: ηint=[e0.5×Corrected IhV−1]+(0.75×Corrected IhV) There is now provided a polyester polymer particle having an It.V. of at least 0.75 dL/g , a surface, and a center, wherein the It.V. at the surface of the particle is not greater than 0.25 dL/g higher than the It.V. at the center of the particle, preferably not greater than 0.20 dL/g higher than the It.V. at the center of the particle. There is also provided a polyester polymer particle having an It.V. of at least 0.75 dL/g , a surface, and a center, wherein the It.V. of the particle at the surface is greater than the It.V. of the particle at its center by not more than 0.25 dL/g, preferably by no more than 0.20 dL/g. The polyester particles are solid at 25° C. and 1 atmosphere. The shape of the particles is not limited. Suitable shapes include spheres, cubes, pellets, chips, pastilles, stars, and so forth. The particles have a number average weight of at least 0.10 g per 100 particles, more preferably greater than 1.0 g per 100 particles, and up to about 100 g per 100 particles. The volume of the particles is not particularly limited, but in one embodiment, there is provided a bulk of particles having a volume of at least 1 cubic meter, or at least 3 cubic meters. For example, one or more random samplings of 10 or more particles in a bulk of at least 1 cubic meter will yield the small surface to center It.V. gradient of the invention. Therefore, in a further embodiment, the average It.V. gradient in a bulk of particles having a volume of 1 cubic meter or more is small as set forth in this description. The It.V. of the polyester particles is suitable for container applications. The It.V. of the polyester particles is at least 0.70 dL/g. For example, the It.V. of the polyester particles can be at least 0.75, or 0.77, or 0.80 dL/g, and up to about 1.2 dL/g, or 1.1 dL/g. The polyester particles fed to an injection molding machine are desirably not subjected to an increase in their molecular weight in the solid state. The polyester particles have a small surface to center molecular weight gradient between the surface and the center of the particles than found in solid-stated polyester particles. Without being bound to a theory, it is believed that when there is a significant difference in It.V. between the center and surface of the polyester particle, as in the case of a solid-stated polyester particle, and such a polymer is melted, the polymer chains undergo chemical reactions that equilibrate the molecular weight distribution. Even when the number-average molecular weight is unaffected, the equilibration causes the It.V. and weight-average molecular weight to decrease, which also causes a degradation of the physical properties of the polyester. Accordingly, by melt processing a polyester particle having a smaller surface to center molecular weight gradient, the loss in It.V. is reduced. The polyester polymer particles have a surface and a center, and the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle, preferably less than 0.20 dL/g higher than the It.V. at the center of the particle, preferably 0.15 dL/g or less, or 0.10 dL/g or less, or even 0.050 dL/g or less. In this embodiment, the It.V. of the polyester polymer at the surface of the particle can be much lower than the It.V. at the center of the particle. In another embodiment, however, there is provided a polyester particle which has a small surface to center It.V. gradient in that the absolute value of the difference in the It.V. between the center of the pellet and the surface of the pellet is less than 0.25 dL/g such that the surface It.V. can neither drop below nor exceed 0.20 dL/g relative to the center of the particle, preferably 0.15 dL/g or less, or 0.10 dL/g or less, or even 0.50 dL/g or less. In another embodiment, in a bulk of pellets having a volume of 1 cubic meter or more, the It.V. average of the differences between the It.V. of the surface of the particles and the It.V. of the center of the particles in the bulk is not greater than 0.25 dL/g, or 0.20 dL/g, or 0.15 dL/g, or 0.10 dL/g or 0.05 dL/g. The surface of the pellet is defined as the outer 8 to 12% by mass, while the center is the inner 8 to 16% by mass around the particle center point. While the center point of an irregular shaped particle may be difficult to precisely determine, it is the best approximation of the intersection between most of the straight lines that can be drawn through the particle between the edges or corners having the longest distance from each other. To measure the It.V. of the surface and the center, a random sampling of 10 pellets from a batch is gradually dissolved according to the procedure set forth in the Examples, the weighted average of all measured cuts within the first 8-12 mass % dissolved being the surface of the pellet is recorded as It.V. surface, and the weighted average of all measured cuts within the last 8-16 mass % being the center is recorded as the It.V. center, and gradient being the difference between It.V. surface less the It.V. center. The number of measurements taken within each range is not limited, and can be as few as one measurement. The GPC method described above is used to separately measure the It.V. of each portion dissolved. In this way, a gradient starting from the surface of the particle all the way through to the center of the particle may be measured, taking only a surface and a center cut or as many cuts throughout the particle as one desires. Alternately, the particle is sliced with a microtome, a piece of the surface is cut away, a piece of the center is cut away, and they are then separately measured by the GPC method described above. Because the polyester particles having a small surface to center molecular weight gradient undergo less It.V. loss during melt processing than conventional polyesters, one or more advantages are envisioned. The subject polyester can have a lower It.V. than conventional products to obtain the same It.V. and physical properties in a molded part; therefore, manufacturing costs for the polyester are reduced. The lower It.V. polyester may also reduce the viscosity of the polymer during the early stages of melt processing; hence, lower temperatures would be required and/or energy costs would be reduced. As a result of the lower melt processing temperatures, the acetaldehyde level in the preforms would be lower, and the time required to cool the polymer following melt processing would decrease as would the overall injection molding cycle time. Alternately, less drying is necessary to give the same It.V. loss as conventional polyesters; therefore, drying operational and capital costs are reduced. The polymer can be produced by melt phase polymerization to a molecular weight suitable for container applications having an It.V. of at least 0.70 dL/g followed by process steps comprising in no particular order: formation of particles such as pellets, crystallization, and preferably removal of most of the residual acetaldehyde. It is preferred to feed the extruder for making sheet or preforms with polyester particles which have not been subjected to an increase in their molecular weight in the solid state since typical solid-state polymerization processes impart an undesirably large difference in It.V. between the center of the particle and the surface of the particle. However, if the polyester has been solid state polymerized, a small surface to center molecular weight gradient may be obtained by melting the solid stated polyester particles and then re-forming the molten polyester into solid particles that do not have a surface It.V. that exceeds 0.03 dL/g higher than the It.V. at its center. Thus, in another embodiment, there is provided a polyester particle having an It.V. of at least 0.70 dL/g obtained by melt phase polymerization and without solid state polymerization, wherein the particle has an It.V., a surface, and a center, wherein the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle, preferably less than 0.2 dL/g higher than the It.V. at the center of the particle, and in yet another embodiment, said particle has an It.V. at the surface which does not vary from the It.V. of the particle at its center by more than 0.25 dL/g. There is also provided a process for making a polyester container, preferably a preform or beverage bottle, comprising feeding crystallized polyester particles having an It.V. of at least 0.70 dL/g, to an extrusion zone, melting the particles in the extrusion zone to form a molten polyester polymer composition, and forming a sheet or a molded part from extruded molten polyester polymer, wherein the polyester particles have an It.V., a surface, and a center, (and at least a portion of the polyester particles, preferably all the particles, have an It.V. at their surface which does not vary from their It.V. at their center by more than 0.25 dL/g, preferably by no more than 0.20 dL/g. The particles fed to the extrusion zone are preferably dried. The particles desirably have sufficient crystallinity to prevent them from sticking to each other and/or equipment during drying at a temperature ranging from 140° C. to 180° C. Moreover, the crystallized polyester particles fed to the extrusion zone after drying preferably contain low levels of acetaldehyde (as measured by the French National Standard Test), such as 10 ppm or less, or 5 ppm or less, or even 2 ppm or less. The sheet or molded part can be further processed to make thermoformed or blowmolded containers. Typically, polyesters such as polyethylene terephthalate are made by reacting a diol such as ethylene glycol with a dicarboxylic acid as the free acid or its dimethyl ester to produce an ester monomer and/or oligomers, which are then polycondensed to produce the polyester. More than one compound containing carboxylic acid group(s) or derivative(s) thereof can be reacted during the process. All the compounds containing carboxylic acid group(s) or derivative(s) thereof that are in the product comprise the “carboxylic acid component.” The mole % of all the compounds containing carboxylic acid group(s) or derivative(s) thereof that are in the product add up to 100. The “residues” of compound(s) containing carboxylic acid group(s) or derivative(s) thereof that are in the product refers to the portion of said compound(s) which remains in the oligomer and/or polymer chain after the condensation reaction with a compound(s) containing hydroxyl group(s). The residues of the carboxylic acid component refers to the portion of the said component which remains in the oligomer and/or polymer chain after the said component is condensed with a compound containing hydroxyl group(s). More than one compound containing hydroxyl group(s) or derivatives thereof can become part of the polyester polymer product(s). All the compounds containing hydroxyl group(s) or derivatives thereof that become part of said product(s) comprise the hydroxyl component. The mole % of all the compounds containing hydroxyl group(s) or derivatives thereof that become part of said product(s) add up to 100. The residues of compound(s) containing hydroxyl group(s) or derivatives thereof that become part of said product refers to the portion of said compound(s) which remains in said product after said compound(s) is condensed with a compound(s) containing carboxylic acid group(s) or derivative(s) thereof and further polycondensed with polyester polymer chains of varying length. The residues of the hydroxyl component refers to the portion of the said component which remains in said product. The mole % of the hydroxyl residues and carboxylic acid residues in the product(s) can be determined by proton NMR. The polyester polymers of the invention comprise: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer. In another embodiment, the polyester polymer comprises: (a) a carboxylic acid component comprising at least 92 mole %, or at least 96 mole %, of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 92 mole %, or at least 96 mole %, of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent of the hydroxyl component residues in the polyester polymer. The reaction of the carboxylic acid component with the hydroxyl component during the preparation of the polyester polymer is not restricted to the stated mole percentages since one may utilize a large excess of the hydroxyl component if desired, e.g. on the order of up to 200 mole % relative to the 100 mole % of carboxylic acid component used. The polyester polymer made by the reaction will, however, contain the stated amounts of aromatic dicarboxylic acid residues and ethylene glycol residues. Derivates of terephthalic acid and naphthalane dicarboxylic acid include C1-C4 dialkylterephthalates and C1-C4 dialkylnaphthalates, such as dimethylterephthalate and dimethyinaphthalate In addition to a diacid component of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, the carboxylic acid component(s) of the present polyester may include one or more additional modifier carboxylic acid compounds. Such additional modifier carboxylic acid compounds include mono-carboxylic acid compounds, dicarboxylic acid compounds, and compounds with a higher number of carboxylic acid groups . Examples include aromatic dicarboxylic acids preferably having 8 to 14 carbon atoms, aliphatic dicarboxylic acids preferably having 4 to 12 carbon atoms, or cycloaliphatic dicarboxylic acids preferably having 8 to 12 carbon atoms. More specific examples of modifier dicarboxylic acids useful as an acid component(s) are phthalic acid, isophthalic acid, naphthalene-2,6-dicarboxylic acid, cyclohexanedicarboxylic acid, cyclohexanediacetic acid, diphenyl-4,4′-dicarboxylic acid, succinic acid, glutaric acid, adipic acid, azelaic acid, sebacic acid, and the like, with isophthalic acid, naphthalene-2,6-dicarboxylic acid, and cyclohexanedicarboxylic acid being most preferable. It should be understood that use of the corresponding acid anhydrides, esters, and acid chlorides of these acids is included in the term “carboxylic acid”. It is also possible for tricarboxyl compounds and compounds with a higher number of carboxylic acid groups to modify the polyester. In addition to a hydroxyl component comprising ethylene glycol, the hydroxyl component of the present polyester may include additional modifier mono-ols, diols, or compounds with a higher number of hydroxyl groups. Examples of modifier hydroxyl compounds include cycloaliphatic diols preferably having 6 to 20 carbon atoms and/or aliphatic diols preferably having 3 to 20 carbon atoms. More specific examples of such diols include diethylene glycol; triethylene glycol; 1,4-cyclohexanedimethanol; propane-1,3-diol; butane-1,4-diol; pentane-1,5-diol; hexane-1,6-diol; 3-methylpentanediol-(2,4); 2-methylpentanediol-(1,4); 2,2,4-trimethylpentane-diol-(1,3); 2,5-ethylhexanediol-(1,3); 2,2-diethyl propane-diol-(1,3); hexanediol-(1,3); 1,4-di-(hydroxyethoxy)-benzene; 2,2-bis-(4-hydroxycyclohexyl)-propane; 2,4-dihydroxy-1,1,3,3-tetramethyl-cyclobutane; 2,2-bis-(3-hydroxyethoxyphenyl)-propane; and 2,2-bis-(4-hydroxypropoxyphenyl)-propane. The polyester pellet compositions may include blends of polyalkylene terephthalates and polyalkylene naphthalates along with other thermoplastic polymers such as polycarbonate (PC) and polyamides. It is preferred that the polyester composition should comprise a majority of the polyester polymers, more preferably in an amount of at least 80 wt. %, or at least 95 wt. %, and most preferably 100 wt. %, based on the weight of all thermoplastic polymers (excluding fillers, inorganic compounds or particles, fibers, impact modifiers, or other polymers which may form a discontinuous phase). It is also preferred that the polyester polymers do not contain any fillers, fibers, or impact modifiers or other polymers which form a discontinuous phase. The polyester compositions can be prepared by polymerization procedures known in the art sufficient to effect esterification and polycondensation. Polyester melt phase manufacturing processes include direct condensation of a dicarboxylic acid with the diol, optionally in the presence of esterification catalysts, in the esterification zone, followed by polycondensation in the prepolymer and finishing zones in the presence of a polycondensation catalyst; or ester exchange usually in the presence of a transesterification catalyst in the ester exchange zone, followed by prepolymerization and finishing in the presence of a polycondensation catalyst, and each may optionally be solid stated according to known methods. To further illustrate, a mixture of one or more dicarboxylic acids, preferably aromatic dicarboxylic acids, or ester forming derivatives thereof, and one or more diols are continuously fed to an esterification reactor operated at a temperature of between about 200° C. and 300° C., typically between 240° C. and 290° C., and at a pressure of between about 1 psig up to about 70 psig. The residence time of the reactants typically ranges from between about one and five hours. Normally, the dicarboxylic acid(s) is directly esterified with diol(s) at elevated pressure and at a temperature of about 240° C. to about 270° C. The esterification reaction is continued until a degree of esterification of at least 60% is achieved, but more typically until a degree of esterification of at least 85% is achieved to make the desired monomer and/or oligomers. The monomer and/or oligomer forming reaction(s) are typically uncatalyzed in the direct esterification process and catalyzed in ester exchange processes. Polycondensation catalysts may optionally be added in the esterification zone along with esterification/ester exchange catalysts. If a polycondensation catalyst was added to the esterification zone, it is typically blended with the diol and fed into the esterification reactor. Typical ester exchange catalysts, which may be used separately or in combination, include titanium alkoxides, tin (II) or (IV) esters, , zinc, manganese, or magnesium acetates or benzoates and/or other such catalyst materials that are well known to those skilled in the art. Phosphorus containing compounds and some colorants may also be present in the esterification zone. The resulting products formed in the esterification zone include bis(2-hydroxyethyl) terephthalate (BHET) monomer, low molecular weight oligomers, DEG, and water (or alcohol in the case of ester exchange) as the condensation by-product, along with other trace impurities formed by the reaction of the catalyst, if any, or starting materials and other compounds such as colorants, impurities in the starting materials or the phosphorus containing compounds. The relative amounts of BHET and oligomeric species will vary depending on whether the process is a direct esterification process in which case the amount of oligomeric species are significant and even present as the major species, or a ester exchange process in which case the relative quantity of BHET predominates over the oligomeric species. The water (or alcohol)is removed as the esterification reaction (or ester exchange) proceeds to drive the equilibrium toward products. The esterification zone typically produces the monomer and oligomer mixture, if any, continuously in a series of one or more reactors. Alternately, the monomer and oligomer mixture could be produced in one or more batch reactors. It is understood, however, that in a process for making PEN, the reaction mixture will contain monomeric species of bis(2-hydroxyethyl) naphthalate and its corresponding oligomers. Once the ester monomer/oligomer is made to the desired degree of esterification, it is transported from the esterification reactors in the esterification zone to the polycondensation zone comprised of a prepolymer zone and a finishing zone. Polycondensation reactions are initiated and continued in the melt phase in a prepolymerization zone and finished in the melt phase in a finishing zone, after which the melt is solidified into precursor solids in the form of chips, pellets, or any other shape. Each zone may comprise a series of one or more distinct reaction vessels operating at different conditions, or the zones may be combined into one reaction vessel using one or more sub-stages operating at different conditions in a single reactor. That is, the prepolymer stage can involve the use of one or more reactors operated continuously, one or more batch reactors, or even one or more reaction steps or sub-stages performed in a single reactor vessel. In some reactor designs, the prepolymerization zone represents the first half of polycondensation in terms of reaction time, while the finishing zone represents the second half of polycondensation. While other reactor designs may adjust the residence time between the prepolymerization zone to the finishing zone at about a 2:1 ratio, a common distinction in many designs between the prepolymerization zone and the finishing zone is that the latter zone frequently operates at a higher temperature and/or lower pressure than the operating conditions in the prepolymerization zone. Generally, each of the prepolymerization and the finishing zones comprise one or a series of more than one reaction vessel, and the prepolymerization and finishing reactors are sequenced in a series as part of a continuous process for the manufacture of the polyester polymer. In the prepolymerization zone, also known in the industry as the low polymerizer, the low molecular weight monomers and oligomers are polymerized via polycondensation to form polyethylene terephthalate polyester (or PEN polyester) in the presence of a catalyst. If the catalyst was not added in the monomer esterification stage, the catalyst is added at this stage to catalyze the reaction between the monomers and low molecular weight oligomers to form prepolymer and split off the diol as a by-product. Other compounds such as phosphorus-containing compounds, cobalt compounds, and colorants can also be added in the prepolymerization zone. These compounds may, however, be added in the finishing zone instead of or in addition to the prepolymerization zone and esterification zone. In a typical DMT-based process, those skilled in the art recognize that other catalyst material and points of adding the catalyst material and other ingredients vary from a typical direct esterification process. Typical polycondensation catalysts include the compounds of Sb, Ti, Ge, and Sn in an amount ranging from 0.1 to 500 ppm based on the weight of resulting polyester polymer. This prepolymer polycondensation stage generally employs a series of one or more vessels and is operated at a temperature of between about 250° C. and 305° C. for a period between about five minutes to four hours. During this stage, the It.V. of the monomers and oligomers is increased up to about no more than about 0.5 dL/g . The diol byproduct is removed from the prepolymer melt using an applied vacuum ranging from 4 to 70 torr to drive the reaction to completion. In this regard, the polymer melt is sometimes agitated to promote the escape of the diol from the polymer melt. As the polymer melt is fed into successive vessels, the molecular weight and thus the intrinsic viscosity of the polymer melt increases. The pressure of each vessel is generally decreased to allow for a greater degree of polymerization in each successive vessel or in each successive zone within a vessel. However, to facilitate removal of glycols, water, alcohols, aldehydes, and other reaction byproducts, the reactors are typically run under a vacuum or purged with an inert gas. Inert gas is any gas which does not cause unwanted reaction or product characteristics at reaction conditions. Suitable gases include, but are not limited to argon, helium and nitrogen. The prepolymer is fed from the prepolymer zone to a finishing zone where the second half of polycondensation is continued in one or more finishing vessels generally, but not necessarily, ramped up to higher temperatures than present in the prepolymerization zone, to a value within a range of from 270° C. to 305° C. until the It.V. of the melt is increased from the It.V of the melt in the prepolymerization zone (typically 0.30 but usually not more than 0.5) to an It.V. of at least 0.55. The It.V. of polyester compositions ranges from about 0.55 to about 1.15 dL/g. Preferably, the It.V. of the polyester particles ranges from 0.70 dL/g to 1.15 dL/g without solid state polymerization. The final vessel, generally known in the industry as the “high polymerizer,” “finisher,” or “polycondenser,” is operated at a pressure lower than used in the prepolymerization zone, e.g. within a range of between about 0.2 and 4.0 torr. Although the finishing zone typically involves the same basic chemistry as the prepolymer zone, the fact that the size of the molecules, and thus the viscosity differs, means that the reaction conditions and vessel(s) may also differ. However, like the prepolymer reactor, each of the finishing vessel(s) is operated under vacuum or inert gas, and each is typically agitated to facilitate the removal of ethylene glycol, although the form of the agitation is suitable for higher viscosities. Additives can be added to the melt phase or to the polyester polymer to enhance the performance properties of the polyester polymer. For example, crystallization aids, impact modifiers, surface lubricants, denesting agents, stabilizers, antioxidants, ultraviolet light absorbing agents, metal deactivators, colorants, nucleating agents, acetaldehyde lowering compounds, reheat rate enhancing aids such as elemental antimony or reduced antimony or reducing agents to form such species in situ, silicon carbide, carbon black, graphite, activated carbon, black iron oxide, red iron oxide and the like, sticky bottle additives such as talc, and fillers and the like can be included. The resin may also contain small amounts of branching agents such as trifunctional or tetrafunctional carboxylic acids or their derivatives and/or alcohols such as trimellitic anhydride, trimethylol propane, pyromellitic dianhydride, pentaerythritol, and other polyester forming polyacids or polyols generally known in the art. All of these additives and many others and their use are well known in the art and do not require extensive discussion. Any of these compounds can be used in the present composition. The molten polymer from the melt phase polymerization may be allowed to solidify from the melt without further crystallization. Alternatively, the molten polymer can be first solidified and then crystallized from the glass. Instead of making the polyester particle directly from the melt phase polymerization process, the particle may be made by melting post consumer recycled polyester polymer. However, since the molecular weight of bulk recycled polyester polymers can vary widely depending on their source or their service requirement, it is preferred that the polyester particle composition comprises at least 75 wt % virgin polyester polymer. A virgin polyester polymer is made without post consumer recycled polymers, but it may optionally contain scrap or regrind polymer. The method for solidifying the polyester polymer from the melt phase process is not limited. For example, molten polyester polymer from the melt phase may be directed through a die, or merely cut, or both directed through a die followed by cutting the molten polymer. A gear pump may be used as the motive force to drive the molten polyester polymer through the die. Instead of using a gear pump, the molten polyester polymer may be fed into a single or twin screw extruder and extruded through a die, optionally at a temperature of 190° C. or more at the extruder nozzle. Once through the die, the polyester polymer can be drawn into strands, contacted with a cool fluid, and cut into pellets, or the polymer can be pelletized at the die head, optionally underwater. The polyester polymer melt is optionally filtered to remove particulates over a designated size before being cut. Any conventional hot pelletization or dicing method and apparatus can be used, including but not limited to dicing, strand pelletizing and strand (forced conveyance) pelletizing, pastillators, water ring pelletizers, hot face pelletizers, underwater pelletizers and centrifuged pelletizers. The method and apparatus used to crystallize the polyester polymer is not limited, and includes thermal crystallization in a gas or liquid. The crystallization may occur in a mechanically agitated vessel; a fluidized bed; a bed agitated by fluid movement; an un-agitated vessel or pipe; crystallized in a liquid medium above the Tg of the polyester polymer, preferably at 140° C. to 180° C.; or any other means known in the art. Also, the polymer may be strain crystallized. It is desirable to crystallize the pellets to at least a 15% degree of crystallization, more preferably to at least 25%, or at least 30%, or at least 35%, or at least 40%. Pellet crystallinity is determined using Differential Scanning Calorimetry (DSC). The sample weight for this measurement is 10±1 mg and the sample consists of either (1) a portion of a single pellet, or more preferably (2) a sample taken from several grams of cryogenically ground pellets. The first heating scan is performed. The sample is heated from approximately 25° C. to 290° C. at a rate of 20° C./minute, and the absolute value of the area of the melting endotherms (one or more) minus the area of any crystallization exotherms is determined. This area corresponds to the net heat of melting and is expressed in Joules. The heat of melting of 100% crystalline PET is taken to be 119 Joules/gram, so the weight fraction crystallinity of the pellet is calculated as the net heat of melting divided by 119. Unless otherwise stated, the initial melting point in each case is also determined using the same DSC scan. The percent crystallinity is calculated from both of: Low peak melting point: Tm1a High peak melting point: Tm1b Note that in some cases, particularly at low crystallinity, rearrangement of crystals can occur so rapidly in the DSC instrument that the true, lower melting point is not detected. The lower melting point can then be seen by increasing the temperature ramp rate of the DSC instrument and using smaller samples. A Perkin-Elmer Pyris-1 calorimeter is used for high-speed calorimetry. The specimen mass is adjusted to be inversely proportional to the scan rate. About a 1 mg sample is used at 500° C./min and about 5 mg are used at 100° C./min. Typical DSC sample pans were used. Baseline subtraction is performed to minimize the curvature in the baseline. Alternatively, percent crystallinity is also calculated from the average gradient tube density of two to three pellets. Gradient tube density testing is performed according to ASTM D 1505, using lithium bromide in water. Once the pellets are crystallized to the desired degree, they are transported to a machine for melt processing into the desired shape, such as sheets for thermoforming into trays or preforms suitable for stretch blow molding into beverage or food containers. Examples of beverage containers include containers having a volume of 3 liters or less, suitable for hot fill, carbonated soft drinks, or water. Thus, there is also provided the process for making a container such as a tray or a bottle preform suitable for stretch blow molding comprising drying PET pellets having an It.V. ranging from 0.7 to 1.15 dL/g and a small surface to center molecular weight gradient in a drying zone at a zone temperature of at least 140° C., introducing the dried pellets into an extrusion zone to form a molten PET polymer composition, and forming a sheet or a molded part from extruded molten PET polymer. In this embodiment, the pellets which are prepared for introduction into an extruder are preferably not solid stated, or if solid stated have been re-melted and solidified to yield a desired small surface to center molecular weight gradient. These polyester particles have an It.V. sufficiently high such that the physical properties are suitable for the manufacture of bottle preforms and trays. The non-solid stated high It.V. pellets have been sufficiently crystallized to prevent them from significantly agglomerating in the dryer at temperatures of 140° C. or more, and up to about 190° C., or 180° C. Dryers feeding melt extruders are needed to reduce the moisture content of pellets. Moisture in or on pellets fed into a melt extrusion chamber will cause the melt to lose It.V. at melt temperatures by hydrolyzing the ester linkages with a resulting change in the melt flow characteristics of the polymer and stretch ratio of the preform when blown into bottles. Therefore, prior to extrusion the pellets are dried at a temperature of 140° C. or more to drive off most all of the moisture on and in the pellet, meaning that the temperature of the heating medium (such as a flow of nitrogen gas or air) is 140° C. or more. It is desirable to dry the pellets at high temperatures of 140° C. or more to decrease the residence time of the pellets in the dryer and increase throughput. To dry at high temperatures while minimizing agglomeration in a conventional dryer equipped with or without an agitator, the pellets should be crystallized at 140° C. or more. In general, the typical residence time of pellets in the dryer at conventional temperatures (140° C. to 190° C.) will on average be from 0.75 hours to 8 hours. Any conventional dryer can be used. The pellets may be contacted with a flow of heated air or inert gas such as nitrogen to raise the temperature of the pellets and remove volatiles from inside the pellets, and may also be agitated by a rotary mixing blade or paddle. The flow rate of the heating gas, if used, is a balance between energy consumption, residence time of pellets, and preferably avoiding the fluidization of the pellets. Suitable gas flow rates range from 0.05 to 100 scfm for every pound per hour of pellets discharged from the dryer, preferably from 0.2 to 5 scfm per lb/hr of pellets. Once the pellets have been dried, they are introduced into an extrusion zone to form molten polyester polymer, followed by processing the molten polymer to form a molded part, such as a bottle preform (parison) through injecting the melt into a mold or extruding into a sheet or coating. Methods for the introduction of the dried pellets into an extrusion zone, for melt processing, injection molding, and sheet extrusion are conventional and known to those of skill in the manufacture of such containers. Extruder barrel temperatures ranging from 260° C. to 305° C. are suitable for processing the polyester particles of the invention. At the extruder, or in the melt phase for making the polyester polymer, other components can be added to the composition of the present invention to enhance the performance properties of the polyester polymer. These components may be added neat to the bulk polyester, may added as a dispersion in a liquid carrier or may be added to the bulk polyester as a polyester concentrate containing at least about 0.5 wt. % of the component in the polyester let down into the bulk polyester. The types of suitable components include crystallization aids, impact modifiers, surface lubricants, stabilizers, denesting agents, antioxidants, ultraviolet light absorbing agents, metal deactivators, colorants, nucleating agents, acetaldehyde lowering compounds, reheat rate enhancing aids, sticky bottle additives such as talc, and fillers and the like can be included. The resin may also contain small amounts of branching agents such as trifunctional or tetrafunctional comonomers such as trimellitic anhydride, trimethylol propane, pyromellitic dianhydride, pentaerythritol, and other polyester forming polyacids or polyols generally known in the art. All of these additives and many others and their use are well known in the art and do not require extensive discussion. Any of these compounds can be used in the present composition. Not only may containers be made from pellets made according to the process of this invention, but other items such as sheet, film, bottles, trays, other packaging, rods, tubes, lids, filaments and fibers, and other injection molded articles may also be manufactured using the polyester particles of the invention. Beverage bottles made from polyethylene terephthalate suitable for holding water or carbonated beverages, and heat set beverage bottle suitable for holding beverages which are hot filled into the bottle are examples of the types of bottles which are made from the crystallized pellet of the invention. The invention may now be further understood by reference to the following non-limiting illustrative examples. EXAMPLES The method for determining the molecular weight gradient throughout the pellets was as follows. 10 pellets having a combined mass of 0.20±0.06 gram were placed in a small stainless steel wire mesh basket. The basket was placed into a small flask containing 3 to 4 mL of stirred GPC solvent (70% hexafluoroisopropanol, 30% methylene chloride) such that the pellets were immersed in the solvent. After a period of time appropriate for the dissolution rate of the pellets (about 2 minutes for the pellets of Examples 2 and 4 and 10 minutes for the pellets of Comparative Examples 1 and 3) the basket was removed from the flask. This caused the outer layer of the pellets to become dissolved in the GPC solvent. The procedure was sequentially repeated using fresh solvent for each cycle until the pellets were completely dissolved. The solution from each dissolution cycle (“cut”) was diluted with additional GPC solvent to increase the volume to 10.0 mL. The molecular weight distribution of each “cut” was measured by injecting 10 μL into the GPC. The It.V. was calculated from the <M>w using the relations given above. The mass of polymer present in each “cut” was calculated as the chromatogram peak area for that “cut” divided by the total chromatogram peak area for all of the “cuts” of that sample. Other than the It.V. values reported for determining the molecular weight gradient, reported It.V. values are determined by the solution viscosity method. Comparative Example 1 Conventional solid stated pellets commercially available from Eastman Chemical Company as PET CB11 E were dried in a commercial-scale desiccant-air dryer. The temperature in the primary dryer hopper (5.5 hour pellet residence time) was 175° C. and the temperature in the secondary dryer hopper (2 hours residence time) was 185° C. The pellets had a degree of crystallinity of about 47% by weight as measured by DSC. The It.V. of the dried pellets was 0.803 dL/g. The It.V. difference between the center and surface (the pellet It.V. gradient) was measured according to the procedures described above and the results are given in Table 1. TABLE 1 It.V. Gradient for the Pellets of Comparative Example 1 Cumulative Weight It.V. Fraction Calculated Cut Dissolved <M>w from <M>w 1 0.090 71794 0.976 (surface) 2 0.168 62511 0.881 3 0.245 58167 0.836 4 0.318 55094 0.803 5 0.394 52909 0.780 6 0.475 50790 0.757 7 0.522 50210 0.750 8 0.575 49440 0.742 9 0.620 48601 0.733 10 0.683 47826 0.725 11 0.719 47403 0.720 12 0.820 46720 0.712 13 0.847 46314 0.708 14 1.000 44861 0.692 (center) The results show that the It.V. of the surface cut (Cut 1, outer 9.0% by weight of the pellets) was 0.976 and that the It.V. of the center cut (Cut 14, center 15.3% by weight of the pellets) was about 0.692. This corresponds to an It.V. difference of 0.284 between the surface and center of the pellets. The dried pellets were melt processed into preforms using a commercial-scaling injection molding machine for making the preforms. The temperature of the molding machine extruder barrel zones ranged from 275° C. to 295° C. The It.V. of the preforms was 0.759 dL/g. Melt processing caused the It.V. to be reduced by 0.044 dL/g. Example 2 Polyester pellets having a similar chemical composition to the pellets of Example 1 had an It.V. of 0.831 dL/g (solution viscosity) after drying under the same conditions as described in Example 1. The pellets had a degree of crystallinity of about 36.5% by weight as measured by DSC and were not solid stated. The It.V. gradient between the center and surface was measured according to the procedures described above. Table 2 sets forth the results of the measurements. TABLE 2 It.V. Gradient for the Pellets of Example 2 Cumulative It.V. Weight Calculated Fraction from Cut Dissolved <M>w <M>w 1 0.102 57351 0.827 (surface) 2 0.300 57576 0.829 3 0.444 58347 0.838 4 0.595 57871 0.832 5 0.691 58300 0.837 6 0.791 57608 0.830 7 0.850 59243 0.847 8 0.901 59208 0.847 9 0.936 58596 0.840 10 0.970 59493 0.849 11 1.000 59128 0.846 (center) The results show that the It.V. of the surface cut (Cut 1, outer 10.2% by weight of the pellets) was 0.827 and that the It.V. of the center cuts (Cuts 8-11, center 15.0% by weight of the pellets) was about 0.847. This corresponds to an It.V. difference of 0.020 between the surface and center of the pellets. The dried pellets were melt processed into preforms using the same conditions as described in Example 1. The It.V. of the preforms was 0.812 dL/g. Melt processing caused the It.V. to be reduced by 0.019 dL/g, less than 50% of the It.V. reduction experienced by the conventional pellets of Example 1. Comparative Example 3 Conventional solid-state polymerized pellets commercially available from Eastman Chemical Company as Voridian CB12 solid stated to an It.V. (before drying) of 0.850 were dried in a small dryer (approximately 40 pounds capacity) at 150° C. for 6 hours. The pellets had a degree of crystallinity of about 48% by weight as measured by DSC. The It.V. difference between the center and surface (the pellet It.V. gradient) was measured according to the procedures described above and the results are given in Table 3. TABLE 3 It.V. Gradient for the Pellets of Comparative Example 3 Cumulative Weight It.V. Fraction Calculated Cut Dissolved <M>w from <M>w 1 0.083 80992 1.067 (surface) 2 0.143 73439 0.992 3 0.212 67237 0.930 4 0.340 61829 0.874 5 0.467 57023 0.823 6 0.608 54777 0.800 7 0.737 51950 0.769 8 0.862 50299 0.751 9 0.904 50609 0.754 10 0.952 49795 0.746 11 0.977 49063 0.738 12 1.000 48459 0.731 (center) The results show that the It.V. of the surface cut (Cut 1, outer 8.3% by weight of the pellets) was 1.067 and that the It.V. of the center cuts (Cuts 9-12, center 13.8% by weight of the pellets) was about 0.744. This corresponds to an It.V. difference of 0.323 between the surface and center of the pellets. The dried pellets were melt processed into preforms using a laboratory-scale injection molding machine. The temperature of the molding machine extruder barrel was 285° C. The It.V. of the preforms was 0.801 dL/g. Melt processing caused the It.V. to be reduced by 0.049 dL/g. Example 4 Polyester pellets from the same batch as those used in Example 2 were dried and melt processed into preforms using the same conditions as described in Example 3. These pellets had an It.V. (before drying) of 0.830 and less difference (<0.2 dL/g) between the It.V. of the center and surface of the pellet. The It.V. of the preforms was 0.810 dL/g. Melt processing caused the It.V. to be reduced by 0.020 dL/g, less than 50% of the It.V. reduction experienced by the conventional pellets of Example 3.
<SOH> 2. BACKGROUND OF THE INVENTION <EOH>Polyester polymer pellets, and in particular polyethylene terephthalate homopolymers and copolymers (PET), experience a loss of intrinsic viscosity (It.V.) during melt processing in, for example, an injection molding extruder. As a result of losing It.V., the physical properties of the polymer also degrade. One cause of It.V. loss is the hydrolytic degradation of the polymer caused by water absorbed in the polymer prior to melt processing. To prevent hydrolysis, the polymer is thoroughly dried prior to melt processing. While drying the polymer reduces the loss of It.V., nevertheless, some drop in It.V. is experienced, thereby requiring the use of a polymer having an It.V. higher than the target container It.V. to compensate for It.V. losses during extrusion. The use of higher than target It.V. polymers has the added disadvantage of higher costs due to more energy consumption required to heat the polymer for a longer time and to agitate a more viscous material, and/or due to the extension of the residence time during melt phase polymerization to bring the It.V. up to the desired level, resulting in a decreased production rate. The use of higher than target It.V. polyester polymers also has the disadvantage of requiring more energy to feed the polymer along the screw in the extruder. It would be desirable to reduce the loss in It.V. experienced by the polyester polymer during melt processing for making containers.
<SOH> 3. SUMMARY OF THE INVENTION <EOH>We have discovered a polyester composition that has an It.V. suitable for containers, yet loses less It.V. during melt processing than existing polyesters. There is now provided a polyester polymer particle comprising a polyester polymer comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, wherein said particle has an It.V. of at least 0.7 dL/g , and the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. There is also provided a polyester particle having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g , said particle having an It.V. at its surface and an It.V. at its center, wherein the It.V. at the surface of the particle is less than 0.25 dL/g higher than the It.V. at the center of the particle. In addition, there is provided a process for making a polyester container, comprising feeding polyester particles having a degree of crystallinity of at least 15% and an It.V. of at least 0.70 dL/g to an extrusion zone, melting the particles in the extrusion zone to form a molten polyester polymer composition, and forming a sheet or a molded part from extruded molten polyester polymer, wherein the polyester particles fed to the extrusion zone have an It.V. at their surface which is less than 0.25 dL/g higher than the It.V. at their center. In yet another embodiment, there is provided polyester particles having a particle weight of greater than 1.0 g per 100 particles and less than 100 g per 100 particles, said particles comprising at least 75% virgin polyester polymer comprising: (a) a carboxylic acid component comprising at least 90 mole % of the residues of terephthalic acid, or derivates of terephthalic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 90 mole % of the residues of ethylene glycol, based on 100 mole percent of the carboxylic acid component residues and 100 mole percent hydroxyl component residues in the polyester polymer, the particles having a degree of crystallinity of at least 25%, an It.V. of at least 0.77 dL/g, an It.V. at their surface and an It.V. at their center wherein the It.V. at the surface of the particles is not greater than 0.15 dL/g higher than the It.V. at the center of the particles, and having an acetaldehyde level of 10 ppm or less. detailed-description description="Detailed Description" end="lead"?
20040308
20081202
20050908
67523.0
2
LE, HOA T
PROCESS OF MAKING A CONTAINER FROM POLYESTER POLYMER PARTICLES HAVING A SMALL SURFACE TO CENTER INTRINSIC-VISCOSITY GRADIENT
UNDISCOUNTED
0
ACCEPTED
2,004
10,795,877
ACCEPTED
System and method for data communication handoff across heterogeneous wireless networks
A system and method of data communication handoff across heterogeneous wireless networks. A wireless telephony network comprises a base station system (BSS) and a visit location register (VLR). The BSS manages data communication in a cell. The VLR generates a temporary authentication identity applicable in the cell when a mobile terminal is successful authentication for data communication via the wireless telephony network, and transmits the temporary authentication identity to the mobile terminal. A wireless local area network (WLAN) located in the cell comprises an access point. The access point receives the temporary authentication identity from the wireless telephony network and authenticates the mobile terminal for data communication via the WLAN by verifying the temporary authentication identity upon the mobile terminal associates with the access point.
1. A system of data communication handoff, comprising: a wireless telephony network comprising a base station system (BSS) and a visit location register (VLR) corresponding to the BSS, wherein the BSS manages data communication in a cell, and the VLR generates a temporary authentication identity applicable only in the cell when a mobile terminal is successful authentication for data communication via the wireless telephony network, and transmits the temporary authentication identity to the mobile terminal; and a wireless local area network (WLAN) located in the cell comprises a access point, wherein the access point receives the temporary authentication identity from the wireless telephony network before the mobile terminal associates with the access point, and authenticates the mobile terminal by verifying the temporary authentication identity for data communication via the WLAN upon the mobile terminal associates with the access point. 2. The system as claimed in claim 1 wherein the WLAN further comprises an authentication, authorization and accounting (AAA) server storing information regarding the WLAN located in the cell. 3. The system as claimed in claim 1 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI). 4. The system as claimed in claim 3 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI). 5. The system as claimed in claim 1 wherein the wireless telephony network further comprises a home location register (HLR), and the WLAN further comprises an authentication, authorization and accounting (AAA) server and a HLR-AAA gateway. 6. The system as claimed in claim 5 wherein the temporary authentication identity is transmitted to the access point via the HLR, the HLR-AAA gateway and the AAA server. 7. The system as claimed in claim 6 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI). 8. The system as claimed in claim 2 wherein the wireless telephony network further comprises a home location register (HLR), and the WLAN further comprises a HLR-AAA gateway. 9. The system as claimed in claim 8 wherein the temporary authentication identity is transmitted to the access point via the HLR, the HLR-AAA gateway and the AAA server. 10. The system as claimed in claim 9 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI). 11. A method of data communication handoff, utilized in a wireless telephony network and a wireless local area network (WLAN) performing the steps of: generating a temporary authentication identity applicable in a local cell, with a visit location register (VLR) when a mobile terminal is successful authentication for data communication via the wireless telephony network, wherein the VLR within the wireless telephony network; transmitting the temporary authentication identity to the mobile terminal; receiving the temporary authentication identity with an access point within the WLAN from the wireless telephony network before the mobile terminal associates with the access point; and authenticating the mobile terminal by verifying the temporary authentication identity for data communication via the WLAN upon the mobile terminal associates with the access point. 12. The method as claimed in claim 11 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI). 13. The method as claimed in claim 11 wherein the step of receiving the temporary authentication identity, the temporary authentication identity is transmitted via a home location register (HLR), an authentication, authorization and accounting (AAA) server and a HLR-AAA gateway, the HLR being within the wireless telephony network, and both the AAA server and the HLR-AAA gateway being within the WLAN. 14. The method as claimed in claim 13 wherein the temporary authentication identity comprises a temporary mobile subscriber identity (TMSI).
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to data communication management; and particularly to a method and system for data communication handoff across heterogeneous wireless networks. 2. Description of the Related Art Wireless telephony service providers offer not only voice calling but also General Packet Radio Service (GPRS) to enable the data packet transmission via a mobile terminal. Although GPRS is feasible in mobile data transmission, the transmission rates typically do not exceed 56 Kbs and the costs remain expensive. Advances in wireless local area network (WLAN) technology have led to the emergence of publicly accessible WLANs (e.g., “hot spots”) at airports, cafes, libraries and other public facilities. The WLAN uses radio frequency transmission to communicate between roaming mobile terminals and access points (or base stations). The relatively low cost to implement and operate a WLAN, as well as the available high bandwidth (usually in excess of 10 Megabits/second) has made the WLAN an idea wireless access infrastructure. “Cell” is the basic geographic unit of a wireless telephony system. A city or county is divided into smaller cells, each of which is equipped with a low-powered radio transmitter/receiver. The cells can vary in size depending on terrain, capacity demands, or other conditions. By controlling the transmission power, the radio frequencies assigned to one cell can be limited to the boundaries of that cell. In a hybrid wireless communication environment, a cell may contain multiple WLANs. When a mobile terminal attaching to a wireless telephony network enters a WLAN in one cell, in the ideal situation, the data transmission is handled by the WLAN without disrupting the data communication. In order to accommodate wireless telephony networks and WLANs, Subscriber Identity Module (SIM) based authentication using Extensible Authentication Protocol Over LAN (EAPOL) has been introduced to provide a unified protocol for communication between different types of wireless networks. Although the solution is feasible, the interrogation information transmitted back and forth between a WLAN and a wireless telephony network is time consuming, and disruptive to data communication. In view of the above limitations, a need exists for a system and method of data communication handoff to provide an efficient authentication mechanism for a hybrid wireless network environment. SUMMARY OF THE INVENTION It is therefore an object of the present invention to provide a system and method of data communication handoff to provide a pre-authentication mechanism for performing complicated authentication procedures when a mobile terminal associates with a BSS, enabling the mobile terminal to hand off data communication from a wireless telephony network to a WLAN within the same cell, with reduced authentication time. According to a first embodiment of the invention, a mobile terminal initiates a data communication with a base station system (BSS) in a cell, an authentication request with an International Mobile Subscriber Identity (IMSI) stored in Subscriber Identity Module (SIM) card is sent to an authentication center (AUC) via the BSS and a Mobile Switching Center (MSC). Next, the AUC and mobile terminal authenticate each other using the Challenge/Handshake Authentication Protocol (CHAP). After the authentication is successful, a Visit Location Register (VLR) generates a temporary authentication identity applicable in a corresponding cell. The VLR transmits the temporary authentication identity to the mobile terminal via the MSC, and the mobile terminal stores the temporary authentication identity on the SIM card. The VLR additionally transmits the VLR address and the temporary authentication identity to an Authentication, Authorization and Accounting (AAA) server via the HLR and an AAA-HLR gateway. The AAA server stores the temporary authentication identity and transmits it to access points (APs) associated with any Wireless Local Network (WLAN) within the cell. When the mobile terminal enters a WLAN in the cell and associates with an AP therein, the mobile terminal sends the AP an Extensible Authentication Protocol over Wireless (EAPOW) start message. Next, the AP sends an EAP request to the mobile terminal for temporary authentication identity, and the mobile terminal sends an EAP response with temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal upon successfully verifying the temporary authentication identity of the mobile terminal with that received from the VLR. Following the first embodiment of the invention, the mobile terminal hands off the data communication from the BSS to a new BSS in a new cell, an authentication request with the temporary authentication identity stored in a SIM card is sent to the MSC via a new BSS and a new MSC corresponding to the new BSS, and authentication information with the IMSI corresponding to the mobile terminal, and a plurality of random numbers (RANDs) and signed responses (SRESs) is sent to the new MSC. Next, the new MSC and mobile terminal authenticate each other using CHAP. After successful authentication, a new VLR generates a new temporary authentication identity applicable in the new cell. Next, the new VLR transmits the new temporary authentication identity to the mobile terminal via the new MSC, and the mobile terminal stores the new temporary authentication identity on the SIM card. The new VLR additionally transmits VLR address and the new temporary authentication identity to a new AAA server via the HLR and an AAA-HLR gateway. The AAA server stores the new temporary authentication identity and transmits it to access points (APs) associated with any WLAN within the new cell. When the mobile terminal enters a WLAN in the new cell and associates with an AP therein, the mobile terminal sends the AP an EAPOW start message. Next, the AP sends an EAP request to the mobile terminal for new temporary authentication identity, and the mobile terminal sends an EAP response with new temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal upon successfully verifying the new temporary authentication identity of the mobile terminal with that received from the new VLR. BRIEF DESCRIPTION OF THE DRAWINGS The present invention can be more fully understood by reading the subsequent detailed description and examples with references made to the accompanying drawings, wherein: FIG. 1 is an architecture diagram of a hybrid wireless communication environment according to the first embodiment of the invention; FIG. 2 is a communication sequence diagram of a hybrid wireless communication environment according to the first embodiment of the invention; FIG. 3 is a flowchart showing a method of data communication handoff according to the first embodiment of the invention; FIG. 4 is an architecture diagram of a hybrid wireless communication environment according to the second embodiment of the invention; FIG. 5 is a communication sequence diagram of a hybrid wireless communication environment according to the second embodiment of the invention; FIG. 6 is a flowchart showing a method of data communication handoff according to the second embodiment of the invention. DETAILED DESCRIPTION OF THE INVENTION A first embodiment of the invention discloses a data communication handoff system and method thereof in a hybrid wireless communication environment when a mobile terminal initiates a data communication. FIG. 1 is an architecture diagram of a hybrid wireless communication environment according to the first embodiment of the invention. The environment comprises a base station system (BSS) 11, an Authentication, Authorization and Accounting (AAA) server 31, Wireless Local Area Networks (WLANs), ranging from 32 to 36, a Mobile Switching Center (MSC) 12, a Visit Location Register (VLR) 14, a Home Location Register (HLR) 13 and an Authentication Center (AUC) 15. The WLANs are located in the cell 10. The BSS 11 comprises a base transceiver station (BTS) and a base station controller (BSC). The BTS handles the radio interface to the mobile station 20 with the radio equipment, such as transceivers and antennas. The BSC provides the control functions, such as handoff, cell configuration data and control of radio frequency (RF) power levels in the BTS, and physical links between the MSC 12 and BTS. The MSC 12 performs the telephony switching functions of the wireless telephony system, and additionally performs such functions as toll ticketing, network interfacing, common channel signaling, or others. The AUC 13 provides authentication and encryption parameters that verify the mobile station identity and ensure the confidentiality of each call. The HLR database is used for storage and management of subscriptions. The home location register 15 stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status. The VLR database contains temporary information about subscribers required by the MSC 12 in order to service visiting subscribers. When a mobile station 20 roams into the MSC area, the VLR 14 connected to the MSC 12 requests data about the mobile station 20 from the HLR 15, reducing the need for interrogation of the HLR 15. Registration of the mobile terminal 20 typically involves authentication, authorization and accounting. The AAA server 31 is a server application that handles user requests for access to computer resources and provides AAA services. The AAA server 31 typically interacts with network access and gateway servers and with databases and directories containing user information. The preferable standard by which devices or applications communicate with a AAA server is the Remote Authentication Dial-In User Service (RADIUS). The AAA server 31 stores information regarding WLANs located in the cell 10. A WLAN is a type of local area network employing high-frequency radio waves rather than wires to communicate between mobile terminals. In a WLAN, an access point is a station that transmits and receives data, referred to as a transceiver. An access point connects mobile terminals within the WLAN and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each access point can serve multiple mobile terminals within a defined network area; as mobile terminals move beyond the range of one access point, they are automatically handed over to the next one. A small WLAN may only require a single access point, and the number required increases as a function of the number of mobile terminals and the physical size of the WLAN. The accommodation of the wireless telephony network and the WLANs 32 to 36, allows the mobile terminal 20 to transition from one type of network to another. Thus, for example, the mobile terminal 20 may initiate a data communication session with the mobile telephony network through the BSS 11, and then transition to the WLAN, such as 32, 33, 34, 35 or 36. In order to provide smooth handoff of data communication from a wireless telephony network to a WLAN without disrupting the data connection, the first embodiment discloses a pre-authentication mechanism to reduce the authentication time. FIG. 2 is a communication sequence diagram of a hybrid wireless communication environment according to the first embodiment of the invention. When the mobile terminal 20 initiates data communication with the BSS 11 in the cell 10, an authentication request 411 with an International Mobile Subscriber Identity (IMSI), stored in a SIM card is sent to the AUC 13 via the BSS 11 and MSC 12. The AUC 13 generates authentication information 413 with a plurality of parameter triplets, each containing a random number (RAND), a signed response (SRES) and a cipher key (Kc), and sends it to the MSC 12. The mobile terminal 20 and the MSC 12 use Challenge/Handshake Authentication Protocol (CHAP) 414 to authenticate each other. After successful authentication, the VLR 14 generates a temporary authentication identity, preferably a Temporary Mobile Subscriber Identity (TMSI), which is only applicable in the cell 20. The association between the IMSI and the temporary authentication identity is stored in the VLR 14. It is noted that the identity of the subscriber cannot be acquired by listening to the radio channel, since the temporary authentication identity is only generated while the mobile terminal 20 is present in the cell 20, and can even be changed during this period (i.e., ID hopping). The VLR 14 transmits a message 416 comprising the temporary authentication identity to the mobile terminal 20 via the MSC 12, and the mobile terminal 20 stores the temporary authentication identity on the SIM card. The VLR 14 additionally transmits a message 415 comprising the VLR address and the temporary authentication identity to the HLR 13 via the MSC 12. The HLR 15 transmits a message 421 comprising the temporary authentication identity to the AAA server 31 for pre-registration via an AAA-HLR gateway (not shown), and the AAA server 31 stores the temporary authentication identity and transmits it to access points (APs) associated with any WLAN within the cell 20. When the mobile terminal 20 enters a WLAN in the cell 10 and associates with an AP therein, the mobile terminal 20 sends the AP an Extensible Authentication Protocol over Wireless (EAPOW) start message 431. The AP sends an EAP request 432 to the mobile terminal 20 for temporary authentication identity, and the mobile terminal 20 sends an EAP response 432 with the temporary authentication identity to the AP. An EAP success message 433 is sent to the mobile terminal upon successfully verifying the temporary authentication identity of the mobile terminal 20 by that of the VLR 14. FIG. 3 is a flowchart showing a method of data communication handoff according to the first embodiment of the invention. First, in step S311, the mobile terminal 20 initiates a data communication with the BSS 11 in the cell 10, an authentication request 411 with an IMSI stored in a SIM card is sent to the AUC 13 via the BSS 11 and MSC 12. In step S312, the AUC 13 and mobile terminal 20 authenticate each other using CHAP. In step S321, after successful authentication, the VLR 14 generates a temporary authentication identity applicable in the cell 20. In step S322, the VLR 14 transmits the temporary authentication identity to the mobile terminal 20 via the MSC 12, and the mobile terminal 20 stores the temporary authentication identity on the SIM card. In step S323, the VLR 14 additionally transmits the VLR address and the temporary authentication identity to the AAA server 31 via the HLR 13 and an AAA-HLR gateway (not shown). In step S324, the AAA server stores the temporary authentication identity and transmits it to access points (APs) associated with any WLAN within the cell 20. In step S331, when the mobile terminal 20 enters a WLAN in the cell 10 and associates with an AP therein, the mobile terminal 20 sends the AP an EAPOW start message. In step S332, the AP sends an EAP request to the mobile terminal 20 for temporary authentication identity, and the mobile terminal 20 sends an EAP response with temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal 20 upon successfully verifying the temporary authentication identity of the mobile terminal 20 with that received from the VLR 14. Following the first embodiment of the invention, a second embodiment of the invention discloses a data communication handoff system and method thereof in a hybrid wireless communication environment when a mobile terminal hands off a data communication from the BSS 11 to another BSS. FIG. 4 is an architecture diagram of a hybrid wireless communication environment according to the second embodiment of the invention. The environment comprises the BSS 41, an AAA server 61, WLANs, ranging from 62 to 66, MSCs 12, 42, VLRs 14, 44, the HLR 13 and the AUC 15. The WLANs are located in the cell 40. The BSS 41 familiar with the BSS 11 comprises a BTS and a BSC and handles data communication in the cell 40. The MSC 42 performs various telephony switching functions in the cell 40. The VLR database contains temporary information about subscribers required by the MSC 42 in order to service visiting subscribers. When a mobile station 20 roams into the MSC area, the VLR 44 connected to the MSC 42 requests data about the mobile station 20 from the VLR 14. The AAA server 61 storing information regarding WLANs located in the cell 40. In order to smooth hand off a data communication from a wireless telephony network to a WLAN without disrupting the data connection, the second embodiment also discloses a pre-authentication mechanism to reduce the authentication time. FIG. 5 is a communication sequence diagram of a hybrid wireless communication environment according to the second embodiment of the invention. When the mobile terminal 20 hands off the data communication from the BSS 11 to the BSS 41 in the cell 40, an authentication request 611 with the prior received temporary authentication identity stored in a SIM card is sent to the MSC 12 via the MSC 42. The MSC 12 transmits authentication information 613 with an IMSI corresponding to the mobile terminal 20, and a plurality of RANDs and SRESs to the MSC 42 for authentication. The mobile terminal 20 and the MSC 42 use CHAP 614 to authenticate each other. After the authentication is successful, the VLR 44 generates a new temporary authentication identity only valid in the cell 40. The association between the IMSI and the new temporary authentication identity is stored in the VLR 44. The VLR 44 transmits a message 616 comprising the new temporary authentication identity to the mobile terminal 20 via the MSC 42, and the mobile terminal 20 stores the new temporary authentication identity on the SIM card. The VLR 44 additionally transmits a message 615 comprising the VLR address and the new temporary authentication identity to the HLR 13 via the MSC 42. The HLR 15 transmits a message 621 comprising the new temporary authentication identity to the AAA server 61 for pre-registration via an AAA-HLR gateway (not shown), and the AAA server 61 stores the new temporary authentication identity and transmits the new temporary authentication identity to access points (APs) associated with any WLAN within the cell 40. Upon the mobile terminal 20 enters a WLAN in the cell 40 and associates with an AP therein, the mobile terminal 20 sends the AP an EAPOW start message 631. The AP sends an EAP request 632 to the mobile terminal 20 for temporary authentication identity, and the mobile terminal 20 sends an EAP response 632 with new temporary authentication identity to the AP. An EAP success message 633 is sent to the mobile terminal upon successfully verifying the new temporary authentication identity of the mobile terminal 20 with that of the VLR 44. FIG. 6 is a flowchart showing a method of data communication handoff according to the second embodiment of the invention. First, in step S611, the mobile terminal 20 hands over the data communication from the BSS 11 to the BSS 41 in the cell 40, an authentication request 711 with the temporary authentication identity stored in a SIM card is sent to the MSC 12 via the BSS 41 and MSC 42, and authentication information 713 with the IMSI corresponding to the mobile terminal 20, and a plurality of RANDs and SRESs is sent to the MSC 42. In step S612, the MSC 42 and mobile terminal 20 authenticate each other using CHAP 714. In step S621, after successful authentication, the VLR 44 generates a new temporary authentication identity applicable in the cell 40. In step S622, the VLR 44 transmits the new temporary authentication identity to the mobile terminal 20 via the MSC 42, and the mobile terminal 20 stores the new temporary authentication identity on the SIM card. In step S623, the VLR 44 additionally transmits the VLR address and the new temporary authentication identity to the AAA server 61 via the HLR 13 and an AAA-HLR gateway (not shown). In step S624, the AAA server stores the new temporary authentication identity and transmits it to access points (APs) associated with any WLAN within the cell 40. In step S631, when the mobile terminal 20 enters a WLAN in the cell 40 and associates with an AP therein, the mobile terminal 20 sends the AP an EAPOW start message. In step S632, the AP sends an EAP request to the mobile terminal 20 for a new temporary authentication identity, and the mobile terminal 20 sends an EAP response with the new temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal 20 upon successfully verifying the new temporary authentication identity of the mobile terminal 20 with that received from the VLR 44. The system and method of this invention provide a pre-authentication mechanism for performing complicated authentication procedures while a mobile terminal associates with a BSS, enabling the mobile terminal to hand off the data communication from a wireless telephony network to a WLAN within the same cell, with reduced authentication time. Although the present invention has been described in its preferred embodiments, it is not intended to limit the invention to the precise embodiments disclosed herein. Those who are skilled in this technology can still make various alterations and modifications without departing from the scope and spirit of this invention. Therefore, the scope of the present invention shall be defined and protected by the following claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to data communication management; and particularly to a method and system for data communication handoff across heterogeneous wireless networks. 2. Description of the Related Art Wireless telephony service providers offer not only voice calling but also General Packet Radio Service (GPRS) to enable the data packet transmission via a mobile terminal. Although GPRS is feasible in mobile data transmission, the transmission rates typically do not exceed 56 Kbs and the costs remain expensive. Advances in wireless local area network (WLAN) technology have led to the emergence of publicly accessible WLANs (e.g., “hot spots”) at airports, cafes, libraries and other public facilities. The WLAN uses radio frequency transmission to communicate between roaming mobile terminals and access points (or base stations). The relatively low cost to implement and operate a WLAN, as well as the available high bandwidth (usually in excess of 10 Megabits/second) has made the WLAN an idea wireless access infrastructure. “Cell” is the basic geographic unit of a wireless telephony system. A city or county is divided into smaller cells, each of which is equipped with a low-powered radio transmitter/receiver. The cells can vary in size depending on terrain, capacity demands, or other conditions. By controlling the transmission power, the radio frequencies assigned to one cell can be limited to the boundaries of that cell. In a hybrid wireless communication environment, a cell may contain multiple WLANs. When a mobile terminal attaching to a wireless telephony network enters a WLAN in one cell, in the ideal situation, the data transmission is handled by the WLAN without disrupting the data communication. In order to accommodate wireless telephony networks and WLANs, Subscriber Identity Module (SIM) based authentication using Extensible Authentication Protocol Over LAN (EAPOL) has been introduced to provide a unified protocol for communication between different types of wireless networks. Although the solution is feasible, the interrogation information transmitted back and forth between a WLAN and a wireless telephony network is time consuming, and disruptive to data communication. In view of the above limitations, a need exists for a system and method of data communication handoff to provide an efficient authentication mechanism for a hybrid wireless network environment.
<SOH> SUMMARY OF THE INVENTION <EOH>It is therefore an object of the present invention to provide a system and method of data communication handoff to provide a pre-authentication mechanism for performing complicated authentication procedures when a mobile terminal associates with a BSS, enabling the mobile terminal to hand off data communication from a wireless telephony network to a WLAN within the same cell, with reduced authentication time. According to a first embodiment of the invention, a mobile terminal initiates a data communication with a base station system (BSS) in a cell, an authentication request with an International Mobile Subscriber Identity (IMSI) stored in Subscriber Identity Module (SIM) card is sent to an authentication center (AUC) via the BSS and a Mobile Switching Center (MSC). Next, the AUC and mobile terminal authenticate each other using the Challenge/Handshake Authentication Protocol (CHAP). After the authentication is successful, a Visit Location Register (VLR) generates a temporary authentication identity applicable in a corresponding cell. The VLR transmits the temporary authentication identity to the mobile terminal via the MSC, and the mobile terminal stores the temporary authentication identity on the SIM card. The VLR additionally transmits the VLR address and the temporary authentication identity to an Authentication, Authorization and Accounting (AAA) server via the HLR and an AAA-HLR gateway. The AAA server stores the temporary authentication identity and transmits it to access points (APs) associated with any Wireless Local Network (WLAN) within the cell. When the mobile terminal enters a WLAN in the cell and associates with an AP therein, the mobile terminal sends the AP an Extensible Authentication Protocol over Wireless (EAPOW) start message. Next, the AP sends an EAP request to the mobile terminal for temporary authentication identity, and the mobile terminal sends an EAP response with temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal upon successfully verifying the temporary authentication identity of the mobile terminal with that received from the VLR. Following the first embodiment of the invention, the mobile terminal hands off the data communication from the BSS to a new BSS in a new cell, an authentication request with the temporary authentication identity stored in a SIM card is sent to the MSC via a new BSS and a new MSC corresponding to the new BSS, and authentication information with the IMSI corresponding to the mobile terminal, and a plurality of random numbers (RANDs) and signed responses (SRESs) is sent to the new MSC. Next, the new MSC and mobile terminal authenticate each other using CHAP. After successful authentication, a new VLR generates a new temporary authentication identity applicable in the new cell. Next, the new VLR transmits the new temporary authentication identity to the mobile terminal via the new MSC, and the mobile terminal stores the new temporary authentication identity on the SIM card. The new VLR additionally transmits VLR address and the new temporary authentication identity to a new AAA server via the HLR and an AAA-HLR gateway. The AAA server stores the new temporary authentication identity and transmits it to access points (APs) associated with any WLAN within the new cell. When the mobile terminal enters a WLAN in the new cell and associates with an AP therein, the mobile terminal sends the AP an EAPOW start message. Next, the AP sends an EAP request to the mobile terminal for new temporary authentication identity, and the mobile terminal sends an EAP response with new temporary authentication identity stored in the SIM card to the AP. An EAP success message is sent to the mobile terminal upon successfully verifying the new temporary authentication identity of the mobile terminal with that received from the new VLR.
20040308
20070417
20050609
76354.0
2
CONTEE, JOY KIMBERLY
SYSTEM AND METHOD FOR DATA COMMUNICATION HANDOFF ACROSS HETEROGENEOUS WIRELESS NETWORKS
UNDISCOUNTED
0
ACCEPTED
2,004
10,795,909
ACCEPTED
Destructible privacy label
A destructible privacy label includes a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes two segments conjoined about a separation line which defines adjacent segment edges. Each segment is separable from the other along the separation line. Removing one of the segments from the other renders indicia printed on the sheet-like member upper surface illegible.
1. A destructible privacy label comprising: a sheet-like member having an upper surface and an adhesive lower surface; said upper surface adapted for printing indicia thereon; and said sheet-like member comprising two segments conjoined about a separation line that defines adjacent segment edges; each segment being separable from the other along the separation line; wherein removing one of said segments from the other renders indicia printed on sheet-like member upper surface illegible. 2. The destructible privacy label of claim 1, wherein said separation line is sinusoidal and extends from one edge of said sheet-like member to another edge of said sheet-like member. 3. The destructible privacy label of claim 1, wherein said separation line is a cut line. 4. The destructible privacy label of claim 1, further comprising: a removable release liner contacting said sheet-like member adhesive lower surface. 5. The destructible privacy label of claim 4, wherein the surface of said release liner contacting said sheet-like member adhesive lower surface is siliconized. 6. The destructible privacy label of claim 1, further comprising: a second sheet-like member having an upper surface and an adhesive lower surface, said upper surface releasably contacting said first sheet-like member adhesive lower surface. 7. The destructible privacy label of claim 6, wherein said upper surface of said second sheet-like member is siliconized. 8. The destructible privacy label of claim 7, further comprising: a removable release liner contacting said second sheet-like member adhesive lower surface. 9. The destructible privacy label of claim 8, wherein the surface of said release liner contacting said second sheet-like member adhesive lower surface is siliconized. 10. The destructible privacy label of claim 1, wherein one segment of said sheet-like member has a permanent adhesive on said adhesive lower surface. 11. A destructible privacy label comprising: a sheet-like member having an upper surface and an adhesive lower surface; said upper surface adapted for printing indicia thereon; said sheet-like member comprising a plurality of remainder segments; and said sheet-like member further comprising at least one removable segment that is separable from said remainder segments; wherein removing said removable segment from said remainder segments renders indicia printed on said sheet-like member upper surface illegible. 12. The destructible privacy label of claim 11, wherein at least one of said remainder segments has a two-dimensional shape chosen from a group of circles, squares, diamonds, octagons, dagger shapes, saw tooth shapes, and island shapes. 13. The destructible privacy label of claim 11, wherein at least one remainder segment of said sheet-like member has a permanent adhesive on said adhesive lower surface. 14. The destructible privacy label of claim 11, further comprising: a second sheet-like member having an upper surface and an adhesive lower surface, said upper surface releasably contacting said first sheet-like member adhesive lower surface. 15. The destructible privacy label of claim 11, further comprising: a removable release liner contacting said second sheet-like member adhesive lower surface. 16. A method of protecting the privacy of a patient's identity and personal information in a healthcare setting, comprising the steps of: providing a destructible privacy label comprising: a sheet-like member having an upper surface and an adhesive lower surface; said upper surface adapted for printing indicia thereon; and said sheet-like member comprising two segments conjoined about a separation line that defines adjacent segment edges; each segment being separable from the other along the separation line. 17. The method of claim 16, wherein the step of providing a destructible privacy label further comprises providing a destructible privacy label further comprising a removable release liner contacting said sheet-like member adhesive lower surface 18. The method of claim 17, further comprising the steps of: printing indicia on said sheet-like member upper surface, said indicia operative to indicate a patient's identity and personal information; removing said release liner from said sheet-like member adhesive lower surface; placing said adhesive lower surface of said sheet-like member on an object to associate said object with said patient's identity and personal information; and removing one of said sheet-like member segments from said object, thereby rendering the indicia printed on said sheet-like member upper surface illegible. 19. The method of claim 16, wherein the step of providing a destructible privacy label further comprises providing a destructible privacy label further comprising: a second sheet-like member having an upper surface and an adhesive lower surface, said upper surface releasably contacting said first sheet-like member adhesive lower surface; and a removable release liner contacting said second sheet-like member adhesive lower surface. 20. The method of claim 19, further comprising the steps of: printing indicia on said first sheet-like member upper surface, said indicia operative to indicate a patient's identity and personal information; removing said release liner from said second sheet-like member adhesive lower surface; placing said adhesive lower surface of said second sheet-like member on an object to associate said object with said patient's identity and personal information; and removing one of said first sheet-like member segments from said second sheet-like member, thereby rendering the indicia printed on said first sheet-like member upper surface illegible.
TECHNICAL FIELD This invention relates to labels used in connection with patient care with medical objects such as medical records, medical containers, and medical devices and, more particularly, to privacy labels that are easily destructible to insure patient privacy after use. BACKGROUND OF THE INVENTION Health care providers commonly label medical objects such as charts, medical devices, and medication containers associated with a particular patient to ensure that the patient receives their intended medical care. However, the Health Insurance Portability and Accountability Act (HIPAA) requires health care providers to hide a patient's identity before disposing of any medical objects associated with the patient. Patient identification is commonly accomplished by attaching a one-piece label having an adhesive lower surface adapted to adhere to a medical object and an upper surface for displaying indicia such as a patient's name, social security number, or a barcode. At the conclusion of a medical treatment, i.e. when a labeled medical container such as an intravenous (IV) bag is emptied, the label must be adequately destroyed to make the indicia printed thereon illegible. This requires a health care provider to tear away or adequately cross out the indicia printed on the label to protect a patient's identity before disposing of the medical object. SUMMARY OF THE INVENTION The present invention provides a destructible privacy label for use with patient labeled medical objects such as medical records, medication containers, and medical supplies. The destructible privacy label is easily destroyable prior to disposal of the associated object thus rendering patient identifying indicia on the label illegible. The destructible privacy label aids a health care provider by allowing the provider to easily destroy the indicia displayed on the sheet-like member by removing one of the segments. A destructible privacy label in accordance with the present invention includes a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes two segments conjoined about a separation line that defines adjacent segment edges and the separation line has a curvilinear shape. Each segment is separable from the other along the separation line. Removing one of the segments of the sheet-like member from the other renders indicia printed on the sheet-like member upper surface illegible. In a preferred embodiment, the separation line may be sinusoidal and extends from one edge of the sheet-like member to another edge of the sheet-like member. The separation line may also be a cut line. Optionally, the destructible privacy label may include a removable release liner contacting the sheet-like member adhesive lower surface. This preserves the adhesive on the sheet-like member prior to use of the label. The surface of the release liner contacting the sheet-like member adhesive lower surface may be siliconized. One segment of the sheet-like member may also have a permanent adhesive on the adhesive lower surface. Alternatively, the destructible privacy label may further include a second sheet-like member having an upper surface and an adhesive lower surface, wherein the upper surface releasably contacts the first sheet-like member adhesive lower surface. The upper surface of the second sheet-like member may be siliconized and a removable release liner may contact the second sheet-like member adhesive lower surface. The surface of the release liner contacting the second sheet-like member adhesive lower surface may also be siliconized. The second sheet-like member provides a mounting surface between the first sheet-like member and an associated medical object so that one of the segments may be easily removed to destroy the first sheet-like member to render indicia printed thereon illegible. In an alternative embodiment, a destructible privacy label includes a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes a plurality of remainder segments and at least one removable segment that is separable from the remainder segments. Removing the removable segment from the remainder segments renders indicia printed on the sheet-like member upper surface illegible. Optionally, at least one of the remainder segments may have a two-dimensional shape chosen from a group of circles, squares, diamonds, octagons, dagger shapes, saw tooth shapes, and island shapes. At least one remainder segment of the sheet-like member may also have a permanent adhesive on the adhesive lower surface. Alternatively, the destructible privacy label may further include a second sheet-like member having an upper surface and an adhesive lower surface, wherein the upper surface releasably contacts the first sheet-like member adhesive lower surface. A removable release liner may contact the second sheet-like member adhesive lower surface. A method of protecting the privacy of a patient's identity and personal information in a healthcare setting includes the step of providing a destructible privacy label including a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes two segments conjoined about a separation line which defines adjacent segment edges and has a curvilinear shape. Each segment is separable from the other along the separation line. In a preferred embodiment, the step of providing a destructible label may include providing a destructible label further including a removable release liner contacting the sheet-like member adhesive lower surface. The method may also include the steps of: printing indicia on the sheet-like member upper surface, the indicia being operative to indicate a patient's identity and personal information; removing the release liner from the sheet-like member adhesive lower surface; placing the adhesive lower surface of the sheet-like member on an object to associate the object with the patient's identity and personal information; and removing one of the sheet-like member segments from the object, thereby rendering the indicia printed on the sheet-like member upper surface illegible. In an alternative embodiment, the step of providing a destructible label may include providing a destructible label further including a second sheet-like member having an upper surface and an adhesive lower surface, the upper surface releasably contacting the first sheet-like member adhesive lower surface, and a removable release liner contacting said second sheet-like member adhesive lower surface. The method may then also include the steps of: printing indicia on the first sheet-like member upper surface, the indicia operative to indicate a patient's identity and personal information; removing the release liner from the second sheet-like member adhesive lower surface; placing the adhesive lower surface of the second sheet-like member on an object to associate the object with the patient's identity and personal information; and removing one of the first sheet-like member segments from the second sheet-like member, thereby rendering the indicia printed on the first sheet-like member upper surface illegible. These and other features and advantages of the invention will be more fully understood from the following description of certain specific embodiments of the invention taken together with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS In the drawings: FIG. 1 is an exploded perspective view of a destructible privacy label according to the present invention; FIG. 2 is a sectional elevational view of the destructible privacy label of FIG. 1; FIG. 3 is an exploded perspective view of an alternative embodiment of a destructible label according to the present invention; FIG. 4 is a sectional elevational view of the embodiment of FIG. 3; FIG. 5A is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5B is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5C is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5D is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5E is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5F is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 5G is plan view of an alternative embodiment of a destructible label according to the present invention; FIG. 6 is an environmental view of a destructible privacy label in accordance with the present invention attached to a medical object; and FIG. 7 is the environmental view of the destructible label of FIG. 6 after a segment of the sheet-like member has been removed. DETAILED DESCRIPTION OF THE INVENTION Referring now to the drawings in detail, numeral 10 generally indicates a destructible privacy label for easily destroying patient identity and personal information indicia printed on a surface of the label prior to disposal of a medical object to which the label is attached. As illustrated in FIGS. 1 and 2, a destructible privacy label 10 includes a sheet-like member 12 having an upper surface 14 and an adhesive lower surface 16. The upper surface 14 is adapted for printing indicia 18 thereon. Indicia 18 may include a patient name, a patient social security number, a bar code, pharmaceutical drug names, as well as other patient information, words, symbols or alphanumeric text. The indicia 18 preferably may be printed by human or mechanical means. The sheet-like member includes two segments 20, 22 conjoined about a separation line 24 that defines adjacent segment edges 26, 28. The separation line 24 has a curvilinear shape. Each segment 20, 22 is separable from the other along the separation line 24. Removing one of the segments from the other renders indicia 18 printed on the sheet-like member upper surface illegible. Optionally, the separation line 24 may be a cut line. The separation line 24 may also be sinusoidal and extend from one edge of the sheet-like member to another edge of the sheet-like member. One of the segments 20, 22 of the sheet-like member may have a permanent adhesive on the adhesive lower surface 16. The destructible label 10 may also include a removable release liner 30 contacting the sheet-like member adhesive lower surface 16. The surface 32 of the release liner 30 contacting the sheet-like member adhesive lower surface may be siliconized. Referring now to FIGS. 3 and 4, in an alternative embodiment the destructible label 10 may further include a second sheet-like member 34 having an upper surface 36 and an adhesive lower surface 38. The upper surface 36 releasably contacts the first sheet-like member adhesive lower surface 16. The upper surface 36 of the second sheet-like member 34 may be siliconized. The second sheet-like member 34 provides support for the segments 20, 22 of the first sheet-like member 12. A removable release liner 30 may contact the second sheet-like member adhesive lower surface. The surface 32 of the release liner 30 contacting the second sheet-like member adhesive lower surface may be siliconized. FIGS. 5A through 5G illustrate other alternative embodiments of a destructible privacy label 10. In these embodiments, the destructible privacy label 10 includes a sheet-like member 12 having an upper surface 14 and an adhesive lower surface 16. The upper surface 14 is adapted for printing indicia 18 thereon. The sheet-like member 12 includes a plurality of remainder segments 40 and at least one removable segment 42 that is separable from the remainder segments. Removing the removable segment 42 from the remainder segments 40 renders indicia 18 printed on the sheet-like member upper surface illegible. The remainder segments 40 of the sheet-like member may have a permanent adhesive on the adhesive lower surface 16. The destructible label 10 may further include a second sheet-like member 34 having an upper surface 36 and an adhesive lower surface 38. The second sheet-like member upper surface 36 releasably contacts the first sheet-like member adhesive lower surface 16. A removable release liner 30 may contact the second sheet-like member adhesive lower surface 38. The remainder segments 40 may be of any size two-dimensional geometrical shape such as circles, squares, diamonds, octagons, dagger shapes, saw tooth shapes, and island shapes. It is only necessary that the remainder segments 40 be of such a size, shape, and location relative to each other that removal of the removable segment 42 causes indicia 18 printed on the sheet-like member upper surface 14 incomplete and therefore, illegible. FIG. 5A depicts remainder segments 40 that are circles. FIG. 5B depicts remainder segments 40 that are squares. FIG. 5C depicts remainder segments 40 that are diamonds. FIG. 5D depicts remainder segments 40 that are octagons. FIG. 5E depicts remainder segments 40 that are dagger shapes. FIG. 5F depicts remainder segments 40 that are saw tooth shapes. FIG. 5G depicts remainder segments 40 that are island shapes. Referring now to FIGS. 1 through 4 and FIGS. 6 and 7, indicia 18 may be printed on the upper surface 14 of the sheet-like member 12. The removable release liner 30, if present, may then be removed from the sheet-like member adhesive lower surface 16. The adhesive lower surface 16 may then be placed on an object 44 such as a medical IV bag, a medical record sheet, a medical container, a medical instrument, a medical device, or other similarly related object. Placing the destructible label 10 on the object 44 associates the object with a patient's identity and personal information represented by the indicia 18 on the sheet-like member upper surface 14. At such time that the association between the indicia 18 and the object 44 is no longer needed, or prior to disposal of the object 44, or after the elapsing of any other period of time, one of the segments 20 may be removed from the other segment 22 and from the object 44. Removing the segment 20 thereby renders the indicia 18 printed on the sheet-like member upper surface 14 illegible. This effectively protects the privacy of the patient's identity and personal information represented by the indicia 18. If the destructible label 10 includes a second sheet-like member 34, then after indicia 18 is printed on the first sheet-like member upper surface 14, the adhesive lower surface 38 of the second sheet-like member 34 is placed on an object 44. Further, if a removable release liner 30 is contacting the second sheet-member adhesive lower surface 38, then the release liner 30 must be removed from the second sheet-like member 34 prior to placing the destructible label 10 on the object 44. Removing one of the first sheet-like member segments 20 from the other segment 22 and from the second sheet-like member 34 renders the indicia 18 printed on the first sheet-like member upper surface 14 illegible. Although the invention has been described by reference to specific embodiments, it should be understood that numerous changes may be made within the spirit and scope of the inventive concepts described. Accordingly, it is intended that the invention not be limited to the described embodiments, but that it have the full scope defined by the language of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Health care providers commonly label medical objects such as charts, medical devices, and medication containers associated with a particular patient to ensure that the patient receives their intended medical care. However, the Health Insurance Portability and Accountability Act (HIPAA) requires health care providers to hide a patient's identity before disposing of any medical objects associated with the patient. Patient identification is commonly accomplished by attaching a one-piece label having an adhesive lower surface adapted to adhere to a medical object and an upper surface for displaying indicia such as a patient's name, social security number, or a barcode. At the conclusion of a medical treatment, i.e. when a labeled medical container such as an intravenous (IV) bag is emptied, the label must be adequately destroyed to make the indicia printed thereon illegible. This requires a health care provider to tear away or adequately cross out the indicia printed on the label to protect a patient's identity before disposing of the medical object.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention provides a destructible privacy label for use with patient labeled medical objects such as medical records, medication containers, and medical supplies. The destructible privacy label is easily destroyable prior to disposal of the associated object thus rendering patient identifying indicia on the label illegible. The destructible privacy label aids a health care provider by allowing the provider to easily destroy the indicia displayed on the sheet-like member by removing one of the segments. A destructible privacy label in accordance with the present invention includes a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes two segments conjoined about a separation line that defines adjacent segment edges and the separation line has a curvilinear shape. Each segment is separable from the other along the separation line. Removing one of the segments of the sheet-like member from the other renders indicia printed on the sheet-like member upper surface illegible. In a preferred embodiment, the separation line may be sinusoidal and extends from one edge of the sheet-like member to another edge of the sheet-like member. The separation line may also be a cut line. Optionally, the destructible privacy label may include a removable release liner contacting the sheet-like member adhesive lower surface. This preserves the adhesive on the sheet-like member prior to use of the label. The surface of the release liner contacting the sheet-like member adhesive lower surface may be siliconized. One segment of the sheet-like member may also have a permanent adhesive on the adhesive lower surface. Alternatively, the destructible privacy label may further include a second sheet-like member having an upper surface and an adhesive lower surface, wherein the upper surface releasably contacts the first sheet-like member adhesive lower surface. The upper surface of the second sheet-like member may be siliconized and a removable release liner may contact the second sheet-like member adhesive lower surface. The surface of the release liner contacting the second sheet-like member adhesive lower surface may also be siliconized. The second sheet-like member provides a mounting surface between the first sheet-like member and an associated medical object so that one of the segments may be easily removed to destroy the first sheet-like member to render indicia printed thereon illegible. In an alternative embodiment, a destructible privacy label includes a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes a plurality of remainder segments and at least one removable segment that is separable from the remainder segments. Removing the removable segment from the remainder segments renders indicia printed on the sheet-like member upper surface illegible. Optionally, at least one of the remainder segments may have a two-dimensional shape chosen from a group of circles, squares, diamonds, octagons, dagger shapes, saw tooth shapes, and island shapes. At least one remainder segment of the sheet-like member may also have a permanent adhesive on the adhesive lower surface. Alternatively, the destructible privacy label may further include a second sheet-like member having an upper surface and an adhesive lower surface, wherein the upper surface releasably contacts the first sheet-like member adhesive lower surface. A removable release liner may contact the second sheet-like member adhesive lower surface. A method of protecting the privacy of a patient's identity and personal information in a healthcare setting includes the step of providing a destructible privacy label including a sheet-like member having an upper surface and an adhesive lower surface. The upper surface is adapted for printing indicia thereon. The sheet-like member includes two segments conjoined about a separation line which defines adjacent segment edges and has a curvilinear shape. Each segment is separable from the other along the separation line. In a preferred embodiment, the step of providing a destructible label may include providing a destructible label further including a removable release liner contacting the sheet-like member adhesive lower surface. The method may also include the steps of: printing indicia on the sheet-like member upper surface, the indicia being operative to indicate a patient's identity and personal information; removing the release liner from the sheet-like member adhesive lower surface; placing the adhesive lower surface of the sheet-like member on an object to associate the object with the patient's identity and personal information; and removing one of the sheet-like member segments from the object, thereby rendering the indicia printed on the sheet-like member upper surface illegible. In an alternative embodiment, the step of providing a destructible label may include providing a destructible label further including a second sheet-like member having an upper surface and an adhesive lower surface, the upper surface releasably contacting the first sheet-like member adhesive lower surface, and a removable release liner contacting said second sheet-like member adhesive lower surface. The method may then also include the steps of: printing indicia on the first sheet-like member upper surface, the indicia operative to indicate a patient's identity and personal information; removing the release liner from the second sheet-like member adhesive lower surface; placing the adhesive lower surface of the second sheet-like member on an object to associate the object with the patient's identity and personal information; and removing one of the first sheet-like member segments from the second sheet-like member, thereby rendering the indicia printed on the first sheet-like member upper surface illegible. These and other features and advantages of the invention will be more fully understood from the following description of certain specific embodiments of the invention taken together with the accompanying drawings.
20040308
20070123
20050908
96225.0
3
AHMAD, NASSER
DESTRUCTIBLE PRIVACY LABEL
UNDISCOUNTED
0
ACCEPTED
2,004
10,796,204
ACCEPTED
Integrated air conditioner having condenser casing
An integrated air conditioner, including a condenser casing to house a condenser and a condenser fan therein, the condenser casing including a front plate, an upper cover extending from an upper edge of the front plate, and a plurality of hinges integrally provided between the front plate and the upper cover, spaced apart from at regular intervals, wherein the upper cover rotates around the hinges be perpendicular to the front plate.
1. An integrated air conditioner, comprising: a condenser casing to house a condenser and a condenser fan therein, the condenser casing comprising: a front plate, an upper cover extending from an upper edge of the front plate, and a plurality of hinges integrally provided between the front plate and the upper cover, spaced apart at regular intervals, wherein the upper cover rotates around the hinges, to be perpendicular to the front plate. 2. The integrated air conditioner according to claim 1, wherein the condenser fan is provided under the upper cover, and the hinges are positioned in front of the condenser fan, so that the condenser fan is operated at a position which is offset from the hinges. 3. The integrated air conditioner according to claim 1, wherein the upper cover comprises: a step portion provided along a middle portion of the upper cover; a front portion provided in front of the step portion, the front portion being lower than the step portion; a rear portion provided in back of the step portion, the rear portion being higher than the step portion; wherein the step portion, the front portion, and the rear portion are formed as a single structure, and the condenser fan is provided under the rear portion of the upper cover to allow a gap between the condenser fan and the upper cover. 4. The integrated air conditioner according to claim 1, further comprising a hook projected from an inner surface of the upper cover at a rear edge of the upper cover, to lock the upper cover to the condenser. 5. The integrated air conditioner according to claim 4, wherein the condenser comprises a refrigerant pipe, and the hook is provided with an arc-shaped groove corresponding to a shape of the refrigerant pipe so as to fit over the refrigerant pipe. 6. The integrated air conditioner according to claim 4, further comprising a screw hole at a rear portion of the upper cover to couple the upper cover to an upper end of the condenser. 7. The integrated air conditioner according to claim 3, further comprising at least one rim provided along the rear portion of the upper cover, to increase a structural strength of the upper cover. 8. The integrated air conditioner according to claim 3, further comprising a plurality of ribs provided along the step portion at regular intervals to increase the structural strength around the step portion. 9. The integrated air conditioner according to claim 1, further comprising an opening in the front plate so that the condenser fan may be set in the condenser casing through the opening. 10. The integrated air conditioner according to claim 1, further comprising a recess part at a side of the front plate, to receive an extended portion of the condenser. 11. The integrated air conditioner according to claim 1, further comprising a cover part at a side of the front plate, to cover a side of the condenser, preventing air from escaping around the condenser. 12. An integrated air conditioner, comprising: a condenser casing to house a condenser and a condenser fan therein, the condenser casing comprising: a front plate, an upper cover extending from an upper edge of the front plate, a step portion provided along a middle portion of the upper cover, and a plurality of hinges integrally provided between the front plate and the upper cover, spaced apart at regular intervals, wherein the upper cover is rotated around the hinges to be perpendicular to the front plate, and the condenser fan is provided under the upper cover at a position behind the step portion so that the condenser fan is offset from the hinges and a gap is provided between the upper cover and the condenser fan. 13. A condenser casing for a condenser and a condenser fan in an integrated air conditioner, comprising: an upper cover coupled to the condenser casing by at least one hinge; wherein the upper cover rotates to be coupled to the condenser and cover the condenser and the condenser fan. 14. A condenser casing for a condenser and a condenser fan in an integrated air conditioner, comprising: an upper cover coupled to the condenser casing by at least one hinge; and a step portion provided at a predetermined position of the upper cover; wherein a part of the upper cover raised by the step portion covers the condenser fan so that a gap is provided between the condenser fan and the upper cover.
CROSS-REFERENCE TO RELATED APPLICATIONS This application claims the benefit of Korean Patent Application No. 2003-57454, filed Aug. 20, 2003 in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates, in general, to integrated air conditioners, and, more particularly, to an integrated air conditioner having a condenser casing which prevents noise from being generated, and prevents a condenser fan from being damaged or broken, due to contact between the condenser casing and the condenser fan. 2. Description of the Related Art Typically, air conditioners are classified into two types, the two types being integrated air conditioners and separate-type air conditioners. In the integrated air conditioners, an evaporator, a condenser, and a compressor are installed in a cabinet. On the other hand, in the separate-type air conditioners, the evaporator is installed in an indoor unit, which is placed in a room, while the condenser and the compressor are installed in an outdoor unit, which is placed outside the room. The cabinet of the integrated air conditioner is partitioned into a first interior chamber, which is placed in the room, and a second interior chamber, which is placed outside the room, by a partition which is vertically arranged in the cabinet. In this case, the evaporator is placed in the first interior chamber, while the condenser and the compressor are placed in the second interior chamber. Further, a cooling fan is placed in the first interior chamber to draw the indoor air into the cabinet and pass the indoor air through the evaporator to be cooled prior to discharging the cool air to the room. A condenser fan is placed in the second interior chamber to draw outdoor air into the cabinet and pass the outdoor air through both the condenser and the compressor prior to discharging the air to the outside, thus cooling the condenser and the compressor. A condenser casing, which houses the condenser fan and the condenser therein, is also placed inside the second interior chamber. The condenser casing functions to guide air from the condenser fan through the condenser to the outside so that the condenser is effectively cooled. A conventional condenser casing includes a front plate, two side plates, and an upper cover. The front plate, the two side plates, and the upper cover are integrally formed as a single structure to receive the condenser fan and the condenser in the condenser casing. The upper cover has a thin folding line part at a position which is spaced apart from the front plate by a predetermined distance. The upper cover is bent along the folding line part so that the condenser is installed under the upper cover having a predetermined length. When the condenser casing having the front plate, the side plates, and the upper cover is prepared, a bending part of the upper cover, corresponding to a rear portion of the folding line part, stands upright to define an opening at a rear section of the upper cover between the two side plates in such a state, the condenser fan and the condenser are installed into the condenser casing, through the defined opening, between the two side plates. Thereafter, the bending part is bent downward and rearward until the bending part is placed horizontally, on a plane with the rest of the upper cover, and a rear end of the bending part is held on an upper surface of the condenser. However, in the conventional condenser casing, the folding line part of the upper cover is continuously formed from a first side edge to a second side edge of the upper cover, and the condenser fan is installed under the folding line part. Thus, when the bending part of the upper cover is bent horizontally, and the rear end of the bending part is held on the condenser, after the condenser fan and the condenser are installed into the condenser casing through the opening defined between the two side plates, a residual stress in the structure of the upper cover may be generated and remain in the folding line part. Therefore, a portion around the folding line part is apt to sag. Due to the sagging of the folding line part of the upper cover, the portion around the folding line part may come into contact with the condenser fan. When the condenser fan is rotated in such a state, noise is generated due to the contact between the condenser fan and the portion around the folding line part which sags. Cracks may also be generated in the condenser fan, resulting in damage or breakage of the condenser fan. SUMMARY OF THE INVENTION Accordingly, it is an aspect of the present invention to provide an integrated air conditioner having a condenser casing which prevents noise from being generated, and prevents a condenser fan from being damaged or broken, due to contact between the condenser casing and the condenser fan. Additional aspects and/or advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention. The above and/or other aspects are achieved by an integrated air conditioner having a condenser casing which houses a condenser and a condenser fan therein, and includes a front plate, an upper cover, and a plurality of hinges. The upper cover extends from an upper edge of the front plate. The hinges are integrally provided between the front plate and the upper cover, spaced apart at regular intervals. The upper cover rotates around the hinges to be perpendicular to the front plate. The hinges may be positioned in front of the condenser fan, which is provided under the upper cover, so that the condenser fan is operated at a position which is offset from the hinges. The upper cover may include a step portion, a front portion, and a rear portion. The step portion may be provided along a middle portion of the upper cover. The front portion may be provided in front of the step portion, so as to be lower than the step portion. The rear portion may be provided in back of the step portion, so as to be higher than the step portion. The step portion, the front portion, and the rear portion may be formed as a single structure, and the condenser fan may be provided under the rear portion of the upper cover to allow a gap between the condenser fan and the upper cover. A hook may project from an inner surface of the upper cover at a rear edge of the upper cover to lock the upper cover to the condenser. The condenser may comprise a refrigerant pipe, and the hook may be provided with an arc-shaped groove corresponding to a shape of the refrigerant pipe so as to fit over the refrigerant pipe. Further, a screw hole may be formed at a rear portion of the upper cover to couple the upper cover to an upper end of the condenser. At least one rim may be provided along the rear portion of the upper cover to increase a structural strength of the upper cover. BRIEF DESCRIPTION OF THE DRAWINGS These and/or other aspects and advantages of the invention will become apparent and more readily appreciated from the following description of an embodiment, of the present invention taken in conjunction with the accompanying drawings of which: FIG. 1 is an exploded perspective view of an integrated air conditioner having a condenser casing, according to an embodiment of the present invention; FIG. 2 is a perspective view of a condenser and the condenser casing included in the integrated air conditioner of FIG. 1, prior to being assembled; FIG. 3 is a perspective view of the condenser assembled with the condenser casing of FIG. 2; and FIG. 4 is a sectional view of the condenser and a condenser fan which are installed in the condenser casing of FIG. 3. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to an embodiment of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout. The embodiment is described below to explain the present invention by referring to the figures. FIG. 1 is an exploded perspective view of an integrated air conditioner having a condenser casing, according to an embodiment of the present invention. As shown in FIG. 1, the integrated air conditioner includes a cabinet 1 which is box-shaped and defines an external appearance of the integrated air conditioner. The cabinet 1, which includes a cover and a base panel, is typically installed on a wall of a building so that a front portion is projected into a room and a rear portion thereof extends outside of the building. An evaporator 11, a cooling fan 12, a compressor 13, a condenser 14, and a condenser fan 15 are installed in the cabinet 1. The evaporator 11 and the cooling fan 12 function to cool indoor air. A refrigerant, which circulates through a refrigerant pipe forming a closed refrigeration circuit to execute a phase change, is compressed in the compressor 13. The condenser 14 and the condenser fan 15 function to condense the gas refrigerant fed from the compressor 13. The cabinet 1 is partitioned into a first interior chamber 3, which is placed in the room, and a second interior chamber 4, which is placed outside the room, by a partition 2 which is vertically arranged in the cabinet 1. In this case, the evaporator 11 and the cooling fan 12 are placed in the first interior chamber 3, while the compressor 13, the condenser 14, and the condenser fan 15 are placed in the second interior chamber 4. The cooling fan 12 of the first interior chamber 3 and the condenser fan 15 of the second interior chamber 4 are mounted to output shafts provided at both ends of a drive motor 16 which is placed in the second interior chamber 4, so that the cooling fan 12 and the condenser fan 15 are simultaneously operated. The cooling fan 12 is set in a fan casing 5 which is mounted to a front of the partition 2. The evaporator 11 is mounted to a front of an evaporator frame 6 which is placed in front of the fan casing 5. A motor frame 7 is mounted to a back of the partition 2 to fix the drive motor 16. A condenser casing 20 is provided in back of the motor frame 7 to house the condenser 14 and the condenser fan 15 therein. A front panel 8, which has an inlet port and an outlet port, is mounted to a front of the cabinet 1. A filter 9 is placed between the front panel 8 and the evaporator 11 to filter room air which flows into the cabinet 1 through the front panel 8. Further, a rear panel (not shown) is mounted to a rear end of the cabinet 1, and has an outlet port to discharge outdoor air from the second interior chamber 4 to the outside of the cabinet 1. Inlet ports 17 are provided on an upper surface and both side surfaces at a rear portion of the cabinet 1 so that the outdoor air flows into the second interior chamber 4 through the inlet ports 17, and is discharged to the outside of the cabinet 1 through the outlet port of the rear panel. In the integrated air conditioner constructed as described above, when the compressor 13 and the drive motor 16 are operated to rotate the cooling fan 12, indoor air flows into the first interior chamber 3 through the inlet port of the front panel 8, passes through the evaporator 11 to become cold air, and is then discharged to the room through the outlet port of the front panel 8, thus lowering the room's temperature. Simultaneously, by an operation of the condenser fan 15, outdoor air flows into the second interior chamber 4 through the inlet ports 17 to cool the compressor 13 and the condenser 14. Subsequently, the outdoor air is discharged to the outside through the outlet port of the rear panel (not shown). Through such an operation, the room maintains a preset temperature. The assembly of the condenser casing 20 according to an embodiment of the present invention will now be described in detail with reference to FIGS. 2 to 4. FIG. 2 is a perspective view of the condenser 14 and the condenser casing 20 included in the integrated air conditioner of FIG. 1, prior to being assembled. FIG. 3 is a perspective view of the condenser 14 assembled with the condenser casing 20 of FIG. 2. FIG. 4 is a sectional view of the condenser 14 and the condenser fan 15 which are installed in the condenser casing 20 of FIG. 3. As shown in FIG. 2, the condenser casing 20 includes a front plate 21, and an upper cover 22 which upwardly extends from the front plate 21. In this case, the front plate 21 and the upper cover 22 are integrally formed as a single structure. The front plate 21 has an opening 23 at a center thereof so that the condenser fan 15 may be set in the condenser casing 20 through the opening 23. Further, outdoor air flows through the inlet ports 17 of the cabinet 1 and the opening 23 to the condenser fan 15 which is set in the condenser casing 20. As shown in FIG. 2, the front plate 21 has a recess part 24 at a left side thereof to receive a left end of the condenser 14, which is bent forward. At a right side of the front plate 21 is provided a cover part 25 to cover a right side of the condenser 14, thus preventing air from escaping from the right side of the condenser 14. The upper cover 22 covers an upper end of the condenser 14 to allow air blown by the condenser fan 15 to efficiently pass through the condenser 14. The upper cover 22 has a step portion 26, a front portion 27, and a rear portion 28. The step portion 26 is provided along a middle portion of the upper cover 22 to be inclined upwardly, thus stepping the upper cover 22. The front portion 27 is provided in front of the step portion 26, and is lower than the step portion 26. The rear portion 28 is provided in back of the step portion 26, and is higher than the step portion 26. Further, a plurality of ribs 29 are arranged along the step portion 26 at regular intervals, to increase the structural strength of a part around the step portion 26, thus preventing the part around the step portion 26 from being deformed. The step portion 26 extends horizontally and continuously along a rear edge and a left side edge of the upper cover 22, from a right side edge of the upper cover 22, while being spaced apart from the rear and left side edges. Thus, a left side part of the upper cover 22 and the rear portion 28 of the upper cover 22 form a same plane. A plurality of rims 30 extend along the rear and left edge of the upper cover 22, thus allowing the rear portion 28 to have more structural strength, and thereby preventing the rear portion 28 from being easily deformed. Further, a hook 31 is downwardly projected from an inner surface of the left side of the rear portion 28, and a screw hole 32 is formed at a right side end of the rear portion 28, to mount the upper cover 22 to an upper portion of the condenser 14. The front plate 21 and the upper cover 22, constructed as described above, are coupled to each other by a plurality of hinges 33, which are provided between the front plate 21 and the upper cover 22. The hinges 33 are placed along a horizontal direction between an upper edge of the front plate 21 and a front edge of the upper cover 22. The hinges 33 are placed so as to be spaced apart from each other at regular intervals. Thus, long and narrow slits 34 are defined among the hinges 33. Since the plurality of hinges 33 are spaced apart from each other by the plurality of slits 34 which are formed among the hinges 33, a residual stress is not generated in the hinges 33, even when the upper cover 22 is folded backward to be perpendicular to the front plate 21. Therefore, the front portion 27 of the upper cover 22 is not deformed. An upper bracket 35 and a lower bracket 36 are respectively provided on upper and lower portions of a front surface of the front plate 21 so that the condenser casing 20 is mounted at upper and lower portions thereof to the motor frame 7 and the base panel (see, FIG. 1) of the cabinet 1, respectively. Each of the upper and lower brackets 35 and 36 has a screw hole 37. Thus, the front plate 21 is integrated with the upper cover 22 to form the condenser casing 20. The condenser casing 20, having the single structure described above, is placed on the base panel of the cabinet 1, and screws are respectively tightened into the screw holes 37 of the upper and lower brackets 35 and 36. At this time, the upper cover 22 extends upwardly from the front plate 21. During the assembling of the condenser casing 20, the condenser fan 15 may be mounted to the drive motor 16 before the condenser casing 20 is installed on the base panel of the cabinet 1. In this case, the condenser fan 15 is placed in the condenser casing 20 through the opening 23 of the front plate 21, so that the front plate 21 is arranged in front of the condenser fan 15. Of course, the condenser fan 15 may also be mounted to the drive motor 16 after the condenser casing 20 is screwed to the motor frame 7 and the base panel of the cabinet 1. In such a state, the condenser 14, which has a plurality of heat transfer fins 14a and a refrigerant pipe 14b, is placed in back of the front plate 21, and a lower end of the condenser 14 is mounted to the base panel of the cabinet 1. Thereafter, the rear portion 28 of the upper cover 22 is pushed backward. At this time, the upper cover 22 is folded backward, relative to the front plate 21, around the hinges 33, so that that the upper cover 22 is perpendicular to the front plate 21, which stands upright on the base panel of the cabinet 1. Subsequently, when the upper cover 22 is locked to the condenser 14 using the hook 31, which is provided at a position around the rear edge of the upper cover 22, a semi-circular hook groove 31a (see, FIG. 4) of the hook 31 is fitted over the refrigerant pipe 14b of the condenser 14. Next, a screw 38 is tightened into both the screw hole 32 which is provided on the rear portion of the upper cover 22, and a screw hole 14c which is provided on an upper corner of a right side end of the condenser 14. Thus, as shown in FIG. 3, the assembly of the condenser casing 20, which houses the condenser fan 15 and the condenser 14 therein, is completed. Thereafter, the cover of the cabinet 1 is mounted on the base panel on which the condenser casing 20 is supported. As shown in FIG. 3, since the condenser 14 is installed in the condenser casing 20, the upper cover 22 covers the upper portion of the condenser 14. Further, the recess part 24 of the front plate 21 covers the left side of the condenser 14 which is bent forward, while the cover part 25 of the front plate 21 covers the right side of the condenser 14. Such a design allows air to efficiently circulate through the condenser 14 by the condenser fan 15, which is placed in front of the condenser 14, as shown in FIG. 4. Therefore, the refrigerant flowing through the refrigerant pipe 14b of the condenser 14 is efficiently condensed. As shown in FIG. 4, the condenser fan 15 is provided in the condenser casing 20 under the rear portion 28 of the upper cover 22 at a position which is offset from the hinges 33, thus defining a sufficient gap between the upper end of the condenser fan 15 and the upper cover 22. Therefore, although the front end of the upper cover 22 may be undesirably bent downward or deformed when the condenser casing 20 is manufactured or assembled, or is used for lengthy periods, the condenser fan 15 does not contact the upper cover 22. As is apparent from the above description, the present invention provides an integrated air conditioner having a condenser casing which is designed such that a front plate of the condenser casing is coupled to an upper cover, so as to be perpendicular to the upper cover, by a plurality of hinges which are spaced apart from each other at regular intervals. Therefore, a residual stress is not generated in a part of the upper cover around the hinges when the upper cover is bent around the hinges, thus preventing the part of the upper cover around the hinges from being deformed so that the upper cover does not come into contact with the condenser fan. The condenser fan is thus prevented from being damaged, in addition to preventing generation of noise. Further, the present invention provides an integrated air conditioner having a condenser casing, which is designed such that the plurality of hinges are placed in front of the condenser fan, and a step portion is provided at a predetermined position of the upper cover to be inclined upwardly, thus defining a sufficient gap between the condenser fan and the upper cover. Therefore, although the upper cover may be undesirably deformed due to continued usage, the condenser fan does not come into contact with the upper cover, thus allowing the condenser fan to be semi-permanently and reliably operated without being damaged. Further, in an integrated air conditioner having the condenser casing of the present invention, the upper cover of the condenser casing has more structural strength and is easily mounted to an upper portion of the condenser, thus allowing for rapid assembly. The upper cover is rarely deformed even in the case of continued usage. Although an embodiment of the present invention has been shown and described, it would be appreciated by those skilled in the art that changes may be made in this embodiment without departing from the principles and spirit of the invention, the scope of which is defined in the claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates, in general, to integrated air conditioners, and, more particularly, to an integrated air conditioner having a condenser casing which prevents noise from being generated, and prevents a condenser fan from being damaged or broken, due to contact between the condenser casing and the condenser fan. 2. Description of the Related Art Typically, air conditioners are classified into two types, the two types being integrated air conditioners and separate-type air conditioners. In the integrated air conditioners, an evaporator, a condenser, and a compressor are installed in a cabinet. On the other hand, in the separate-type air conditioners, the evaporator is installed in an indoor unit, which is placed in a room, while the condenser and the compressor are installed in an outdoor unit, which is placed outside the room. The cabinet of the integrated air conditioner is partitioned into a first interior chamber, which is placed in the room, and a second interior chamber, which is placed outside the room, by a partition which is vertically arranged in the cabinet. In this case, the evaporator is placed in the first interior chamber, while the condenser and the compressor are placed in the second interior chamber. Further, a cooling fan is placed in the first interior chamber to draw the indoor air into the cabinet and pass the indoor air through the evaporator to be cooled prior to discharging the cool air to the room. A condenser fan is placed in the second interior chamber to draw outdoor air into the cabinet and pass the outdoor air through both the condenser and the compressor prior to discharging the air to the outside, thus cooling the condenser and the compressor. A condenser casing, which houses the condenser fan and the condenser therein, is also placed inside the second interior chamber. The condenser casing functions to guide air from the condenser fan through the condenser to the outside so that the condenser is effectively cooled. A conventional condenser casing includes a front plate, two side plates, and an upper cover. The front plate, the two side plates, and the upper cover are integrally formed as a single structure to receive the condenser fan and the condenser in the condenser casing. The upper cover has a thin folding line part at a position which is spaced apart from the front plate by a predetermined distance. The upper cover is bent along the folding line part so that the condenser is installed under the upper cover having a predetermined length. When the condenser casing having the front plate, the side plates, and the upper cover is prepared, a bending part of the upper cover, corresponding to a rear portion of the folding line part, stands upright to define an opening at a rear section of the upper cover between the two side plates in such a state, the condenser fan and the condenser are installed into the condenser casing, through the defined opening, between the two side plates. Thereafter, the bending part is bent downward and rearward until the bending part is placed horizontally, on a plane with the rest of the upper cover, and a rear end of the bending part is held on an upper surface of the condenser. However, in the conventional condenser casing, the folding line part of the upper cover is continuously formed from a first side edge to a second side edge of the upper cover, and the condenser fan is installed under the folding line part. Thus, when the bending part of the upper cover is bent horizontally, and the rear end of the bending part is held on the condenser, after the condenser fan and the condenser are installed into the condenser casing through the opening defined between the two side plates, a residual stress in the structure of the upper cover may be generated and remain in the folding line part. Therefore, a portion around the folding line part is apt to sag. Due to the sagging of the folding line part of the upper cover, the portion around the folding line part may come into contact with the condenser fan. When the condenser fan is rotated in such a state, noise is generated due to the contact between the condenser fan and the portion around the folding line part which sags. Cracks may also be generated in the condenser fan, resulting in damage or breakage of the condenser fan.
<SOH> SUMMARY OF THE INVENTION <EOH>Accordingly, it is an aspect of the present invention to provide an integrated air conditioner having a condenser casing which prevents noise from being generated, and prevents a condenser fan from being damaged or broken, due to contact between the condenser casing and the condenser fan. Additional aspects and/or advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention. The above and/or other aspects are achieved by an integrated air conditioner having a condenser casing which houses a condenser and a condenser fan therein, and includes a front plate, an upper cover, and a plurality of hinges. The upper cover extends from an upper edge of the front plate. The hinges are integrally provided between the front plate and the upper cover, spaced apart at regular intervals. The upper cover rotates around the hinges to be perpendicular to the front plate. The hinges may be positioned in front of the condenser fan, which is provided under the upper cover, so that the condenser fan is operated at a position which is offset from the hinges. The upper cover may include a step portion, a front portion, and a rear portion. The step portion may be provided along a middle portion of the upper cover. The front portion may be provided in front of the step portion, so as to be lower than the step portion. The rear portion may be provided in back of the step portion, so as to be higher than the step portion. The step portion, the front portion, and the rear portion may be formed as a single structure, and the condenser fan may be provided under the rear portion of the upper cover to allow a gap between the condenser fan and the upper cover. A hook may project from an inner surface of the upper cover at a rear edge of the upper cover to lock the upper cover to the condenser. The condenser may comprise a refrigerant pipe, and the hook may be provided with an arc-shaped groove corresponding to a shape of the refrigerant pipe so as to fit over the refrigerant pipe. Further, a screw hole may be formed at a rear portion of the upper cover to couple the upper cover to an upper end of the condenser. At least one rim may be provided along the rear portion of the upper cover to increase a structural strength of the upper cover.
20040310
20070612
20050224
98435.0
0
JONES, MELVIN
INTEGRATED AIR CONDITIONER HAVING CONDENSER CASING
UNDISCOUNTED
0
ACCEPTED
2,004
10,796,238
ACCEPTED
High IV melt phase polyester polymer catalyzed with antimony containing compounds
A melt phase process for making a polyester polymer melt phase product by adding an antimony containing catalyst to the melt phase, polycondensing the melt containing said catalyst in the melt phase until the It.V. of the melt reaches at least 0.75 dL/g. Polyester polymer melt phase pellets containing antimony residues and having an It.V. of at least 0.75 dL/g are obtained without solid state polymerization. The polyester polymer pellets containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product by solid state polymerization are fed to an extruder, melted to produce a molten polyester polymer, and extruded through a die to form shaped articles. The melt phase products and articles made thereby have low b* color and/or high L* brightness, and the reaction time to make the melt phase products is short.
1. A melt phase process for making a polyester polymer melt phase product containing at least 100 ppm antimony based on the weight of the product comprising adding an antimony containing catalyst to the melt phase; polycondensing a melt containing said catalyst in a polycondensation zone; and before the It.V. of the melt reaches 0.45 dL/g, continuously polycondensing the melt in the polycondensation zone at a temperature within a range of 265° C. to 305° C. or at sub-atmospheric pressure or a combination thereof, in each case until the It.V. of the melt reaches at least 0.75 dL/g; wherein the polyester polymer melt phase product has a b* color of −5 to +5. 2. The process of claim 1, wherein said polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 60 mole % of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 60 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product. 3. The process of claim 2, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 60 mole % of the residues of terephthalic acid or derivates of terephthalic acid, based on 100 mole percent of carboxylic acid component residues in the product. 4. The process of claim 3, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid or derivates of terephthalic acid, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product. 5. The process of claim 1, wherein the polycondensation reaction in the polycondensation zone is conducted in the absence of active catalysts containing titanium. 6. The process of claim 5, wherein the melt phase process is conducted in the absence of added catalyst compounds containing titanium. 7. The process of claim 6, wherein the melt phase product contains 180 ppm to 500 ppm antimony. 8. The process of claim 1, wherein said polycondensation reaction is conducted for less than 100 minutes in a finishing zone. 9. The process of claim 8, wherein said polycondensation reaction is conducted for 80 minutes or less in a finishing zone. 10. The process of claim 1, comprising adding a phosphorus containing compound. 11. The process of claim 10, wherein the phosphorous containing compound is added at a molar ratio of P:Sb of at least 0.025:1. 12. The process of claim 1, comprising adding bluing toners to the melt phase. 13. The process of claim 1, wherein said product has an L* of at least 70. 14. The process of claim 13, wherein the L* color of the melt phase product is at least 74, and the b* color is between −5 and +4. 15. The process of claim 1, wherein said polycondensation reaction in the polycondensation zone is conducted at a temperature of 280° C. or more. 16. The process of claim 15, wherein the product has an L* of at least 76 and the b* color is between −5 and +4. 17. A polyester polymer composition comprising a melt phase product made in the melt phase to an It.V. of at least 0.70 dL/g, a bluing toner or residue thereof and/or a red toner or residue thereof, and a reheat additive, wherein the composition has a b* color between −5 to +5 and a L* brightness value of 70 or more. 18. The composition of claim 17, wherein the L* is at least 74. 19. The composition of claim 17, wherein the b* of the is +4 or less. 20. The composition of claim 17, wherein the reheat additive is a black particle. 21. A process for making a polyester polymer melt phase product comprising: a) esterifying or transesterifying a diol and a dicarboxylic acid component comprising dicarboxylic acids, dicarboxylic acid derivatives, and mixtures thereof to produce an oligomeric mixture; b) polycondensing the oligomeric mixture in a polycondensation zone to produce a polyester polymer melt having an It.V. of at least 0.75 dL/g; and c) before the It.V. of the polyester polymer melt reaches 0.45 dL/g, adding an antimony containing catalyst to the oligomeric mixture or the polymer melt or both; and d) optionally adding an antimony catalyst stabilizer to the melt; wherein the polyester polymer melt phase product has a b* color of −5 to +5. 22. The process of claim 21, wherein the polyester polymer melt phase product has an L* of at least 70. 23. The process of claim 21, comprising conducting said polycondensation reaction in the polycondensation zone at a temperature ranging from 270° C. to 300° C. throughout the polycondensation reaction commencing no later than when the It.V. of the melt reaches 0.45 dL/g and continuing at least until the It.V. of the melt reaches 0.75 dL/g. 24. The process of claim 21, wherein the reaction time to reach an It.V. of about 0.70 dL/g commencing from an It.V. in the melt of about 0.3 dL/g is 100 minutes or less. 25. The process of claim 21, comprising adding an antimony catalyst stabilizer to the melt. 26. The process of claim 25, comprising adding a phosphorous containing compound as the catalyst stabilizer at a molar ratio of P:Sb of at least 0.025:1. 27. The process of claim 21, further adding to the melt a compound which reduces antimony to a zero oxidation state. 28. The process of claim 21, comprising adding a bluing toner. 29. The process of claim 21, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid or derivates of terephthalic acid, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product. 30. A process for making a polyester polymer melt phase product containing an organic bluing toner comprising adding at least one catalyst compound comprising an antimony containing catalyst to a melt and polymerizing the melt in the presence of said antimony containing catalyst to produce a melt phase polyester polymer having an It.V. of at least 0.75 dL/g, a b* color of −5 to +5, and an L* brightness of at least 70. 31. The process of claim 30, wherein the product further comprises a reheat additive. 32. The process of claim 31, wherein the reheat additive is in combination with antimony reduced to the zero oxidation state in-situ in the melt. 33. The process of claim 30, wherein the product contains more than 4 ppm of a reheat additive. 34. The process of claim 30, wherein the amount of bluing agent added is 4 ppm or more. 35. The process of claim 30, wherein the reaction time from an It.V. of about 0.45 to about 0.7 is about 100 minutes or less. 36. The process of claim 30, wherein the polycondensation reaction time in a finishing zone is about 100 minutes or less. 37. A polyester polymer composition containing antimony residues and substantially free of titanium residues comprising a polyester polymer having a b* color of −5 to +5, and L* of at least 70 CIELAB units, and an It.V. of at least 0.75 dL/g obtained without subjecting the polymer to an increase in its molecular weight through solid state polymerization. 38. The composition of claim 37, wherein the composition further comprises at least 4 ppm of a reheat additive. 39. The composition of claim 37, further comprising a bluing toner. 40. A process for making a polyester polymer comprising polycondensing a melt in the presence of an antimony-containing catalyst to produce a melt phase product, wherein the reaction time of the melt between an It.V. of 0.45 dL/g to and It.V. ranging from 0.70 dL/g to 0.90 dL/g is 100 minutes or less. 41. The process of claim 40, wherein a pressure applied between said range is about 2 mm Hg or less. 42. The process of claim 40, wherein the melt phase product produced by said process has a b* within a range of −5 to +5. 43. The process of claim 40, wherein the polyester polymer has an It.V. of at least 0.75 dL/g. 44. The process of claim 40, wherein the reaction time of the melt between an It.V. of about 0.3 dL/g and an It.V. in the range of 0.70 dL/g to 0.90 dL/g is 100 minutes or less. 45. The process of claim 40, wherein the time is 80 minutes or less. 46. A polyester polymer melt phase product having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g without solid state polymerizing the polymer, said product comprising antimony residues and having a b* color of −5 to +5 and an L* of at least 70. 47. The product of claim 46, wherein the polymer is substantially free of titanium residues. 48. The product of claim 46, wherein the L* is at least 74. 49. The product of claim 46, wherein the degree of crystallinity is at least 30%. 50. The product of claim 46, wherein the It.V. of the melt phase product is at least 0.75 dL/g. 51. A melt phase process for making a polyester polymer melt phase product comprising adding an antimony containing catalyst to the melt phase, polycondensing a melt containing said catalyst in the melt phase until the It.V. of the melt reaches at least 0.75 dL/g. 52. The process of claim 51, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 60 mole % of the residues of terephthalic acid or derivates of terephthalic acid, based on 100 mole percent of carboxylic acid component residues in the product. 53. The process of claim 51, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid or derivates of terephthalic acid, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product. 54. The process of claim 51, wherein the polycondensation reaction in the polycondensation zone is conducted in the absence of active catalysts containing titanium. 55. The process of claim 51, wherein the melt phase process is conducted in the absence of added catalyst compounds containing titanium. 56. The process of claim 55, wherein the melt phase product contains 180 ppm to 500 ppm antimony. 57. The process of claim 51, wherein said polycondensation reaction is conducted for less than 100 minutes in a finishing zone. 58. The process of claim 57, wherein said polycondensation reaction is conducted for 80 minutes or less in a finishing zone. 59. The process of claim 51, comprising adding a phosphorus containing compound. 60. The process of claim 59, wherein the phosphorous containing compound is added at a molar ratio of P:Sb of at least 0.025:1. 61. The process of claim 51, comprising adding bluing toners to the melt phase. 62. The process of claim 51, wherein said product has an L* of at least 70. 63. The process of claim 62, wherein the L* color of the melt phase product is at least 74, and the b* color is between −5 and +4. 64. The process of claim 51, wherein said polycondensation reaction in the polycondensation zone is conducted at a temperature of 280° C. or more. 65. The process of claim 64, wherein the product has an L* of at least 76 and the b* color is between −5 and +4. 66. Polyester polymer melt phase pellets having an It.V. of at least 0.75 dL/g obtained without solid state polymerization and containing antimony residues. 67. The pellets of claim 66, wherein the L* is at least 74. 68. The pellets of claim 66, wherein the b* of the pellets ranges from −5 to +5. 69. The pellets of claim 66, wherein pellets contain a black particle reheat additive. 70. The pellets of claim 66, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 60 mole % of the residues of terephthalic acid or derivates of terephthalic acid, based on 100 mole percent of carboxylic acid component residues in the product. 71. The pellets of claim 66, wherein the polyester polymer melt phase product comprises: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid or derivates of terephthalic acid, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product. 72. A process comprising feeding to an extruder a polyester polymer composition comprising a melt phase product containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product by solid state polymerization, melting the polyester polymer composition to produce a molten polyester polymer, extruding the molten polyester polymer composition through a die to form shaped articles. 73. A process for making polyester polymer articles comprising: e) drying pellets comprising melt phase products having a degree of crystallinity of at least 25% and an It.V. of at least 0.7 dL/g and antimony containing residues in a drying zone at a temperature of at least 140° C.; f) introducing the pellets into an extrusion zone and forming a molten polyester polymer composition; and g) forming an article comprising a sheet, strand, fiber, or a molded part directly or indirectly from the extruded molten polyester polymer; said article having a b* ranging from −5 to +5 and an L* of at least 70. 74. The process of claim 73, wherein the pellets have not been subjected to a solid state polymerization step for increasing their molecular weight. 75. The process of claim 73, wherein the pellets are substantially free of titanium residues. 76. The process of claim 73, wherein the melt phase products comprise (a) a carboxylic acid component comprising at least 60 mole % of the residues of terephthalic acid or derivates of terephthalic acid, based on 100 mole percent of carboxylic acid component residues in the product. 77. The process of claim 73, wherein the polyester polymer melt phase product comprise: (a) a carboxylic acid component comprising at least 92 mole % of the residues of terephthalic acid or derivates of terephthalic acid, and (b) a hydroxyl component comprising at least 92 mole % of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer melt phase product.
FIELD OF THE INVENTION This invention pertains to the manufacture of polyester polymers, and more particularly to the manufacture of high It.V. polyethylene terephthalate polymer and copolymers catalyzed with antimony compounds in the melt phase having good color. BACKGROUND OF THE INVENTION In European patent application 1 188 783 A2 and U.S. Pat. No. 6,559,271, a process for making high IV PET in the melt phase is described. In this patent, high IV PET catalyzed with a titanium based compound is described as providing a good compromise between reactivity and selectivity when a low dosage of titanium metal and a low reaction temperature is chosen to obtain optimal increase in molecular weight and reduce the chance of thermal decomposition. By providing a more thermally stable polymer, the level of acetaldehyde (“AA”) generated in the polymer is reduced. The amount of AA generated by the described process in the base polymer is not stated, but after addition of an excess amount of AA bonding agent, the contemplated amount of AA in the polymer melt is described as ranging from 1 to 10 ppm directly after polycondensation. Recognizing that M bonding additives can cause a stronger or weaker yellowing of the polyester polymer, the patent recommends controlling the color imparted by the AA reducing additives by adding bluing toners to the melt. We have discovered that titanium catalyzed polycondensation reactions impart an unacceptably high yellow color to high It.V. base polyester polymers made in the melt phase as indicated by their high b*, a problem not addressed by U.S. Pat. No. 6,559,271. Adding sufficient amount of bluing toner to overcome the yellow color imparted to the melt by a titanium-catalyzed reaction presents the further problem of having to use higher amounts of bluing toners, which has the potential for reducing the brightness of the polymer and increases the costs for making the polymer composition. In order to reduce the level of AA in the melt phase polymer, the process described in U.S. Pat. No. 6,559,271 operates the melt phase at a reduced temperature and with a reduced titanium catalyst concentration, i.e. low reaction temperature on the order of 270° C. and less than 10 ppm Ti metal as the catalyst concentration. However, by reducing the reaction temperature and catalyst concentration, the reaction time required to attain the same target molecular weight also increases. It would be desirable to implement a solution to make a high It.V. polymer in the melt phase with a better, lower b* (a measure of the yellow hue in the polymer). Moreover, it would also be desirable to retain the same or better, shorter reaction times to a target high It.V. in the melt compared to the reaction time needed to obtain the same target It.V. in titanium-catalyzed reactions with an acceptable b* color. SUMMARY OF THE INVENTION We have found a process for making a high It.V. polyester polymer melt phase product in which the base polymer from the melt phase has acceptable b* color. In the process, a polyester polymer made in the melt phase with high It.V. now has a better, lower b* color relative to titanium catalyzed reaction products at equivalent reaction times. Surprisingly, we have also discovered a process which allows for wide latitude of catalyst concentrations and polycondensation reaction temperatures while simultaneously obtaining a base polyester polymer having lower b* relative to titanium catalyzed melt phase reactions. We have also discovered that in the process of the invention, the time of reaction to obtain a high It.V. target is shorter than in a titanium-catalyzed process at low titanium catalyst dosages and low reaction temperatures, even though titanium based catalysts are known to be highly active. There is now provided a melt phase process for making a polyester polymer melt phase product comprising adding an antimony containing catalyst to the melt phase, polycondensing a melt containing said catalyst in the melt phase until the It.V. of the melt reaches at least 0.75 dL/g. There is also provided polyester polymer melt phase pellets having an It.V. of at least 0.70 dL/g obtained without solid state polymerization and containing antimony residues. There is further provided a process comprising feeding to an extruder a polyester polymer composition comprising a melt phase product containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product by solid state polymerization, melting the polyester polymer composition to produce a molten polyester polymer, extruding the molten polyester polymer composition through a die to form shaped articles. There is also provided a melt phase process for making a polyester polymer melt phase product containing at least 100 ppm antimony based on the weight of the product comprising adding an antimony-containing catalyst to the melt phase; polycondensing a melt containing said catalyst in the melt phase; and before the It.V. of the melt reaches 0.45 dL/g, continuously polycondensing the melt either at a temperature within a range of 265° C. to 305° C. or at sub-atmospheric pressure or a combination thereof, in each case until the It.V. of the melt reaches at least 0.75 dL/g; to produce said polyester polymer melt phase product having a b* color in the range of −5 to +5 (CIELAB units). The color units are always in CIELAB units unless otherwise stated. There is further provided a melt phase process for making a polyester polymer melt phase product comprising polycondensing a melt in the presence of an antimony-containing catalyst to an It.V. of at least 0.75 dL/g, wherein said product has a b* color of −5 to +5, and an L* of at least 70. The melt phase product optionally contains a bluing toner and/or a reheat enhancing aid made in situ, added to the melt, or added after solidifying the melt, or any combination thereof. The bluing toner is preferably an organic toner. In yet another embodiment, there is provided a melt phase process for making a polyester polymer melt phase product comprising: a) esterifying or transesterifying a diol with a a carboxylic acid component comprising dicarboxylic acids, dicarboxylic acid derivatives, and mixtures thereof to produce an oligomeric mixture; b) polycondensing the oligomeric mixture to produce a polyester polymer melt having an It.V. of at least 0.75 dL/g; and c) adding an antimony compound to the melt phase before the It.V. of the polyester polymer melt reaches 0.45 dL/g; and d) optionally adding a stabilizer to the melt phase; wherein the polyester polymer melt phase product has a b* color of −5 to +5. Preferably, polycondensation catalysts added to the polycondensation zone are free of titanium-containing compounds, and in a direct esterification process, the entire melt phase reaction proceeds in the absence of titanium-containing compounds, and most preferably, in an ester exchange route, the entire melt phase reaction also proceeds in the absence of titanium-containing compounds. In yet another embodiment, the only polycondensation catalyst added to the melt phase in a direct esterification process is an antimony containing compound(s). There is also provided a process for making a polyester polymer by melt phase polymerizing a melt in the presence of an antimony-containing catalyst to produce a melt phase product, wherein the reaction time of the melt between an It.V. of 0.45 to an It.V. in the range of 0.70 dL/g to 0.90 dL/g is 100 minutes or less. Preferably, the pressure applied within this range is about 2 mm Hg or less. Moreover, the melt phase product produced by this process has a b* within a range of −5 to +5. There is also provided polyester polymer having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g without solid state polymerizing the polymer, said polymer comprising antimony residues and having a b* color of −5 to +5 and an L* of at least 70. The polymer is desirably substantially free of titanium residues. DETAILED DESCRIPTION OF THE INVENTION The present invention may be understood more readily by reference to the following detailed description of the invention. It must also be noted that, as used in the specification and the appended claims, the singular forms “a,” “an” and “the” include plural referents unless the context clearly dictates otherwise. For example, reference to processing or making a “polymer,” a “preform,” “article,” “container,” or “bottle” is intended to include the processing or making of a plurality of polymers, preforms, articles, containers or bottles. References to a composition containing “an” ingredient or “a” polymer is intended to include other ingredients or other polymers, respectively, in addition to the one named. By “comprising” or “containing” is meant that at least the named compound, element, particle, or method step etc. must be present in the composition or article or method, but does not exclude the presence of other compounds, catalysts, materials, particles, method steps, etc., even if the other such compounds, material, particles, method steps etc. have the same function as what is named, unless expressly excluded in the claims. It is also to be understood that the mention of one or more method steps does not preclude the presence of additional method steps before or after the combined recited steps or intervening method steps between those steps expressly identified. Moreover, the lettering of process steps is a convenient means for identifying discrete activities or steps, and unless otherwise specified, recited process steps can be arranged in any sequence. Expressing a range includes all integers and fractions thereof within the range. Expressing a temperature or a temperature range in a process, or of a reaction mixture, or of a melt or applied to a melt, or of a polymer or applied to a polymer means in all cases that the reaction conditions are set to the specified temperature or any temperature, continuously or intermittently, within the range; and that the reaction mixture, melt or polymer are subjected to the specified temperature. The intrinsic viscosity values described throughout this description are set forth in dL/g units as calculated from the inherent viscosity measured at 25° C. in 60/40 wt/wt phenol/tetrachloroethane according to the calculations immediately prior to Example 1 below. Any compound or element added to the “melt phase” includes the addition of the compound or element as a feed at any point in the process and up to the stage when the melt is solidified, whether or not a melt actually exists at the addition point. Examples of addition points to a melt phase include to an esterification reactor, within a series a esterification reactors, to an oligomeric reaction mixture, before polycondensation and after conclusion of esterification, during prepolymerization, or to the finisher. A “base polyester polymer” is a polyester polymer obtained from the melt phase reaction and is made without the addition of bluing toners, without AA reducing additives, and without stabilizers. The base polyester polymer, however, may be made with additives which reduce a metal catalyst compound to elemental metal. A “melt phase product” is a polyester polymer obtained from a melt phase reaction made with or without the addition of bluing toners and other toners, AA reducing additives, or reheat rate enhancing additives. The polyester polymer melt phase product may also contain stabilizers. The additives and toners may be added neat, in a carrier, or in a concentrate to the melt phase. The melt phase products may be isolated in the form of pellets or chips, or may be fed as a melt directly from the melt phase finishers into extruders and directed into molds for making shaped articles such as bottle preforms (e.g. “melt to mold” or “melt to preform”). Unless otherwise specified, the melt phase product may take any shape or form, including amorphous pellets, crystallized pellets, solid stated pellets, preforms, sheets, bottles, and so forth. The molecular weight of the melt phase products may optionally be increased in the solid state before melt extruding and shaping into an article. A “polyester polymer composition” contains at least melt phase products, may optionally contain other ingredients one desires to add which are not already contained in the melt phase products, and is considered the fully formulated composition which is used to make the shaped articles. For example, the bluing toners, AA reducing additives, or reheat additives, if not already added to the melt phase for making the melt phase product, can be added to a melt phase product as a solid/solid blend or a melt blend, or the additives may be fed together with the melt phase products to an extruder for making shaped articles such that the polyester polymer composition is formed at or in the extruder. The additives and toners may be added neat, in a liquid carrier, or in a solid polyester concentrate. The polyester polymer of this invention is any thermoplastic polyester polymer in any state (e.g. solid or molten), and in any shape, each as the context in which the phrase is used dictates, and includes the composition of matter resulting from the melt phase, or as a solid stated polymer, or the composition of matter in a melt extrusion zone, a bottle preform, or in a stretch blow molded bottle. The polyester polymer may optionally contain additives added to the polyester polymer melt phase product or to the solid stated pellet. The term “melt” in the context of the melt phase reaction is a broad umbrella term referring to a stream undergoing reaction at any point in the melt phase for making a polyester polymer, and includes the stream in the esterification phase even though the viscosity of the stream at this stage is typically not measurable or meaningful, and also includes the stream in the polycondensation phase including the prepolymer and finishing phases, in-between each phase, and up to the point where the melt is solidified, and excludes a polyester polymer undergoing an increase in molecular weight in the solid state. L*, a*, and b* color ranges are described herein and in the appended claims. The L*, a*, or b* color are measured from specimens ground to a powder or made from a disc as explained below. A specimen is considered to be within a specified L* or b* color range in the appended claims if the reported L* or b* value obtained from a specimen measured by any one of these test methods is within the ranges expressed in the appended claims. For example, a b* color value outside a specified b* range as measured by one test method but inside a specified b* range as measured by another test method is deemed to be a polymer within the specified range because it satisfied the specified b* color range by one of the test methods. The polyester polymer composition is not so limited, e.g. the composition may be made with or without bluing toners, reheat additives, other catalysts, or any other additive. When specifying a color value, the polyester polymer composition having the color value does not have to exhibit that value in all of its shapes or forms throughout its production life from the melt phase to its manufacture into a bottle. Unless otherwise stated, a melt phase product or a polyester polymer composition having a specified color value may apply to the polyester polymer composition in the form of a melt, a polyester polymer melt phase product, a bottle preform, and a blown bottle, each of which can be subjected to any one of the test methods specified herein. The impact of the catalysts on the L* color of the melt phase product can be judged using the CIELab color standard L* values. The L* value is a measure of brightness. This value is measured in accordance with ASTM D 6290 for opaque or translucent powders (reflectance mode), and in accordance with ASTM D 1746 for discs (transmission mode). Color measurement theory and practice are discussed in greater detail in “Principles of Color Technology”, pp. 25-66 by John Wiley & Sons, New York (1981) by Fred W. Billmeyer, Jr. Brightness is measured as L* in the CIE 1976 opponent-color scale, with 100% representing a perfect white object reflecting 100% at all wavelengths, or a colorless sample transmitting 100% at all wavelengths. An L* of 100 in a colorless sample in the transmittance mode would be perfectly transparent, while an L* of 0 in a colorless sample would be opaque. The measurements of L*, a* and b* color values are conducted on specimens prepared according to any one of the following methods. Color is measured from polymer molded into discs (3 cm diameter with a thickness of in a range of 66 to 68 mils). Alternatively, color values are measured on polyester polymers ground to a powder passing a 3 mm screen. In the case of discs, a HunterLabUltraScan spectrophotometer is used to measure L*, a* and b* on three discs stacked together (in a range of approximately 198 to 204 mil thickness). A series of three, 3-cm diameter, about 65-68 mil thick clear discs are prepared from the polyester sample to be analyzed. Disc preparation is done by extruding each the polyester sample at a temperature of 278° C. and 120 rpm screw speed into a micro-injector barrel at 283-285° C. The barrel should be purged with material before attempting to mold any discs. The final discs are prepared using an injector pressure of 100 psig to the injection piston. The disc mold is maintained at a temperature range of 10-20° C. by circulation of chilled water. Alternative extrusion equipment may be used provided that the samples are melted at these temperatures and extruded at the stated rate. The HunterLabUltraScan spectrophotometer is operated using a D65 illuminant light source with a 100 observation angle and integrating sphere geometry. The color measurement is made in the total transmission (TTRAN) mode, in which both light transmitted directly through the sample and the light that is diffusely scattered is measured. Three discs are stacked together using a holder in front of the light source, with the area having the largest surface area placed perpendicular to the light source. For ground powders, the HunterLab UltraScan XE spectrophotometer is operated using a D65 illuminant light source with a 10° observation angle and integrating sphere geometry. The HunterLab UltraScan XE spectrophotometer is zeroed, standardized, UV calibrated and verified in control. The color measurement is made in the reflectance (RSIN) mode. The polyester polymer specimens which are ground to a powder have a minimum degree of crystallinity of 15%. The powder should not be prepared from an amorphous polymer. Accordingly, it is expected that care should be taken when analyzing bottles from this method because bottles have regions of lower crystallinity. In the event that it is not possible to separate crystalline polymer from amorphous polymer, it is expected that the disc method will be better suited to evaluate the color values. Polymer crystallinity is determined using Differential Scanning Calorimetry (DSC). The sample weight for this measurement is 10±1 mg. The specimens subjected to analysis are preferably cryogenically ground. The first heating scan is performed. The sample is heated from approximately 25° C. to 290° C. at a rate of 20° C./minute, and the absolute value of the area of the melting endotherms (one or more) minus the area of any crystallization exotherms is determined. This area corresponds to the net heat of melting and is expressed in Joules. The heat of melting of 100% crystalline PET is taken to be 119 Joules/gram, so the weight percent crystallinity of the pellet is calculated as the net heat of melting divided by 119, and then multiplied by 100. Unless otherwise stated, the initial melting point in each case is also determined using the same DSC scan. The percent crystallinity is calculated from both of: Low peak melting point: Tm1a High peak melting point: Tm1b Note that in some cases, particularly at low crystallinity, rearrangement of crystals can occur so rapidly in the DSC instrument that the true, lower melting point is not detected. The lower melting point can then be seen by increasing the temperature ramp rate of the DSC instrument and using smaller samples. A Perkin-Elmer Pyris-1 calorimeter is used for high-speed calorimetry. The specimen mass is adjusted to be inversely proportional to the scan rate. About a 1 mg sample is used at 500° C./min and about 5 mg are used at 100° C./min. Typical DSC sample pans were used. Baseline subtraction is performed to minimize the curvature in the baseline. Alternatively, percent crystallinity is also calculated from the average gradient tube density of two to three pellets. Gradient tube density testing is performed according to ASTM D 1505, using lithium bromide in water. The following description relates to any one of the several embodiments for making melt phase products and the processes for making the polyester polymer melt phase products. In the process for making a polyester polymer melt phase product, an antimony containing catalyst is added to the melt phase, the melt containing the antimony catalyst is polycondensed until the It.V. of the melt reaches at least 0.75 dL/g. Polyester polymer melt phase products in the form of pellets have an It.V. of at least 0.75 dL/g and contain the residues of the antimony catalyst. This It.V. is obtained without the necessity for solid state polymerization. There is also provided a process for making shaped articles from melt phase products by feeding to an extruder a polyester polymer composition comprising a melt phase products containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product by solid state polymerization, melting the polyester polymer composition to produce a molten polyester polymer, and then extruding the molten polyester polymer composition through a die to form shaped articles. In some additional embodiments, there is provided a melt phase process for making a polyester polymer melt phase product containing at least 100 ppm, and preferably up to about 500 ppm, or 450 ppm antimony based on the weight of the product comprising adding an antimony-containing catalyst to the melt phase; polycondensing a melt containing said catalyst in the melt phase; and before the It.V. of the melt reaches 0.45 dL/g, continuously polycondensing the melt either at a temperature within a range of 265° C. to 305° C. or at sub-atmospheric pressure or a combination thereof, in each case until the It.V. of the melt reaches at least 0.75 dL/g; to produce said polyester polymer melt phase product having a b* color in the range of −5 to +5. Also as noted above, there is provided a melt phase process for making a polyester polymer melt phase product comprising: a) esterifying or transesterifying a diol and a carboxylic acid component comprising dicarboxylic acids, dicarboxylic acid derivatives, and mixtures thereof to produce an oligomeric mixture; b) polycondensing the oligomeric mixture to produce a polyester polymer melt having an It.V. of at least 0.75 dL/g; and c) adding an antimony compound to the melt phase before the It.V. of the polyester polymer melt reaches 0.45 dL/g; and d) optionally adding a stabilizer to the melt phase; wherein the polyester polymer melt phase product has a b* color of −5 to +5. Each of these embodiments is now described in more detail. Examples of suitable polyester polymers made by the process include polyalkylene terephthalate homopolymers and copolymers modified with one or more modifiers in an amount of 40 mole % or less, preferably less than 15 mole %, most preferably less than 10 mole % (collectively referred to for brevity as “PAT”) and polyalkylene naphthalate homopolymers and copolymers modified with less than 40 mole %, preferably less than 15 mole %, most preferably less than 10 mole %, of one or more modifiers (collectively referred to herein as “PAN”), and blends of PAT and PAN. Unless otherwise specified, a polymer includes both its homopolymer and copolymer variants. The preferred polyester polymer is a polyalkylene terephthalate polymer, and most preferred is polyethylene terephthalate polymer. Typically, polyesters such as polyethylene terephthalate are made by reacting a diol such as ethylene glycol with a dicarboxylic acid as the free acid or its dimethyl ester to produce an ester monomer and/or oligomers, which are then polycondensed to produce the polyester. More than one compound containing carboxylic acid group(s) or derivative(s) thereof can be reacted during the process. All the compounds containing carboxylic acid group(s) or derivative(s) thereof that are in the product comprise the “carboxylic acid component.” The mole % of all the compounds containing carboxylic acid group(s) or derivative(s) thereof that are in the product add up to 100. The “residues” of compound(s) containing carboxylic acid group(s) or derivative(s) thereof that are in the product refers to the portion of said compound(s) which remains in the oligomer and/or polymer chain after the condensation reaction with a compound(s) containing hydroxyl group(s). The residues of the carboxylic acid component refers to the portion of the said component which remains in the oligomer and/or polymer chain after the said component is condensed with a compound containing hydroxyl group(s). More than one compound containing hydroxyl group(s) or derivatives thereof can become part of the polyester polymer product(s). All the compounds containing hydroxyl group(s) or derivatives thereof that become part of said product(s) comprise the hydroxyl component. The mole % of all the compounds containing hydroxyl group(s) or derivatives thereof that become part of said product(s) add up to 100. The residues of compound(s) containing hydroxyl group(s) or derivatives thereof that become part of said product refers to the portion of said compound(s) which remains in said product after said compound(s) is condensed with a compound(s) containing carboxylic acid group(s) or derivative(s) thereof and further polycondensed with polyester polymer chains of varying length. The residues of the hydroxyl component refers to the portion of the said component which remains in said product. The mole % of the hydroxyl residues and carboxylic acid residues in the product(s) can be determined by proton NMR. In one embodiment, the polyester polymers comprise: (a) a carboxylic acid component comprising at least 80 mole %, or at least 90 mole %, or at least 92 mole %, or at least 96 mole %, of the residues of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, and (b) a hydroxyl component comprising at least 80 mole %, or at least 90 mole %, or at least 92 mole %, or at least 96 mole %, of the residues of ethylene glycol, based on 100 mole percent of carboxylic acid component residues and 100 mole percent of hydroxyl component residues in the polyester polymer. Preferred are the residues of terephthalic acid and their derivates. The reaction of the carboxylic acid component with the hydroxyl component during the preparation of the polyester polymer is not restricted to the stated mole percentages since one may utilize a large excess of the hydroxyl component if desired, e.g. on the order of up to 200 mole % relative to the 100 mole % of carboxylic acid component used. The polyester polymer made by the reaction will, however, contain the stated amounts of aromatic dicarboxylic acid residues and ethylene glycol residues. Derivates of terephthalic acid and naphthalane dicarboxylic acid include C1-C4 dialkylterephthalates and C1-C4 dialkylnaphthalates, such as dimethylterephthalate and dimethylnaphthalate. In addition to a diacid component of terephthalic acid, derivates of terephthalic acid, naphthalene-2,6-dicarboxylic acid, derivatives of naphthalene-2,6-dicarboxylic acid, or mixtures thereof, the carboxylic acid component(s) of the present polyester may include one or more additional modifier carboxylic acid compounds. Such additional modifier carboxylic acid compounds include mono-carboxylic acid compounds, dicarboxylic acid compounds, and compounds with a higher number of carboxylic acid groups. Examples include aromatic dicarboxylic acids preferably having 8 to 14 carbon atoms, aliphatic dicarboxylic acids preferably having 4 to 12 carbon atoms, or cycloaliphatic dicarboxylic acids preferably having 8 to 12 carbon atoms. More specific examples of modifier dicarboxylic acids useful as an acid component(s) are phthalic acid, isophthalic acid, naphthalene-2,6-dicarboxylic acid, cyclohexanedicarboxylic acid, cyclohexanediacetic acid, diphenyl-4,4′-dicarboxylic acid, succinic acid, glutaric acid, adipic acid, azelaic acid, sebacic acid, and the like, with isophthalic acid, naphthalene-2,6-dicarboxylic acid, and cyclohexanedicarboxylic acid being most preferable. It should be understood that use of the corresponding acid anhydrides, esters, and acid chlorides of these acids is included in the term “carboxylic acid”. It is also possible for tricarboxyl compounds and compounds with a higher number of carboxylic acid groups to modify the polyester. In addition to a hydroxyl component comprising ethylene glycol, the hydroxyl component of the present polyester may include additional modifier mono-ols, diols, or compounds with a higher number of hydroxyl groups. Examples of modifier hydroxyl compounds include cycloaliphatic diols preferably having 6 to 20 carbon atoms and/or aliphatic diols preferably having 3 to 20 carbon atoms. More specific examples of such diols include diethylene glycol; triethylene glycol; 1,4-cyclohexanedimethanol; propane-1,3-diol; butane-1,4-diol; pentane-1,5-diol; hexane-1,6-diol; 3-methylpentanediol-(2,4); 2-methylpentanediol-(1,4); 2,2,4-trimethylpentane-diol-(1,3); 2,5-diethylhexanediol-(1,3); 2,2-diethyl propane-diol-(1, 3); hexanediol-(1,3); 1,4-di-(hydroxyethoxy)-benzene; 2,2-bis-(4-hydroxycyclohexyl)-propane; 2,4-dihydroxy-1,1,3,3-tetramethyl-cyclobutane; 2,2-bis-(3-hydroxyethoxyphenyl)-propane; and 2,2-bis-(4-hydroxypropoxyphenyl)-propane. The particular process for making the polyester polymer melt phase product from the melt is not limited. Polyester melt phase manufacturing processes typically include a) direct condensation of a dicarboxylic acid with the diol, optionally in the presence of esterification catalysts, in the esterification zone, followed by b) polycondensation in the prepolymer and finishing phases in the presence of a polycondensation catalyst; or a) ester exchange usually in the presence of a transesterification catalyst in the ester exchange phase, followed by b) polycondensation in the prepolymer and finishing phases in the presence of a polycondensation catalyst. To further illustrate, in step a), a mixture of one or more dicarboxylic acids, preferably aromatic dicarboxylic acids, or ester forming derivatives thereof, and one or more diols are continuously fed to an esterification reactor operated at a temperature of between about 200° C. and 300° C., and at a super-atmospheric pressure of between about 1 psig up to about 70 psig. The residence time of the reactants typically ranges from between about one and five hours. Normally, the dicarboxylic acid is directly esterified with diol(s) at elevated pressure and at a temperature of about 240° C. to about 285° C. The esterification reaction is continued until a degree of esterification of at least 70% is achieved, but more typically until a degree of esterification of at least 85% is achieved to make the desired oligomeric mixture (or otherwise also known as the “monomer”). The reaction to make the oligomeric mixture is typically uncatalyzed in the direct esterification process and catalyzed in ester exchange processes. The antimony containing catalyst may optionally be added in the esterification zone along with raw materials. Typical ester exchange catalysts which may be used in an ester exchange reaction between dialkylterephthalate and a diol include titanium alkoxides and dibutyl tin dilaurate, zinc compounds, manganese compounds, each used singly or in combination with each other. Any other catalyst materials well known to those skilled in the art are suitable. In a most preferred embodiment, however, the ester exchange reaction proceeds in the absence of titanium compounds. Titanium based catalysts present during the polycondensation reaction negatively impact the b* by making the melt more yellow. While it is possible to deactivate the titanium based catalyst with a stabilizer after completing the ester exchange reaction and prior to commencing polycondensation, in a most preferred embodiment it is desirable to eliminate the potential for the negative influence of the titanium based catalyst on the b* color of the melt by conducting the direct esterification or ester exchange reactions in the absence of any titanium containing compounds. Suitable alternative ester exchange catalysts include zinc compounds, manganese compounds, or mixtures thereof. The resulting oligomeric mixture formed in the esterification zone (which includes direct esterification and ester exchange processes) includes bis(2-hydroxyethyl)terephthalate (BHET) monomer, low molecular weight oligomers, DEG, and trace amounts of water as the condensation by-product not removed in the esterification zone, along with other trace impurities from the raw materials and/or possibly formed by catalyzed side reactions, and other optionally added compounds such as toners and stabilizers. The relative amounts of BHET and oligomeric species will vary depending on whether the process is a direct esterification process in which case the amount of oligomeric species are significant and even present as the major species, or a ester exchange process in which case the relative quantity of BHET predominates over the oligomeric species. Water is removed as the esterification reaction proceeds to drive the equilibrium toward the desired products. The esterification zone typically produces the monomer and oligomer species, if any, continuously in a series of one or more reactors. Alternately, the monomer and oligomer species in the oligomeric mixture could be produced in one or more batch reactors. It is understood, however, that in a process for making PEN, the reaction mixture will contain the monomeric species bis 2,6-(2-hydroxyethyl) naphthalate and its corresponding oligomers. At this stage, the It.V. is usually not measurable or is less than 0.1. The average degree of polymerization of the molten oligomeric mixture is typically less than 15, and often less than 7.0. Once the oligomeric mixture is made to the desired degree of esterification, it is transported from the esterification zone or reactors to the polycondensation zone in step b). The polycondensation zone is typically comprised of a prepolymer zone and a finishing zone, although it is not necessary to have split zones within a polycondensation zone. Polycondensation reactions are initiated and continued in the melt phase in a prepolymerization zone and finished in the melt phase in a finishing zone, after which the melt is solidified to form the polyester polymer melt phase product, generally in the form of chips, pellets, or any other shape. Each zone may comprise a series of one or more distinct reaction vessels operating at different conditions, or the zones may be combined into one reaction vessel using one or more sub-stages operating at different conditions in a single reactor. That is, the prepolymer stage can involve the use of one or more reactors operated continuously, one or more batch reactors, or even one or more reaction steps or sub-stages performed in a single reactor vessel. The residence time of the melt in the finishing zone relative to the residence time of the melt in the prepolymerization zone is not limited. For example, in some reactor designs, the prepolymerization zone represents the first half of polycondensation in terms of reaction time, while the finishing zone represents the second half of polycondensation. Other reactor designs may adjust the residence time between the finishing zone to the prepolymerization zone at about a 1.5:1 ratio or higher. A common distinction between the prepolymerization zone and the finishing zone in many designs is that the latter zone frequently operates at a higher temperature and/or lower pressure than the operating conditions in the prepolymerization zone. Generally, each of the prepolymerization and the finishing zones comprise one or a series of more than one reaction vessel, and the prepolymerization and finishing reactors are sequenced in a series as part of a continuous process for the manufacture of the polyester polymer. In the prepolymerization zone, also known in the industry as the low polymerizer, the low molecular weight monomers and oligomers in the oligomeric mixture are polymerized via polycondensation to form polyethylene terephthalate polyester (or PEN polyester) in the presence of an antimony containing catalyst added to the melt phase described as step c) in the esterification or polycondensation zones, such as immediately prior to initiating polycondensation, during polycondensation, or to the esterification zone prior to initiating esterification or ester exchange or during or upon completion of the esterification or ester exchange reaction. If the antimony catalyst is not added in the monomer esterification stage for the manufacture of the oligomeric mixture, it is added at this stage to catalyze the reaction between the monomers and between the low molecular weight oligomers and between each other to build molecular weight and split off the diol(s) as a by-product. If the antimony containing catalyst is added to the esterification zone, it is typically blended with the diol(s) and fed into the esterification reactor. If desired, the antimony containing catalyst is added to the melt phase before the It.V. of the melt exceeds 0.30 dL/g. By adding the antimony containing catalyst before the It.V. of the melt exceeds 0.30 dL/g, inordinately long reaction times are avoided. The antimony containing catalyst can be added to the esterification zone or the polycondensation zone or both. Preferably, the antimony containing catalyst is added before the It.V. of the melt exceeds 0.2 dL/g, or regardless of the actual It.V., more preferably before entering the polycondensation zone. The commencement of the polycondensation reaction is generally marked by either a higher actual operating temperature than the operating temperature in the esterification zone, or a marked reduction in pressure compared to the esterification zone, or both. In some cases, the polycondensation zone is marked by higher actual operating temperatures and lower (usually sub-atmospheric) pressures than the actual operating temperature and pressure in the esterification zone. Suitable antimony containing catalysts added to the melt phase are any antimony containing catalysts effective to catalyze the polycondensation reaction. These include, but are not limited to, antimony (III) and antimony (V) compounds recognized in the art and in particular, diol-soluble antimony (III) and antimony (V) compounds, with antimony (III) being most commonly used. Other suitable compounds include those antimony compounds that react with, but are not necessarily soluble in the diols prior to reaction, with examples of such compounds including antimony (III) oxide. Specific examples of suitable antimony catalysts include antimony (III) oxide and antimony (III) acetate, antimony (III) glycolates, antimony (III) ethylene glycoxide and mixtures thereof, with antimony (III) oxide being preferred. The preferred amount of antimony catalyst added is that effective to provide a level of between about at least 100, or at least 180, or at least 200 ppm. The stated amount of antimony is based on the metal content, regardless of its oxidation state. For practical purposes, not more than about 500 ppm of antimony by weight of the resulting polyester is needed. The prepolymer polycondensation stage generally employs a series of one or more vessels and is operated at a temperature of between about 230° C. and 305° C. for a period between about five minutes to four hours. During this stage, the It.V. of the monomers and oligomers are increased generally up to about no more than 0.45 dL/g. The diol byproduct is removed from the prepolymer melt generally using an applied vacuum ranging from 4 to 200 torr to drive the polycondensation of the melt. In this regard, the polymer melt is sometimes agitated to promote the escape of the diol from the polymer melt. As the polymer melt is fed into successive vessels, the molecular weight and thus the intrinsic viscosity of the polymer melt increases. The pressure of each vessel is generally decreased to allow for a greater degree of polymerization in each successive vessel or in each successive zone within a vessel. To facilitate removal of glycols, water, alcohols, aldehydes, and other reaction products, the reactors are typically run under a vacuum or purged with an inert gas. Inert gas is any gas which does not cause unwanted reaction or product characteristics at reaction conditions. Suitable gases include, but are not limited to argon, helium and nitrogen. Once the desired It.V. in the prepolymerization zone is obtained, generally no greater than 0.45, the prepolymer is fed from the prepolymer zone to a finishing zone where the second stage of polycondensation is continued in one or more finishing vessels generally, but not necessarily, ramped up to higher temperatures than present in the prepolymerization zone, to a value within a range of from 250° C. to 310° C., more generally from 270 to 300° C., until the It.V. of the melt is increased from the It.V of the melt in the prepolymerization zone (typically 0.30 but usually not more than 0.45) to an It.V in the range of from about at least 0.70, or at least 0.75 dL/g, to about 1.2 dL/g. The final vessel, generally known in the industry as the “high polymerizer,” “finisher,” or “polycondenser,” is also usually operated at a pressure lower than used in the prepolymerization zone to further drive off the diol and increase the molecular weight of the polymer melt. The pressure in the finishing zone may be within the range of about 0.2 and 20 torr, or 0.2 to 10 torr, or 0.2 to 2 torr. Although the finishing zone typically involves the same basic chemistry as the prepolymer zone, the fact that the size of the molecules, and thus the viscosity differs, means that the reaction conditions also differ. However, like the prepolymer reactor, each of the finishing vessel(s) is operated under vacuum or inert gas, and each is typically agitated to facilitate the removal of the diol and water. With the process of the invention, the melt phase polycondensation reaction is capable of proceeding within a wide range of operating temperatures and catalyst concentrations while maintaining an acceptable b* color of the base polyester polymer below +5. Thus, the process of the invention is not restricted to low catalyst concentrations and low polycondensation temperatures to maintain an acceptable b* color. It is to be understood that the process described above is illustrative of a melt phase process, and that the invention is not limited to this illustrative process. For example, while reference has been made to a variety of operating conditions at certain discrete It.V. values, differing process conditions may be implemented inside or outside of the stated It.V. values, or the stated operating conditions may be applied at It.V. points in the melt other than as stated. Moreover, one may adjust the the process conditions based on reaction time instead of measuring the It.V. of the melt. Moreover, the process is not limited to the use of tank reactors in series or parallel or to the use of different vessels for each zone. Moreover, it is not necessary to use split the polycondensation reaction into a prepolymer zone and a finishing zone because the polycondensation reaction can take place on a continuum of slight variations in operating conditions over time in one polycondensation reactor or in a multitude of reactors in series, either in a batch, semi-batch, or a continuous process. Once the desired It.V. is obtained with a minimum It.V. of 0.70 dL/g, or a minimum It.V. of 0.75 dL/g in other embodiments, the polyester polymer melt in the melt phase reactors is discharged as a melt phase product. The melt phase product is further processed to a desired form, such as an amorphous pellet, or a shaped article via a melt to mold process. The It.V. of the melt phase product is at least 0.70 dL/g, or 0.75 dL/g, or 0.78 dL/g, or 0.80 dL/g, and up to about 1.2 dL/g, or 1.15 dL/g. There is also provided a process for making a melt phase product by polymerizing a melt in the presence of an antimony-containing catalyst, wherein the reaction time of the melt from an It.V. of 0.45 dL/g through and up to an It.V. in the range of 0.70 dL/g to 0.90 dL/g, or through and up to completing the polycondensation reaction, is 100 minutes or less, or 80 minutes or less, or 70 minutes or less. In another embodiment, the reaction time of the melt from an It.V. of 0.3 dL/g through and up to an It.V. in the range of 0.70 dL/g to 0.90 dL/g is 100 minutes or less, or 80 minutes or less, or 70 minutes or less. Alternatively, the reaction time in the finishing zone to complete the polycondensation is 100 minutes or less, or 80 minutes or less, regardless of the It.V. of the melt fed to the finishing zone. Preferably, the pressure applied within this range is about 2 mm Hg or less, and about 0.05 mm Hg or more. Moreover, the b* color of the melt phase product produced by this process is within the range of −5 to +5. The process of the invention permits one to rapidly make a base polyester polymer having an acceptable b* color. There is also provided an embodiment comprising feeding to an extruder, such as an injection molding machine, a a polyester polymer composition comprising a melt phase product containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product in the solid state, melting the polyester polymer composition to produce a molten polyester polymer, extruding the molten polyester polymer composition through a die to form shaped articles, wherein the shaped articles have a b* color ranging from −5 to +5. By making the high It.V. product in the melt phase, the solid stating step can be altogether avoided. Solid stating is commonly used for increasing the molecular weight (and the It.V) of the pellets in the solid state, usually by at least 0.05 It.V. units, and more typically from 0.1 to 0.5 It.V. units. While the production of the polyester polymer melt phase product having a high It.V. of at least 0.75 dL/g avoids the need for solid stating, in an optional embodiment, the melt phase products may be solid stated if desired to further increase their molecular weight. In yet another embodiment, there is also provided a polyester polymer composition comprising melt phase products having a degree of crystallinity of at least 25%, an It.V. of at least 0.70 dL/g without solid state polymerization, and antimony containing residues, said polyester polymer composition having a b* color of −5 to +5, and an L* of at least 70. The degree of crystallinity is measured by the technique described above. The degree of crystallinity is optionally at least 30%, or at least 35%, or at least 40%. The melt phase products are preferably substantially free of titanium residues, and in a direct esterification process, are preferably prepared by adding to the melt phase a polycondensation catalyst consisting only of antimony containing compound(s). Thus, polyester polymers made rapidly in the melt phase having acceptable color can now be isolated as bright, crystallized pellets and provided to a converter without the need for increasing their molecular weight in the solid state. In yet another embodiment, there is also provided a polyester polymer composition substantially free of titanium residues comprising a polyester polymer having a b* color of −5 to +5 CIELAB units, an L* of at least 70 CIELAB units, and an It.V. of at least 0.75 dL/g obtained without subjecting the polymer to an increase in its molecular weight through solid stating, and containing antimony residues. These compositions may contain at least 4 ppm of a reheat additive, a stabilizer, a bluing toner, and/or acetaldehyde scavenging additive. If desired, the thermal stability of the polyester polymer can be increased and the tendency of the molded article to form haze can be decreased by adding a suitable stabilizer to the melt described as step d). Not every formulation requires the addition of a stabilizer, and not every end use application requires exceptionally high brightness. Suitable stabilizer compounds, if used, contain one or more phosphorus atoms. The phosphorus containing stabilizer compounds may be added at any point in the melt phase process. For example, the catalyst stabilizer can be added at any point in the melt phase process, including as a feed to the esterification zone, during esterification, to the oligomeric mixture, to the beginning of polycondensation, and during or after polycondensation. The stabilizer is desirably added after the addition of the antimony containing catalyst and before pelletization, such as before the prepolymer zone, to the prepolymer zone, to the finisher, or between the finishing zone and a pelletizer. In an ester exchange reaction, the catalyst stabilizer or other compounds effective for deactivating ester exchange catalysts can be additionally be added at the conclusion of the ester exchange reaction and before polycondensation in molar amounts sufficient to deactivate the ester exchange catalyst without significantly impairing the catalytic activity of the antimony containing catalyst added after deactivating the ester exchange catalyst. However, the ester exchange catalyst does not have to deactivated prior to adding the antimony containing catalyst if the ester exchange catalyst does not unduly impair the color of the resulting polyester polymer melt phase product. Titanium containing catalysts, however, have to be deactivated before the start of polycondensation, and preferably are not added to the ester exchange zone, esterification zone or polycondensation zones at all since they have been found to unduly impair the b* color. In the case of direct esterification, and in the absence of any titanium-containing compounds, stabilizers, if added, can be added after the desired It.V. is obtained. Specific examples of stabilizers include acidic phosphorus compounds such as phosphoric acid, phosphorous acid, polyphosphoric acid, carboxyphosphonic acids, phosphonic acid derivatives, and each of their acidic salts and acidic esters and derivatives, including acidic phosphate esters such as phosphate mono- and di-esters and non acidic phosphate esters (e.g. phosphate tri-esters) such as trimethyl phosphate, triethyl phosphate, tributyl phosphate, tributoxyethyl phosphate, tris(2-ethylhexyl) phosphate, oligomeric phosphate tri-esters, trioctyl phosphate, triphenyl phosphate, tritolyl phosphate, (tris)ethylene glycol phosphate, triethyl phosphonoacetate, dimethyl methyl phosphonate, tetraisopropyl methylenediphosphonate, mixtures of mono-, di-, and tri-esters of phosphoric acid with ethylene glycol, diethylene glycol, and 2-ethylhexanol, or mixtures of each. Other examples include distearylpentaerythritol diphosphite, mono-, di-, and trihydrogen phosphate compounds, phosphite compounds, certain inorganic phosphorus compounds such as monosodium phosphate, zinc or calcium phosphates, poly(ethylene)hydrogen phosphate, silyl phosphates; phosphorus compounds used in combinations with hydroxy- or amino-substituted carboxylic acids such as methyl salicylate, maleic acid, glycine, or dibutyl tartrate; each useful for inactivating metal catalyst residues. The quantity of phosphorus relative to the antimony atoms used in this process is not limited, but consideration is taken for the amount of antimony metal and other metals present in the melt. The molar ratio of phosphorus to antimony is desirably at least 0.025:1, or in the range of 0.025:1 to 5.0:1, preferably about 0.1:1 to 3.0:1. To the melt or to the melt phase products may also be added an acetaldehyde bonding or scavenging compound. The particular point of addition will depend somewhat on the type of M lowering compound used. The M scavenging compound may be fed to an extruder used as part of the melt processing of pellets into preforms or other shaped articles, or the AA scavenging compound may be added to the melt in the melt phase process. Some scavengers have a finite number of reaction sites. If AA scavengers are added to the melt-phase, often all the reactive sites have been used up by the time the polyester polymer pellets are melted to make preforms. Other M scavengers are not stable at the temperatures and times involved in polycondensation. If the AA scavenging agent contains sufficient reaction sites and the material and its product are thermally stable, they may be added to the melt in the melt phase process for making the polyester polymer, such as in the finishing section where the It.V. will exceed 0.45 dL/g, and more preferably after the finishing section and before pelletization where the It.V. will exceed 0.70 dL/g. The addition of AA scavenging additives is optional and not every application requires the presence of this additive. However, if used, the AA scavenging additive is generally added in an amount between about 0.05 and 5 weight %, more preferably between about 0.1 and 3 weight % based on the weight of the polyester polymer melt phase product. It should be understood that the additive may be added individually or in a liquid carrier or as a solid concentrate in a compatible polymer base resin. The AA scavenging additive may be present in a concentrate in an amount ranging from 0.5 wt. % to 40 wt. % and let down into a bulk polyester polymer melt at the injection molding machine or to the melt in the melt phase process for making the polyester polymer, such as in the finishing section where the It.V. will exceed 0.45 dL/g and more preferably after the finishing section where the It.V. will exceed 0.70 dL/g. The AA scavenging additive may be any additive known to react with AA. Suitable additives include polyamides such as those disclosed in U.S. Pat. Nos. U.S. Pat. No. 5,266,413, U.S. Pat. No. 5,258,233 and U.S. Pat. No. 4,8837,115; polyesteramides such as those disclosed in U.S. application Ser. No. 595,460, filed Feb. 5, 1996; nylon-6 and other aliphatic polyamides such as those disclosed in Japan Patent Application Sho 62-182065 (1987); ethylenediaminetetraacetic acid (U.S. Pat. No. 4,357,461), alkoxylated polyols (U.S. Pat. No. 5,250,333), bis(4-[bgr]-hydroxyethoxyphenyl) sulfone (U.S. Pat. No. 4,330,661), zeolite compounds (U.S. Pat. No. 5,104,965), 5-hydroxyisophthalic acid (U.S. Pat. No. 4,093,593), supercritical carbon dioxide (U.S. Pat. No. 5,049,647 and U.S. Pat. No. 4,764,323) and protonic acid catalysts (U.S. Pat. No. 4,447,595 and U.S. Pat. No. 4,424,337). Preferably the M lowering additive is selected from polyamides and polyesteramides. Suitable polyamides include homo and copolyamides such as poly(caprolactam), poly(hexamethylene-adipamide), poly(m-xylylene-adipamide), etc. Branched or hyperbranched polyamides can also be used. Suitable poyesteramides include the polyesteramides prepared from terephthalic acid, 1,4-cyclohexane-dimethanol, isophthalic acid and hexamethylene diamine (preferably with about 50:50 ratio of the diacids to the diamine and a 50:50 ratio of the glycol to the diamine); the polyesteramide prepared from terephthalic acid, 1,4-cyclohexanedimethanol, adipic acid and hexamethylene diamine; the polyesteramides prepared from terephthalic acid, 1,4-cylcohexanedimethanol and bis(p-amino-cylcohexyl)methane. Other known scavengers such as polyethyleneimine may also be used. Preferred AA reducing agents are polyamide polymers selected from the group consisting of low molecular weight partially aromatic polyamides having a number average molecular weight of less than 15,000, low molecular weight aliphatic polyamides having a number average molecular weight of less than 7,000, and combinations thereof. Specific polymers within these preferred molecular weight ranges include poly(m-xylylene adipamide), poly(hexamethylene isophthalamide), poly(hexamethylene adipamide-co-isophthalamide), poly(hexamethylene adipamide-co-terephthalamide), and poly(hexamethylene isophthalamide-co-terephthalamide), poly(hexamethylene adipamide) and poly(caprolactam). Other AA reducing agents include anthranilamides such as 2-aminobenzamide or the like as mentioned in U.S. Pat. No. 6,274,212, incorporated herein by reference. Any conventional M reducing agent may be used. In addition, certain agents which colorize the polymer can be added to the melt. In one embodiment, a bluing toner is added to the melt in order to reduce the b* of the resulting polyester polymer melt phase product. Such bluing agents include blue inorganic and organic toners. In addition, red toners can also be used to adjust the a* color. Organic toners, e.g., blue and red organic toners, such as those toners described in U.S. Pat. Nos. 5,372,864 and 5,384,377, which are incorporated by reference in their entirety, can be used. The organic toners can be fed as a premix composition. The premix composition may be a neat blend of the red and blue compounds or the composition may be pre-dissolved or slurried in one of the polyester's monomeric species, e.g., ethylene glycol. Alternatively, or in addition to, inorganic bluing agents can also be added to the melt to reduce its yellow hue. Cobalt (II) compounds, such as cobalt (II) carboxylates, are one of the most widely used toners in the industry to mask the yellow color of polymers. When direct esterification is not being used, the cobalt carboxylate can be added to the ester exchange reactor to also act as an ester exchange catalyst. The total amount of toner components added depends, of course, on the amount of inherent yellow color in the base polyester and the efficacy of the toner. Generally, a concentration of up to about 15 ppm of combined organic toner components and a minimum concentration of about 0.5 ppm are used. The total amount of bluing additive typically ranges from 0.5 to 10 ppm. The toners can be added to the esterification zone or to the polycondensation zone. Preferably, the toners are added to esterification zone or to the early stages of the polycondensation zone, such as to a prepolymerization reactor. The process of the invention has the advantage of producing a base polyester polymer melt phase product having both a high It.V. and a low b* rating. The b* color of the polyester polymer melt phase product is within the range of −5 to +5 CIELAB units, preferably between −5 and 4, or between −5 and 3. These values are obtainable by the process of the invention with and without the presence of bluing toners added in the melt phase or added to the product. When the base polyester polymer has a low b* rating, a bluing toner is either not required or a smaller concentration of bluing toners is needed to drive the color of the polyester polymer melt phase product closer to a neutral b* of 0. Depending on the nature of the bluing toner and other ingredients in the polyester polymer composition, the addition of less bluing toner has a further advantage of minimizing the impact on the L* brightness of the polyester polymer. While toners are optional and can be added to the melt if desired, by using an antimony-containing catalyst to catalyze the polycondensation reaction, the base polyester polymer has the capability of remaining within a b* rating of −5 to +5 without the need to add toners. Accordingly, in another embodiment, the high It.V. polyester polymer melt phase product and the polyester polymer compositions of the invention have a b* color between −5 to +5 CIELAB units without the addition of bluing toners. In an alternative embodiment, the high It.V. polyester polymer melt phase product, and the polyester polymer compositions, of the invention not only have a b* color between −5 to +5 CIELAB units, but also have a L* brightness value of 70 CIELAB units or more, or 74 or more, or 76 or more, with and without the presence of bluing toners or residues thereof or reheat additives. In carbonated soft drink bottle applications, the melt phase product may contain bluing toners and an additive to reduce the antimony compound to form Sb metal in situ to aid the reheat rate. Since coloring agents may be added if desired, there are also provided embodiments wherein the polyester polymer melt phase product has an It.V. of at least 0.75 dL/g, a b* color between −5 to +5 CIELAB units, an L* brightness value of 70 CIELAB units or more, and contains a bluing toner or residue thereof. In a further embodiment, there is provided a polyester polymer composition comprising a melt phase product made in the melt phase to an It.V. of at least 0.70 dL/g, a bluing toner or residue thereof and/or a red toner or residue thereof, and a reheat additive, wherein the composition has a b* color between −5 to +5 CIELAB units and a L* brightness value of 70 CIELAB units or more, more preferably 74 CIELAB units or more. In a preferred aspect to both of these embodiments, the bluing toner is an organic toner, and the polyester polymer composition is devoid of cobalt compounds added to the esterification reactor. Minor amounts of certain cobalt compounds may be present with the diacid and/or diol starting materials. Although cobalt compounds mask the yellow color of some polyester polymers, they also may, impart a gray color to the polymer at high levels and/or lower the resulting polymer's thermal stability in PET polymers if insufficient amounts of phosphorus compounds are present to bind to cobalt. For processes conducted entirely in the melt-phase, high It.V. polyester polymer melt phase products catalyzed with antimony compounds tend to be darker than high It.V. titanium compound catalyzed polyester polymers without the addition of any reheat additive, toners, or AA lowering additives. However, some of the antimony in the Sb+3 oxidation state may be reduced to the Sb0 oxidation state merely at reaction temperatures and times without the presence of added reducing compounds. The Sb0 metal present in the polymer has the advantage of also acting as a reheat aid to increase the rate at which bottle preforms reheat prior to blow molding. A reducing compound can be added to the polycondensation reaction to produce even more Sb0 in situ. Examples of reducing compounds include phosphorous acid, alkyl or aryl phosphonic acids, and alkyl or aryl phosphites. Reduced antimony often delivers equivalent reheat increases with less reduction in the brightness of the polymer than is the case for other added reheat additives such as black iron oxide and carbon black. Examples of other reheat additives (a reheat additive is deemed a compound added to the melt in contrast to forming a reheat aid in situ) used in combination with reduced antimony formed in situ or as an alternative to reduced antimony formed in situ include activated carbon, carbon black, antimony metal, tin, copper, silver, gold, palladium, platinum, black iron oxide, and the like, as well as near infrared absorbing dyes, including, but not limited to those disclosed in U.S. Pat. No. 6,197,851 which is incorporated herein by reference. The iron oxide, which is preferably black, is used in very finely divided form, e.g., from about 0.01 to about 200 μm, preferably from about 0.1 to about 10.0 μm, and most preferably from about 0.2 to about 5.0 μm. Suitable forms of black iron oxide include, but are not limited to magnetite and maghemite. Red iron oxide may also be used. Such oxides are described, for example, on pages 323-349 of Pigment Handbook, Vol. 1, copyright 1973, John Wiley & Sons, Inc. Other components can be added to the composition of the present invention to enhance the performance properties of the polyester polymer. For example, crystallization aids, impact modifiers, surface lubricants, denesting agents, antioxidants, ultraviolet light absorbing agents, metal stabilizers, colorants, nucleating agents, acetaldehyde bonding compounds, other reheat rate enhancing aids, sticky bottle additives such as talc, and fillers and the like can be included. The compositions of the present invention optionally may additionally contain one or more UV absorbing compounds. One example includes UV absorbing compounds which are covalently bound to the polyester molecule as either a comonomer, a side group, or an end group. Suitable UV absorbing compounds are thermally stable at polyester processing temperatures, absorb in the range of from about 320 nm to about 380 nm, and are difficult to extract or nonextractable from said polymer. The UV absorbing compounds preferably provide less than about 20%, more preferably less than about 10%, transmittance of UV light having a wavelength of 370 nm through a bottle wall 12 mils (305 microns) thick. Suitable chemically reactive UV absorbing compounds include substituted methine compounds of the formula wherein: R is hydrogen, alkyl, substituted alkyl, aryl, substituted aryl, cycloalkyl, substituted cycloalkyl or alkenyl, or a polyoxyalkylene chain, such as polyoxyethylene or polyoxypropylene polymers, each optionally having some oxypropylene or oxyethylene units in the polymer chain as a block or random copolymer, the polyoxyalkylene chain having a number average molecular weight ranging from 500 to 10,000; R1 is hydrogen, or a group such as alkyl, aryl, or cycloalkyl, all of which groups may be substituted; R2 is any radical which does not interfere with condensation with the polyester, such as hydrogen, alkyl, substituted alkyl, allyl, cycloalkyl or aryl; R3 is hydrogen or 1-3 substitutents selected from alkyl, substituted alkyl, alkoxy, substituted alkoxy and halogen, and P is cyano, or a group such as carbamyl, aryl, alkylsulfonyl, arylsufonyl, heterocyclic, alkanoyl, or aroyl, all of which groups may be substituted. Preferred methine compounds are those of the above formula wherein: R2 is hydrogen, alkyl, aralkyl, cycloalkyl, cyanoalkyl, alkoxyalkyl, hydroxyalkyl or aryl; R is selected from hydrogen; cycloalkyl; cycloalkyl substituted with one or two of alkyl, alkoxy or halogen; phenyl; phenyl substituted with 1-3 substitutents selected from alkyl, alkoxy, halogen, alkanoylamino, or cyano; straight or branched lower alkenyl; straight or branched alkyl and such alkyl substituted with 1-3 substitutents selected from the following: halogen; cyano; succinimido; glutarimido; phthalimido; phthalimidino; 2-pyrrolidono; cyclohexyl; phenyl; phenyl substituted with alkyl, alkoxy, halogen, cyano, or alkylsufamoyl; vinyl-sulfonyl; acrylamido; sulfamyl; benzoylsulfonicimido; alkylsulfonamido; phenylsulfonamido; alkenylcarbonylamino; groups of the formula where Y is —NH—, —N-alkyl, —O—, —S—, or —CH2O—; —S—R14; SO2CH2CH2SR14; wherein R14 is alkyl, phenyl, phenyl substituted with halogen, alkyl, alkoxy, alkanoylamino, or cyano, pyridyl, pyrimidinyl, benzoxazolyl, benzimidazolyl, benzothiazolyl; or groups of the formulae —NHXR16, —CON R15R15, and —SO2NR15R15; wherein R15 is selected from H, aryl, alkyl, and alkyl substituted with halogen, phenoxy, aryl, —CN, cycloalkyl, alkylsulfonyl, alkylthio, or alkoxy; X is —CO—, —COO—, or —SO2—, and R16 is selected from alkyl and alkyl substituted with halogen, phenoxy, aryl, cyano, cycloalkyl, alkylsulfonyl, alkylthio, and alkoxy; and when X is —CO—, R16 also can be hydrogen, amino, alkenyl, alkylamino, dialkylamino, arylamino, aryl, or furyl; alkoxy; alkoxy substituted with cyano or alkoxy; phenoxy; or phenoxy substituted with 1-3 substitutents selected from alkyl, alkoxy, or halogen substituents; and P is cyano, carbamyl, N-alkylcarbamyl, N-alkyl-N-arylcarbamyl, N,N-dialkylcarbamyl, N,N-alkylarylcarbamyl, N-arylcarbamyl, N-cyclohexylcarbamyl, aryl, 2-benzoxazolyl, 2-benzothiazolyl, 2-benzimidazolyl, 1,3,4-thiadiazol-2-yl, 1,3,4-oxadiazol-2-yl, alkylsulfonyl, arylsulfonyl or acyl. In all of the above definitions the alkyl or divalent aliphatic moieties or portions of the various groups contain from 1-10 carbons, preferably 1-6 carbons, straight or branched chain. Preferred UV absorbing compounds include those where R and R1 are hydrogen, R3 is hydrogen or alkoxy, R2 is alkyl or a substituted alkyl, and P is cyano. In this embodiment, a preferred class of substituted alkyl is hydroxy substituted alkyl. A most preferred polyester composition comprises from about 10 to about 700 ppm of the reaction residue of the compound These compounds, their methods of manufacture and incorporation into polyesters are further disclosed in U.S. Pat. No. 4,617,374 the disclosure of which is incorporated herein by reference. The UV absorbing compound(s) may be present in amounts between about 1 to about 5,000 ppm by weight, preferably from about 2 ppm to about 1,500 ppm, and more preferably between about 10 and about 500 ppm by weight. Dimers of the UV absorbing compounds may also be used. Mixtures of two or more UV absorbing compounds may be used. Moreover, because the UV absorbing compounds are reacted with or copolymerized into the backbone of the polymer, the resulting polymers display improved processability including reduced loss of the UV absorbing compound due to plateout and/or volatilization and the like. The polyester compositions of the present invention are suitable for making into chips or pellets or into a variety of shaped articles. Suitable processes for forming said articles are known and include extrusion, extrusion blow molding, melt casting, injection molding, melt to mold process, melt to pellet without solid stating, stretch blow molding (SBM), thermoforming, and the like. There is also provided a polyester polymer composition in the form of a pellet, a bottle preform, a stretch blow molded bottle, a flake, or a chip, wherein the polyester polymer composition in its particular form or shape has a b* color between −5 to +5 CIELAB units and a L* brightness of at least 70 CIELAB units in which the melt to make the polyester polymer melt phase product of the composition is reacted and formulated according to the process of the invention. The articles can be formed from the melt phase products by any conventional techniques known to those of skill. For example, melt phase products, optionally solid state polymerized, which are crystallized to a degree of crystallization of at least 25%, are transported to a machine for melt extruding and injection molding the melt into shapes such as preforms suitable for stretch blow molding into beverage or food containers, or rather than injection molding, merely extruding into other forms such as sheet. The process for making these articles comprises: e) drying pellets comprising melt phase products having a degree of crystallinity of at least 25% and an It.V. of at least 0.7 dL/g and antimony containing residues, optionally but preferably substantially free of titanium containing residues, in a drying zone at a zone temperature of at least 140° C.; f) introducing the pellets into an extrusion zone and forming a molten polyester polymer composition; and g) forming a sheet, strand, fiber, or a molded part directly or indirectly from the extruded molten polyester polymer having a b* ranging from −5 to +5 and an L* of at least 70. It is preferred that these pellets have not been subjected to a solid state polymerization step for increasing their molecular weight. In this preferred embodiment, the pellets which are prepared for introduction into an extruder are not solid stated, yet have an It.V. sufficiently high such that the physical properties are suitable for the manufacture of bottle preforms and trays. Dryers feeding melt extruders are needed to reduce the moisture content of pellets. Moisture in or on pellets fed into a melt extrusion chamber will cause the melt to lose It.V. at melt temperatures by hydrolyzing the ester linkages with a resulting change in the melt flow characteristics of the polymer and stretch ratio of the preform when blown into bottles. It is desirable to dry the pellets at high temperatures to decrease the residence time of the pellets in the dryer and increase throughput. Drying may be conducted at 140° C. or more, meaning that the temperature of the heating medium (such as a flow of nitrogen gas or air) is 140° C. or more. The use of nitrogen gas is preferred if drying is conducted above 180° C. to avoid oxidative thermal degradation. In general, the residence time of pellets in the dryer at 140° C. or more will on average be from 0.5 hours to 16 hours. Any conventional dryer can be used. The pellets may be contacted with a countercurrent flow of heated air or inert gas such as nitrogen to raise the temperature of the pellets and remove volatiles from inside the pellets, and may also be agitated by a rotary mixing blade or paddle. The flow rate of the heating gas, if used, is a balance between energy consumption, residence time of pellets, and preferably avoiding the fluidization of the pellets. Suitable gas flow rates range from 0.05 to 100 cfm for every pound per hour of pellets discharged from the dryer, preferably from 0.2 to 5 cfm per lb. of pellets. Once the pellets have been dried, they are introduced into an extrusion zone to form a molten polyester polymer composition, followed by extruding the molten polymer into a sheet or film or forming a molded part, such as a bottle preform through injecting the melt into a mold. Methods for the introduction of the dried pellets into the extrusion zone, for melt extruding, injection molding, and sheet extrusion are conventional and known to those of skill in the manufacture of such containers. At the melt extruder, other components can be added to the extruder to enhance the performance properties of the pellets. These components may be added neat to the bulk polyester pellets or in a liquid carrier or can be added to the bulk polyester pellets as a solid polyester concentrate containing at least about 0.5 wt. % of the component in the polyester polymer let down into the bulk polyester. The types of suitable components include crystallization aids, impact modifiers, surface lubricants, stabilizers, denesting agents, compounds, antioxidants, ultraviolet light absorbing agents, metal deactivators, colorants, nucleating agents, acetaldehyde lowering compounds, reheat rate enhancing aids, sticky bottle additives such as talc, and fillers and the like can be included. All of these additives and many others and their use are well known in the art and do not require extensive discussion. While an embodiment has been described for the drying of pellets which have not been solid stated, it is also contemplated that pellets which have optionally been solid stated are also dried at temperatures of 140° C. or more. Examples of the kinds of shaped articles which can be formed from the the melt phase products and the polyester polymer composition of the invention include sheet; film; packaging and containers such as preforms, bottles, jars, and trays; rods; tubes; lids; and filaments and fibers. Beverage bottles made from polyethylene terephthalate suitable for holding water or carbonated beverages, and heat set beverage bottle suitable for holding beverages which are hot filled into the bottle are examples of the types of bottles which are made from the crystallized pellet of the invention. Examples of trays are those which are dual ovenable and other CPET trays. This invention can be further illustrated by the additional examples of embodiments thereof, although it will be understood that these examples are included merely for purposes of illustration and are not intended to limit the scope of the invention. EXAMPLES The following apply to all the examples and comparative examples. The starting oligomeric mixture employed in the polycondensations throughout all the examples, unless otherwise noted, was prepared from terephthalic acid, ethylene glycol, about 1.5 mole percent of about 35% cis/65% trans 1,4-cyclohexanedimethanol, and about 1.2-1.3 weight percent of diethylene glycol generated during esterification. The conversion of acid groups was about 95% by NMR/titration carboxyl ends groups. The Mn of the oligomeric mixture was about 766 g/mole, and the Mw was about 1478 g/mole. All of the high IV polyesters in the examples were made exclusively in the melt phase, i.e., the molecular weight of the polyester polymer melt phase products as indicated by their Ih.V. were not increased in the solid state. In the titanium catalyzed samples, the following test procedure was used. For polycondensation, the ground oligomer (103 g) is weighed into a half-liter, single-necked, round-bottomed flask. The catalyst solution added to the flask is titanium tetrabutoxide in n-butanol. A 316 L stainless steel paddle stirrer and glass polymer head were attached to the flask. After attaching the polymer head to a side arm and a purge hose, two nitrogen purges are completed. The polymerization reactor is operated under control of a CAMILE™automation system, programmed to implement the following array. Stir Time Temp. Vacuum Speed Stage (min.) C.° (torr) (rpm) 1 0.1 270 730 0 2 10 270 730 150* 3 2 270 140 300* 4 1 270 140 300 5 10 270 25* 300 6 10 270 25 300 7 1 270 140* 300 8 2 270 140 300 9 1 270 25* 300 10 10 270 25 300 11 2 270 2* 30* 12 1 270 0.5* 30 13 500# 270 0.5 30 *= ramp; #= torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). A molten bath of Belmont metal is raised to surround the flask, and the CAMILE™ array is implemented. In this array, a “ramp” is defined as a linear change of vacuum, temperature, or stir speed during the specified stage time. The stirring system is automatically calibrated between stages 4 and 5. After stage 6 ends, the vacuum level was ramped up to 140 torr, and then a 2 minute additive addition stage (stage 8) begins. The finisher stage (13) is terminated according to the stirrer torque. The polymer is cooled to ambient temperature. The polymers are chopped and ground to pass a 3 mm screen. The same procedure as set forth above is used to make samples of antimony catalyzed melt phase products. The experiment varies the antimony level (Sb), vacuum level and temperature. The polymers are made as described in the previous example except that the catalyst solution added to the flask is antimony triacetate in ethylene glycol. The temperature of polycondensation designated in Table 1 is used throughout the entire sequence, i.e., the temperature in the prepolymer stages and the temperature in the finisher stage are the same. The target Ih.V. is 0.80 dL/g+/−0.05(corresponding to a calculated It.V. of about 0.84 dL/g) An agitator torque target is identified for each finisher temperature and each polymerization rig. As the molecular weight and corresponding Ih.V. of the melt increases, its melt viscosity also increases which is correlated to the torque required by the agitator to turn a revolution. Each run is terminated when the torque target on the agitator is achieved three times. The comparative titanium catalyzed examples are indicated by the letter C following the sample number. The results set forth in Table 1 illustrate the effect of antimony and titanium based catalysts, respectively, on the b* and L* colors. The intrinsic viscosity values reported are the limiting value at infinite dilution of the specific viscosity of a polymer. The intrinsic viscosity is defined by the following equation: η int = lim ( η sp / C ) = lim ln ⁢ ⁢ ( η r / C ) C -> 0 C -> 0 where ηint=Intrinsic viscosity ηr=Relative viscosity=/to ηsp=Specific viscosity=ηr−1 Instrument calibration involves replicate testing of a standard reference material and then applying appropriate mathematical equations to produce the “accepted” I.V. values. Calibration Factor=Accepted IV of Reference Material/Average of Replicate Determinations Corrected IhV=Calculated IhV×Calibration Factor The intrinsic viscosity (ItV or ηint) may be estimated using the Billmeyer equation as follows: ηint=0.5[e0.5×Corrected IhV−1]+(0.75×Corrected IhV) All of the color results shown in this example are the color of the base polyester polymer, i.e., no blue or red toners or other toners were added, and no stabilizers, reheat additives, acetaldehyde bonding agents, or agents to reduce the antimony compound to antimony metal were added to the melt phase. For each of these examples using antimony catalysts, however, some Sb0 metal was generated in situ solely by virtue of the process temperature and time. The L*, a* and b* color measurement were obtained according to the test methods and process described above by grinding the polymer into powder according to the method described further above. Crystallinity was imparted to each polymer upon cooling the polymer from the melt phase during solidification. Some of the polymers were analyzed for their degree of crystallinity. Each of the polymers are believed to have a degree of crystallinity about or above 25%. The analytical method used to determine the degree of crystallinity is the DSC method described further above. The results are reported in Table 1. TABLE 1 Ti Level In Sb Level In Torque Time to Sample ppm target ppm target Temp Vacuum Target IhV IhV L* b* % No. (actual) (actual) (deg C.) (torr) (kg * cm) (min) (dL/g) powder powder Crystalinity 1C 5 (5.3) 270 2 6.6 223.2 0.781 81.13 10.58 34.3 2C 5 (4.9) 270 0.2 6.1 123.6 0.795 78.59 8.65 3 400 (393) 270 0.2 6.6 105.4 0.833 73.27 3.76 4 250 (242) 285 1.1 5.46 105.1 0.8 75.46 4.43 5 250 (247) 285 1.1 5.46 84.6 0.812 78.74 3.99 39.3 6 250 (246) 285 1.1 5.46 82.9 0.766 77.40 5.62 7 250 (246) 285 1.1 6.05 81.5 0.768 75.29 4.90 8 250 (250) 285 1.1 6.05 75.0 0.773 82.05 6.10 9 250 (243) 285 1.1 6.05 60.0 0.728 78.25 4.84 42 10 100 (102) 290 2 4.9 146.8 0.793 80.34 8.55 11C 5 (5) 300 2 4.857 54.8 0.83 81.73 13.04 33.5 12C 5 (5.1) 300 0.2 5.05 30.1 0.805 82.32 10.55 13 400 (379) 300 2 5.05 46.4 0.812 70.23 3.11 37.2 14 400 (380) 300 0.2 4.857 20.3 0.768 73.81 3.83 15C 15 (14.9) 270 2 6.1 159.0 0.803 81.40 12.48 16C 15 (15) 270 0.2 6.6 51.4 0.766 79.49 10.44 17C 10 (9.7) 285 1.1 5.46 45.4 0.796 81.85 11.18 18C 10 (10) 285 1.1 6.05 43.4 0.792 78.23 10.81 30.4 19C 15 (15) 300 2 5.05 16.2 0.771 78.61 14.00 20C 15 (14.8) 300 0.2 4.857 9.5 0.791 82.34 14.15 The b* color of samples catalyzed with low concentrations of titanium (i.e.) 5 ppm) at a low reaction temperature of 270° C. was less than satisfactory as indicated by its high values above 8.5. See examples 1C and 2C. The residence time to obtain an It.V. of about 0.78 or 0.79 was cut in half from 223 to 123 minutes by decreasing the pressure (increasing the vacuum) from 2 torr to 0.2 torr. The residence time in the antimony catalyzed samples was less than in samples 1C and 2C at equivalent vacuum levels and similar It.V. by using an appropriate amount of antimony catalyst, a higher reaction temperature, or a combination of appropriate antimony catalyst levels and reaction temperatures. See examples 3-10. Not only did the reaction proceed quicker to the target It.V in the antimony catalyzed samples, but the b* color of the base polymer was better in each antimony catalyzed sample compared to samples 1C and 2C at equivalent vacuum levels and similar It.V. It can also be seen that, in antimony catalyzed samples, a b* of about 6 or less can be maintained within a wide processing window, and also within a large variety of different combinations of vacuum, catalyst concentration, and reaction temperatures. Attempting to reduce the residence time of the titanium catalyzed samples by increasing the reaction temperature, the catalyst concentration, or decreasing the pressure, or a combination of these parameters was successful as seen in comparative examples 11C-12C and 15C-20C. However, the increase in catalyst concentration and/or reaction temperature resulted in the further yellowing of the base polyester polymer as seen in the increase in b* values in many cases, or at best, did not result in any improvement in b* color to a value of less than 6. The results show that dropping the titanium level to 5 ppm at higher temperatures designed to decrease the reaction time results in polyester polymer having an unacceptably high b*. (See 11 C-12C). The results in Table 1 indicate that the antimony catalyzed polyester polymers can be made with a lower b* color on the base polyester polymer compared to titanium catalyzed samples at equivalent inherent viscosities. Moreover, when one adheres to the use of low titanium and low temperature conditions in titanium catalyzed samples, the residence time for making the antimony catalyzed samples was significantly shorter because in the antimony catalyzed reaction, there exists a wide variety of antimony catalyst concentrations and higher reaction temperatures which can be used without significantly increasing the b* color beyond 6. Example 2 In this series of examples, phosphorus stabilizers were added during the melt-phase synthesis. The type of stabilizer added in all cases was an oligomeric phosphate triester. The amount is varied as shown in Table 2. The lowest phosphorus:metal mole ratio (P:M Z) is zero. Reheat additives, reducing agents, and toners are not added to the melt in these samples. Each of samples illustrate the P:M Z effect, catalyst level, and temperature on the b* and the L* of high It.V. polyester polymer melt phase products. A designed experiment varies antimony level (Sb), reaction temperature and/or the phosphorus/Sb molar ratio. The oligomer charge, equipment and antimony catalyst solution are the same as described in Example 1. The vacuum level in the finisher reaction zone is fixed at 0.8 torr in all experiments using Sb compounds as the catalyst. The phosphorus solution is added at stage 5, before initiating polycondensation in stage 7 and after completing the esterification reactions. Vacuum is applied at successive stages as stated in the following Stir Time Temp. Vacuum Speed Stage (min.) C.° (torr) (rpm) 1 0.1 270 730 0 2 10 270 730 150* 3 2 270 140 300* 4 1 270 140 300 5 2 270 140 300 6 10 270 51* 300 7 5 270 51 300 8 1 270 4.5* 300 9 20 270 4.5 300 10 2 270 0.8* 30* 13 500# 270 0.8 30 *= ramp; #= torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). Titanium catalyzed samples are prepared using the same procedure as in the Sb catalyzed samples, varying the titanium levels, reaction temperatures, and molar ratios of phosphorus to titanium levels. The oligomer charge, equipment and antimony catalyst solution are the same as described in Example 1. The vacuum in the finisher reaction zone is fixed at 0.2 torr. Using the lowest vacuum possible produces the fastest time to IV, which enables one to better look at the effect of higher P:Ti mole ratios than would otherwise be possible. The phosphorus solution in the titanium catalyzed samples in this example is added at stage 8 between the first and second prepolymerization zones during polycondensation. Vacuum is applied in successive stages as stated in the following array. Stir Time Temperature Vacuum Speed Stage Minutes C.° Torr rpm 1 0.1 270 730 0 2 10 270 730 150* 3 2 270 140 300* 4 1 270 140 300 5 10 270 25* 300 6 10 270 25 300 7 1 270 140* 300 8 2 270 140 300 9 1 270 25* 300 10 10 270 25 300 11 2 270 0.2* 30* 12 1 270 0.2 30 13 500# 270 0.2 30 *= ramp; #= torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). The polyester polymer melt phase product samples are tested for L* and b* at either different reaction temperatures, catalyst levels, and/or vacuum levels. The Ih.V. target for each experiment is 0.8 dL/g. In the Ti case, the measured IhV's are within ±0.05 dL/g of the target except for one at 285° C. and two at 300° C. (X28951-168, 169, 187). In the Sb case, the measured IhV's are within ±0.05 dL/g of the target except for one at 270° C. Table 2 sets forth reaction temperatures, catalyst levels, vacuum levels, phosphorus levels, and L* and b* colors. TABLE 2 Temp Time to Sample (deg P/M Ti Sb P IV IhV L* % No. C.) Ratio (ppm) (ppm) (ppm) (min) (dL/g) powder b* powder Crystalinity 21C 270 0 10.0 1.90 59.55 0.749 82.80 9.70 37.8 22 270 0 133 3 182.88 0.762 80.46 8.12 23 270 0 398 1 75.33 0.726 79.08 3.41 24C 270 0 20.0 1.25 49.50 0.751 81.45 10.66 25C 270 0.8 18.6 7.90 95.07 0.784 82.10 8.42 26 270 0.5 264 35 92.40 0.754 82.01 5.52 40.8 27C 270 1.6 9.5 9.00 302.82 0.769 82.76 8.64 38.7 28C 270 1.6 19.0 18.00 268.50 0.750 79.81 8.22 29 270 1 130 29 158.84 0.761 84.79 6.81 30 270 1 378 102 120.73 0.765 79.09 4.29 31C 285 0 15.0 1.45 22.08 0.785 79.37 10.71 32 285 0 267 3 47.65 0.778 76.16 5.23 48.6 33C 285 0.8 10.0 5.50 41.17 0.782 79.98 8.82 38.8 34C 285 0.8 10.0 5.50 43.50 0.808 81.88 10.07 38.7 35C 285 0.8 15.1 7.35 39.10 0.780 82.76 10.83 36C 285 0.8 14.8 7.60 33.38 0.753 83.68 10.84 37C 285 0.8 14.7 7.20 38.45 0.788 81.33 9.93 38C 285 0.8 14.6 7.15 41.90 0.786 82.15 9.39 39C 285 0.8 14.7 7.20 30.57 0.760 81.54 9.03 40C 285 0.8 14.7 7.55 35.62 0.779 81.36 9.20 41C 285 0.8 20.0 9.50 29.95 0.731 80.43 9.73 42 285 0.5 133 17 102.30 0.785 80.73 6.02 43 285 0.5 128 22 87.24 0.78 83.78 7.72 44 285 0.5 259 33 44.25 0.773 78.74 3.41 45 285 0.5 263 32 48.98 0.769 77.74 3.77 46 285 0.5 267 31 42.77 0.759 79.00 4.63 42.8 47 285 0.5 260 32 49.75 0.771 79.73 4.37 48 285 0.5 264 34 52.22 0.782 76.33 2.99 40.3 49 285 0.5 262 34 40.97 0.746 81.79 5.23 50 285 0.5 380 50 42.00 0.806 74.13 3.81 51 285 1 261 63 49.35 0.787 76.2 3.25 26.3 52C 300 0 10.0 1.40 13.95 0.800 82.25 11.82 34.9 53C 300 0 20.0 1.60 13.72 0.844 80.23 13.92 54 300 0 135 2 44.93 0.755 81.97 9.60 55 300 0 388 3 10.62 0.771 77.41 3.16 56C 300 0.8 14.9 7.50 13.00 0.732 80.19 11.60 57 300 0.5 262 33 16.78 0.805 77.70 3.43 39.3 58 300 1 131 31 36.73 0.788 83.32 6.09 59 300 1 371 90 9.65 0.754 73.62 2.78 60C 300 1.6 20.0 19.00 23.08 0.737 83.68 11.49 61C 300 1.6 10.0 8.00 32.95 0.778 83.07 11.59 62C 300 1.6 10.0 9.00 33.35 0.781 83.69 10.91 36.4 63C 285 1.6 15.0 15.50 90.50 0.853 80.69 10.11 Example 3 This example evaluates the level of colorant that needs to be added to a titanium and an antimony catalyzed fully formulated polyester polymer composition to obtain similar b* color levels; the effect on L* color by the addition of the colorant toners, and the reaction time to reach similar It.V. levels. In this example, phosphorus thermal stabilizers are added to polyester polymers catalyzed with low levels of titanium (5 ppm) at relatively low temperatures (270° C.). When terminating a polymer run at a torque equivalent to approximately 0.80 IhV, the reaction time was about 155 min. The P/Ti mole ratio was at least one. After the 155 minutes of polymerization time, the vacuum was broken, the phosphorus compound was added, and vacuum was resumed to enhance mixing. In this example, the phosphorus compound is either phosphoric acid or an oligomeric phosphate triester. To avoid a potential loss in It.V., a concentrated form of the phosphorus compound was used. By using a concentrated form of the phosphorus compound, the amount of solvent present which could hydrolyze or glycolyze the polymer is reduced. Phosphoric acid was added as an 85 weight % solution in water. The smallest amount of phosphoric acid that can be reproducibly added by volume via syringe to the polymer is 0.02 mL, which corresponds to a target of about 80 ppm P in the polymer. Oligomeric phosphate trimesters were added directly as a 9 wt./wt. % phosphorus solution. The smallest amount of the oligomeric phosphate triesters that could be reproducibly added by volume via syringe to the polymer was 0.02 mL, which corresponds to a target of about 20 ppm P in the polymer. The following array sets forth the processing conditions for making the titanium catalyzed polymers using about 5 ppm Ti and using the oligomer mixture starting materials and amounts described as in Example 1, except that the oligomeric mixture contained about 1.5 DEG, and the degree of conversion, with some variance among batches, ranged from about 90% to 95%. The phosphorus compounds were added at stage 12. Two polymer runs were made per the following array, one for the addition of phosphoric acid, and one for the addition of oligomeric phosphate triesters. Time Temp Vacuum Stir Speed Stage minutes C.° torr rpm 1 0.1 270 730 0 2 10 270 730 150 3 2 270 140 300 4 1 270 140 300 5 10 270 51 300 6 5 270 51 300 7 1 270 4.5 300 8 20 270 4.5 300 9 2 270 0.8 30 10 155 270 0.8 30 11 3 270 650 30 12 2 270 650 30 13 1 270 0.5 45 14 5 270 0.5 45 * = ramp; # = torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). Typical conditions for polymerizations catalyzed by antimony compounds are at about 285° C. and about 250 ppm Sb in the polymer. When terminating a polymer run at a torque equivalent to approximately 0.80 IhV, the reaction time was about 58 minutes. The following array was used for runs catalyzed by about 250 ppm Sb using the same oligomeric mixture as in Example 1, except that the oligomeric mixture contained about 1.5 DEG, and the degree of conversion, with some variance among batches, ranged from about 90% to 95%. The phosphorus compound(s) was added in stage 12. Two polymer runs were conducted per the following array, one for the addition of phosphoric acid, and one for the addition of oligomeric phosphate trimesters. Time Temperature Vacuum Stir Speed Stage Minutes C.° torr rpm 1 0.1 285 730 0 2 10 285 730 150 3 2 285 140 300 4 1 285 140 300 5 10 285 51 300 6 5 285 51 300 7 1 285 4.5 300 8 20 285 4.5 300 9 2 285 0.8 30 10 58 285 0.8 30 11 3 285 650 30 12 2 285 650 30 13 1 285 0.5 45 14 5 285 0.5 45 * = ramp; # = torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). Table 3 sets forth analytical results comparing the titanium catalyzed and the antimony catalyzed polymers stabilized with phosphoric acid. Blue and red organic toners were added to target a disc b* color target of about 2 CIELAB units. A small amount (0.0005 g) of black iron oxide from Ferro, was added to increase the reheat rate of the Ti-catalyzed polymer to match the reheat rate of the Sb-catalyzed polymer. TABLE 3 Red Blue RHI Toner Toner P ItV 3 disc 3 disc 3 disc (Ref. Powder Powder Powder % Catalyst (ppm) (ppm) ppm dL/g L* a* b* 9921W) L* Color a* Color b* Color Crystalinity Ti 7.6 15.2 81 0.809 75.47 −0.99 1.80 0.99 74.86 −1.35 −2.84 38.1 Sb 6.29 12.58 87 0.848 73.81 0.59 2.97 0.987 74.3 −0.41 −2.9 34.7 Table 4 sets forth analytical results comparing the titanium catalyzed and the antimony catalyzed polymers stabilized with an oligomeric phosphate triester. Blue and red organic toners were added to target a disc b* color target of about 2 CIELAB units. The reheat rates of the Ti-catalyzed polymer matched that of the Sb-catalyzed polymer within test error; therefore no black iron oxide was added. TABLE 4 Red Blue RHI Toner Toner P ItV 3 disc 3 disc 3 disc (Ref. Powder Powder Powder % Catalyst ppm ppm ppm dL/g L* a* b* 9921W) L* a* b* Crystalinity Ti 8.69 17.39 15 0.855 75.68 0.03 0.92 0.97 73.69 −0.69 −4 39.3 Sb 6.69 13.38 18 0.881 77.27 1.19 2.54 0.967 75.91 0.12 −2.62 38.5 When the disc b* color (+/−2) and reheat are made similar with toners and reheat additives (when needed), less toner was added to the Sb catalyzed polymer to provide similar b* color. However, the polymer catalyzed with 250 ppm Sb at 285° C. has the distinct advantage of a much shorter reaction time than polymer catalyzed by the 5 ppm Ti at 270° C. scenario to attain the same It.V., while maintaining at least comparable brightness and yellowness. Example 4 In example 3, the finisher residence time of the low Ti/low temperature option was about 2.7 times longer than that of the option with 250 ppm Sb and 285° C. To compare color between the two catalyst systems when the finisher residence times are more similar, the titanium level in this example is increased to 10 ppm and the temperature is kept at 270° C. The following array is used for these runs. Time Temperature Vacuum Stir Speed Stage minutes C.° torr rpm 1 0.1 270 730 0 2 10 270 730 150 3 2 270 140 300 4 1 270 140 300 5 10 270 51 300 6 5 270 51 300 7 1 270 4.5 300 8 20 270 4.5 300 9 2 270 0.8 30 10 66 270 0.8 30 11 3 270 650 30 12 2 270 650 30 13 1 270 0.5 45 14 5 270 0.5 45 * = ramp; # = torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). Under these conditions, the finisher time for Ti-catalyzed runs was around 66 min. The smallest amount of the oligomeric phosphate triesters that was reproducibly added by volume via syringe to the polymer is 0.02 mL, which corresponds to a target of about 20 ppm P in the polymer. In the following table 5, the Sb run is the same one shown earlier in Example 3, using the oligomeric phosphate tri-ester as the phosphorus source (Table 4). The reheat rate of the Ti-catalyzed polymer matched that of the Sb-catalyzed polymer within test error; therefore, no black iron oxide was added. Red and blue toners were added at levels sufficient to target similar b* colors. Table 5 sets forth the results analyzed for a*, b* and L* color. TABLE 5 Red Blue RHI Toner Toner P ItV 3 disc 3 disc 3 disc (Ref. Powder Powder Powder % Catalyst ppm ppm ppm dL/g L* a* b* 9921W) L* a* b* Crystalinity Ti 9.06 18.13 12 0.816 73.80 0.06 1.84 0.993 74.76 −0.58 −4.8 37.2 Sb 6.69 13.38 18 0.881 77.27 1.19 2.54 0.967 75.91 0.12 −2.62 38.5 The results indicate that less toners have to be added in an Sb catalyzed polymer to provide similar b* color to a titanium catalyzed polymer when the latter is made at similar reaction times. The L* brightness of Sb catalyzed polymer was higher than the L* brightness of the titanium catalyzed polymer. Example 5 To further compare color between the two catalyst systems when the finisher residence time is more similar, in this case the titanium level was kept at 5 ppm while the reaction temperature was increased to 289° C. The following array was used. Temperature Vacuum Stir Speed Stage Time minutes C.° torr Rpm 1 0.1 289 730 0 2 10 289 730 150* 3 2 289 140 300* 4 1 289 140 300 5 10 289 51* 300 6 5 289 51 300 7 1 289 4.5* 300 8 20 289 4.5 300 9 2 289 0.8* 30* 10 48 289 0.8 30 11 3 289 650* 30 12 2 289 650 30 13 1 289 0.5* 45* 14 5 289 0.5 45 *= ramp; # = torque termination when temperature = 300° C., change all 270 to 300 (for 285° C., change all 270 to 285). Under these conditions, the finisher time for the Ti-catalyzed run was about 48 minutes. The smallest amount of the oligomeric phosphate triesters that was reproducibly added by volume via syringe to the polymer is 0.02 mL, which corresponds to a target of about 20 ppm P in the polymer. In the following table, the Sb run is the same one shown earlier in Example 3, Table 4. The reheat rate of the Ti-catalyzed polymer matched that of the Sb-catalyzed polymer within test error; therefore, no black iron oxide was added. Red and blue toners were added at levels sufficient to target similar b* colors. Due to the difficulties encountered in attempting to target similar b*, test variability, or one run wherein a high amount of phosphorus was added, the results of each titanium run are reported. Table 6 sets forth the results analyzed for a*, b* and L* color. TABLE 6 Red Blue RHI Toner Toner P ItV 3 disc 3 disc 3 disc (Ref. Powder Powder Powder % Catalyst ppm ppm ppm dL/g L* a* b* 9921W) L* a* b* Crystalinity Ti 7.69 15.39 13 0.898 73.80 −0.24 4.19 0.997 73.3 −0.87 −2.41 34.1 Ti 7.69 15.39 13 0.899 74.64 −1.18 2.36 0.993 73.69 −1.37 −3 34.7 Ti 7.69 15.39 25 0.866 75.01 −2.14 1.02 0.996 74.29 −1.91 −2.96 34.1 Sb 6.69 13.38 18 0.881 77.27 1.19 2.54 0.967 75.91 0.12 −2.62 38.5 The results indicate that less toner is added to an antimony catalyzed polymer to provide similar b* color to a titanium catalyzed polymer reacted with comparable fast reaction times. The L* of the Sb catalyzed polymer was also brighter than the L* of any of the Ti catalyzed polymers.
<SOH> BACKGROUND OF THE INVENTION <EOH>In European patent application 1 188 783 A2 and U.S. Pat. No. 6,559,271, a process for making high IV PET in the melt phase is described. In this patent, high IV PET catalyzed with a titanium based compound is described as providing a good compromise between reactivity and selectivity when a low dosage of titanium metal and a low reaction temperature is chosen to obtain optimal increase in molecular weight and reduce the chance of thermal decomposition. By providing a more thermally stable polymer, the level of acetaldehyde (“AA”) generated in the polymer is reduced. The amount of AA generated by the described process in the base polymer is not stated, but after addition of an excess amount of AA bonding agent, the contemplated amount of AA in the polymer melt is described as ranging from 1 to 10 ppm directly after polycondensation. Recognizing that M bonding additives can cause a stronger or weaker yellowing of the polyester polymer, the patent recommends controlling the color imparted by the AA reducing additives by adding bluing toners to the melt. We have discovered that titanium catalyzed polycondensation reactions impart an unacceptably high yellow color to high It.V. base polyester polymers made in the melt phase as indicated by their high b*, a problem not addressed by U.S. Pat. No. 6,559,271. Adding sufficient amount of bluing toner to overcome the yellow color imparted to the melt by a titanium-catalyzed reaction presents the further problem of having to use higher amounts of bluing toners, which has the potential for reducing the brightness of the polymer and increases the costs for making the polymer composition. In order to reduce the level of AA in the melt phase polymer, the process described in U.S. Pat. No. 6,559,271 operates the melt phase at a reduced temperature and with a reduced titanium catalyst concentration, i.e. low reaction temperature on the order of 270° C. and less than 10 ppm Ti metal as the catalyst concentration. However, by reducing the reaction temperature and catalyst concentration, the reaction time required to attain the same target molecular weight also increases. It would be desirable to implement a solution to make a high It.V. polymer in the melt phase with a better, lower b* (a measure of the yellow hue in the polymer). Moreover, it would also be desirable to retain the same or better, shorter reaction times to a target high It.V. in the melt compared to the reaction time needed to obtain the same target It.V. in titanium-catalyzed reactions with an acceptable b* color.
<SOH> SUMMARY OF THE INVENTION <EOH>We have found a process for making a high It.V. polyester polymer melt phase product in which the base polymer from the melt phase has acceptable b* color. In the process, a polyester polymer made in the melt phase with high It.V. now has a better, lower b* color relative to titanium catalyzed reaction products at equivalent reaction times. Surprisingly, we have also discovered a process which allows for wide latitude of catalyst concentrations and polycondensation reaction temperatures while simultaneously obtaining a base polyester polymer having lower b* relative to titanium catalyzed melt phase reactions. We have also discovered that in the process of the invention, the time of reaction to obtain a high It.V. target is shorter than in a titanium-catalyzed process at low titanium catalyst dosages and low reaction temperatures, even though titanium based catalysts are known to be highly active. There is now provided a melt phase process for making a polyester polymer melt phase product comprising adding an antimony containing catalyst to the melt phase, polycondensing a melt containing said catalyst in the melt phase until the It.V. of the melt reaches at least 0.75 dL/g. There is also provided polyester polymer melt phase pellets having an It.V. of at least 0.70 dL/g obtained without solid state polymerization and containing antimony residues. There is further provided a process comprising feeding to an extruder a polyester polymer composition comprising a melt phase product containing antimony residues and having an It.V. of at least 0.70 dL/g obtained without increasing the molecular weight of the melt phase product by solid state polymerization, melting the polyester polymer composition to produce a molten polyester polymer, extruding the molten polyester polymer composition through a die to form shaped articles. There is also provided a melt phase process for making a polyester polymer melt phase product containing at least 100 ppm antimony based on the weight of the product comprising adding an antimony-containing catalyst to the melt phase; polycondensing a melt containing said catalyst in the melt phase; and before the It.V. of the melt reaches 0.45 dL/g, continuously polycondensing the melt either at a temperature within a range of 265° C. to 305° C. or at sub-atmospheric pressure or a combination thereof, in each case until the It.V. of the melt reaches at least 0.75 dL/g; to produce said polyester polymer melt phase product having a b* color in the range of −5 to +5 (CIELAB units). The color units are always in CIELAB units unless otherwise stated. There is further provided a melt phase process for making a polyester polymer melt phase product comprising polycondensing a melt in the presence of an antimony-containing catalyst to an It.V. of at least 0.75 dL/g, wherein said product has a b* color of −5 to +5, and an L* of at least 70. The melt phase product optionally contains a bluing toner and/or a reheat enhancing aid made in situ, added to the melt, or added after solidifying the melt, or any combination thereof. The bluing toner is preferably an organic toner. In yet another embodiment, there is provided a melt phase process for making a polyester polymer melt phase product comprising: a) esterifying or transesterifying a diol with a a carboxylic acid component comprising dicarboxylic acids, dicarboxylic acid derivatives, and mixtures thereof to produce an oligomeric mixture; b) polycondensing the oligomeric mixture to produce a polyester polymer melt having an It.V. of at least 0.75 dL/g; and c) adding an antimony compound to the melt phase before the It.V. of the polyester polymer melt reaches 0.45 dL/g; and d) optionally adding a stabilizer to the melt phase; wherein the polyester polymer melt phase product has a b* color of −5 to +5. Preferably, polycondensation catalysts added to the polycondensation zone are free of titanium-containing compounds, and in a direct esterification process, the entire melt phase reaction proceeds in the absence of titanium-containing compounds, and most preferably, in an ester exchange route, the entire melt phase reaction also proceeds in the absence of titanium-containing compounds. In yet another embodiment, the only polycondensation catalyst added to the melt phase in a direct esterification process is an antimony containing compound(s). There is also provided a process for making a polyester polymer by melt phase polymerizing a melt in the presence of an antimony-containing catalyst to produce a melt phase product, wherein the reaction time of the melt between an It.V. of 0.45 to an It.V. in the range of 0.70 dL/g to 0.90 dL/g is 100 minutes or less. Preferably, the pressure applied within this range is about 2 mm Hg or less. Moreover, the melt phase product produced by this process has a b* within a range of −5 to +5. There is also provided polyester polymer having a degree of crystallinity of at least 25% and an It.V. of at least 0.70 dL/g without solid state polymerizing the polymer, said polymer comprising antimony residues and having a b* color of −5 to +5 and an L* of at least 70. The polymer is desirably substantially free of titanium residues. detailed-description description="Detailed Description" end="lead"?
20040309
20080415
20050915
97379.0
2
BOYKIN, TERRESSA M
HIGH IV MELT PHASE POLYESTER POLYMER CATALYZED WITH ANTIMONY CONTAINING COMPOUNDS
UNDISCOUNTED
0
ACCEPTED
2,004
10,796,242
ACCEPTED
Speech animation
Methods and systems, including computer program products, for speech animation. The system includes a speech animation engine and a client application in communication with the speech animation engine. The client application sends a request for speech animation to the speech animation engine. The request identifies data to be used to generate the speech animation, where speech animation is speech synchronized with facial expressions. The client application receives a response from the speech animation engine. The response identifies the generated speech animation. The client application uses the generated speech animation to animate a talking agent displayed on a user interface of the client application. The speech animation engine receives the request for speech animation from the client application, retrieves the data identified in the request without user intervention, generates the speech animation using the retrieved data and sends the response identifying the generated speech animation to the client application.
1. A system, comprising: a speech animation engine; and a client application in communication with the speech animation engine, wherein the client application is operable to perform the following operations: sending a request for speech animation to the speech animation engine, the request identifying data to be used to generate the speech animation, the speech animation being speech synchronized with facial expressions; receiving a response from the speech animation engine, the response identifying the generated speech animation; and using the generated speech animation to animate a talking agent displayed on a user interface of the client application; and wherein the speech animation engine is operable to perform the following operations: receiving the request for speech animation from the client application; retrieving the data identified in the request without user intervention; generating the speech animation using the retrieved data; and sending the response identifying the generated speech animation to the client application. 2. The system of claim 1, wherein retrieving the data includes retrieving the data in real time. 3. The system of claim 1, wherein the data specifies text to be used to generate the speech animation. 4. The system of claim 3, wherein the text includes variable elements. 5. The system of claim 1, wherein the data specifies a voice to be used to generate the speech animation. 6. The system of claim 1, wherein the data specifies a pool of synonyms; and generating the speech animation includes selecting a synonym from the pool of synonyms. 7. The system of claim 1, wherein the request further identifies context information taken from a live session of the client application; and generating the speech animation includes incorporating the context information into the generated speech animation. 8. The system of claim 7, wherein the context information includes information about a user of the client application. 9. The system of claim 1, wherein: the client application is a web application; and the request is an HTTP request. 10. A computer program product, tangibly embodied in an information carrier, the computer program product being operable to cause data processing apparatus to perform operations comprising: receiving a request from a client application for speech animation, the request identifying data to be used to generate the speech animation, the speech animation being speech synchronized with facial expressions; retrieving the data without user intervention; generating the speech animation using the retrieved data; and sending a response identifying the generated speech animation to the client application. 11. The product of claim 10, wherein retrieving the data includes retrieving the data in real time. 12. The product of claim 10, wherein the data specifies text to be used to generate the speech animation. 13. The product of claim 12, wherein the text includes variable elements. 14. The product of claim 10, wherein the data specifies a voice to be used to generate the speech animation. 15. The product of claim 10, wherein the data specifies a pool of synonyms; and generating the speech animation includes selecting a synonym from the pool of synonyms. 16. The product of claim 10, wherein the request further identifies context information taken from a live session of the client application; and generating the speech animation includes incorporating the context information into the generated speech animation. 17. The product of claim 16, wherein the context information includes information about a user of the client application. 18. The product of claim 10, wherein: the client application is a web application; and the request is an HTTP request.
CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority based on U.S. Patent Application No. 60/495,699 for Dynamic Data-Driven Speech Animation and Intelligent Behaviors, filed Aug. 18, 2003. BACKGROUND The present invention relates to data processing by digital computer, and more particularly to speech animation. Speech animation refers to speech that is synchronized with facial expressions. Existing speech animation systems require user intervention to feed input text into the system. Typically, users must either manually enter the text or manually load a text file into the system. SUMMARY OF THE INVENTION In general, in one aspect, the present invention provides methods and systems, including computer program products, implementing techniques for speech animation. The techniques include receiving a request from a client application for speech animation, the request identifying data to be used to generate the speech animation, the speech animation being speech synchronized with facial expressions; retrieving the data without user intervention; generating the speech animation using the retrieved data; and sending a response identifying the generated speech animation to the client application. The system includes a speech animation engine and a client application in communication with the speech animation engine. The client application sends a request for speech animation to the speech animation engine. The request identifies data to be used to generate the speech animation, where speech animation is speech synchronized with facial expressions. The client application receives a response from the speech animation engine. The response identifies the generated speech animation. The client application uses the generated speech animation to animate a talking agent displayed on a user interface of the client application. The speech animation engine receives the request for speech animation from the client application, retrieves the data identified in the request without user intervention, generates the speech animation using the retrieved data and sends the response identifying the generated speech animation to the client application. Implementations may include one or more of the following features: Retrieving the data includes retrieving the data in real time. The data specifies text to be used to generate the speech animation. The text includes variable elements. The data specifies a voice to be used to generate the speech animation. The data specifies a pool of synonyms and generating the speech animation includes selecting a synonym from the pool of synonyms. The request further identifies context information taken from a live session of the client application; and generating the speech animation includes incorporating the context information into the generated speech animation. The context information includes information about a user of the client application. The client application is a web application; and the request is an HTTP request. The invention can be implemented to realize one or more of the following advantages: The raw data used to generate the speech animation content is retrieved automatically by the system. Manual feeding of text into the system is no longer required. This makes the system more scalable. The raw data is retrieved in real time, rather than in advance. This ensures that the most up-to-date version of the data is retrieved. The raw data includes dynamic or variable elements. The variable elements are adapted to suit a particular client application or user of the client application. This enables the speech animation content to be more interesting and personalized and makes the speech animation client appear more socially intelligent to a user of the client application. This also enables the system to be more scalable because the number of different speech utterances in the speech animation output is not limited by the input text. The dynamic elements enable the system to generate a potentially infinite number of variations to the input text. It is easy for client applications to integrate or interface with the system. The system provides a single point of entry for all client requests. Also, the system provides a set of custom scripting tags that developers of client applications can incorporate into the user interface code for the client applications. These tags expand into code that invokes the system. One implementation of the invention provides all of the above advantages. The details of one or more implementations are set forth in the accompanying drawings and the description below. Further features, aspects, and advantages of the invention will become apparent from the description, the drawings, and the claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a system in accordance with the invention. FIG. 2 is a flow diagram of a method in accordance with the invention. FIGS. 3 and 4 are block diagrams of one implementation of the system where the system includes an application tier. FIG. 5 is a flow diagram of data flow within the application tier. FIG. 6A is an example of an XML schema used by the system. FIG. 6B is an example of XML data used by the system. FIG. 7A is an example of a dynamic text template that uses custom markup tags. FIG. 7B is an example of a dynamic text template that uses speech sets. FIG. 7C is an example of static text produced from a dynamic text template. Like reference numbers and designations in the various drawings indicate like elements. DETAILED DESCRIPTION As shown in FIG. 1, a system 100 includes a speech animation engine 110 and one or more client applications 120. The client applications can include a variety of different application programs including, but not limited to: a personal information management application program, an application program to process a business transaction, an application program to operate a computing device, an entertainment application program, or a game. To provide for interaction with a user, the client applications 120 run on a computer having a display device for displaying visual content to the user and an audio device for providing audio content to the user. The client applications 120 make requests to the speech animation engine 110 for code that displays or animates a talking agent 150 on the client application's user interface 130. The talking agent is represented graphically on the user interface 130 in the form of a cartoon head, animal or some other graphical icon. These animation requests identify the raw data 140 to be used to generate the speech animation content for the talking agent 150. In response to such animation requests, as shown by method 200 of FIG. 2, the speech animation engine 110 retrieves the raw data (step 210) and generates speech animation content based on the raw data (step 220). The raw data 140 is stored in a location accessible by the speech animation engine. The speech animation engine 110 performs the retrieval and generation steps automatically, that is, without user intervention. In addition, the retrieval and generation steps can occur in real time, as requests are made, as opposed to occurring in advance of the requests. FIGS. 3 and 4 illustrate one implementation 300 of the system 100. In this implementation 300, the speech animation engine 110 includes an application tier 310, an animation tier 320 and a text-to-speech (TTS) tier 330. The application tier 310 includes one or more application servers 340, for example, Tomcat servers. The application servers 340 have access to the raw data 140 identified in the animation requests. The raw data is retrieved using a connectivity technology such as JDBC (Java Database Connectivity), a technique for connecting programs written in Java to a variety of different databases. The animation tier 320 includes one or more animation servers 350. The animation servers are operable to convert audio data generated by the TTS tier into speech animation content. The generated speech animation content is saved to a web-based file share or other storage mechanism that is accessible by the client applications 120. The animation servers 350 can be implemented using a variety of different speech animation technologies including Crazy Talk by Reallusion or Pulse Server by Pulse. The Pulse server is an Apache web server module that is initialized and made available by an Apache web server. Speech animation content generated by Pulse is represented in pwc format. The TTS tier 330 includes one or more TTS servers 360. The TTS servers 360 are operable to convert textual data to audio (speech) data. The text data can be represented in a variety of text-to-speech markup formats including the Microsoft Speech Application Programming Interface (SAPI) 5.1 format. Text markup will be described in more detail below. The audio data can be represented in a variety of formats including the wav format. Data is exchanged between the TTS tier 330 and the animation tier 320 using a connectivity technology such as SAPInet Server by Pulse. To improve system performance, more than one server can be deployed in a given tier. When multiple servers are deployed, a load balancer 370 can be used to manage distribution of workload. It is not necessary to have a one-to-one relationship between the servers in the different tiers. Optionally, a caching mechanism is employed to improved system performance. Caching will be discussed in more detail below with reference to the FataURLCache. In this implementation 300, as shown in FIG. 4, the client application 120 is a web-based application whose interface is rendered in a web browser 410. The web browser 410 must be able to render the animation. If this functionality is not already built into the web browser, the browser can be extended by installing a browser plug-in. The application tier 310 includes a web content subsystem 420 that is accessible to the web browser 410. The web content includes static content, such as HTML (Hypertext Markup Language) text and images, and dynamic content, such as JSP (JavaServer Pages) code. The JSP code invokes services provided by the FataDataFactory 430, another subsystem of the application tier 310. These services include services that display and animate the talking agent 150 on the client's user interface. The FataDataFactory subsystem 430 is the single point of entry for all animation requests from client applications 120. The FataDataFactory subsystem manages and provides access to FataData 440, raw data that is used by the system to generate the speech animation content. All or portions of the FataData can be represented in XML (eXtensible Markup Language) format. XML will be discussed below with reference to FIGS. 6A and 6B. The FataDataFactory subsystem 430 also provides access to external data sources such as databases that reside outside the system. A PulseBehaviorHandlerClient subsystem 450 is responsible for conveying the animation requests to the Pulse server on the animation tier 320. The PulseBehaviorHandlerClient subsystem 450 first converts the animation requests into SOAP payloads, and then sends the requests to a dispatcher component of the Pulse server. A FataURLCache subsystem 460 manages a cache on the shared-storage. The cache includes speech animation content as well as mappings between FataData objects and the speech animation content. The FataURLCache subsystem 460 checks each animation request against the cache first, speeding up responses if an identical animation request has previously been made. The FataURLCache subsystem 460 is responsible for removing content from the cache when the cache is full or when the content is no longer accessible. System Initialization and Operation To use the system 300, a client application 120 first instantiates the FataDataFactory 430 and the FataURLCache 460. The FataDataFactory 430 will then load all of the FataData 440. The FataData 440 is loaded dynamically during run time rather than in advance to ensure that the most up-to-date version of the FataData 440 is loaded. As illustrated, the system 300 can provide a servlet program 470 that initializes the FataDataFactory 430, the FataURLCache 460 and the FataData 440. The servlet 470 also registers the FataDataFactory with the current servlet context, so that the client application 120 may have access to the services provided by the FataDataFactory. The servlet 470 is also responsible for destroying these subsystems and loaded resources during system shutdown. After system initialization is complete, the system 300 is ready to process client requests. As shown by method 500 of FIG. 5, a typically request-response cycle begins when the client application 120 sends an HTTP (Hypertext Transfer Protocol) request to the system through the web content subsystem (step 510). The HTTP request can be a request to load a talking agent or a request to animate an already loaded talking agent. The request to load a talking agent includes a parameter that identifies the talking agent 150 to be loaded. The request to animate a talking agent includes a parameter that identifies the raw data 140 to be used to generate the speech animation content. The request is received by the FataDataFactory (step 520). The FataDataFactory locates all the FataData needed to complete the request (step 530). For example, the FataDataFactory 430 can match the request parameters against a map or table of all the FataData. The FataDataFactory 430 then converts the request into a format compatible with the PulseBehaviorHandlerClient 450 and forwards the request to the PulseBehaviorHandlerClient 450. The PulseBehaviorHandlerClient 450 sends the request to the Pulse server 480 as a SOAP payload (step 550). Prior to sending the request to the Pulse server 480, the PulseBehaviorHandlerClient 450 checks the FataURLCache to see if the request is identical to any of the cached requests (step 540). If it is, then the PulseBehaviorHandlerClient 450 does not need to send the request to the Pulse server 480. If it is not, then the request is sent to the Pulse server 480. Upon receiving the request, the Pulse server 480 generates the requested speech animation content and saves it to the shared-storage 490. The system then returns the URL of the speech animation content to the client (step 560), which uses the URL to access the content (step 570). The above-described data flow is just an example. Other variations are possible. For example, instead of the PulseBehaviorHandlerClient 450 checking the cache, the FataDataFactory 430 can perform this check. Additional Features The following paragraphs describe additional features that can be incorporated into the above-described systems and methods. Event-Driven Communication In an event-driven or push implementation, after the main content has already been delivered to the client, the system maintains an open connection to the client so that it can continue to push additional content to the client after the main content has already been delivered and rendered. Whenever the system needs to change the content, it can deliver client-side scripts and Dynamic HTML (DHTML) to make the change. Pushlets offer one framework for pushing events to a web-based client, although other frameworks may be used. Alternatively, a polling mechanism may be used instead of push to eliminate the need for a constant connection between the client and the system. With polling, the system may need to include data structures for storing the state of the client after an initial request and then restoring the state of the client for a subsequent request. Custom Tags To make it easier for client applications 120 to interface with and make use of the speech animation system, the system can provide a set of custom scripting tags that developers of client applications can incorporate into the user interface code for the client applications. These tags expand into code that sends the animation requests to the speech animation system. The tags include a renderTalkingAgentJS tag, a renderFataJS tag and a renderRawJS tag. renderTalkingAgentJS Tag This tag generates the code to set up and display the talking agent 150 as part of the user interface 130 for the client application 120. The only required parameter for this tag is the address or URL (uniform resource locator) of the talking agent file. Optional parameters include the width, height, and background color of the talking agent. The following JSP(JavaServer Pages) code fragment illustrates use of this tag: <renderTalkingAgentJS path=“/TalkingAgents/bob/bob.pwr” width=“160” height=“210” bgColor=“bcbdc2”/>. This code renders a JavaScript function call that sets up the talking agent “/TalkingAgents/bob/bob.pwr” with width of 160 pixels and height of 210 pixels using a background color of “bcbdc2” (a grayish color). renderFataJS Tag This tag generates the code that animates the talking agent 150 and causes it to speak. Only one parameter is required for this file: a name parameter that identifies the name of the speech animation file to be used for the talking agent. The following JSP code fragment illustrates use of this tag: <renderFataJS name=“RES-greeting”/>. This code renders a JavaScript function call that causes the talking agent to speak and behave according to the contents of the FataData named “RES-greeting”. renderRawJS Tag This tag is used as an alternative to the renderFataJS tag. This tag allows speech animation data to be specified explicitly. Two parameters are used for this tag: A text parameter that specifies the text to be spoken and a voice parameter that identifies which voice to speak in. Optional parameters include the emotion (e.g., happy, unhappy, neutral), look (e.g., up, down, right, left), and expression (e.g., angry, confused, grin). The following JSP code fragment illustrates use of this tag: <renderRawJS voice=“Mary” text=“Hello hot-stuff.” emotion=“happy” expression=“wink”/>. This renders a JavaScript function call that causes the talking agent 150 to speak and animate the text “Hello hot-stuff” with the emotion “happy” and the expression “wink” using the voice “Mary”. XML Format FIGS. 6A and 6B illustrate how the FataData 440 can be structured in XML. FIG. 6A shows an example XML schema and FIG. 6B shows an implementation of this example schema. In FIG. 6A, the symbol (*) indicates required attributes. As illustrated, each <talking-head-data> element 610 has a required name (or alias), voice, and speech file. The remaining attributes (emotion, expression, and look) are optional. Each <speech-files> element 620 typically has only one attribute, the type, which may be one of two values: “set”, or “pool”. A set means that the set of <speech-data> elements associated with the <speech-files> element should be played in sequence. A pool indicates that a single <speech-data> element should be chosen randomly from the set. The pool can be used to define a pool of synonyms. Synonyms are equivalent content that can be used interchangeably. The use of synonyms enables the speech content to be variable. This makes the talking agent appear more socially intelligent to a user. Each <speech-data> element 630 contains the type and content of the raw data that is to be turned into speech by the TTS server. The content of this data depends heavily on the type. Special types of note are: ‘talking-head-data’—a pointer to another talking-head-data alias in the XML; ‘textFile’—a reference to an external text file containing the text to speak; ‘pwcFile’—a reference to a pre-generated speech animation file in pwc format (the format used by the Pulse server); ‘static’—raw text defined directly in the XML; ‘fataData’—dynamic data to be replaced based on the ‘value’. FIG. 6B illustrates an example of how the schema defined in FIG. 6A could be used to define an instance of the FataData 440. In this example, the XML code defines an animated greeting. The content of the animated greeting is randomly selected from a pool of synonymous content including: a reference to content defined in another FataData file 640; content to be dynamically generated based on some static text 650; content to be dynamically generated based on text stored in an external text file 660; pre-generated content 670; and a dynamic content field to be replaced by the user's name 680. Dynamic content will be discussed in more detail below. Text Markup The text included in the FataData 440 can include markup tags including TTS markup tags and custom markup tags. TTS Markup TTS markup tags define prosodic, pronunciation, intonation or inflection settings for the speech. The TTS markup tags can be implemented in a variety of text-to-speech markup formats including the Microsoft Speech Application Programming Interface (SAPI) 5.1 format and the VoiceXML format. The TTS markup is preserved by the application server and passed to the animation server, which in turn passes it to the TTS server. Dynamic Text Templates Custom markup tags are used to insert dynamic elements into the text to produce a dynamic text template. Custom markup tags can be implemented in a variety of text markup formats including XML. Custom markup tags are expanded by the application server before being passed to the animation server. The expansion involves filling in or supplying a value for the dynamic elements. The supplied value can come from the current application session. This is further illustrated by the dynamic text template shown in FIG. 7A. This template includes some static text elements 710 as well as a dynamic element 720. The value of “ProductName” will differ depending on which product the user has selected. FIG. 7C shows the resulting expanded text when the product “Grand Doohickey” has been selected. An alternative method to create a dynamic text template is using the speech sets described above with respect to FIG. 6. FIG. 7B illustrates use of speech sets to create a dynamic template that is equivalent in content to the one shown in FIG. 7A. While equivalent in content, the two types of dynamic templates may not necessarily be equivalent in performance because the system may process the two types differently. Speech sets are typically processed as segments that are then spoken in series to form the whole. By contrast, when using custom markup, the entire text is typically expanded and processed as a whole. Thus, one advantage of using custom markup is that there will be little or no pause between segments for loading speech files and the speech will not have unnatural breaks in the middle of sentences due to the segmentation of the text. At the same time, one advantage of using speech sets is that the response time is typically faster than using custom markup. Segments without dynamic elements can be cached and re-used repeatedly without having to be processed again. Caching also helps to reduce or eliminate the pause between speech segments. Adaptive Content In one implementation, the generated speech animation content is customized for a particular client application or user of the client application. In such cases, the request from the client further includes context information. The context information can be information about the particular application session (e.g., how long the session has been active) or information about a particular user of the application, for example, his personal characteristics (such as name, age, gender, ethnicity or national origin information, and preferred language) or his professional characteristics about the user (such as occupation, position of employment, and one or more affiliated organizations). The invention can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The invention can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network. Method steps of the invention can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by, and apparatus of the invention can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in special purpose logic circuitry. To provide for interaction with a user, the invention can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. The invention can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the invention, or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet. The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The invention has been described in terms of particular implementations. Other implementations are within the scope of the following claims. For example, the steps of the invention can be performed in a different order and still achieve desirable results.
<SOH> BACKGROUND <EOH>The present invention relates to data processing by digital computer, and more particularly to speech animation. Speech animation refers to speech that is synchronized with facial expressions. Existing speech animation systems require user intervention to feed input text into the system. Typically, users must either manually enter the text or manually load a text file into the system.
<SOH> SUMMARY OF THE INVENTION <EOH>In general, in one aspect, the present invention provides methods and systems, including computer program products, implementing techniques for speech animation. The techniques include receiving a request from a client application for speech animation, the request identifying data to be used to generate the speech animation, the speech animation being speech synchronized with facial expressions; retrieving the data without user intervention; generating the speech animation using the retrieved data; and sending a response identifying the generated speech animation to the client application. The system includes a speech animation engine and a client application in communication with the speech animation engine. The client application sends a request for speech animation to the speech animation engine. The request identifies data to be used to generate the speech animation, where speech animation is speech synchronized with facial expressions. The client application receives a response from the speech animation engine. The response identifies the generated speech animation. The client application uses the generated speech animation to animate a talking agent displayed on a user interface of the client application. The speech animation engine receives the request for speech animation from the client application, retrieves the data identified in the request without user intervention, generates the speech animation using the retrieved data and sends the response identifying the generated speech animation to the client application. Implementations may include one or more of the following features: Retrieving the data includes retrieving the data in real time. The data specifies text to be used to generate the speech animation. The text includes variable elements. The data specifies a voice to be used to generate the speech animation. The data specifies a pool of synonyms and generating the speech animation includes selecting a synonym from the pool of synonyms. The request further identifies context information taken from a live session of the client application; and generating the speech animation includes incorporating the context information into the generated speech animation. The context information includes information about a user of the client application. The client application is a web application; and the request is an HTTP request. The invention can be implemented to realize one or more of the following advantages: The raw data used to generate the speech animation content is retrieved automatically by the system. Manual feeding of text into the system is no longer required. This makes the system more scalable. The raw data is retrieved in real time, rather than in advance. This ensures that the most up-to-date version of the data is retrieved. The raw data includes dynamic or variable elements. The variable elements are adapted to suit a particular client application or user of the client application. This enables the speech animation content to be more interesting and personalized and makes the speech animation client appear more socially intelligent to a user of the client application. This also enables the system to be more scalable because the number of different speech utterances in the speech animation output is not limited by the input text. The dynamic elements enable the system to generate a potentially infinite number of variations to the input text. It is easy for client applications to integrate or interface with the system. The system provides a single point of entry for all client requests. Also, the system provides a set of custom scripting tags that developers of client applications can incorporate into the user interface code for the client applications. These tags expand into code that invokes the system. One implementation of the invention provides all of the above advantages. The details of one or more implementations are set forth in the accompanying drawings and the description below. Further features, aspects, and advantages of the invention will become apparent from the description, the drawings, and the claims.
20040308
20090505
20050224
98301.0
0
ALBERTALLI, BRIAN LOUIS
SPEECH ANIMATION
UNDISCOUNTED
0
ACCEPTED
2,004
10,796,423
ACCEPTED
Virtual call center
A system and methods are provided for enabling real-time call control with minimal requirements for dedicated telecommunications PBX and dedicated switching equipment. Dynamic call routing is handled by a network carrier's equipment and an interface is provided at the carrier switch to dynamically redirect calls from outside of the carrier's network. A call's signaling channel and bearer (voice) channel are separated, allowing the voice carriage to continue to be handled by the network carrier, but the routing of the call is controlled from outside of the carrier's network. A real-time signaling path and interface is provided into the carrier network such that the associated routing decisions and business logic can remain outside of the carrier network, while the carrier network continues to carry the voice channels.
1. In a call control system operative as a call center, a method for controlling routing of a telephone call comprising: receiving a call at an incoming gateway; signaling from the incoming gateway to a call control system that said call has been received by the incoming gateway; determining the termination point to which said telephone call should be delivered from incoming call information and information and availability of a qualified agent at a termination point; signaling with control signals from said call control system to an outgoing gateway coupled to said selected termination point; causing said outgoing gateway to connect to said incoming gateway via a digital voice packet connection; and directing said call from the outgoing gateway to said selected termination point. 2. The method according to claim 1 wherein said receiving step includes receiving the call from a publicly-switched telephone network into the incoming gateway, said incoming gateway converting said incoming phone call into digital voice packets. 3. The method according to claim 1 wherein said receiving step includes receiving the call in voice-over-IP format. 4. The method according to claim 1 wherein said directing step includes connecting the call via voice-over-IP means to a digital voice termination point. 5. The method according to claim 1 wherein said termination is via voice-over-IP. 6. The method according to claim 1 wherein said directing step comprises connecting the call via the publicly-switched telephone network. 7. The method according to claim 1 wherein said call control system is external and isolated from said incoming gateway and from said outgoing gateway, said call control system being connected through a firewall. 8. The method according to claim 1 wherein said call control system is external and isolated from said incoming gateway and from said outgoing gateway, said call control system being connected via a virtual private network. 9. The method according to claim 1 wherein said termination point is partially dependent upon a phone number to which said call is originally directed. 10. The method according to claim 1 wherein said termination point is partially dependent upon a phone number as originally called from. 11. The method according to claim 9 wherein said termination point is partially dependent upon a toll-free phone number to which said call is originally directed. 12. The method according to claim 1 wherein said incoming gateway is also said outgoing gateway. 13. The method according to claim 1 wherein said outgoing gateway is operative to forward digital voice packets from the incoming gateway without conversion. 14. The method according to claim 1 further including recording digital packet data from the incoming gateway in a digital storage unit. 15. The method according to claim 1 further including the step of dynamically redirecting the call from the termination point to a further termination point. 16. The method according to claim 1 further including signaling from the call control system to a visual display at the terminal point to convey related call-specific information to the agent at the termination point. 17. In a call control system operative according to the method of claim 1 further comprising an apparatus for contemporaneously signaling from a call control system to a visual display at the termination point to provide call-specific information regarding the call; and server operative to provide call-specific information to the agent screen at the termination point. 18. The apparatus according to claim 17 wherein said server is an instant messaging type server. 19. The apparatus according to claim 17 wherein said server is web type server which can interact with a window on a client terminal at the termination point. 20. The apparatus according to claim 17 wherein said server is proprietary messaging type server.
BACKGROUND OF THE INVENTION This invention relates to the fields of computer and communications. More particularly, the invention relates to the dynamic routing and control of a voice telephone call in real-time. In a company call center setting, a PBX or other switching equipment is deployed to redirect incoming customer calls to the next available customer service agent to handle the incoming customer call. This in-house PBX or switch equipment is often coupled to dedicated incoming phone lines which serve only that particular company. In addition to routing an incoming call, an associated “screen-pop” is often presented on an agent's display in parallel with the incoming phone call. This “screen-pop” typically provides the phone agent with information associated with the customer. Outsourced call centers provide a more generalized solution whereby a telecommunications infrastructure is shared among many customers. Outsourced call centers are typically serviced by many incoming phone line trunks which accept incoming phone calls for any of its customers. Agents may be dedicated to accept phone calls only for certain customers, but often agents are trained to accept incoming phone calls for a list of companies An automated call distribution (ACD) technique for this scenario is typically deployed by the call center's telecommunications equipment to automatically distribute the incoming calls to the appropriate agent. Known outsourced call centers have several limitations and economic challenges. First, dedicated equipment can handle only a certain peak number of phone calls. Although the average utilization rate of the equipment and phone lines is typically much lower than the peak capacity, the call center must still pay for enough equipment capacity to handle peak demands. The difference between the average utilization rate and the peak demand levels can be very large, thus creating an economically inefficient use of the expensive dedicated equipment infrastructure. Second, as a call center grows, it continually needs to expand its telecommunications infrastructure and the number of phone lines needed to handle the additional call load. The capital outlay for fixed telecommunications equipment is often expensive, and the optimal growth of the telecommunications infrastructure equipment can be difficult to predict. Third, if outsourced call centers use external agents physically outside of the company's premises, such as work-at-home phone agents or offshore phone agents, then the PBX or switched telecommunications solution is inherently inefficient: typically two legs (two circuits) of phone lines are required, the first being an incoming circuit used to deliver the incoming call to the PBX, the second being an outgoing circuit placed to connect from the PBX to the external agent. Thus two circuits are activated and required for each such call. What is needed is a solution that would improve efficiency and utilization rate of port use, provide higher available port capacity, use port capacity more flexibly (to reduce the need to accurately predict port needs), and provide an improved method of call routing for off-premises agents. SUMMARY OF THE INVENTION According to the invention, a system and methods are provided for enabling real-time call control with minimal requirements for dedicated telecommunications PBX and dedicated switching equipment. Dynamic call routing is handled by a network carrier's equipment and an interface is provided at the carrier switch to dynamically redirect calls from outside of the carrier's network. A call's signaling channel and bearer (voice) channel are separated, allowing the voice carriage to continue to be handled by the network carrier, but the routing of the call is controlled from outside of the carrier's network. A real-time signaling path and interface is provided into the carrier network such that the associated routing decisions and business logic can remain outside of the carrier network, while the carrier network continues to carry the voice channels. The invention will be better understood by reference to the following detailed description in connection with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram depicting a real-time call control system in accordance with an embodiment of the present invention. FIG. 2 is a flow chart of operations according to the invention. DESCRIPTION OF SPECIFIC EMBODIMENTS OF THE INVENTION The program environment in which an embodiment of the invention is executed illustratively incorporates a general-purpose computer or a special purpose device such as a telephone gateway. Details of such devices (e.g., processor, memory, data storage, display) are well known and are omitted for the sake of brevity. The techniques of the present invention may be implemented using a variety of technologies. For example, the methods described herein may be implemented in software executing on a computer system or implemented in hardware utilizing either a combination of microprocessors or other specially designed application specific integrated circuits (ASICs), programmable logic devices (PLDs), gate arrays or various combinations thereof. In particular, the methods described herein may be implemented by a sequence of computer-executable instructions transported by or residing on a medium, such as a carrier wave, disk drive, or computer-readable medium. Exemplary forms of carrier waves may take the form of electrical, electromagnetic or optical signals conveying digital data streams along a local network or a publicly accessible network such as the Internet. In one embodiment of the invention, a system and methods are provided for enabling an outside party to real-time control of a telephone call which is carried by a network carrier. FIG. 1 illustrate one embodiment of the invention. In FIG. 1, element 101 is a telephone from which a initial outgoing call is placed, element 102 is another example telephone. Element 201 is a Local Exchange Carrier (LEC) switch which receives the call from phone 101 and/or phone 102. Element 301 is within the Carrier Network System 300, and element 301 is an incoming gateway which receives calls from LEC switch 201, typically transported in SS7 or other signaling environments. Element 302 is within the Carrier Network System 300, and element 302 represents a digital Voice-over-IP pathway, typically signaled using SIP or other protocols, which connects calls from incoming gateway 301 to element 303. Element 303 is within the Carrier Network System 300, representing an outgoing gateway which terminates calls received over pathway 302, and terminating calls via pathway 304 to element 501. Element 304 is a pathway, usually carried using SS7 or other standard signaling environments, which terminates a call into call recipient 501. System 500 includes of a human operator agent who is associated with a terminal element that receives incoming phone calls via pathway 304 into agent phone 501, and who interacts with a simultaneously synchronized data terminal 502. Real-time information such as callerID, agent scripts that are associated with that incoming phone number at 201, and other agent-specific information and/or call-specific information, are displayed in real-time to the agent. System 500 could be physically close to or far from the other shown systems. System 500 is preferably replicated for each individual agent. System 600 is an alternative to System 500. There are combinations of both System 500 and System 600 in a typical total environment. System 600 includes a human operator agent who receives incoming phone calls at 601 via internet VoIP cloud 120 and via digital (internet) pathway 121. The agent in system 600 interacts with a simultaneously synchronized data terminal 602. Real-time information such as callerID, agent scripts that are associated with that incoming phone number at 201, and other agent-specific information, are displayed in real-time to the agent. System 600 could be physically close to or far from the other shown Systems. System 600 is preferably replicated for each individual agent. Pathway 110 represents a signaling-only pathway (no voice channels) which signals to element 403 whenever a call is received into element 301. Element 110 is carried over the internet via an encrypted virtual private network (VPN) tunnel. Element 107 represents a public or private internet channel. Path 111 represents a signaling-only pathway (no voice channels) which signals through Proxy Server 304 to Outgoing Gateway 303 of where and how to terminate the call initially signaled via 110. A call routing system 400 is a system which manages and controls the routing of voice calls in the virtual call center. Routing system 400 could physically be remote or in close proximity to system 300, system 500, or system 600. System 400 includes various sub-units which could reside on multiple or single computers/servers. Subsystem 401 is a database accessible to all subsystems within routing system 400. Call routing logic 402 contains the business logic and call routing algorithms that control the calls notified via the notification path 110. Server 403 is a network control interface which interfaces call routing system 400 to a carrier network 300. Agent interface server 404 is a web server which interfaces, via internet cloud 405, to multiple agent systems 500 and/or multiple agent systems 600. Pathway 122 represents a public or private internet channel or so-called internet cloud. Call recording system 700 records phone calls, on a streaming basis, on to hard disk or other storage devices. Pathway 112 controls system 700 for each individual call, or within sub-segments or each individual call. The operation of the invention associated with the foregoing virtual call center is outlined in FIG. 2. In a call control system operative as a call center, the method for controlling routing of a random incoming telephone call involves receiving the incoming call at an incoming gateway 301 (Step A), then causing signaling from the incoming gateway 301 to the call routing system 400 that an incoming call has been received by the incoming gateway 301 (Step B). Then the call routing logic 402 determines from incoming call information and information about availability of a qualified agent at a termination point 501 the specific termination point to which said telephone call should be delivered (Step C). Then the network interface 403 signals with specific control signals to the outgoing gateway 303 coupled to the selected termination point 501 (Step D). The outgoing gateway 303 is caused to connect to the incoming gateway 301 via a digital voice packet connection 302 (Step E), and the call from the outgoing gateway 303 is directed to the selected termination point 501 (Step F). In a particular embodiment, a call is placed by a calling customer to a Company A. However, where Company A has assigned its phone number to be answered by an outsourced call center, the call center handles the call. Not only may the call center handle Company A's phone number, but also Company B, and Company C, etc. The calling customer is identified (e.g., by the original called number and/or caller ID fields), and the call is first received by the local exchange carrier's (LEC) switch 201. The call is then handed off from the LEC system 200 to the network carrier system 300 which has been previously assigned to carry Company A's phone calls. The network carrier 300 then sends a Call Notification Signal, in real-time, to the outside party call routing system 400 to the effect that an incoming phone call for Company A has been received. Information such as who the caller is (ANI/CallerID) is also transmitted to the outside party routing system 400. The outside party routing system 400, which could be in Company A itself, or in an outsourced call center, or at another third party, then determines how to best complete the call. This determination can be based on a plurality of inputs, including which agents are available at that time to handle the incoming call, which agent is best suited to handle the call, which agent has historically been the most successful at handling similar calls, etc. The outside party routing system 400 could choose to have its computer server equipment physically located within the physical premises of the network carrier 300 for simplicity and lower cost. A call routing signal is then sent from the outside party routing system 400 back to the network carrier to instruct the network carrier how and where to direct, i.e., “terminate” the call to. The designated termination point could be within the company itself, an offsite agent, or an offshore agent. Alternatively, the incoming phone call could also be routed first to an automated touch-tone or voice response system for further processing before being then handed off to a human agent. Upon receipt of the Call Routing Signal, the network carrier 300 then completes the call by directing it to the termination point 501, 601 (i.e., a specific agent) as specified by the outside party. This terminating leg could be completed to agents in a variety of forms, including as an analog call (POTS) or via Voice-Over-IP call carriage over digital lines. Contemporaneously, as the network carrier 300 completes the call to the specified termination point 501, 601, the outside party routing system 400 typically sends a data/text signal to the agent's computer terminal 502, 602 regarding the incoming call. The algorithm for the routing logic 402 takes into account the various factors to determine the most appropriate agent to whom to direct the call in real time. Information related to the incoming call include caller geography (inferred from callerid area code), prior communications from the same callerID or caller profile information, language required, the target phone number dialed by the caller, or transaction number. Information about the agent is also considered. Agent qualifications, availability in real time, language ability, agent's historical experience or success rate, agent's account ownership, labor cost of agent, telecommunication routing cost, telecommunication signal quality and mode (such as bandwidth, line quality, or video quality), gender where appropriate to the product or service, and even time of day. The algorithm constructs a matrix of factors between the caller and the agents to determine by weighting of the factors which is the agent best suited to handle the call. The weighting is first by required factors, followed by optional factors, with contemporaneous factors being weighted to identify the more suitable among available and initially qualified agents. There are various applications and further expansions of the present invention. The invention permits external call control of a network's call flow. The invention may be used to manage incoming calls for a plurality of companies into a network carrier while the routing and termination of those calls are controlled by an outside party. Simultaneous screen pops (data) may be sent to the agent while the network carrier completes the voice call to the same agent (when in combination with various above features). The invention can be adapted to split the call's voice channel from its signaling path a) when the network carrier continues to carry the voice path or b) when an outside party provides signaling to the network of how to continue routing and/or termination of the call. The invention can also be used with a real-time recording function which can record a call in real-time (when in combination with various above). The following is a source listing in pseudo-code form of components of the method according to the invention. //-------------------------------------------------------------------------- // Module: IncomingCallBeginNotification // This module is invoked by the Carrier Network whenever an incoming call arrives into the Incoming Gateway (301) // Input Variables: // String: CallerID - telephone number which caller is calling from // String: CalledNumber - telephone number called by the user // String: IncomingGatewayID - identifies which incoming gateway received the call // String: CircuitID - incoming gateway's incoming call identification number // Output variables: // String: Result (true if call was completed or false if call completion failed) // Tasks performed: Call ActivityLogger (“ReceivedIncomingCall”, CallerID, CalledNumber, IncomingGatewayID, CircuitID, timenow( ) ); // Determine which company has been called based on the phone number the user dialed CompanyBeingCalled = LookUpInDataBase (“Use Table: Phonenumber-CompanyID”, CalledNumber) // Determine which Agent should be assigned this incoming call AgentAssignedForThisCall = DetermineWhichAgentShouldReceiveThisCall (CompanyBeingCalled, CallerID, IncomingGatewayID, timenow( ) ); // Set in the Database which that this Agent is now busy WriteToDataBase (“Use Table: AgentID-Availability”, AgentAssignedForThisCall, “Agent is busy”) // Determine what termination point (POTS or VOIP) the call should be directed to for the assigned agent TerminationPoint = Call GetAgentsCurrentPhoneOrVoipTerminationPoint (AgentAssignedForThisCall); // Set in the Database which Agent was assigned for this call. The specific call is identified by the CircuitID WriteToDataBase (“Use Table: CircuitID-AgentID-TerminationPoint”, CircuitID, AgentAssignedForThisCall, TerminationPoint) // Depending upon method of termination, complete the call to the termination point If (TerminationPoint.POTS == TRUE) then Call SendSignalToOutgoingGateway (IncomingGatewayID, CircuitID, TerminationPoint.TerminationPhoneNumber, “Complete call CircuitID from IncomingGateway to TerminationPoint”) If (TerminationPoint.VOIP == TRUE) then Call SendSignalToAgentsVOIPConverter601 (TerminationPoint.IPAddress, IncomingGatewayID, CircuitID, “Connect call CircuitID from IncomingGateway”) // Determine what information should be displayed on the Agent's computer screen, send that data to the Agent's screen DataToDisplayOnAgentsScreenForThisCall = LookUpInDataBase (“Use Table: CompanyID-ScreenData”, CompanyBeingCalled) SendDataToAgentsComputer (AgentAssignedForThisCall, CallerID + DataToDisplayOnAgentsScreenForThisCall) // Begin the call recording for certain clients If (CompanyBeingCalled.RecordTheirCalls == True) then CallRecording (IncomingGatewayID, CircuitID, “Start Recording”) // At this point the call has been connected to the appropriate Agent, screen data sent to Agent, and Recording begun. Return (true); // True because call was successfully routed //-------------------------------------------------------------------------- // Module: IncomingCallEndNotification // This module is invoked by the Carrier Network whenever an incoming call was ended (hung up) by either party // Input Variables: // String: CallerID - telephone number which caller is calling from // String: CalledNumber - telephone number called by the user // String: IncomingGatewayID - identifies which incoming gateway received the call // String: CircuitID - incoming gateway's incoming call identification number // Output variables: // String: Result (true if call was completed or false if call completion failed) // Tasks Performed: Call ActivityLogger (“EndIncomingCall”, CallerID, CalledNumber, IncomingGatewayID, CircuitID, timenow( ) ); // Read from DataBase which agent took this call - which agent was previously assigned for this incoming call AgentAssignedForThisCall, TerminationPoint = LookUpInDataBase (“Use Table: CircuitID-AgentID-TerminationPoint”, CircuitID) // Depending upon method of termination, end the call to the termination point If (TerminationPoint.POTS == TRUE) then Call SendSignalToOutgoingGateway (IncomingGatewayID, CircuitID, TerminationPoint.TerminationPhoneNumber, “End call CircuitID from IncomingGateway to TerminationPoint”) If (TerminationPoint.VOIP == TRUE) then Call SendSignalToAgentsVOIPConverter601 (TerminationPoint.IPAddress, IncomingGatewayID, CircuitID, “End call CircuitID from IncomingGateway”)) // Determine what information should be displayed on the Agent's computer screen, send that data to the Agent's screen DataToDisplayOnAgentsScreenForThisCall = “Dear Agent: This call has now ended.”) SendDataToAgentsComputer (AgentAssignedForThisCall, CallerID + DataToDisplayOnAgentsScreenForThisCall) // Set in the Database which that this Agent is available again WriteToDataBase (“Use Table: AgentID-Availability”, AgentAssignedForThisCall, “Agent is available”) // End the call recording for certain clients If (CompanyBeingCalled.RecordTheirCalls == True) then CallRecording (IncomingGatewayID, CircuitID, “End Recording”) // At this point the call has been disconnected from the Agent, screen data sent to Agent, and Recording ended. Return (true); // True because call was successfully routed //-------------------------------------------------------------------------- // Module: AgentCheckedIn // Input Variables: // String: AgentID - Agent's identification number // Output variables: // None // Tasks Performed: // This module is called when the Agent logs into website to inform system that Agent is now available to receive calls // Set in the Database which that this Agent is available again WriteToDataBase (“Use Table: AgentID-Availability”, AgentID, “Agent is available”) ActivityLogger (“Agent is available”, AgentID, timenow( ) ); Return( ); //-------------------------------------------------------------------------- // Module: AgentCheckedOut // Input Variables: // String: AgentID - Agent's identification number // Output variables: // None // Tasks Performed: // This module is called when the Agent logs into website to inform system that Agent is not available to receive calls // Set in the Database which that this Agent is available again WriteToDataBase (“Use Table: AgentID-Availability”, AgentID, “Agent is not available”) ActivityLogger (“Agent is not available”, AgentID, timenow( ) ); Return( ); //-------------------------------------------------------------------------- // Module: DetermineWhichAgentShouldReceiveThisCall // Input Variables: // String: CompanyBeingCalled - identifies which company/client/phone number this call is for // String: CallerID - telephone number which caller is calling from // String: IncomingGatewayID - identifies which incoming gateway received the call // String: timenow - current time/date // Output variables: // String: AgentID - Selected Agent's identification number // Tasks Performed: // Determine: 1) Which Agents are qualified to receive this call then 2) which Agent is best suited to receive this call // First create a list of 1 or more Agents who are Qualified to handle this call ListOfQualifiedAgents = null; While Loop { (ThisAgent = Loop through list of all Agents) If ( ThisAgent.Available == IsAvailableNow) and //is this Agent currently available? If ( ThisAgent.TrainingCredentials == CompanyBeingCalled) and // does this agent have the correct training to handle calls for this company? If ( ThisAgent.LanguageAbilities == CompanyBeingCalled.Language) and //can this agent speak the necessary language? If (additional criteria necessary for an agent to handle a call for CompanyBeingCalled) Then ListOfQualifiedAgents += ThisAgent //add this Agent onto the list of Qualified agents } end while; // Second now determine which of the Qualified agents is the best suited for this particular call While Loop { (ThisAgent = Loop through ListOfQualifiedAgents) MatrixTotalWeight = 0; //start out with zero // Load various matrix weighting criteria - for this CompanyBeingCalled (and/or for this phone number called) MatrixWeighting = LookUpInDataBase (“Use Table: MatrixWeights-CompanyID”, CompanyBeingCalled) // Evaluate a matrix of various factors, based on both caller information and agent information. // Each element of matrix is considered, then assigned a weighted number of points depending // upon importance of that element for that company (or for this phone number). // Some weights are dependent upon the CompanyBeingCalled, other weights are independent of CompanyBeingCalled If (ThisAgent.QualityRating == A) MatrixTotalWeight += MatrixWeighting.A; // Add points according to quality rating If (ThisAgent.QualityRating == B) MatrixTotalWeight += MatrixWeighting.B; // Add points according to quality rating If (ThisAgent.QualityRating == C) MatrixTotalWeight += MatrixWeighting.C; // Add points according to quality rating If (ThisAgent.LaborCost is between [$0.00 and $0.50] ) MatrixTotalWeight += 5; // Add points for low-cost rate If (ThisAgent.LaborCost is between [$0.50 and $1.00] ) MatrixTotalWeight += 2; // Add points for low-cost rate If (ThisAgent.TelecomCost < $.05) MatrixTotalWeight += 2; // Add points for low-cost rate If (ThisAgent.HistoricalSuccess[CompanyBeingCalled] ) MatrixTotalWeight += 10; // Add points prior success rate If (ThisAgent.PreviousCalls[CallerID]) MatrixTotalWeight += 10; //Add points if this Agent knows this Customer If (ThisAgent.LanguageAccent == IncomingGatewayID.LanguageAccent) NumberPointsForThisAgent += 1; //Add points if this Agent's language dialect is similar to the local language dialect of where this call was received at If (ThisAgent.LineQuality > 80% ) MatrixTotalWeight += 5; // Add points for high quality voice connection // Other criteria here to select best suited agent ListOfQualifiedAgents.TotalWeight= MatrixTotalWeight; // Assign this Agent the total computed weighted Matrix value } end while; // Select one agent, among all of the Qualified agents, with the highest total matrix weight AgentID = ListOfQualifiedAgents [ select which Agent has the highest ListOfQualifiedAgents.TotalWeight] Return( ); //-------------------------------------------------------------------------- // Module: SendSignalToOutgoingGateway // Input Variables: // String: IncomingGatewayID - identifies which incoming gateway has received call // String: CircuitID - identifies specifically which call // String: TerminationPoint - identifies where to terminate call to (POTS phone number or VOIP) // String: Action - specifies action // Output variables: // None // Tasks Performed: // Instruct Outgoing Gateway where to terminate call to // Instruct outgoing gateway to take action “Action” for call “CircuitID” at // incoming gateway “IncomingGatewayID” to termination point “TerminationPoint” // e.g. Dial outbound call to “TerminationPoint”, then connect that outbound call to IP stream at IncomingGatewayID.CircuitID Return( ); //-------------------------------------------------------------------------- // Module: SendSignalToAgentsVOIPConverter601 // Input Variables: // String: IncomingGatewayID - identifies which incoming gateway has received call // String: CircuitID - identifies specifically which call // String: TerminationPoint - identifies where to terminate call to (POTS phone number or VOIP) // String: Action - specifies action // Output variables: // None // Tasks Performed: // Instruct Agents VOIP converter 601 where to connect call to // Instruct Agents VOIP converter 601 to take action “Action” for call “CircuitID” at // incoming gateway “IncomingGatewayID” // e.g. Connect Agent's phone to IP stream at IncomingGatewayID.CircuitID Return( ); //-------------------------------------------------------------------------- // Module: GetAgentsCurrentPhoneOrVoipTerminationPoint // Input Variables: // String: AgentID - identifies Agent // Output variables: // String: TerminationPoint - Termination point (VOIP or POTS) where agent is available at now // Tasks Performed: // Looks into database to determine which termination point (VOIP or POTS) where agent is available at now // This database table is set by the Agent's preferences TerminationPoint = LookUpInDataBase (“Use Table: AgentID-TerminationPoint”, TerminationPoint) Return( ); //-------------------------------------------------------------------------- // Module: SendDataToAgentsComputer // Input Variables: // String: AgentID - identifies which agent to send the data to // String: DataToDisplayOnAgentsScreen - specific data to display to Agent // Output variables: // None // Tasks Performed: // Send Data to Agents screen (screen pop) // Transmit DataToDisplayOnAgentsScreen via Agent Interface 404 to Agent's computer 502/602 Return( ); //-------------------------------------------------------------------------- // Module: CallRecording // Input Variables: // String: IncomingGatewayID - identifies which incoming gateway has received call // String: CircuitID - identifies specifically which call // String: Action - to either begin or end recording // Output variables: // None // Tasks Performed: // Control digital recording of call for Digital Voice Storage 701 // Send commands signals via 112 to Digital Voice Storage 701 // Information IncomingGatewayID and CircuitID provides specific information // as where to obtain incoming streaming data from to record. Return( ); //-------------------------------------------------------------------------- // Module: LookUpInDataBase // Input Variables: // String: Database - identifies which database to look for index in // String: Index - Search database for this index string // Output variables: // String: Resulting output from Database for that Index input. // Tasks Performed: // Return result output from Database for that Index input. // Database code here Return( ); //-------------------------------------------------------------------------- // Module: WriteToDataBase // Input Variables: // String: Database - identifies which database to write to // String: Index - index string // String: Data - data to be written into the Database for that Index // Output variables: // None // Tasks Performed: // Write the Data into the Database. // Database code here Return( ); //-------------------------------------------------------------------------- // Module: ActivityLogger // Input Variables: // String: String 1 - First text string to enter into log // String: String 2 - Second text string to enter into log // String: String 3 - Third text string to enter into log // String: String 4 - Fourth text string to enter into log // String: String 5 - Fifth text string to enter into log // String: String 6 - Sixth text string to enter into log // Output variables: // None // Tasks Performed: // Enter all of the incoming string variables into a system activity log for debugging purposes. //-------------------------------------------------------------------------- // Module: timenow( ) // Input Variables: // None // Output variables: // Returns the current time now as a text string // Tasks Performed: // Sets the returning string with the current system time The foregoing descriptions of embodiments of the invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the invention to the forms disclosed. Many modifications and variations will be apparent to practitioners skilled in the art. Accordingly, the above disclosure is not intended to limit the invention; the scope of the invention is defined by the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to the fields of computer and communications. More particularly, the invention relates to the dynamic routing and control of a voice telephone call in real-time. In a company call center setting, a PBX or other switching equipment is deployed to redirect incoming customer calls to the next available customer service agent to handle the incoming customer call. This in-house PBX or switch equipment is often coupled to dedicated incoming phone lines which serve only that particular company. In addition to routing an incoming call, an associated “screen-pop” is often presented on an agent's display in parallel with the incoming phone call. This “screen-pop” typically provides the phone agent with information associated with the customer. Outsourced call centers provide a more generalized solution whereby a telecommunications infrastructure is shared among many customers. Outsourced call centers are typically serviced by many incoming phone line trunks which accept incoming phone calls for any of its customers. Agents may be dedicated to accept phone calls only for certain customers, but often agents are trained to accept incoming phone calls for a list of companies An automated call distribution (ACD) technique for this scenario is typically deployed by the call center's telecommunications equipment to automatically distribute the incoming calls to the appropriate agent. Known outsourced call centers have several limitations and economic challenges. First, dedicated equipment can handle only a certain peak number of phone calls. Although the average utilization rate of the equipment and phone lines is typically much lower than the peak capacity, the call center must still pay for enough equipment capacity to handle peak demands. The difference between the average utilization rate and the peak demand levels can be very large, thus creating an economically inefficient use of the expensive dedicated equipment infrastructure. Second, as a call center grows, it continually needs to expand its telecommunications infrastructure and the number of phone lines needed to handle the additional call load. The capital outlay for fixed telecommunications equipment is often expensive, and the optimal growth of the telecommunications infrastructure equipment can be difficult to predict. Third, if outsourced call centers use external agents physically outside of the company's premises, such as work-at-home phone agents or offshore phone agents, then the PBX or switched telecommunications solution is inherently inefficient: typically two legs (two circuits) of phone lines are required, the first being an incoming circuit used to deliver the incoming call to the PBX, the second being an outgoing circuit placed to connect from the PBX to the external agent. Thus two circuits are activated and required for each such call. What is needed is a solution that would improve efficiency and utilization rate of port use, provide higher available port capacity, use port capacity more flexibly (to reduce the need to accurately predict port needs), and provide an improved method of call routing for off-premises agents.
<SOH> SUMMARY OF THE INVENTION <EOH>According to the invention, a system and methods are provided for enabling real-time call control with minimal requirements for dedicated telecommunications PBX and dedicated switching equipment. Dynamic call routing is handled by a network carrier's equipment and an interface is provided at the carrier switch to dynamically redirect calls from outside of the carrier's network. A call's signaling channel and bearer (voice) channel are separated, allowing the voice carriage to continue to be handled by the network carrier, but the routing of the call is controlled from outside of the carrier's network. A real-time signaling path and interface is provided into the carrier network such that the associated routing decisions and business logic can remain outside of the carrier network, while the carrier network continues to carry the voice channels. The invention will be better understood by reference to the following detailed description in connection with the accompanying drawings.
20040308
20080826
20050908
97049.0
1
DEANE JR, WILLIAM J
VIRTUAL CALL CENTER
SMALL
0
ACCEPTED
2,004
10,796,595
ACCEPTED
System and method for detecting motion of a body
The present invention comprises a system and method for detecting an acceleration of a body and for evaluating movement of a body relative to an environment to detect falls and irregular motions of the body. According to an exemplary embodiment, the system comprises a sensor and a controller that comprises a processor. The sensor, which is associable with the body, comprises a plurality of acceleration measuring devices and is capable of repeatedly sensing accelerative phenomena of the body. The controller, which is associated with the sensor, is operable to process the sensed accelerative phenomena as a function of at least one accelerative event characteristic. The controller determines when the body experiences an acceleration that represents a particular type of motion. The controller also determines when a static acceleration vector reaches a value indicative of a fall. After a fall has occurred, the controller is capable of determining whether the controller was connected to a body during the fall or whether only the controller experienced the fall.
1. A system that evaluates movement of a body relative to an environment, said system comprising: a sensor, associable with said body, that senses accelerative phenomena of said body relative to a three dimensional frame of reference in said environment, said sensor comprising a plurality of acceleration measuring devices; and a processor, associated with said sensor, that processes said sensed accelerative phenomena of said body as a function of at least one accelerative event characteristic to thereby determine whether said evaluated body movement is within an environmental tolerance, and to thereby determine whether said body has experienced acceleration that represents one of a plurality of different types of motion. 2. The system set forth in claim 1 wherein said one of said plurality of different types of motion is one of: no motion, a successful attempt to change position, an unsuccessful attempt to change position, a motion of a body moving with a gait, a motion of a body moving with a gait associated with a disability, a swaying motion, a near fall, and a fall. 3. The system set forth in claim 1 wherein said plurality of acceleration measuring devices comprises three accelerometers in which each accelerometer is aligned along one axis of a three dimensional coordinate system. 4. The system set forth in claim 1 wherein said plurality of acceleration measuring devices comprises two plural axis accelerometers in which a first plural axis accelerometer is aligned within a first plane of a three dimensional coordinate system and in which a second plural axis accelerometer is aligned within a second plane of said three dimensional coordinate system. 5. The system set forth in claim 4 comprising a controller containing said processor, said controller capable of receiving from said two plural axis accelerometers values of acceleration of body motion measured in an x direction, in a y direction, and in a z direction. 6. The system set forth in claim 5 wherein said controller is capable of using said values of acceleration of body motion measured in said x, y, z directions to calculate values for x, y, z distance components of body motion. 7. The system set forth in claim 6 wherein said controller is capable of using said x, y, z distance components of body motion to calculate equivalent spherical polar coordinate components of body motion. 8. The system set forth in claim 7 wherein said controller is capable of comparing a set of spherical polar coordinate components that represents a measurement of said body motion to each of a plurality of prerecorded sets of spherical polar coordinate components in which each set of said plurality of sets of spherical polar coordinate components represents a type of motion. 9. The system set forth in claim 8 wherein one of said plurality of prerecorded sets of spherical polar coordinate components represents one of: no motion, a successful attempt to change position, an unsuccessful attempt to change position, a motion of body moving with a gait, a motion of a body moving with a gait associated with a disability, a swaying motion, a near fall, and a fall. 10. The system set forth in claim 8 wherein said controller is capable of identifying a match between said set of spherical polar coordinate components that represents a measurement of said body motion with one of a plurality of said prerecorded sets of spherical polar coordinate components to identify a type of motion that corresponds to said body motion. 11. The system set forth in claim 10 wherein after identifying said type of motion said controller sends an alarm signal indicative of said type of motion. 12. The system set forth in claim 11 wherein said alarm signal is communicated via a network to a monitoring controller. 13. The system set forth in claim 12 wherein said network is a wireless network. 14. The system set forth in claim 11 wherein said body is a person and wherein said controller sends signals representing physiological data of said person together with said alarm signal. 15. The system set forth in claim 14 wherein said alarm signal and said signals representing physiological data of said person are communicated via a network to a monitoring controller. 16. The system set forth in claim 15 wherein said network is a wireless network. 17. The system set forth in claim 7 wherein said controller is capable of calculating a value of a static acceleration vector from said spherical polar coordinate components of said body motion. 18. The system set forth in claim 17 wherein said controller is capable of determining when said value of said static acceleration vector reaches a value less than the acceleration of gravity indicative of a fall. 19. The system set forth in claim 18 wherein said controller is capable of determining a rate at which said value of said static acceleration vector increases after the value of said static acceleration vector has reached a value less than the acceleration of gravity indicative of a fall. 20. The system set forth in claim 19 wherein said controller is capable of using said rate of increase of said value of said static acceleration vector to determine whether said controller was connected to a body during a fall that caused the value of said static acceleration vector to reach a value less than the acceleration of gravity. 21. A method of operating a system to evaluate movement of a body relative an environment wherein a sensor is associated with said body, said method of operation comprising the steps of: processing, with a processor, repeatedly sensed accelerative phenomena of said body as a function of at least one accelerative event characteristic to thereby determine whether said evaluated body movement is within environmental tolerance; and determining whether said body has experienced acceleration that represents one of a plurality of different types of motion. 22. The method set forth in claim 21 wherein one of said plurality of different types of motion is one of: no motion, a successful attempt to change position, an unsuccessful attempt to change position, a motion of a body moving with a gait, a motion of a body moving with a gait associated with a disability, a swaying motion, a near fall, and a fall. 23. The method set forth in claim 21 further comprising the steps of: receiving in a controller comprising said processor a value of acceleration of body motion in an x direction and in a y direction from a first plural axis accelerometer aligned within a first plane of a three dimensional coordinate system; and receiving in said controller a value of acceleration of body motion in a y direction and in a z direction from a second plural axis accelerometer aligned within a second plane of said three dimensional coordinate system. 24. The method set forth in claim 23 further comprises the step of: calculating in said controller values for x, y, z distance components of body motion using said values of acceleration of body motion measured in x, y, z directions. 25. The method set forth in claim 24 further comprising the step of: calculating in said controller spherical polar coordinate components of said body motion that are equivalent to said x, y, z distance components of said body motion. 26. The method set forth in claim 25 further comprising the steps of: comparing a set of spherical polar coordinate components that represents a measurement of said body motion to each of a plurality of prerecorded sets of spherical polar coordinate components in which each set of said plurality of sets of spherical polar coordinate components represents a type of motion; and identifying a match between said set of spherical polar coordinate components that represents a measurement of said body motion with one of said plurality of said prerecorded sets of spherical polar coordinate components; and identifying a type of motion that corresponds to said body motion. 27. The method set forth in claim 26 wherein one of said plurality of said prerecorded sets of spherical polar coordinate components represents one of: no motion, a successful attempt to change position, an unsuccessful attempt to change position, a motion of body moving with a gait, a motion of a body moving with a gait associated with a disability, a swaying motion, a near fall, and a fall. 28. The method set forth in claim 27 further comprising the step of: sending an alarm signal indicative of said type of motion after said controller identifies said type of motion. 29. The method set forth in claim 28 further comprising the step of; sending said alarm signal via a network to a monitoring controller. 30. The method set forth in claim 29 wherein said network is a wireless network. 31. The method set forth in claim 28 wherein said body is a person and further comprising the steps of: sending signals representing physiological data of said person together with said alarm signal. 32. The method set forth in claim 31 further comprising the step of: sending signals representing physiological data of said person via a network to a monitoring controller. 33. The method set forth in claim 32 wherein said network is a wireless network. 34. The method set forth in claim 25 further comprising the step of: calculating in said controller a value of a static acceleration vector using said spherical polar coordinate components of said body motion. 35. The method set forth in claim 34 further comprising the step of: determining in said controller when said value of said static acceleration vector reaches a value less than the acceleration of gravity indicative of a fall. 36. The method set forth in claim 35 further comprising the step of: determining in said controller a rate at which said value of said static acceleration vector increases after the value of said static acceleration vector has reached a value less than the acceleration of gravity indicative of a fall. 37. The method set forth in claim 36 further comprising the step of: determining with said rate whether said controller was connected to said body during said fall that caused the value of said static acceleration vector to reach a value less than the acceleration of gravity. 38. The method set forth in claim 37 further comprising the step of: receiving in said controller a signal that detects a physiological function of said body within a time period, said signal indicating that said controller was connected to said body during said fall that caused the value of said static acceleration vector to reach a value less than the acceleration of gravity.
RELATED APPLICATIONS This patent application is a continuation in part of co-pending U.S. patent application Ser. No. 09/396,991 filed Sep. 15, 1999 by Lehrman et al. entitled “Systems For Evaluating Movement of A Body and Methods of Operating The Same.” This patent application is also related to U.S. Provisional Patent Application No. 60/265,521 filed Jan. 31, 2001 by Lehrman et al. entitled “System and Method for Detecting an Acceleration of a Body.” U.S. patent application Ser. No. 09/396,991 and U.S. Provisional Patent Application No. 60/265,521 are both assigned to the assignee of the present invention. The disclosures in U.S. patent application Ser. No. 09/396,991 and in U.S. Provisional Patent Application No. 60/265,521 are hereby incorporated by reference in the present application as if fully set forth herein. TECHNICAL FIELD OF THE INVENTION The present invention relates generally to means for detecting motions of a body, and, more particularly, relates to systems and methods of operation thereof, for evaluating movement of a body relative to an environment to identify occurrences of irregular body motions or falls. BACKGROUND OF THE INVENTION Methods for determining specific movements of a body that use a variety of devices, apparatus and systems are, generally speaking, known. The term “body” is defined broadly hereafter and includes both organic and inorganic objects. In point of fact, many methods are known for sensing body movement, or non-movement (i.e., sensed dynamic accelerations, including cessation of movement), as well as, for sensing body movement over time, which is commonly used to determine comparative levels of activity of a monitored body (See, U.S. Pat. Nos. 4,110,741, 4,292,630, 5,045,839, and 5,523,742). These methodologies, however, merely report various levels of body activity, and, simply stated, fail to recognize possible causes for any increased or decreased level of body activity. In contrast, other methodologies have developed over time for the detection of falls (See also, U.S. Pat. Nos. 4,829,285, 5,477,211, 5,554,975, and 5,751,214). These methodologies are largely based upon the utilization of one or more mechanical switches (e.g., mercury switches) that determine when a body has attained a horizontal position. These methods however fail to discern “normal,” or acceptable, changes in levels of body activity. Stated another way, the foregoing fall detection methodologies provide no position change analysis and, therefore, cannot determine whether a change in position, once attained, is acceptable or unacceptable. Various training methods have been conceived for sensing relative tilt of a body (See, U.S. Pat. Nos. 5,300,921 and 5,430,435), and some such methodologies have employed two-axis accelerometers. The output of these devices, however, have reported only static acceleration of the body (i.e., the position of a body relative to earth within broad limits). It should be appreciated that static acceleration, or gravity, is not the same as a lack of dynamic acceleration (i.e., vibration, body movement, and the like), but is instead a gauge of position. While accelerometers that measure both static and dynamic acceleration are known, their primary use has heretofore been substantially confined to applications directed to measuring one or the other, but not both. Thus, it may be seen that the various conventional detectors fall into one of two varieties, those that gauge movement of the body and those that gauge a body's position by various means, with neither type capable of evaluating body movement to determine whether the same is normal or abnormal; and if abnormal, whether such movement is so abnormal to be beyond tolerance, for instance, to be damaging, destructive, crippling, harmful, injurious, or otherwise alarming or, possibly, distressing to the body. None of the methodologies heretofore known have provided a suitable means to evaluate body movement over time and to determine whether such movement is tolerable. Further improvement could thus be utilized. SUMMARY OF THE INVENTION To address the above-introduced deficiencies of the prior art, the present invention introduces systems, as well as methods of operating such systems, for evaluating movement of a body relative to an environment. For the purposes hereof, the term “body” is defined broadly, meaning any organic or inorganic object whose movement or position may suitably be evaluated relative to its environment in accordance with the principles hereof; and where the term “environment” is defined broadly as the conditions and the influences that determine the behavior of the physical system in which the body is located. An advantageous embodiment of a system that evaluates movement of a body relative to an environment in accordance herewith includes both a sensor and a processor. In operation, the sensor is associated with the body and operates to repeatedly sense accelerative phenomena of the body. The processor, which is associated with the sensor, processes the sensed accelerative phenomena as a function of at least one accelerative event characteristic to determine whether the evaluated body movement is within environmental tolerance. The processor also preferably generates state indicia while processing the sensed accelerative phenomena, which represents the state of the body within the environment over time. For the purposes hereof, the term “sensor” is defined broadly, meaning a device that senses one or more absolute values, changes in value, or some combination of the same, of at least the sensed accelerative phenomena. According to an advantageous embodiment, described in detail hereafter, the sensor may be a plural-axis sensor that senses accelerative phenomena and generates an output signal to the processor indicative of measurements of both dynamic and static acceleration of the body in plural axes. According to this embodiment, the processor receives and processes the output signal. The processor is preferably programmed to distinguish between normal and abnormal accelerative events, and, when an abnormal event is identified, to indicate whether the abnormal event is tolerable, or within tolerance. In further embodiments, the processor may be programmed to distinguish other physical characteristics, including temperature, pressure, force, sound, light, relative position, and the like. It should be noted that the relevant environment may be statically or dynamically represented. The sophistication of any such representation may be as complex or as uncomplicated as needed by a given application (e.g., disability, injury, infirmity, relative position, or other organic assistance monitoring; cargo or other transport monitoring; military, paramilitary, or other tactical maneuver monitoring; etc.). It should further be noted that any representation may initially be set to, or reset to, a default, including, for instance, a physically empty space, or vacuum. Regardless, the principles of the advantageous exemplary embodiment discussed heretofore require at least one accelerative event characteristic to be represented to enable the processor to determine whether the evaluated body movement is within environmental tolerance, which is again advantageously based upon both dynamic and static acceleration measurements. According to a related embodiment, the processor is further operable, in response to processing the sensed accelerative phenomena, to generate state indicia, which includes tolerance indicia, generated in response to determining whether the evaluated body movement is within environmental tolerance. Preferably, such tolerance indicia is compared with at least one threshold, likely associated with the accelerative event characteristic. In response to such comparison, the processor controls a suitable indicating means to initiate an alarm event; to communicate such tolerance indicia to a monitoring controller; to generate statistics; or the like. According to a related advantageous embodiment, the system may be associated with other components or sensing systems. For instance, in an assistance monitoring application, the sensor may repeatedly sense dynamic and static acceleration of the body in the plural axes and generate output signals indicative of the measurements. The processor continuously processes the output signals to distinguish between selected accelerative and non-selected accelerative events (described in detail hereafter) based upon both the dynamic and the static acceleration of the body, and generates state indicia, including tolerance indicia, that is communicated to a remote monitoring controller. The tolerance indicia is communicated to the monitoring controller for record keeping/statistical purposes, as well as to provide “live” monitoring of the individual subscriber. Communication between the processor and the controller may be by a wireless network, a wired network, or some suitable combination of the same, and may include the Internet. Preferably, the system generates an alert whenever the monitored subscriber is in “jeopardy,” as determined by the system, such as in response to a debilitating fall by the subscriber. In a further embodiment, the processor is operable to repeatedly generate “heartbeat” indicia that indicates that the system is in an operable state, whereby absence of the same informs the monitoring controller that some other part of the system is malfunctioning. The foregoing has outlined rather broadly the features and technical advantages of the present invention so that those skilled in the art may better understand the DETAILED DESCRIPTION OF THE INVENTION that follows. Additional features and advantages of the invention will be described hereinafter that form the subject of the claims of the invention. Those skilled in the art should appreciate that they may readily use the conception and specific embodiments disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. Those skilled in the art should also realize that such equivalent constructions do not depart from the spirit and scope of the invention in its broadest form. Before undertaking the DETAILED DESCRIPTION OF THE INVENTION, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, and the term “associable” may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the terms “controller” and “processor” mean any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some suitable combination of at least two of the same. It should be noted that the functionality associated with any particular controller/processor may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, wherein like numbers designate like objects, and in which: FIG. 1 illustrates an isometric view of an exemplary embodiment of a system that evaluates body movement in accordance with the principles of the present invention; FIG. 2 illustrates a block diagram of the exemplary system set forth with respect to FIG. 1; FIGS. 3A to 3D illustrate exemplary strip chart records of output of the sensor introduced in FIGS. 1 and 2 taken during illustrative situations; FIG. 4 illustrates an operational flow diagram of an exemplary method of programming a processor in accordance with a fall detection application of the principles of the present invention; FIG. 5 illustrates a functional block diagram of an alternate sensing system that may suitably be associated with the processor of the present invention; FIG. 6 illustrates a perspective view of an exemplary remote receiver unit of the system of this invention; FIG. 7 illustrates a functional block diagram of the exemplary receiver unit of FIG. 6; FIG. 8 illustrates an exemplary wireless network that is associated via a wired network, such as the Internet, to a remote monitoring controller according to one embodiment of the present invention; and FIG. 9 illustrates an exemplary embodiment of the system of the present invention for evaluating body movement with a plurality of acceleration measuring devices; FIG. 10 illustrates the coordinate relationships between a three dimensional Cartesian coordinate system and a three dimensional spherical polar coordinate system; FIG. 11 illustrates the orientation of a first plural axis accelerometer in an x-y plane of a three dimensional Cartesian coordinate system and the orientation of a second plural axis accelerometer in a y-z plane of the same Cartesian coordinate system; FIG. 12 illustrates an exemplary embodiment of the system of the present invention for evaluating body movement comprising two plural axis accelerometer sensors coupled to a controller; FIG. 13 illustrates a flow diagram showing a first portion of an advantageous embodiment of the method of the present invention; and FIG. 14 illustrates a flow diagram showing a second portion of an advantageous embodiment of the method of the present invention. DESCRIPTION OF THE INVENTION FIGS. 1 through 14, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged system for detecting the motion of a body. FIG. 1 illustrates an isometric view of an exemplary embodiment of a system (generally designated 11) that evaluates body movement in accordance with the principles of the present invention, and more particularly that measures and distinguishes selected accelerative events of a body (not shown). As used in this disclosure, the phrases “accelerative events” or “accelerative phenomena” are defined as occurrences of change in velocity of the body (or acceleration), whether in magnitude, direction or both. System 11 includes circuit boards 13 and 15 (connected boards at right angles to one another) that are associated with a housing (generally designated 17) utilizing known mounting techniques. Exemplary housing 17 (and system 11, for that matter), when assembled, is approximately one centimeter thick and is approximately five centimeters across in any direction. Housing 17 may comprise, for example, exemplary housing halves 19 and 21 that encase boards 13 and 15, although those skilled in the art will understand that any configuration suitable for a particular implementation of the invention may be arranged. Exemplary rear half 21 is provided with a clip 23 for associating system 11 with the body (e.g., people, animals, objects of various sorts, etc.). Exemplary clip 23 is shown as a mechanical spring-type clip, but could be any known attachment device or system, including either mechanical or chemical attachment systems, or any other suitable means for associating system 11 with the body. System 11 includes a processor (shown in FIG. 2) and a sensor 25. Exemplary sensor 25 operates to sense accelerative phenomena of the body, and is mounted on circuit board 13 with x and y axes, 27 and 29, respectively, oriented thereat (though other orientations could be utilized). Sensor 25 is illustratively shown as a plural-axis (dual shown) acceleration measuring device suitably mounted on a single monolithic integrated circuit (one conventional sensor is an accelerometer available from ANALOG DEVICES, INC., located at One Technology Way, Norwood, Mass., United States of America, namely, Model No. ADXL202). Sensor 25 includes polysilicon surface-micromachined sensor layer 31 built on top of silicon wafer 33. Polysilicon springs 35 resiliently suspend sensor layer 31 over the surface of wafer 33 providing resistance against acceleration forces. Deflection of the sensor layer is measured using a differential capacitor formed by independent fixed and central plates, the fixed plates driven by one hundred eighty degrees (180°) out of phase square waves having amplitude proportional to acceleration. Signal outputs from each axis of sensor 25 are conditioned (i.e., phase sensitive demodulation and low pass filtering) and presented at analog output nodes. While not utilized in the primary advantageous embodiment of this invention, the ANALOG DEVICES' accelerometer is operable to convert the analog signals to duty cycle modulated (“DCM”) signals at a DCM stage providing digital output signals capable of being directly counted at a processor. While techniques for reconstructing analog signals from the digital output signals may suitably be utilized (e.g., passing the duty cycle signals though an RC filter), thereby allowing use of the digital signal output of a sensor of system 11 hereof, use of the analog signal outputs has been found advantageous due to the increased bandwidth availability (0.01 Hz to 5 kHz, adjustable at capacitors at the output nodes to bandlimit the nodes implementing low-pass filtering for antialiasing and noise reduction), and the measuring sensitivity that may be attained. A typical noise floor of five hundred micro “g” per Hertz (500×10−6 “g”/Hz) is achieved, thereby allowing signals below five milli “g” (5×10−3 “g”) to be resolved for bandwidths below 60 Hz. The value “g” is the acceleration of gravity at the surface of the earth (32 feet/sec2 or 9.8 m/sec2) According to the illustrated embodiment, sensor 25 generates analog output voltage signals corresponding to measurements in the x and y axes, which include both an alternating current (ac) voltage component proportional to G forces (i.e., dynamic acceleration component related to vibrations of sensor layer 31) and a direct current (dc) voltage component proportional to an angle relative to earth (i.e., static acceleration component related to gravity). This open loop acceleration measurement architecture, capable of measuring both static and dynamic acceleration, can thus be utilized to determine position of a body by measuring both the x and y output voltages simultaneously, as well as measure forces of impact experienced by a body. This information comprises state indicia, and utilizing both signal components from both outputs, the sensed accelerative phenomena of the body may subsequently be processed to distinguish a variety of accelerative phenomena and, ultimately, to selectively act based on the distinctions, as is described in detail hereafter to determine whether the evaluated body movement is normal or abnormal, and, if abnormal, whether the same is within tolerance. It is noted that the foregoing embodiment has been introduced for illustrative purposes only. In alternate embodiments, any sensor that is capable of sensing accelerative phenomena relative to a body may be used in lieu of, or even in conjunction with, sensor 25. Further, alternate orientations of sensor 25 may be used for different applications. Turning next to FIG. 2, there is illustrated a block diagram of the exemplary system of FIG. 1, which includes processing circuitry 39, indicating means 41, power supply 67, and switch 68, along with sensor 25. Exemplary processing circuitry 39 illustratively includes a processor 47 and buffer amplifiers 43 and 45 that buffer the analog x and y outputs from sensor 25. Exemplary processor 47, which is associated with sensor 25, is capable of processing the sensed accelerative phenomena as a function of at least one accelerative event characteristic to thereby determine whether an evaluated body movement is within environmental tolerance. Processor 47 also preferably generates state indicia while processing the sensed accelerative phenomena, which may represent the state of the body within the environment over time. Processor 47 is associated with a crystal oscillator/clock 49, switch (DIP) inputs 51, an analog-digital conversion circuitry 53 and a DSP filter 55 (one conventional processor is available from TEXAS INSTRUMENTS, INC., located in Dallas, Tex., United States of America, namely, Model No. MSP430P325). Exemplary indicating means 41, in response to direction from processor 47, is operable to accomplish at least one of the following: initiate an alarm event; communicate such state, or tolerance, indicia to a monitoring controller; generate statistics; etc. Indicating means 41 may take any number of forms, however, for use in system 11 of the present embodiment, stage 41 is an RF transmitter including RF modulator 61 enabled by processor 47. Exemplary data is presented and modulated at modulator 61, amplified at amplifier 63 and transmitted at antenna 65 (to a remote receiver unit as discussed hereinafter). According to the present embodiment, power for the various components of system 11 is provided by power supply 67, which illustratively is a 3.6 volt lithium ion battery. Low power management may suitably be under the control of processor 47 utilizing exemplary switched/power supply voltage FET switch 68 at sensor 25, which provides power only during sampling cycles, and operates to shut components down during non-use cycles. For instance, processor 47 may be taken off-line when processing is complete, reducing current drain. It should be noted that the various circuitry discussed heretofore has been introduced herein for illustrative purposes only. System 11 may be implemented using any suitably arranged computer or other processing system including micro, personal, mini, mainframe or super computers, as well as network combinations of two or more of the same. In point of fact, in one advantageous embodiment, sensor 25 and processor 47 are not co-located, but rather associated wirelessly. To that end, the principles of the present invention may be implemented in any appropriately arranged device having processing circuitry. Processing circuitry may include one or more conventional processors, programmable logic devices, such as programmable array logic (“PALs”) and programmable logic arrays (“PLAs”), digital signal processors (“DSPs”), field programmable gate arrays (“FPGAs”), application specific integrated circuits (“ASICs”), large scale integrated circuits (“ILSIs”), very large scale integrated circuits (“VLSIs”) or the like, to form the various types of circuitry, processors, controllers or systems described and claimed herein. Conventional computer system architecture is more fully discussed in THE INDISPENSABLE PC HARDWARE BOOK, by Hans-Peter Messmer, Addison Wesley (2nd ed. 1995) and COMPUTER ORGANIZATION AND ARCHITECTURE, by William Stallings, MacMillan Publishing Co. (3rd ed. 1993); conventional computer, or communications, network design is more fully discussed in DATA NETWORK DESIGN, by Darren L. Spohn, McGraw-Hill, Inc. (1993); conventional data communications is more fully discussed in VOICE AND DATA COMMUNICATIONS HANDBOOK, by Bud Bates and Donald Gregory, McGraw-Hill, Inc. (1996), DATA COMMUNICATIONS PRINCIPLES, by R. D. Gitlin, J. F. Hayes and S. B. Weinstein, Plenum Press (1992) and THE IRWIN HANDBOOK OF TELECOMMUNICATIONS, by James Harry Green, Irwin Professional Publishing (2nd ed. 1992); and conventional circuit design is more fully discussed in THE ART OF ELECTRONICS, by Paul Horowitz and Winfield Hill, Cambridge University Press (2nd ed. 1991). Each of the foregoing publications is incorporated herein by reference for all purposes. Turning next to FIGS. 3A to 3D, illustrated are exemplary strip chart records of output of exemplary sensor 25 of FIGS. 1 and 2 taken during illustrative situations. More particularly, FIGS. 3A and 3B illustrate the analog signal at the x and y outputs of sensor 25 during a fall by a body to the left, and whereas FIGS. 3C and 3D illustrate the analog signal at the x and y outputs of sensor 25 during a fall by a body to the right (the dark blocks indicating an alarm condition). As can be seen from the exemplary traces, a fall to the left and to the right are both distinguishable by the disruption of a stable position, or normal body movement, by a concussive force followed by a distinctly different ending stable position. According to the illustrative embodiment introduced herein, the direction of fall is clear from the position of the ending trace at the y outputs. If the fall had been more forward or backward, the x output traces would likewise clearly indicate the same (this assumes x and y sensor axes orientation as set forth in FIG. 1). Of course, the same x and y outputs of the sensor 25 may be suitably processed to simply determine position of the body, for instance, such as when a person-is lying down, when a box has tipped over, etc. Turning next to FIG. 4, illustrated is operational flow diagram of an exemplary method (generally designated 400) of programming of processor 47 in accordance with a fall detection application of the principles of the present invention. For the purposes of illustration, concurrent reference is made to system 11 of FIGS. 1 and 2. It should be noted that this illustration introduces an exemplary operational method for programming processor 47 for its use as a fall detector, and that suitable alternate embodiments of system 11 for evaluating movement of a body relative to different environments may likewise be implemented in accordance with the principles hereof, such as for relative position, other assistance monitoring, transparent monitoring, tactical maneuver monitoring, etc. Exemplary method 400 begins and a request for sampling measurements is generated, likely by processor 47 (Step 405), either in response to an executing operations program or upon initiation by a user, possibly remotely from a monitoring controller (discussed with reference to FIG. 8). Sensor 25 senses x and y acceleration values generating measurement signals at the outputs at sensor 25. In the present implementation, the measurement signals are converted from analog to digital format and filtered by filter 55 (Step 410; thereby reducing probability that an out-of-tolerance abnormal movement will be determined incorrectly in response to a single sharp impact, such as a collision between mount 17 and a hard surface when sensor 25 is off the body causing a sharp signal spike). Processor 47 uses direct current (dc) voltage components of the outputs from sensor 25 to determine a last stable position of the body on which sensor 25 is mounted (Step 415). More particularly, processor 47 repeatedly compares successive input values with immediately preceding input values and, if within tolerance, are added thereto and stored in an accumulator. This is repeated until Z samples have been accumulated and added over some defined period of time (e.g., one second) or until a received input is out of tolerance, in which case the sampling cycle is reinitiated. When Z samples are accumulated and added, the accumulated value is divided by Z to determine a “last stable” static acceleration average value, which is saved and is indicative of the last stable position of the body. Sampling and/or sampling cycle rates may be varied, but, while preferably not continuous due to power consumption concerns, should be substantially continual. It is important to note, therefore, that such characteristics may be statically maintained or dynamically generated. Processor 47 uses alternating current (ac) voltage components of each output from sensor 25 to check against a G force threshold value set at DIP switch 51 to see if it exceeds the threshold (Step 420—thus qualifying as a potential fall impact, in the current example, possibly an intensity in excess of about 2 to 4 G depending upon desired sensitivity). According to the present implementation, if three of these dynamic acceleration measurements are received in excess of the threshold without five intervening measurements that are less than the threshold, the impact detect flag may be set. Processor 47 determines a fall by testing a post-impact stream of samples against a tolerance (Step 425; for instance, a selected value of the ac voltage components, for example a value less than about 2 G). Each new sample is tested against the previous sample to see if the position of the body has stabilized. When the position has stabilized to less than the tolerance, W samples are averaged to get the new stable static acceleration average value corresponding to the new stable position. Processor 47, in response to the value corresponding to the new stable position is shifted indicating a change of body position of 45° or more from the last stable position, classifies the event as a debilitating fall and alert stage 41 is activated (Step 430). A greater stabilization or post-stabilization sample period may be selected to allow more time for an uninjured user to rise without issuance of an alert. Processor 47, after setting the last stable position, adds the absolute values of the x and y last stable positions together, and, then determines whether the body associated with sensor 25 is lying down if the added value exceeds a value corresponding to 90° plus or minus twenty five percent (25%) (Step 435). In such case, after a selected time (for example, four seconds) with repeated like values, the laying down detect flag is set. While this flag is set, any impact that exceeds the G force threshold is treated as a debilitating fall (Step 440). The flag is set only as long as the added value continues to indicate that the wearer is lying down. It should be noted that the foregoing embodiment was introduced for illustrative purposes only and that the present invention broadly introduces systems, as well as methods of operating such systems, that evaluate movement of a body relative to an environment, which in the above-given example is an assistance monitoring environment. An important aspect of the present invention is that processor 47 is operable to process sensed accelerative phenomena as a function of at least one accelerative event characteristic, and that such characteristics will largely be defined by the specific application. Therefore, system 11, and, more particularly, processor 47, generates state indicia relative the environment of interest, and determines whether the evaluated body movement is within tolerance in the context of that environment. For instance, “tolerance” would likely be very different for a monitored body of an elderly person with a heart condition, a toddler, a box in a freight car, a container of combustible gas, etc. Turning next to FIG. 5, illustrated is a functional block diagram of an alternate sensing system (generally designated 71) that may suitably be associated with processor 47 of FIGS. 1, 2, and 4 in accordance with the principles of the present invention. In this embodiment, components utilizable with system 11 are configured again as a human fall monitor/detector, and any or all of these additional monitoring functions may be employed with system 11. For purposes of illustration, concurrent reference is made to processor 47 of FIGS. 2 and 4. Exemplary sensor 71 includes a respiration module 73, which includes a body contact breath sensor 75 (for example a volumetric sensor, or a near body breath sensor), low pass filter 77 and amplifier 79 providing output signals indicative of respiration rate and vitality to processor 47. The outputs are processed and, when a dangerous respiratory condition is suggested (generates state indicia relative the environment, and determines whether the evaluated body movement (broadly defined herein to include organic physiologic phenomena) is within environmental tolerance), an identifiable (for example, by signal coding) alarm is sent indicating means 41. Sensor 71 further includes an ECG module 81, which includes input electrodes 83 and 85 providing heart rate signals to filters 87 and 89. The filtered signals are amplified at amplifier 91 and band pass filtered at filter 93. The output is amplified at 95 for input to processor 47 and processed so that dangerous heart rhythms and events can be detected (generates state indicia relative the environment, and determines whether the evaluated body movement is within environmental tolerance) and an identifiable alarm sent at alert stage 41. Sensor 71 further includes a panic button module 97 that is operable using a standard user activated switch 99 positioned at housing 17 allowing a user to initiate a call for help. The switch output is input to processor 47 to initiate an identifiable alarm at alert stage 41. Turning momentarily to FIGS. 6 and 7, illustrated are a perspective view of an exemplary remote receiver unit of the system of this invention and a functional block diagram of the same. In a distributed system in accord with one embodiment of this invention, a remote receiver unit 103 (for example a wall mountable unit) as shown in FIGS. 6 and 7 is provided for receipt of transmissions from sensor 25 and/or system 71. Unit 103 includes a receiver antenna 105, indicator LEDs 107 (including indicators for as many detector functions as are employed in the specific embodiment of the apparatus being monitored, as well as an indicator for unit on/off status), and a user interface input keypad 111 for unit setup, reset and alarm deactivation. Power access 113 is provided at the bottom of the unit. RF receiver 115 is tuned to receive alarm transmissions from sensor 71 and presents the signal received for processing at processor 117 for alarm identification and appropriate output. Processor 117 also receives inputs from keypad 111 and power switch 119. Non-volatile memory 121 is provided for input of identification of the user and/or of the apparatus being monitored. Audible alarm 123, LED bank 107 and retransmission unit 125 (an autodialer, imbedded digital cellular technology, RF transmitter, an Internet appliance, or the like) are connected to receive outputs from processor 117. When a transmission is received, or when battery power at the body mounted apparatus is low, an audible alarm is sounded and the appropriate LED (indicative of the condition causing the alarm, for example a debilitating fall by a user of apparatus 11) is activated. If not disabled by the user at key pad 111 within a short period, processor 117 activates retransmission unit 125 initiating a call for help or other remote notification. Operational setup of unit 103 is also accomplished under programming at processor 117 and by sequential operation by a user or technician of keypad 111 and/or power switch 119 as is known (including user ID set, learn mode operations, reset or reprogramming operations, and urgency code operations). Turning next to FIG. 8, illustrated is an exemplary hybrid wireless/wired network (generally designated 800) that is associated with a remote monitoring controller 805 according to one embodiment of the present invention. The wireless network 810 is introduced for illustrative purposes only, and comprises a plurality of cell sites 821 to 823, each containing one of the base stations, BS 801, BS 802, or BS 803. Base stations 801 to 803 are operable to communicate with a plurality of mobile stations (MS) including MS 103 (remote receiver unit 103), and MS 811, MS 812 and MS 814. Mobile stations MS 103, and MS 811, MS 812 and MS 814, may be any suitable cellular devices, including conventional cellular telephones, PCS handset devices, portable computers, metering devices, transceivers, and the like (including, for instance, remote receiver unit 103). Dotted lines show the approximate boundaries of the cell sites 821 to 823 in which base stations 801 to 803 are located. The cell sites are shown approximately circular for the purposes of illustration and explanation only. It should be clearly understood that the, cell sites also may have irregular shapes, depending on the cell configuration selected and natural and man-made obstructions. In one embodiment of the present invention, BS 801, BS 802, and BS 803 may comprise a base station controller (BSC) and a base transceiver station (BTS). Base station controllers and base transceiver stations are well known to those skilled in the art. A base station controller is a device that manages wireless communications resources, including the base transceiver station, for specified cells within a wireless communications network. A base transceiver station comprises the RF transceivers, antennas, and other electrical equipment located in each cell site. This equipment may include air conditioning units, heating units, electrical supplies, telephone line interfaces, and RF transmitters and RF receivers, as well as call processing circuitry. For the purpose of simplicity and clarity in explaining the operation of the present invention, the base transceiver station in each of cells 821, 822, and 823 and the base station controller associated with each base transceiver station are collectively represented by BS 801, BS 802 and BS 803, respectively. BS 801, BS 802 and BS 803 transfer voice and data signals between each other and the public telephone system (not shown) via communications line 831 and mobile switching center (MSC) 840. Mobile switching center 840 is well known to those skilled in the art. Mobile switching center 840 is a switching device that provides services and coordination between the subscribers in a wireless network and external networks 850, such as the Internet, public telephone system, etc. Communications line 831 may be any suitable connection means, including a T1 line, a T3 line, a fiber optic link, a network backbone connection, and the like. In some embodiments of the present invention, communications line 831 may be several different data links, where each data link couples one of BS 801, BS 802, or BS 803 to MSC 840. In the exemplary wireless network 800, MS 811 is located in cell site 821 and is in communication with BS 801, MS 103 is located in cell site 822 and is in communication with BS 802, and MS 814 is located in cell site 823 and is in communication with BS 803. MS 812 is also located in cell site 821, close to the edge of cell site 823. The direction arrow proximate MS 812 indicates the movement of MS 812 towards cell site 823. For the purposes of illustration, it is assumed that system 11 is associated with an elderly person whose residence is wirelessly monitored. It is further assumed that sensor 25 is associated with the elderly person and that processor 47 is coupled in MS/remote receiver unit 103, such that sensor 25 and processor 47 are wirelessly associated. System 11 repeatedly senses various physiological phenomena of the elderly person, including accelerative phenomena of his body. Remote processor 47 processes the repeatedly sensed phenomena, and, particularly, the accelerative phenomena of the body, as a function of at least one accelerative event characteristic to thereby determine whether the evaluated body movement is within environmental tolerance. Processor 47 advantageously generates state indicia while processing the sensed accelerative phenomena, representing the state of the body within the environment over time. Exemplary processor 47 is programmed to distinguish between normal and abnormal accelerative events (e.g., walking, sitting, lying down, etc. versus tripping, falling down, etc.), and, when an abnormal event is identified, indicates whether the abnormal event is tolerable, or within tolerance. Processor 47 may also suitably be programmed to distinguish other physical characteristics, including temperature, pressure, force, sound, light, relative position (including lying down), and the like. As processor 47 generates state indicia, which includes tolerance indicia, it uses the same to determine whether the evaluated body movement is within environmental tolerance. Preferably, such tolerance indicia is compared with at least one threshold, likely associated with the accelerative event characteristic. In response to such comparison, processor 47 controls a suitable indicating means to initiate an alarm event (locally and via network 810 to monitoring controller 805), to communicate such tolerance indicia to a monitoring controller 805, to generate statistics (locally and via network 810 to monitoring controller 805), or the like. According to a related advantageous embodiment, such state indicia, and other information is communicated from time to time to monitoring controller 805, from which such information may suitably be perceived. For instance, a technician, medical professional, or relative might wish to review the activities and status of the elderly person. This may easily be facilitated via a centralized data repository accessible via the Internet, or via any other suitably arranged network. While viewing such information, the technician, medical professional, or relative (subscriber 2, generally designated 855) might initiate a diagnostic equipment check, a physiological test, a simple status check, or the like. Similarly, monitoring controller 805, via the network 800, may monitor a “heartbeat” signal generated periodically by MS/remote receiver unit 103, the heartbeat indicating that unit 103 is functional. FIG. 9 is a schematic drawing of an alternate advantageous embodiment 900 of the present invention. As shown in FIG. 9 sensor 25 of embodiment 900 comprises three acceleration measuring devices 910, 920 and 930. The number three is illustrative only. It is clear that sensor 25 comprises a plurality of acceleration measuring devices and is not limited to a particular number of acceleration measuring devices. Acceleration measuring devices 910, 920 and 930 may each comprises a plural axis measuring device of the type previously described. For convenience, the acceleration measuring devices will be referred to as accelerometers. Accelerometers 910, 920 and 930 are each connected to controller 940. Controller 940 comprises processing circuitry 39 (including processor 47), indicating means 41, power supply 67 and switch 68, of the types previously described. As shown in FIG. 9, accelerometer 910, accelerometer 920, and accelerometer 930 are each coupled directly to controller 940. As an electrical circuit connection, it is said that accelerometer 910 and accelerometer 920 are connected to controller 940 in an electrically parallel connection. The connections of accelerometer 910 and accelerometer 920 to controller 940 are not geometrically parallel to each other. In at least one advantageous embodiment of the present invention the connections of accelerometer 910 and accelerometer 920 to controller 940 are located at right angles with respect to each other. The combination of accelerometer 920 and accelerometer 930 and the combination of accelerometer 910 and accelerometer 930 are similarly arranged. In one arrangement of this advantageous embodiment of the present invention, accelerometer 910 is aligned parallel to the x-axis of a three dimensional Cartesian coordinated system and is capable of measuring accelerations in the x direction. Accelerometer 920 is aligned parallel to the y-axis and is capable of measuring accelerations in the y direction. Accelerometer 930 is aligned parallel to the z-axis and is capable of measuring acceleration in the z direction. Controller 940 is capable of simultaneously determining the values of acceleration measured by each of accelerometers 910, 920 and 930. In this manner, controller 940 can determine the values of acceleration in x, y and z directions. Processor 47 in controller 940 is capable of adding the values of acceleration in the x, y and z directions to obtain a vector sum (i.e., magnitude and direction) of the body (not shown) to which accelerometers 910, 920 and 930 are attached. It is noted that although embodiment 900 has been described for use with a three dimensional Cartesian coordinate system, other three dimensional coordinate systems may also be used. For example, FIG. 10 illustrates a three dimensional spherical polar coordinate system have coordinates R, Θ, Φ. FIG. 10 also illustrates the relationships between a Cartesian coordinate system superimposed on the spherical polar coordinate system. The coordinate R is radial coordinate. The magnitude of R equals the distance from the origin of the coordinate system to the end of a vector that originates at the origin. The coordinate Θ is an angular coordinate that measures the angle between the vector and the z axis. The coordinate Φ is measured in the plane formed by the vector and the z axis. The coordinate Φ is an angular coordinate that measures the angle between the x axis and the projection of the vector on the x-y plane. The coordinate Φ is measured in the x-y plane. As is shown in FIG. 10, the relationships between the Cartesian coordinates and the spherical polar coordinates are given by: x=R sin Θ cos Φ (1) y=R sin Θ sin Φ (2) z=R cos Φ (3) The values of R, Θ, Φ may be calculated from the values x, y, z by the formulas: R=[x2+y2+z2]1/2 (4) Θ=tan−1[[[x2+y2]1/2/z] (5) Φ=tan−1[y/x] (6) As previously mentioned, a plurality of accelerometers may be used. Although each accelerometer 910, 920 and 930 is shown in FIG. 9 as a single accelerometer, this arrangement is illustrative only. Each accelerometer 920, 920 and 930 may be replaced with two or more accelerometers (not shown). In other words, additional accelerometers (now shown) may be used in addition to accelerometers 910, 920 and 930 shown in FIG. 9. The additional accelerometers may be oriented in any chosen direction and are not limited to being in the same plane as one of the accelerometers 910, 920 and 930 (or in the same plane as one of the additional accelerometers). In general, accelerometers comprising sensor 25 may be coupled in series, in parallel, or in a combination of series and parallel connections. Accelerometer 910 is capable of generating analog output voltage signals corresponding to measurements of acceleration in the x direction. Similarly, accelerometer 920 is capable of generating analog output voltage signals corresponding to measurements of acceleration in the y direction and accelerometer 930 is capable of generating analog output voltage signals corresponding to measurements of acceleration in the z direction. The analog output voltage signals of accelerometer 910, 920 and 930 each comprise both an alternating current (ac) voltage component proportional to G forces (i.e., dynamic acceleration component related to vibrations of sensor layer 31 of sensor 25) and a direct current (dc) voltage component proportional to an angle relative to earth (i.e., static acceleration component related to gravity “g”). The direct current (dc) voltage components from accelerometers 910, 920 and 930 (representing static acceleration due to gravity in their respective x, y and z directions) may be combined to obtain a value of the acceleration that the body experiences due to gravity. In general, the vector R represents the resultant of combining the x, y and z components of acceleration experienced by the body. When a body is at rest (i.e., dynamic acceleration is zero), the vector R represents the static acceleration due to gravity. Because the value of gravity at the earth's surface is substantially constant for any point on the surface of the earth, the value of gravitational acceleration (obtained by vectorially summing the gravitational acceleration components) will be the same for each measurement. That is, the vector sum of each set of gravitational acceleration components will always give the same total value of gravitational acceleration experienced by the body as long as the body is at rest relative to an inertial frame of reference. This value is the gravitational acceleration of approximately thirty two feet per second per second (32 ft/sec2) or approximately nine and eight tenths meters per second per second (9.8 m/sec2). This value is customarily referred to as one “g.” Processor 47 in controller 940 is capable of being programmed to sound an alarm condition when controller 940 receives signals from accelerometers 910, 920 and 930 that exceed an alarm limit set in accordance with pre-programmed instructions. In this manner, controller 940 can identify when the body to which accelerometers 910, 920 and 930 have been coupled has experienced an acceleration that exceeds a specified value. Processor 47 is capable of combining the alternating current (ac) voltage components from accelerometers 910, 920 and 930 (representing dynamic acceleration due to external forces in their respective x, y and z directions) and the direct current (dc) voltage components from accelerometers 910, 920 and 930 (representing static acceleration due to gravity in their respective x, y and z directions) to obtain a total value of the acceleration that the body experiences (due to dynamic acceleration and due to gravity). Because the value of acceleration due to gravity will always be equal to one “g”, any total value of acceleration that exceeds one “g” will be caused by the presence of dynamic acceleration on the body. In an advantageous embodiment of the present invention, processor 47 is programmed to sound an alarm condition when controller 940 receives signals from accelerometers 910, 920 and 930 that indicate that the total value of acceleration detected exceeds one “g.” In this manner, controller 940 determines that the body has experienced dynamic acceleration due to external forces because the measured acceleration has exceeded the “background” acceleration reading that is always present from gravitational acceleration. Controller 940 receives the total acceleration signal in the x direction from accelerometer 910, and the total acceleration signal in the y direction from accelerometer 920, and the total acceleration signal in the z direction from accelerometer 930. Controller 940 then combines the total acceleration components to obtain the total acceleration experienced by the body. Controller 940 then subtracts the value of one “g” from the total acceleration. If the result is greater than zero, then controller 940 has determined that the body has experienced dynamic acceleration due to external forces. Controller 940 then sends an alarm signal in the manner previously described. In an alternate advantageous embodiment of the present invention, a first plural axis accelerometer 910 and a second plural axis accelerometer 920 are coupled to controller 940 in the orientations shown in FIG. 11. Accelerometer 910 is aligned as shown in frame 1110. The first axis of accelerometer 910 is aligned parallel to the x axis and the second axis of accelerometer is aligned parallel to the y axis. Accelerometer 920 is aligned as shown in frame 1120. The first axis of accelerometer 920 is aligned parallel to the negative y axis and the second axis of accelerometer 920 is aligned parallel to the z axis. An advantage is to be gained by aligning accelerometer 910 and accelerometer 920 in this manner. When accelerometer 910 and accelerometer 920 share a common axis it is possible to scale out any inconsistencies between the readings of the two accelerometers. For example, assume that it is known that a force exists in the y direction. Then the force in the y direction will be the same for both of the two accelerometers. Assume that accelerometer 910 gives a reading of “1.0” for the y direction force and that accelerometer 920 gives a reading of “0.9” for the y direction force. If it is determined that accelerometer 910 has the correct reading, then accelerometer 920 can be “scaled up” (i.e., corrected) to compensate for inconsistencies in the manufacture of accelerometer 920. FIG. 12 illustrates an exemplary embodiment of the present invention in which accelerometer 910 and accelerometer 920 are coupled to controller 940. Accelerometer 910 measures accelerations of the body in the positive x direction and in the positive y direction. Accelerometer 920 measures accelerations of the body in the negative y direction and in the positive z direction. The analog x signal from accelerometer 910 is coupled to an analog digital converter (ADC) 1215 through filter 1205. Similarly, the analog y signal from accelerometer 910 is coupled to ADC 1215 through filter 1210. Filter 1205 and filter 1210 filter out noise artifacts and cancel high frequency elements that may cause analog to digital aliasing. Filter 1205 and filter 1210 may be partially implemented using digital signal processing within controller 940. ADC 1215 converts analog signals from filter 1205 and filter 1210 to digital signals. ADC 1215 may be external to controller 940 or may be incorporated within controller 940. Similarly, the analog −y (i.e., negative y) signal from accelerometer 920 is coupled to ADC 1215 through filter 1225. The analog z signal from accelerometer 920 is coupled to ADC 1215 through filter 1230. Filter 1225 and filter 1230 also filter out noise artifacts and cancel high frequency elements that may cause analog to digital aliasing. Filter 1225 and filter 1230 may be partially implemented using digital signal processing within controller 940. Controller 940 uses the x, y, z acceleration values to calculate values for the x, y, z distances. This calculation is done by first calculating a time integral of the x, y, z acceleration values to obtain x, y, z velocity values. Then a time integral of the x, y, z velocity values is calculated to obtain the x, y, z distance values. Controller 940 then uses Equations (4), (5), and (6) to calculate the spherical polar (SP) coordinates R, Θ, Φ. Controller 940 then sends the digital form of the R, Θ, Φ coordinates to digital to analog converter (DAC) 1240. DAC 1240 converts the digital form of the R, Θ, Φ coordinates into an analog form. DAC 1240 may be external to controller 940 or may be incorporated within controller 940. The analog R signal is filtered in filter 1250. The analog Θ signal is filtered in filter 1260. The analog Φ signal is filtered in filter 1270. The filtered R, Θ, Φ signals are the spherical polar (SP) components of a vector that represents a measurement of the location of the body to which accelerometer 910 and accelerometer 920 are attached. In one advantageous embodiment of the present invention, controller 940 uses indicating means 41 to transmit the SP coordinates to RF receiver 115 and processor 117 (as shown in FIG. 7). As previously mentioned, RF receiver 115 is tuned to receive transmissions from indicating means 41. As will be more fully described, processor 117 is capable of analyzing the SP coordinate information that it receives from controller 940. As time passes, the body to which accelerometer 910 and accelerometer 920 and controller 940 are attached moves (or does not move). Therefore, controller 940 continually sends to processor 117 a stream of SP coordinates that represent the motion of the body. Memory 121 attached to processor 117 contains a library of prerecorded sets of SP coordinates in which each prerecorded set of SP coordinates represents a type of motion. For example, a first prerecorded set of SP coordinates could represent inactivity or the absence of motion (i.e., “no motion”). The absence of motion could signify the existence of a problem condition. If the body to which accelerometer 910 and accelerometer 920 and controller 940 is attached is a person, then a “no motion” signal could mean that (1) the person has become unconscious and has ceased moving, or that (2) the sensor device has become detached from the person, or that (3) the sensor device has ceased to function properly. A second prerecorded set of SP coordinates could represent a successful attempt to change position. A third prerecorded set of SP coordinates could represent an unsuccessful attempt to change position. A fourth prerecorded set of SP coordinates could represent the motion of a body moving with a particular type of gait, and especially a gait that is associated with a disability (e.g., limping). The term “moving” generally refers to all types of motion such as walking, running, skipping, jogging, jumping, and other types of motion. A fifth prerecorded set of SP coordinates could represent the motion of a person who is unsteady and is swaying back and forth. A sixth prerecorded set of SP coordinates could represent the motion of a person who experiences a “near fall.” A near fall occurs when a person loses his or her balance but recovers in time to keep from actually falling. A seventh prerecorded set of SP coordinates could represent the motion of a person who experiences an actual fall. A series of different types of motion may be recorded in which each type of motion is represented by a prerecorded set of SP coordinates. Processor 117 analyzes the SP coordinate information that it receives from controller 940 by comparing it with each prerecorded set of SP coordinates stored in memory 121. When processor 117 identifies a match between the measured set of SP coordinates from controller 940 and one of the prerecorded sets of SP coordinates stored in memory 121, then processor 117 generates and sends a message that a match has been found. The message may be sent by audible alarm 123, LED bank 107 and/or retransmission unit 125. In this manner, controller 940 identifies types of motions that the body experiences including, without limitation, falls, near falls and particular types of gaits of motion. The ability of processor 117 to detect patterns of motion that typically precede a fall is very useful in preventing falls. For example, an elderly or infirm person who attempts to rise from a bed or chair may be subject to falling. Assume that processor 117 detects a pattern of motion that typically occurs before a fall when a person is attempting to rise from a bed or a chair. Processor 117 can then activate an alarm to alert the person that a fall may be imminent. Upon hearing the alarm, the person is warned to cease his or her attempt to rise. A nearby caregiver may also hear the alarm and come to assist the person before a fall occurs. In this manner serious falls can be prevented. In an alternate advantageous embodiment of the present invention, controller 940 contains the library of prerecorded sets of SP coordinates. In this embodiment, controller 940 performs the analysis of the SP coordinate data. When a match is found, controller 940 generates and sends a message (using indicating means 41) that a match has been found. An alarm may then be sounded in the manner previously described. FIG. 13 illustrates a flow diagram showing a first portion of an advantageous embodiment of the method of the present invention. The steps of the first portion of the method are collectively referred to with the reference numeral 1300. At the start of the method, accelerometer 910 and accelerometer 920 measure the x, y, z values of acceleration (step 1310). Controller 940 then calculates the x, y, z distance values (step 1320). Controller 940 then converts the x, y, z distance values to spherical polar (SP) coordinates (step 1330). Processor 117 (or controller 940 in an alternative embodiment) compares a measured set of SP coordinates with each of the plurality of prerecorded sets of SP coordinates that represents a type of motion (step 1340). Processor 117 (or controller 940 in an alternative embodiment) identifies a match between the measured set of SP coordinates and one particular prerecorded set of SP coordinates that represents a type of motion (step 1350). Processor 117 (or controller 940 in an alternative embodiment) then sends a message that a match has been found (step 1360). FIG. 14 illustrates a flow diagram showing a second portion of an advantageous embodiment of the method of the present invention. The steps of the second portion of the method are collectively referred to with the reference numeral 1400. The second portion of the method uses the SP coordinate data to calculate a value for a static acceleration vector that represents the value of the earth's gravitational acceleration. When an object falls in a vacuum (i.e., an environment where there is no frictional force due to air resistance) the sum of the components for the static acceleration vector is zero. When a person loses his or her balance and falls, the measurement of the static acceleration vector that controller 940 records is not zero. The measured value is less than one “g” but is greater than a zero value. The value is greater than zero because the person's muscle tone (due to the slight contraction of skeletal muscles that is always present) operates to slow the person's body a little bit as the body falls. In some cases, objects may impede the person's fall or the person may reflexively grasp some object to slow the rate of fall. When the value of the static acceleration vector reaches a value that is less than one “g” but greater than a zero value, that is an indication that controller 940 has experienced a fall. Unlike some types of prior art methods (e.g., tilt switches), this method of detecting a fall does not rely on detecting a change in the angle of orientation of the body. The occurrence of a fall is detected by detecting a reduction in the value of the static acceleration vector to a value that is less than one “g.” If controller 940 was not connected to a person's body during the fall, then the value of the static acceleration vector measured by controller 940 after the fall will instantaneously be equal to one “g.” If controller 940 was connected to a person's body during the fall, then the value of the static acceleration vector measured by controller 940 after the fall will, rise relatively slowly. This is due to the fact that the person's muscle tone (due to the slight contraction of skeletal muscles that is always present) operates to slow the rise of the value of the static acceleration vector after the fall. If the value of the static acceleration vector rises at a rate that is greater than a preselected threshold rate, then it is clear that controller 940 was not connected to a person's body during the fall. If the value of the static acceleration vector rises at a rate that is less than a predetermined threshold rate, then it is clear that controller 940 was connected to a person's body during the fall. At the start of the second portion of the method of the present invention, controller 940 has converted the x, y, z distance values to spherical polar (SP) coordinates (step 1330). Controller 940 then uses the SP coordinates to calculate the value of the static acceleration vector (step 1410). Controller 940 determines whether the value of the static acceleration vector has reached a value that is less than one “g” (decision step 1420). If not, then controller 940 updates the SP coordinates (step 1430) and control returns to step 1410. If the value of the static acceleration vector has reached a value that is less than one “g,” then controller 940 determines the rate at which the value of the static acceleration vector is increasing from the value that is less than one “g” (step 1440). Processor 940 then compares the rate to a preselected threshold rate (decision step 1450). If the rate is greater than the preselected threshold rate, then controller 940 sends a message that controller 940 was not connected to the person's body during the fall (step 1470). If the rate is not greater than the preselected threshold rate, then controller 940 sends a message that controller 940 was connected to the person's body during the fall (step 1460). In this manner controller 940 is able to distinguish between a fall of controller 940 alone and a fall of controller 940 while controller 940 was coupled to a person's body. Relatively rare instances may occur in which controller 940 will require additional information to distinguish between a fall of controller 940 alone and a fall of controller 940 while controller 940 is coupled to a person's body. As previously described, the measured value of acceleration of a falling person is usually less than one “g” but is greater than a zero value. The value is greater than zero because the person's muscle tone (due to the slight contraction of skeletal muscles that is always present) operates to slow the person's body a little bit as the body falls. This is true for normal falling situations. However, it is not true in the relatively rare cases in which the falling person's body is not in contact with any object. For example, if a person falls off a ladder, then the person's body falls through the atmosphere and does not make contact with any object until impact with the floor or ground. In this type of fall the falling person's muscle tone does not operate to slow the person's body during the fall because the person is not in contact with an external object. An alternate advantageous embodiment of the present invention can detect this type of fall. In the alternate embodiment controller 940 detects an additional signal to determine whether controller 940 was coupled to the falling person's body. For example, as previously described, controller 940 comprises processing circuitry 39 that is capable of receiving a signal from respiration module 73. Respiration module 73 is capable of detecting the respiration rate of the falling person. In an alternate embodiment of the present invention, controller 940 detects a rate at which the value of the static acceleration vector is increasing from a value that is less than one “g”. If the detected rate is greater than a preselected threshold rate (usually indicative of a fall of controller 940 not coupled to a body), then controller 940 determines whether a respiration signal was detected within a predetermined time period (e.g., six (6) seconds). If a respiration signal was detected, then processor 940 reports that the fall was a fall of controller 940 connected to a body and not a fall of controller 940 alone. Although the present invention has been described in detail, those skilled in the art should understand that they can make various changes, substitutions and alterations herein without departing from the spirit and scope of the invention in its broadest form.
<SOH> BACKGROUND OF THE INVENTION <EOH>Methods for determining specific movements of a body that use a variety of devices, apparatus and systems are, generally speaking, known. The term “body” is defined broadly hereafter and includes both organic and inorganic objects. In point of fact, many methods are known for sensing body movement, or non-movement (i.e., sensed dynamic accelerations, including cessation of movement), as well as, for sensing body movement over time, which is commonly used to determine comparative levels of activity of a monitored body (See, U.S. Pat. Nos. 4,110,741, 4,292,630, 5,045,839, and 5,523,742). These methodologies, however, merely report various levels of body activity, and, simply stated, fail to recognize possible causes for any increased or decreased level of body activity. In contrast, other methodologies have developed over time for the detection of falls (See also, U.S. Pat. Nos. 4,829,285, 5,477,211, 5,554,975, and 5,751,214). These methodologies are largely based upon the utilization of one or more mechanical switches (e.g., mercury switches) that determine when a body has attained a horizontal position. These methods however fail to discern “normal,” or acceptable, changes in levels of body activity. Stated another way, the foregoing fall detection methodologies provide no position change analysis and, therefore, cannot determine whether a change in position, once attained, is acceptable or unacceptable. Various training methods have been conceived for sensing relative tilt of a body (See, U.S. Pat. Nos. 5,300,921 and 5,430,435), and some such methodologies have employed two-axis accelerometers. The output of these devices, however, have reported only static acceleration of the body (i.e., the position of a body relative to earth within broad limits). It should be appreciated that static acceleration, or gravity, is not the same as a lack of dynamic acceleration (i.e., vibration, body movement, and the like), but is instead a gauge of position. While accelerometers that measure both static and dynamic acceleration are known, their primary use has heretofore been substantially confined to applications directed to measuring one or the other, but not both. Thus, it may be seen that the various conventional detectors fall into one of two varieties, those that gauge movement of the body and those that gauge a body's position by various means, with neither type capable of evaluating body movement to determine whether the same is normal or abnormal; and if abnormal, whether such movement is so abnormal to be beyond tolerance, for instance, to be damaging, destructive, crippling, harmful, injurious, or otherwise alarming or, possibly, distressing to the body. None of the methodologies heretofore known have provided a suitable means to evaluate body movement over time and to determine whether such movement is tolerable. Further improvement could thus be utilized.
<SOH> SUMMARY OF THE INVENTION <EOH>To address the above-introduced deficiencies of the prior art, the present invention introduces systems, as well as methods of operating such systems, for evaluating movement of a body relative to an environment. For the purposes hereof, the term “body” is defined broadly, meaning any organic or inorganic object whose movement or position may suitably be evaluated relative to its environment in accordance with the principles hereof; and where the term “environment” is defined broadly as the conditions and the influences that determine the behavior of the physical system in which the body is located. An advantageous embodiment of a system that evaluates movement of a body relative to an environment in accordance herewith includes both a sensor and a processor. In operation, the sensor is associated with the body and operates to repeatedly sense accelerative phenomena of the body. The processor, which is associated with the sensor, processes the sensed accelerative phenomena as a function of at least one accelerative event characteristic to determine whether the evaluated body movement is within environmental tolerance. The processor also preferably generates state indicia while processing the sensed accelerative phenomena, which represents the state of the body within the environment over time. For the purposes hereof, the term “sensor” is defined broadly, meaning a device that senses one or more absolute values, changes in value, or some combination of the same, of at least the sensed accelerative phenomena. According to an advantageous embodiment, described in detail hereafter, the sensor may be a plural-axis sensor that senses accelerative phenomena and generates an output signal to the processor indicative of measurements of both dynamic and static acceleration of the body in plural axes. According to this embodiment, the processor receives and processes the output signal. The processor is preferably programmed to distinguish between normal and abnormal accelerative events, and, when an abnormal event is identified, to indicate whether the abnormal event is tolerable, or within tolerance. In further embodiments, the processor may be programmed to distinguish other physical characteristics, including temperature, pressure, force, sound, light, relative position, and the like. It should be noted that the relevant environment may be statically or dynamically represented. The sophistication of any such representation may be as complex or as uncomplicated as needed by a given application (e.g., disability, injury, infirmity, relative position, or other organic assistance monitoring; cargo or other transport monitoring; military, paramilitary, or other tactical maneuver monitoring; etc.). It should further be noted that any representation may initially be set to, or reset to, a default, including, for instance, a physically empty space, or vacuum. Regardless, the principles of the advantageous exemplary embodiment discussed heretofore require at least one accelerative event characteristic to be represented to enable the processor to determine whether the evaluated body movement is within environmental tolerance, which is again advantageously based upon both dynamic and static acceleration measurements. According to a related embodiment, the processor is further operable, in response to processing the sensed accelerative phenomena, to generate state indicia, which includes tolerance indicia, generated in response to determining whether the evaluated body movement is within environmental tolerance. Preferably, such tolerance indicia is compared with at least one threshold, likely associated with the accelerative event characteristic. In response to such comparison, the processor controls a suitable indicating means to initiate an alarm event; to communicate such tolerance indicia to a monitoring controller; to generate statistics; or the like. According to a related advantageous embodiment, the system may be associated with other components or sensing systems. For instance, in an assistance monitoring application, the sensor may repeatedly sense dynamic and static acceleration of the body in the plural axes and generate output signals indicative of the measurements. The processor continuously processes the output signals to distinguish between selected accelerative and non-selected accelerative events (described in detail hereafter) based upon both the dynamic and the static acceleration of the body, and generates state indicia, including tolerance indicia, that is communicated to a remote monitoring controller. The tolerance indicia is communicated to the monitoring controller for record keeping/statistical purposes, as well as to provide “live” monitoring of the individual subscriber. Communication between the processor and the controller may be by a wireless network, a wired network, or some suitable combination of the same, and may include the Internet. Preferably, the system generates an alert whenever the monitored subscriber is in “jeopardy,” as determined by the system, such as in response to a debilitating fall by the subscriber. In a further embodiment, the processor is operable to repeatedly generate “heartbeat” indicia that indicates that the system is in an operable state, whereby absence of the same informs the monitoring controller that some other part of the system is malfunctioning. The foregoing has outlined rather broadly the features and technical advantages of the present invention so that those skilled in the art may better understand the D ETAILED D ESCRIPTION OF THE I NVENTION that follows. Additional features and advantages of the invention will be described hereinafter that form the subject of the claims of the invention. Those skilled in the art should appreciate that they may readily use the conception and specific embodiments disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. Those skilled in the art should also realize that such equivalent constructions do not depart from the spirit and scope of the invention in its broadest form. Before undertaking the D ETAILED D ESCRIPTION OF THE I NVENTION, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, and the term “associable” may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the terms “controller” and “processor” mean any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some suitable combination of at least two of the same. It should be noted that the functionality associated with any particular controller/processor may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
20040309
20060822
20050526
62242.0
12
NGUYEN, TAI T
SYSTEM AND METHOD FOR DETECTING MOTION OF A BODY
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,796,719
ACCEPTED
Methods and compositions for the treatment of gastrointestinal disorders
The present invention features compositions and related methods for treating IBS and other gastrointestinal disorders and conditions (e.g., gastrointestinal motility disorders, functional gastrointestinal disorders, gastroesophageal reflux disease (GERD), Crohn's disease, ulcerative colitis, Inflammatory bowel disease, functional heartburn, dyspepsia (including functional dyspepsia or nonulcer dyspepsia), gastroparesis, chronic intestinal pseudo-obstruction (or colonic pseudo-obstruction), and disorders and conditions associated with constipation, e.g., constipation associated with use of opiate pain killers, post-surgical constipation (post-operative ileus), and constipation associated with neuropathic disorders as well as other conditions and disorders using peptides and other agents that activate the guanylate cyclase C (GC-C) receptor.
1. A purified peptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO:119) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing. 2. The purified peptide of claim 1 wherein Xaa5 is Asn, Trp, Tyr, Asp, or Phe. 3. The purified peptide of claim 1 wherein Xaa5 is Thr or Ile. 4. The purified peptide of claim 1 wherein Xaa5 is Tyr, Asp or Trp. 5. The purified peptide of claim 1 wherein Xaa8 is Glu, Asp, Gln, Gly or Pro. 6. The purified peptide of claim 1 wherein Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe. 7. The purified peptide of claim 1 wherein Xaa9 is Leu, Ile, Val, Lys, Arg, Trp, Tyr or Phe. 8. The purified peptide of claim 1 wherein Xaa12 is Asn, Tyr, Asp or Ala. 9. The purified peptide of claim 1 wherein Xaa13 is Ala, Pro or Gly. 10. The purified peptide of claim 1 wherein Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, or Asp. 11. The purified peptide of claim 1 wherein Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp. 12. The purified peptide of claim 1 wherein Xaa17 is Gly, Pro or Ala. 13. The purified peptide of claim 1 wherein Xaa19 is Trp, Tyr, Phe, Asn or Leu. 14. The purified peptide of claim 1 wherein Xaa19 is Lys or Arg. 15. The purified peptide of claim 1 wherein Xaa20 Xaa21 is AspPhe or Xaa20 is Asn or Glu and Xaa21 is missing. 16. The purified peptide of claim 1 wherein Xaa19Xaa20 Xaa21 is missing. 17. A purified peptide comprising the amino acid sequence: Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[[---]]28). Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; 18. A purified peptide comprising the amino acid sequence: Cys Cys Glu Tyr Cys Cys Asn (SEQ ID NO:[[--]]31). Pro Ala Cys Thr Gly Cys Tyr; 19. A purified peptide consisting of the amino acid sequence: Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[[---]]28). Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr 20. A purified peptide consisting of the amino acid sequence: Cys Cys Glu Tyr Cys Cys Asn (SEQ ID NO:[[--]]31). Pro Ala Cys Thr Gly Cys Tyr; 21. A method for treating a gastrointestinal disorder in a patient comprising administering a purified peptide comprising the amino acid sequence: Asn Ser Ser Asn Tyr Cys Cys Glu Leu Cys (SEQ ID NO:[[--]]26). Cys Asn Pro Ala Cys Thr Gly Cys Tyr; 22. A method for treating a gastrointestinal disorder in a patient comprising administering a purified peptide comprising the amino acid sequence: Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[[---]]28). Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; 23. A method for treating a gastrointestinal disorder in a patient comprising administering a purified peptide comprising the amino acid sequence: Cys Cys Glu Leu Cys Cys Asn (SEQ ID NO:[[--]]29). Pro Ala Cys Thr Gly Cys Tyr; 24. A method for treating a gastrointestinal disorder in a patient comprising administering a purified peptide comprising the amino acid sequence: Cys Cys Glu Tyr Cys Cys Asn (SEQ ID NO:[[--]]29). Pro Ala Cys Thr Gly Cys Tyr; 25. A purified polypeptide comprising an amino acid sequence of any of: Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[[--]]27) Glu Leu Cys Cys Asn Pro Ala Cys Trp Gly Cys Tyr; Cys Cys Glu Leu Cys Cys Asn (SEQ ID NO:[---]30) Pro Ala Cys Trp Gly Cys Tyr; Asn Cys Cys Glu Leu Cys Cys (SEQ ID NO:[[---]32) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Cys Cys Glu Leu Cys Cys (SEQ ID NO:[---]33) Asn Pro Ala Cys Trp Gly Cys Tyr; Asn Cys Cys Glu Phe Cys Cys (SEQ ID NO:[---]34) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Cys Cys Glu Tyr Cys Cys (SEQ ID NO:[---]35) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Cys Cys Glu Trp Cys Cys (SEQ ID NO:[---]36) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Cys Cys Glu Arg Cys Cys (SEQ ID NO:[---]37) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Cys Cys Glu Lys Cys Cys (SEQ ID NO:[---]38) Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]39) Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]40) Glu Leu Cys Cys Asn Pro Ala Cys Trp Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]41) Glu Phe Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]42) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]43) Glu Trp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]44) Glu Arg Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]45) Glu Lys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Leu Cys Cys Asn (SEQ ID NO:[---]46) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Leu Cys Cys Asn (SEQ ID NO:[---]47) Pro Ala Cys Trp Gly Cys Tyr Asp Phe; Cys Cys Glu Phe Cys Cys Asn (SEQ ID NO:[---]48) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Tyr Cys Cys Asn (SEQ ID NO:[---]49) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Trp Cys Cys Asn (SEQ ID NO:[---]50) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Arg Cys Cys Asn (SEQ ID NO:[---]51) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Cys Cys Glu Lys Cys Cys Asn (SEQ ID NO:[--]52) Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Leu Cys Cys (SEQ ID NO:[--]53) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Leu Cys Cys (SEQ ID NO:[---]54) Asn Pro Ala Cys Trp Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Phe Cys Cys (SEQ ID NO:[---]55) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Tyr Cys Cys (SEQ ID NO:[---]56) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Trp Cys Cys (SEQ ID NO:[---]57) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Arg Cys Cys (SEQ ID NO:[---]58) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Asn Cys Cys Glu Lys Cys Cys (SEQ ID NO:[---]59) Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe; Gln Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[---]67) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Thr Ser Asn Tyr Cys Cys (SEQ ID NO:[---]68) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Leu Ser Asn Tyr Cys Cys (SEQ ID NO:[---]69) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ile Ser Asn Tyr Cys Cys (SEQ ID NO:[---]70) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Gln Tyr Cys Cys (SEQ ID NO:[---]71) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:[---]72) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Gln Ser Ser Gln Tyr Cys Cys (SEQ ID NO:[---]73) Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Ser Ser Gln Tyr Cys Cys Glu (SEQ ID NO:[---]74) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:75) Glu Ala Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:76) Glu Arg Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:77) Glu Asn Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:78) Glu Asp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:79) Glu Cys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:80) Glu Gln Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:81) Glu Glu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:82) Glu Gly Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:83) Glu His Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:84) Glu Ile Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:85) Glu Lys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:86) Glu Met Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:87) Glu Phe Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:88) Glu Pro Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:89) Glu Ser Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:90) Glu Thr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:91) Glu Trp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:92) Glu Val Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Ala Cys Cys Asn (SEQ ID NO:93) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Arg Cys Cys Asn (SEQ ID NO:94) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Asn Cys Cys Asn (SEQ ID NO:95) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Asp Cys Cys Asn (SEQ ID NO:96) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Cys Cys Cys Asn (SEQ ID NO:97) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Gln Cys Cys Asn (SEQ ID NO:98) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Glu Cys Cys Asn (SEQ ID NO:99) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Gly Cys Cys Asn (SEQ ID NO:100) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu His Cys Cys Asn (SEQ ID NO:101) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Ile Cys Cys Asn (SEQ ID NO:102) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Lys Cys Cys Asn (SEQ ID NO:103) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Met Cys Cys Asn (SEQ ID NO:104) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Phe Cys Cys Asn (SEQ ID NO:105) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Pro Cys Cys Asn (SEQ ID NO:106) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Ser Cys Cys Asn (SEQ ID NO:107) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Thr Cys Cys Asn (SEQ ID NO:108) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Trp Cys Cys Asn (SEQ ID NO:109) Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Val Cys Cys Asn (SEQ ID NO:110) Pro Ala Cys Thr Gly Cys Tyr; Asn Ser Ser Asn Tyr Cys Cys (SEQ ID NO:[--]26) Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr; and Cys Cys Glu Leu Cys Cys Asn (SEQ ID NO:[--]29). Pro Ala Cys Thr Gly Cys Tyr; Cys Cys Glu Tyr Cys Cys Asn (SEQ ID NO:125) Pro Ala Cys Thr Gly Cys Cys Cys Glu Arg Cys Cys Asn (SEQ ID NO:127) Pro Ala Cys Thr Gly Cys Cys Cys Glu Asn Cys Cys Asn (SEQ ID NO:128) Pro Ala Cys Thr Gly Cys Cys Cys Glu Asp Cys Cys Asn (SEQ ID NO:129) Pro Ala Cys Thr Gly Cys Cys Cys Glu Cys Cys Cys Asn (SEQ ID NO:130) Pro Ala Cys Thr Gly Cys Cys Cys Glu Gln Cys Cys Asn (SEQ ID NO:131) Pro Ala Cys Thr Gly Cys Cys Cys Glu Glu Cys Cys Asn (SEQ ID NO:132) Pro Ala Cys Thr Gly Cys Cys Cys Glu Gly Cys Cys Asn (SEQ ID NO:133) Pro Ala Cys Thr Gly Cys Cys Cys Glu His Cys Cys Asn (SEQ ID NO:134) Pro Ala Cys Thr Gly Cys Cys Cys Glu Ile Cys Cys Asn (SEQ ID NO:135) Pro Ala Cys Thr Gly Cys Cys Cys Glu Lys Cys Cys Asn (SEQ ID NO:136) Pro Ala Cys Thr Gly Cys Cys Cys Glu Met Cys Cys Asn (SEQ ID NO:137) Pro Ala Cys Thr Gly Cys Cys Cys Glu Phe Cys Cys Asn (SEQ ID NO:138) Pro Ala Cys Thr Gly Cys Cys Cys Glu Pro Cys Cys Asn (SEQ ID NO:139) Pro Ala Cys Thr Gly Cys Cys Cys Glu Ser Cys Cys Asn (SEQ ID NO:140) Pro Ala Cys Thr Gly Cys Cys Cys Glu Thr Cys Cys Asn (SEQ ID NO:141) Pro Ala Cys Thr Gly Cys Cys Cys Glu Trp Cys Cys Asn (SEQ ID NO:142) Pro Ala Cys Thr Gly Cys Cys Cys Glu Val Cys Cys Asn (SEQ ID NO:143) Pro Ala Cys Thr Gly Cys 26. A method for treating a gastrointestinal disorder in a patient comprising administering the peptide of claim 1. 27. A method for treating a gastrointestinal disorder in a patient comprising administering the peptide of claim 25. 28. A method for treating a gastrointestinal disorder in a patient comprising administering a GC-C receptor agonist, a pharmaceutical acceptable carrier and a second therapeutic agent selected from the group consisting of acid reducing agents including proton pump inhibitors and H2 receptor blockers promotility agents including 5HT receptor agonists and motilin agonists, anti-inflammatory agents, antispasmodics, antidepressants and laxatives and analgesic agents. 29. A method for treating a gastrointestinal disorder in a patient comprising administering the peptide of any of the claims 1, 17-20 and 25, a pharmaceutical acceptable carrier and a second therapeutic agent selected from the group consisting of acid reducing agents including proton pump inhibitors and H2 receptor blockers promotility agents including 5HT receptor agonists and motilin agonists, anti-inflammatory agents, antispasmodics, antidepressants and laxatives and analgesic agents. 30. The method of any of claims 21-24, 26, 27 and 28 wherein the gastrointestinal disorder is a gastrointestinal motility disorder. 31. The method of any of claims 21-24, 26, 27 and 28 wherein the gastrointestinal disorder is selected from the group consisting of a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis, inflammatory bowel disease and post-operative ileus. 32. A method for treating obesity comprising administering the peptide of any of claims 1, 17-20 and 25. 33. A method for treating congestive heart failure comprising administering the peptide of any of claims 1, 17-20 and 25. 34. A method for treating benign prostatic hyperplasia comprising administering the peptide of any of claims 1, 17-20 and 25. 35. The purified peptide of any of claims 1, 17, 18 and 25 wherein the polypeptide comprises the amino acid sequence DF; QHNPR (SEQ ID NO:111); VQHNPR (SEQ ID NO:112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO:114); VRGPQHNPR (SEQ ID NO:115); VRGPRQHNPR (SEQ ID NO:116); VRGPRRQHNPR (SEQ ID NO: 117); or RQHNPR (SEQ ID NO:118) fused to its amino terminus or its caboxy terminus. 36. The purified peptide of any of claims 1, 17, 18 and 25 wherein the purified polypeptide comprises the amino acid sequence of an analgesic peptide selected from the group consisting of endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance P fused to its amino terminus or its carboxy terminus. 37. The purified peptide of any of claims 1, 17, 18 and 25 wherein the polypeptide includes no more than 10 additional amino acids at its amino terminus or carboxy terminus or both and wherein the polypeptide is a guanylate cyclase receptor agonist. 38. The purified peptide of claim 1 wherein wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; and Xaa20 Xaa21 is AspPhe or is missing. 39. A method for treating a patient suffering from constipation, the method comprising administering the polypeptide of any of claims 1, 17-20 and 25. 40. A method for increasing the activity of an intestinal guanylate cyclase (GC-C) receptor in a patient, the method comprising administering the polypeptide of any of claims 1, 17-20 and 25. 41. A method for increasing intestinal levels of cGMP in a patient, the method comprising administering the polypeptide of any of claims 1, 17-20 and 25. 42. The method of claim 41 wherein the levels of cGMP are increased in intestinal mucosa. 43. A method for increasing intestinal levels of cGMP in a patient, the method comprising administering a GC-C receptor agonist. 44. The method of claim 43 wherein levels of cGMP are increased in intestinal mucosa. 45. A method for increasing the activity of an intestinal guanylate cyclase (GC-C) receptor in a patient, the method comprising administering a GC-C receptor agonist. 46. A method for treating a gastrointestinal disorder in a patient comprising administering a GC-C receptor agonist. 47. The method of claim 46 wherein the gastrointestinal disorder is a gastrointestinal motility disorder. 48. The method of claim 46 wherein the gastrointestinal disorder is selected from the group consisting of a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis inflammatory bowel disease and post-operative ileus. 49. A method for treating obesity comprising administering a GC-C receptor agonist. 50. A method for treating congestive heart failure comprising administering a GC-C receptor agonist. 51. A method for treating benign prostatic hyperplasia comprising administering a GC-C receptor agonist. 52. A method for treating visceral pain comprising administering a GC-C receptor agonist. 53. A method for treating inflammation comprising administering a GC-C receptor agonist. 54. A method for treating constipation comprising administering a GC-C receptor agonist. 55. A method for treating visceral pain comprising administering the polypeptide of any of claims 1, 17-20 and 25. 56. A method for treating inflammation comprising administering the polypeptide of any of claims 1, 17-20 and 25. 57. A method for treating cystic fibrosis comprising administering the polypeptide of any of claims 1, 17-20 and 25. 58. A method for treating cystic fibrosis comprising administering a GC-C receptor agonist. 59. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 and a pharmaceutically acceptable carrier. 60. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 surrounded by an enteric coating. 61. A controlled release pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 and a biodegradable polymeric matrix. 62. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25, a pharmaceutically acceptable carrier and at least one analgesic agent selected from the group consisting of: Ca channel blockers (e.g., ziconotide), 5HT receptor agonists, 5HT receptor antagonists, opioid receptor agonists NK1 receptor antagonists, CCK receptor agonists, NK1 receptor antagonists, NK3 receptor antagonists, norepinephrine-serotonin reuptake inhibitors vanilloid and cannabanoid receptor agonists, sialorphin, sialorphin-related peptides 63. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25, a phosphodiesterase inhibitor and a pharmaceutically acceptable carrier. 64. A method for treating cancer, a respiratory disorder, a neurological disorder, a disorder associated with fluid and sodium retention, a disorder associated with carbonate imbalance, erectile dysfunction, an insulin-related disorder, or an inner ear disorder, the method comprising administering the peptide of any of claims 1, 17-20 and 25. 65. A method for treating cancer, a respiratory disorder, a neurological disorder, a disorder associated with fluid and sodium retention, a disorder associated with carbonate imbalance, erectile dysfunction, an insulin-related disorder, or an inner ear disorder, the method comprising administering a GC-C receptor agonist. 66. A method of producing the peptide of any of claims 1, 17-20 and 25, comprising providing a cell harboring a nucleic acid molecule encoding the polypeptide, culturing the cell under conditions in which the peptide is expressed, and isolating the expressed peptide. 67. A method of producing the peptide of any of claims 1, 17-20 and 25, comprising chemically synthesizing the peptide and they purifying the synthesized peptide. 68. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 and a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide, a C-type natriuretic peptide, a diuretic, or an inhibitor of angiotensin converting enzyme. 69. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 and a 5-alpha reductase inhibitor or an alpha adrenergic inhibitor. 70. A pharmaceutical composition comprising the peptide of any of claims 1, 17-20 and 25 and gut hormone fragment peptide YY3-36, glp-1, exendin-4, sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride, orlistat, diethylpropion hydrochloride, fluoxetine, bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack, chitosan, nomame herba, galega, conjugated linoleic acid, L-carnitine, fiber, caffeine, dehydroepiandrosterone, germander, B-hydroxy-β-methylbutyrate, or pyruvate. 71. A pharmaceutical composition comprising a GC-C receptor agonist and a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide, a C-type natriuretic peptide, a diuretic, or an inhibitor of angiotensin converting enzyme. 72. A pharmaceutical composition comprising a GC-C receptor agonist and a 5-alpha reductase inhibitor or an alpha adrenergic inhibitor. 73. A pharmaceutical composition comprising a GC-C receptor agonist and gut hormone fragment peptide YY3-36, glp-1, exendin-4, sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride, orlistat, diethylpropion hydrochloride, fluoxetine, bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack, chitosan, nomame herba, galega, conjugated linoleic acid, L-carmitine, fiber, caffeine, dehydroepiandrosterone, germander, B-hydroxy-β-methylbutyrate, or pyruvate. 74. A method for treating congestive heart failure comprising administering the peptide of any of claims 1, 17-20 and 25 and a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide, a C-type natriuretic peptide, a diuretic, or an inhibitor of angiotensin converting enzyme. 75. A method for treating benign prostatic hyperplasia comprising administering the peptide of any of claims 1, 17-20 and 25 and a 5-alpha reductase inhibitor or an alpha adrenergic inhibitor. 76. A method for treating obesity comprising administering the peptide of any of claims 1, 17-20 and 25 and gut hormone fragment peptide YY3-36, glp-1 exendin-4, sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride, orlistat, diethylpropion hydrochloride, fluoxetine, bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack, chitosan, nomame herba, galega, conjugated linoleic acid, L-camitine, fiber, caffeine, dehydroepiandrosterone, germander, B-hydroxy-β-methylbutyrate, or pyruvate. 77. A method for treating congestive heart failure comprising administering a GC-C receptor agonist and a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide, a C-type natriuretic peptide, a diuretic, or an inhibitor of angiotensin converting enzyme. 78. A method for treating benign prostatic hyperplasia comprising a GC-C receptor agonist and a 5-alpha reductase inhibitor or an alpha adrenergic inhibitor. 79. A method for treating obesity comprising administering a GC-C receptor agonist and gut hormone fragment peptide YY3-36, glp-1, exendin-4, sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride, orlistat, diethylpropion hydrochloride, fluoxetine, bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack chitosan, nomame herba, galega, conjugated linoleic acid, L-carnitine, fiber, caffeine, dehydroepiandrosterone, germander, B-hydroxy-β-methylbutyrate, or pyruvate.
CLAIM OF PRIORITY This application is a continuation in part of U.S. Utility patent application Ser. No. 10/766,735, filed Jan. 28, 2004, which claims priority under 35 USC § 119(e) to U.S. Provisional Patent Application Ser. No. 60/443,098, filed on Jan. 28, 2003; U.S. Provisional Patent Application Ser. No. 60/471,288, filed on May 15, 2003 and U.S. Provisional Patent Application Ser. No. 60/519,460, filed on Nov. 12, 2003, the entire contents of which are hereby incorporated by reference. TECHNICAL FIELD This invention relates to methods and compositions for treating various disorders, including gastrointestinal disorders, obesity, congestive heart failure and benign prostatic hyperplasia. BACKGROUND Irritable bowel syndrome (IBS) is a common chronic disorder of the intestine that affects 20 to 60 million individuals in the US alone (Lehman Brothers, Global Healthcare-Irritable bowel syndrome industry update, September 1999). IBS is the most common disorder diagnosed by gastroenterologists (28% of patients examined) and accounts for 12% of visits to primary care physicians (Camilleri 2001, Gastroenterology 120:652-668). In the US, the economic impact of IBS is estimated at $25 billion annually, through direct costs of health care use and indirect costs of absenteeism from work (Talley 1995, Gastroenterology 109:1736-1741). Patients with IBS have three times more absenteeism from work and report a reduced quality of life. Sufferers may be unable or unwilling to attend social events, maintain employment, or travel even short distances (Drossman 1993, Dig Dis Sci 38:1569-1580). There is a tremendous unmet medical need in this population since few prescription options exist to treat IBS. Patients with IBS suffer from abdominal pain and a disturbed bowel pattern. Three subgroups of IBS patients have been defined based on the predominant bowel habit: constipation-predominant (c-IBS), diarrhea-predominant (d-IBS) or alternating between the two (a-IBS). Estimates of individuals who suffer from c-IBS range from 20-50% of the IBS patients with 30% frequently cited. In contrast to the other two subgroups that have a similar gender ratio, c-IBS is more common in women (ratio of 3:1) (Talley et al. 1995, Am J Epidemiol 142:76-83). The definition and diagnostic criteria for IBS have been formalized in the “Rome Criteria” (Drossman et al. 1999, Gut 45:Suppl II: 1-81), which are well accepted in clinical practice. However, the complexity of symptoms has not been explained by anatomical abnormalities or metabolic changes. This has led to the classification of IBS as a functional GI disorder, which is diagnosed on the basis of the Rome criteria and limited evaluation to exclude organic disease (Ringel et al. 2001, Annu Rev Med 52: 319-338). IBS is considered to be a “biopsychosocial” disorder resulting from a combination of three interacting mechanisms: altered bowel motility, an increased sensitivity of the intestine or colon to pain stimuli (visceral sensitivity) and psychosocial factors (Camilleri 2001, Gastroenterology 120:652-668). Recently, there has been increasing evidence for a role of inflammation in etiology of IBS. Reports indicate that subsets of IBS patients have small but significant increases in colonic inflammatory and mast cells, increased inducible nitric oxide (NO) and synthase (iNOS) and altered expression of inflammatory cytokines (reviewed by Talley 2000, Medscape Coverage of DDW week). SUMMARY The present invention features compositions and related methods for treating IBS and other gastrointestinal disorders and conditions (e.g., gastrointestinal motility disorders, functional gastrointestinal disorders, gastroesophageal reflux disease (GERD), Crohn's disease, ulcerative colitis, Inflammatory bowel disease, functional heartburn, dyspepsia (including functional dyspepsia or nonulcer dyspepsia), gastroparesis, chronic intestinal pseudo-obstruction (or colonic pseudo-obstruction), and disorders and conditions associated with constipation, e.g., constipation associated with use of opiate pain killers, post-surgical constipation, and constipation associated with neuropathic disorders as well as other conditions and disorders. The compositions feature peptides that activate the guanylate cyclase C (GC-C) receptor. The present invention also features compositions and related methods for treating obesity, congestive heart failure and benign prostatic hyperplasia (BPH). Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are useful because they can increase gastrointestinal motility. Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are useful, in part, because they can decrease inflammation. Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are also useful because they can decrease gastrointestinal pain or visceral pain. The invention features pharmaceutical compositions comprising certain peptides that are capable of activating the guanylate-cyclase C (GC-C) receptor. Also within the invention are pharmaceutical compositions comprising a peptide of the invention as well as combination compositions comprising a peptide of the invention and a second therapeutic agent, e.g., an agent for treating constipation (e.g., a chloride channel activator such as SPI-0211; Sucampo Pharmaceuticals, Inc.; Bethesda, Md., a laxative such as MiraLax; Braintree Laboratories, Braintree Mass.) or some other gastrointestinal disorder. Examples of a second therapeutic agent include: acid reducing agents such as proton pump inhibitors (e.g. omeprazole, esomeprazole, lansoprazole, pantorazole and rabeprazole) and H2 receptor blockers (e.g. cimetidine, ranitidine, famotidine and nizatidine), pro-motility agents such as motilin agonists (e.g GM-611 or mitemcinal fumarate), and 5HT receptor agonists (e.g. 5HT4 receptor agonists such as Zelnorm®; 5HT3 receptor agonists such as MKC-733), 5HT receptor antagonists (e.g 5HT1, 5HT2, 5HT3 (e.g alosetron), and 5HT4 receptor antagonists; muscarinic receptor agonists, anti-inflammatory agents, antispasmodics, antidepressants, centrally-acting analgesic agents such as opiod receptor agonists, opiod receptor antagonists (e.g. naltrexone), agents for the treatment of Inflammatory bowel disease, Crohn's disease and ulcerative colitis (e.g., Traficet-EN™ (ChemoCentryx, Inc.; San Carlos, Calif.) agents that treat gastrointestinal or visceral pain and cGMP phosphodiesterase inhibitors (motapizone, zaprinast, and suldinac sulfone). The peptides of the invention can also be used in combination with agents such a tianeptine (Stablon®) and other agents described in U.S. Pat. No. 6,683,072; (E)-4 (1,3bis(cyclohexylmethyl)-1,2,34,-tetrahydro-2,6-diono-9H-purin-8-yl)cinnamic acid nonaethylene glycol methyl ether ester and related compounds described in WO 02/067942. The peptides can also be used in combination with treatments entailing the administration of microorganisms useful in the treatment of gastrointestinal disorders such as IBS. Probactrix® (The BioBalance Corporation; New York, N.Y.) is one example of a formulation that contains microorganisms useful in the treatment of gastrointestinal disorders. In addition, the pharmaceutical compositions can include an (OK) agent selected from the group consisting of: Ca channel blockers (e.g., ziconotide), 5HT receptor agonists (e.g 5HT1, 5HT2, 5HT3 and 5HT4 receptor agonists) 5HT receptor antagonists (e.g 5HT1, 5HT2, 5HT3 and 5HT4), opioid receptor agonists (e.g., loperamide, fedotozine, and fentanyl, naloxone, naltrexone, methyl nalozone, nalmefene, cypridime, beta funaltrexamine, naloxonazine, naltrindole, and nor-binaltorphimine, morphine, diphenyloxylate, enkephalin pentapeptide, and trimebutine), NK1 receptor antagonists (e.g., ezlopitant and SR-14033, SSR-241585), CCK receptor agonists (e.g., loxiglumide), NK1 receptor antagonists, NK3 receptor antagonists (e.g., talnetant, osanetant SR-142801, SSR-241585), norepinephrine-serotonin reuptake inhibitors (NSR1; e.g., milnacipran), vanilloid and cannabanoid receptor agonists (e.g., arvanil), sialorphin, sialorphin-related peptides comprising the amino acid sequence QHNPR (SEQ ID NO: 111) for example, VQHNPR (SEQ ID NO: 112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO: 114); VRGPQHNPR (SEQ ID NO:115); VRGPRQHNPR (SEQ ID NO: 116); VRGPRRQHNPR (SEQ ID NO: 117); and RQHNPR (SEQ ID NO: 118), compounds or peptides that are inhibitors of neprilysin, frakefamide (H-Tyr-D-Ala-Phe(F)-Phe-NH2; WO 01/019849 A1), loperamide, Tyr-Arg (kyotorphin), CCK receptor agonists (caerulein), conotoxin peptides, peptide analogs of thymulin, loxiglumide, dexloxiglumide (the R-isomer of loxiglumide) (WO 88/05774) and other analgesic peptides or compounds can be used with or linked to the peptides of the invention. The invention includes methods for treating various gastrointestinal disorders by administering a peptide that acts as a partial or complete agonist of the GC-C receptor. The peptide includes at least six cysteines that form three disulfide bonds. In certain embodiments the disulfide bonds are replaced by other covalent cross-links and in some cases the cysteines are substituted by other residues to provide for alternative covalent cross-links. The peptides may also include at least one trypsin or chymotrypsin cleavage site and/or a carboxy-terminal analgesic peptide or small molecule, e.g., AspPhe or some other analgesic peptide. When present within the peptide, the analgesic peptide or small molecule may be preceded by a chymotrypsin or trypsin cleavage site that allows release of the analgesic peptide or small molecule. The peptides and methods of the invention are also useful for treating pain and inflammation associated with various disorders, including gastrointestinal disorders. Certain peptides include a functional chymotrypsin or trypsin cleavage site located so as to allow inactivation of the peptide upon cleavage. Certain peptides having a functional cleavage site undergo cleavage and gradual inactivation in the digestive tract, and this is desirable in some circumstances. In certain peptides, a functional chymotrypsin site is altered, increasing the stability of the peptide in vivo. The invention includes methods for treating other disorders such as congestive heart failure and benign prostatic hyperplasia by administering a peptide or small molecule (parenterally or orally) that acts as an agonist of the GC-C receptor. Such agents can be used in combination with natriuretic peptides (e.g., atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. The invention features methods and compositions for increasing intestinal motility. Intestinal motility involves spontaneous coordinated dissentions and contractions of the stomach, intestines, colon and rectum to move food through the gastrointestinal tract during the digestive process. In certain embodiments the peptides include either one or two or more contiguous negatively charged amino acids (e.g., Asp or Glu) or one or two or more contiguous positively charged residues (e.g., Lys or Arg) or one or two or more contiguous positively or negatively charged amino acids at the carboxy terminus. In these embodiments all of the flanking amino acids at the carboxy terminus are either positively or negatively charged. In other embodiments the carboxy terminal charged amino acids are preceded by a Leu. For example, the following amino acid sequences can be added to the carboxy terminus of the peptide: Asp; Asp Lys; Lys Lys Lys Lys Lys Lys(SEQ ID NO:123); Asp Lys Lys Lys Lys Lys Lys (SEQ ID NO: 124); Leu Lys Lys; and Leu Asp. It is also possible to simply add Leu at the carboxy terminus. In a first aspect, the invention features a peptide comprising, consisting of, or consisting essentially of the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO:119) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing. In certain embodiments Xaa8, Xaa9, Xaa12, Xaa13, Xaa14, Xaa17, and Xaa19 can be any amino acid. In certain embodiments Xaa5 is Asn, Trp, Tyr, Asp, or Phe. In other embodiments, Xaa5 can also be Thr or Ile. In other embodiments Xaa5 is Tyr, Asp or Trp. In some embodiments Xaa8 is Glu, Asp, Gln, Gly or Pro. In other embodiments Xaa8 is Glu; in some embodiments Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe in some embodiments Xaa9 is Leu, Ile, Val, Lys, Arg, Trp, Tyr or Phe. In certain embodiments, the peptide includes disulfide bonds between Cys6 and Cys11, between Cys7 and Cys15 and between Cys10 and Cys16. In other embodiments, the peptide is a reduced peptide having no disulfide bonds. In still other embodiments the peptide has one or two disulfide bonds selected from the group consisting of: a disulfide bond between Cys6 and Cys11, a disulfide bond between Cys7 and Cys15 and a disulfide bond between Cys10 and CYS16. In certain embodiments, an amino acid can be replaced by a non-naturally occurring amino acid or a naturally or non-naturally occurring amino acid analog. For example, an aromatic amino acid can be replaced by 3,4-dihydroxy-L-phenylalanine, 3-iodo-L-tyrosine, triiodothyronine, L-thyroxine, phenylglycine (Phg) or nor-tyrosine (norTyr). Phg and norTyr and other amino acids including Phe and Tyr can be substituted by, e.g., a halogen, —CH3, —OH, —CH2NH3, —C(O)H, —CH2CH3, —CN, —CH2CH2CH3, —SH, or another group. Further examples of unnatural amino acids include: an unnatural analogue of tyrosine; an unnatural analogue of glutamine; an unnatural analogue of phenylalanine; an unnatural analogue of serine; an unnatural analogue of threonine; an alkyl, aryl, acyl, azido, cyano, halo, hydrazine, hydrazide, hydroxyl, alkenyl, alkynl, ether, thiol, sulfonyl, seleno, ester, thioacid, borate, boronate, phospho, phosphono, phosphine, heterocyclic, enone, imine, aldehyde, hydroxylamine, keto, or amino substituted amino acid, or any combination thereof; an amino acid with a photoactivatable cross-linker; a spin-labeled amino acid; a fluorescent amino acid; an amino acid with a novel functional group; an amino acid that covalently or noncovalently interacts with another molecule; a metal binding amino acid; a metal-containing amino acid; a radioactive amino acid; a photocaged and/or photoisomerizable amino acid; a biotin or biotin-analogue containing amino acid; a glycosylated or carbohydrate modified amino acid; a keto containing amino acid; amino acids comprising polyethylene glycol or polyether; a heavy atom substituted amino acid (e.g., an amino acid containing deuterium, tritium, 13C, 15N, or 18O); a chemically cleavable or photocleavable amino acid; an amino acid with an elongated side chain; an amino acid containing a toxic group; a sugar substituted amino acid, e.g., a sugar substituted serine or the like; a carbon-linked sugar-containing amino acid; a redox-active amino acid; an α.-hydroxy containing acid; an amino thio acid containing amino acid; an α, α disubstituted amino acid; a β-amino acid; a cyclic amino acid other than proline; an O-methyl-L-tyrosine; an L-3-(2-naphthyl)alanine; a 3-methyl-phenylalanine; a p-acetyl-L-phenylalanine; an 0-4-allyl-L-tyrosine; a 4-propyl-L-tyrosine; a tri-O-acetyl-GlcNAcβ-serine; an L-Dopa; a fluorinated phenylalanine; an isopropyl-L-phenylalanine; a p-azido-L-phenylalanine; a p-acyl-L-phenylalanine; a p-benzoyl-L-phenylalanine; an L-phosphoserine; a phosphonoserine; a phosphonotyrosine; a p-iodo-phenylalanine; a 4-fluorophenylglycine; a p-bromophenylalanine; a p-amino-L-phenylalanine; a isopropyl-L-phenylalanine; L-3-(2-naphthyl)alanine; an amino-, isopropyl-, or O-allyl-containing phenylalanine analogue; a dopa, O-methyl-L-tyrosine; a glycosylated amino acid; a p-(propargyloxy)phenylalanine, dimethyl-Lysine, hydroxy-proline, mercaptopropionic acid, methyl-lysine, 3-nitro-tyrosine, norleucine, pyro-glutamic acid, Z (Carbobenzoxyl), ε-Acetyl-Lysine, β-alanine, aminobenzoyl derivative, aminobutyric acid (Abu), citrulline, aminohexanoic acid, aminoisobutyric acid, cyclohexylalanine, d-cyclohexylalanine, hydroxyproline, nitro-arginine, nitro-phenylalanine, nitro-tyrosine, norvaline, octahydroindole carboxylate, omithine, penicillamine, tetrahydroisoquinoline, acetamidomethyl protected amino acids and a pegylated amino acid. Further examples of unnatural amino acids can be found in U.S. 20030108885, U.S. 20030082575, and the references cited therein. Methods to manfacture peptides containing unnatural amino acids can be found in, for example, U.S. 20030108885, U.S. 20030082575, Deiters et al., J Am Chem Soc. (2003) 125:11782-3, Chin et al., Science (2003) 301:964-7, and the references cited therein. The peptides of the invention can be modified using standard modifications. Modifications may occur at the amino (N—), carboxy (C—) terminus, internally or a combination of any of the preceeding. In one aspect of the invention, there may be more than one type of modification on the peptide. Modifications include but are not limited to: acetylation, amidation, biotinylation, cinnamoylation, farnesylation, formylation, myristoylation, palmitoylation, phosphorylation (Ser, Tyr or Thr), stearoylation, succinylation, sulfurylation and cyclisation (via disulfide bridges or amide cyclisation), and modification by Cy3 or Cy5. The peptides of the invention may also be modified by 2, 4-dinitrophenyl (DNP), DNP-lysin, modification by 7-Amino-4-methyl-coumarin (AMC), flourescein, NBD (7-Nitrobenz-2-Oxa-1,3-Diazole), p-nitro-anilide, rhodamine B, EDANS (5-((2-aminoethyl)amino)naphthalene-1-sulfonic acid), dabcyl, dabsyl, dansyl, texas red, FMOC, and Tamra (Tetramethylrhodamine). The peptides of the invention may also be conjugated to, for example, BSA or KLH (Keyhole Limpet Hemocyanin). In some embodiments Xaa12 is Asn, Tyr, Asp or Ala. In other embodiments Xaa12 is Asn. In some embodiments Xaa13 is Ala, Pro or Gly, and in other embodiments it is Pro. In some embodiments Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, or Asp, and in other embodiments it is Ala or Gly, and in still other embodiments it is Ala. In some embodiments Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is selected from Trp, Tyr, Phe, Asn and Leu or Xaa19 is selected from Trp, Tyr, and Phe or Xaa19 is selected from Leu, Ile and Val; or Xaa19 is His or Xaa19 is selected from Trp, Tyr, Phe, Asn, Ile, Val, His and Leu; and Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaalg Xaa20 Xaa21 is missing. The invention also features methods for treating a gastrointestinal disorder (e.g., a gastrointestinal motility disorder, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction), obesity, congestive heart failure or benign prostatic hyperplasia by administering a composition comprising an aforementioned peptide When Xaa9 is Trp, Tyr or Phe or when Xaa16 is Trp the peptide has a potentially functional chymotrypsin cleavage site that is located at a position where cleavage will inactivate GC-C receptor binding by the peptide. When Xaa9 is Lys or Arg or when Xaa16 is Lys or Arg, the peptide has a potentially functional trypsin cleavage site that is located at a position where cleavage will inactivate GC-C receptor binding by the peptide. When Xaa19 is Trp, Tyr or Phe, the peptide has a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide carboxy-terminal to Xaa19. When Xaa19 is Leu, Ile or Val, the peptide can have a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa19. At relatively high pH the same effect is seen when Xaa19 is His. When Xaa19 is Lys or Arg, the peptide has a trypsin cleavage site that is located at a position where cleavage will liberate portion of the peptide carboxy-terminal to Xaa19. Thus, if the peptide includes an analgesic peptide carboxy-terminal to Xaa19, the peptide will be liberated in the digestive tract upon exposure to the appropriate protease. Among the analgesic peptides which can be included in the peptide are: AspPhe (as Xaa20Xaa21), endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance P and other analgesic peptides described herein. These peptides can, for example, be used to replace Xaa20Xaa21. When Xaa1 or the amino-terminal amino acid of the peptide of the invention (e.g., Xaa2 or Xaa3) is Trp, Tyr or Phe, the peptide has a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa1 (or Xaa2 or Xaa3) along with Xaa1, Xaa2 or Xaa3. When Xaa1 or the amino-terminal amino acid of the peptide of the invention (e.g., Xaa2 or Xaa3) is Lys or Arg, the peptide has a trypsin cleavage site that is located at a position where cleavage will liberate portion of the peptide amino-terminal to Xaa1 along with Xaa1, Xaa2 or Xaa3). When Xaa1 or the amino-terminal amino acid of the peptide of the invention is Leu, Ile or Val, the peptide can have a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa1. At relatively high pH the same effect is seen when Xaa1 is His. Thus, for example, if the peptide includes an analgesic peptide amino-terminal to Xaa1, the peptide will be liberated in the digestive tract upon exposure to the appropriate protease. Among the analgesic peptides which can be included in the peptide are: AspPhe, endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance p and other analgesic peptides described herein. When fully folded, disulfide bonds are present between: Cys6 and Cys11; Cys7 and Cys15; and Cys10 and Cys18. The peptides of the invention bear some sequence similarity to ST peptides. However, they include amino acid changes and/or additions that improve functionality. These changes can, for example, increase or decrease activity (e.g., increase or decrease the ability of the peptide to stimulate intestinal motility), alter the ability of the peptide to fold correctly, the stability of the peptide, the ability of the peptide to bind the GC-C receptor and/or decrease toxicity. In some cases the peptides may function more desirably than wild-type ST peptide. For example, they may limit undesirable side effects such as diarrhea and dehydration. In some embodiments one or both members of one or more pairs of Cys residues which normally form a disulfide bond can be replaced by homocysteine, 3-mercaptoproline (Kolodziej et al. 1996 Int J Pept Protein Res 48:274); β, β dimethylcysteine (Hunt et al. 1993 Int J Pept Protein Res 42:249) or diaminopropionic acid (Smith et al. 1978 J Med Chem 21:117) to form alternative internal cross-links at the positions of the normal disulfide bonds. In addition, one or more disulfide bonds can be replaced by alternative covalent cross-links, e.g., an amide bond, an ester linkage, an alkyl linkage, a thio ester linkage, a lactam bridge, a carbamoyl linkage, a urea linkage, a thiourea linkage, a phosphonate ester linkage, an alkyl linkage, and alkenyl linkage, an ether, a thioether linkage, or an amino linkage. For example, Ledu et al. (Proceedings Nat'l Acad. Sci. 100:11263-78, 2003) described methods for preparing lactam and amide cross-links. Schafineister et al. (J. Am. Chem. Soc. 122:5891, 2000) describes stable, all carbon cross-links. In some cases, the generation of such alternative cross-links requires replacing the Cys residues with other residues such as Lys or Glu or non-naturally occurring amino acids. In the case of a peptide comprising the sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing and/or the sequence Xaa19 Xaa20 Xaa21 is missing, the peptide can still contain additional carboxyterminal or amino terminal amino acids or both. For example, the peptide can include an amino terminal sequence that facilitates recombinant production of the peptide and is cleaved prior to administration of the peptide to a patient. The peptide can also include other amino terminal or carboxyterminal amino acids. In some cases the additional amino acids protect the peptide, stabilize the peptide or alter the activity of the peptide. In some cases some or all of these additional amino acids are removed prior to administration of the peptide to a patient. The peptide can include 1, 2, 3, 4, 5, 10, 15, 20, 25, 30, 40, 50, 60, 70 80, 90, 100 or more amino acids at its amino terminus or carboxy terminus or both. The number of flanking amino acids need not be the same. For example, there can be 10 additional amino acids at the amino terminus of the peptide and none at the carboxy terminus. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 144) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; and Xaa20 Xaa21 is AspPhe or is missing. Where Xaa20 Xaa21 and/or Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 are missing, there may be additional flanking amino acids in some embodiments. In certain embodiments, the peptide does not consist of any of the peptides of Table I In a second aspect, the invention also features a therapeutic or prophylactic method comprising administering a peptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 145)_wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; and Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In certain embodiments of the therapeutic or prophylactic methods: the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 146) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr, or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp or Xaa16 is any amino acid or Xaa16 is Thr, Ala, Lys, Arg, Trp or Xaa16 is any non-aromatic amino acid; Xaa17 is Gly; Xaa19 is Tyr or Leu; and Xaa20 Xaa21 is AspPhe or is missing. In certain embodiments, the invention features, a purified polypeptide comprising the amino acid sequence (II): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Asn12 Pro13 Ala14 Cys15 Xaa16 Gly17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 120) wherein Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn; Xaa8 is Glu or Asp; Xaa9 is Leu, Ile, Val, Trp, Tyr or Phe; Xaa16 is Thr, Ala, Trp; Xaa19 is Trp, Tyr, Phe or Leu or is missing; and Xaa20Xaa21 is AspPhe. In various preferred embodiments the invention features a purified polypeptide comprising the amino acid sequence (II): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Asn12 Pro13 Ala14 Cys15 Xaa16 Gly17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO:149) wherein, Xaa9 is Leu, Ile or Val and Xaa16 is Trp, Tyr or Phe; Xaa9 is Trp, Tyr or Phe, and Xaa16 is Thr or Ala; Xaa19 is Trp, Tyr, Phe and Xaa20 Xaa21 is AspPhe; and Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn; the peptide comprises fewer than 50, 40, 30 or 25 amino acids; fewer than five amino acid precede Cys6. The peptides can be co-administered with or linked, e.g., covalently linked to any of a variety of other peptides including analgesic peptides or analgesic compounds. For example, a therapeutic peptide of the invention can be linked to an analgesic agent selected from the group consisting of: Ca channel blockers (e.g., ziconotide), complete or partial 5HT receptor antagonists (for example 5HT3 (e.g. alosetron, ATI-7000; Aryx Thearpeutics, Santa Clara Calif.), 5HT4 and 5HT1 receptor antagonists), complete or partial 5HT receptor agonists including 5HT3, 5HT4 (e.g. tegaserod, mosapride and renzapride) and 5HT1 receptor agonists, CRF receptor agonists (NBI-34041), β-3 adrenoreceptor agonists, opioid receptor agonists (e.g., loperamide, fedotozine, and fentanyl, naloxone, naltrexone, methyl nalozone, nalmefene, cypridime, beta funaltrexamine, naloxonazine, naltrindole, and nor-binaltorphimine, morphine, diphenyloxylate, enkephalin pentapeptide, asimadoline, and trimebutine), NK1 receptor antagonists (e.g., ezlopitant and SR-14033), CCK receptor agonists (e.g., loxiglumide), NK1 receptor antagonists, NK3 receptor antagonists (e.g., talnetant, osanetant (SR-142801), SSR-241586), norepinephrine-serotonin reuptake inhibitors (NSR1; e.g., milnacipran), opiod receptor antagonists (e.g. naltrexone) vanilloid and cannabanoid receptor agonists (e.g., arvanil), sialorphin, sialorphin-related peptides comprising the amino acid sequence QHNPR (SEQ ID NO:111) for example, VQHNPR (SEQ ID NO:112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO:114); VRGPQHNPR (SEQ ID NO:115); VRGPRQHNPR (SEQ ID NO:116); VRGPRRQHNPR (SEQ ID NO:117); and RQHNPR (SEQ ID NO:118), compounds or peptides that are inhibitors of neprilysin, frakefamide (H-Tyr-D-Ala-Phe(F)-Phe-NH2; WO 01/019849 A1), loperamide, Tyr-Arg (kyotorphin), CCK receptor agonists (caerulein), conotoxin peptides, pepetide analogs of thymulin, loxiglumide, dexloxiglumide (the R-isomer of loxiglumide) (WO 88/05774) and other analgesic peptides or compounds can be used with or linked to the peptides of the invention. Amino acid, non-amino acid, peptide and non-peptide spacers can be interposed between a peptide that is a GC-C receptor agonsit and a peptide that has some other biological function, e.g., an analgesic peptide or a peptide used to treat obesity. The linker can be one that is cleaved from the flanking peptides in vivo or one that remains linked to the flanking peptides in vivo. For example, glycine, beta-alanine, glycyl-glycine, glycyl-beta-alanine, gamma-aminobutyric acid, 6-aminocaproic acid, L-phenylalanine, L-tryptophan and glycil-L-valil-L-phenylalanine can be used as a spacer (Chaltin et al. 2003 Helvetica Chimica Acta 86:533-547; Caliceti et al. 1993 FARMCO 48:919-32) as can polyethylene glycols (Butterworth et al. 1987 J. Med. Chem 30:1295-302) and maleimide derivatives (King et al. 2002 Tetrahedron Lett. 43:1987-1990). Various other linkers are described in the literature (Nestler 1996 Molecular Diversity 2:35-42; Finn et al. 1984 Biochemistry 23:2554-8; Cook et al. 1994 Tetrahedron Lett. 35:6777-80; Brokx et al. 2002 Journal of Controlled Release 78:115-123; Griffin et al. 2003 J. Am. Chem. Soc. 125:6517-6531; Robinson et al. 1998 Proc. Natl. Acad. Sci. USA 95:5929-5934. The peptides can include the amino acid sequence of a peptide that occurs naturally in a vertebrate (e.g., mammalian) species or in a bacterial species. In addition, the peptides can be partially or completely non-naturally occurring peptides. Also within the invention are peptidomimetics corresponding to the peptides of the invention. In various embodiments, the patient is suffering from a gastrointestinal disorder; the patient is suffering from a disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, Crohn's disease, ulcerative colitis, Irritable bowel syndrome, colonic pseudo-obstruction, obesity, congestive heart failure, or benign prostatic hyperplasia; the composition is administered orally; the peptide comprises 30 or fewer amino acids, the peptide comprises 20 or fewer amino acids, and the peptide comprises no more than 5 amino acids prior to Cys6; the peptide comprises 150, 140, 130, 120, 110, 100, 90, 80, 70, 60, 50, 40, or 30 or fewer amino acids. In other embodiments, the peptide comprises 20 or fewer amino acids. In other embodiments the peptide comprises no more than 20, 15, 10, or 5 peptides subsequent to Cys18. In certain embodiments Xaa19 is a chymotrypsin or trypsin cleavage site and an analgesic peptide is present immediately following Xaa19. In a third aspect, the invention features a method for treating a patient suffering from constipation. Clinically accepted criteria that define constipation range from the frequency of bowel movements, the consistency of feces and the ease of bowel movement. One common definition of constipation is less than three bowel movements per week. Other definitions include abnormally hard stools or defecation that requires excessive straining (Schiller 2001, Aliment Pharmacol Ther 15:749-763). Constipation may be idiopathic (functional constipation or slow transit constipation) or secondary to other causes including neurologic, metabolic or endocrine disorders. These disorders include diabetes mellitus, hypothyroidism, hyperthyroidism, hypocalcaemia, Multiple Sclerosis, Parkinson's disease, spinal cord lesions, Neurofibromatosis, autonomic neuropathy, Chagas disease, Hirschsprung's disease and Cystic fibrosis. Constipation may also be the result of surgery (postoperative ileus) or due to the use of drugs such as analgesics (like opiods), antihypertensives, anticonvulsants, antidepressants, antispasmodics and antipsychotics. The method comprising administering a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO:147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In one embodiment of the method, the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In various preferred embodiments, the constipation is associated with use of a therapeutic agent; the constipation is associated with a neuropathic disorder; the constipation is post-surgical constipation (postoperative ileus); and the constipation associated with a gastrointestinal disorder; the constipation is idiopathic (functional constipation or slow transit constipation); the constipation is associated with neuropathic, metabolic or endocrine disorder (e.g., diabetes mellitus, hypothyroidism, hyperthyroidism, hypocalcaemia, Multiple Sclerosis, Parkinson's disease, spinal cord lesions, neurofibromatosis, autonomic neuropathy, Chagas disease, Hirschsprung's disease or cystic fibrosis). Constipation may also be the result of surgery (postoperative ileus) or due the use of drugs such as analgesics (e.g., opiods), antihypertensives, anticonvulsants, antidepressants, antispasmodics and antipsychotics. In a fourth aspect, the invention features a method for treating a patient suffering a gastrointestinal disorder, the method comprising administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 CYS15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg;Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In one embodiment of the method, the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO: 148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In various embodiments, the patient is suffering from a gastrointestinal disorder; the patient is suffering from a disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, colonic pseudo-obstruction, obesity, congestive heart failure, or benign prostatic hyperplasia. In various preferred embodiments, Xaa9 is Leu, Ile or Val and Xaa16 is Trp, Tyr or Phe; Xaa9 is Trp, Tyr or Phe and Xaa16 is Thr or Ala; Xaa19 is Trp, Tyr, Phe; Xaa19 is Lys or Arg;Xaa20 Xaa21 is AspPhe; Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn. In a fifth aspect, the invention features a method for increasing gastrointestinal motility in a patient, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21(SEQ ID NO: 147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In a sixth aspect, the invention features a method for increasing the activity of an intestinal guanylate cyclase (GC-C) receptor in a patient, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO:147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO:148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In a seventh aspect, the invention features an isolated nucleic acid molecule comprising a nucleotide sequence encoding a polypeptide comprising the amino acid sequence: (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18) Xaa19 Xaa20 Xaa21 (SEQ ID NO: 148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In an eighth aspect the invention features a method for treating constipation, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a ninth aspect, the invention features a method for treating a gastrointestinal disorder, a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, obesity, congestive heart failure, or benign prostatic hyperplasia, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor either orally, by rectal suppository, or parenterally. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a tenth aspect, the invention features a method for treating a gastrointestinal disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments the composition is administered orally; the peptide comprises 30 or fewer amino acids, the peptide comprises 20 or fewer amino acids, and the peptide comprises no more than 5 amino acids prior to Cys5. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In an eleventh aspect, the invention features a method for treating obesity, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a twelfth aspect, the invention features a method for treating obesity, the method comprising administering a polypeptide comprising the amino acid sequence: (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO: 147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; and Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaalg Xaa20 Xaa21 is missing. The peptide can be administered alone or in combination with another agent for the treatment of obesity, e.g., sibutramine or another agent, e.g., an agent described herein. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO:148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; and Xaa20 Xaa21 is AspPhe or is missing. In a thirteenth aspect, the invention features a pharmaceutical composition comprising a polypeptide described herein. In a fourteenth aspect, the invention features a method for treating congestive heart failure, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO: 147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; and Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. The peptide can be administered in combination with another agent for treatment of congestive heart failure, for example, a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18) Xaa19 Xaa20 Xaa21 (SEQ ID NO: 148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing. In a fifteenth aspect, the invention features a method for treating benign prostatic hyperplasia, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21 (SEQ ID NO:147) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa1 Xaa2 Xaa3 Xaa4 is missing and Xaa5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa8 is Glu, Asp, Gln, Gly or Pro; Xaa9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn, Tyr, Asp or Ala; Xaa13 is Pro or Gly; Xaa14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa17 is Gly, Pro or Ala; Xaa19 is Trp, Tyr, Phe or Leu; Xaa19 is Lys or Arg; Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing. The peptide can be administered in combination with another agent for treatment of BPH, for example, a 5-alpha reductase inhibitor (e.g., finasteride) or an alpha adrenergic inhibitor (e.g., doxazosine). In one embodiment the peptide comprises the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 (SEQ ID NO:148) wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing; Xaa8 is Glu; Xaa9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa12 is Asn; Xaa13 is Pro; Xaa14 is Ala; Xaa16 is Thr, Ala, Lys, Arg, Trp; Xaa17 is Gly; Xaa19 is Tyr or Leu; and Xaa20 Xaa21 is AspPhe or is missing. In a sixteenth aspect, the invention features a method for treating or reducing pain, including visceral pain, pain associated with a gastrointestinal disorder or pain associated with some other disorder, the method comprising: administering to a patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 CYS18 Xaa19 Xaa20 Xaa21, e.g., a purified polypeptide comprising an amino acid sequence disclosed herein. In a seventeenth aspect, the invention features a method for treating inflammation, including inflammation of the gastrointestinal tract, e.g., inflammation associated with a gastrointestinal disorder or infection or some other disorder, the method comprising: administering to a patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20Xaa21, e.g., a purified polypeptide comprising an amino acid sequence disclosed herein. In certain embodiments the peptide includes a peptide comprising or consisting of the amino acid sequence Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys Cys Glu Xaa9 Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Xaa20 Xaa21 (II) (SEQ ID NO:66) wherein Xaa9 is any amino acid, wherein Xaa9 is any amino acid other than Leu, wherein Xaa9 is selected from Phe, Trp and Tyr; wherein Xaa9 is selected from any other natural or non-natural aromatic amino acid, wherein Xaa9 is Tyr; wherein Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is Asn Ser Ser Asn Tyr; wherein Xaa1, Xaa2, Xaa3, Xaa4, and Xaa5 are missing; wherein Xaa1, Xaa2, Xaa3 and Xaa4 are missing; wherein Xaa1, Xaa2 and Xaa3 are missing; wherein Xaa1 and Xaa2 are missing; wherein Xaa1 is missing; wherein Xaa20 Xaa21 is AspPhe or is missing or Xaa20 is Asn or Glu and Xaa21 is missing or Xaa19 Xaa20 Xaa21 is missing; wherein Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 and Tyr Xaa20 Xaa21 are missing. In the case of a peptide comprising the sequence (I): Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys6 Cys7 Xaa8 Xaa9 Cys10 Cys11 Xaa12 Xaa13 Xaa14 Cys15 Xaa16 Xaa17 Cys18 Xaa19 Xaa20 Xaa21 wherein: Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 is missing and/or the sequence Xaa19 Xaa20 Xaa21 is missing peptide can still contain additional carboxyterminal or amino terminal amino acids or both Among the useful peptides are peptides comprising, consisting of or consisting essentially of the amino acid sequence Xaa1 Xaa2 Xaa3 Xaa4 Xaa5 Cys Cys Glu Xaa9 Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Xaa20 Xaa21 (II) (SEQ ID NO:66) are the following peptides: Gln Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:67) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Thr Ser Asn Tyr Cys Cys Glu (SEQ ID NO:68) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Leu Ser Asn Tyr Cys Cys Glu (SEQ ID NO:69) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ile Ser Asn Tyr Cys Cys Glu (SEQ ID NO:70) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Gln Tyr Cys Cys Glu (SEQ ID NO:71) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Ser Ser Asn Tyr Cys Cys Glu Tyr (SEQ ID NO:72) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Gln Ser Ser Gln Tyr Cys Cys Glu (SEQ ID NO:73) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Ser Ser Gln Tyr Cys Cys Glu Tyr (SEQ ID NO:74) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr. Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:75) Ala Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:76) Arg Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:77) Asn Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:78) Asp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:79) Cys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:80) Gln Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:81) Glu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:82) Gly Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:83) His Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:84) Ile Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:85) Lys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:86) Met Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:87) Phe Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:88) Pro Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:89) Ser Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:90) Thr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:91 Trp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:92) Val Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ala Cys Cys Asn Pro (SEQ ID NO:93) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:94) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Asn Cys Cys Asn Pro (SEQ ID NO:95) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Asp Cys Cys Asn Pro (SEQ ID NO:96) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Cys Cys Cys Asn Pro (SEQ ID NO:97) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Gln Cys Cys Asn Pro (SEQ ID NO:98) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Glu Cys Cys Asn Pro (SEQ ID NO:99) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Gly Cys Cys Asn Pro (SEQ ID NO:100) Ala Cys Thr Gly Cys Tyr Cys Cys Glu His Cys Cys Asn Pro (SEQ ID NO:101) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ile Cys Cys Asn Pro (SEQ ID NO:102) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:103) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Met Cys Cys Asn Pro (SEQ ID NO:104) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:105) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Pro Cys Cys Asn Pro (SEQ ID NO:106) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ser Cys Cys Asn Pro (SEQ ID NO:107) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Thr Cys Cys Asn Pro (SEQ ID NO:108) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:109) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Val Cys Cys Asn Pro (SEQ ID NO:110) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Tyr Cys Cys Asn Pro (SEQ ID NO:125) Ala Cys Thr Gly Cys Cys Cys Glu Ala Cys Cys Asn Pro (SEQ ID NO:126) Ala Cys Thr Gly Cys Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:127) Ala Cys Thr Gly Cys Cys Cys Glu Asn Cys Cys Asn Pro (SEQ ID NO:128) Ala Cys Thr Gly Cys Cys Cys Glu Asp Cys Cys Asn Pro (SEQ ID NO:129) Ala Cys Thr Gly Cys Cys Cys Glu Cys Cys Cys Asn Pro (SEQ ID NO:130) Ala Cys Thr Gly Cys Cys Cys Glu Gln Cys Cys Asn Pro (SEQ ID NO:131) Ala Cys Thr Gly Cys Cys Cys Glu Glu Cys Cys Asn Pro (SEQ ID NO:132) Ala Cys Thr Gly Cys Cys Cys Glu Gly Cys Cys Asn Pro (SEQ ID NO:133) Ala Cys Thr Gly Cys Cys Cys Glu His Cys Cys Asn Pro (SEQ ID NO:134) Ala Cys Thr Gly Cys Cys Cys Glu Ile Cys Cys Asn Pro (SEQ ID NO:135) Ala Cys Thr Gly Cys Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:136) Ala Cys Thr Gly Cys Cys Cys Glu Met Cys Cys Asn Pro (SEQ ID NO:137) Ala Cys Thr Gly Cys Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:138) Ala Cys Thr Gly Cys Cys Cys Glu Pro Cys Cys Asn Pro (SEQ ID NO:139) Ala Cys Thr Gly Cys Cys Cys Glu Ser Cys Cys Asn Pro (SEQ ID NO:140) Ala Cys Thr Gly Cys Cys Cys Glu Thr Cys Cys Asn Pro (SEQ ID NO:141) Ala Cys Thr Gly Cys Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:142) Ala Cys Thr Gly Cys Cys Cys Glu Val Cys Cys Asn Pro (SEQ ID NO:143) Ala Cys Thr Gly Cys In an eighteenth aspect, the invention features a method for treating congestive heart failure, the method comprising adrninistering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of congestive heart failure, for example, a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. In a nineteenth aspect, the invention features a method for treating BPH, the method comprising administering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of BPH, for example, a 5-alpha reductase inhibitor (e.g., finasteride) or an alpha adrenergic inhibitor (e.g., doxazosine). In a twentieth aspect, the invention features a method for treating obesity, the method comprising administering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of obesity, for example, gut hormone fragment peptide YY3-36 (PYY3-36)(N. Engl. J. Med. 349:941, 2003; ikpeapge daspeelnry yaslrhylnl vtrqry) or a variant thereof, glp-1 (glucagon-like peptide-1), exendin-4 (an inhibitor of glp-1), sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride (Didrex), orlistat (Xenical), diethylpropion hydrochloride (Tenuate), fluoxetine (Prozac), bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack (focus vesiculosus), chitosan, nomame herba, galega (Goat's Rue, French Lilac), conjugated linoleic acid, L-carnitine, fiber (psyllium, plantago, guar fiber), caffeine, dehydroepiandrosterone, germander (teucrium chamaedrys), B-hydroxy-β-methylbutyrate, ATL-962 (Alizyme PLC), and pyruvate. A peptide useful for treating obesity can be administered as a co-therapy with a peptide of the invention either as a distinct molecule or as part of a fusion protein with a peptide of the invention. Thus, for example, PYY3-36 can be fused to the carboxy or amino terminus of a peptide of the invention. Such a fusion protein can include a chymostrypsin or trypsin cleavage site that can permit cleavage to separate the two peptides. A peptide useful for treating obesity can be administered as a co-therapywith electrostimulation (U.S. 20040015201). In twenty first aspect, the invention features isolated nucleic acid molecules comprising a sequence encoding a peptide of the invention and vectors, e.g., expression vectors that include such nucleic acid molecules and can be used to express a peptide of the invention in a cultured cell (e.g., a eukaryotice cell or a prokaryotic cell). The vector can further include one or more regulatory elements, e.g., a heterologous promoter or elements required for translation operably linked to the sequence encoding the peptide. In some cases the nucleic acid molecule will encode an amino acid sequence that includes the amino acid sequence of a peptide of the invention. For example, the nucleic acid molecule can encode a preprotein or a preproprotein that can be processed to produce a peptide of the invention. A vector that includes a nucleotide sequence encoding a peptide of the invention or a peptide or polyppetide comprising a peptide of the invention may be either RNA or DNA, single- or double-stranded, prokaryotic, eukaryotic, or viral. Vectors can include transposons, viral vectors, episomes, (e.g., plasmids), chromosomes inserts, and artificial chromosomes (e.g. BACs or YACs). Suitable bacterial hosts for expression of the encode peptide or polypeptide include, but are not limited to, E. coli. Suitable eukaryotic hosts include yeast such as S. cerevisiae, other fungi, vertebrate cells, invertebrate cells (e.g., insect cells), plant cells, human cells, human tissue cells, and whole eukaryotic organisms. (e.g., a transgenic plant or a transgenic animal). Further, the vector nucleic acid can be used to generate a virus such as vaccinia or baculovirus. As noted above the invention includes vectors and genetic constructs suitable for production of a peptide of the invention or a peptide or polypeptide comprising such a peptide. Generally, the genetic construct also includes, in addition to the encoding nucleic acid molecule, elements that allow expression, such as a promoter and regulatory sequences. The expression vectors may contain transcriptional control sequences that control transcriptional initiation, such as promoter, enhancer, operator, and repressor sequences. A variety of transcriptional control sequences are well known to those in the art and may be functional in, but are not limited to, a bacterium, yeast, plant, or animal cell. The expression vector can also include a translation regulatory sequence (e.g., an untranslated 5′ sequence, an untranslated 3′ sequence, a poly A addition site, or an internal ribosome entry site), a splicing sequence or splicing regulatory sequence, and a transcription termination sequence. The vector can be capable of autonomous replication or it can integrate into host DNA. The invention also includes isolated host cells harboring one of the forgoing nucleic acid molecules and methods for producing a peptide by culturing such a cell and recovering the peptide or a precursor of the peptide. Recovery of the peptide or precursor may refer to collecting the growth solution and need not involve additional steps of purification. Proteins of the present invention, however, can be purified using standard purification techniques, such as, but not limited to, affinity chromatography, thermaprecipitation, immunoaffinity chromatography, ammonium sulfate precipitation, ion exchange chromatography, filtration, electrophoresis and hydrophobic interaction chromatography. In a twenty second aspect, the invention features a method of increasing the level of cyclic guanosine 3′-monophosphate (cGMP) in an organ, tissue (e.g, the intestinal mucosa), or cell (e.g., a cell bearing GC-A receptor) by administering a composition that includes a peptide of the invention. The peptides and agonist of the intestinal guanylate cyclase (GC-C) receptor can be used to treat constipation or decreased intestinal motility, slow digestion or slow stomach emptying. The peptides can be used to relieve one or more symptoms of IBS (bloating, pain, constipation), GERD (acid reflux into the esophagus), functional dyspepsia, or gastroparesis (nausea, vomiting, bloating, delayed gastric emptying) and other disorders described herein. The details of one or more embodiments of the invention are set forth in the accompanying description. All of the publications, patents and patnet applications are hereby incorporated by reference. FIGURES FIG. 1 depicts the results of LCMS analysis of recombinant MM-416776 peptide and MD-915 peptide. FIGS. 1b and c depict the results of LCMS analysis of synthetic MD-1100 peptide and the blank. FIG. 2 depicts the results of the intestinal GC-C receptor activity assay of synthetic MM-416776 peptide, MD-915 peptide and two different MD-1100 peptides. FIG. 3a depicts the effect of recombinant MM-416776 peptide and Zelnorm® in an acute murine gastrointestinal transit model. FIG. 3b depicts the effect of synthetic MD-1100 peptide and Zelnorm® in an acute murine gastrointestinal transit model. FIGS. 4a and 4b depict the effect of peptides MD-915, MD-1100, and MM-416776 in an acute murine gastrointestinal transit model. FIG. 4c depicts the effect of MD-1100 peptide in a chronic murine gastrointestinal transit model. FIG. 5a depicts the effect of MM-416776 peptide and Zelnorm® (in a suckling mouse intestinal secretion model. FIG. 5b depicts the effects of MD-1100 and Zelnorm® in a mouse intestinal secretion model. FIGS. 6a and 6b depict the effects of MM 416776, MD-1100 and MD-915 peptides in a mouse intestinal secretion model. FIG. 7 shows the results of experiment in which MD-1100 activity was analyzed in the TNBS colonic distention model. FIGS. 8a and 8b show the effects of differing doses of MD-915 and MD-1100 in the PBQ writhing assay. FIG. 9 shows the results of Kd determination analysis using MD-1100 in a competitive radioligand binding assay. FIGS. 10a and 10b show bioavailability data for IV and orally administered MD-1100 as detected by an ELISA assay and LCMS. DETAILED DESCRIPTION The peptides of the invention bind to the intestinal guanylate cyclase (GC-C) receptor, a key regulator of fluid and electrolyte balance in the intestine. When stimulated, this receptor, which is located on the apical membrane of the intestinal epithelial surface, causes an increase in intestinal epithelial cyclic GMP (cGMP). This increase in cGMP is believed to cause a decrease in water and sodium absorption and an increase in chloride and potassium ion secretion, leading to changes in intestinal fluid and electrolyte transport and increased intestinal motility. The intestinal GC-C receptor possesses an extracellular ligand binding region, a transmembrane region, an intracellular protein kinase-like region and a cyclase catalytic domain. Proposed functions for the GC-C receptor are fluid and electrolyte homeostasis, the regulation of epithelial cell proliferation and the induction of apoptosis (Shalubhai 2002 Curr Opin Drug Dis Devel 5:261-268). In addition to being expressed in the intestine by gastrointestinal epithelial cells, GC-C is expressed in extra-intestinal tissues including kidney, lung, pancreas, pituitary, adrenal, developing liver and gall bladder (reviewed in Vaandrager 2002 Mol Cell Biochem 230:73-83, Kulaksiz et al. 2004, Gastroenterology 126:732-740) and male and female reproductive tissues (reviewed in Vaandrager 2002 Mol Cell Biochem 230:73-83)) This suggests that the GC-C receptor agonists can be used in the treatment of disorders outside the GI tract, for example, congestive heart failure and benign prostatic hyperplasia. Ghrelin, a peptide hormone secreted by the stomach, is a key regulator of appetite in humans. Ghrelin expression levels are regulated by fasting and by gastric emptying (Kim et al. 2003 Neuroreprt 14:1317-20; Gualillo et al. 2003 FEBS Letts 552 105-9). Thus, by increasing gastrointestinal motility, GC-C receptor agonists may also be used to regulate obesity. In humans, the GC-C receptor is activated by guanylin (Gn) (U.S. Pat. No. 5,96,097), uroguanylin (Ugn) (U.S. Pat. No. 5,140,102) and lymphoguanylin (Forte et al. 1999 Endocrinology 140:1800-1806). Interestingly, these agents are 10-100 fold less potent than a class of bacterially derived peptides, termed ST (reviewed in Gianella 1995 J Lab Clin Med 125:173-181). ST peptides are considered super agonists of GC-C and are very resistant to proteolytic degradation. ST peptide is capable of stimulating the enteric nervous system (Rolfe et al., 1994, J Physiolo 475: 531-537; Rolfe et al. 1999 Gut 44: 615-619; Nzegwu et al. 1996 Exp Physiol 81: 313-315). Also, cGMP has been reported to have anitnociceptive effects in multiple animal models of pain (Lazaro Ibanez et al. 2001 Eur J Pharmacol 426: 39-44; Soares et al. 2001 British J Pharmacol 134: 127-131; Jain et al. 2001 Brain Res 909:170-178; Amarante et al. 2002 Eur J Pharmacol 454:19-23). Thus, GC-C agonists may have both an analgesic as well an anti-inflammatory effect. In bacteria, ST peptides are derived from a preproprotein that generally has at least 70 amino acids. The pre and pro regions are cleaved as part of the secretion process, and the resulting mature protein, which generally includes fewer than 20 amino acids, is biologically active. Among the known bacterial ST peptides are: E. coli ST Ib (Moseley et al. 1983 Infect. Immun. 39:1167) having the mature amino acid sequence Asn Ser Ser Asn Tyr Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:1); E. coli ST Ia (So and McCarthy 1980 Proc. Natl. Acad. Sci. USA 77:4011) having the mature amino acid sequence Asn Thr Phe Tyr Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Ala Gly Cys Tyr (SEQ ID NO:2); E. coli ST I* (Chan and Giannella 1981 J. Biol. Chem. 256:7744) having the mature amino acid sequence Asn Thr Phe Tyr Cys Cys Glu Leu Cys Cys Tyr Pro Ala Cys Ala Gly Cys Asn (SEQ ID NO:3); C. freundii ST peptide (Guarino et al. 1989b Infect. Immun. 57:649) having the mature amino acid sequence Asn Thr Phe Tyr Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Ala Gly Cys Tyr (SEQ ID NO:4); Y. enterocolitica ST peptides, Y-ST(Y-STa), Y-STb, and Y-STc (reviewed in Huang et al. 1997 Microb. Pathog. 22:89) having the following pro-form amino acid sequences: Gln Ala Cys Asp Pro Pro Ser Pro Pro Ala Glu Val Ser Ser Asp Trp Asp Cys Cys Asp Val Cys Cys Asn Pro Ala Cys Ala Gly Cys (SEQ ID NO:5) (as well as a Ser-7 to Leu-7 variant of Y-STa (SEQ ID NO:122), (Takao et al. 1985 Eur. J. Biochem. 152:199)); Lys Ala Cys Asp Thr Gln Thr Pro Ser Pro Ser Glu Glu Asn Asp Asp Trp Cys Cys Glu Val Cys Cys Asn Pro Ala Cys Ala Gly Cys (SEQ ID NO:6); Gln Glu Thr Ala Ser Gly Gln Val Gly Asp Val Ser Ser Ser Thr Ile Ala Thr Glu Val Ser Glu Ala Glu Cys Gly Thr Gln Ser Ala Thr Thr Gln Gly Glu Asn Asp Trp Asp Trp Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Phe Gly Cys (SEQ ID NO:7), respectively; Y. kristensenii ST peptide having the mature amino acid sequence Ser Asp Trp Cys Cys Glu Val Cys Cys Asn Pro Ala Cys Ala Gly Cys (SEQ ID NO:8); V. cholerae non-01 ST peptide (Takao et al. (1985) FEBS lett. 193:250) having the mature amino acid sequence Ile Asp Cys Cys Glu Ile Cys Cys Asn Pro Ala Cys Phe Gly Cys Leu Asn (SEQ ID NO:9); and V. mimicus ST peptide (Arita et al. 1991 FEMS Microbiol. Lett. 79:105) having the mature amino acid sequence Ile Asp Cys Cys Glu Ile Cys Cys Asn Pro Ala Cys Phe Gly Cys Leu Asn (SEQ ID NO:10). Table I below provides sequences of all or a portion of a number of mature ST peptides. TABLE I GenBank ® GenBank ® Accession No. GI No. Sequence QHECIB 69638 NSSNYCCELCCNPACTGCY (SEQ ID NO:1) P01559 123711 NTFYCCELCCNPACAGCY (SEQ ID NO:2) AAA24653 147878 NTFYCCELCCNPACAPCY (SEQ ID NO:11) P01560 123707 NTFYCCELCCYPACAGCN (SEQ ID NO:3) AAA27561 295439 IDCCEICCNPACFGCLN (SEQ ID NO:9) P04429 123712 IDCCEICCNPACFGCLN (SEQ ID NO:10) S34671 421286 IDCCEICCNPACF (SEQ ID NO:12) CAA52209 395161 IDCCEICCNPACFG (SEQ ID NO:13) A54534 628844 IDCCEICCNPACFGCLN (SEQ ID NO:14) AAL02159 15592919 IDRCEICCNPACFGCLN (SEQ ID NO:15) AAA18472 487395 DWDCCDVCCNPACAGC (SEQ ID NO:16) S25659 282047 DWDCCDVCCNPACAGC (SEQ ID NO:17) P74977 3913874 NDDWCCEVCCNPACAGC (SEQ ID NO:18) BAA23656 2662339 WDWCCELCCNPACFGC (SEQ ID NO:19) P31518 399947 SDWCCEVCCNPACAGC (SEQ ID NO:8) The immature (including pre and pro regions) form of E. coli ST-1A (ST-P) protein has the sequence: mkklmlaifisvlsfpsfsqstesldsskekitletkkcdvvknnsekksenmnntfyccelccnpacagcy (SEQ ID NO:20; see GenBank® Accession No. P01559 (gi:123711). The pre sequence extends from aa 1-19. The pro sequence extends from aa 20-54. The mature protein extends from 55-72. The immature (including pre and pro regions) form of E. coli ST-1 B (ST-H) protein has the sequence: mkksilfiflsvlsfspfaqdakpvesskekitleskkcniakksnksgpesmnssnyccelccnpactgcy (SEQ ID NO:21; see GenBank® Accession No. P07965 (gi:3915589). The immature (including pre and pro regions) form of Y. enterocolitica ST protein has the sequence: mkkivfvlylmlssfgafgqetvsgqfsdalstpitaevykqacdpplppaevssdwdccdvccnpacagc (SEQ ID NO:22); see GenBank® Accession No. S25659 (gi:282047). The peptides of the invention, like the bacterial ST peptides, have six Cys residues. These six Cys residues form three disulfide bonds in the mature and active form of the peptide. If the six Cys residues are identified, from the amino to carboxy terminus of the peptide, as A, B, C, D, E, and F, then the disulfide bonds form as follows: A-D, B-E, and C-F. The formation of these bonds is thought to be important for GC-C receptor binding. Certain of the peptides of the invention include a potentially functional chymotrypsin cleavage site, e.g., a Trp, Tyr or Phe located between either Cys B and Cys D or between Cys E and Cys F. Cleavage at either chymotrypsin cleavage site reduces or eliminates the ability of the peptide to bind to the GC-C receptor. In the human body an inactive form of chymotrypsin, chymotrypsinogen is produced in the pancreas. When this inactive enzyme reaches the small intestine it is converted to active chymotrypsin by the excision of two di-peptides. Active chymotrypsin can potentially cleave peptides at the peptide bond on the carboxy-terminal side of Trp, Tyr or Phe. The presence of active chymotrypsin in the intestinal tract can potentially lead to cleavage of certain of the peptides of the invention having an appropriately positioned functional chymotrypsin cleavage site. It is expected that chymotrypsin cleavage will moderate the action of a peptide of the invention having an appropriately positioned chymotrypsin cleavage site as the peptide passes through the intestinal tract. Trypsinogen, like chymotrypsin, is a serine protease that is produced in the pancreas and is present in the digestive tract. The active form, trypsin, will cleave peptides having a Lys or Arg. The presence of active trypsin in the intestinal tract can lead to cleavage of certain of the peptides of the invention having an appropriately positioned functional trypsin cleavage site. It is expected that chymotrypsin cleavage will moderate the action of a peptide of the invention having an appropriately positioned trypsin cleavage site as the peptide passes through the intestinal tract. Many gastrointestinal disorders, including IBS, are associated with abdominal or visceral pain. Certain of the peptides of the invention include analgesic or antinociceptive tags such as the carboxy-terminal sequence AspPhe immediately following a Trp, Tyr or Phe that creates a functional chymotrypsin cleavage site or following Lys or Arg that creates a functional trypsin cleavage site. Chymotrypsin in the intestinal tract can potentially cleave such peptides immediately carboxy terminal to the Trp, Phe or Tyr residue, releasing the dipeptide, AspPhe. This dipeptide has been shown to have analgesic activity in animal models (Abdikkahi et al. 2001 Fundam Clin Pharmacol 15:117-23; Nikfar et al 1997, 29:583-6; Edmundson et al 1998 Clin Pharmacol Ther 63:580-93). In this manner such peptides can treat both pain and inflammation. Other analgesic peptides can be present at the carboxy terminus of the peptide (following a functional cleavage site) including: endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance P. A number of the useful peptides are based on the core sequence: Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:29). To create a variant having a potentially functional chymotrypsin cleavage site capable of inactivating the peptide, either the Leu (underlined) or the Thr (underlined) can be replaced by Trp, Phe or Tyr or both the Leu and the Thr can be replaced by (independently) Trp, Phe or Tyr. To create a variant having an analgesic di-peptide, the core sequence is followed by Asp Phe. The carboxy terminal Tyr in the core sequence can allow the Asp Phe dipeptide to be released by chymotrypsin in the digestive tract. The core sequence can be optionally be preceded by Asn Ser Ser Asn Tyr or Asn. Thus, useful variants based on the core sequence include: Asn Ser Ser Asn Tyr Cys Cys Glu Leu (SEQ ID NO:26; Cys Cys Asn Pro Ala Cys Thr Gly Cys MM-416776) Tyr Asn Ser Ser Asn Tyr Cys Cys Glu Leu (SEQ ID NO:27) Cys Cys Asn Pro Ala Cys Trp Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu Tyr (SEQ ID NO:28; Cys Cys Asn Pro Ala Cys Thr Gly Cys MD-915) Tyr Cys Cys Glu Leu Cys Cys Asn Pro Ala (SEQ ID NO:29; Cys Thr Gly Cys Tyr MM416774) Cys Cys Glu Leu Cys Cys Asn Pro Ala (SEQ ID NO:30) Cys Trp Gly Cys Tyr Cys Cys Glu Tyr Cys Cys Asn Pro Ala (SEQ ID NO:31; Cys Thr Gly Cys Tyr MD-1100) Asn Cys Cys Glu Leu Cys Cys Asn Pro (SEQ ID NO:32) Ala Cys Thr Gly Cys Tyr Asn Cys Cys Glu Leu Cys Cys Asn Pro (SEQ ID NO:33) Ala Cys Trp Gly Cys Tyr Asn Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:34) Ala Cys Thr Gly Cys Tyr Asn Cys Cys Glu Tyr Cys Cys Asn Pro (SEQ ID NO:35) Ala Cys Thr Gly Cys Tyr Asn Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:36) Ala Cys Thr Gly Cys Tyr Asn Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:37) Ala Cys Thr Gly Cys Tyr Asn Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:38) Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu Leu (SEQ ID NO:39) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Leu (SEQ ID NO:40) Cys Cys Asn Pro Ala Cys Trp Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Phe (SEQ ID NO:41) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Tyr (SEQ ID NO:42) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Trp (SEQ ID NO:43) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Arg (SEQ ID NO:44) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Asn Ser Ser Asn Tyr Cys Cys Glu Lys (SEQ ID NO:45) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Leu Cys Cys Asn Pro Ala (SEQ ID NO:46) Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Leu Cys Cys Asn Pro Ala (SEQ ID NO:47) Cys Trp Gly Cys Tyr Asp Phe Cys Cys Glu Phe Cys Cys Asn Pro Ala (SEQ ID NO:48) Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Tyr Cys Cys Asn Pro Ala (SEQ ID NO:49) Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Trp Cys Cys Asn Pro Ala (SEQ ID NO:50) Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Arg Cys Cys Asn Pro Ala (SEQ ID NO:51) Cys Thr Gly Cys Tyr Asp Phe Cys Cys Glu Lys Cys Cys Asn Pro Ala (SEQ ID NO:52) Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Leu Cys Cys Asn Pro (SEQ ID NO:53) Ala Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Leu Cys Cys Asn Pro (SEQ ID NO:54) Ala Cys Trp Gly Cys Tyr Asp Phe Asn Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:55) Ala Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Tyr Cys Cys Asn Pro (SEQ ID NO:56) Ala Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:57) Ala Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:58) Ala Cys Thr Gly Cys Tyr Asp Phe Asn Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:59) Ala Cys Thr Gly Cys Tyr Asp Phe In some cases, the peptides of the invention are produced as a prepro protein that includes the amino terminal leader sequence: mkksilfiflsvlsfspfaqdakpvesskekitleskkcniakksnksgpesmn. Where the peptide is produced by a bacterial cell, e.g., E. coli, the forgoing leader sequence will be cleaved and the mature peptide will be efficiently secreted from the bacterial cell. U.S. Pat. No. 5,395,490 describes vectors, expression systems and methods for the efficient production of ST peptides in bacterial cells and methods for achieving efficient secretion of mature ST peptides. The vectors, expression systems and methods described in U.S. Pat. No. 5,395,490 can be used to produce the ST peptides and variant ST peptides of the present invention Variant Peptides The invention includes variant peptides which can include one, two, three, four, five, six, seven, eight, nine, or ten (in some embodiments fewer than 5 or fewer than 3 or 2 or fewer) amino acid substitutions and/or deletions compared to SEQ ID NOs:26 to 59, 66 to 110 and 125 to 143. The substitution(s) can be conservative or non-conservative. The naturally-occurring amino acids can be substituted by D-isomers of any amino acid, non-natural amino acids, and other groups. A conservative amino acid substitution results in the alteration of an amino acid for a similar acting amino acid, or amino acid of like charge, polarity, or hydrophobicity. At some positions, even conservative amino acid substitutions can reduce the activity of the peptide. A conservative substitution can substitute a naturally-occurring amino acid for a non-naturally-occurring amino acid. The amino acid substitutions among naturally-occurring amino acids are listed in Table II TABLE II For Amino Acid Code Replace with any of Alanine Ala Gly, Cys, Ser Arginine Arg Lys, His Asparagine Asn Asp, Glu, Gln, Aspartic Acid Asp Asn, Glu, Gln Cysteine Cys Met, Thr, Ser Glutamine Gln Asn, Glu, Asp Glutamic Acid Glu Asp, Asn, Gln Glycine Gly Ala Histidine His Lys, Arg Isoleucine Ile Val, Leu, Met Leucine Leu Val, Ile, Met Lysine Lys Mg, His Methionine Met Ile, Leu, Val Phenylalanine Phe Tyr, His, Trp Proline Pro Serine Ser Thr, Cys, Ala Threonine Thr Ser, Met, Val Tryptophan Trp Phe, Tyr Tyrosine Tyr Phe, His Valine Val Leu, Ile, Met In some circumstances it can be desirable to treat patients with a variant peptide that binds to and activates intestinal GC-C receptor, but is less active than the non-variant form the peptide. This reduced activity can arise from reduced affinity for the receptor or a reduced ability to activate the receptor once bound or reduced stability of the peptide. In some peptides pairs of Cys residues which normally form a disulfide bond one or both members of the pair can be replaced by homocysteine, 3-mercaptoproline (Kolodziej et al. 1996 Int J Pept Protein Res 48:274); β, β dimethylcysteine (Hunt et al. 1993 Int J Pept Protein Res 42:249) or diaminopropionic acid (Smith et al. 1978 J Med Chem 21:117) to form alternative internal cross-links at the positions of the normal disulfide bonds. Production of Peptides Useful peptides can be produced either in bacteria including, without limitation, E. coli, or in other existing systems for peptide or protein production (e.g., Bacillus subtilis, baculovirus expression systems using Drosophila Sf9 cells, yeast or filamentous fungal expression systems, mammalian cell expression systems), or they can be chemically synthesized. If the peptide or variant peptide is to be produced in bacteria, e.g., E. coli, the nucleic acid molecule encoding the peptide will preferably also encode a leader sequence that permits the secretion of the mature peptide from the cell. Thus, the sequence encoding the peptide can include the pre sequence and the pro sequence of, for example, a naturally-occurring bacterial ST peptide. The secreted, mature peptide can be purified from the culture medium. The sequence encoding a peptide of the invention is preferably inserted into a vector capable of delivering and maintaining the nucleic acid molecule in a bacterial cell. The DNA molecule may be inserted into an autonomously replicating vector (suitable vectors include, for example, pGEM3Z and pcDNA3, and derivatives thereof). The vector nucleic acid may be a bacterial or bacteriophage DNA such as bacteriophage lambda or Ml3 and derivatives thereof. Construction of a vector containing a nucleic acid described herein can be followed by transformation of a host cell such as a bacterium. Suitable bacterial hosts include but are not limited to, E. coli, B. subtilis, Pseudomonas, Salmonella. The genetic construct also includes, in addition to the encoding nucleic acid molecule, elements that allow expression, such as a promoter and regulatory sequences. The expression vectors may contain transcriptional control sequences that control transcriptional initiation, such as promoter, enhancer, operator, and repressor sequences. A variety of transcriptional control sequences are well known to those in the art. The expression vector can also include a translation regulatory sequence (e.g., an untranslated 5′ sequence, an untranslated 3′ sequence, or an internal ribosome entry site). The vector can be capable of autonomous replication or it can integrate into host DNA to ensure stability during peptide production. The protein coding sequence that includes a peptide of the invention can also be fused to a nucleic acid encoding a polypeptide affinity tag, e.g., glutathione S-transferase (GST), maltose E binding protein, protein A, FLAG tag, hexa-histidine, myc tag or the influenza HA tag, in order to facilitate purification. The affinity tag or reporter fusion joins the reading frame of the peptide of interest to the reading frame of the gene encoding the affinity tag such that a translational fusion is generated. Expression of the fusion gene results in translation of a single polypeptide that includes both the peptide of interest and the affinity tag. In some instances where affinity tags are utilized, DNA sequence encoding a protease recognition site will be fused between the reading frames for the affinity tag and the peptide of interest. Genetic constructs and methods suitable for production of immature and mature forms of the peptides and variants of the invention in protein expression systems other than bacteria, and well known to those skilled in the art, can also be used to produce peptides in a biological system. Mature peptides and variants thereof can be synthesized by the solid-phase method using an automated peptide synthesizer. For example, the peptide can be synthesized on Cyc(4-CH2 Bxl)-OCH2-4-(oxymethyl)-phenylacetamidomethyl resin using a double coupling program. Protecting groups must be used appropriately to create the correct disulfide bond pattern. For example, the following protecting groups can be used: t-butyloxycarbonyl (alpha-amino groups); acetamidomethyl (thiol groups of Cys residues B and E); 4-methylbenyl (thiol groups of Cys residues C and F); benzyl (y-carboxyl of glutamic acid and the hydroxyl group of threonine, if present); and bromobenzyl (phenolic group of tyrosine, if present). Coupling is effected with symmetrical anhydride of t-butoxylcarbonylamino acids or hydroxybenzotriazole ester (for asparagine or glutamine residues), and the peptide is deprotected and cleaved from the solid support in hydrogen fluoride, dimethyl sulfide, anisole, and p-thiocresol using 8/1/1/0.5 ratio (v/v/v/w) at 0° C. for 60 min. After removal of hydrogen fluoride and dimethyl sulfide by reduced pressure and anisole and p-thiocresol by extraction with ethyl ether and ethyl acetate sequentially, crude peptides are extracted with a mixture of 0.5M sodium phosphate buffer, pH 8.0 and N,N-dimethylformamide using 1/1 ratio, v/v. The disulfide bond for Cys residues B and E is the formed using dimethyl sulfoxide (Tam et al. (1991) J. Am. Chem. Soc. 113:6657-62). The resulting peptide is the purified by reverse-phase chromatography. The disulfide bond between Cys residues C and F is formed by first dissolving the peptide in 50% acetic acid in water. Saturated iodine solution in glacial acetic acid is added (1 ml iodine solution per 100 ml solution). After incubation at room temperature for 2 days in an enclosed glass container, the solution is diluted five-fold with deionized water and extracted with ethyl ether four times for removal of unreacted iodine. After removal of the residual amount of ethyl ether by rotary evaporation the solution of crude product is lyophilized and purified by successive reverse-phase chromatography. Intestinal GC-C Receptor Binding Assay The ability of peptides and other agents to bind to the intestinal GC-C receptor can be tested as follows. Cells of the T84 human colon carcinoma cell line (American Type Culture Collection (Bethesda, Md.) are grown to confluence in 24-well culture plates with a 1:1 mixture of Ham's F12 medium and Dulbecco's modified Eagle's medium (DMEM), supplemented with 5% fetal calf serum. Cells used in the assay are typically between passages 54-60. Briefly, T84 cell monolayers in 24-well plates are washed twice with 1 ml of binding buffer (DMEM containing 0.05% bovine serum albumin and 25 mM HEPES, pH 7.2), then incubated for 30 min at 37° C. in the presence of mature radioactively labeled E. coli ST peptide and the test material at various concentrations. The cells are then washed four times with 1 ml of DMEM and solubilized with 0.5 ml/well 1N NaOH. The level of radioactivity in the solubilized material is then determined using standard methods. EXAMPLE 1 Preparation of Variant ST Peptides and Wild-Type ST Peptide 1a: Preparation of Recombinant Variant ST Peptides and Wild-Type ST Peptide A variant ST peptide, referred to as MD-915, was reproduced recombinantly and tested in an animal model. MD-915 has the sequence: Asn Ser Ser Asn Tyr Cys Cys Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:28). A peptide having the sequence of the wild-type ST peptide was also created (MM-416776). MD-915 and MM-416776 peptides were produced as preproproteins using vectors produced as follows. A sequence encoding a heat-stable enterotoxin pre-pro sequence was amplified from pGK51/pGSK51 (ATCC 67728) using oligonucleotide MO3514 (5′ CACACCATATGAAGAAATCAATATTATTTATTTTTCTTTCTG 3′ (SEG ID NO:60)) and oligonucelotide MO3515 (5′ CACACCTCGAGTTAGGTCTCCATGCTTTCAGGACCACTTTTATTAC 3′ (SEQ ID NO: 61)). The amplification product fragment was digested with NdeI/XhoI and ligated to the T7 expression vector, pET26b(+) (Novagen) digested with NdeI/XhoI thereby creating plasmid MB3976. The region encoding the pre-pro protein was sequenced and found to encode the amino acid sequence: mkksilfiflsvlsfspfaqdakpagsskekitleskkcnivkksnksgpesm (SEQ ID NO: 24) which differs from the amino acid sequence of heat-stable enterotoxin a2 precursor (sta2; mkksilfiflsvlsfspfaqdakpagsskekitleskkcnivkknnesspesm (SEQ ID NO:25); GenBank® Accession No. Q47185, GI: 3913876) at three positions (indicated by underlining and bold text) near the C-terminus. To create expression vectors with the pre-pro sequence, complementary oligos encoding each ST peptide variant or wild-type ST peptide were annealed and cloned into the MB3976 expression vector. To create MB3984 (encoding MM-416776 peptide full length wild-type ST peptide as a prepro protein), containing the amino acid sequence, NSSNYCCELCCNPACTGCY (SEQ ID NO:26) fused downstream of the pre-pro sequence, MB 3976 was digested with BsaI/XhoI and ligated to annealed oligos MO3621 (5′ GCATGAATAGTAGCAATTACTGCTGTGAATTGTGTTGTAATCCTGCTTGTACCGGGT GCTATTAATAAC 3′ (SEQ ID NO:62)) and MO3622 (5′ TCGAGTTATTAATAGCACCCGGTACAAGCAGGATTACAACACAATTCACAGCAGTA ATTGCTACTATTC 3′(SEQ ID NO:63)). To create MB3985 (encoding MD-915 as a prepro protein) containing the following amino acid sequence, NSSNYCCEYCCNPACTGCY (SEQ ID NO:28) fused downstream of the pre-pro sequence, MB 3976 was digested with BsaI/XhoI and ligated to annealed oligos MO3529 (5′ GCATGAATAGTAGCAATTACTGCTGTGAATATTGTTGTAATCCTGCTTGTACCGGGT GCTATTAATAAC 3′ (SEQ ID NO:64)) and MO3530 (5′ TCGAGTTATTAATAGCACCCGGTACAAGCAGGATTACAACAATATTCACAGCAGTA ATTGCTACTATTC 3′(SEQ ID NO:65)). The MD-915 peptide and the MM-416776 peptide were produced as follows. The expression vectors were transformed into E. coli bacterial host BL21 λ DE3 (Invitrogen). A single colony was innoculated and grown shaking overnight at 30° C. in L broth+25 mg/l kanamycin. The overnight culture was added to 3.2 L of batch medium (Glucose 25 g/l, Caseamino Acids 5 g/l, Yeast Extract 5 g/l, KH2PO4 13.3 g/l, (NH4)2HPO4 4 μl, MgSO4-7H2O 1.2 g/l, Citric Acid 1.7 g/l, EDTA 8.4 mg/l, CoCl2-6H2O 2.5 mg/l, MnCl2-4H2O 15 mg/l, CuCl2-4H2O 1.5 mg/l, H3BO3 3 mg/l, Na2MoO4-2H2O 2.5 mg/l, Zn Acetate-2H2O 13 mg/l, Ferric Citrate 100 mg/l, Kanamycin 25 mg/l, Antifoam DF2O4 1 ml/1) and fermented using the following process parameters: pH 6.7—control with base only (28% NH4OH), 30° C., aeration: 5 liters per minute. After the initial consumption of batch glucose (based on monitoring dissolved oxygen (DO) levels), 1.5 L of feed medium (Glucose 700 g/l, Caseamino Acids 10 g/l, Yeast Extract 10 g/l, MgSO4-7H2O 4 g/l, EDTA 13 mg/l, CoCl2-6H2O 4 mg/l, MnCl2-4H2O 23.5 mg/l, CuCl2-4H2O 2.5 mg/l, H3BO3 5 mg/l, Na2MoO4-2H2O 4 mg/l, Zn Acetate-2H2O 16 mg/l, Ferric Citrate 40 mg/l, Antifoam DF2O4 1 ml/l) was added at a feed rate controlled to maintain 20% DO. IPTG was added to 0.2 mM 2 hours post feed start. The total run time was approximately 40-45 hours (until feed exhaustion). Cells were collected by centrifugation at 5,000 g for 10 minutes. The cell pellet was discarded and the supernatant was passed through a 50 Kd ultrafiltration unit. The 50 Kd filtrate (0.6 liters) was loaded onto a 110 ml Q-Sepharose fast Flow column (Amersham Pharmacia, equilibrated with 20 mM Tris-HCl pH 7.5) at a flow rate of 400 ml/hour. The column was washed with six volumes of 20 mM Tris-HCl pH 7.5 and proteins were eluted with 50 mM acetic acid collecting 50 ml fractions. Fractions containing ST peptide variant or wild-type ST peptide were pooled and the solvent was removed by rotary evaporation. The dried proteins were resuspended in 10 ml of 8% acetic acid, 0.1% trifluoroacetic acid (TFA) and loaded onto a Varian Polaris C18-A column (250×21.2 mm 10 μm, equilibrated in the same buffer) at a flow rate of 20 ml/min. The column was washed with 100 ml of 8% methanol, 0.1% TFA and developed with a gradient (300 ml) of 24 to 48% methanol, 0.1% TFA, collecting 5-ml fractions. Fractions containing peptide were pooled and the solvent was removed by rotary evaporation. The peptides were dissolved in 0.1% TFA and lyophilized. The MD-915 peptide and MM-416776 peptide fractions were analyzed by standard LCMS and HPLC. LCMS analysis revealed that MD-915 is more homogeneous than MM-416776 (see FIG. 1a; note that MD-915 peptide exhibits fewer peaks (Panel B) than MM-416776 (Panel A)). 1b: Preparation of Synthetic Variant ST Peptides and Wild-Type ST peptide Peptides were chemically synthesized by a commercial peptide synthesis company. Varying yields of peptides were obtained depending on the efficiency of chemical synthesis. Thus, the four peptides, in decreasing order of yield were: Cys Cys Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:31; MD-1100), 10-20% yield; Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:29; MM416774); Asn Ser Ser Asn Tyr Cys Cys Glu Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:28; MD-915); Asn Ser Ser Asn Tyr Cys Cys Glu Leu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr (SEQ ID NO:26 MM-416776), <5% yield. Thus the specific amino acid changes introduced into the peptides can create improved manufacturing properties. FIG. 1b shows the total ion chromatograph profile of synthetically manufactured MD-1100. FIG. 1c shows the total ion chromatograph profile of the control blank sample. There is one major peak present in the MD-1100 sample that is not also present in the control sample. Quantitative analysis suggests the MD-1100 is >98% pure. EXAMPLE 2 Activation of the Intestinal GC-C Receptor by a Variant ST Peptide and ST Peptide The ability of MD-915, MM-416776, and MD-1100 to activate the intestinal GC-C receptor was assessed in an assay employing the T84 human colon carcinoma cell line (American Type Culture Collection (Bethesda, Md.). For the assays cells were grown to confluency in 24-well culture plates with a 1:1 mixture of Ham's F12 medium and Dulbecco's modified Eagle's medium (DMEM), supplemented with 5% fetal calf serum and were used at between passages 54 and 60. Briefly, monolayers of T84 cells in 24-well plates were washed twice with 1 ml/well DMEM, then incubated at 37° C. for 10 min with 0.45 ml DMEM containing 1 mM isobutylmethylxanthine (IBMX), a cyclic nucleotide phosphodiesterase inhibitor. Test peptides (50 μl) were then added and incubated for 30 minutes at 37° C. The media was aspirated and the reaction was then terminated by the addition of ice cold 0.5 ml of 0.1N HCl. The samples were held on ice for 20 minutes and then evaporated to dryness using a heat gun or vacuum centrifugation. The dried samples were resuspended in 0.5 ml of phosphate buffer provided in the Cayman Chemical Cyclic GMP EIA kit (Cayman Chemical, Ann Arbor, Mich.). Cyclic GMP was measured by EIA according to procedures outlined in the Cayman Chemical Cyclic GMP EIA kit. FIG. 2 shows the activity of chemically synthesized peptide variants in this GC-C receptor activity assay. In this assay, MM-416776 and two different MD-1100 peptides (MD-1100(a) and MD-1100(b), synthesized by two different methods) had activity comparable to MM-416776. MD-915 and MM-416776 peptide were chemically synthesized in a manner identical to that of MD-1100(b). EXAMPLE 3 MD-915 and MM-416776 increase intestinal transit in mice In order to determine whether the peptides increase the rate of gastrointestinal transit, the peptides and controls were tested using a murine gastrointestinal transit (GIT) assay (Moon et al. Infection and Immunity 25:127, 1979). In this assay, charcoal, which can be readily visualized in the gastrointestinal tract is administered to mice after the administration of a test compound. The distance traveled by the charcoal is measured and expressed as a percentage of the total length of the colon. Mice were fasted with free access to water for 12 to 16 hours before the treatment with peptide or control buffer. The peptides were orally administered at 1 μg/kg-1 mg/kg of peptide in buffer (20 mM Tris pH 7.5) 7 minutes before being given an oral dose of 5% Activated Carbon (Aldrich 242276-250G). Control mice were administered buffer only before being given a dose of Activated Carbon. After 15 minutes, the mice were sacrificed and their intestines from the stomach to the cecum were dissected. The total length of the intestine as well as the distance traveled from the stomach to the charcoal front was measured for each animal and the results are expressed as the percent of the total length of the intestine traveled by the charcoal front. All results are reported as the average of 10 mice±standard deviation. A comparison of the distance traveled by the charcoal between the mice treated with peptide versus the mice treated with vehicle alone was performed using a Student's t test and a statistically significant difference was considered for P<0.05. P-values are calculated using a two-sided T-Test assuming unequal variances. As can be seen in FIG. 3a, b, wild-type ST peptide (MM-416776, (Sigma-Aldrich, St Louis, Mo.; 0.1 mg/kg), synthetically manufactured MD-1100 and Zelnorm® (0.1 mg/kg), a drug approved for IBS that is an agonist for the serotonin receptor 5HT4, increase gastrointestinal transit rate in this model. FIG. 4a shows the result of a study demonstrating that intestinal transit rate increases with an increasing dosage of either recombinantly synthesized MM-416776 or MD-915. FIG. 4b shows the results of a study demonstrating both chemically synthesized MM-416776 or MD-1100 peptide increase intestinal transit rates more than either Tris buffer alone or an equivalent dose of Zelnorm®. The identical experiment was performed to determine if MD-1100 is effective in a chronic dosing treatment regimen. Briefly, 8 week old CD1 female mice are dosed orally once a day for 5 days with either MD-1100 (0.06 mg/kg or 0.25 mg/kg in 20 mM Tris pH 7.5) or vehicle alone (20 mM Tris pH 7.5). On the 5th day, a GIT assay is performed identical to that above except 200 μl of a 10% charcoal solution is administered. FIG. 4c shows the results of a study demonstrating both chemically synthesized MD-1100 or Zelnorm® are effective in a mouse gastrointestinal motility assay upon chronic dosing (daily for 5 days). The results are shown side by side with acute dosing (1 day). EXAMPLE 4 MD-915 Peptide and MM-416776 Peptide Increase Intestinal Secretion in Suckling Mice (SuMi Assay) MM-416776 peptide and MD-915 were tested for their ability to increase intestinal secretion using a suckling mouse model of intestinal secretion. In this model a test compound is administered to suckling mice that are between 7 and 9 days old. After the mice are sacrificed, the gastrointestinal tract from the stomach to the cecum is dissected (“guts”). The remains (“carcass”) as well as the guts are weighed and the ratio of guts to carcass weight is calculated. If the ratio is above 0.09, one can conclude that the test compound increases intestinal secretion. FIG. 5a shows a dose response curve for wild-type ST peptide (MM-416776) in this model. FIG. 5b shows dose response curve for the MD-1100 peptide in this model. These data show that wild-type ST peptide (purchased from TDT, Inc. West Chester, Pa.) and the MD-1100 peptide increase intestinal secretion. The effect of Zelnorm® was also studied. As can be seen from FIG. 5, Zelnorm® at 0.2 mg/kg does not increase intestinal secretion in this model. FIG. 6a shows a dose response curve for the recombinant MM-416776 peptide described above and the recombinant MD-915 peptide described above. As can be seen from FIG. 6a, both peptides increase intestinal secretion in this model. Similarly FIG. 6b shows a dose response curve for chemically synthesized MD-915, MD-1100 and MM-416776 as well as wild-type ST peptide (purchased from Sigma-Aldrich, St Louis, Mo.). Colonic Hyperalgesia Animal Models Hypersensitivity to colorectal distension is common in patients with IBS and may be responsible for the major symptom of pain. Both inflammatory and non-inflammatory animal models of visceral hyperalgesia to distension have been developed to investigate the effect of compounds on visceral pain in IBS. I. Trinitrobenzenesulphonic Acid (TNBS)-Induced Rectal Allodynia Model Male Wistar rats (220-250 g) were premedicated with 0.5 mg/kg of acepromazine injected intraperitoneally (IP) and anesthetized by intramuscular administration of 100 mg/kg of ketamine. Pairs of nichrome wire electrodes (60 cm in length and 80 μm in diameter) were implanted in the striated muscle of the abdomen, 2 cm laterally from the white line. The free ends of electrodes were exteriorized on the back of the neck and protected by a plastic tube attached to the skin. Electromyographic (EMG) recordings were started 5 days after surgery. Electrical activity of abdominal striated muscle was recorded with an electroencephalograph machine (Mini VIII, Alvar, Paris, France) using a short time constant (0.03 sec.) to remove low-frequency signals (<3 Hz). Ten days post surgical implantation, trinitrobenzenesulphonic acid (TNBS) was administered to induce rectal inflammation. TNBS (80 mg kg−1 in 0.3 ml 50% ethanol) was administered intrarectally through a silicone rubber catheter introduced at 3 cm from the anus under light diethyl-ether anesthesia, as described (Morteau et al. 1994 Dig Dis Sci 39:1239). Following TNBS administration, rats were placed in plastic tunnels where they were severely limited in mobility for several days before colorectal distension (CRD). Experimental compound was administered one hour before CRD which was performed by insertion into the rectum, at 1 cm of the anus, a 4 cm long balloon made from a latex condom (Gue et al, 1997 Neurogastroenterol. Motil. 9:271). The balloon was fixed on a rigid catheter taken from an embolectomy probe (Fogarty). The catheter attached balloon was fixed at the base of the tail. The balloon, connected to a barostat, was inflated progressively by step of 15 mmHg, from 0 to 60 mmHg, each step of inflation lasting 5 min. Evaluation of rectal sensitivity, as measured by EMG, was performed before (1-2 days) and 3 days following rectal instillation of TNBS. The number of spike bursts that corresponds to abdominal contractions was determined per 5 min periods. Statistical analysis of the number of abdominal contractions and evaluation of the dose-effects relationships was performed by a one way analysis of variance (ANOVA) followed by a post-hoc (Student or Dunnett tests) and regression analysis for ED50 if appropriate. FIG. 7 shows the results of experiment in which MD-1100 activity was analyzed in the TNBS colorectal model. Significant decreases in abdominal response are observed at 0.3 μg/kg and 3 μg/kg MD-1100. These results demonstrate that MD-1100 reduces pain associated with colorectal distension in this animal model. II. Stress-Induced Hyperalgesia Model Male Wistar Rats (200-250 g) are surgically implanted with nichrome wire electrodes as in the TNBS model. Ten days post surgical implantation, partial restraint stress (PRS), is performed as described by Williams et al. for two hours (Williams et al. 1988 Gastroenterology 64:611). Briefly, under light anesthesia with ethyl-ether, the foreshoulders, upper forelimbs and thoracic trunk are wrapped in a confining harness of paper tape to restrict, but not prevent body movements. Control sham-stress animals are anaesthetized but not wrapped. Thirty minutes before the end of the PRS session, the animals are administered test-compound or vehicle. Thirty minutes to one hour after PRS completion, the CRD distension procedure is performed as described above for the TNBS model with barostat at pressures of 15, 30, 45 and 60 mm Hg. Statistical analysis on the number of bursts is determined and analyzed as in the TNBS model above. Phenylbenzoquinone-Induced Writhing Model The PBQ-induced writhing model can be used to assess pain control activity of the peptides and GC-C receptor agonists of the invention. This model is described by Siegmund et al. (1957 Proc. Soc. Exp. Bio. Med. 95:729-731). Briefly, one hour after oral dosing with a test compound, e.g., a peptide, morphine or vehicle, 0.02% phenylbenzoquinone (PBQ) solution (12.5 mL/kg) is injected by intraperitoneal route into the mouse. The number of stretches and writhings are recorded from the 5th to the 10th minute after PBQ injection, and can also be counted between the 35th and 40th minute and between the 60th and 65th minute to provide a kinetic assessment. The results are expressed as the number of stretches and writhings (mean±SEM) and the percentage of variation of the nociceptive threshold calculated from the mean value of the vehicle-treated group. The statistical significance of any differences between the treated groups and the control group is determined by a Dunnett's test using the residual variance after a one-way analysis of variance (P<0.05) using SigrnaStat Software. FIGS. 8a and 8b show the effect of different doses of MD-915 and MD-1100 in the PBQ writhing assay. Indomethacin, an NSAID (nonsteroidal anti-inflammatory drug) with known pain control activity, was used as the positive control in the assay. Significant reductions in writhings were observed for MD-915 (1 mg/kg dose) and MD-1100 (2.5 mg/kg dose) compared to the vehicle control. Loss of efficacy at the highest dose tested has also been observed for multiple other compounds (such as 5HT-3 antagonists) tested in similar assays. The results of this study suggest that both MD-915 and MD-1100 have antinociceptive effects in this visceral pain model comparable to the intermediate doses of indomethacin. EXAMPLE 5 MD-1100 Kd Determination To determine the affinity of MD-1100 for GC-C receptors found in rat intestinal mucosa, a competition binding assay was performed using rate intestinal epithelial cells. Epithelial cells from the small intestine of rats were obtained as described by Kessler et al. (J. Biol. Chem. 245: 5281-5288 (1970)). Briefly, animals were sacrificed and their abdominal cavities exposed. The small intestine was rinsed with 300 ml ice cold saline or PBS. 10 cm of the small intestine measured at 10 cm from the pylorus was removed and cut into 1 inch segments. Intestinal mucosa was extruded from the intestine by gentle pressure between a piece of parafilm and a P-1000 pipette tip. Intestinal epithelial cells were placed in 2 ml PBS and pipetted up and down with a 5 ml pipette to make a suspension of cells. Protein concentration in the suspension was measured using the Bradford method (Anal. Biochem. 72: 248-254 (1976)). A competition binding assay was performed based on the method of Giannella et al. (Am. J. Physiol. 245: G492-G498) between [125I] labeled MM-416776 and MD-1100. The assay mixture contained: 0.5 ml of DME with 20 mM HEPES-KOH pH 7.0, 0.9 mg of the cell suspension listed above, 21.4 fmol [125I]-MM-416776 (42.8 pM), and different concentrations of competitor MD-1100 (0.01 to 1000 nM). The mixture was incubated at room temperature for 1 hour, and the reaction stopped by applying the mixture to GF/B glass-fiber filters (Whatman). The filters were washed with 5 ml ice-cold PBS and radioactivity was measured. FIG. 9 shows that the Kd for MD-1100 in this assay is 4.5 nm. % B/Bo is the percentage of the ratio of radioactivity trapped in each sample (B) compared to the radioactivity retained in a control sample with no cold competitor (Bo). Giannella et al. (Am. J. Physiol.245: G492-G498) observed that the Kd for wild-type ST peptide in this same assay was ˜13 mm. EXAMPLE 6 Pharmacokinetic Properties of MD-1100 To study the pharmacokinetics of MD-100, absorbability studies in mice were performed by administering MD-1100 intravaneously via tail vein injection or orally by gavage to 8-week-old CD1 mice. Serum was collected from the animals at various time points and tested for the presence of MD-100 using a competitive enzyme-linked immunoabsorbent assay (Oxoid, ST EIA kit, Cat#TD0700). The assay utilized monoclonal antibodies against ST peptide (antibodies are provided in the Oxoid kit) and synthetically manufactured MD-1100. FIG. 10a shows absorption data for intravenously and orally administered MD-1100 as detected by the ELISA assay. MD-1100 appears to be minimally systemically absorbed and is <2.2% bioavailable. A similar bioavailability study was performed in which LCMS rather than ELISA was used to detect MD-1100. Initially, serum samples were extracted from the whole blood of exposed and control mice, then injected directly (10 mL) onto an in-line solid phase extraction (SPE) column (Waters Oasis HLB 25 mm column, 2.0×15 mm direct connect) without further processing. The sample on the SPE column was washed with a 5% methanol, 95% dH2O solution (2.1 mL/min, 1.0 minute), then loaded onto an analytical column using a valve switch that places the SPE column in an inverted flow path onto the analytical column (Waters Xterra MS C8 5 mm IS column, 2.1×20 mm). The sample was eluted from the analytical column with a reverse phase gradient (Mobile Phase A: 10 mM ammonium hydroxide in dH2O, Mobile Phase B: 10 mM ammonium hydroxide in 80% acetonitrile and 20% methanol; 20% B for the first 3 minutes then ramping to 95% B over 4 min. and holding for 2 min., all at a flow rate of 0.4 mL/min.). At 9.1 minutes, the gradient returns to the initial conditions of 20% B for 1 min. MD-1100 eluted from the analytical column at 1.45 minutes, and was detected by triple-quadrapole mass spectrometry (MRM, 764 (+2 charge state)>182 (+1 charge state) Da; cone voltage=30V; collision=20 eV; parent resolution=2 Da at base peak; daughter resolution=2 Da at base peak). Instrument response was converted into concentration units by comparison with a standard curve using known amounts of chemically synthesized MD-1100 prepared and injected in mouse serum using the same procedure. FIG. 10b shows absorption data for IV and orally administered MD-1100 as detected by LCMS. In this assay, MD-1100 appears similarly minimally systemically absorbed and is <0.11% bioavailable. Administration of Peptides and GC-C Receptor Agonists For treatment of gastrointestinal disorders, the peptides and agonists of the invention are preferably administered orally, e.g., as a tablet or cachet containing a predetermined amount of the active ingredient, pellet, gel, paste, syrup, bolus, electuary, slurry, capsule; powder; granules; as a solution or a suspension in an aqueous liquid or a non-aqueous liquid; as an oil-in-water liquid emulsion or a water-in-oil liquid emulsion, via a liposomal formulation (see, e.g., EP 736299) or in some other form. Orally administered compositions can include binders, lubricants, inert diluents, lubricating, surface active or dispersing agents, flavoring agents, and humectants. Orally administered formulations such as tablets may optionally be coated or scored and may be formulated so as to provide sustained, delayed or controlled release of the active ingredient therein. The peptides and agonists can be co-administered with other agents used to treat gastrointestinal disorders including but not limited to acid suppressing agents such as Histamine-2 receptor agonists (H2As) and proton pump inhibitors (PPIs). The peptides and agonists can also be administered by rectal suppository. For the treatment of disorders outside the gastrointestinal tract such as congestive heart failure and benign prostatic hypertrophy, peptides and agonists are preferably administered parenterally or orally. The peptides described herein can be used alone or in combination with other agents. For example, the peptides can be administered together with an analgesic peptide or compound. The analgesic peptide or compound can be covalently attached to a peptide described herein or it can be a separate agent that is administered together with or sequentially with a peptide described herein in a combination therapy. Combination therapy can be achieved by administering two or more agents, e.g., a peptide described herein and an analgesic peptide or compound, each of which is formulated and administered separately, or by administering two or more agents in a single formulation. Other combinations are also encompassed by combination therapy. For example, two agents can be formulated together and administered in conjunction with a separate formulation containing a third agent. While the two or more agents in the combination therapy can be administered simultaneously, they need not be. For example, administration of a first agent (or combination of agents) can precede administration of a second agent (or combination of agents) by minutes, hours, days, or weeks. Thus, the two or more agents can be administered within minutes of each other or within 1, 2, 3, 6, 9, 12, 15, 18, or 24 hours of each other or within 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 14 days of each other or within 2, 3, 4, 5, 6, 7, 8, 9, or 10 weeks of each other. In some cases even longer intervals are possible. While in many cases it is desirable that the two or more agents used in a combination therapy be present in within the patient's body at the same time, this need not be so. Combination therapy can also include two or more administrations of one or more of the agents used in the combination. For example, if agent X and agent Y are used in a combination, one could administer them sequentially in any combination one or more times, e.g., in the order X-Y-X, X-X-Y, Y-X-Y, Y-Y-X, X-X-Y-Y, etc. The agents, alone or in combination, can be combined with any pharmaceutically acceptable carrier or medium. Thus, they can be combined with materials that do not produce an adverse, allergic or otherwise unwanted reaction when administered to a patient. The carriers or mediums used can include solvents, dispersants, coatings, absorption promoting agents, controlled release agents, and one or more inert excipients (which include starches, polyols, granulating agents, microcrystalline cellulose, diluents, lubricants, binders, disintegrating agents, and the like), etc. If desired, tablet dosages of the disclosed compositions may be coated by standard aqueous or nonaqueous techniques. Compositions of the present invention may also optionally include other therapeutic ingredients, anti-caking agents, preservatives, sweetening agents, colorants, flavors, desiccants, plasticizers, dyes, and the like. Any such optional ingredient must be compatible with the compound of the invention to insure the stability of the formulation. The composition may contain other additives as needed, including for example lactose, glucose, fructose, galactose, trehalose, sucrose, maltose, raffinose, maltitol, melezitose, stachyose, lactitol, palatinite, starch, xylitol, mannitol, myoinositol, and the like, and hydrates thereof, and amino acids, for example alanine, glycine and betaine, and peptides and proteins, for example albumen. Examples of excipients for use as the pharmaceutically acceptable carriers and the pharmaceutically acceptable inert carriers and the aforementioned additional ingredients include, but are not limited to binders, fillers, disintegrants, lubricants, anti-microbial agents, and coating agents such as: BINDERS: corn starch, potato starch, other starches, gelatin, natural and synthetic gums such as acacia, sodium alginate, alginic acid, other alginates, powdered tragacanth, guar gum, cellulose and its derivatives (e.g., ethyl cellulose, cellulose acetate, carboxymethyl cellulose calcium, sodium carboxymethyl cellulose), polyvinyl pyrrolidone, methyl cellulose, pre-gelatinized starch (e.g., STARCH 1500® and STARCH 1500 LM®, sold by Colorcon, Ltd.), hydroxypropyl methyl cellulose, microcrystalline cellulose (e.g. AVICEL™, such as, AVICEL-PH-101™, -103™ and -105™, sold by FMC Corporation, Marcus Hook, Pa., USA), or mixtures thereof, FILLERS: talc, calcium carbonate (e.g., granules or powder), dibasic calcium phosphate, tribasic calcium phosphate, calcium sulfate (e.g., granules or powder), microcrystalline cellulose, powdered cellulose, dextrates, kaolin, mannitol, silicic acid, sorbitol, starch, pre-gelatinized starch, or mixtures thereof, DISINTEGRANTS: agar-agar, alginic acid, calcium carbonate, microcrystalline cellulose, croscarmellose sodium, crospovidone, polacrilin potassium, sodium starch glycolate, potato or tapioca starch, other starches, pre-gelatinized starch, clays, other algins, other celluloses, gums, or mixtures thereof, LUBRICANTS: calcium stearate, magnesium stearate, mineral oil, light mineral oil, glycerin, sorbitol, mannitol, polyethylene glycol, other glycols, stearic acid, sodium lauryl sulfate, talc, hydrogenated vegetable oil (e.g., peanut oil, cottonseed oil, sunflower oil, sesame oil, olive oil, corn oil and soybean oil), zinc stearate, ethyl oleate, ethyl laurate, agar, syloid silica gel (AEROSIL 200, W.R. Grace Co., Baltimore, Md. USA), a coagulated aerosol of synthetic silica (Deaussa Co., Plano, Tex. USA), a pyrogenic silicon dioxide (CAB-O-SIL, Cabot Co., Boston, Mass. USA), or mixtures thereof, ANTI-CAKING AGENTS: calcium silicate, magnesium silicate, silicon dioxide, colloidal silicon dioxide, talc, or mixtures thereof, ANTIMICROBIAL AGENTS: benzalkonium chloride, benzethonium chloride, benzoic acid, benzyl alcohol, butyl paraben, cetylpyridinium chloride, cresol, chlorobutanol, dehydroacetic acid, ethylparaben, methylparaben, phenol, phenylethyl alcohol, phenoxyethanol, phenylmercuric acetate, phenylmercuric nitrate, potassium sorbate, propylparaben, sodium benzoate, sodium dehydroacetate, sodium propionate, sorbic acid, thimersol, thymo, or mixtures thereof, and COATING AGENTS: sodium carboxymethyl cellulose, cellulose acetate phthalate, ethylcellulose, gelatin, pharmaceutical glaze, hydroxypropyl cellulose, hydroxypropyl methylcellulose, hydroxypropyl methyl cellulose phthalate, methylcellulose, polyethylene glycol, polyvinyl acetate phthalate, shellac, sucrose, titanium dioxide, carnauba wax, microcrystalline wax, or mixtures thereof. The agents either in their free form or as a salt can be combined with a polymer such as polylactic-glycoloic acid (PLGA), poly-(I)-lactic-glycolic-tartaric acid (P(I)LGT) (WO 01/12233), polyglycolic acid (U.S. Pat. No. 3,773,919), polylactic acid (U.S. Pat. No. 4,767,628), poly(ε-caprolactone) and poly(alkylene oxide) (U.S. 20030068384) to create a sustained release formulation. Such formulations can be used to implants that release a peptide or another agent over a period of a few days, a few weeks or several months depending on the polymer, the particle size of the polymer, and the size of the implant (see, e.g., U.S. Pat. No. 6,620,422). Other sustained release formulations are described in EP 0 467 389 A2, WO 93/241150, U.S. Pat. No. 5,612,052, WO 97/40085, WO 03/075887, WO 01/01964A2, U.S. Pat. No. 5,922,356, WO 94/155587, WO 02/074247A2, WO 98/25642, U.S. Pat. No. 5,968,895, U.S. Pat. No. 6,180,608, U.S. 20030171296, U.S. 20020176841, U.S. Pat. No. 5,672,659, U.S. Pat. No. 5,893,985, U.S. Pat. No. 5,134,122, U.S. Pat. No. 5,192,741, U.S. Pat. No. 5,192,741, U.S. Pat. No. 4,668,506, U.S. Pat. No. 4,713,244, U.S. Pat. No. 5,445,832 U.S. Pat. No. 4,931,279, U.S. Pat. No. 5,980,945, WO 02/058672, WO 9726015, WO 97/04744, and. US20020019446. In such sustained release formulations microparticles of peptide are combined with microparticles of polymer. One or more sustained release implants can be placed in the large intestine, the small intestine or both. U.S. Pat. No. 6,011,011 and WO 94/06452 describe a sustained release formulation providing either polyethylene glycols (where PEG 300 and PEG 400 are most preferred) or triacetin. WO 03/053401 describes a formulation which may both enhance bioavailability and provide controlled releaseof the agent within the GI tract. Additional controlled release formulations are described in WO 02/38129, EP 326 151, U.S. Pat. No. 5,236,704, WO 02/30398, WO 98/13029; U.S. 20030064105, U.S. 20030138488A1, U.S. 20030216307A1,U.S. Pat. No. 6,667,060, WO 01/49249, WO 01/49311, WO 01/49249, WO 01/49311, and U.S. Pat. No. 5,877,224. The agents can be administered, e.g., by intravenous injection, intramuscular injection, subcutaneous injection, intraperitoneal injection, topical, sublingual, intraarticular (in the joints), intradermal, buccal, ophthalmic (including intraocular), intranasaly (including using a cannula), or by other routes. The agents can be administered orally, e.g., as a tablet or cachet containing a predetermined amount of the active ingredient, gel, pellet, paste, syrup, bolus, electuary, slurry, capsule, powder, granules, as a solution or a suspension in an aqueous liquid or a non-aqueous liquid, as an oil-in-water liquid emulsion or a water-in-oil liquid emulsion, via a micellar formulation (see, e.g. WO 97/11682) via a liposomal formulation (see, e.g., EP 736299,WO 99/59550 and WO 97/13500), via formulations described in WO 03/094886 or in some other form. Orally administered compositions can include binders, lubricants, inert diluents, lubricating, surface active or dispersing agents, flavoring agents, and humectants. Orally administered formulations such as tablets may optionally be coated or scored and may be formulated so as to provide sustained, delayed or controlled release of the active ingredient therein. The agents can also be administered transdermally (i.e. via reservoir-type or matrix-type patches, microneedles, thermal poration, hypodermic needles, iontophoresis, electroporation, ultrasound or other forms of sonophoresis, jet injection, or a combination of any of the preceding methods (Prausnitz et al. 2004, Nature Reviews Drug Discovery 3:115-124)). The agents can be administered using high-velocity transdermal particle injection techniques using the hydrogel particle formulation described in U.S. 20020061336. Additional particle formulations are described in WO 00/45792, WO 00/53160, and WO 02/19989. An example of a transdermal formulation containing plaster and the absorption promoter dimethylisosorbide can be found in WO 89/04179. WO 96/11705 provides formulations suitable for transdermal adminisitration. The agents can be administered in the form a suppository or by other vaginal or rectal means. The agents can be administered in a transmembrane formulation as described in WO 90/07923. The agents can be administed non-invasively via the dehydrated particicles described in U.S. Pat. No. 6,485,706. The agent can be administered in an enteric-coated drug formulation as described in WO 02/49621. The agents can be administered intranassaly using the formulation described in U.S. Pat. No. 5,179,079. Formulations suitable for parenteral injection are described in WO 00/62759. The agents can be administered using the casein formulation described in U.S. 20030206939 and WO 00/06108. The agents can be administered using the particulate formulations described in U.S. 20020034536. The agents, alone or in combination with other suitable components, can be administered by pulmonary route utilizing several techniques including but not limited to intratracheal instillation (delivery of solution into the lungs by syringe), intratracheal delivery of liposomes, insufflation (administration of powder formulation by syringe or any other similar device into the lungs) and aerosol inhalation. Aerosols (e.g., jet or ultrasonic nebulizers, metered-dose inhalers (MDIs), and dry-powder inhalers (DPIs)) can also be used in intranasal applications. Aerosol formulations are stable dispersions or suspensions of solid material and liquid droplets in a gaseous medium and can be placed into pressurized acceptable propellants, such as hydrofluroalkanes (HFAs, i.e. HFA-134a and HFA-227, or a mixture thereof), dichlorodifluoromethane (or other chlorofluocarbon propellants such as a mixture of Propellants 11, 12, and/or 114), propane, nitrogen, and the like. Pulmonary formulations may include permeation enhancers such as fatty acids, and saccharides, chelating agents, enzyme inhibitors (e.g., protease inhibitors), adjuvants (e.g., glycocholate, surfactin, span 85, and nafamostat), preservatives (e.g., benzalkonium chloride or chlorobutanol), and ethanol (normally up to 5% but possibly up to 20%, by weight). Ethanol is commonly included in aerosol compositions as it can improve the function of the metering valve and in some cases also improve the stability of the dispersion. Pulmonary formulations may also include surfactants which include but are not limited to bile salts and those described in U.S. Pat. No. 6,524,557 and references therein. The surfactants described in U.S. Pat. No. 6,524,557, e.g., a C8-C16 fatty acid salt, a bile salt, a phospholipid, or alkyl saccaride are advantageous in that some of them also reportedly enhance absorption of the peptide in the formulation. Also suitable in the invention are dry powder formulations comprising a therapeutically effective amount of active compound blended with an appropriate carrier and adapted for use in connection with a dry-powder inhaler. Absorption enhancers which can be added to dry powder formulations of the present invention include those described in U.S. Pat. No. 6,632,456. WO 02/080884 describes new methods for the surface modification of powders. Aerosol formulations may include U.S. Pat. No. 5,230,884, U.S. Pat. No. 5,292,499, WO 017/8694, WO 01/78696, U.S. 2003019437, U.S. 20030165436, and WO 96/40089 (which includes vegetable oil). Sustained release formulations suitable for inhalation are described in U.S. 20010036481A1, 20030232019A1, and U.S. 20040018243A1 as well as in WO 01/13891, WO 02/067902, WO 03/072080, and WO 03/079885. Pulmonary formulations containing microparticles are described in WO 03/015750, U.S. 20030008013, and WO 00/00176. Pulmonary formulations containing stable glassy state powder are described in U.S. 20020141945 and U.S. Pat. No. 6,309,671. Other aerosol formulations are desribed in EP 1338272A1 WO 90/09781, U.S. Pat. No. 5,348,730, U.S. Pat. No. 6,436,367, WO 91/04011, and U.S. Pat. No. 6,294,153 and U.S. Pat. No. 6,290,987 describes a liposomal based formulation that can be administered via aerosol or other means. Powder formulations for inhalation are described in U.S. 20030053960 and WO 01/60341. The agents can be administered intranasally as described in U.S. 20010038824. Solutions of medicament in buffered saline and similar vehicles are commonly employed to generate an aerosol in a nebulizer. Simple nebulizers operate on Bernoulli's principle and employ a stream of air or oxygen to generate the spray particles. More complex nebulizers employ ultrasound to create the spray particles. Both types are well known in the art and are described in standard textbooks of pharmacy such as Sprowls' American Pharmacy and Remington's The Science and Practice of Pharmacy. Other devices for generating aerosols employ compressed gases, usually hydrofluorocarbons and chlorofluorocarbons, which are mixed with the medicament and any necessary excipients in a pressurized container, these devices are likewise described in standard textbooks such as Sprowls and Remington. The agents can be a free acid or base, or a pharmacologically acceptable salt thereof. Solids can be dissolved or dispersed immediately prior to administration or earlier. In some circumstances the preparations include a preservative to prevent the growth of microorganisms. The pharmaceutical forms suitable for injection can include sterile aqueous or organic solutions or dispersions which include, e.g., water, an alcohol, an organic solvent, an oil or other solvent or dispersant (e.g., glycerol, propylene glycol, polyethylene glycol, and vegetable oils). The formulations may contain antioxidants, buffers, bacteriostats, and solutes that render the formulation isotonic with the blood of the intended recipient, and aqueous and non-aqueous sterile suspensions that can include suspending agents, solubilizers, thickening agents, stabilizers, and preservatives. Pharmaceutical agents can be sterilized by filter sterilization or by other suitable means. The agent can be fused to immunoglobulins or albumin, or incorporated into a lipsome to improve half-life. The agent can also be conjugated to polyethylene glycol (PEG) chains. Methods for pegylation and additional formulations containing PEG-conjugates (i.e. PEG-based hydrogels, PEG modified liposomes) can be found in Harris and Chess, Nature Reviews Drug Discovery 2: 214-221 and the references therein. The agent can be administered via a nanocochleate or cochleate delivery vehicle (BioDelivery Sciences International). The agents can be delivered transmucosally (i.e. across a mucosal surface such as the vagina, eye or nose) using formulations such as that described in U.S. Pat. No. 5,204,108. The agents can be formulated in microcapsules as described in WO 88/01165. The agent can be administered intra-orally using the formulations described in U.S. 20020055496, WO 00/47203, and U.S. Pat. No. 6,495,120. The agent can be delivered using nanoemulsion formulations described in WO 01/91728A2. Suitable pharmaceutical compositions in accordance with the invention will generally include an amount of the active compound(s) with an acceptable pharmaceutical diluent or excipient, such as a sterile aqueous solution, to give a range of final concentrations, depending on the intended use. The techniques of preparation are generally well known in the art, as exemplified by Remington's Pharmaceutical Sciences (18th Edition, Mack Publishing Company, 1995). The agents described herein and combination therapy agents can be packaged as a kit that includes single or multiple doses of two or more agents, each packaged or formulated individually, or single or multiple doses of two or more agents packaged or formulated in combination. Thus, one or more agents can be present in first container, and the kit can optionally include one or more agents in a second container. The container or containers are placed within a package, and the package can optionally include administration or dosage instructions. A kit can include additional components such as syringes or other means for administering the agents as well as diluents or other means for formulation. Methods to increase chemical and/or physical stability of the agents the described herein are found in U.S. Pat. No. 6,541,606, U.S. Pat. No. 6,068,850, U.S. Pat. No. 6,124,261, U.S. Pat. No. 5,904,935, and WO 00/15224, U.S. 20030069182 (via the additon of nicotinamide), U.S. 20030175230A1, U.S. 20030175230A1, U.S. 20030175239A1, U.S. 20020045582, U.S. 20010031726, WO 02/26248, WO 03/014304, WO 98/00152A1, WO 98/00157A1, WO 90/12029, WO 00/04880, and WO 91/04743, WO 97/04796 and the references cited therein. Methods to increase bioavailability of the agents described herein are found in U.S. Pat. No. 6,008,187, U.S. Pat. No. 5,424,289, U.S. 20030198619, WO 90/01329, WO 01/49268, WO 00/32172, and WO 02/064166. Glycyrrhizinate can also be used as an absorption enhancer (see, e.g., EP397447). WO 03/004062 discusses Ulex europaeus I (UEA1) and UEAI mimetics which may be used to target the agents of the invention to the GI tract. Analgesic Agents The peptides described herein can be used in combination therapy with an analgesic agent, e.g., an analgesic compound or an analgesic peptide. The analgesic agent can optionally be covalently attached to a peptide described herein. Among the useful analgesic agents are: Ca channel blockers, 5HT receptor antagonists (for example 5HT3, 5HT4 and 5HT1 receptor antagonists), opioid receptor agonists (loperamide, fedotozine, and fentanyl), NK1 receptor antagonists, CCK receptor agonists (e.g., loxiglumide), NK1 receptor antagonists, NK3 receptor antagonists, norepinephrine-serotonin reuptake inhibitors (NSRI), vanilloid and cannabanoid receptor agonists, and sialorphin. Analgesics agents in the various classes are described in the literature. Among the useful analgesic peptides are sialorphin-related peptides, including those comprising the amino acid sequence QHNPR (SEQ ID NO: 111), including: VQHNPR (SEQ ID NO:112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO:114); VRGPQHNPR (SEQ ID NO: 115); VRGPRQHNPR (SEQ ID NO: 116); VRGPRRQHNPR (SEQ ID NO: 117); and RQHNPR (SEQ ID NO: 118). Sialorphin-related peptides bind to neprilysin and inhibit neprilysin-mediated breakdown of substance P and Met-enkephalin. Thus, compounds or peptides that are inhibitors of neprilysin are useful analgesic agents which can be administered with the peptides of the invention in a co-therapy or linked to the peptides of the invention, e.g., by a covalent bond. Sialophin and related peptides are described in U.S. Pat. No. 6,589,750; U.S. 20030078200 A1; and WO 02/051435 A2. Opioid receptor antagonists and agonists can be administered with the peptides of the invention in co-therapy or linked to the peptide of the invention, e.g., by a covalent bond. For example, opioid receptor antagonists such as naloxone, naltrexone, methyl nalozone, nalmefene, cypridime, beta funaltrexamine, naloxonazine, naltrindole, and nor-binaltorphimine are thought to be useful in the treatment of IBS. It can be useful to formulate opioid antagonists of this type is a delayed and sustained release formulation such that initial release of the antagonist is in the mid to distal small intestine and/or ascending colon. Such antagonists are described in WO 01/32180 A2. Enkephalin pentapeptide (HOE825; Tyr-D-Lys-Gly-Phe-L-homoserine) is an agonist of the mu and delta opioid receptors and is thought to be useful for increasing intestinal motility (Eur. J. Pharm. 219:445, 1992), and this peptide can be used in conjunction with the peptides of the invention. Also useful is trimebutine which is thought to bind to mu/delta/kappa opioid receptors and activate release of motilin and modulate the release of gastrin, vasoactive intestinal peptide, gastrin and glucagons. Kappa opioid receptor agonists such as fedotozine, ketocyclazocine, and compounds described in WO 03/097051 A2 can be used with or linked to the peptides of the invention. In addition, mu opioid receptor agonists such as morphine, diphenyloxylate, frakefamide (H-Tyr-D-Ala-Phe(F)-Phe-NH2; WO 01/019849 A1) and loperamide can be used. Tyr-Arg (kyotorphin) is a dipeptide that acts by stimulating the release of met-enkephalins to elicit an analgesic effect (J. Biol. Chem. 262:8165, 1987). Kyotorphin can be used with or linked to the peptides of the invention. CCK receptor agonists such as caerulein from amphibians and other species are useful analgesic agents that can be used with or linked to the peptides of the invention. Conotoxin peptides represent a large class of analgesic peptides that act at voltage gated Ca channels, NMDA receptors or nicotinic receptors. These peptides can be used with or linked to the peptides of the invention. Peptide analogs of thymulin (FR 2830451) can have analgesic activity and can be used with or linked to the peptides of the invention. CCK (CCKa or CCKb) receptor antagonists, including loxiglumide and dexioxiglumide (the R-isomer of loxiglumide) (WO 88/05774) can have analgesic activity and can be used with or linked to the peptides of the invention. Other useful analgesic agents include 5-HT4 agonists such as tegaserod/zelnorm and lirexapride. Such agonists are described in: EP1321142 A1, WO 03/053432A1, EP 505322 A1, EP 505322 B1, U.S. Pat. No. 5,510,353, EP 507672 A1, EP 507672 B1, and U.S. Pat. No. 5,273,983. Calcium channel blockers such as ziconotide and related compounds described in, for example, EP 625162B1, U.S. Pat. No. 5,364,842, U.S. Pat. No. 5,587,454, U.S. Pat. No. 5,824,645, U.S. Pat. No. 5,859,186, U.S. Pat. No. 5,994,305, U.S. Pat. No. 6,087,091, U.S. Pat. No. 6,136,786, WO 93/13128 A1, EP 1336409 A1, EP 835126 A1, EP 835126 B1, U.S. Pat. No. 5,795,864, U.S. Pat. No. 5,891,849, U.S. Pat. No. 6,054,429, WO 97/01351 A1, can be used with or linked to the peptides of the invention. Various antagonists of the NK-1, NK-2, and NK-3 receptors (for a review see Giardina et al. 2003 Drugs 6:758) can be can be used with or linked to the peptides of the invention. NK1 receptor antagonists such as: aprepitant (Merck & Co Inc), vofopitant, ezlopitant (Pfizer, Inc.), R-673 (Hoffmann-La Roche Ltd), SR-14033 and related compounds described in, for example, EP 873753 A1, U.S. 20010006972 A1, U.S. 20030109417 A1, WO 01/52844 A1, can be used with or linked to the peptides of the invention. NK-2 receptor antagonists such as nepadutant (Menarini Ricerche SpA), saredutant (Sanofi-Synthelabo), SR-144190 (Sanofi-Synthelabo) and UK-290795 (Pfizer Inc) can be used with or linked to the peptides of the invention. NK3 receptor antagonists such as osanetant (Sanofi-Synthelabo), talnetant and related compounds described in, for example, WO 02/094187 A2, EP 876347 A1, WO 97/21680 A1, U.S. Pat. No. 6,277,862, WO 98/11090, WO 95/28418, WO 97/19927, and Boden et al. (J Med Chem. 39:1664-75, 1996) can be used with or linked to the peptides of the invention. Norepinephrine-serotonin reuptake inhibitors such as milnacipran and related compounds described in WO 03/077897 A1 can be used with or linked to the peptides of the invention. Vanilloid receptor antagonists such as arvanil and related compounds described in WO 01/64212 A1 can be used with or linked to the peptides of the invention. Where the analgesic is a peptide and is covalently linked to a peptide described herein the resulting peptide may also include at least one trypsin or chymotrypsin cleavage site. When present within the peptide, the analgesic peptide may be preceded by (if it is at the carboxy terminus) or followed by (if it is at the amino terminus) a chymotrypsin or trypsin cleavage site that allows release of the analgesic peptide. In addition to sialorphin-related peptides, analgesic peptides include: AspPhe, endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, zicnotide, and substance P. Methods of Treatment The peptides of the invention can be used for the treatment or prevention of cancer, pre-cancerous growths, or metastatic growths. For example, they can be used for the prevention or treatment of: colorectal/local metastasized colorectal cancer, gastrointestinal tract cancer, lung cancer, cancer or pre-cancerous growths or metastatic growths of epithelial cells, polyps, breast, colorectal, lung, ovarian, pancreatic, prostatic, renal, stomach, bladder, liver, esophageal and testicular carcinoma, carcinoma (e.g., basal cell, basosquamous, Brown-Pearce, ductal carcinoma, Ehrlich tumor, Krebs, Merkel cell, small or non-small cell lung, oat cell, papillary, bronchiolar, squamous cell, transitional cell, Walker), leukemia (e.g., B-cell, T-cell, HTLV, acute or chronic lymphocytic, mast cell, myeloid), histiocytonia, histiocytosis, Hodgkin's disease, non-Hodgkin's lymphoma, plasmacytoma, reticuloendotheliosis, adenoma, adeno-carcinoma, adenofibroma, adenolymphoma, ameloblastoma, angiokeratoma, angiolymphoid hyperplasia with eosinophilia, sclerosing angioma, angiomatosis, apudoma, branchionia, malignant carcinoid syndrome, carcinoid heart disease, carcinosarcoma, cementoma, cholangioma, cholesteatoma, chondrosarcoma, chondroblastoma, chondrosarcoma, chordoma, choristoma, craniopharyngioma, chrondroma, cylindroma, cystadenocarcinoma, cystadenoma, cystosarconia phyllodes, dysgenninoma, ependymoma, Ewing sarcoma, fibroma, fibrosarcoma, giant cell tumor, ganglioneuroma, glioblastoma, glomangioma, granulosa cell tumor, gynandroblastoma, hamartoma, hemangioendothelioma, hemangioma, hemangio-pericytoma, hemangiosarcoma, hepatoma, islet cell tumor, Kaposi sarcoma, leiomyoma, leiomyosarcoma, leukosarcoma, Leydig cell tumor, lipoma, liposarcoma, lymphaugioma, lymphangiomyoma, lymphangiosarcoma, medulloblastoma, meningioma, mesenchymoma, mesonephroma, mesothelioma, myoblastoma, myoma, myosarcoma, myxoma, myxosarcoma, neurilemmoma, neuroma, neuroblastoma, neuroepithelioma, neurofibroma, neurofibromatosis, odontoma, osteoma, osteosarcoma, papilloma, paraganglioma, paraganglionia nonchroinaffin, pinealoma, rhabdomyoma, rhabdomyosarcoma, Sertoli cell tumor, teratoma, theca cell tumor, and other diseases in which cells have become dysplastic, immortalized, or transformed. The peptides of the invention can be used for the treatment or prevention of: Familial Adenomatous Polyposis (FAP) (autosomal dominant syndrome) that precedes colon cancer, hereditary nonpolyposis colorectal cancer (HNPCC), and inherited autosomal dominant syndrome. For treatment or prevention of cancer, pre-cancerous growths and metastatic growths, the peptides can be used in combination therapy with radiation or chemotherapeutic agents, an inhibitor of a cGMP-dependent phosphodiesterase or a selective cyclooxygenase-2 inhibitor (a number of selective cyclooxygenase-2 inhibitors are described in WO02062369, hereby incorporated by reference). The peptides can be for treatment or prevention of inflammation. Thus, they can be used alone or in combination with inhibitor of cGMP-dependent phosphodiesterase or a selective cyclooxygenase-2 inhibitor for treatment of: organ inflammation, IBD (e.g, Crohn's disease, ulcerative colitis), asthma, nephritis, hepatitis, pancreatitis, bronchitis, cystic fibrosis, ischemic bowel diseases, intestinal inflammations/allergies, coeliac disease, proctitis, eosnophilic gastroenteritis, mastocytosis, and other inflammatory disorders. The peptides can also be used to treat or prevent insulin-related disorders, for example: II diabetes mellitus, hyperglycemia, obesity, disorders associated with disturbances in glucose or electrolyte transport and insulin secretion in cells, or endocrine disorders. They can be also used in insulin resistance treatment and post-surgical and non-post surgery decrease in insulin responsiveness. The peptides can be used to prevent or treat respiratory disorders, including, inhalation, ventilation and mucus secretion disorders, pulmonary hypertension, chronic obstruction of vessels and airways, and irreversible obstructions of vessels and bronchi. The peptides can be used in combination therapy with a phosphodiesterase inhibitor (examples of such inhibitors can be found in U.S. Pat. No. 6,333,354, hereby incorporated by reference). The peptides can also be used to prevent or treat: retinopathy, nephropathy, diabetic angiopathy, and edema formation The peptides can also be used to prevent or treat neurological disorders, for example, headache, anxiety, movement disorders, aggression, psychosis, seizures, panic attacks, hysteria, sleep disorders, depression, schizoaffective disorders, sleep apnea, attention deficit syndromes, memory loss, and narcolepsy. They may also be used as a sedative. The peptides and detectabley labeled peptides can be used as markers to identify, detect, stage, or diagnosis diseases and conditions of the small intestine, including: Crohn's disease, colitis, inflammatory bowel disease, tumors, benign tumors, such as benign stromal tumors, adenoma, angioma, adenomatous (pedunculated and sessile) polyps, malignant, carcinoid tumors, endocrine cell tumors, lymphoma, adenocarcinoma, foregut, midgut, and hindgut carcinoma, gastroinstestinal stromal tumor (GIST), such as leiomyoma, cellular leiomyoma, leiomyoblastoma, and leiomyosarcoma, gastrointestinal autonomic nerve tumor, malabsorption syndromes, celiac diseases, diverticulosis, Meckel's diverticulum, colonic diverticula, megacolon, Hirschsprung's disease, irritable bowel syndrome, mesenteric ischemia, ischemic colitis, colorectal cancer, colonic polyposis, polyp syndrome, intestinal adenocarcinoma, Liddle syndrome, Brody myopathy, infantile convulsions, and choreoathetosis The peptides can be conjugated to another molecule (e.g, a diagnostic or therapeutic molecule) to target cells bearing the GCC receptor, e.g., cystic fibrosis lesions and specific cells lining the intestinal tract. Thus, they can be used to target radioactive moieties or therapeutic moieties to the intestine to aid in imaging and diagnosing or treating colorectal/metastasized or local colorectal cancer and to deliver normal copies of the p53 tumor suppressor gene to the intestinal tract. The peptides can be used alone or in combination therapy to treat erectile dysfunction. The peptides can be used alone or in combination therapy to treat inner ear disorders, e.g., to treat Meniere's disease, including symptoms of the disease such as vertigo, hearing loss, tinnitus, sensation of fullness in the ear, and to maintain fluid homeostasis in the inner ear. The peptides can be used alone or in combination therapy to treat disorders associated with fluid and sodium retention, e.g., diseases of the electrolyte-water/electrolyte transport system within the kidney, gut and urogenital system, congestive heart failure, hypertension, hypotension, liver cirrhosis, and nephrotic syndrome. In addition they can be used to facilitate diuresis or control intestinal fluid. The peptides can be used alone or in combination therapy to treat disorders associated with chloride or bicarbonate secretion, e.g., Cystic Fibrosis. The peptides can be used alone or in combination therapy to treat disorders associated with bile secretion. In addition, they can be used to facilitate or control chloride and bile fluid secretion in the gall bladder. The peptides can be used alone or in combination therapy to treat disorders associated with liver cell regeneration.
<SOH> BACKGROUND <EOH>Irritable bowel syndrome (IBS) is a common chronic disorder of the intestine that affects 20 to 60 million individuals in the US alone (Lehman Brothers, Global Healthcare-Irritable bowel syndrome industry update, September 1999). IBS is the most common disorder diagnosed by gastroenterologists (28% of patients examined) and accounts for 12% of visits to primary care physicians (Camilleri 2001, Gastroenterology 120:652-668). In the US, the economic impact of IBS is estimated at $25 billion annually, through direct costs of health care use and indirect costs of absenteeism from work (Talley 1995, Gastroenterology 109:1736-1741). Patients with IBS have three times more absenteeism from work and report a reduced quality of life. Sufferers may be unable or unwilling to attend social events, maintain employment, or travel even short distances (Drossman 1993, Dig Dis Sci 38:1569-1580). There is a tremendous unmet medical need in this population since few prescription options exist to treat IBS. Patients with IBS suffer from abdominal pain and a disturbed bowel pattern. Three subgroups of IBS patients have been defined based on the predominant bowel habit: constipation-predominant (c-IBS), diarrhea-predominant (d-IBS) or alternating between the two (a-IBS). Estimates of individuals who suffer from c-IBS range from 20-50% of the IBS patients with 30% frequently cited. In contrast to the other two subgroups that have a similar gender ratio, c-IBS is more common in women (ratio of 3:1) (Talley et al. 1995, Am J Epidemiol 142:76-83). The definition and diagnostic criteria for IBS have been formalized in the “Rome Criteria” (Drossman et al. 1999, Gut 45:Suppl II: 1-81), which are well accepted in clinical practice. However, the complexity of symptoms has not been explained by anatomical abnormalities or metabolic changes. This has led to the classification of IBS as a functional GI disorder, which is diagnosed on the basis of the Rome criteria and limited evaluation to exclude organic disease (Ringel et al. 2001, Annu Rev Med 52: 319-338). IBS is considered to be a “biopsychosocial” disorder resulting from a combination of three interacting mechanisms: altered bowel motility, an increased sensitivity of the intestine or colon to pain stimuli (visceral sensitivity) and psychosocial factors (Camilleri 2001, Gastroenterology 120:652-668). Recently, there has been increasing evidence for a role of inflammation in etiology of IBS. Reports indicate that subsets of IBS patients have small but significant increases in colonic inflammatory and mast cells, increased inducible nitric oxide (NO) and synthase (iNOS) and altered expression of inflammatory cytokines (reviewed by Talley 2000, Medscape Coverage of DDW week).
<SOH> SUMMARY <EOH>The present invention features compositions and related methods for treating IBS and other gastrointestinal disorders and conditions (e.g., gastrointestinal motility disorders, functional gastrointestinal disorders, gastroesophageal reflux disease (GERD), Crohn's disease, ulcerative colitis, Inflammatory bowel disease, functional heartburn, dyspepsia (including functional dyspepsia or nonulcer dyspepsia), gastroparesis, chronic intestinal pseudo-obstruction (or colonic pseudo-obstruction), and disorders and conditions associated with constipation, e.g., constipation associated with use of opiate pain killers, post-surgical constipation, and constipation associated with neuropathic disorders as well as other conditions and disorders. The compositions feature peptides that activate the guanylate cyclase C (GC-C) receptor. The present invention also features compositions and related methods for treating obesity, congestive heart failure and benign prostatic hyperplasia (BPH). Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are useful because they can increase gastrointestinal motility. Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are useful, in part, because they can decrease inflammation. Without being bound by any particular theory, in the case of IBS and other gastrointestinal disorders the peptides are also useful because they can decrease gastrointestinal pain or visceral pain. The invention features pharmaceutical compositions comprising certain peptides that are capable of activating the guanylate-cyclase C (GC-C) receptor. Also within the invention are pharmaceutical compositions comprising a peptide of the invention as well as combination compositions comprising a peptide of the invention and a second therapeutic agent, e.g., an agent for treating constipation (e.g., a chloride channel activator such as SPI-0211; Sucampo Pharmaceuticals, Inc.; Bethesda, Md., a laxative such as MiraLax; Braintree Laboratories, Braintree Mass.) or some other gastrointestinal disorder. Examples of a second therapeutic agent include: acid reducing agents such as proton pump inhibitors (e.g. omeprazole, esomeprazole, lansoprazole, pantorazole and rabeprazole) and H2 receptor blockers (e.g. cimetidine, ranitidine, famotidine and nizatidine), pro-motility agents such as motilin agonists (e.g GM-611 or mitemcinal fumarate), and 5HT receptor agonists (e.g. 5HT4 receptor agonists such as Zelnorm®; 5HT3 receptor agonists such as MKC-733), 5HT receptor antagonists (e.g 5HT1, 5HT2, 5HT3 (e.g alosetron), and 5HT4 receptor antagonists; muscarinic receptor agonists, anti-inflammatory agents, antispasmodics, antidepressants, centrally-acting analgesic agents such as opiod receptor agonists, opiod receptor antagonists (e.g. naltrexone), agents for the treatment of Inflammatory bowel disease, Crohn's disease and ulcerative colitis (e.g., Traficet-EN™ (ChemoCentryx, Inc.; San Carlos, Calif.) agents that treat gastrointestinal or visceral pain and cGMP phosphodiesterase inhibitors (motapizone, zaprinast, and suldinac sulfone). The peptides of the invention can also be used in combination with agents such a tianeptine (Stablon®) and other agents described in U.S. Pat. No. 6,683,072; (E)-4 (1,3bis(cyclohexylmethyl)-1,2,34,-tetrahydro-2,6-diono-9H-purin-8-yl)cinnamic acid nonaethylene glycol methyl ether ester and related compounds described in WO 02/067942. The peptides can also be used in combination with treatments entailing the administration of microorganisms useful in the treatment of gastrointestinal disorders such as IBS. Probactrix® (The BioBalance Corporation; New York, N.Y.) is one example of a formulation that contains microorganisms useful in the treatment of gastrointestinal disorders. In addition, the pharmaceutical compositions can include an (OK) agent selected from the group consisting of: Ca channel blockers (e.g., ziconotide), 5HT receptor agonists (e.g 5HT1, 5HT2, 5HT3 and 5HT4 receptor agonists) 5HT receptor antagonists (e.g 5HT1, 5HT2, 5HT3 and 5HT4), opioid receptor agonists (e.g., loperamide, fedotozine, and fentanyl, naloxone, naltrexone, methyl nalozone, nalmefene, cypridime, beta funaltrexamine, naloxonazine, naltrindole, and nor-binaltorphimine, morphine, diphenyloxylate, enkephalin pentapeptide, and trimebutine), NK1 receptor antagonists (e.g., ezlopitant and SR-14033, SSR-241585), CCK receptor agonists (e.g., loxiglumide), NK1 receptor antagonists, NK3 receptor antagonists (e.g., talnetant, osanetant SR-142801, SSR-241585), norepinephrine-serotonin reuptake inhibitors (NSR1; e.g., milnacipran), vanilloid and cannabanoid receptor agonists (e.g., arvanil), sialorphin, sialorphin-related peptides comprising the amino acid sequence QHNPR (SEQ ID NO: 111) for example, VQHNPR (SEQ ID NO: 112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO: 114); VRGPQHNPR (SEQ ID NO:115); VRGPRQHNPR (SEQ ID NO: 116); VRGPRRQHNPR (SEQ ID NO: 117); and RQHNPR (SEQ ID NO: 118), compounds or peptides that are inhibitors of neprilysin, frakefamide (H-Tyr-D-Ala-Phe(F)-Phe-NH 2 ; WO 01/019849 A1), loperamide, Tyr-Arg (kyotorphin), CCK receptor agonists (caerulein), conotoxin peptides, peptide analogs of thymulin, loxiglumide, dexloxiglumide (the R-isomer of loxiglumide) (WO 88/05774) and other analgesic peptides or compounds can be used with or linked to the peptides of the invention. The invention includes methods for treating various gastrointestinal disorders by administering a peptide that acts as a partial or complete agonist of the GC-C receptor. The peptide includes at least six cysteines that form three disulfide bonds. In certain embodiments the disulfide bonds are replaced by other covalent cross-links and in some cases the cysteines are substituted by other residues to provide for alternative covalent cross-links. The peptides may also include at least one trypsin or chymotrypsin cleavage site and/or a carboxy-terminal analgesic peptide or small molecule, e.g., AspPhe or some other analgesic peptide. When present within the peptide, the analgesic peptide or small molecule may be preceded by a chymotrypsin or trypsin cleavage site that allows release of the analgesic peptide or small molecule. The peptides and methods of the invention are also useful for treating pain and inflammation associated with various disorders, including gastrointestinal disorders. Certain peptides include a functional chymotrypsin or trypsin cleavage site located so as to allow inactivation of the peptide upon cleavage. Certain peptides having a functional cleavage site undergo cleavage and gradual inactivation in the digestive tract, and this is desirable in some circumstances. In certain peptides, a functional chymotrypsin site is altered, increasing the stability of the peptide in vivo. The invention includes methods for treating other disorders such as congestive heart failure and benign prostatic hyperplasia by administering a peptide or small molecule (parenterally or orally) that acts as an agonist of the GC-C receptor. Such agents can be used in combination with natriuretic peptides (e.g., atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. The invention features methods and compositions for increasing intestinal motility. Intestinal motility involves spontaneous coordinated dissentions and contractions of the stomach, intestines, colon and rectum to move food through the gastrointestinal tract during the digestive process. In certain embodiments the peptides include either one or two or more contiguous negatively charged amino acids (e.g., Asp or Glu) or one or two or more contiguous positively charged residues (e.g., Lys or Arg) or one or two or more contiguous positively or negatively charged amino acids at the carboxy terminus. In these embodiments all of the flanking amino acids at the carboxy terminus are either positively or negatively charged. In other embodiments the carboxy terminal charged amino acids are preceded by a Leu. For example, the following amino acid sequences can be added to the carboxy terminus of the peptide: Asp; Asp Lys; Lys Lys Lys Lys Lys Lys(SEQ ID NO:123); Asp Lys Lys Lys Lys Lys Lys (SEQ ID NO: 124); Leu Lys Lys; and Leu Asp. It is also possible to simply add Leu at the carboxy terminus. In a first aspect, the invention features a peptide comprising, consisting of, or consisting essentially of the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:119) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing. In certain embodiments Xaa 8 , Xaa 9 , Xaa 12 , Xaa 13 , Xaa 14 , Xaa 17 , and Xaa 19 can be any amino acid. In certain embodiments Xaa 5 is Asn, Trp, Tyr, Asp, or Phe. In other embodiments, Xaa 5 can also be Thr or Ile. In other embodiments Xaa 5 is Tyr, Asp or Trp. In some embodiments Xaa 8 is Glu, Asp, Gln, Gly or Pro. In other embodiments Xaa 8 is Glu; in some embodiments Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe in some embodiments Xaa 9 is Leu, Ile, Val, Lys, Arg, Trp, Tyr or Phe. In certain embodiments, the peptide includes disulfide bonds between Cys 6 and Cys 11 , between Cys 7 and Cys 15 and between Cys 10 and Cys 16 . In other embodiments, the peptide is a reduced peptide having no disulfide bonds. In still other embodiments the peptide has one or two disulfide bonds selected from the group consisting of: a disulfide bond between Cys 6 and Cys 11 , a disulfide bond between Cys 7 and Cys 15 and a disulfide bond between Cys 10 and CYS 16 . In certain embodiments, an amino acid can be replaced by a non-naturally occurring amino acid or a naturally or non-naturally occurring amino acid analog. For example, an aromatic amino acid can be replaced by 3,4-dihydroxy-L-phenylalanine, 3-iodo-L-tyrosine, triiodothyronine, L-thyroxine, phenylglycine (Phg) or nor-tyrosine (norTyr). Phg and norTyr and other amino acids including Phe and Tyr can be substituted by, e.g., a halogen, —CH 3 , —OH, —CH 2 NH 3 , —C(O)H, —CH 2 CH 3 , —CN, —CH 2 CH 2 CH 3 , —SH, or another group. Further examples of unnatural amino acids include: an unnatural analogue of tyrosine; an unnatural analogue of glutamine; an unnatural analogue of phenylalanine; an unnatural analogue of serine; an unnatural analogue of threonine; an alkyl, aryl, acyl, azido, cyano, halo, hydrazine, hydrazide, hydroxyl, alkenyl, alkynl, ether, thiol, sulfonyl, seleno, ester, thioacid, borate, boronate, phospho, phosphono, phosphine, heterocyclic, enone, imine, aldehyde, hydroxylamine, keto, or amino substituted amino acid, or any combination thereof; an amino acid with a photoactivatable cross-linker; a spin-labeled amino acid; a fluorescent amino acid; an amino acid with a novel functional group; an amino acid that covalently or noncovalently interacts with another molecule; a metal binding amino acid; a metal-containing amino acid; a radioactive amino acid; a photocaged and/or photoisomerizable amino acid; a biotin or biotin-analogue containing amino acid; a glycosylated or carbohydrate modified amino acid; a keto containing amino acid; amino acids comprising polyethylene glycol or polyether; a heavy atom substituted amino acid (e.g., an amino acid containing deuterium, tritium, 13 C, 15 N, or 18 O); a chemically cleavable or photocleavable amino acid; an amino acid with an elongated side chain; an amino acid containing a toxic group; a sugar substituted amino acid, e.g., a sugar substituted serine or the like; a carbon-linked sugar-containing amino acid; a redox-active amino acid; an α.-hydroxy containing acid; an amino thio acid containing amino acid; an α, α disubstituted amino acid; a β-amino acid; a cyclic amino acid other than proline; an O-methyl-L-tyrosine; an L-3-(2-naphthyl)alanine; a 3-methyl-phenylalanine; a p-acetyl-L-phenylalanine; an 0-4-allyl-L-tyrosine; a 4-propyl-L-tyrosine; a tri-O-acetyl-GlcNAcβ-serine; an L-Dopa; a fluorinated phenylalanine; an isopropyl-L-phenylalanine; a p-azido-L-phenylalanine; a p-acyl-L-phenylalanine; a p-benzoyl-L-phenylalanine; an L-phosphoserine; a phosphonoserine; a phosphonotyrosine; a p-iodo-phenylalanine; a 4-fluorophenylglycine; a p-bromophenylalanine; a p-amino-L-phenylalanine; a isopropyl-L-phenylalanine; L-3-(2-naphthyl)alanine; an amino-, isopropyl-, or O-allyl-containing phenylalanine analogue; a dopa, O-methyl-L-tyrosine; a glycosylated amino acid; a p-(propargyloxy)phenylalanine, dimethyl-Lysine, hydroxy-proline, mercaptopropionic acid, methyl-lysine, 3-nitro-tyrosine, norleucine, pyro-glutamic acid, Z (Carbobenzoxyl), ε-Acetyl-Lysine, β-alanine, aminobenzoyl derivative, aminobutyric acid (Abu), citrulline, aminohexanoic acid, aminoisobutyric acid, cyclohexylalanine, d-cyclohexylalanine, hydroxyproline, nitro-arginine, nitro-phenylalanine, nitro-tyrosine, norvaline, octahydroindole carboxylate, omithine, penicillamine, tetrahydroisoquinoline, acetamidomethyl protected amino acids and a pegylated amino acid. Further examples of unnatural amino acids can be found in U.S. 20030108885, U.S. 20030082575, and the references cited therein. Methods to manfacture peptides containing unnatural amino acids can be found in, for example, U.S. 20030108885, U.S. 20030082575, Deiters et al., J Am Chem Soc. (2003) 125:11782-3, Chin et al., Science (2003) 301:964-7, and the references cited therein. The peptides of the invention can be modified using standard modifications. Modifications may occur at the amino (N—), carboxy (C—) terminus, internally or a combination of any of the preceeding. In one aspect of the invention, there may be more than one type of modification on the peptide. Modifications include but are not limited to: acetylation, amidation, biotinylation, cinnamoylation, farnesylation, formylation, myristoylation, palmitoylation, phosphorylation (Ser, Tyr or Thr), stearoylation, succinylation, sulfurylation and cyclisation (via disulfide bridges or amide cyclisation), and modification by Cy3 or Cy5. The peptides of the invention may also be modified by 2, 4-dinitrophenyl (DNP), DNP-lysin, modification by 7-Amino-4-methyl-coumarin (AMC), flourescein, NBD (7-Nitrobenz-2-Oxa-1,3-Diazole), p-nitro-anilide, rhodamine B, EDANS (5-((2-aminoethyl)amino)naphthalene-1-sulfonic acid), dabcyl, dabsyl, dansyl, texas red, FMOC, and Tamra (Tetramethylrhodamine). The peptides of the invention may also be conjugated to, for example, BSA or KLH (Keyhole Limpet Hemocyanin). In some embodiments Xaa 12 is Asn, Tyr, Asp or Ala. In other embodiments Xaa 12 is Asn. In some embodiments Xaa 13 is Ala, Pro or Gly, and in other embodiments it is Pro. In some embodiments Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, or Asp, and in other embodiments it is Ala or Gly, and in still other embodiments it is Ala. In some embodiments Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is selected from Trp, Tyr, Phe, Asn and Leu or Xaa 19 is selected from Trp, Tyr, and Phe or Xaa 19 is selected from Leu, Ile and Val; or Xaa 19 is His or Xaa 19 is selected from Trp, Tyr, Phe, Asn, Ile, Val, His and Leu; and Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaalg Xaa 20 Xaa 21 is missing. The invention also features methods for treating a gastrointestinal disorder (e.g., a gastrointestinal motility disorder, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction), obesity, congestive heart failure or benign prostatic hyperplasia by administering a composition comprising an aforementioned peptide When Xaa 9 is Trp, Tyr or Phe or when Xaa 16 is Trp the peptide has a potentially functional chymotrypsin cleavage site that is located at a position where cleavage will inactivate GC-C receptor binding by the peptide. When Xaa 9 is Lys or Arg or when Xaa 16 is Lys or Arg, the peptide has a potentially functional trypsin cleavage site that is located at a position where cleavage will inactivate GC-C receptor binding by the peptide. When Xaa 19 is Trp, Tyr or Phe, the peptide has a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide carboxy-terminal to Xaa 19 . When Xaa 19 is Leu, Ile or Val, the peptide can have a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa 19 . At relatively high pH the same effect is seen when Xaa 19 is His. When Xaa 19 is Lys or Arg, the peptide has a trypsin cleavage site that is located at a position where cleavage will liberate portion of the peptide carboxy-terminal to Xaa 19 . Thus, if the peptide includes an analgesic peptide carboxy-terminal to Xaa 19 , the peptide will be liberated in the digestive tract upon exposure to the appropriate protease. Among the analgesic peptides which can be included in the peptide are: AspPhe (as Xaa 20 Xaa 21 ), endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance P and other analgesic peptides described herein. These peptides can, for example, be used to replace Xaa 20 Xaa 21 . When Xaa 1 or the amino-terminal amino acid of the peptide of the invention (e.g., Xaa 2 or Xaa 3 ) is Trp, Tyr or Phe, the peptide has a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa 1 (or Xaa 2 or Xaa 3 ) along with Xaa 1 , Xaa 2 or Xaa 3 . When Xaa 1 or the amino-terminal amino acid of the peptide of the invention (e.g., Xaa 2 or Xaa 3 ) is Lys or Arg, the peptide has a trypsin cleavage site that is located at a position where cleavage will liberate portion of the peptide amino-terminal to Xaa 1 along with Xaa 1 , Xaa 2 or Xaa 3 ). When Xaa 1 or the amino-terminal amino acid of the peptide of the invention is Leu, Ile or Val, the peptide can have a chymotrypsin cleavage site that is located at a position where cleavage will liberate the portion of the peptide amino-terminal to Xaa 1 . At relatively high pH the same effect is seen when Xaa 1 is His. Thus, for example, if the peptide includes an analgesic peptide amino-terminal to Xaa 1 , the peptide will be liberated in the digestive tract upon exposure to the appropriate protease. Among the analgesic peptides which can be included in the peptide are: AspPhe, endomorphin-1, endomorphin-2, nocistatin, dalargin, lupron, and substance p and other analgesic peptides described herein. When fully folded, disulfide bonds are present between: Cys 6 and Cys 11 ; Cys 7 and Cys 15 ; and Cys 10 and Cys 18 . The peptides of the invention bear some sequence similarity to ST peptides. However, they include amino acid changes and/or additions that improve functionality. These changes can, for example, increase or decrease activity (e.g., increase or decrease the ability of the peptide to stimulate intestinal motility), alter the ability of the peptide to fold correctly, the stability of the peptide, the ability of the peptide to bind the GC-C receptor and/or decrease toxicity. In some cases the peptides may function more desirably than wild-type ST peptide. For example, they may limit undesirable side effects such as diarrhea and dehydration. In some embodiments one or both members of one or more pairs of Cys residues which normally form a disulfide bond can be replaced by homocysteine, 3-mercaptoproline (Kolodziej et al. 1996 Int J Pept Protein Res 48:274); β, β dimethylcysteine (Hunt et al. 1993 Int J Pept Protein Res 42:249) or diaminopropionic acid (Smith et al. 1978 J Med Chem 21:117) to form alternative internal cross-links at the positions of the normal disulfide bonds. In addition, one or more disulfide bonds can be replaced by alternative covalent cross-links, e.g., an amide bond, an ester linkage, an alkyl linkage, a thio ester linkage, a lactam bridge, a carbamoyl linkage, a urea linkage, a thiourea linkage, a phosphonate ester linkage, an alkyl linkage, and alkenyl linkage, an ether, a thioether linkage, or an amino linkage. For example, Ledu et al. (Proceedings Nat'l Acad. Sci. 100:11263-78, 2003) described methods for preparing lactam and amide cross-links. Schafineister et al. (J. Am. Chem. Soc. 122:5891, 2000) describes stable, all carbon cross-links. In some cases, the generation of such alternative cross-links requires replacing the Cys residues with other residues such as Lys or Glu or non-naturally occurring amino acids. In the case of a peptide comprising the sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing and/or the sequence Xaa 19 Xaa 20 Xaa 21 is missing, the peptide can still contain additional carboxyterminal or amino terminal amino acids or both. For example, the peptide can include an amino terminal sequence that facilitates recombinant production of the peptide and is cleaved prior to administration of the peptide to a patient. The peptide can also include other amino terminal or carboxyterminal amino acids. In some cases the additional amino acids protect the peptide, stabilize the peptide or alter the activity of the peptide. In some cases some or all of these additional amino acids are removed prior to administration of the peptide to a patient. The peptide can include 1, 2, 3, 4, 5, 10, 15, 20, 25, 30, 40, 50, 60, 70 80, 90, 100 or more amino acids at its amino terminus or carboxy terminus or both. The number of flanking amino acids need not be the same. For example, there can be 10 additional amino acids at the amino terminus of the peptide and none at the carboxy terminus. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 144) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing. Where Xaa 20 Xaa 21 and/or Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 are missing, there may be additional flanking amino acids in some embodiments. In certain embodiments, the peptide does not consist of any of the peptides of Table I In a second aspect, the invention also features a therapeutic or prophylactic method comprising administering a peptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 145)_wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In certain embodiments of the therapeutic or prophylactic methods: the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 146) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr, or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp or Xaa 16 is any amino acid or Xaa 16 is Thr, Ala, Lys, Arg, Trp or Xaa 16 is any non-aromatic amino acid; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing. In certain embodiments, the invention features, a purified polypeptide comprising the amino acid sequence (II): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Asn 12 Pro 13 Ala 14 Cys 15 Xaa 16 Gly 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 120) wherein Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn; Xaa 8 is Glu or Asp; Xaa 9 is Leu, Ile, Val, Trp, Tyr or Phe; Xaa 16 is Thr, Ala, Trp; Xaa 19 is Trp, Tyr, Phe or Leu or is missing; and Xaa 20 Xaa 21 is AspPhe. In various preferred embodiments the invention features a purified polypeptide comprising the amino acid sequence (II): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Asn 12 Pro 13 Ala 14 Cys 15 Xaa 16 Gly 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:149) wherein, Xaa 9 is Leu, Ile or Val and Xaa 16 is Trp, Tyr or Phe; Xaa 9 is Trp, Tyr or Phe, and Xaa 16 is Thr or Ala; Xaa 19 is Trp, Tyr, Phe and Xaa 20 Xaa 21 is AspPhe; and Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn; the peptide comprises fewer than 50, 40, 30 or 25 amino acids; fewer than five amino acid precede Cys 6 . The peptides can be co-administered with or linked, e.g., covalently linked to any of a variety of other peptides including analgesic peptides or analgesic compounds. For example, a therapeutic peptide of the invention can be linked to an analgesic agent selected from the group consisting of: Ca channel blockers (e.g., ziconotide), complete or partial 5HT receptor antagonists (for example 5HT3 (e.g. alosetron, ATI-7000; Aryx Thearpeutics, Santa Clara Calif.), 5HT4 and 5HT1 receptor antagonists), complete or partial 5HT receptor agonists including 5HT3, 5HT4 (e.g. tegaserod, mosapride and renzapride) and 5HT1 receptor agonists, CRF receptor agonists (NBI-34041), β-3 adrenoreceptor agonists, opioid receptor agonists (e.g., loperamide, fedotozine, and fentanyl, naloxone, naltrexone, methyl nalozone, nalmefene, cypridime, beta funaltrexamine, naloxonazine, naltrindole, and nor-binaltorphimine, morphine, diphenyloxylate, enkephalin pentapeptide, asimadoline, and trimebutine), NK1 receptor antagonists (e.g., ezlopitant and SR-14033), CCK receptor agonists (e.g., loxiglumide), NK1 receptor antagonists, NK3 receptor antagonists (e.g., talnetant, osanetant (SR-142801), SSR-241586), norepinephrine-serotonin reuptake inhibitors (NSR1; e.g., milnacipran), opiod receptor antagonists (e.g. naltrexone) vanilloid and cannabanoid receptor agonists (e.g., arvanil), sialorphin, sialorphin-related peptides comprising the amino acid sequence QHNPR (SEQ ID NO:111) for example, VQHNPR (SEQ ID NO:112); VRQHNPR (SEQ ID NO:113); VRGQHNPR (SEQ ID NO:114); VRGPQHNPR (SEQ ID NO:115); VRGPRQHNPR (SEQ ID NO:116); VRGPRRQHNPR (SEQ ID NO:117); and RQHNPR (SEQ ID NO:118), compounds or peptides that are inhibitors of neprilysin, frakefamide (H-Tyr-D-Ala-Phe(F)-Phe-NH 2 ; WO 01/019849 A1), loperamide, Tyr-Arg (kyotorphin), CCK receptor agonists (caerulein), conotoxin peptides, pepetide analogs of thymulin, loxiglumide, dexloxiglumide (the R-isomer of loxiglumide) (WO 88/05774) and other analgesic peptides or compounds can be used with or linked to the peptides of the invention. Amino acid, non-amino acid, peptide and non-peptide spacers can be interposed between a peptide that is a GC-C receptor agonsit and a peptide that has some other biological function, e.g., an analgesic peptide or a peptide used to treat obesity. The linker can be one that is cleaved from the flanking peptides in vivo or one that remains linked to the flanking peptides in vivo. For example, glycine, beta-alanine, glycyl-glycine, glycyl-beta-alanine, gamma-aminobutyric acid, 6-aminocaproic acid, L-phenylalanine, L-tryptophan and glycil-L-valil-L-phenylalanine can be used as a spacer (Chaltin et al. 2003 Helvetica Chimica Acta 86:533-547; Caliceti et al. 1993 FARMCO 48:919-32) as can polyethylene glycols (Butterworth et al. 1987 J. Med. Chem 30:1295-302) and maleimide derivatives (King et al. 2002 Tetrahedron Lett. 43:1987-1990). Various other linkers are described in the literature (Nestler 1996 Molecular Diversity 2:35-42; Finn et al. 1984 Biochemistry 23:2554-8; Cook et al. 1994 Tetrahedron Lett. 35:6777-80; Brokx et al. 2002 Journal of Controlled Release 78:115-123; Griffin et al. 2003 J. Am. Chem. Soc. 125:6517-6531; Robinson et al. 1998 Proc. Natl. Acad. Sci. USA 95:5929-5934. The peptides can include the amino acid sequence of a peptide that occurs naturally in a vertebrate (e.g., mammalian) species or in a bacterial species. In addition, the peptides can be partially or completely non-naturally occurring peptides. Also within the invention are peptidomimetics corresponding to the peptides of the invention. In various embodiments, the patient is suffering from a gastrointestinal disorder; the patient is suffering from a disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, Crohn's disease, ulcerative colitis, Irritable bowel syndrome, colonic pseudo-obstruction, obesity, congestive heart failure, or benign prostatic hyperplasia; the composition is administered orally; the peptide comprises 30 or fewer amino acids, the peptide comprises 20 or fewer amino acids, and the peptide comprises no more than 5 amino acids prior to Cys 6 ; the peptide comprises 150, 140, 130, 120, 110, 100, 90, 80, 70, 60, 50, 40, or 30 or fewer amino acids. In other embodiments, the peptide comprises 20 or fewer amino acids. In other embodiments the peptide comprises no more than 20, 15, 10, or 5 peptides subsequent to Cys 18 . In certain embodiments Xaa 19 is a chymotrypsin or trypsin cleavage site and an analgesic peptide is present immediately following Xaa 19 . In a third aspect, the invention features a method for treating a patient suffering from constipation. Clinically accepted criteria that define constipation range from the frequency of bowel movements, the consistency of feces and the ease of bowel movement. One common definition of constipation is less than three bowel movements per week. Other definitions include abnormally hard stools or defecation that requires excessive straining (Schiller 2001, Aliment Pharmacol Ther 15:749-763). Constipation may be idiopathic (functional constipation or slow transit constipation) or secondary to other causes including neurologic, metabolic or endocrine disorders. These disorders include diabetes mellitus, hypothyroidism, hyperthyroidism, hypocalcaemia, Multiple Sclerosis, Parkinson's disease, spinal cord lesions, Neurofibromatosis, autonomic neuropathy, Chagas disease, Hirschsprung's disease and Cystic fibrosis. Constipation may also be the result of surgery (postoperative ileus) or due to the use of drugs such as analgesics (like opiods), antihypertensives, anticonvulsants, antidepressants, antispasmodics and antipsychotics. The method comprising administering a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In one embodiment of the method, the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa16 Xaa 17 Cys18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In various preferred embodiments, the constipation is associated with use of a therapeutic agent; the constipation is associated with a neuropathic disorder; the constipation is post-surgical constipation (postoperative ileus); and the constipation associated with a gastrointestinal disorder; the constipation is idiopathic (functional constipation or slow transit constipation); the constipation is associated with neuropathic, metabolic or endocrine disorder (e.g., diabetes mellitus, hypothyroidism, hyperthyroidism, hypocalcaemia, Multiple Sclerosis, Parkinson's disease, spinal cord lesions, neurofibromatosis, autonomic neuropathy, Chagas disease, Hirschsprung's disease or cystic fibrosis). Constipation may also be the result of surgery (postoperative ileus) or due the use of drugs such as analgesics (e.g., opiods), antihypertensives, anticonvulsants, antidepressants, antispasmodics and antipsychotics. In a fourth aspect, the invention features a method for treating a patient suffering a gastrointestinal disorder, the method comprising administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 CYS 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg;Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In one embodiment of the method, the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In various embodiments, the patient is suffering from a gastrointestinal disorder; the patient is suffering from a disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, colonic pseudo-obstruction, obesity, congestive heart failure, or benign prostatic hyperplasia. In various preferred embodiments, Xaa 9 is Leu, Ile or Val and Xaa 16 is Trp, Tyr or Phe; Xaa 9 is Trp, Tyr or Phe and Xaa 16 is Thr or Ala; Xaa 19 is Trp, Tyr, Phe; Xaa 19 is Lys or Arg;Xaa 20 Xaa 21 is AspPhe; Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn. In a fifth aspect, the invention features a method for increasing gastrointestinal motility in a patient, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In a sixth aspect, the invention features a method for increasing the activity of an intestinal guanylate cyclase (GC-C) receptor in a patient, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In a seventh aspect, the invention features an isolated nucleic acid molecule comprising a nucleotide sequence encoding a polypeptide comprising the amino acid sequence: (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 ) Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In an eighth aspect the invention features a method for treating constipation, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a ninth aspect, the invention features a method for treating a gastrointestinal disorder, a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, obesity, congestive heart failure, or benign prostatic hyperplasia, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor either orally, by rectal suppository, or parenterally. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a tenth aspect, the invention features a method for treating a gastrointestinal disorder selected from the group consisting of: a gastrointestinal motility disorder, irritable bowel syndrome, chronic constipation, a functional gastrointestinal disorder, gastroesophageal reflux disease, functional heartburn, dyspepsia, functional dyspepsia, nonulcer dyspepsia, gastroparesis, chronic intestinal pseudo-obstruction, colonic pseudo-obstruction, Crohn's disease, ulcerative colitis, Inflammatory bowel disease, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments the composition is administered orally; the peptide comprises 30 or fewer amino acids, the peptide comprises 20 or fewer amino acids, and the peptide comprises no more than 5 amino acids prior to Cys 5 . In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In an eleventh aspect, the invention features a method for treating obesity, the method comprising administering an agonist of the intestinal guanylate cyclase (GC-C) receptor. In various embodiments: the agonist is a peptide, the peptide includes four Cys that form two disulfide bonds, and the peptide includes six Cys that form three disulfide bonds. In a twelfth aspect, the invention features a method for treating obesity, the method comprising administering a polypeptide comprising the amino acid sequence: (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaalg Xaa 20 Xaa 21 is missing. The peptide can be administered alone or in combination with another agent for the treatment of obesity, e.g., sibutramine or another agent, e.g., an agent described herein. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing. In a thirteenth aspect, the invention features a pharmaceutical composition comprising a polypeptide described herein. In a fourteenth aspect, the invention features a method for treating congestive heart failure, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO:121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. The peptide can be administered in combination with another agent for treatment of congestive heart failure, for example, a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 ) Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO: 148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing. In a fifteenth aspect, the invention features a method for treating benign prostatic hyperplasia, the method comprising: administering to the patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:147) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr (SEQ ID NO: 121) or is missing or Xaa 1 Xaa 2 Xaa 3 Xaa 4 is missing and Xaa 5 is Asn, Trp, Tyr, Asp, Ile, Thr, or Phe; Xaa 8 is Glu, Asp, Gln, Gly or Pro; Xaa 9 is Leu, Ile, Val, Ala, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn, Tyr, Asp or Ala; Xaa 13 is Pro or Gly; Xaa 14 is Ala, Leu, Ser, Gly, Val, Glu, Gln, Ile, Leu, Lys, Arg, and Asp; Xaa 16 is Thr, Ala, Asn, Lys, Arg, Trp; Xaa 17 is Gly, Pro or Ala; Xaa 19 is Trp, Tyr, Phe or Leu; Xaa 19 is Lys or Arg; Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing. The peptide can be administered in combination with another agent for treatment of BPH, for example, a 5-alpha reductase inhibitor (e.g., finasteride) or an alpha adrenergic inhibitor (e.g., doxazosine). In one embodiment the peptide comprises the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 (SEQ ID NO:148) wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing; Xaa 8 is Glu; Xaa 9 is Leu, Ile, Lys, Arg, Trp, Tyr or Phe; Xaa 12 is Asn; Xaa 13 is Pro; Xaa 14 is Ala; Xaa 16 is Thr, Ala, Lys, Arg, Trp; Xaa 17 is Gly; Xaa 19 is Tyr or Leu; and Xaa 20 Xaa 21 is AspPhe or is missing. In a sixteenth aspect, the invention features a method for treating or reducing pain, including visceral pain, pain associated with a gastrointestinal disorder or pain associated with some other disorder, the method comprising: administering to a patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 CYS 18 Xaa 19 Xaa 20 Xaa 21 , e.g., a purified polypeptide comprising an amino acid sequence disclosed herein. In a seventeenth aspect, the invention features a method for treating inflammation, including inflammation of the gastrointestinal tract, e.g., inflammation associated with a gastrointestinal disorder or infection or some other disorder, the method comprising: administering to a patient a composition comprising a purified polypeptide comprising the amino acid sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 , e.g., a purified polypeptide comprising an amino acid sequence disclosed herein. In certain embodiments the peptide includes a peptide comprising or consisting of the amino acid sequence Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys Cys Glu Xaa 9 Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Xaa 20 Xaa 21 (II) (SEQ ID NO:66) wherein Xaa 9 is any amino acid, wherein Xaa 9 is any amino acid other than Leu, wherein Xaa 9 is selected from Phe, Trp and Tyr; wherein Xaa 9 is selected from any other natural or non-natural aromatic amino acid, wherein Xaa 9 is Tyr; wherein Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is Asn Ser Ser Asn Tyr; wherein Xaa 1 , Xaa 2 , Xaa 3 , Xaa 4 , and Xaa 5 are missing; wherein Xaa 1 , Xaa 2 , Xaa 3 and Xaa 4 are missing; wherein Xaa 1 , Xaa 2 and Xaa 3 are missing; wherein Xaa 1 and Xaa 2 are missing; wherein Xaa 1 is missing; wherein Xaa 20 Xaa 21 is AspPhe or is missing or Xaa 20 is Asn or Glu and Xaa 21 is missing or Xaa 19 Xaa 20 Xaa 21 is missing; wherein Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 and Tyr Xaa 20 Xaa 21 are missing. In the case of a peptide comprising the sequence (I): Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys 6 Cys 7 Xaa 8 Xaa 9 Cys 10 Cys 11 Xaa 12 Xaa 13 Xaa 14 Cys 15 Xaa 16 Xaa 17 Cys 18 Xaa 19 Xaa 20 Xaa 21 wherein: Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 is missing and/or the sequence Xaa 19 Xaa 20 Xaa 21 is missing peptide can still contain additional carboxyterminal or amino terminal amino acids or both Among the useful peptides are peptides comprising, consisting of or consisting essentially of the amino acid sequence Xaa 1 Xaa 2 Xaa 3 Xaa 4 Xaa 5 Cys Cys Glu Xaa 9 Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Xaa 20 Xaa 21 (II) (SEQ ID NO:66) are the following peptides: Gln Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:67) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Thr Ser Asn Tyr Cys Cys Glu (SEQ ID NO:68) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Leu Ser Asn Tyr Cys Cys Glu (SEQ ID NO:69) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ile Ser Asn Tyr Cys Cys Glu (SEQ ID NO:70) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Gln Tyr Cys Cys Glu (SEQ ID NO:71) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Ser Ser Asn Tyr Cys Cys Glu Tyr (SEQ ID NO:72) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Gln Ser Ser Gln Tyr Cys Cys Glu (SEQ ID NO:73) Tyr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Ser Ser Gln Tyr Cys Cys Glu Tyr (SEQ ID NO:74) Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr. Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:75) Ala Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:76) Arg Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:77) Asn Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:78) Asp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:79) Cys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:80) Gln Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:81) Glu Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:82) Gly Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:83) His Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:84) Ile Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:85) Lys Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:86) Met Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:87) Phe Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:88) Pro Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:89) Ser Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:90) Thr Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:91 Trp Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Asn Ser Ser Asn Tyr Cys Cys Glu (SEQ ID NO:92) Val Cys Cys Asn Pro Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ala Cys Cys Asn Pro (SEQ ID NO:93) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:94) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Asn Cys Cys Asn Pro (SEQ ID NO:95) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Asp Cys Cys Asn Pro (SEQ ID NO:96) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Cys Cys Cys Asn Pro (SEQ ID NO:97) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Gln Cys Cys Asn Pro (SEQ ID NO:98) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Glu Cys Cys Asn Pro (SEQ ID NO:99) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Gly Cys Cys Asn Pro (SEQ ID NO:100) Ala Cys Thr Gly Cys Tyr Cys Cys Glu His Cys Cys Asn Pro (SEQ ID NO:101) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ile Cys Cys Asn Pro (SEQ ID NO:102) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:103) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Met Cys Cys Asn Pro (SEQ ID NO:104) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:105) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Pro Cys Cys Asn Pro (SEQ ID NO:106) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Ser Cys Cys Asn Pro (SEQ ID NO:107) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Thr Cys Cys Asn Pro (SEQ ID NO:108) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:109) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Val Cys Cys Asn Pro (SEQ ID NO:110) Ala Cys Thr Gly Cys Tyr Cys Cys Glu Tyr Cys Cys Asn Pro (SEQ ID NO:125) Ala Cys Thr Gly Cys Cys Cys Glu Ala Cys Cys Asn Pro (SEQ ID NO:126) Ala Cys Thr Gly Cys Cys Cys Glu Arg Cys Cys Asn Pro (SEQ ID NO:127) Ala Cys Thr Gly Cys Cys Cys Glu Asn Cys Cys Asn Pro (SEQ ID NO:128) Ala Cys Thr Gly Cys Cys Cys Glu Asp Cys Cys Asn Pro (SEQ ID NO:129) Ala Cys Thr Gly Cys Cys Cys Glu Cys Cys Cys Asn Pro (SEQ ID NO:130) Ala Cys Thr Gly Cys Cys Cys Glu Gln Cys Cys Asn Pro (SEQ ID NO:131) Ala Cys Thr Gly Cys Cys Cys Glu Glu Cys Cys Asn Pro (SEQ ID NO:132) Ala Cys Thr Gly Cys Cys Cys Glu Gly Cys Cys Asn Pro (SEQ ID NO:133) Ala Cys Thr Gly Cys Cys Cys Glu His Cys Cys Asn Pro (SEQ ID NO:134) Ala Cys Thr Gly Cys Cys Cys Glu Ile Cys Cys Asn Pro (SEQ ID NO:135) Ala Cys Thr Gly Cys Cys Cys Glu Lys Cys Cys Asn Pro (SEQ ID NO:136) Ala Cys Thr Gly Cys Cys Cys Glu Met Cys Cys Asn Pro (SEQ ID NO:137) Ala Cys Thr Gly Cys Cys Cys Glu Phe Cys Cys Asn Pro (SEQ ID NO:138) Ala Cys Thr Gly Cys Cys Cys Glu Pro Cys Cys Asn Pro (SEQ ID NO:139) Ala Cys Thr Gly Cys Cys Cys Glu Ser Cys Cys Asn Pro (SEQ ID NO:140) Ala Cys Thr Gly Cys Cys Cys Glu Thr Cys Cys Asn Pro (SEQ ID NO:141) Ala Cys Thr Gly Cys Cys Cys Glu Trp Cys Cys Asn Pro (SEQ ID NO:142) Ala Cys Thr Gly Cys Cys Cys Glu Val Cys Cys Asn Pro (SEQ ID NO:143) Ala Cys Thr Gly Cys In an eighteenth aspect, the invention features a method for treating congestive heart failure, the method comprising adrninistering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of congestive heart failure, for example, a natriuretic peptide such as atrial natriuretic peptide, brain natriuretic peptide or C-type natriuretic peptide), a diuretic, or an inhibitor of angiotensin converting enzyme. In a nineteenth aspect, the invention features a method for treating BPH, the method comprising administering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of BPH, for example, a 5-alpha reductase inhibitor (e.g., finasteride) or an alpha adrenergic inhibitor (e.g., doxazosine). In a twentieth aspect, the invention features a method for treating obesity, the method comprising administering a complete or partial agonist of the intestinal guanylate cyclase (GC-C) receptor. The agonist can be administered in combination with another agent for treatment of obesity, for example, gut hormone fragment peptide YY 3-36 (PYY 3-36 )( N. Engl. J. Med. 349:941, 2003; ikpeapge daspeelnry yaslrhylnl vtrqry) or a variant thereof, glp-1 (glucagon-like peptide-1), exendin-4 (an inhibitor of glp-1), sibutramine, phentermine, phendimetrazine, benzphetamine hydrochloride (Didrex), orlistat (Xenical), diethylpropion hydrochloride (Tenuate), fluoxetine (Prozac), bupropion, ephedra, chromium, garcinia cambogia, benzocaine, bladderwrack (focus vesiculosus), chitosan, nomame herba, galega (Goat's Rue, French Lilac), conjugated linoleic acid, L-carnitine, fiber (psyllium, plantago , guar fiber), caffeine, dehydroepiandrosterone, germander (teucrium chamaedrys), B-hydroxy-β-methylbutyrate, ATL-962 (Alizyme PLC), and pyruvate. A peptide useful for treating obesity can be administered as a co-therapy with a peptide of the invention either as a distinct molecule or as part of a fusion protein with a peptide of the invention. Thus, for example, PYY 3-36 can be fused to the carboxy or amino terminus of a peptide of the invention. Such a fusion protein can include a chymostrypsin or trypsin cleavage site that can permit cleavage to separate the two peptides. A peptide useful for treating obesity can be administered as a co-therapywith electrostimulation (U.S. 20040015201). In twenty first aspect, the invention features isolated nucleic acid molecules comprising a sequence encoding a peptide of the invention and vectors, e.g., expression vectors that include such nucleic acid molecules and can be used to express a peptide of the invention in a cultured cell (e.g., a eukaryotice cell or a prokaryotic cell). The vector can further include one or more regulatory elements, e.g., a heterologous promoter or elements required for translation operably linked to the sequence encoding the peptide. In some cases the nucleic acid molecule will encode an amino acid sequence that includes the amino acid sequence of a peptide of the invention. For example, the nucleic acid molecule can encode a preprotein or a preproprotein that can be processed to produce a peptide of the invention. A vector that includes a nucleotide sequence encoding a peptide of the invention or a peptide or polyppetide comprising a peptide of the invention may be either RNA or DNA, single- or double-stranded, prokaryotic, eukaryotic, or viral. Vectors can include transposons, viral vectors, episomes, (e.g., plasmids), chromosomes inserts, and artificial chromosomes (e.g. BACs or YACs). Suitable bacterial hosts for expression of the encode peptide or polypeptide include, but are not limited to, E. coli . Suitable eukaryotic hosts include yeast such as S. cerevisiae , other fungi, vertebrate cells, invertebrate cells (e.g., insect cells), plant cells, human cells, human tissue cells, and whole eukaryotic organisms. (e.g., a transgenic plant or a transgenic animal). Further, the vector nucleic acid can be used to generate a virus such as vaccinia or baculovirus. As noted above the invention includes vectors and genetic constructs suitable for production of a peptide of the invention or a peptide or polypeptide comprising such a peptide. Generally, the genetic construct also includes, in addition to the encoding nucleic acid molecule, elements that allow expression, such as a promoter and regulatory sequences. The expression vectors may contain transcriptional control sequences that control transcriptional initiation, such as promoter, enhancer, operator, and repressor sequences. A variety of transcriptional control sequences are well known to those in the art and may be functional in, but are not limited to, a bacterium, yeast, plant, or animal cell. The expression vector can also include a translation regulatory sequence (e.g., an untranslated 5′ sequence, an untranslated 3′ sequence, a poly A addition site, or an internal ribosome entry site), a splicing sequence or splicing regulatory sequence, and a transcription termination sequence. The vector can be capable of autonomous replication or it can integrate into host DNA. The invention also includes isolated host cells harboring one of the forgoing nucleic acid molecules and methods for producing a peptide by culturing such a cell and recovering the peptide or a precursor of the peptide. Recovery of the peptide or precursor may refer to collecting the growth solution and need not involve additional steps of purification. Proteins of the present invention, however, can be purified using standard purification techniques, such as, but not limited to, affinity chromatography, thermaprecipitation, immunoaffinity chromatography, ammonium sulfate precipitation, ion exchange chromatography, filtration, electrophoresis and hydrophobic interaction chromatography. In a twenty second aspect, the invention features a method of increasing the level of cyclic guanosine 3′-monophosphate (cGMP) in an organ, tissue (e.g, the intestinal mucosa), or cell (e.g., a cell bearing GC-A receptor) by administering a composition that includes a peptide of the invention. The peptides and agonist of the intestinal guanylate cyclase (GC-C) receptor can be used to treat constipation or decreased intestinal motility, slow digestion or slow stomach emptying. The peptides can be used to relieve one or more symptoms of IBS (bloating, pain, constipation), GERD (acid reflux into the esophagus), functional dyspepsia, or gastroparesis (nausea, vomiting, bloating, delayed gastric emptying) and other disorders described herein. The details of one or more embodiments of the invention are set forth in the accompanying description. All of the publications, patents and patnet applications are hereby incorporated by reference.
20040309
20071204
20050127
63654.0
9
TELLER, ROY R
METHODS AND COMPOSITIONS FOR THE TREATMENT OF GASTROINTESTINAL DISORDERS
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,796,763
ACCEPTED
Method and apparatus for improving sensitivity in vertical color CMOS image sensors
The invention describes in detail the structure of a CMOS image sensor pixel that senses color of impinging light without having absorbing filters placed on its surface. The color sensing is accomplished by having a vertical stack of three-charge detection nodes placed in the silicon bulk, which collect electrons depending on the depth of their generation. The small charge detection node capacitance and thus high sensitivity with low noise is achieved by using fully depleted, potential well forming, buried layers instead of undepleted junction electrodes. Two embodiments of contacting the buried layers without substantially increasing the node capacitances are presented.
1. A light-sensing pixel, having a p type doped region, in a CMOS image sensor, comprising: a first doped charge collecting region buried within the p type doped region and configured to operate as a depleted potential well; a first n+ type doped plug extending from near the surface of the image sensor to the first charge collecting region; a second doped charge collecting region buried within the p type doped region, the second charge collecting region vertically separated from the first charge collecting region by the p type doped region and configured to operate as a depleted potential well; and a second n+ type doped plug extending from near the surface of the image sensor to the second charge collecting region. 2. The pixel of claim 1, the first and second charge collecting regions further comprising: a first extension with n+ type doping coupled to and between the first charge collecting region and the first plug, and having a different doping concentration than the first charge collecting region; and a second extension with n+ type doping coupled to and between the second charge collecting region and the second plug, and having a different doping concentration than the second charge collecting region. 3. The pixel of claim 2 wherein the first and second extensions are configured to operate not fully depleted of mobile charge. 4. The pixel of claim 1 wherein the first n+ type doped plug contacts the first charge collecting region in its center. 5. A light-sensing pixel, having a p type doped region, in a CMOS image sensor, comprising: a first doped charge collecting region buried within the p type doped region and configured to operate as a depleted potential well; a first vertical trench transistor extending from near the surface of the image sensor to the first charge collecting region; a first n+ type doped region located at the surface of the image sensor and coupled to the first vertical trench transistor; a second doped charge collecting region buried within the p type doped region, the second charge collecting region vertically separated from the first charge collecting region by the p type doped region and configured to operate as a depleted potential well; a second vertical trench transistor extending from near the surface of the image sensor to the second charge collecting region; and a second n+ type doped region located at the surface of the image sensor and coupled to the second vertical trench transistor. 6. The pixel of claim 5, the first and second charge collecting regions further comprising: a first extension with n+ type doping coupled to and between the first charge collecting region and the first vertical trench transistor, and having a different doping concentration than the first charge collecting region; and a second extension with n+ type doping coupled to and between the second charge collecting region and the second vertical trench transistor, and having a different doping concentration than the second charge collecting region. 7. The pixel of claim 6 wherein the first and second extensions are configured to operate not fully depleted of mobile charge. 8. The pixel of claim 5 wherein the first vertical trench transistor contacts the first charge collecting region in its center. 9. A light-sensing pixel, having a p type doped region, in a CMOS image sensor, comprising: a first n+ type doped plug extending from near the surface of the image sensor into the p type doped region; a first charge collecting region configured to operate as a depleted potential well and buried within the p type doped region, having a first end and a second end and coupled to the first plug at the first end, and having a first vertical slit with a width at the second end, the first vertical slit narrowing towards the first end; a second n+ type doped plug extending from near the surface of the image sensor into the p type doped region; and a second charge collecting region configured to operate as a depleted potential well and buried within the p type doped region, having a first end and a second end and coupled to the first plug at the first end, the second charge collecting region vertically separated from the first charge collecting region by the p type doped region, and having a second vertical slit with a width at the second end, the vertical slit narrowing towards the first end. 10. The pixel of claim 9, wherein the first charge collecting region has a vertical height that is greater than the width of the first vertical slit, and the second charge collecting region has a vertical height that is greater than the width of the second vertical slit. 11. The pixel of claim 9, the first and second charge collecting regions further comprising: a first extension with n+ type doping coupled to and between the first charge collecting region and the first plug, and having a different doping concentration than the first charge collecting region; and a second extension with n+ type doping coupled to and between the second charge collecting region and the second plug, and having a different doping concentration than the second charge collecting region. 12. The pixel of claim 11 wherein the first extension is coupled to the first end of the first charge collecting region and the second extension is coupled to the first end of the second charge collecting region. 13. The pixel of claim 11 wherein the first and second extensions are configured to operate not fully depleted of mobile charge. 14. The pixel of claim 9 wherein the first n+ type doped plug contacts the first charge collecting region in its center. 15. A light-sensing pixel, having a p type doped region, in a CMOS image sensor, comprising: a first vertical trench transistor extending from near the surface of the image sensor into the p type doped region; a first doped charge collecting region buried within the p type doped region and configured to operate as a depleted potential well, having a first end and a second end and coupled to the first vertical trench transistor at the first end, and having a first vertical slit with a width at the second end, the first vertical slit narrowing towards the first end; a first n+ type doped region located at the surface of the image sensor and coupled to the first vertical trench transistor; a second vertical trench transistor extending from near the surface of the image sensor into the p type doped region; a second doped charge collecting region buried within the p type doped region, the second charge collecting region vertically separated from the first charge collecting region by the p type doped region and configured to operate as a depleted potential well, having a first end and a second end and coupled to the second vertical trench transistor at the first end, and having a first vertical slit with a width at the second end, the first vertical slit narrowing towards the first end; and a second n+ type doped region located at the surface of the image sensor and coupled to the second vertical trench transistor. 16. The pixel of claim 15, the first and second charge collecting regions further comprising: a first extension with n+ type doping coupled to and between the first charge collecting region and the first vertical trench transistor, and having a different doping concentration than the first charge collecting region; and a second extension with n+ type doping coupled to and between the second charge collecting region and the second vertical trench transistor, and having a different doping concentration than the second charge collecting region. 17. The pixel of claim 16 wherein the first and second extensions are configured to operate not fully depleted of mobile charge. 18. The pixel of claim 16 wherein the first extension is coupled to the first end of the first charge collecting region and the second extension is coupled to the first end of the second charge collecting region. 19. The pixel of claim 15 wherein the first vertical trench transistor contacts the first charge collecting region in its center. 20. (canceled) 21. (canceled)
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to solid-state image sensors and specifically to a class of CMOS image sensors with multiple charge detection nodes placed at various depths in the substrate to selectively detect light of different wavelengths. Sensors that use such pixels do not require wavelength selective filters to detect colors, and thus do not sacrifice Quantum Efficiency (QE) and resolution. 2. Description of the Related Art Including Information Disclosed Under 37 CFR 1.97 and 1.98 A typical image sensor detects light by converting impinging photons into electrons that are integrated (collected) in pixels of the image sensing area. After completing integration, collected charge is converted into a voltage using a suitable charge-to-voltage conversion structure. The sensed voltage is then supplied through various addressing circuitry and buffering amplifiers to the output terminals of the sensor. Placing various wavelength selective filters on top of the pixels allows only a chosen portion of the light spectrum to enter the pixel and generate charge. The description of the conventional concept of color sensing may be found for example in U.S. Pat. No. 4,845,548 to Kohno. However, this concept reduces detected light levels as well as array resolution, since a single pixel can sense only one color while rejecting other colors. Recently a new class of devices has been developed, called VERTICOLOR Image Sensors, as described for example in U.S. patent 2002/0058353A1 to Merrill. These devices use a pixel structure with multiple vertically stacked charge detection nodes that detect color by measuring charge generated at different depths within the pixel. Since light of different wavelengths penetrates to different depths in the substrate, color is sensed directly within one pixel without the necessity of surface wavelength selective filters. This is one advantage of the VERTICOLOR concept and technology. One problem with placing multiple charge detection nodes vertically within a pixel is the large capacitance associated with each charge detection node that reduces the node conversion gain and thus the sensor sensitivity. FIG. 1 illustrates a simplified cross section of pixel 100, which is from a prior art CMOS image sensor. On p+ type doped silicon substrate 101 there is p type doped region 102, which may be epitaxially grown, that extends all the way to the surface. P type doped region 102 contains vertically stacked n type doped layers 103, 104 and 105. These layers can be formed, for example, by ion implantation between consecutive epitaxial growth steps, or by other means. Various techniques are well known to those skilled in the art of modern silicon device fabrication processing technology and the descriptions here in are not meant to be limiting. Similarly, n+ type doped vertical extensions (plugs) 106, 107, and 108 may be formed by ion implantation between epitaxial growth steps and serve as conductive connections that enable biasing and collection of photo-generated electrons in doped layers 103, 104 and 105 from the surface of the silicon substrate. Plugs 106, 107 and 108 are contacted by metal regions 111, 112, and 113, which can be formed through holes in silicon-dioxide dielectric layer 110 or as multilevel interconnects over many types of dielectric layers, as is also well know in the art. Metal regions 111, 112, and 113 can be formed by a single metal, such as aluminum, or composed of complex metallization systems formed by various layers of titanium-nitride, titanium, tungsten, aluminum, cooper, and so on. Metal regions 111, 112, and 113 are then interconnected with various circuit components by metal wiring 114 that is, for simplicity, shown in the drawing only schematically. To prevent parasitic surface channel conduction and shorting together of plugs 106, 107 and 108, p+ type doped isolation regions (channel stops) 109 are inserted between each of plugs 106, 107 and 108. Typically, channel stops 109 completely surround each of corresponding plugs 106, 107 and 108 in the direction that is perpendicular to the plane of drawing, which is not visible in FIG. 1. One example of a typical circuit that can be used for detecting charge in the particular n+ type diffusion node is shown as a schematic in FIG. 1. The circuit consists of reset transistor 117 that connects charge detection node 115 to reference voltage terminal 119 when a suitable reset level is applied to gate 118. Photo-generated charge accumulating on node 115 causes a voltage charge that is buffered by transistor 116 with its drain connected to Vdd bias terminal 120. The output signal then appears on node 121 and can be further processed either as a voltage or as a current when supplied to the rest of the sensor circuitry. Circuit ground 122 is identical to p+ type doped substrate 101. For simplicity, only one schematic circuit is shown, although there are typically three for a single pixel sensing three colors. It would be apparent to those skilled in the art that other, more complex circuits can be connected to pixel 100. When a reset voltage is applied to node 115 and the corresponding two remaining nodes (circuits connected to plugs 106 and 107, not shown), the potential of these nodes is raised to the reference bias level Vrf. When the doping level of layer 103 (as well as layers 104 and 105) is sufficiently high, the potential at node 115, the potential of plug 108 (as well as plugs 107 and 106), and the potential of layer 103 (as well as layers 104 and 105) are approximately the same. Layer 103 and plug 108, which are buried reverse biased diodes, act as a single electrode of a junction capacitor. The capacitance of such a structure is higher relative to the desired capacitance of pixel 100, since the junction area surrounding layer 103 on all sides is large. Combined with the input gate capacitance of the circuit connected to the node 115, the charge conversion factor of the node is small. As a result, the pixel has low sensitivity, which is undesirable in a sensor. What is needed is a vertically structured pixel with reduced capacitance. BRIEF SUMMARY OF THE INVENTION The invention provides a vertical multi-detection node structure that senses charge according to its depth of generation and has low charge detection node capacitance. Incorporating a fully depleted vertical stack of potential wells that are connected to small charge detection nodes by suitable charge carrying channels accomplishes this task and other objects of the invention. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS FIG. 1 is a prior art diagram illustrating a simplified pixel that has three n type diode charge detection nodes placed above each other within the p type substrate. FIG. 2 is a diagram illustrating one embodiment of the invention that has three fully depleted n− type layers of various doping concentration placed above each other within the p type substrate to form a single pixel. FIG. 3 is a graph illustrating a charge potential profile within the pixel of FIG. 2 taken along line A′-A. The graph shows the potential of regions that have different doping concentrations. The collection and flow of photo-generated electrons is also shown in this drawing. FIG. 4 is a diagram illustrating another embodiment of the invention that has three fully depleted n− type doped layers placed above each other within the p type substrate to form a single pixel. FIG. 5 is a diagram illustrating a basic pixel collector structure for a single photodiode that accomplishes a doping grading without having non-standard implant levels and directions. FIG. 6 is a graph illustrating dopant concentration levels relative to dopant position within the buried portion of a photodiode of FIG. 5. FIG. 7 is a diagram of another embodiment of the invention illustrating plug placement with respect to collector. FIG. 8 is a graph of collector and plug potential for the plug and collector of FIG. 7. FIG. 9 is a flow diagram illustrating a method of collecting charge within a light-sensing pixel having a p type doped region in a CMOS image sensor. DETAILED DESCRIPTION OF THE INVENTION FIG. 2 is a diagram illustrating one embodiment of the invention that has three fully depleted n− type layers of various doping concentration placed above each other within the p type substrate to form a single pixel. Pixel 200 has p+ type substrate 201. P type doped region 202 was, for example, epitaxially deposited on substrate 201. Region 202 contains vertically stacked n type doped regions 203, 204 and 205 corresponding to regions 103, 104, and 105 in FIG. 1. However, these regions now are only lightly doped such that they are depleted during normal operation of the pixel. Extensions 223 and 224 are horizontal extensions of regions 203 and 204, respectively that have a slightly higher doping. The main reason for adding these extensions is to ensure a connection from the depletable regions 203 and 204 to plugs 208 and 207. The doping levels of extensions 223 and 224 are such that they do not deplete out during normal operation of the pixel. In contrast to region 105 in FIG. 1, p+ type doped surface region 225 forms region 205 that is surrounded by p type material much like regions 203 and 204. This causes region 205 to have similar operating characteristics to regions 203 & 204. Another advantage gained by region 225 is quenching of surface generated dark current by p+ type doping at the silicon-silicon dioxide interface. This portion of the structure is similar to pinned photodiode U.S. Pat. No. 4,484,210 to Teranisihi or Virtual Phase CCD gate electrode U.S. Pat. No. 4,229,752 to Hynecek, both incorporated by reference herein. When driven to sufficiently high voltage, regions 203, 204, and 205 do not form conductive electrodes of a detection node capacitor, rather, they form depleted potential wells. When charge is generated in region 202 at various depths it diffuses first vertically to one of regions 203, 204, and 205, and then laterally within these regions to corresponding plugs 208, 207, and 206. When node 215 is reset to a sufficiently high voltage, only the potential of node 215 and corresponding plug 208 changes. The potential of region 203 and extension 224 remains relatively constant and does not change significantly during reset of the pixel. Capacitance of node 215, therefore, consists of the capacitance of plug 208 and the input capacitance of the circuit at node 215. These capacitances can be minimized by appropriate sizing of transistors and structures and in addition do not depend on the size of the regions 203, 204, and 205, and extensions 223 and 224 and thus do not depend on the size of the pixel. Reduced capacitance contributes to higher pixel sensitivity and lower noise. In addition, the depletion of the photo charge collecting regions 203, 204 and 205 enables a partial charge transfer action as is shown in the prior art. The remainder of pixel 200 operates in a manner similar to pixel 100. Oxide dielectric layer 210, channel stops 209, metal contacts 211, 212, and 213, together with wiring 214 serve the same purpose in pixel 200 as in pixel 100. Also, pixel 200 is the same with reset and buffer transistors 217 and 216 respectively, reset gate terminal 218, reference voltage terminal 219, Vdd bias terminal 220, and output terminal 221. The circuit ground is terminal 222. The metal interconnects and various circuit elements that also belong to pixel 200 are for simplicity shown only schematically and some elements are completely omitted. For example, only the schematic components connected to plug 208 are illustrated, for simplicity. FIG. 3 is a graph illustrating a charge potential profile within the pixel of FIG. 2 taken along line A′-A. In FIG. 3, the x-axis represents a position along line A′-A from FIG. 2 and the y-axis represents the electron potential (direction down is positive potential representing lower electron energy). Section 309 represents potential level 301 of the substrate that can for convenience be set equal to zero. Section 306 represents the potential of region 204 in FIG. 2 at a potential of 302. Section 307 represents the potential of extension 224 and plug 207 at a potential of 303. As charge 310 is generated in the pixel, it is first collected in the well at potential level 302 and drifts through levels 303 and 304 to level 305 into detection node section 308. Detection node section 308 was previously reset to level 305. As more charge accumulates at node 308, its potential is lowered to level 304; these levels are sensed by transistor 216. In one embodiment, region 204 is doped in such a manner so that all or substantially all of the charge will collect at node 308. This is accomplished by having the voltage level 302 “pinned” at a particular voltage by depleting out and having it's capacitance go to zero. Charge will then drift towards the higher potential of region 224 and then plug 207. Consequently, a pixel using the invention has higher sensitivity. In another embodiment, the charge potential profile is designed such that when more charge accumulates, at a certain level, for example, level 303 in graph 300, charge is stored in region 307 and eventually also in region 306. In this case regions 224 and 204 begin in a fully depleted state. As they collect charge they come out of depletion and develop capacitance. The increased capacitance in regions 224 and 204 decreases the electron to voltage conversion (because of increase in capacitance). This changes the sensitivity of the pixel to charge collection and thereby extends the dynamic range of the pixel. FIG. 4 is a diagram illustrating another embodiment of the invention that has three fully depleted n− type doped layers placed above each other within the p type substrate to from a single pixel. In pixel 400, vertical plugs 207 and 208 from pixel 200 in FIG. 2 have been eliminated and replaced by vertical trench transistors. This reduces the detection node capacitance even further, since after the vertical transistors are turned off, only n+ type junction regions 406, 407, and 408 remain connected to the circuit, which in the right process will have lower capacitance than the plugs 207 and 208. P+ type substrate 401 has p type doped region 402 epitaxially deposited on it. Region 402 contains vertically stacked n− type doped regions 403, 404, and 405 that are under normal operating conditions completely depleted of charge. Regions 403 and 404 extend laterally to trench holes 433 and 432. It is also possible to include similar lateral extension as 223 and 224 in FIG. 2 in this structure, but this has been omitted from the drawing for simplicity. Trench holes 432 and 433 have gate oxide grown on their walls and bottom. The oxide layer can have a similar thickness as oxide layer 410 or have a different thickness. It is also possible to place doping impurities 430 and 431 on selected walls of trench holes 432 and 433, respectively, by angled ion implantation process. This will reduce the size of the channel that transfers charge from potential wells 403 and 404 to surface n+ type doped junctions 407 and 408 even further. A layer of poly-silicon forms gates 424 and 425 of vertical trench transistors. The gates are connected to terminals 427 and 428. When a suitable voltage is applied to these gates, photo-generated charge, which has accumulated in potential wells formed in regions 403 and 404, is transferred to junctions 407 and 408 for sensing. Because it is difficult to precisely align the depth of the trenches with the edges of doping regions 403 and 404, a small overlap will typically be used. The trench transistors are comprised of trench hole 433 and gate 425, and trench hole 432 and gate 424. The remainder of the structure is similar to the previous example. P+ type doped channel stop regions 409 separate n+ type charge detection node junctions 406, 407, and 408 from each other. Detection node junctions 406, 407, and 408 are connected to metallization regions 411, 412, and 413 through contact holes opened in oxide dielectric layer 410. Wires 414 are used for interconnecting detection node junctions 406, 407 and 408 with the rest of the circuit components of pixel 400, such as reset transistor 417 and buffer transistor 416, for detection node junction 407. Applying a voltage to gate terminal 418 activates reset transistor 417, which electrically connects node 415 to reference terminal 419. An appropriate bias voltage, for example Vdd, is applied to terminal 420 and the output signal appears on node 421. Circuit ground 422 is connected to p+ type doped substrate 401. For the symmetry of the structure the pinned photodiode formed by regions 429 and 405 is connected to detection node 406 by a transistor. This transistor is, however, in a standard lateral buried channel configuration with gate 423 and gate terminal 426. The metal interconnects and various circuit elements that also belong to the pixel are for simplicity shown only schematically and some are completely omitted. FIG. 5 is a plan view illustrating another embodiment of a photodiode. Region 502 is a buried vertically stacked n type doped region, similar to regions 203, 204 and 205 of FIG. 2. Typically, excepting areas near an edge, doping concentration at a given depth is uniform. Therefore there is no field to drive collected charge to a contact, for example plug 208. In order to achieve a lateral field to deliver collected charge to a contact, region 502 has vertically cut slits 503 with a width W. If the vertical thickness (in a plane perpendicular to the plane of FIG. 5) is greater than width W, then dopants will diffuse into the gaps and create a lateral gradient in doping concentration, with doping levels increasing (from left to right) along the length of region 502. Dopant concentration level is illustrated in FIG. 6. Although FIG. 5 illustrates triangular slits, one of ordinary skill in the art will recognize that the slits may be manufactured in a narrowing step-wise fashion (not shown) or any other appropriate manner. FIG. 6 is a graph illustrating dopant concentration levels relative to region position within the buried portion of a photodiode of FIG. 5. The P regions of graph 600 represent substrate 202. Graph 600 shows dopant concentration on the X-axis and position on the Y-axis relative to position, from left to right, of region 502 in FIG. 5. Line 610 represents doping concentration along line 1′-1 of FIG. 5. Doping concentration increases somewhat, from left to right. Line 620 represents doping concentration along line 2′-2 of FIG. 5, where doping concentration increases more than line 2′-2, from left to right. At position 630 the doping concentrations are the same at line 5′-5 in FIG. 5, where slits 503 end. Dopant concentration along line 2′-2 will produce the lateral field to drive charge to the right, according to the example in FIG. 5. The number of slots 503 to include is limited only by the technology available to produce them. FIG. 7 is another embodiment of the invention illustrating plug placement with respect to collector. Red collector 700 is overlapped by green collector 710. The blue collector is not shown in FIG. 7 for simplicity. In one embodiment, plug 720 for red collector 700 is positioned in the center of the red collector, rather than to the side as illustrated in FIG. 2. Positioning of plug 720 at the center of red collector 700 allows collection at maximum potential, eliminating a separate layer to extend from the collector to the plug, for example extension 224 of FIG. 2. FIG. 8 is a graph of an approximation of collector and plug potential for the plug and collector of FIG. 7. The Y-axis of graph 800 represents negative potential in the increasing Y direction. The X-axis of graph 800 represents position along red collector 700 of FIG. 7, with position 810 representing plug 720 and the low and high points on the X-axis representing the edges of red collector 700. Charge gathered by red collector 700 settles to the point of highest positive potential, which is at the lowest point on the Y-axis, in plug 720. Charge gathered at the edges of red collector 700 diffuses towards the lowest point, in plug 720, represented by position 810 in graph 800. Potential level 820 is an example of charge potential after integration. FIG. 9 is a flow diagram illustrating a method of collecting charge within a light-sensing pixel having a p type doped region in a CMOS image sensor. In block 900, expose the pixel to light. In block 910, collect a first charge within a first fully depleted region buried within the p type region. In block 920, collect a second charge within a second fully depleted region buried within the p type region, wherein the second fully depleted region is vertically separated from the first fully depleted region. In block 930, accumulate the first charge within a first plug extending from the near the surface of the image sensor to the first fully depleted region. In block 940, accumulate the second charge within a second plug extending from the near the surface of the image sensor to the second fully depleted region. In block 950, read out the first charge as a first output signal from a first circuit coupled to the first plug. In block 960, read out the second charge as a second output signal from a second circuit coupled to the second plug. Having described the invention, it is noted that persons skilled in the art can make modifications and variations in light of the above teachings. It is therefore to be understood that changes may be made in the particular embodiments of the inventions disclosed, which are within the scope and spirit of the inventions as defined by appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to solid-state image sensors and specifically to a class of CMOS image sensors with multiple charge detection nodes placed at various depths in the substrate to selectively detect light of different wavelengths. Sensors that use such pixels do not require wavelength selective filters to detect colors, and thus do not sacrifice Quantum Efficiency (QE) and resolution. 2. Description of the Related Art Including Information Disclosed Under 37 CFR 1.97 and 1.98 A typical image sensor detects light by converting impinging photons into electrons that are integrated (collected) in pixels of the image sensing area. After completing integration, collected charge is converted into a voltage using a suitable charge-to-voltage conversion structure. The sensed voltage is then supplied through various addressing circuitry and buffering amplifiers to the output terminals of the sensor. Placing various wavelength selective filters on top of the pixels allows only a chosen portion of the light spectrum to enter the pixel and generate charge. The description of the conventional concept of color sensing may be found for example in U.S. Pat. No. 4,845,548 to Kohno. However, this concept reduces detected light levels as well as array resolution, since a single pixel can sense only one color while rejecting other colors. Recently a new class of devices has been developed, called VERTICOLOR Image Sensors, as described for example in U.S. patent 2002/0058353A1 to Merrill. These devices use a pixel structure with multiple vertically stacked charge detection nodes that detect color by measuring charge generated at different depths within the pixel. Since light of different wavelengths penetrates to different depths in the substrate, color is sensed directly within one pixel without the necessity of surface wavelength selective filters. This is one advantage of the VERTICOLOR concept and technology. One problem with placing multiple charge detection nodes vertically within a pixel is the large capacitance associated with each charge detection node that reduces the node conversion gain and thus the sensor sensitivity. FIG. 1 illustrates a simplified cross section of pixel 100 , which is from a prior art CMOS image sensor. On p+ type doped silicon substrate 101 there is p type doped region 102 , which may be epitaxially grown, that extends all the way to the surface. P type doped region 102 contains vertically stacked n type doped layers 103 , 104 and 105 . These layers can be formed, for example, by ion implantation between consecutive epitaxial growth steps, or by other means. Various techniques are well known to those skilled in the art of modern silicon device fabrication processing technology and the descriptions here in are not meant to be limiting. Similarly, n+ type doped vertical extensions (plugs) 106 , 107 , and 108 may be formed by ion implantation between epitaxial growth steps and serve as conductive connections that enable biasing and collection of photo-generated electrons in doped layers 103 , 104 and 105 from the surface of the silicon substrate. Plugs 106 , 107 and 108 are contacted by metal regions 111 , 112 , and 113 , which can be formed through holes in silicon-dioxide dielectric layer 110 or as multilevel interconnects over many types of dielectric layers, as is also well know in the art. Metal regions 111 , 112 , and 113 can be formed by a single metal, such as aluminum, or composed of complex metallization systems formed by various layers of titanium-nitride, titanium, tungsten, aluminum, cooper, and so on. Metal regions 111 , 112 , and 113 are then interconnected with various circuit components by metal wiring 114 that is, for simplicity, shown in the drawing only schematically. To prevent parasitic surface channel conduction and shorting together of plugs 106 , 107 and 108 , p+ type doped isolation regions (channel stops) 109 are inserted between each of plugs 106 , 107 and 108 . Typically, channel stops 109 completely surround each of corresponding plugs 106 , 107 and 108 in the direction that is perpendicular to the plane of drawing, which is not visible in FIG. 1 . One example of a typical circuit that can be used for detecting charge in the particular n+ type diffusion node is shown as a schematic in FIG. 1 . The circuit consists of reset transistor 117 that connects charge detection node 115 to reference voltage terminal 119 when a suitable reset level is applied to gate 118 . Photo-generated charge accumulating on node 115 causes a voltage charge that is buffered by transistor 116 with its drain connected to Vdd bias terminal 120 . The output signal then appears on node 121 and can be further processed either as a voltage or as a current when supplied to the rest of the sensor circuitry. Circuit ground 122 is identical to p+ type doped substrate 101 . For simplicity, only one schematic circuit is shown, although there are typically three for a single pixel sensing three colors. It would be apparent to those skilled in the art that other, more complex circuits can be connected to pixel 100 . When a reset voltage is applied to node 115 and the corresponding two remaining nodes (circuits connected to plugs 106 and 107 , not shown), the potential of these nodes is raised to the reference bias level Vrf. When the doping level of layer 103 (as well as layers 104 and 105 ) is sufficiently high, the potential at node 115 , the potential of plug 108 (as well as plugs 107 and 106 ), and the potential of layer 103 (as well as layers 104 and 105 ) are approximately the same. Layer 103 and plug 108 , which are buried reverse biased diodes, act as a single electrode of a junction capacitor. The capacitance of such a structure is higher relative to the desired capacitance of pixel 100 , since the junction area surrounding layer 103 on all sides is large. Combined with the input gate capacitance of the circuit connected to the node 115 , the charge conversion factor of the node is small. As a result, the pixel has low sensitivity, which is undesirable in a sensor. What is needed is a vertically structured pixel with reduced capacitance.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>The invention provides a vertical multi-detection node structure that senses charge according to its depth of generation and has low charge detection node capacitance. Incorporating a fully depleted vertical stack of potential wells that are connected to small charge detection nodes by suitable charge carrying channels accomplishes this task and other objects of the invention.
20040308
20090602
20050908
72153.0
0
SEFER, AHMED N
METHOD AND APPARATUS FOR IMPROVING SENSITIVITY IN VERTICAL COLOR CMOS IMAGE SENSORS
UNDISCOUNTED
0
ACCEPTED
2,004
10,796,855
ACCEPTED
Friend/foe identification system for a battlefield
The invention relates to an IFF transponder for ground applications, which comprises: (a) Encoder for forming an interrogating or response sequence of pulses, and conveying the same to a UWB transmitter; (b) A UWB transmitter for getting said interrogating or response sequence of pulses, forming a corresponding interrogating or response signal of a sequence of UWB pulses, and transmitting the same via a UWB transmitting antenna; (c) A plurality of UWB receiving antennas, disposed away one from the other, for receiving either an interrogating signal or a response signal sent by another transponder; (d) A decoder for getting from at least one of said UWB receiving antennas received signals, decoding the same, comparing the decoded signal with a bank of pre-stored signals, and determining whether a received signal is an interrogating or response signal; and (e) A processing unit for, upon receipt of a signal of response to an interrogation signal sent by the present transponder, calculating the location of the responding transponder by: (I) Determining the range R by the time delays between the interrogating and response signals; (II) Determining the direction vector to the responding transponder by evaluating the time differences between arrival of each response pulse to a plurality of receiving antennas; and (III) determining the identity of the responding transponder by checking the received sequence of UWB pulses, assuming that the sequence of each transponder is unique.
1. An IFF transponder for ground applications, comprising: Encoder for forming an interrogating or response sequence of pulses, and conveying the same to a UWB transmitter; A UWB transmitter for getting said interrogating or response sequence of pulses, forming a corresponding interrogating or response signal of a sequence of UWB pulses, and transmitting the same via a UWB transmitting antenna; A plurality of UWB receiving antennas, disposed away one from the other, for receiving either an interrogating signal or a response signal sent by another transponder; A decoder for getting from at least one of said UWB receiving antennas received signals, decoding the same, comparing the decoded signal with a bank of pre-stored signals, and determining whether a received signal is an interrogating or response signal; and A processing unit for, upon receipt of a signal of response to an interrogation signal sent by the present transponder, calculating the location of the responding transponder by: a. Determining the range R by the time delays between the interrogating and response signals; b. Determining the direction vector to the responding transponder by evaluating the time differences between arrival of each response pulse to a plurality of receiving antennas; and c. determining the identity of the responding transponder by checking the received sequence of UWB pulses, assuming that the sequence of each transponder is unique. 2. A transponder according to claim 1, wherein the determining of the range R to the responding transponder by performing: [ ( T r - T s ) - T proc ] ⁢ c 2 = R wherein Tr is the time of receipt of the first pulse of the response signal at the present transponder, Ts is the time of transmitting the first pulse of the interrogation signal by the present transponder, Tproc is the duration required for the interrogated transponder to process the interrogation signal, until transmitting the response signal; and the determining of the direction vector to the responding transponder made by by performing: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of a same response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the distance between the said two receiving antennas, and θ is the angle between the said direction vector and a line connecting said two receiving antennas 3. A transponder according to claim 1 comprising three receiving antennas that are disposed at tips of a triangle. 4. A transponder according to claim 3 for use by infantry soldier wherein the receiving antennas are disposed on the helmet of the soldier. 5. A transponder according to claim 4 wherein the receiving antennas are printed on the helmet. 6. A transponder according to claim 3 wherein the transmitting antenna being located at the center of the triangle. 7. A transponder according to claim 1 wherein the UWB transmitter and the transmitting antenna are formed by two cones, a charging circuitry for charging the cones, and a fast switch for discharging the cones in order to produce a UWB pulse. 8. A transponder according to claim 1, for use on a vehicle. 9. A transponder according to claim 8 comprising at least three receiving antennas and one transmitting antenna disposed at different locations on the vehicle. 10. A transponder according to claim 9 wherein the receiving antennas on the vehicle are omni-directional antennas. 11. A transponder according to claim 9 wherein the receiving antennas on the vehicle are directional antennas. 12. A transponder according to claim 9 wherein some of the receiving antennas on the vehicle are omni-directional antennas and some of the antennas are directional antennas, all arranged to cover the area of interest. 13. A transponder according to claim 1 having two modes of operations, an interrogating mode in which the transponder interrogates the identity, range, and azimuth of another transponder in the area of interest, and a responding mode in which the apparatus respond to an interrogation issued by another transponder. 14. A transponder according to claim 1 wherein each receiver is adapted to receive pulses of responding signal that are above a predefined threshold level, a level which is above the noise level. 15. A method for determining by an interrogating transponder the azimuth to an interrogated transponder, comprising the steps of: a. Providing within the interrogating transponder a transmitting antenna, and at least two receiving antennas, disposed away one from the other; b. Transmitting by the interrogating transponder a coded interrogation signal, comprising a plurality of UWB pulses; b. Receiving at the interrogated transponder the interrogating signal, producing a response UWB signal, and transmitting the same to the interrogated transponder; c. Receiving by at least two receiving antennas within the interrogating transponder said response UWB signal, and calculating the direction to the interrogated transponder by evaluating the time differences between arrivals of each response pulse to a plurality of receiving antennas. 16. A method according to claim 15, wherein the direction determination is made by: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of one response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the
FIELD OF THE INVENTION The invention relates to a system for distinguishing between friends and foes in a battlefield. The system of the invention can be used for locating friends in a battlefield, and is mostly for identifying between friends and foes in an on-ground battlefield. BACKGROUND OF THE INVENTION The need for distinguishing between friend and foe on a battlefield is of the utmost importance. The identification of forces is critical during operations of armed forces, but it also has civilian aspects, for example, when it is needed to identify and locate travelers under conditions of difficult terrain. The present invention provides a system and method for locating and identifying forces on a battlefield. Although the system and method is applicable in identifying ground mobile forces, airplanes, or navy vehicles, its most advantageous property lies in the locating and identifying of ground forces, vehicular or infantry forces, particularly when operating in rough terrain and difficult visibility. The following explanation will therefore relate particularly to the aspect of locating and identifying on ground forces, infantry and/or vehicular, in a battlefield. However, it should be kept in mind that the invention is not limited to such an application. The problem of locating and identifying friendly forces during operations of armed forces is complicated and well known for many years. There are many cases in which friendly forces were identified as foes (or vice versa), resulting in serious losses. Over the years, significant efforts have been made in order to solve this problem. Satisfactory solutions have been provided, particularly in the aerial battlefield. The main solutions that have been applied for aerial IFF are: 1. IFF Interrogation Use of predefined narrow band signals in predefined frequencies for transmission and receiving of IFF signals. A coded interrogation signal is sent to the interrogated object on a first frequency (e.g. 1030 MHz), and the interrogated object responds in another coded signal on a second frequency (e.g., 1090 MHz). The 1030 MHz and 1090 MHz are standard frequencies which have been assigned for civilian and military IFF applications. 2. Radar Interrogation: A tracking radar system sends a signal to a target which responds (or upon request) by transmitting a coded signal in the frequency of the radar (or another frequency), allowing the radar to identify whether the object is a friend or foe. As the radar has a narrow beam, in air applications in most cases only one airplane is found to be within the transmitted beam. In aerial applications, the density of the objects is low, the ranges are long, and there are no terrain disturbances. Therefore, the existing aerial systems are relatively satisfactory, and operate comparatively well. More specifically, a radar beam preferably “illuminates” one flying object at a time, so that its IFF response can be linked to a specific space location. The situation on the ground battlefield is much more complicated. The terrain is generally not covered by radar systems, as the terrain conditions do not allow it. In contrast to the aerial situation, in which the airplanes are essentially exposed to radar systems, the operation of ground forces is particularly based on concealed movement, finding firing positions, and identifying targets in the area. Identification mistakes, or navigation errors frequently result in firing on friendly forces. In infantry forces the problem is particularly acute, as these forces frequently move through rough terrain, and/or under difficult visual conditions. The most important requirement from an IFF system is to provide to the interrogator the location of all the friend forces which are within a firing range, with a very high level of certainty, and not to falsely identify any of the friends as foe, whether the reason for the false identification is resulted from accidental cause or intentional cause. Further important characteristics of a ground IFF system are: Covertness: The covertness is of particular importance in ground forces, for their survival. Therefore, it is essential that the interrogation signals do not reveal the interrogator location. This is different from the situation of an airplane, which is a large target distinct from its surroundings, transmitting in any case many electronic signals. Jamming Immunity: It is important that an IFF system for ground forces be invulnerable to disturbances from external sources. Operation in Any weather Conditions: It is essential for such a system to properly operate in fog, rain, smoke, dust, and under daylight and nighttime conditions. IFF systems for ground forces exist. Prior art systems can be distinguished by the following categories: a. Frequency Range for the Transmission/Reception: Optical: Such systems are generally laser or infrared operated, and require a line of sight, which does not always exist. Also, this operation is limited to good visibility conditions. Millimetric Waves: Systems operating in millimetric waves (generally in the range of 30 GHz-300 GHz) also require a line of sight. Furthermore, the resolution of such systems is limited, and they are relatively vulnerable to detection by enemy forces. If a narrow beam antenna is applied for obtaining good resolution, the scanning is required to cover the area, which lengthen the identification time, and might therefore be non-applicable for infantry. RF and Microwave Systems: Such systems generally operate in frequencies in the range of from several MHz up to a few GHz. These systems suffer from a relatively poor tracking, particularly as the infantry soldier cannot carry a large antenna. Furthermore, such systems are vulnerable to detection by enemy forces, and to masking. Regarding the manner of operation, there are systems applying active interrogators and passive responders, systems applying active interrogators and active responders, and systems using an active beacon that transmits continuously, with a plurality of passive receivers. There are some other systems that apply GPS for location. Each soldier (or vehicle) carries a GPS unit which determines his exact location. The location of each soldier is transmitted to a control center that receives the locations from all soldiers, and upon request, or when necessary, updates a specific soldier with the locations of all others. Such systems are also vulnerable to masking, as the frequencies of the GPS are public and known, are of narrow bands, and of relatively low amplitude. Also, the transfer of locations requires significant communications activity, which is undesirable in a battlefield. U.S. Pat. No. 5,748,891 and U.S. Pat. No. 6,002,708 disclose systems for locating that apply UWB (Ultra Wide Band) transmission and reception of coded signals. The accurate range measuring is provided thanks to the very large bandwidth. The coded transmission and reception enables identification of the responding apparatus. The system is based on an accurate range measuring between several base stations. If the number of stations is 5 or more, and all the ranges between the station are known, then it is possible to find their relative locations. The interrogating station applies a procedure calling to at least 4 other stations, identifies them, measures the range to each of them, and receives from them the ranges between them. In this manner the station can provide the relative location of the stations, but not the direction to them. In order to determine the direction to the stations, the direction to at least two stations not being on a same line with respect to the interrogating station must be determined. The drawback of said system is that a large amount of communication between stations is needed until the interrogator can determine the location of the responders with respect to himself. More particularly, not only the ranges from interrogator to the other stations is needed, but also the ranges between the other stations are required. All these ranges have to be transferred to the interrogator. In battlefield applications, these limitations are very significant. It is therefore an object of the invention to provide an IFF system for ground applications, particularly for ground forces, most particularly for infantry forces in a battlefield, but also for vehicular forces. It is another object of the invention to provide location of all friends in a battle zone, with a very high degree of certainty and very low probability of false identification. It is another object of the invention to provide a ground IFF system which is invulnerable to detection, interrupting, and/or masking. It is still another object of the invention to provide an IFF system, each apparatus of which can be carried by a single soldier. It is still another object of the invention to provide an IFF system that is capable of operating essentially in all weather and visibility conditions. It is still another object of the invention to provide an IFF system that does not require a line of sight in order to determine location and identification of other similar apparatuses. Other objects and advantages of the invention will become apparent as the description proceeds. SUMMARY OF THE INVENTION The present invention relates to an IFF transponder for ground applications, which comprises: (a) Encoder for forming an interrogating or response sequence of pulses, and conveying the same to a UWB transmitter; (b) A UWB transmitter for getting said interrogating or response sequence of pulses, forming a corresponding interrogating or response signal of a sequence of UWB pulses, and transmitting the same via a UWB transmitting antenna; (c) A plurality of UWB receiving antennas, disposed away one from the other, for receiving either an interrogating signal or a response signal sent by another transponder; (d) Decoder for getting from at least one of said UWB receiving antennas received signals, decoding the same, comparing the decoded signal with a bank of pre-stored signals, and determining whether a received signal is an interrogating or response signal; and (e) A processing unit for, upon receipt of a signal of response to an interrogation signal sent by the present transponder, calculating the location of the responding transponder by: (i) Determining the range by the time delays between the interrogating and response signals; (ii) Determining the direction vector to the responding transponder by the time differences between arrival of each response pulse to a plurality of receiving antennas; and (iii) Determining the identity of the responding transponder by checking the received sequence of UWB pulses, assuming that the sequence of each transponder is unique. Preferably, the determination of the range R to the responding transponder by performing: [ ( T r - T s ) - T proc ] ⁢ c 2 = R wherein Tr is the time of receipt of the first pulse of the response signal at the present transponder, Ts is the time of transmitting the first pulse of the interrogation signal by the present transponder, Tproc is the duration required for the interrogated transponder to process the interrogation signal, until transmitting the response signal; and the determining of the direction vector to the responding transponder made by by performing: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of a same response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the distance between the said two receiving antennas, and θ is the angle between the said direction vector and a line connecting said two receiving antennas. Preferably, the transponder comprises three receiving antennas that are disposed at tips of a triangle. In an embodiment of the invention the transponder is used by an infantry soldier wherein the receiving antennas are disposed on the helmet of the soldier. In an embodiment of the invention the receiving antennas are printed on the helmet. In an embodiment of the invention the transmitting antenna is located at the center of the triangle. In an embodiment of the invention, the UWB transmitter and the transmitting antenna are formed by two cones, a charging circuitry for charging the cones, and a fast switch for discharging the cones in order to produce a UWB pulse. The transponder can also be installed and on a vehicle. In that case, an embodiment of the transponder comprises at least three receiving antennas and one transmitting antenna disposed at different locations on the vehicle. In still an embodiment of the invention, the receiving antennas on the vehicle are omni-directional antennas. Alternatively, the receiving antennas on the vehicle can be directional antennas. In still another embodiment, some the receiving antennas on the vehicle are omni-directional antennas and some of the antennas are directional antennas, all arranged to cover the area of interest. Preferably, the transponder has two modes of operations, an interrogating mode in which the transponder interrogates the identity, range, and azimuth of another transponder in the area of interest, and a responding mode in which the apparatus respond to an interrogation issued by another transponder. Preferably, each receiver of the transponder is adapted to receive pulses of responding signal that are above a predefined threshold level, a level which is above the noise level. The present invention also relates to a method for determining by an interrogating transponder the azimuth to an interrogated transponder, that comprises the steps of: (a) Providing within the interrogating transponder a transmitting antenna, and at least two receiving antennas, disposed away one from the other; (b) Transmitting by the interrogating transponder a coded interrogation signal, comprising a plurality of UWB pulses; (c) Receiving at the interrogated transponder the interrogating signal, producing a response UWB signal, and transmitting the same to the interrogated transponder; and (d) Receiving by at least two receiving antennas within the interrogating transponder said response UWB signal, and calculating the direction to the interrogated transponder by the time differences between arrivals of each response pulse to a plurality of receiving antennas. In an embodiment of the method of the invention, the direction determination is made by: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of one response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the distance between the said two receiving antennas, and θ is the angle between the said direction vector and a line connecting said two receiving antennas, assuming d<<R, wherein R is the distance between the interrogating transponder and the interrogated transponder. BRIEF DESCRIPTION OF THE DRAWINGS In the drawings: FIG. 1 illustrates in block diagram form a general structure of an IFF apparatus 1, according to one embodiment of the invention; FIG. 2 shows an exemplary positioning of the four antennas T, R1, R2, and R3 on a soldier's helmet 20, according to an embodiment of the invention; FIG. 3 illustrates how the azimuth to an interrogated apparatus is determined by the interrogating apparatus, having, in this case two receiving antennas; FIG. 4 illustrates how the uncertainty in the location of the object is resolve by adding a third receiving antenna, forming a triangle with the other two receiving antennas; FIG. 5A illustrates the structure of the transmitting portion of the IFF apparatus, according to one embodiment of the invention; FIG. 5B illustrates a possible structure of the UWB transmitter and transmitting antenna, according to one embodiment of the invention; FIG. 6 illustrates the operation of one of the receivers included in the IFF apparatus; FIG. 7A provides a top view of a battlefield vehicle, in which the positioning of the three receiving antennas and one transmitting antenna according to an embodiment of the invention is indicated; FIG. 7B shows an arrangement for a battlefield vehicle, with 4 directional receiving antennas, and one omni-directional transmitting antenna; and FIG. 7B shows an arrangement for a battlefield vehicle, with 8 directional receiving antennas, and one omni-directional transmitting antenna. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS FIG. 1 illustrates in block diagram form a general structure of an IFF apparatus 1, according to one embodiment of the invention. According to the present invention, each IFF apparatus comprises a UWB transmitter T that transmits a coded interrogating signal (I-signal) from an omni-directional transmitting-antenna 12, and preferably three receivers R1, R2, and R3, receiving a coded response signal (R-signal) from friendly IFF apparatuses of soldiers or vehicles in an area of interest. Each receiver R1, R2, and R3 receives separately the response signal, via receiving-antennas 13, 14, and 15 respectively. The three receiving antennas 13, 14, and 15 are disposed at different locations on the object carrying the interrogating apparatus, in order to enable the receiver to measure the different arrival timing of the received signal to each of the said antennas with respect to the time of the transmitted signal. Preferably, receiving antennas 13, 14, 15 are not positioned on a same straight line. In one embodiment of the invention, when the IFF apparatus is a personal apparatus for an infantry soldier, the transmitting antenna 12 and the three receiving antennas 13, 14, and 15, are preferably disposed at the outer surface of the helmet of the soldier. If the apparatus is assembled on a vehicle, the said four antennas are disposed at different locations of the vehicle. It should be noted that in order to obtain best location resolution, it is preferable to dispose the receiving antennas 13, 14, and 15 as far as possible one from another. Therefore, generally the said receiving antennas are disposed along the periphery of either the helmet or the vehicle. Each receiver also receives a sample 3 of the transmitting signal, allowing it to measure the time difference between the transmitted signal and the received signal at that receiver. The measured three time differences 16, 17, and 18 are conveyed to a processing module 4, that calculates from the time differences, and the known relative locations of the three receiving antennas one with respect to the others, and of the transmitting antenna, the azimuth to the relevant responding apparatus in the area of interest. Furthermore, the range to the responding apparatus is calculated by the processing module 4. The calculated location/s 19 are then provided to a display 5, and displayed. When the transponder operates in an interrogated mode, an interrogating signal which comprises a plurality of UVB pulses is received by at least one of the receivers, for example R3. The signal is then processed in the processing module, and when identified as an interrogating signal, a timing signal 24 is provided to the transmitter T to produce a coded response signal that comprises a plurality of UWB pulses. The response signal is also transmitted from antenna 12. FIG. 2 shows an exemplary positioning of the four antennas T, R1, R2, and R3 on a soldier's helmet 20. The three receiving antennas R1, R2, and R3 are preferably positioned equilateral on the helmet. It is important not to position all the three receiving antennas on a same straight line. The transmitting antenna T is preferably positioned at a location away from each of the three receiving antennas, preferably at the center of the helmet. In order to distinguish between separate responders that may be located in a same area, according to the present invention the transmitting signal, and the received signals are coded. For example, there may be defined at the transmitter T a separate code for each apparatus in the area. When a response is received, the interrogating apparatus compares the code of the received signal to a predefined list of codes, thereby determining from which responding apparatus in the area the signal is received. For the sake of simplicity, it will be assumed hereinafter that the I-signal is common, and is the same for all the apparatuses in the area. The R-signal is however unique for each IFF apparatus. The operation of the IFF system of the present invention is based on the transmission and reception of series of very short UWB pulses. By its basic nature, a UWB pulse carries very little information at the frequency domain. Its useful information, however, is the timing of the pulse. Therefore, according to the present invention the I-signals and the R-signals are corresponding series of pulses that are coded by their timing. For example, if the I-signal comprises three UWB pulses, that are transmitted at t1, t2, and t3 respectively, the differences between these three times may form a code. For example, the above three-pulse I-signal comprises two time differences: ΔT1=T1−T2; and ΔT2=T3−T2. If, for example, ΔT1; ΔT2≦Tmax and each pulse duration is τ, the number of possible codes in this case is ( T max τ ) 2 . For n pulses in a coded signal, the number of possible codes is ( T max τ ) n - 1 . The operation of the system begins by one of the apparatuses sending an interrogation signal (I-signal), that as said comprises a coded series of UWB pulses. This series is received by at least one receiver (R1, R2, or R3) of an interrogated apparatus, which upon decoding the signal an identifying that it is an interrogation signal, responds by transmitting from its transmitter T a coded R-signal which is preferably unique to that apparatus. Then, the interrogating apparatus performs a process for determining the identity of the interrogated apparatus, the range to that apparatus, and the azimuth to the apparatus. The identity of the interrogated apparatus is determined by decoding and checking at the interrogating apparatus the coded received signal. More particularly, the existence of the pulses within R-signal, as received is checked, and the timing of each pulse within the signal. The range R to the object is determined by performing the following calculation: [ ( T r - T s ) - T proc ] ⁢ c 2 = R , wherein Tr is the time of receipt of the first pulse of the R-signal at the interrogating apparatus, Ts is the time of transmitting (sending) the first pulse of the I-signal by the interrogating apparatus, Tproc is the duration required for the interrogated apparatus to process the I signal, until transmitting the R-signal. More particularly, this is the duration from the receipt of the first pulse of the I-signal by the interrogated apparatus, until the transmission of the first pulse of the R-signal by the interrogated apparatus. This duration is generally assumed to be constant, and is stored within the interrogating apparatus for that range calculation. The term c indicates the speed of light. FIG. 3 illustrates how the azimuth to an interrogated apparatus 60 is determined by the interrogating apparatus 61, having, in this case two receiving antennas R1 and R2. The distance between the two receiving antennas is indicated by d. As the distance R between the interrogated apparatus 60 and the interrogating apparatus 61 is much greater than the distance d, i.e., R<<d, it can be assumed the front of the electromagnetic wave due to the response transmitted by apparatus 60 is essentially planar when reaching the interrogating apparatus 61. Therefore, the front of the wave is indicated in FIG. 3 by straight lines 62. The object of the interrogating apparatus is to determine a direction vector 63 directing to the interrogated apparatus 60, or more particularly, a vector 63 forming a 90° angle with the front 60 of the response wave. The interrogating apparatus determines the time of arrival of the first pulse of the response to its first antenna R1 and to its second antenna R2. Generally, the front of the response wave does not arrive at a same time into antennas R1 and R2. In the example of FIG. 3, the front of the wave arrives R1 slightly before it arrives R2. The arrival time difference ΔT=T1−T2 is determined, wherein, T1 indicates the time of arrival of the front to R1, and T2 is the time of arrival to antenna R2, and is used to determine the direction vector 63. Therefore, cΔT indicates the distance that the wave travels during ΔT. Therefore, the angle θ can be determined by: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d . In FIG. 3 it is shown how to find the direction to the interrogated apparatus. However, when only two antennas R1 and R2 are used, the may be uncertainty regarding the direction to the interrogated apparatus. Upon calculating the angle θ, the direction to the interrogated apparatus may be erroneously assumed to be as indicated by the direction vector 64, also forming an angle θ with respect to the line connecting R1 and R2. This uncertainty is resolve by adding a third receiving antenna, R3, forming a triangle with R1 and R2, as shown in FIG. 4. In the example as discussed in FIG. 3, it is clear that a wave front coming from the direction 63 will pass R3 before it passes R1. However, a wave front coming from a direction 64 will pass the antenna R3 only after it passes R1. Therefore, a consideration of the time of arrival to the third antenna R3, with respect to the time arrival to the other antennas R1 and R2, provides means for resolving this direction uncertainty. Therefore, although in some cases two receiving antennas may suffice in order to determine with enough certainty the direction (for example, a prior knowledge regarding the possible location of the one who carries the interrogated apparatus may help), in a preferable embodiment of the invention three antennas are used. In still another embodiment, when a determination of a spatial direction to an apparatus is necessary, use of a fourth antenna, located in a plane different than the plane of the other three antennas is required, and the determination of the direction is carried out essentially in a same manner. The operation of the system starts when one of the apparatuses sends an interrogating coded series of UWB pulses. The series is received at at least one receiver of each of the friend apparatuses in the area surrounding the interrogator, up to a maximum range depending on the design of the specific apparatus and the ground conditions. Each friend apparatus identifies a code of the interrogating friend, and responds with a transmission of a coded series of UWB pulses delayed by a delay known to all friends. The interrogating apparatuses receive all the responses from all friends and identify them according to their specific codes. The interrogating apparatus can now calculate the range and azimuth to each friend apparatus. The range is calculated from the total time delay between transmitting the I-code and receiving the R-code from the responder. The azimuth is calculated from the time differences of the arrival of each pulse to the three receiving antennas. FIG. 5A illustrates the structure of the transmitting portion of the IFF apparatus 1, according to one embodiment of the invention. As said, the IFF apparatus may have two modes of operations, a first mode operating as an interrogating apparatus, and a second mode operating as an interrogated apparatus. Therefore, the Encoder E is designed to initiate at least two distinct codes, an interrogating code, or a responding code respectively, according to the mode of operation as provided by the MODE line 28 coming from the processing module. The processing module also provides to the encoder the timing 27 for the corresponding code creation. In the case of an interrogating mode, the actual timing of the code creation is provided to the processing module 4 by line 29 for the range and direction determination. The code is then provided to the UWB pulse transmitter T. The transmission by the system applies a UWB technology. UWB technology deals with the transmission and reception of wide-band signals. A conventional definition of a UWB transmission is a case in which the relation between the band spectrum divided by the central frequency of the spectrum is above 25%. A pulse having four cycles corresponds to a bandwidth of 25%. While such a pulse can be used, a mono-cycle pulse is preferable in the present invention, since it is the shortest, giving better timing and less spectral signature (covertness). A possible structure of the UWB transmitter T and transmitting antenna 12, according to one embodiment of the invention, is shown in FIG. 5B. The transmitter and antenna comprise of a charging module 70, fast switch 72, and a wide band “bi-cone” antenna 12 made of two cones 12a and 12b. The tips of said two cones are positioned in close proximity. In order to create a UWB pulse, the charging circuitry 70 charges the two cones 12a and 12b with opposite polarity charge. Then, the switch is closed to allow a flow of current between the two charged cones. This current radiates omni-directionally a UWB pulse. This type of antenna is known in the art as bi-conical antenna. Obviously, there are known in the art other ways and means that are capable of producing UWB pulses. FIG. 6 illustrates the operation of one of the receivers included in the IFF apparatus. Numeral 13 indicates the UWB antenna of the receiver. Amplifier 84 is a very broad-band amplifier, which amplifies the received signal. The amplified signal is then conveyed into a threshold detector 85 that transfers only pulses above a predefined threshold level to decoder 86. Furthermore, when a pulse above the threshold level is detected, a signal 87 indicating the timing of the pulse is transferred into the processing module 4. As said, the IFF apparatus can operate in two modes. The processing apparatus indicates to the decoder by signal 92 the mode of operation, i.e., interrogating or interrogated. Whenever the apparatus operates in the interrogated mode, the decoder looks for a received sequence of pulses as assigned for the interrogating code. The decoder particularly checks the time of appearance of each pulse within the sequence, and tries to find matching to an interrogating signal. Whenever such a matching is found, the decoder conveys a signal 93 to the processing module 4, which in turn initiates a transmission of a response signal by providing to the encoder E of the transmitting portion a timing signal 94. Whenever the apparatus operates in an interrogating mode, the timing of each received pulse is conveyed via line 87 into the processing module 4. The decoder compares each received sequence with a bank of stored codes. When the decoder detects that the received signal relates to a response sequence, generally the timing of the first pulse of the response sequence is used for determining the range and the azimuth to the interrogated apparatus, as described above. As said, the processing module can calculate the range to the interrogated apparatus by means of having the timing of the first pulse (or another, as defined) of a response sequence as received at one of the receivers. However, in order to calculate the direction to the interrogated apparatus, the processing module uses the timing of receipt of said pulse at at least two, and preferably three of such receivers. The use of a wide-band pulse in the system of the invention allows a very good resolution. For example, in a pulse having duration T, the range resolution in an air medium is about cT. For example, use of a pulse of 1 nsec enables a range resolution of 0.3 m. If the rising period of the pulse is short, for example, in a 1 nsec pulse of one cycle, the rising duration from zero to maximum is 0.25 nsec, which is comparable to a range resolution of about 7.5 cm. EXAMPLE 1 System for an Infantry IFF a one period pulse is transmitted, The uncertainty in determining the azimuth depends on the rising time of the pulse. For example, if a pulse with a rising time of Rp=0.25 nsec is used, during this time a response pulse passes a range of D=c·Rp=7.5 cm. If the distance between the two receiving antennas is 30 cm, the angle resolution is about arcsin 7.5 30 = 15 ⁢ ° . As said, the third antenna is used in order to obtain unequivocal direction to the interrogated object, as when two antennas are used, a 180° symmetry exists, which does not allow determination of the position. For this reason, the three receiving antennas are not located on a same straight line. FIG. 7A provides a top view of a battlefield vehicle 100, in which the positioning of the three receiving antennas R and one transmitting antenna T is indicated. In the case of vehicles, there exist requirements for a capability for a longer range, up to several kilometers, and for a better angular resolution in comparison with the infantry system. Therefore, in some cases more than 3 receiving antennas may be used. More particularly, 4 directional receiving antennas, as shown in FIG. 7B, or even 8 directional receiving antennas as shown in FIG. 7C may be used. In some cases, use of directional antennas may be applied, such that, for example, each two directional antennas cover 180° of the area. In that case, the exact location can be obtained by using only two directional receiving antennas each time. The omni-directional transmitting antenna in all cases is preferably raised, and positioned at the center of the vehicle. EXAMPLE 2 System for Battlefield Vehicles As said, the angular resolution is a function of the distance between the receiving antennas. In a battlefield vehicle, the distance between two receiving antennas can reach 3 meters. For a 1 nsec monocycle pulse, the angular resolution is arcsin 7.5 300 = 1.5 ⁢ ° , or more particularly, at a 1 km distance, the uncertainty in the location of the vehicle is about 26 meters, which is reasonable. If a better resolution is desired, a shorter pulse should be used. In the case of battlefield vehicles, the number of interrogations can be reduced. For example, one vehicle may perform a single interrogation, the responses will be received by all the vehicles in the area, and from these each vehicle will be able to determine the direction to each other responding vehicles. The range cannot be determined. This mode of operation is preferable, as it involves a minimum number of interrogations. In still another mode of operation, an additional step is added, in which after the first interrogation by a first vehicle, all the other vehicles respond in a specific code, after that, the first vehicle again responds to each of the vehicles in another specific code. In this case, each vehicle is able to find the location of the first vehicle with respect to itself, and also the location of all the other vehicles. The above manners of operation can also be applied by infantry forces. The reduction of the number of transmissions is important for obtaining covertness, especially in the battlefield. The invention provides a system by which each apparatus can identify and locate independently other similar apparatuses. The apparatuses of the invention require for fulfilling said objectives only the transmission of the response code and does not require any additional location data from any other apparatus, as is required, for example by the systems of U.S. Pat. No. 5,748,891, and U.S. Pat. No. 6,002,708 (Aether Wire & Location Inc.). The systems of said two patents, which are spread spectrum based, require data from a GPS, or have to perform a very complicated timing procedure, as described in page 9, of U.S. Pat. No. 5,748,891 (“ranging protocol”). The issue of timing in spread spectrum system is known to be essential. In spread spectrum systems the communication assumes the receipt of information below the noise level, while a procedure involving integration and correlation of the received signal enables recovery of the data. In a noisy environment, such as a battlefield, a low power communication is vulnerable to disturbances. The system of the invention assumes reception above the noise level, which, although requires higher power transmission, is less vulnerable. The system of the invention is further more immune to interferences, due to the use of a relatively high power transmission (relative to spread spectrum transmission) and very wide spectrum. One who wishes to interfere with the system has not only to transmit in a higher power (relative to case of spread spectrum transmission), but also provide said transmission in a very wide spectrum. As the timing of the transmission by the apparatuses of the invention is not known to the interrupting entity, it has to transmit a high power, all the time, and in a very wide spectrum, which is generally impossible. A good level of covertness of the system of the invention is obtained also by means of the use of very short pulses, in the range of about 1 nsec, which include very few cycles, preferably one. It is very hard to track such type of pulse transmission. Also, similar short pulses are generally produced by atmospheric activities, operation of man-made objects, or other human activities. However, only the means which have the timing code can differentiate between environmental noise and interrogating signals. It should be further noted that the present invention is differentiated from the prior art systems, as disclosed in U.S. Pat. No. 5,748,891, and U.S. Pat. No. 6,002,708, also by the way of determining the location of the interrogated object. While the said systems of the prior art require communication with at least 4 other stations in order to determine the location, according to the present invention the location is determined by means of one transmitting antenna and three receiving antennas, with no need for communications between the different interrogating units. The system of the invention is also highly immune to reflections. The ground environment generally contains many reflecting objects. The system of the invention applies short pulses and it considers only the pulse that arrives first at its receiver (which obviously traveled the shortest route), the other signals due to reflections, which travel a longer route, are ignored. Systems which are based on spread spectrum have to check more pulses, and therefore are more sensitive to reflections.
<SOH> BACKGROUND OF THE INVENTION <EOH>The need for distinguishing between friend and foe on a battlefield is of the utmost importance. The identification of forces is critical during operations of armed forces, but it also has civilian aspects, for example, when it is needed to identify and locate travelers under conditions of difficult terrain. The present invention provides a system and method for locating and identifying forces on a battlefield. Although the system and method is applicable in identifying ground mobile forces, airplanes, or navy vehicles, its most advantageous property lies in the locating and identifying of ground forces, vehicular or infantry forces, particularly when operating in rough terrain and difficult visibility. The following explanation will therefore relate particularly to the aspect of locating and identifying on ground forces, infantry and/or vehicular, in a battlefield. However, it should be kept in mind that the invention is not limited to such an application. The problem of locating and identifying friendly forces during operations of armed forces is complicated and well known for many years. There are many cases in which friendly forces were identified as foes (or vice versa), resulting in serious losses. Over the years, significant efforts have been made in order to solve this problem. Satisfactory solutions have been provided, particularly in the aerial battlefield. The main solutions that have been applied for aerial IFF are: 1. IFF Interrogation Use of predefined narrow band signals in predefined frequencies for transmission and receiving of IFF signals. A coded interrogation signal is sent to the interrogated object on a first frequency (e.g. 1030 MHz), and the interrogated object responds in another coded signal on a second frequency (e.g., 1090 MHz). The 1030 MHz and 1090 MHz are standard frequencies which have been assigned for civilian and military IFF applications. 2. Radar Interrogation: A tracking radar system sends a signal to a target which responds (or upon request) by transmitting a coded signal in the frequency of the radar (or another frequency), allowing the radar to identify whether the object is a friend or foe. As the radar has a narrow beam, in air applications in most cases only one airplane is found to be within the transmitted beam. In aerial applications, the density of the objects is low, the ranges are long, and there are no terrain disturbances. Therefore, the existing aerial systems are relatively satisfactory, and operate comparatively well. More specifically, a radar beam preferably “illuminates” one flying object at a time, so that its IFF response can be linked to a specific space location. The situation on the ground battlefield is much more complicated. The terrain is generally not covered by radar systems, as the terrain conditions do not allow it. In contrast to the aerial situation, in which the airplanes are essentially exposed to radar systems, the operation of ground forces is particularly based on concealed movement, finding firing positions, and identifying targets in the area. Identification mistakes, or navigation errors frequently result in firing on friendly forces. In infantry forces the problem is particularly acute, as these forces frequently move through rough terrain, and/or under difficult visual conditions. The most important requirement from an IFF system is to provide to the interrogator the location of all the friend forces which are within a firing range, with a very high level of certainty, and not to falsely identify any of the friends as foe, whether the reason for the false identification is resulted from accidental cause or intentional cause. Further important characteristics of a ground IFF system are: Covertness: The covertness is of particular importance in ground forces, for their survival. Therefore, it is essential that the interrogation signals do not reveal the interrogator location. This is different from the situation of an airplane, which is a large target distinct from its surroundings, transmitting in any case many electronic signals. Jamming Immunity: It is important that an IFF system for ground forces be invulnerable to disturbances from external sources. Operation in Any weather Conditions: It is essential for such a system to properly operate in fog, rain, smoke, dust, and under daylight and nighttime conditions. IFF systems for ground forces exist. Prior art systems can be distinguished by the following categories: a. Frequency Range for the Transmission/Reception: Optical: Such systems are generally laser or infrared operated, and require a line of sight, which does not always exist. Also, this operation is limited to good visibility conditions. Millimetric Waves: Systems operating in millimetric waves (generally in the range of 30 GHz-300 GHz) also require a line of sight. Furthermore, the resolution of such systems is limited, and they are relatively vulnerable to detection by enemy forces. If a narrow beam antenna is applied for obtaining good resolution, the scanning is required to cover the area, which lengthen the identification time, and might therefore be non-applicable for infantry. RF and Microwave Systems: Such systems generally operate in frequencies in the range of from several MHz up to a few GHz. These systems suffer from a relatively poor tracking, particularly as the infantry soldier cannot carry a large antenna. Furthermore, such systems are vulnerable to detection by enemy forces, and to masking. Regarding the manner of operation, there are systems applying active interrogators and passive responders, systems applying active interrogators and active responders, and systems using an active beacon that transmits continuously, with a plurality of passive receivers. There are some other systems that apply GPS for location. Each soldier (or vehicle) carries a GPS unit which determines his exact location. The location of each soldier is transmitted to a control center that receives the locations from all soldiers, and upon request, or when necessary, updates a specific soldier with the locations of all others. Such systems are also vulnerable to masking, as the frequencies of the GPS are public and known, are of narrow bands, and of relatively low amplitude. Also, the transfer of locations requires significant communications activity, which is undesirable in a battlefield. U.S. Pat. No. 5,748,891 and U.S. Pat. No. 6,002,708 disclose systems for locating that apply UWB (Ultra Wide Band) transmission and reception of coded signals. The accurate range measuring is provided thanks to the very large bandwidth. The coded transmission and reception enables identification of the responding apparatus. The system is based on an accurate range measuring between several base stations. If the number of stations is 5 or more, and all the ranges between the station are known, then it is possible to find their relative locations. The interrogating station applies a procedure calling to at least 4 other stations, identifies them, measures the range to each of them, and receives from them the ranges between them. In this manner the station can provide the relative location of the stations, but not the direction to them. In order to determine the direction to the stations, the direction to at least two stations not being on a same line with respect to the interrogating station must be determined. The drawback of said system is that a large amount of communication between stations is needed until the interrogator can determine the location of the responders with respect to himself. More particularly, not only the ranges from interrogator to the other stations is needed, but also the ranges between the other stations are required. All these ranges have to be transferred to the interrogator. In battlefield applications, these limitations are very significant. It is therefore an object of the invention to provide an IFF system for ground applications, particularly for ground forces, most particularly for infantry forces in a battlefield, but also for vehicular forces. It is another object of the invention to provide location of all friends in a battle zone, with a very high degree of certainty and very low probability of false identification. It is another object of the invention to provide a ground IFF system which is invulnerable to detection, interrupting, and/or masking. It is still another object of the invention to provide an IFF system, each apparatus of which can be carried by a single soldier. It is still another object of the invention to provide an IFF system that is capable of operating essentially in all weather and visibility conditions. It is still another object of the invention to provide an IFF system that does not require a line of sight in order to determine location and identification of other similar apparatuses. Other objects and advantages of the invention will become apparent as the description proceeds.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention relates to an IFF transponder for ground applications, which comprises: (a) Encoder for forming an interrogating or response sequence of pulses, and conveying the same to a UWB transmitter; (b) A UWB transmitter for getting said interrogating or response sequence of pulses, forming a corresponding interrogating or response signal of a sequence of UWB pulses, and transmitting the same via a UWB transmitting antenna; (c) A plurality of UWB receiving antennas, disposed away one from the other, for receiving either an interrogating signal or a response signal sent by another transponder; (d) Decoder for getting from at least one of said UWB receiving antennas received signals, decoding the same, comparing the decoded signal with a bank of pre-stored signals, and determining whether a received signal is an interrogating or response signal; and (e) A processing unit for, upon receipt of a signal of response to an interrogation signal sent by the present transponder, calculating the location of the responding transponder by: (i) Determining the range by the time delays between the interrogating and response signals; (ii) Determining the direction vector to the responding transponder by the time differences between arrival of each response pulse to a plurality of receiving antennas; and (iii) Determining the identity of the responding transponder by checking the received sequence of UWB pulses, assuming that the sequence of each transponder is unique. Preferably, the determination of the range R to the responding transponder by performing: [ ( T r - T s ) - T proc ] ⁢ c 2 = R wherein T r is the time of receipt of the first pulse of the response signal at the present transponder, T s is the time of transmitting the first pulse of the interrogation signal by the present transponder, T proc is the duration required for the interrogated transponder to process the interrogation signal, until transmitting the response signal; and the determining of the direction vector to the responding transponder made by by performing: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of a same response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the distance between the said two receiving antennas, and θ is the angle between the said direction vector and a line connecting said two receiving antennas. Preferably, the transponder comprises three receiving antennas that are disposed at tips of a triangle. In an embodiment of the invention the transponder is used by an infantry soldier wherein the receiving antennas are disposed on the helmet of the soldier. In an embodiment of the invention the receiving antennas are printed on the helmet. In an embodiment of the invention the transmitting antenna is located at the center of the triangle. In an embodiment of the invention, the UWB transmitter and the transmitting antenna are formed by two cones, a charging circuitry for charging the cones, and a fast switch for discharging the cones in order to produce a UWB pulse. The transponder can also be installed and on a vehicle. In that case, an embodiment of the transponder comprises at least three receiving antennas and one transmitting antenna disposed at different locations on the vehicle. In still an embodiment of the invention, the receiving antennas on the vehicle are omni-directional antennas. Alternatively, the receiving antennas on the vehicle can be directional antennas. In still another embodiment, some the receiving antennas on the vehicle are omni-directional antennas and some of the antennas are directional antennas, all arranged to cover the area of interest. Preferably, the transponder has two modes of operations, an interrogating mode in which the transponder interrogates the identity, range, and azimuth of another transponder in the area of interest, and a responding mode in which the apparatus respond to an interrogation issued by another transponder. Preferably, each receiver of the transponder is adapted to receive pulses of responding signal that are above a predefined threshold level, a level which is above the noise level. The present invention also relates to a method for determining by an interrogating transponder the azimuth to an interrogated transponder, that comprises the steps of: (a) Providing within the interrogating transponder a transmitting antenna, and at least two receiving antennas, disposed away one from the other; (b) Transmitting by the interrogating transponder a coded interrogation signal, comprising a plurality of UWB pulses; (c) Receiving at the interrogated transponder the interrogating signal, producing a response UWB signal, and transmitting the same to the interrogated transponder; and (d) Receiving by at least two receiving antennas within the interrogating transponder said response UWB signal, and calculating the direction to the interrogated transponder by the time differences between arrivals of each response pulse to a plurality of receiving antennas. In an embodiment of the method of the invention, the direction determination is made by: cos ⁢ ⁢ θ = c ⁢ ⁢ Δ ⁢ ⁢ T d wherein ΔT indicates the time difference of receipt of one response pulse at a first receiving antenna and at a second receiving antenna, c is the speed of light, d is the distance between the said two receiving antennas, and θ is the angle between the said direction vector and a line connecting said two receiving antennas, assuming d<<R, wherein R is the distance between the interrogating transponder and the interrogated transponder.
20040309
20060516
20050616
62509.0
0
GREGORY, BERNARR E
FRIEND/FOE IDENTIFICATION SYSTEM FOR A BATTLEFIELD
UNDISCOUNTED
0
ACCEPTED
2,004
10,797,291
ACCEPTED
Audio-video signal transceiving processing device
An audio-video (AV) signal transceiving processing device which includes a AV decoder, a bridge, and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The AV decoder is used to receive an analog video signals and a corresponding analog audio signal, and output a first digital video signal and a corresponding first digital audio signal. The bridge is used to receive the first digital video signal and the first digital audio signal, and output a second digital video signal and a second digital audio signal, which are compliant to a bus interface standard, to a computer through a bus interface that is compliant to the bus interface standard.
1. An audio-video (AV) signal transceiving processing device, comprising: an AV decoder for receiving an analog video signal and a corresponding analog audio signal, and outputting a first digital audio signal and a corresponding first digital audio signal; and a bridge for receiving the first digital video signal and the first audio signal and outputting a second video signal and a second audio signal, which are compliant to a bus interface standard, to a computer through a bus interface compliant to the bus interface standard; wherein the bus interface is a PCMCIA, CardBus or Express Card bus interface. 2. The AV signal transceiving processing device according to claim 1, wherein the computer encodes the received second video signal and the second audio signal into a third digital AV signal. 3. The AV signal transceiving processing device according to claim 2, wherein the third digital AV signal is a Mpeg2 AV signal. 4. The AV signal transceiving processing device according to claim 1, wherein the AV decoder decodes the received analog audio signal into at least an analog right channel audio signal and an analog left channel audio signal, and the AV decoder converts the analog right channel audio signal and the analog left channel audio signal into a digital left and right channel audio signal which is then outputted to the bridge. 5. The AV signal transceiving processing device according to claim 1, wherein the AV signal transceiving processing device further comprises: a tuner for receiving a analog television (TV) AV signal, and outputting the analog video signal and the analog audio signal to the AV decoder when tuned. 6. The AV signal transceiving processing device according to claim 1, wherein the analog video signal is an analog S video signal, and the analog audio signal includes at least an analog right channel audio signal and an analog left channel audio signal, both of which correspond to the analog S video signal. 7. The AV signal transceiving processing device according to claim 1, wherein the analog video signal is an analog V video signal, and the analog audio signal includes at least an analog right channel audio signal and an analog left channel audio signal, both of which correspond to the analog V video signal. 8. The AV signal transceiving processing device according to claim 1, wherein the bridge can also receive a forth digital AV signal from a digital signal source, which is different to the AV decoder, and convert the forth digital AV signal into a fifth digital AV signal, which is compliant to the bus interface standard, that is then outputted to the computer through the bus interface. 9. The AV signal transceiving processing device according to claim 8, wherein the forth digital AV signal includes a transport stream (TS) AV signal, a Mpeg2 AV signal, or any other types of digital AV signal. 10. The AV signal transceiving processing device according to claim 1, wherein the bridge can also receive a first digital broadcasting signal from a digital signal source different to the AV decoder, and convert the first digital broadcasting signal into a second digital broadcasting signal, which is compliant to the bus interface standard, that is the outputted to the computer through the bus interface. 11. The AV signal transceiving processing device according to claim 1, wherein the AV decoder can also receive an analog broadcasting signal and output a digital broadcasting signal to the bridge accordingly. 12. The AV signal transceiving processing device according to claim 11, wherein the AV signal transceiving processing device further comprises: a tuner for receiving an analog frequency modulation (FM) broadcasting signal and outputting the analog broadcasting signal when tuned. 13. The AV signal transceiving processing device according to claim 1, wherein the computer is a desktop computer or a notebook computer. 14. The AV signal transceiving processing device according to claim 1, wherein the analog audio signal includes an analog left channel audio signal and an analog right channel audio signal. 15. An audio-video (AV) signal transceiving processing device comprising a bridge for receiving a first digital AV signal and converting the first digital AV signal into a second digital AV signal, which is compliant to a bus interface standard, wherein the second digital AV signal is then outputted to a computer through a bus interface compliant to the bus interface standard, wherein the bus interface is a PCMCIA, CardBus or Express Card bus interface. 16. The AV signal transceiving processing device according to claim 15, wherein the first digital AV signal includes a transport stream AV signal, a Mpeg2 AV signal, or any other type of digital AV signal. 17. The AV signal transceiving processing device according to claim 15 wherein the computer is a desktop computer or a notebook computer. 18. An audio-video (AV) signal transceiving processing device comprising a bridge for receiving a first digital broadcasting signal and coverting the first digital broadcasting signal into a second digital broadcasting signal, which is compliant to a bus interface standard, wherein the second digital broadcasting signal is then outputted to a computer through a bus interface compliant to the bus interface standard, wherein the bus interface is a PCMCIA, CardBus or Express Card bus interface. 19. The AV signal transceiving processing device according to claim 18 wherein the computer is a desktop computer or a notebook computer.
This application claims the benefit of Taiwan application Serial No. 93103998, filed Feb. 18, 2004, the subject matter of which is incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The invention relates in general to a type of audio-video signal transceiving processing device and more particularly to a type of audio-video signal transceiving processing device that decodes received analog video signals and analog audio signals into digital video signals and digital audio signals and outputs them to the computer. 2. Description of the Related Art In technology advanced era nowadays, computers have become an indispensable part of the everyday life of modern people. Because computers can only play digital audio-video (AV) signals, analog signals from television (TV) stations can not be played directly on computers. Therefore, some manufactures developed AV signal transceiving processing devices which can transform the analog signals into digital signals that can be played on computers. Widely used AV signal transceiving processing devices nowadays are TV tuner cards, which are also called TV capture cards. The user can view the television signal on the computer monitor by having a TV tuner card. However, ordinary TV tuner cards have PCI interface. They are mainly used in desktop personal computers (PCs), and do not support hot plug. In the other hand, a new type of TV tuner cards have CardBus bus interface, and are mainly used in laptop PCs (as shown in FIG. 1). They do support hot plug, but they use hardware encoding method to process signals, therefore require more hardware components and have higher cost. Please refer to FIG. 1 which is a circuit block diagram of traditional AV signal transceiving processing device. In FIG. 1, AV signal transceiving processing device 10 includes a video & audio encoder (AV encoder) 18, a CardBus bus interface 13, a video decoder 11, an audio decoder 16, a tuner 15, a multiplexer 17, and an audio analog-to-digital converter (ADC) 12. Wherein, the audio decoder 11 can be Philips SAA7113 decoder, the audio ADC 12 can be AKM5355 analog-to-digital converter, and the AV encoder 18 can be Fujitsu MB86393A Mpeg2 encoder. In addition, the tuner 15 can be Sony's tuner, and the audio decoder 16 can be AN5833 SAP decoder. The tuner 15 is used to receive an analog TV AV signal T, and output an analog video signal Va, and an analog audio medium frequency signal Aa. The video decoder 11 is used to receive analog video signal Va, and output a digital video signal Vd to the AV encoder 18 accordingly. The audio decoder 16 is used to receive and decode an analog audio medium frequency signal Aa. Then, audio decoder 16 outputs an analog right channel audio signal AaR1 and an analog left channel audio signal AaL1 to the multiplexer 17. The video decoder 11 can receive an analog signal from a video cassette recorder (VCR) such as an analog S video signal Vas or an analog V video signal Vav. The multiplexer 17 can receive an analog right channel audio signal AaR2 and an analog left channel audio signal AaL2, which correspond to the analog S video signal Vas and the analog V video signal Vav respectively, from the VCR. Video decoder 11 can receive the analog S video signal Vas or the analog V video signal Vav, and output a digital S video signal Vds or a digital V video signal Vdv accordingly. The multiplexer 17 outputs an analog right channel audio signal AaR and an analog left channel audio signal AaL, according to the analog right channel audio signal AaR1 and the analog left channel audio signal AaL1, or the analog right channel audio signal AaR2 and the analog left channel audio signal AaL2, to audio ADC 12. The audio ADC 12 is used to receive the analog right channel audio signal AaR and analog left channel audio signal AaL, and output a digital audio signal Ad to the AV encoder 18 accordingly. The AV encoder 18 receives and encodes the digital video signal Vd and digital audio signal Ad, and outputs a digital AV signal X, for example a Mpeg2 AV signal, accordingly. Furthermore, the AV encoder 18 can receive and encode the digital audio signal Ad, the digital S video signal Vds or the digital V video signal Vdv, and output another digital AV signal Y, for example another Mpeg2 AV signal, accordingly. The AV encoder 18 transfers the digital AV signal X or Y to a computer 14, for example a laptop computer, through a CardBus bus interface 13. At this moment, the computer 14 can store or play the digital AV signal X or Y From the description above, it can be known that the AV signal transceiving processing device 10 must use several hardware components including the video decoder 11, the audio decoder 16, the audio ADC 12 and the AV encoder 18, to encode raw data, such as analog AV video signals and analog audio signals, into digital AV signals and output the digital AV signals to the computer 14. However, because the number of required hardware components is high, and the source of different components are different, the cost of the AV signal transceiving processing device 10 is relatively high. SUMMARY OF THE INVENTION It is therefore an object of the invention to provide an audio-video (AV) signal transceiving processing device. The invention's design, which decodes received analog video signals and analog audio signals into digital video signals and digital audio signals and outputs them to the computer, fully exploits PCMCIA, CardBus, and Express Card's high data transmission ability for raw data, such as digital video signals, digital audio signals, digital AV signals and digital broadcasting signals, and computer's high computational power to encodes digital video and audio signals into digital AV signals. Consequently, the number of hardware components required is reduced, and hence the manufacturing cost is decreased. The invention achieves the above-identified object by providing an audio-video (AV) signal transceiving processing device which includes a AV decoder, a bridge, and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The AV decoder is used to receive an analog video signals and a corresponding analog audio signal, and output a first digital video signal and a corresponding first digital audio signal accordingly. The bridge is used to receive the first digital video signal and the first digital audio signal, and output a second digital video signal and a second digital audio signal, which are compliant to a bus interface standard, to a computer through a bus interface that is compliant to the bus interface standard. The invention achieves another object by providing an audio-video (AV) signal transceiving processing device which includes a bridge and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The bridge is used to receive a first digital video signal and a first digital audio signal, and convert the received signals into a second digital video signal and a second digital audio signal, which are compliant to a bus interface standard. Then, the bridge outputs the second digital video signal and the second digital audio signal to a computer through a bus interface that is compliant to the bus interface standard. The invention achieves another object by providing an audio-video (AV) signal transceiving processing device which includes a bridge and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The bridge is used to receive the first digital broadcasting signal, and convert the received signal into a second digital broadcasting signal, which is compliant to a bus interface standard. Then, the bridge outputs the second digital broadcasting signal to a computer through a bus interface that is compliant to the bus interface standard. Other objects, features, and advantages of the invention will become apparent from the following detailed description of the preferred but non-limiting embodiments. The following description is made with reference to the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 (Prior Art) is a circuit block diagram showing a conventional audio-video signal transceiving processing device. FIG. 2 is a circuit block diagram showing an audio-video signal transceiving processing device according to an embodiment of the invention. DETAILED DESCRIPTION OF THE INVENTION Please refer to FIG. 2 which is a circuit block diagram of an embodiment of the AV signal transceiving processing device according to the invention. In FIG. 2, the AV signal transceiving processing device 20 includes an AV decoder 21, a bridge 22, a bus interface 23 and tuners 25 and 26. In this embodiment, the bus interface 23 could be PCMCIA, CardBus, or Express Card bus interface. The tuner 25 is used to receive an analog TV signal T from antenna or cable, and output an analog video signal Va and an analog audio signal Aa when tuned. The tuner 26 is used to receive an analog frequency modulation (FM) broadcasting signal B from antenna or cable, and output an analog broadcasting signal Aab when tuned. The AV decoder 21 is used to receive the analog broadcasting signal Aab, and output a digital broadcasting signal Adb to the bridge 22 accordingly. Furthermore, the AV decoder 21 receives the analog video signal Va and the corresponding analog audio signal Aa, and outputs a digital video signal Vd and a digital audio signal Ad to the bridge 22 accordingly, wherein the analog audio signal Aa can includes an analog right channel audio signal and an analog left channel audio signal. In one embodiment, the AV decoder 21 can decode the analog audio signal Aa to at least an analog right channel audio signal and an analog left channel audio signal. Subsequently, the AV decoder 21 converts the decoded analog right channel audio signal and the analog left channel audio signal into a digital right and left channel signal AdLR, and outputs the AdLR to the bridge 22. The bridge 22 is used to receive the digital broadcasting signal Adb and/or the digital video signal Vd and the corresponding digital audio signal Ad, which are outputted from the AV decoder 22, and convert the received signals into the digital broadcasting signal Adb, which is compliant to the bus interface standard of the bus interface 23, and/or a digital video signal Vd and a digital audio signal Ad, which are compliant to a bus interface standard, and outputs the compliant signals to the computer 24 through the bus interface 23, wherein the computer 24 could be a desktop computer, a notebook computer, a laptop computer or a handheld computer. It is better applied to a notebook computer, and for the bus interface standard such as PCMCIA, CardBus or Express Card bus interface standard. The computer 24 receives and encodes the digital video signal Vd and the corresponding digital audio signal Ad, and outputs a digital AV signal, such as Mpeg2 AV signal, accordingly. At this moment, the computer 24 can store or play the encoded digital AV signal, and furthermore, the computer 24 can receives and stores or plays the digital broadcasting signal Adb from the bus interface 23. The above-mentioned description is for the situation when the signal source is an analog source. The analog signals must be converted into digital signals by the AV decoder 21. However, if the signal source is digital, such as digital AV signal D and/or digital broadcasting signal E, it does not need the decoding of the AV decoder 21, so the AV signal transceiving processing device 20 uses the bridge 22 to directly receive the digital AV signal D and/or the digital broadcasting signal E, wherein the digital AV signal D can be a transport stream (TS) AV signal, a Mpeg2 AV signal, or any other type of digital signal, such as any compressed digital AV signals. The bridge 22 converts the received digital AV signal D and/or the digital broadcasting signal E into digital signal AV signal D and/or the digital broadcasting signal E compliant to the bus interface standard, and then outputs them to the computer 24 through the bus interface 23. Subsequently, the computer 24 can store or play the received digital AV signal D and/or digital broadcasting signal E. The AV decoder 21 can receive an analog video signal and a corresponding analog audio signal from an analog AV outputting device, which can be a video game player, a digital camera, a digital video recorder, a VCR, a VCD player or a DVD player, wherein the analog video signal outputted from the analog AV outputting device can be an analog S video signal Vas or an analog V video signal Vav. The analog audio signal corresponding to the analog S video signal Vas or the analog V video signal Vav includes at least an analog right channel audio signal AaR and an analog left channel audio signal AaL. The AV decoder 21 decodes the received analog right channel audio signal AaR and the analog left channel audio signal AaL, and outputs a digital left and right channel audio signal AdLR to the bridge 22 accordingly. Furthermore, the AV decoder 21 decodes the received analog S video signal Vas or the analog V video signal Vav, and outputs a digital S video signal Vds or a digital V video signal Vdv to the bridge 22 accordingly. The bridge 22 converts the received digital left and right audio signal AdLR, the digital S video signal Vds or the digital V video signal Vdv into signals that are compliant to the bus interface standard of the bus interface 23, and outputs the signals to the computer 24 through the bus interface 23. Finally, the computer can store or play the received digital left and right audio signal AdLR, digital S video signal Vds or digital V video signal Vdv after processing them. However, for those who are skilled in the art understand the techniques of the invention should know that the above description is not the limit of the invention. For example, the AV decoder 21 can also include a video decoding unit, and an audio analog-to-digital converting unit, wherein the video decoding unit is used to receive all the analog video signals, and output the corresponding digital signals to the bridge 22. The audio analog-to-digital converting unit is used to receive all the analog audio signals or analog broadcasting signals, and output the corresponding digital audio signals or digital broadcasting signals to the bridge 22. The bandwidth of the bus interface adopted in the embodiment of the invention, such as PCMCIA, CardBus, or Express Card bus interface, is large and transfer speed is fast, so that the bus interface 23 can output the raw data, such as digital video signals, digital audio signals, digital AV signals, and digital broadcasting signals, to the computer 24 smoothly without transmission delay. Furthermore, the computer 24 can use its computation ability to compress and encode the received digital video signals and digital audio signals into digital AV signals. The high speed computational ability of the computer 24 is fully exploited. Consequently, the number of hardware components in the AV signal transceiving processing device 20 can be reduce, so does the manufacturing cost. The design of the AV signal transceiving processing device described in the above embodiment decodes the received analog video and analog audio signals into digital video signals and digital audio signals and outputs them to the computer, fully exploits the high speed transmission ability for raw data by the PCMCIA/CardBus/Express Card bus interface, and the high computational ability, which compresses and encodes digital video/audio signals into digital AV signals, of the computer. Consequently, the number of hardware components required for the invention is reduced, and the manufacturing cost is greatly decreased. While the invention has been described by way of example and in terms of a preferred embodiment, it is to be understood that the invention is not limited thereto. On the contrary, it is intended to cover various modifications and similar arrangements and procedures, and the scope of the appended claims therefore should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements and procedures.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The invention relates in general to a type of audio-video signal transceiving processing device and more particularly to a type of audio-video signal transceiving processing device that decodes received analog video signals and analog audio signals into digital video signals and digital audio signals and outputs them to the computer. 2. Description of the Related Art In technology advanced era nowadays, computers have become an indispensable part of the everyday life of modern people. Because computers can only play digital audio-video (AV) signals, analog signals from television (TV) stations can not be played directly on computers. Therefore, some manufactures developed AV signal transceiving processing devices which can transform the analog signals into digital signals that can be played on computers. Widely used AV signal transceiving processing devices nowadays are TV tuner cards, which are also called TV capture cards. The user can view the television signal on the computer monitor by having a TV tuner card. However, ordinary TV tuner cards have PCI interface. They are mainly used in desktop personal computers (PCs), and do not support hot plug. In the other hand, a new type of TV tuner cards have CardBus bus interface, and are mainly used in laptop PCs (as shown in FIG. 1 ). They do support hot plug, but they use hardware encoding method to process signals, therefore require more hardware components and have higher cost. Please refer to FIG. 1 which is a circuit block diagram of traditional AV signal transceiving processing device. In FIG. 1 , AV signal transceiving processing device 10 includes a video & audio encoder (AV encoder) 18 , a CardBus bus interface 13 , a video decoder 11 , an audio decoder 16 , a tuner 15 , a multiplexer 17 , and an audio analog-to-digital converter (ADC) 12 . Wherein, the audio decoder 11 can be Philips SAA7113 decoder, the audio ADC 12 can be AKM5355 analog-to-digital converter, and the AV encoder 18 can be Fujitsu MB86393A Mpeg2 encoder. In addition, the tuner 15 can be Sony's tuner, and the audio decoder 16 can be AN5833 SAP decoder. The tuner 15 is used to receive an analog TV AV signal T, and output an analog video signal Va, and an analog audio medium frequency signal Aa. The video decoder 11 is used to receive analog video signal Va, and output a digital video signal Vd to the AV encoder 18 accordingly. The audio decoder 16 is used to receive and decode an analog audio medium frequency signal Aa. Then, audio decoder 16 outputs an analog right channel audio signal AaR 1 and an analog left channel audio signal AaL 1 to the multiplexer 17 . The video decoder 11 can receive an analog signal from a video cassette recorder (VCR) such as an analog S video signal Vas or an analog V video signal Vav. The multiplexer 17 can receive an analog right channel audio signal AaR 2 and an analog left channel audio signal AaL 2 , which correspond to the analog S video signal Vas and the analog V video signal Vav respectively, from the VCR. Video decoder 11 can receive the analog S video signal Vas or the analog V video signal Vav, and output a digital S video signal Vds or a digital V video signal Vdv accordingly. The multiplexer 17 outputs an analog right channel audio signal AaR and an analog left channel audio signal AaL, according to the analog right channel audio signal AaR 1 and the analog left channel audio signal AaL 1 , or the analog right channel audio signal AaR 2 and the analog left channel audio signal AaL 2 , to audio ADC 12 . The audio ADC 12 is used to receive the analog right channel audio signal AaR and analog left channel audio signal AaL, and output a digital audio signal Ad to the AV encoder 18 accordingly. The AV encoder 18 receives and encodes the digital video signal Vd and digital audio signal Ad, and outputs a digital AV signal X, for example a Mpeg2 AV signal, accordingly. Furthermore, the AV encoder 18 can receive and encode the digital audio signal Ad, the digital S video signal Vds or the digital V video signal Vdv, and output another digital AV signal Y, for example another Mpeg2 AV signal, accordingly. The AV encoder 18 transfers the digital AV signal X or Y to a computer 14 , for example a laptop computer, through a CardBus bus interface 13 . At this moment, the computer 14 can store or play the digital AV signal X or Y From the description above, it can be known that the AV signal transceiving processing device 10 must use several hardware components including the video decoder 11 , the audio decoder 16 , the audio ADC 12 and the AV encoder 18 , to encode raw data, such as analog AV video signals and analog audio signals, into digital AV signals and output the digital AV signals to the computer 14 . However, because the number of required hardware components is high, and the source of different components are different, the cost of the AV signal transceiving processing device 10 is relatively high.
<SOH> SUMMARY OF THE INVENTION <EOH>It is therefore an object of the invention to provide an audio-video (AV) signal transceiving processing device. The invention's design, which decodes received analog video signals and analog audio signals into digital video signals and digital audio signals and outputs them to the computer, fully exploits PCMCIA, CardBus, and Express Card's high data transmission ability for raw data, such as digital video signals, digital audio signals, digital AV signals and digital broadcasting signals, and computer's high computational power to encodes digital video and audio signals into digital AV signals. Consequently, the number of hardware components required is reduced, and hence the manufacturing cost is decreased. The invention achieves the above-identified object by providing an audio-video (AV) signal transceiving processing device which includes a AV decoder, a bridge, and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The AV decoder is used to receive an analog video signals and a corresponding analog audio signal, and output a first digital video signal and a corresponding first digital audio signal accordingly. The bridge is used to receive the first digital video signal and the first digital audio signal, and output a second digital video signal and a second digital audio signal, which are compliant to a bus interface standard, to a computer through a bus interface that is compliant to the bus interface standard. The invention achieves another object by providing an audio-video (AV) signal transceiving processing device which includes a bridge and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The bridge is used to receive a first digital video signal and a first digital audio signal, and convert the received signals into a second digital video signal and a second digital audio signal, which are compliant to a bus interface standard. Then, the bridge outputs the second digital video signal and the second digital audio signal to a computer through a bus interface that is compliant to the bus interface standard. The invention achieves another object by providing an audio-video (AV) signal transceiving processing device which includes a bridge and a bus interface, wherein the bus interface is a PCMCIA, CardBus, or Express Card bus interface. The bridge is used to receive the first digital broadcasting signal, and convert the received signal into a second digital broadcasting signal, which is compliant to a bus interface standard. Then, the bridge outputs the second digital broadcasting signal to a computer through a bus interface that is compliant to the bus interface standard. Other objects, features, and advantages of the invention will become apparent from the following detailed description of the preferred but non-limiting embodiments. The following description is made with reference to the accompanying drawings.
20040310
20090623
20050818
67870.0
0
KOSTAK, VICTOR R
AUDIO-VIDEO SIGNAL TRANSCEIVING PROCESSING DEVICE
UNDISCOUNTED
0
ACCEPTED
2,004
10,797,700
ACCEPTED
Method and apparatus for a home network auto-tree builder
A method and system is provided for detecting, commanding and controlling diverse home devices currently connected to a home network. An interface is provided for accessing the home devices that are currently connected to a home network. According to the method, a device link file is generated, wherein the device link file identifies home devices that are currently connected to the home network. A device link page is created, wherein the device link page contains a device button that is associated with each home device that is identified in the device link file. A hyper-text link is associated with each device button, wherein the hyper-text link provides a link to an HTML page that is contained on the home device that is associated with the device button, and the device link page is displayed on a browser based home device.
1-8. (Canceled). 9. A method for implementing command and control for home devices via a home network, the method comprising the steps of: connecting a first home device to the home network; connecting a second home device to the home network, which is capable of being controlled by said first home device; detecting presently connected home devices on the home network in an autonomous manner; accepting user input from a user by said first home device; and controlling the second home device by sending control and command information from the first home device to the second home device based on the user input. 10. The method of claim 9, the second home device stores user interface data. 11. The method of claim 9, wherein the step of connecting the first home device to the home network includes the step of signaling a configuration manager that the first home device is connected to the home network, wherein the configuration manager maintains a list of home devices that are currently connected to the home network. 12. The method of claim 11, wherein the step of signaling the configuration manager that the first home device is connected to the home network includes the step of signaling a dynamic host configuration protocol server that the first home device is connected to the home network. 13. The method of claim 11, wherein the first home device performs the further step of accessing the list of home devices maintained by the configuration manager. 14. The method of claim 10, wherein the step of the second home device storing user interface data includes the step of storing the user interface data as HTML data. 15. The method of claim 11, further comprising the step of displaying a device link page that contains a button identifying a manufacturer of the second home device, wherein the button is a hyperlink that provides a link to a home page associated with the manufacturer. 16. The method of claim 15, wherein the step of displaying the device link page comprises the step of accessing and displaying the list of home devices maintained by the configuration manager. 17. The method of claim 9, wherein the step of connecting the first home device to the home network includes the step of connecting the first home device to a 1394 serial bus. 18. The method of claim 9, wherein the step of connecting the second home device to the home network includes the step of connecting the second home device to a 1394 serial bus. 19. The method of claim 9, wherein the step of connecting the first home device to the home network includes the step of connecting the first home device to an Ethernet bus. 20. The method of claim 9, wherein the step of connecting the second home device to the home network includes the step of connecting the second home device to an Ethernet bus. 21. The method of claim 9, wherein: the step of connecting a first home device to the home network includes the step of connecting the first home device to a first bus; and the step of connecting a second home device to the home network includes the step of connecting the second home device to a second bus; wherein the first bus is connected to the second bus using a bridge proxy, wherein the bridge proxy provides a communication interface between the first bus and the second bus. 22. The method of claim 9, further comprising the step of connecting the home network to the Internet. 23. The method of claim 9, further including the steps of displaying a user interface comprising an HTML page associated with the second home device, wherein the HTML page is stored on the second home device. 24. The method of claim 9, wherein the step of connecting the second home device to the home network includes the step of signaling a configuration manager that the second home device is connected to the home network, wherein the configuration manager maintains a list of home devices that are currently connected to the home network. 25. The method of claim 24, wherein the step of signaling the configuration manager that the second home device is connected to the home network includes the step of signaling a dynamic host configuration protocol server that the second home device is connected to the home network. 26. The method of claim 10, wherein the step of the second home device storing user interface data includes the step of storing the user interface data as one or more formats selected from the group consisting of: HTML, XML, JAVA, JAVASCRIPT, GIF, and JPEG. 27. The method of claim 9, wherein the step of connecting the first home device to the home network comprises the step of using an Internet Protocol (IP) and the step of connecting the second home device to the home network comprises the step of using an IP. 28. The method of claim 9, wherein the home network uses a layer other than an IP network layer as a communication layer therefor. 29. The method of claim 9, wherein the home network uses a Function Control Protocol (FCP) for communication. 30. The method of claim 9, further including the steps of receiving user interface data at the first home device over said home network; and the step of controlling the second home device by sending control and command information includes the step of controlling the second home device by sending control and command information over the Internet. 31. The method of claim 9, wherein: the first home device is capable of displaying user interface data; the second home device stores user interface data in a selected format that defines a user interface for commanding and controlling of the second home device; the method further including the steps of: receiving the user interface data at the first home device via the home network from the second home device; and displaying the user interface defined by the user interface data on the first home device; such that: the step of accepting user input further includes the steps of accepting user input from a user in response to the user interacting with the user interface displayed on the first home device; and and the step of controlling the second home device further includes the steps of controlling the second home device by sending control and command information from the first home device to the second home device based on the user input, the first home device and the second home device both being operational during the sending of the control and command information. 32. The method of claim 31, wherein the second home device stores the user interface data as a selected interface data. 33. A home network system for commanding and controlling home devices, the home network comprising: a configuration manager; a first home device containing user interface data that defines a user interface for commanding and controlling the first home device; a second home device having a viewable display unit, wherein the viewable display unit displays the user interface for commanding and controlling the first home device; and a physical layer, wherein the physical layer provides a communication medium that can be used by the configuration manager, the first home device and the second home device to communicate with each other, the first home device and the second home device both being operational during the communication.
CROSS-REFERENCES TO RELATED APPLICATIONS This patent application claims priority from provisional patent application Ser. No. 60/050,762, filed on Jun. 25, 1997, entitled Home Network, Browser Based, Command and Control and provisional patent application Ser. No. 60/059,499, filed on Sep. 22, 1997, entitled Improved Home Network, Browser Based, Command and Control, which are incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the field of networks, and more particularly to providing an interface to access devices currently connected to a home network. 2. Description of Related Art A typical household contains several home devices. As used in this document, the term “home device” encompasses all electronic devices that are typically found in the home, with the exception of general purpose computers (i.e. personal computers (PCs), laptop computers, etc). For example, the term home device includes but is not limited to such electronic devices as security systems, theatre equipment (e.g., TVs, VCRs, stereo equipment, and direct broadcast satellite services or (DBSS), also known as digital satellite services (DSS)), sprinkler systems, lighting systems, micro waves, dish washers, ovens/stoves, and washers/dryers. Indeed, an automobile may be a home device. On the other hand, the term “device” as used in this document may comprise logical devices or other units having functionality and an ability to exchange data, and may include not only all home devices but also general purpose computers. In general, home devices are used to perform tasks that enhance a homeowner's life style and standard of living. For example, a dishwasher performs the task of washing dirty dishes and relieves the homeowner of having to wash the dishes by hand. A VCR can record a TV program to allow a homeowner to watch a particular program at a later time. Security systems protect the homeowner's valuables and can reduce the homeowner's fear of unwanted entry. Home devices (such as home theatre equipment) are often controlled using a single common control unit, namely a remote control device. This single common control unit allows a homeowner to control and command several different home devices using a single interface. Thus, many manufacturers have developed control units for controlling and commanding their home devices from a single interface. One drawback associated with using the remote control unit to command and control home devices is that it provides static control and command logic for controlling and commanding each home device. Therefore, a particular remote control unit can only control and command those home devices for which it includes the necessary control and command logic. For example, if a remote control unit comprises logic for controlling a television (TV), a video cassette recorder (VCR), and a digital video device (DVD), but not a compact disk (CD) unit, the remote control unit can not be used to command and control the CD unit. In addition, as new home devices are developed, the remote control unit will not be able to control and command the new home devices that require control and command logic that was not known at the time the remote control unit was developed. Where a device, such as a remote control, is available for communicating with or controlling a plurality of home devices that are connected to a home network, it is necessary to be able to identify the devices which are currently connected to, and active on, the network. Therefore, there is a need for a method of detecting, identifying and creating links to the devices currently connected to the network. Also, there is a need for a mechanism that provides for dynamically updating the devices detected as connected to the network, and for rendering a user interface to enable user control and command of any device that is currently connected to the network. SUMMARY OF THE INVENTION It is accordingly an object of the invention to overcome the problems of the prior art, and to provide an interface for accessing home devices that are currently connected to a home network. It is another object of the invention to provide a method and apparatus for controlling any of a plurality of devices currently connected to the network. The present invention accordingly provides a method for providing an interface for accessing home devices that are currently connected to a home network, to enable a user to communicate with, to command and to control such home devices. In accordance with a feature of the invention, an interface for accessing home devices is provided by a method which includes the steps of generating a device link file, wherein the device link file identifies home devices that are currently connected to the home network; creating a device link page, wherein the device link page contains a device button that is associated with each home device that is identified in the device link file; associating a hyper-text link with each device button, wherein the hyper-text link provides a link to an HTML page that is contained on the home device that is associated with the device button; and displaying the device link page on a browser based home device. According to one aspect of the invention, the device link file may be generated by detecting that a home device is connected to the home network; associating a logical device name with the home device; and storing the logical device name in the device link file. In accordance with another aspect of the invention, the device link page may be created by retrieving a logical device name from the device link file; storing the logical device name in the device link page; and converting the logical device name to a device button. In accordance with still another aspect of the invention, the hyper-text link may be associated with each device button by retrieving a URL from a home device, wherein the URL is maintained in a properties file associated with the home device; and associating the URL with the device button that is associated with the home device. In accordance with yet another aspect of the invention, the manufacturer device button is stored in the device link page by storing the manufacturer device button in a user definable area of the device link page. These and other objects, features and advantages will become more readily apparent from the following description of a preferred embodiment of the invention. BRIEF DESCRIPTION OF THE DRAWINGS The objects and features of the present invention, which are believed to be novel, are set forth with particularity in the appended claims. The present invention, both as to its organization and manner of operation, together with further objects and advantages, may best be understood by reference to the following description, taken in connection with the accompanying drawings, in which: FIG. 1 is a block diagram of a home network constructed in accordance with the present invention; FIG. 2 illustrates an example of a layered interface model that can be used for communicating between home devices in accordance with the present invention; FIGS. 3A and 3B are block diagrams illustrating controlling and commanding of a home device using a browser based Digital TV (DTV) according to one embodiment of the present invention and a specific example; FIG. 4A is a block diagram illustrating a home device discovery mechanism according to one embodiment of the invention; FIG. 4B depicts a flow diagram illustrating the generation of a device list file according to certain embodiments of the invention; FIG. 5A is a block diagram of a device link page in accordance with the present invention; FIG. 5B illustrates an example of a home device tree structure according to certain embodiments of the invention; FIG. 6 graphically depicts a view of a device link page in accordance with the present invention; FIG. 7 graphically depicts an alternative view diagram of a device link page in accordance with the present invention; FIG. 8 graphically depicts a preliminary view of a session page in accordance with the present invention; FIG. 9 is a block diagram illustrating a session manager causing two home devices to communicate over a home network according to certain embodiments of the invention; FIG. 10 graphically depicts a secondary view of the session page in accordance with the present invention; FIG. 11 graphically depicts a third view of the session page in accordance with the present invention; FIG. 12A is a block diagram of a session page in accordance with the present invention; FIG. 12B is another block diagram of the session page in accordance with the present invention; FIG. 13 is another block diagram of the session page in accordance with the present invention; FIG. 14 is a block diagram of a home network that is connected to the Internet in accordance with the present inventions; FIG. 15 is a diagram illustrating the creation of a macro according to one embodiment of the invention; and FIG. 16 is a diagram illustrating the creation of a macro according to another embodiment of the invention. DESCRIPTION OF THE PREFERRED EMBODIMENTS The following description is provided to enable any person skilled in the art to make and use the invention and sets forth the best modes presently contemplated by the inventors of carrying out their invention of a method and apparatus for controlling home devices over a home network. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present inventions. In an exemplary embodiment of the present invention, a browser based home network uses Internet technology to control and command home devices that are connected to a home network. Each home device contains interface data (e.g. HTML, XML, JAVA, JAVASCRIPT, GIF, JPEG, graphics files, or any other format useful for the intended purpose) that provides an interface for the commanding and controlling of the home device over the home network. In certain embodiments, each home device contains one or more Hypertext Markup Language (HTML) pages that provide for the commanding and controlling of the home device. Using the browser technology, the home network employs Internet standards to render the HTML pages in order to provide users with a plurality of graphical user interfaces (“GUIs”) for commanding and controlling each home devices. In one embodiment, the home network is configured as an intranet. FIG. 1 is a block diagram of a home network 100 constructed in accordance with one embodiment of the present invention. As depicted in FIG. 1, a 1394 serial bus 114 electronically connects multiple home devices on the home network 100. In this example, the 1394 serial bus 114 provides the physical layer (medium) for sending and receiving data between the various connected home devices. The 1394 serial bus 114 supports both time-multiplexed audio/video (A/V) streams and standard IP (Internet Protocol) communications. In certain embodiments, the home network uses an IP network layer as the communication layer for the home network 100. However, other communication protocols could be used to provide communication for the home network. For example, the invention may be implemented using FCP (Function Control Protocol) as defined by IEC 61883, or any other appropriate protocol. Thus, a network may generally include two or more devices interconnected by a physical layer for exchange or transfer of data in accordance with a predefined communication protocol. FIG. 2 illustrates an example of a layered interface model that can be used for communicating between home devices in accordance with the present invention. In this example, a home device (server) 150 communicates with a home device client 166 using network communication layers 152-164. By employing the Internet Protocol standard for the network layer 160, the home devices can communicate with each other without having to know specific details about the other communication layers (i.e. application 152, presentation 154, session 156, transport 158, data link 162 and physical 164). Thus, by employing the Internet Protocol standard for the network layer 160, the home network may use a combination of different communication layers in communicating between different home devices. It should be recognized that a single physical package may include several devices which are logically networked via a network layer for example as shown in FIG. 2, not necessarily via a physical network. Such devices may include a VCR and a TV in a single housing, for example. Thus, for such an embodiment, where a logical device accesses a GUI to enable a user to control a home device, the home device and the logical device may be included in the same physical package. In such an embodiment, it could be considered that the physical device fetches a GUI from itself. However, in other embodiments the home network interconnects separate physical devices, wherein for example, a first device fetches a GUI from a second device, to permit user interaction with the GUI to control the second device. By way of definition, it is contemplated that a “client” is a device providing control interface service to a human operator, including a graphical display hardware for down communication and a mouse or other point-and-click device for up (or return) communication. A “server” is contemplated as a module supplying a service, which may be any service other than a control interface provided by a client. Stated differently, the server/client relationship is a control relationship, wherein the server provides a service but a client may use the data, as a DTV displays video data, but does not manipulate or alter the data. It is thus consistent with this definition to observe that, frequently, a server may be a source of information and a client (a browser, for example) may be a consumer of information. Some specific functions which may be implemented by servers include: return of information (data); performance of a function (e.g., mechanical function) and return of status; return of a data stream and status; reception of a data stream and return of status; or saving of a state for subsequent action. Examples of servers include MPEG source, sink and display servers. While a server typically includes a custom, built-in, control program to implement control of its own hardware, a client functions to interface with the server. It should be noted, however, that a “server” as used herein does not imply that a web server and a protocol stack must be used. In a presently preferred embodiment, a 1394 serial bus is used as the physical layer 164 for the data communications on the home network 100. Because of its enhanced bandwidth capabilities, the 1394 serial bus can provide a single medium for all data communications on the home network 100 (i.e. audio/video streams and command/control). However, the home network 100 is not restricted to using a 1394 serial bus, and, in alternative embodiments of the present invention, other bus types, such as Ethernet, ATM, wireless, etc., may be used as the physical layer if they meet the particular throughput requirements of an individual home network. As depicted in FIG. 1, the home network 100 has several home devices connected to the 1394 serial bus 114. In this example, the home devices include a DBSS 104 which receives transmission signals from a satellite 122 for subsequent display. Associated with the DBSS is a network interface unit (“NIU”) which, among other things, provides an interface between the DBSS satellite transmissions and the 1394 serial bus 114. A digital video device (“DVD”) 108 is also connected to the exemplary home network 100. The DVD 108 can be used to display digitally encoded videos on a home television. Also connected to the exemplary home network 100 is a digital video cassette recorder (“DVCR”) 110, i.e., a digital VCR, and a digital TV 102. In this example, the DTV 102 provides the human interface for the home network 100 by employing browser technology to allow users to control and command the home devices over the home network 100. Unlike most other home devices that are typically connected to a home network, the DTV 102 can provide the human interface for the home network 100 as it comprises a screen for displaying HTML pages. However other home devices having a display capability may be used to provide the human interface. Thus, in certain embodiments of the inventions, a device such as a personal computer (“PC”) is used to provide the human interface for a respective home network, as a PC typically embodies a screen display unit. Although the 1394 serial bus 114 is depicted as using the HTTP/IP interface protocol, certain home devices may require other protocols interface types (e.g. TCP/IP, UDP/IP, FTP/IP, TELNET/IP, SNMP/IP, DNS/IP, SMTP/IP). Therefore the HTTP/IP protocol may not be able to satisfy all home device connection requirements. Thus, in certain embodiments of the invention, a bridge proxy 116 is used to interface two networks using dissimilar interface protocols on their respective mediums which, when connected, comprise the home network 100. In certain embodiments, the two network mediums are of the same type. For example, as depicted in FIG. 1, the 1394 serial bus 114 using the HTTP/IP interface protocol is connected by a bridge proxy 116 to the 1394 serial bus 118, which uses the IEC61883 interface protocol. By using bridge proxy 116 to interface between the HTTP/IP and IEC61883 protocols, security system 120, which uses the IEC 61883 interface protocol is also accessible on the home network 100. In certain other embodiments, a home network may be comprised of two network mediums of dissimilar types, e.g., a 1394 Serial bus and Ethernet. Therefore, in certain embodiments of the invention, a bridge proxy is used to interface two dissimilar medium types to form a single home network. The Dynamic Host Configuration Protocol (DHCP) server 106 is used for the discovery of home devices that are powered on and connected to the home network 100. The home device discovery process is described in greater detail below. Home Network Overview As depicted in FIG. 1, DTV 102, DVCR 110, DVD 108, DSS-NIU 104 and security system 120 represent home devices that are currently connected to the home network 100. A client-server relationship exists among the attached devices, with the DTV 102 typically behaving as the client and home devices DVCR 110, DVD 108, DSS-NIU 104 and security system 120 behaving as servers. As previously mentioned, each home device is associated with one or more Hypertext Markup Language (HTML) files. The HTML files define the control and command functions associated with a particular home device. Each HTML file may also contain embedded references to other HTML files. The browser based DTV 102 (acting as a client), receives and interprets the HTML files associated with the home devices (acting as servers) and graphically displays the respective control and command information on its viewable display. By conforming to the Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP) Internet standards, each home device sends its custom GUI to the browser based DTV 102. The browser based DTV 102 receives the HTML files from the home devices over the home network 100 using the HTTP protocol. Each HTML file contains specific control and command information for a respective home device. The HTML files enable the browser based DTV 102 to graphically display control and command information to a user for a particular home device. Therefore, because each home device supplies its own GUI through its own HTML files to the browser based DTV 102, the browser based DTV 102 can-provide a command and control interface for a home device without having to know any specific details about the particular device. This feature allows the home network 100 to contain home devices from a multitude of different manufacturers. In addition, home devices can be transparently added or removed from the home network 100 without affecting the overall system as, in accordance with the invention, each home device defines its own command and control interface through its respective HTML files. HTML Two Way Mechanism FIG. 3A depicts an exemplary embodiment in which a browser based DTV 202 (client) renders the characteristics of a home device 204 (server) over a home network. The home device 204 is represented by one or more HTML files stored in an accessible area within the home device 204. The one or more HTML files are ASCII text files containing specific information pertaining to the particular home device 204, along with data that enables a browser to present the information graphically. In addition to rendering the HTML file on the browser based DTV 202, by employing forms technology, the browser based DTV 202 can return information back to the home device 204, thus providing a two-way communication. Other common techniques for providing the two-way communication may include the use of Java or Control Gate Interfaces (CGIs). Once the information contained in a device's HTML file is graphically displayed on the DTV 202, the user can control the home device 204 from the DTV 202 by selecting icons that have associated hyperlinks to start the control programs displayed on the DTV's screen and/or entering data to the DTV 202. Home Device HTML Files As previously stated, each home device connected to the home network has one or more associated HTML files. The HTML files for a respective home device define the control and command functions for that particular home device. Each HTML file may also contain embedded references to other related HTML files. A device connected to the home network that has a viewable display (e.g., screen) and employs the browser technology may receive and interpret the HTML files associated with the home devices connected to the home network and graphically display the information contained therein using a GUI on its screen. This is illustrated by FIG. 3A wherein is shown an interaction between a client and a server's executables. However, it is a feature of the invention to provide control by interaction between executables of two servers or of a client and plural servers. Thus, in accordance with the invention control is typically implemented by service control programs (executables which are trying to be operated remotely), communications, commands and (if necessary), human interface with a server control program via a GUI. As one example, FIG. 3B shows location of file and program components locally, permitting control actions to be implemented by running programs and scripts on the device itself. This aspect of the invention thus permits implementation to be carried out in a local manner which may be proprietary to the device rather than being performed remotely, and which thus does not require a standardized 1394 command set. For example, the user may wish to change display brightness. To implement such a change, the user may click on a “Brightness” button on the User HTML GUI page. In response, another GUI may be brought up, with “Bright” and “Dim” buttons. In response to the user clicking one of these two buttons, the http server will cause a brightness control program for the display to run, in order to control the desired hardware action. For action local to the DTV, the DTV thus may include a server capability, to interpret the post actions from the browser. In that regard, in order to be able to post actions to control their local hardware, all home network DTV devices preferably have a server capability. For such operation, a browser may pick up local html files and render the files to a GUI, without invoking the http server. In order to invoke the local http server to respond, clicking on a button preferably involves an http access to the local machine name or IP address. In turn, the http server invokes the local device control program, such as “Brightness” in the above example. Generally, control may be implemented by transfer of a graphical control object (GCO), which preferably resides in the server, from the server for rendering on the client, to make the GUI. As an advantageous result of this approach, detailed controls back to the server originating the GCO may be proprietary, as the server device “understands” and is aware of its own GUI controls. Additionally, the look and feel of the GUI originates with the attached server (e.g., the program server, server device or media) and not with the client. Independence of the command language makes the arrangement operable independently of any new features added to devices, which may be included in the GCO sent from the server, as well as any other future modifications, i.e., the home network configuration is made inherently “new-feature proof” and “future proof”. Moreover, because a specific device may be selected for control by selecting an icon, there is no need for hardware reconfiguration to implement control of different (or updated) devices. Accordingly, a single command set may be used in a remote control for controlling plural (different) devices, by communicating with the client device rendering of the GUI. For server to server control without a GUI and user involvement, automatic operation may be initiated or set-up by user control via a client, but later action is implemented by control language interaction between servers without involving a client. In order to implement the foregoing, a server operating in accordance with the invention preferably has one or more control programs for executing a required service. The server, which stores its GCO, provides the GCO to a client and a GUI rendered on the client interfaces with the server control program(s) executable(s). Moreover, the server control program is able to save the state which has been controlled by the GUI, such as setting up a timer record action for example. The server also may include a clock for implementing various timer operations. The client is thus not required to have any knowledge of the server device being controlled, and it is not necessary to provide the client with the ability to save a previously controlled state. Indeed, as elsewhere described herein, the client may not be running for part of the time in which the server is running. Thus, preferably the server does not rely on another device, such as the client, for its operation and may serve multiple clients simultaneously. A client, which receives GCO transfers from one or more servers, includes a GUI renderer to form the GUI from a received GCO. It is within the scope of the invention for a limited number of GCO's, for a limited number of servers, to reside in the client. However, for the inventive configuration of a home network, the large number of different server types presently in existence and contemplated for the future demonstrates the advantage arising from the GCO's residing on the servers, thus freeing the client from a requirement for any built-in knowledge of the server(s) being controlled. In operation, during initial selection of the device, the GCO is fetched and rendered by the client, to form the GUI and enable actions and responses to be communicated between the GUI and the control program(s) of the client(s). For server-server control, a command language interface and library of commands may be provided in a server. For any individual server, it is not necessary to provide the entire command language. Instead, a server should only be able to support those commands which it needs to send and receive to perform its functions. It is a simpler task to provide such a configuration than to build in the command language interface and library to a client for controlling all present and future servers. In addition to the one or more HTML files stored therein, each home device connected to a home network contains a Properties file. In one embodiment, the Properties file for a respective home device comprises the device manufacturer's name, the device name, the device type, the device model, and the Uniform Resource Locator (“URL”) of the device manufacturer's HTML home page. The top-level page associated with each home device may be called the device/default.HTML file. Each home device connected to the home network also contains a LOGO image file. A LOGO image file for a respective home device is a file containing an image that represents the manufacturer of the device. In one embodiment, the LOGO image file for a particular home device contains an image with the name and logo of the manufacturer of the home device. In the following description, a software agent which assists the user in interacting with the network and controlling the various home devices connected to the network, and thus acts as the primary interface between the user and the home network, is called a session manager. For example, the software agent for the user (i.e., the session manager) may access the devices to get more information for the user, in order to assist the user with making selections associated with the devices, or with managing the devices. Such assistance with control of a device may include modifying the GUI display for that device, as by graying out some buttons, thus inhibiting selection of various options (or devices) based on prior selections and capabilities of devices. Still further, the session manager, acting as the user's agent, may link two or more devices selected by the user and may set up a communication path therebetween, freeing the user from the tedium and detail of implementing such control functions. In certain embodiments, in order for a session manager to properly locate the LOGO image file of a respective home device, all home devices connected to the home network use a standard filename for the particular LOGO image file to be displayed. In one embodiment, each home device names its respective LOGO image file that is to be displayed LOGO.GIF. In certain embodiments, a LOGO image file for a respective home device is of a standard size, e.g. 120×40 pixels. A standard size ensures that the device logos have a neat, uniform look when depicted in the GUI displayed to the user. In certain embodiments, the image of the LOGO image file may also be animated. In certain embodiments, multiple versions of the LOGO image file may reside on a respective home device, with the home device responsible for determining which version is ultimately displayed to the user. The home device may update the version to be displayed to the user over time, based on criteria of the device manufacturer's choosing. Each home device connected to a home network also contains an ICON image file. An ICON image file for a respective home device is a file containing an image that represents the particular type of home device; e.g., a DTV or a DVCR. In certain embodiments, the ICON image file contains an image of the device or a symbol that represents the type of device. A manufacturer model number may be included at the bottom of the image in the ICON image file, to assist in identification of the home device on the home network. In certain embodiments, several variations of the ICON image file reside on a respective home device, with each ICON variation representing a particular state of the home device. For example, for a DVCR, the ICON image files may contain images of a DVCR playing, rewinding, media inserted, media absent, etc. To represent the various device state images, the manufacturer may use a variety of symbols, colors and animation. The home device is responsible for determining which ICON image version is to be displayed to the user, based on the device's representative state at any particular time. This allows the ICON image file for a respective home device to provide feedback to the user as to the particular state of the home device. In certain embodiments, an ICON image file for a respective home device is of a standard size, e.g., 120×90 pixels. A standard size ensures that the device images will have a neat, uniform look when depicted in the GUI displayed to the user. In one embodiment, in order for a session manager to properly locate the ICON image file of a respective home device to be displayed, all home devices connected to the home network use a standard ICON image filename for the respective ICON image file to be displayed. Each home device may name its respective ICON image file to be displayed ICON.GIF. As previously stated, each home device connected to the home network has one or more HTML files associated with it. One of these HTML files is a home, or base page, file for the particular home device. To aid in the access of a particular home device's home page, in certain embodiments, each home device uses a standard home page filename. In one embodiment, each home device names its respective home page file USER.HTML. Home Device Discovery Process Communication on the home network is provided through the use of the Transmission Control Protocol/Internet Protocol (TCP/IP) standard network protocols. The TCP layer provides a reliable delivery mechanism while the IP layer provides a routable addressing mechanism for packets of data on the home network 100. In the home device discovery process, each home device is associated with a unique IP address and a logical name, which are used to identify a particular home device connected to the home network. To associate each home device with a unique IP address and logical name pair, a configuration manager is provided that dynamically allocates a unique IP address and logical name for each home device that becomes available on the home network. An available home device is a home device that is both powered-on and connected to the home network. The IP address and logical name pairs of the available home devices are stored in a device list file within the configuration manager. The device list file is dynamically updated as home devices are added and removed from the home network 100 (i.e., become available and non-available on the home network 100). By using the configuration manager to allocate unique IP addresses for each home device, device manufacturers are relieved from having to associate a predefined IP address with each home device. However, in certain embodiments of the invention, when a particular home device is associated with a predefined IP address, the configuration manager uses the predefined IP address as the home device's unique IP address on the home network 100. In one embodiment of the invention, a dynamic host configuration protocol (“DHCP”) server 106 of FIG. 1 performs the functions of a configuration manager for a home network 100. The DHCP is a current industry standard and, for a particular home network, multiple home devices may be capable of performing the necessary DHCP server 106 functions. However, although multiple home devices may be capable of functioning as the DHCP server 106, in a presently preferred embodiment, the home device that is of the device type least likely to be duplicated on the home network 100 (i.e., least likely to have more than one of its home device types resident on the home network 100) is nominated to function as the DHCP server 106. In the exemplary home network 100 of FIG. 1, the DSS 104 is nominated to be the DHCP server 106 for the home network 100 as it is least likely to be duplicated on the network 100. The DHCP server 106 on the home network 100 generates a unique IP address and, for each home device that is available on the home network 100, retrieves a logical name pair from the device. In certain embodiments, if an individual home device on the home network 100 has a predefined IP address already associated with it, the DHCP server 106 uses the predefined IP address as the unique IP address from that home device. The DHCP server 106 causes the IP address and logical name pairs associated with the available home devices to be stored within a device list file. The device list file is dynamically updated as home devices are added and removed from the home network 100. In certain configurations, a plurality of home devices with DHCP server capabilities may exist on a single home network. Therefore, in certain embodiments, an arbitration protocol is employed to select and designate a particular home device to function as the DHCP server for the home network. In another embodiment, a communication protocol is employed between the various home devices with DHCP server capabilities that are present on a home network, resulting in a single designated DHCP server for the home network. FIG. 4A is a block diagram illustrating a home device discovery process according to an embodiment of the invention. When a home device 302 that is connected to the home network is powered on, the home device 302 broadcasts its presence over the home network in order to extract its configuration from the DHCP server 306. Upon receiving the broadcast, the DHCP server 306 generates a unique IP address and a logical name to be associated with the home device 302. After generating the unique IP address and looking up the logical name pair, the DHCP server 306 returns the IP address and logical name pair to the home device 302. The unique IP address is then used for communicating with the home device 302 over the home network. In addition to sending the IP address and logical name pair to the home device 302, the DHCP server 306 stores the generated IP address and logical name pair within the device list file. This discovery process is repeated for each home device that is powered on and connected to the home network. Thus, the DHCP server 306 provides for the dynamic allocation of IP address and logical name pairs for configuring newly attached and powered on home devices. FIG. 3A depicts a flow diagram illustrating the generation of a device list file 318 according to certain embodiments of the invention. In this example, a DHCP Server 310 communicates with a home device 312 that is accessible on the home network in order to generate a unique IP address and logical name for the home device 312. The DHCP Server 310 stores this information in the DHCP database 314. As home devices become available/non-available on the home network, the information in the DHCP database 314 is continually updated in the manner described below. GENIP is a Win32 console-based application which interacts with external programs, databases (indirectly) and device/session managers. The core interaction is an indirect contact with the standard DHCP Server product which is part of the standard Windows NT Server package, through a program known as DHCPCMD.exe, which is part of the NT Server Resource kit found on MSDN developer DCROM sets. In operation, DHCPCMD.exe interacts with the external programs and databases via a command “enumclients”, which creates a listing of all the current database of DHCP clients. Thus, GENIP runs the DHCPCMD utility and generates an internal “current” database of IP leases active in the DHCP database from the output of the DHCPCMD utility. The GENIP process 316 of FIG. 4B periodically reads the device information contained in the DHCP database 314 and compares it with the device information currently contained in the device list file 318. By comparing the information the GENIP 316 can determine if a home device has been added or removed from the home network. More specifically, the “current” database is compared item-for-item against the previously read database and, if any differences are found, a database update is performed thereby providing detection of any newly connected devices on the home network. In one embodiment, if the device information contained in the DHCP database 314 differs from the device information contained in the device list file 318, the GENIP process 316 signals a process to update a device link page and repaint a client display. The device link page is described in greater detail below. ReadDHCPDB( ) is the workhorse of GENIP, handling the setup and execution of DHCPCMD as well as reading the resultant output therefrom, reading the same into the “current” database, comparing with the “previous” database, and then writing a new “output” database for the clients. By default, GENIP operates on the DHCP database every 3 seconds, and it is thus advantageous to have GENIP running on the same physical machine as the DHCP server itself. Similarly, as the device and/or session managers will be accessing the output database frequently as well, the output file should be placed in a directory which is shared-out by the server and to which the clients have access. Although this requires agreement by the clients on where the output database is stored, this feature of the protocol may be improved upon by providing a protocol which both is non-polling for the events and also does not require manual configuration. For example, instead of writing to a file, the UpdateDB( ) member of GENIP may prepare a network packet which could be broadcast into the subnet of interest, the packet containing instructions for the client on how and where to get the latest database information. This may be simply implemented by using the http protocol, placed on an unused port such as 8080 for example, so that the broadcast message would contain http://server_ip_address:8080/network_db.txt. The “network_db.txt” portion of the message would not be used if the only use for port 8080 is the network database. For improved future capability and expansion purposes, other information would be allowed to be transmitted via this same http port, and an actual full URL is provided. Auto-Tree Builder In one embodiment of the invention, an auto-tree builder uses the contents of the device list file of a home network in order to generate a device link page. The device link page is displayed to the user on the screen of a browser based home device. The device link page contains a home device button for each home device identified in the device list file. Each home device button in the device link page is associated with a hypertext link (hyperlink) to the top-level page of the respective home device. If a user selects a particular home device button contained in the device link page, the respective device's home page is subsequently displayed to the user on the browser based home device's screen. FIG. 5B illustrates an example of a home device tree structure 400 according to certain embodiments of the invention. In this example, the home device tree structure 400 contains a device list file 410, a device link page 412 and three top-level device pages (DSS 414, DTV 416 and DVD 418). Using the device information contained in device list file 410, the auto-tree builder generates the device link page 412 and inserts links (e.g. hypertext links) to the top-level page of each device (DSS 414, DTV 416 and DVD 418). In this example, the device page DSS contains several data files 420 that can be accessed via the link between the device link page 412 and the DSS top-level device page 414. In certain embodiments, in generating the device link page, the auto-tree builder uses the device list file to create a device HTML file that contains a home device button for each home device that is currently connected to the home network. Using the IP addresses contained in the device list file, the auto-tree builder accesses each home device to obtain the Properties file information and the URL of the top-level page (i.e. USER.HTML file) associated with each home device. Using the respective URL information, the auto-tree builder converts each home device button in the device HTML file to a hyper-text link to the top-level page of the respective home device. This device HTML file is then used as the device link page. For example, FIG. 5A is a device link page 402 according to one embodiment of the invention. As depicted, device link page 402 contains home device buttons 406 for each home device connected to the home network 100. Each home device button 406 is associated with a hypertext link to the top-level home page of the corresponding home device. If a user selects a particular home device button 406 contained in the device link page 402, the respective device's home page is subsequently displayed to the user. In certain embodiments of the invention, the auto-tree builder also retrieves the ICON.GIF image file that is stored in each home device. The auto-tree builder then uses the ICON.GIF images for displaying each of the corresponding home device buttons. In addition to the ICON images, in certain embodiments, the auto-tree builder also obtains the LOGO.GIF image file for each home device. The auto-tree builder associates each LOGO.GIF image with a hypertext link to the home page of the device's manufacturer. The LOGO image is then included in the device HTML file. For example, FIG. 6 is a device link page 502 according to one embodiment of the invention. As depicted, the device link page 502 contains home device buttons 504 and manufacturer device buttons 506. The home device buttons 504 are represented by the ICON.GIF images of each corresponding device. The manufacturer device buttons 506 are represented by the LOGO.GIF images of the respective manufacturer of the corresponding home device. In certain embodiments, as depicted in FIG. 7, the user may define the arrangement of device images 602 and logos 604 on the device link page 606, according to his or her own criteria. For example, a user may arrange the device images 602 and associated logos 604 in groups according to the respective home device's placement in the home, e.g., on a room by room basis. In such an example, a camcorder manufactured by SONY, a DTV manufactured by Samsung and a DBSS manufactured by Zenith may all be grouped in a living room group 608. In this embodiment, the user may also include additional text lines 610 to describe the groupings and/or the devices depicted by the device images 602 and associated logos 604. Session Manager As previously noted, a session manager provides the primary interface between a user and a home network. The session manager, when properly activated, generates a session page that provides an interface which allows users to command and control the home devices that are connected to the home network in order to perform various functions and/or services. Some typical services that are available on a home network include, but are not limited to, starting a movie playing, programming a DBSS, and recording a television program. The session manager displays available home network services (servers) and matches capabilities and selections made in one graphic user interface (GUI) with another GUI to facilitate sensible and easy selection, thus simplifying use of the home network. FIG. 9 is a block diagram illustrating a session manager 750 causing two home devices (DTV 752, DVCR 754) to communicate over a home network according to certain embodiments of the invention. As depicted in this example, by sending command and control information to the home devices (DTV 752, DVCR 754), the session manager 750 causes the home devices (DTV 752, DVCR 754) to communicate with each other (i.e. audio/video stream). For example, to display a recorded TV show, the session manager 750 sends command/control information to cause the DVCR 754 to broadcast information (e.g. the TV show) on a particular stream over the home network. In addition, the session manager 750 sends command/control information to cause the DTV 752 to display the information that is being broadcast on the particular stream over the home network. Similarly, though not shown in the drawing Figure, the session manager may send command/control information to cause a tuner (for example the DBSS) to broadcast a TV show on a stream over the network and may send further command/control information to either or both the DTV and DVCR to display and/or record the TV show. In still another alternate embodiment, if a single physical housing, or package, were to include both a DTV and a tuner (i.e., two separate logical devices), the command/control information sent to the housing would cause the tuner therein to broadcast a TV program on a stream over the home network to either (or both) the DTV in the same housing and/or to the separately housed DVCR. More specifically, client/server control actions may be implemented to initiate an A/V program source stream and a sink server stream. Once data is flowing, the session manager client may disengage from this activity and perform other functions. In controlling the illustrative configuration, the session manager may cause the DVCR 754 to save a first state, e.g., “timer record”, and the DTV to save a second state, e.g., “timer select a program”. A clock later triggers the saved states into action. In this example, no further control actions are required of the session manager. However, for more complex examples, the session manager may remain in, or regain, control, or may initiate further control of other devices. Although the basic model illustrated in FIG. 9 shows one client and two servers, one server representing the control program controlling the DTV as providing a display service and the other representing the control program controlling the DVCR to provide a recording service, the model can be extended to a plurality of N servers where N>2. FIG. 8 illustrates a session page 702 according to one embodiment of the invention. In this example, the session page 702 contains frames 704, 706 and 708. As depicted, frame 704 contains a device link page 710 that contains device buttons 712 for each home device currently connected to the home network. When the session manager is activated, it causes the auto-tree builder process to generate a new device link page. In certain embodiments, the session manager is notified as home devices are dynamically added and removed from the home network. For example, referring back to FIG. 4B, when the GENIP process 316 determines that a home device has been either added to or removed from the home network, the GENIP process 316 notifies the session manager. The session manger then causes the auto-tree builder process to generate a new device link page. In an alternative embodiment, the session manager periodically polls the device list file 318 to determine if it has been updated with new home device information. If the session manger determines that device list file 318 has been updated, the session manager causes the auto-tree builder process to generate a new device link page. In certain embodiments of the invention, the auto-tree builder process functions are contained within the session manager. Thus, in one embodiment of the invention, the session manager generates the device link page by performing the previously described auto-tree builder functions. A critical function of the session manager is to enable a user to initiate an available service on the home network. An available service is a particular function that can be performed by one or more home devices that are currently powered-on and connected to the home network. For example, a service may consist of selecting a DTV for viewing a particular TV show and tuning the DBSS to a particular station that is carrying the respective TV show. To enable a user to initiate an available service, when the user selects a particular home device button 712 from the device link page 710, the session manger causes the top-level home page of the selected home device to be displayed within a frame contained in session page 702. For purposes of explanation, it shall be assumed that a user selects the device button 712 corresponding to “Dad's TV”. As shown in FIG. 10, when the user selects the device button 712 for Dad's TV, the session manager displays the top-level home page 804 for the respective home device in a frame 706 of the session page 802. FIG. 10 is similar to FIG. 8 and, therefore, like components have been numbered alike. As depicted in FIG. 10, in certain embodiments of the invention, the LOGO image 806 that is associated with the selected home device is displayed within the frame 706. After a device image 712 is selected, the session manager continues to display the contents of the device link page 710: However, in certain embodiments, the selected device button 712 is deactivated and is, therefore, non-responsive for further selection by the user. For example, when the device button 712 corresponding to Dad's TV is selected, it is deactivated and becomes non-responsive to further selection by the user. When the user selects a home device button 712, the session manager obtains the particular capabilities of the selected home device. The particular capabilities of a home device includes a list of standard named functions that the respective home device is capable of performing, e.g., the capabilities of a DVCR generally include “accepting video” and “displaying video”. In certain embodiments, the session manager obtains the particular capabilities of a selected home device by accessing a standard named file on the respective home device. After obtaining the particular capabilities of the selected home device, the session manager searches the capabilities of the other home devices that are represented in the device link page 710 (i.e., listed in the device list file), for matches to the particular capabilities of the selected home device. For each home device found to have a matching capability to the selected home device, the session manager continues to activate the respective device button 712 (i.e., maintains it responsive to selection by the user). For each home device that is found to have no matching capabilities to the selected home device, the session manager deactivates the respective device button 712 (i.e., sets it non-responsive to selection by the user) in order that the user may not further select the respective device for the current session. For example, where the user has selected a client device such as a TV display, the session manager may specifically search for matching devices which are capable of acting as video servers, or sources, rather than for other displays. Under such circumstances, the session manager may deactivate buttons for other displays. Alternatively, in a “control only” mode of operation, where a server-client relationship is not being established, the session manager does not seek a second device which may act as a source for the selected device. More particularly, in accordance with the invention it is possible to operate with a number of software agents representing devices which are capable of controlling lights, for example. In such an environment, the user would select both a control device, which is not a source or server of information, and one or more light devices to be controlled thereby. When the user first selects the control device, the session manager may then identify various devices capable of being controlled by, or interacting with, the selected device and continue to activate the respective device buttons thereof, while deactivating the buttons for other devices. Indeed, it should be appreciated that the session manager may select any number of devices for presentation to the user as possible choices for operation, for which the selection buttons remain activated. The devices may or may not co-operate with each other. That is, the devices whose buttons remain activated may operate in cooperation with, or independently of, each other. Where an information presentation device is selected, it may be possible that a plurality of servers may remain active for possible selection. For example, in accordance with some embodiments of the invention, when a device button for a DTV or DVCR is selected, the session manager may activate device buttons for several information sources, such as an audio server and a video server. Indeed, it is also possible that device selection buttons may remain activated for selection of plural video servers, and that upon selection of one video server the buttons for selection of other servers will be maintained activated, to account for situations wherein it is desired to provide multiple images on a single display. For example, it may be desirable to display an entertainment video while simultaneously displaying, as a picture-in-a-picture, video from a security camera or from another server. Alternatively, video information from one or more sources may be communicated to a plurality of client displays. It should thus be appreciated that, as appropriate information on capabilities of device interaction is provided to the session manager, the session manager will indicate that various of the devices are, or are not, enabled for selection by the user based on the user's prior selections. By acting as an agent for the user, the session manager obtains information relating to device capability and, in response thereto, deactivates selection buttons for particular devices while maintaining active the device selection buttons for other devices. By determining whether and which devices have matching capabilities, and by graying out (deactivating) buttons for non matching devices and activating buttons for matching devices, the session manager thus assists the user with making selections associated with the devices, or with managing the devices. With such assistance, the user may then select a second home device to interact with the previously selected home device in order to perform the desired service. Where the session manager has inhibited some selection possibilities and enabled others, the user's selection is simplified. Where the matching, selection, inhibiting or enabling has not been carried out by the session manager, the user performs the selection based on various criteria. For example, the user may simply wish to select or activate a specific device. Alternatively, the user may wish to select all devices capable of performing a specific function. In that regard, the session manager may generate a page which includes all contents of the network, and all functional capabilities, independent of specific device. Thus, the HTML page may identify services available to the user by content, such as by providing a list of video or audio programs, etc., which are available on the home network regardless of the device on which such content is being provided. Such a display is user transparent in the sense that the user is permitted to select information sources based on content, rather than equipment, device or channel through which the information is made available. On selecting the second home device, the session manager displays the home page for the second home device in frame 708. The order in which frames are chosen for displaying the home page of each selected device is not critical, and therefore, in certain embodiments of the invention, the home page of the first selected device is displayed in frame 708 and the home page of the second selected device is displayed in frame 706. FIG. 11 illustrates session page 902 after the selection of a second home device according to one embodiment of the invention. As shown in FIG. 11, when the user selects the device button 712 corresponding to Jim's DVD in this example, the session manager displays the top-level home page 904 for the respective home device in a frame 708 of the session page 902. FIG. 11 is similar to FIG. 9 and FIG. 10 and, therefore, like components have been numbered alike. As depicted in FIG. 11, in certain embodiments of the invention, the LOGO image 906 associated with the selected home device is displayed within the frame 708. Once two home device images have been selected, the session manager allows the respective home devices to communicate with each other to set up and perform the desired service as selected by the user through the options displayed on the respective home pages 804 and 904 of each selected home device. An example of an embodiment of a session manager session 1002 is displayed in FIGS. 12A, 12B and 13. In this example, as depicted in FIG. 12A, the user may choose one of four device images displayed in a device link page 1022 contained in frame 1004 of a session page 1012. In this example, the user may select a DSS device button 1014, a CD device button 1016, a DTV device button 1018 or a DVCR device button 1020. For explanation purposes, it shall be assumed that the user selected the DVCR device button 1020. As depicted in FIG. 12B, when the DVCR device button 1020 is selected, the session manager displays the home page for the respective DVCR in frame 1006 of the session page 1012. The session manager continues to display the four device images in the device link page 1022 of the session page 1012. After the user selects the DVCR device button 1020, the session manager determines the particular capabilities of the selected DVCR device and compares them with the particular capabilities of the other accessible devices on the home network, i.e., the DBSS, the CD and the DTV. In this example, the session manager determines that there is a match in capabilities between the selected DVCR and both the DTV and the DBSS. The session manager also determines that there is not a match between the capabilities of the selected DVCR and the capabilities of the CD. Thus, the session manager deactivates the device button 1016 for the CD in the device link page 1022. Additionally, because the DVCR device button 1020 was selected by the user, the session manager now deactivates the DVCR device button 1020 on the device link page 1022. Because the session manager found matching capabilities between the selected DVCR and the DBSS and the DTV devices connected to the home network, the session manager continues to keep the device buttons 1014 and 1018 active for these respective home devices in the device link page 1022. Therefore, in this particular example, the user may now additionally select either the DTV device button 1018 or the DSS device button 1014 in order that the selected respective device may interact with the previously selected DVCR to perform a particular service on the home network. However, because the CD device button 1016 has been deactivated, as there are no shared capabilities between the CD and the previously selected DVCR, the user may not select the CD device button 1016 at this time. In this example, the user additionally selects the DTV button 1018 contained in the device link page 1022. As depicted in FIG. 13, the session manager then displays the home page for the respective DTV in frame 1008 of the session page 1012. The session manager continues to display the DVCR device's home page in frame 1006 and the four device buttons 1014, 1016, 1018 and 1020 in the device link page 1022 of the session page 1012. The user may now select control options from the home pages of each selected device (e.g., play 1044 and volume 1042 respectively from the DVCR and the DTV home pages) in order to command and control the respective home devices to function in a particular manner. Any home device connected to a home network that can act as a client, i.e., which has the capability to display HTML files via is respective display unit (e.g., a DTV or a PC), may be designated a session server. A session server is a device that contains a session manager, a display unit (i.e., screen), its own HTML page files, including a top-level, home HTML page file, and a browser. In certain embodiments, when a session server (e.g., a DTV, general purpose computer) powers up, the associated session manager is executed and a session page, as discussed previously in FIG. 12A, is displayed on the display unit of the particular session server. The user may then select a home device to command in order to perform a desired function or service. In an alternative embodiment, when a session server powers up, its respective browser runs and displays the top-level home page for the respective session server. In certain embodiments, the session server's home page is associated with a standard filename, such as USER.HTML. Associated with the session server's home page is a device page button option which, when selected, causes the session manager executing on the session server to display a session page as discussed previously in FIG. 12A. Executing a Service As previously indicated, the session manager is the primary interface between the user and a home network. It is a tool capable of accessing and controlling every home device on the network, and, generally, should be available on every browser-based home, i.e., client, device. The session manager enables a user to begin a service on the home network. As previously discussed, in relation to FIGS. 12A, 12B and 13, a session manager allows an user to choose up to two home devices at one time, which he or she wishes to control to perform a specific service. Each home device possesses one or more capabilities. For example, a DVCR is capable of both accepting and outputting a video signal, a CD player is capable outputting an audio signal, and a DTV is capable accepting video signal. Capabilities are either source-like or sink-like. A CD player posses a source-like capability as it is capable of outputting an audio signal. In contrast, a DVCR possess both source-like and sink-like capabilities as it can accept and output a video signal. Each source-like capability has a complementing sink-like capability that is compatible with it. For example, the outputting video capability of one home device is complemented by the accepting video capability of a second home device. Each capability is associated with a certain set of data specifications. For example, when a DVCR outputs a video signal, the video signal is broadcast on a particular stream of the over the home network. The stream number and other information about the signal form part of the DVCR's (outputting home device) data specification message. Therefore, in one embodiment, to execute a session, a first home device (outputting home device) communicates a data specification message to a second home device (accepting home device) via the session manager. To provide for home device communication, each home device has a control application associated with it. The control application for a home device handles the communication between the session manager of the respective home network and the home device. Therefore, the control application for two respective home devices, provides a mechanism that allows two home devices to communicate with each other via the control manager. In certain embodiments, the control application is a device-specific packet of Java code that communicates with the hardware of the respective home device, thereby controlling that home device. By having a control application associated with each home device on the home network, the control implementation details of the respective home device are grouped and maintained within a vendor-supplied device application. The control application of a home device further enables the respective vendors to provide their own control scenarios for their devices. All of the control applications of the home devices on the home network, however, must comply with certain pre-defined specifications in order to enable a respective home device to communicate with the session manager. In certain embodiments, each home device on the home network has a list of data specifications associated with it. For example, a DVCR that has been instructed to “Output Video”, i.e., transmit a video signal, broadcasts the video signal on a particular isochronous stream. The stream identification information and other details about the video signal form part of the data specifications for the DVCR. The control application of a home device, e.g., a DVCR, is capable of storing and advertising the home device's data specifications when queried by the session manager. As previously discussed, the session manager can query various home devices for their particular capabilities. The session manager is also responsible for querying various home devices for their data specifications, in order to ensure the requested user service is properly established and performed. Once a user selects two home devices to perform a particular service, the user must choose certain device options for each of the selected home devices to perform that particular service. By choosing various device options, the respective device's hardware is initialized to perform the service. The session manager coordinates the communication between the selected devices to establish their hardware configurations and to perform the requested service. As an example, referring again to FIG. 13, if a user wishes to play a video on the DTV, the service will consist of the playing of a video in the DVCR and the displaying of the respective video on the DTV. After the user selects the PLAY command option on the DVCR, the DVCR, among other tasks, chooses the isochronous stream that the video signal will be broadcast on. This information, as well as other pertinent information regarding the signal to be broadcast and the particular DVCR hardware setup for broadcasting, i.e., the data specifications of the DVCR for the PLAY service, are subsequently forwarded to the session manager. The session manager, upon receiving the data specifications from the DVCR, forwards the information to the DTV, in order that the DTV may properly initialize its hardware to display the video signal broadcast by the DVCR. Some time thereafter, the session manager deletes the session page 1012 from the DTV display screen, allowing the DTV to display the video broadcast by the DVCR. External Connection Because the home network is Internet protocol compatible, connecting the home network to the Internet can provide the advantage of being able to control home devices from outside the home. Therefore, in certain embodiments of the invention, a connection is provided which allows the home network to interface with the Internet. FIG. 14 depicts a home network 1100 connected to the Internet 1102 in accordance with the present invention. Because many of the components in FIG. 14 are similar to FIG. 1, like components are numbered alike. As depicted in FIG. 14, in certain embodiments an Internet proxy 1104 is used to provide an interface between the home network 1100 and the Internet 1102. By providing an interface between the home network 1100 and the Internet 1102 a user can remotely control home devices connected to the home network 1100. For example, if a user is required to work late and is therefore unable to watch the Monday night football game, the user can program a DVCR connected to their home network via the Internet, in order to record the particular event. Connecting the home network to the Internet can induce potential security access issues. Therefore, in certain embodiments, a security mechanism is associated with the home network that is used to restrict access to the home network to particular authorized users. Macros As described above, a user must typically perform a sequence of steps in order to cause a home device to execute a particular service. In addition, because users of a home network typically have dissimilar preferences as to the particular settings of certain home devices, a sequence of steps may be repeatedly performed in order to adjust the settings of a respective home device. For example, a first user may have a particular preference as to the brightness, tint and/or contrast of a particular DTV, while a second user has different preferences. To reduce the number of repeated steps typically performed by a user to set the settings of a particular home device, in certain embodiments of the invention a sequence of steps can be saved as a macro. A macro is a sequence of commands that is saved in memory on a home device and which can be accessed and executed by a user. The macro executes as if the user actually selected a particular button or performed a particular action from within a HTML page contained on the respective home device. The use of macros can significantly reduce the amount of work that is required by a user to perform a particular function as a single macro can be used to facilitate the convenient setup and control of several devices in tandem. For example, a user may want to record a particular TV program on channel 2 at 8:00 p.m. for 1 hour every Tuesday night. This normally requires the user to select a DBSS or DTV as the source of the program and to enter a particular sequence of steps to program a DVCR to receive and record the program. However, using a macro, the user need only perform the step of executing the particular macro. The macro then executes the necessary steps of selecting and commanding the particular devices in order to record the program. There are multiple ways of generating macros depending on the particular respective home devices' software capabilities and the implementation of their HTML pages. In certain embodiments of the invention a preset type of macro is used which saves the actual values of a device's parameters. The preset type of macro can be used in a home network in which the parameter values of a particular home device can be queried and set. The preset macro is created by saving the current value of a particular set of home device parameters. Each macro is associated with a name so that it can be easily retrieved and executed at a later time. When a macro is subsequently executed it issues the appropriate commands to set the chosen parameters of the respective home device to their assigned value. For example, FIG. 15 depicts the creation of a preset macro 1200 according to one embodiment of the invention. As depicted in FIG. 15, when a create macro button 1202 on a respective HTML page of a home device is selected, a macro generation process 1204 begins to execute. Execution of the macro generation process 1204 causes a set of user selected device parameter values 1208, selected from the home device's parameter list 1206, to be saved to a macro file 1210. The macro file 1210 is assigned a unique macro name 1212 and saved on the home device. The macro name 1212 is saved as a macro name button on the home device's macro list HTML page 1214. Thereafter, a user may select the macro name button, causing the respective macro file 1210 to be executed. In one embodiment of the invention, a macro button is included on a respective home device's HTML home page. Selecting the macro button causes the macro list HTML page 1214 to be displayed to the user. In one embodiment, the create macro button 1202 is contained on the macro list HTML page 1214 for a respective home device. In an alternative embodiment, a player piano macro is created by a home device's software and/or hardware saving the particular steps taken by a user while interacting with the device's HTML pages (e.g., the user's button selections, data entries and/or cursor movements are saved as they are executed by the user). Again, the created macros are associated with a particular name so that they may be easily retrieved and executed at a later time. When the player piano macro executes, it performs the particular sequence of instructions as if the user was accessing the respective home device HTML page(s) and executing the sequence of steps directly. For example, FIG. 16 depicts the creation of a player piano macro 1300 according to one embodiment of the invention. As depicted in FIG. 16, when a create macro button 1302 is selected a macro generation process 1304 begins to execute. Execution of the macro generation process 1304 causes a user interaction 1306 to be interpreted as a particular action by a command interpreter 1308. The respective actions are copied into a macro file 1310, which is saved on the respective home device and assigned a unique macro name 1312. The macro name 1312 is saved as a macro name button on the home device's macro list HTML page 1314. Thereafter, a user may select the macro name button, causing the respective macro file 1310 to be executed. In addition to the user created macros, in certain embodiments of the invention, a predefined set of macros are stored in the respective home device's memory for access by a user. Because macros are typically device dependent, in certain embodiments of the invention the manufacturer of a particular home device creates and defines a set of macros that can be executed on the respective home device. Home Network Program Guide To provide a user with a list of available multi-media material (e.g., audio and video programs, TV programs, and CDs), one or more home network program guides are associated with a home network. The one or more home network programming guides may be categorized as to the available multi-media material on a particular home device or may be combined in various ways to depict a particular group of accessible multi-media material. A television programming guide typically provides a list and schedule of programs that are available for viewing on a particular channel. Most digital satellite services provide programming information through an Electronic Programming Guide (EPG). The EPG displays a list of available programs and the specific time in which the programs can be viewed through the service. The EPGs are continually updated to reflect a current window of available programs. The home network uses the EPG information to build a home network HTML program guide. The HTML program guide is developed using the HTML standards and can be displayed on a browser based home device. In addition, users can customize the particular programming information that is displayed. For example, if a user would prefer not to display the schedule for a particular channel, e.g., because of its programming contents, the user may request that channel be removed from the HTML program guide. The information contained in an EPG is dependent on the particular DBSS that is used, and as such, there is currently no standard format for transmitting this information. Therefore, in one embodiment of the invention, a process extracts the information from a particular EPG and converts it into a standard program format. The standard program format is then used to build an HTML program guide. The HTML program guide can be displayed on any browser based home device (e.g., a DTV or a PC). Like the EPGs, the HTML program guide is periodically updated to reflect the currently available programs. As stated above, the user can customize the displayed HTML program guide to view only a particular set of the available information. If an EPG format standard is developed, the HTML program guide can be built without first converting the EPG information into the standard program format. Therefore, in certain embodiments of the invention, the HTML programming guide is built using a standard EPG format as transmitted by a particular DBSS. In addition to the EPG received on a DBSS, the home network can be associated with other home devices that contain multi-media material. For example, a DVD may contain certain movies, a PC may contain specific files (e.g., games, picture images), a DVCR may contain a particular movie, and a CD player may contain specific CDs. In certain embodiments, each home device maintains an HTML program guide file that contains a list of the material currently available on the respective home device. Using a browser based home device, a user can display the available material on a particular home device by rendering the particular home device's HTML program guide file. In certain other embodiments of the invention, a multi-media identification process is tasked with searching the accessible home devices to determine what material is currently available on each of them. In one embodiment, the multi-media identification process accesses each home device to obtain a file or directory that contains a list of the available material on the particular home device. A home device contents process then creates one or more HTML program guide files that depict the material currently available to the user. A user can display the available material by rendering a particular HTML program guide file. In an alternative embodiment, the multi-media identification process obtains the HTML program guide file that is maintained on a respective home device. Using the HTML program guide files obtained from the particular home devices of the home network, the multi-media identification process creates one or more HTML program guide files that depict the material currently available to the user. A user can display the available material by rendering a particular HTML program guide file. CONCLUSION In accordance with the described invention, control of a plurality of devices (for example, a VCR, a CD player, a DVD player or any other device) is implemented with the aid of a single control loop, established from a video display of a client device (such as a TV or a PC) to a user, to a remote control device, to a detector (such as an IR detector) on the client device. Such a control loop is usable for controlling the plurality of devices, thereby eliminating a requirement for front panel controls on such devices. In one form of the invention, the control loop may be implemented by connecting the devices to a home network. Instead of using traditional front panel controls, the invention thus provides for control of such devices through the home network by interaction with the respective GUI thereof as rendered on the client device. The invention also eliminates a requirement for a remote control device to include therein, or to have access to, control codes specific to each of the devices on the network. In the illustrative embodiment described herein, the remote control device may fetch a GUI to provide the appropriate control function. In a modification, the remote control may include a display thereon for displaying the fetched GUI, thus eliminating a need for a separate display on a client device. The invention thus permits the remote control to access and control a plurality of devices using a single remote control and a single display, with a single method of display and operation, without requiring any change in the mode of operation thereof to change the device controlled thereby. The foregoing description of the preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed, since many modifications or variations thereof are possible in light of the above teaching. All such modifications and variations are within the scope of the invention without departing from the broader spirit and scope of the invention. The embodiments described herein were chosen and described in order best to explain the principles of the invention and its practical application, thereby to enable others skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated therefor. It is intended that the scope of the invention be defined by the claims appended hereto, when interpreted in accordance with the full breadth to which they are legally and equitably entitled. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. Those skilled in the art will appreciate that various adaptations and modifications of the just-described preferred embodiments can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to the field of networks, and more particularly to providing an interface to access devices currently connected to a home network. 2. Description of Related Art A typical household contains several home devices. As used in this document, the term “home device” encompasses all electronic devices that are typically found in the home, with the exception of general purpose computers (i.e. personal computers (PCs), laptop computers, etc). For example, the term home device includes but is not limited to such electronic devices as security systems, theatre equipment (e.g., TVs, VCRs, stereo equipment, and direct broadcast satellite services or (DBSS), also known as digital satellite services (DSS)), sprinkler systems, lighting systems, micro waves, dish washers, ovens/stoves, and washers/dryers. Indeed, an automobile may be a home device. On the other hand, the term “device” as used in this document may comprise logical devices or other units having functionality and an ability to exchange data, and may include not only all home devices but also general purpose computers. In general, home devices are used to perform tasks that enhance a homeowner's life style and standard of living. For example, a dishwasher performs the task of washing dirty dishes and relieves the homeowner of having to wash the dishes by hand. A VCR can record a TV program to allow a homeowner to watch a particular program at a later time. Security systems protect the homeowner's valuables and can reduce the homeowner's fear of unwanted entry. Home devices (such as home theatre equipment) are often controlled using a single common control unit, namely a remote control device. This single common control unit allows a homeowner to control and command several different home devices using a single interface. Thus, many manufacturers have developed control units for controlling and commanding their home devices from a single interface. One drawback associated with using the remote control unit to command and control home devices is that it provides static control and command logic for controlling and commanding each home device. Therefore, a particular remote control unit can only control and command those home devices for which it includes the necessary control and command logic. For example, if a remote control unit comprises logic for controlling a television (TV), a video cassette recorder (VCR), and a digital video device (DVD), but not a compact disk (CD) unit, the remote control unit can not be used to command and control the CD unit. In addition, as new home devices are developed, the remote control unit will not be able to control and command the new home devices that require control and command logic that was not known at the time the remote control unit was developed. Where a device, such as a remote control, is available for communicating with or controlling a plurality of home devices that are connected to a home network, it is necessary to be able to identify the devices which are currently connected to, and active on, the network. Therefore, there is a need for a method of detecting, identifying and creating links to the devices currently connected to the network. Also, there is a need for a mechanism that provides for dynamically updating the devices detected as connected to the network, and for rendering a user interface to enable user control and command of any device that is currently connected to the network.
<SOH> SUMMARY OF THE INVENTION <EOH>It is accordingly an object of the invention to overcome the problems of the prior art, and to provide an interface for accessing home devices that are currently connected to a home network. It is another object of the invention to provide a method and apparatus for controlling any of a plurality of devices currently connected to the network. The present invention accordingly provides a method for providing an interface for accessing home devices that are currently connected to a home network, to enable a user to communicate with, to command and to control such home devices. In accordance with a feature of the invention, an interface for accessing home devices is provided by a method which includes the steps of generating a device link file, wherein the device link file identifies home devices that are currently connected to the home network; creating a device link page, wherein the device link page contains a device button that is associated with each home device that is identified in the device link file; associating a hyper-text link with each device button, wherein the hyper-text link provides a link to an HTML page that is contained on the home device that is associated with the device button; and displaying the device link page on a browser based home device. According to one aspect of the invention, the device link file may be generated by detecting that a home device is connected to the home network; associating a logical device name with the home device; and storing the logical device name in the device link file. In accordance with another aspect of the invention, the device link page may be created by retrieving a logical device name from the device link file; storing the logical device name in the device link page; and converting the logical device name to a device button. In accordance with still another aspect of the invention, the hyper-text link may be associated with each device button by retrieving a URL from a home device, wherein the URL is maintained in a properties file associated with the home device; and associating the URL with the device button that is associated with the home device. In accordance with yet another aspect of the invention, the manufacturer device button is stored in the device link page by storing the manufacturer device button in a user definable area of the device link page. These and other objects, features and advantages will become more readily apparent from the following description of a preferred embodiment of the invention.
20040310
20070612
20050113
61219.0
1
BASHORE, WILLIAM L
METHOD AND APPARATUS FOR A HOME NETWORK AUTO-TREE BUILDER
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,797,753
ACCEPTED
Reference slots for signal traces
An apparatus comprises a signal layer including a first and second signal trace. The apparatus also comprises a first reference plane including a first slot substantially parallel to the first and second signal traces. Further, the apparatus includes a dielectric layer having at least a portion disposed between the signal layer and the first reference plane.
1. An apparatus comprising: a signal layer including a first and a second signal trace; a first reference plane including a first slot substantially parallel to the first and second signal traces; and a dielectric layer having at least a first portion disposed between the signal layer and the first reference plane. 2. The apparatus of claim 1 wherein each of the first and second signal traces comprise a first portion with a first width, and a second portion with a second width. 3. The apparatus of claim 2 wherein the first slot comprises a first portion and a second portion having a first slot width and a second slot width, respectively. 4. The apparatus of claim 3 wherein the first and second portions of the first slot correspond to the first and second portions, respectively, of the first and second signal traces. 5. The apparatus of claim 3 wherein each of the first and second signal traces further comprises a third portion with a third width and the first slot comprises a third portion, comprising a third slot width, corresponding to the third portion of the first and second signal traces. 6. The apparatus of claim 1 wherein the first and second signal traces have a first and a second signal trace width wherein the first signal trace width is substantially the same as the second signal trace width. 7. The apparatus of claim 1 wherein the signal layer further includes a third and a fourth pair of signal traces and a second slot. 8. The apparatus of claim 1 further comprising: a second reference plane including a second slot substantially parallel to the first and second signal traces; and the dielectric layer further includes a second portion disposed between the signal layer and the second reference plane. 9. An assembly comprising: an apparatus comprising: a signal layer including a first and second signal trace; a first reference plane including a first slot substantially parallel to the first and second signal traces; and a dielectric layer having at least a first portion disposed between the signal layer and the first reference plane; a processor coupled to the apparatus; and a networking interface coupled to the apparatus. 10. The assembly of claim 9 wherein the first and second signal traces are coupled to the processor and the memory device. 11. The assembly of claim 9 wherein each of the first and second signal traces comprise a first portion with a first width and a second portion with a second width. 12. The assembly of claim 11 wherein the first slot comprises a first portion and a second portion having a first slot width and a second slot width, respectively. 13. The assembly of claim 12 wherein the first and second portions of the first slot correspond to the first and second portions, respectively, of the first and second signal traces. 14. The assembly of claim 9 further comprising: a second reference plane including a second slot substantially parallel to the first and second signal traces; and the dielectric layer further includes a second portion disposed between the signal layer and the second reference plane. 15. The assembly of claim 9 wherein the first and second signal trace are to facilitate propagation of a differential signal pair. 16. A system comprising: an assembly comprising: an apparatus comprising: a signal layer including a first and second signal trace; a first reference plane including a first slot substantially parallel to the first and second signal traces; and a dielectric layer having at least a first portion disposed between the signal layer and the first reference plane; and a processor coupled to the apparatus; and a networking device coupled to the assembly. 17. The system of claim 16 wherein the a assembly further comprises a networking interface, wherein the networking interface is coupled to the networking device. 18. The system of claim 16 wherein the assembly further comprises an interface to persistent storage and wherein the system further comprises persistent storage coupled to the interface to persistent storage. 19. A method of routing circuit board traces comprising: routing a first signal trace and a second signal trace substantially parallel to the first signal trace on a signal plane of a circuit board; and routing a slot in a reference plane of the circuit board substantially parallel to the first second signal traces, for at least a portion of the first and second signal traces. 20. The method of claim 19 wherein the substantially parallel portion of the first and second signal traces comprises a first portion with a first width and a second portion with a second width. 21. The method of claim 20 wherein said routing of a slot comprises routing a first portion and a second portion of the slot, with a first and a second slot width respectively, corresponding to the first and second portions of the first and second signal traces.
FIELD OF THE INVENTION The present invention relates to printed circuit board (PCB) design. BACKGROUND OF INVENTION Increasingly complex designs are resulting in challenges to designers of printed circuit boards. Printed circuit board designs are becoming more complex due to various factors. One factor making printed circuit board designs more complex is related to the increase in the density of integrated circuit devices (i.e. the amount of logic on integrated circuit devices) that are used as part of a printed circuit board assembly. As integrated circuits increase in density, the number of input/output (I/O) signals to those integrated circuits increases while trying to maintain similar footprints on the printed circuit board. Thus, printed circuit boards supporting these increasingly dense integrated circuits become more complex with respect to the increased number of signal traces they support. BRIEF DESCRIPTION OF DRAWINGS Embodiments of the present invention will be described referencing the accompanying drawings in which like references denote similar elements, and in which: FIGS. 1A and 1B illustrate a top view and a cross section view of a portion of a prior art printed circuit board design. FIGS. 2A and 2B illustrate views of a printed circuit board design including a slot in the reference plane, in accordance with one embodiment. FIG. 3 illustrates a top view of a portion of a printed circuit board utilizing reference slots, in accordance with one embodiment. FIGS. 4A-4C illustrate cross sectional views of regions of the portion of a printed circuit board of FIG. 3. FIG. 5 illustrates a stripline signal trace pair, in accordance with one embodiment. FIG. 6 illustrates a printed circuit board assembly design utilizing an embodiment of the present invention. FIG. 7 illustrates a system included a printed circuit board having reference slots, in accordance with one embodiment. DETAILED DESCRIPTION OF THE EMBODIMENTS In the following detailed description, a novel method and apparatus for utilizing a reference slot (i.e., a slot in a reference plane) are disclosed In this description, mention is made to the accompanying drawings which form a part hereof wherein like numerals designate like parts throughout, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims and their equivalents. FIGS. 1A and 1B illustrate a top view and a cross section view of a portion of a prior art printed circuit board design. Illustrated in FIG. 1A are two signal traces 140 142 routed parallel to each other for the portion of the printed circuit board design. FIG. 1B illustrates a cross section of one region showing a signal layer 160, a dielectric layer 170 and a reference plane 180. The signal layer contains signal traces 140 142. The reference plane 180 may be coupled to ground or some other reference voltage. The reference plan may provide a reference voltage for the printed circuit board design. The signal traces originate in a breakout region 110, i.e., from an area with connections 150 152 to a silicon device (not illustrated). For example, the connections 150 152 may be pads to connect a surface mount device to the printed circuit board. In the breakout region 110, the traces 140 142 may each have a certain thickness t1 112. In addition the traces 140 142 may have distance d1 114 between each other. As the signal traces 140 142 leave the breakout region 110 and transition to a second region 120, the trace thickness, t2 122, increases and the distance, d2 124, between traces increases. As signals 140 142 fanout to a third region 130, the trace thickness t3 132 further increases as does the distance d3 134 between traces. The increase in thickness of the signal traces may provide for, among other things, increased signal integrity in terms of reducing loss in signals transmitted on the signal traces. As the trace width increases in a new region, if the distance between the signals is not increased, the impedance of the traces in this new region may not match the impedance of the previous region. This may occur, for example, due to differential impedance between the signal traces. To provide for the ability to match impedances between regions, in this prior art design, the spacing between the signal traces is increased as the signal trace widths are increased. However, the increased distance between the signal traces may reduce the ability to perform high density routing of signal traces on the printed circuit board. Since more space is necessary between the traces, the lower the total number of signals that may successfully be routed on the printed circuit board during layout, given the spacing rules for a printed circuit board technology. By reducing the spacing between signal traces on a circuit, it may be possible to increase the number of signals that can be successfully routed. In addition, in a breakout region of a design, with trace widths reduced to a value that still provides enough signal integrity and a desired target impedance, there is a limit to the minimum separation on signals in the breakout region. This in turn limits the density of pins on a device connected to the printed circuit board, e.g., at pads 150 152. Thus, to increase the number of input/output signals, and thus the number of pins, on a device, the device package increases in size. This may be undesirable for a number of reasons. FIG. 2A illustrates a cross sectional view of a printed circuit board design including a slot in the reference plane, in accordance with one embodiment. Illustrated are signal trace pair 290 in a signal layer 260. Also illustrated is a dielectric layer 270 and reference plane 280. In one embodiment, the signal trace pair 290 may carry differential signal pairs. As such, the traces may originate at approximately the same location on a printed circuit board and terminate at approximately the same location on a printed circuit board. For example, a differential signal pair may source from closely spaced output pins of a processor and terminate at closely space input pins of a networking device. To improve common mode noise rejection between signals carried on the differential signals carry to the signal trace pair 290, the signal traces may be routed on the printed circuit board substantially parallel to each other from source to termination. As illustrated, the design includes a slot 285 in the reference plane 280 (i.e., a reference slot) that runs substantially parallel to the signal trace pair 290 and is centered between the signal trace pair 290. FIG. 2B illustrates a top level view of a printed circuit board design illustrating the signal trace pair 290 as well as the slot (hidden) which runs substantially parallel to the signal traces but along an opposite side of dielectric 270. Signal trace pair 290 comprises two substantially parallel signal traces 292 294. The two substantially parallel signal traces 292 294 are separated by a trace width TW 296. The slot width, SW 286, in the reference plane is also illustrated. While the embodiment has illustrated the reference slot as being centered between the signal trace pair, in alternative embodiments the reference slot may be off center. References slot 285 advantageously provides for reduced impedance for signals traveling on signal traces 290. For a desired impedance on signal traces 290 with a given trace width, there is a limit to the distance between signal traces. However, by utilizing a reference slot parallel to the signal traces, the impedance in the signal traces can be reduced. Thus, signal traces that are routed in high density areas of a printed circuit board may be laid-out closed together, while keeping the same impedance as traces further apart but with no reference slot. The width of the reference slot may determine the effect of the impedance change on the signal traces. A wider slot width may result in a further decreased impedance. FIG. 3 illustrates a top view of a portion of a printed circuit board 300 utilizing reference slots, in accordance with one embodiment. Illustrated are multiple regions 310 320 330 through which signal traces 342 344 pass. As the signal traces 342 344 move further away from breakout region 310, e.g. from a region with connections 352 354 to a silicon device (not illustrated), the trace width of the signal traces 342 344 increases. Thus, in a second region 320 the trace width, w2 322, is greater than in the breakout region 310. In a fanout region 330, the trace width, w3 332, is greater than in the second region 320. In comparison to the prior art design described in connection with FIG. 1, in the embodiment illustrated in FIG. 3, when the traces increase in thickness as they pass from region to region, the spacing between the traces 314 may, in one embodiment, remain substantially constant. Utilizing reference slots, impedance matching can be obtained between regions without the need to change the spacing between traces. This may result in the ability to have more dense signal trace layout over a printed circuit board. FIGS. 4A-4C illustrates cross sectional views of regions of the portion of a printed circuit board of FIG. 3. FIGS. 4A, 4B and 4C correspond to cross sectional views of regions 310, 320, and 330, respectively. Each cross section illustrates signal traces 342 344 which change width as the regions change. Also illustrated is dielectric 360 separating a signal layer, containing traces 342 344, from reference plane 470. By adaptively changing the width of slots in the reference plane, the impedance associated with corresponding signal traces may be modified. For example, in the embodiment illustrated, signal traces 342 344 have a trace width, tw1 312, in a first region 310. To achieve a particular impedance, for example 80 ohms, a corresponding slot with width w1 414 is placed in the reference plane 470. The determination of a slot width to provide a particular impedance may be empirically ascertained. The signal traces 342 344 have a different width, tw2 322, in a second region 320. In the embodiment illustrated, as a result of the different width, tw2 322, a corresponding slot with width w2 424 is placed in the reference plane 470. This slot width 424 is chosen to result in the impedance in the signal traces 342 344 matching the impedance of the signal traces in the first region 310, i.e., 80 ohms. Similarly, the slot width in the fanout region of the portion of the printed circuit board is chosen to result in a matched impedance of 80 ohms in the fanout region. FIG. 5 illustrates a stripline signal trace pair, in accordance with one embodiment. The stripline signal trace pair 542 544 (e.g. a signal trace pair routed in one of the inner layers) is “between” two reference planes 580 582. That is, as illustrated, a first reference plane 582 is above the stripline signal trace pair 542 544 and a second reference plane 580 is below the stripline signal trace pair 542 544. In the embodiment illustrated, both reference planes 580 582 may contain reference slots 510 512 which run parallel to the signal traces 542 544. In the illustrated embodiment, both reference planes 580 582 have slots 510 512 of equal width 590 to facilitate reduction in the impedance in signal trace pair 542 544. In another embodiment in a stripline design, only one of the reference planes contains a slot. In yet another embodiment, each reference plane contains a slot, however the two slots have different widths. FIG. 6 illustrates a printed circuit board assembly 600 utilizing an embodiment of the present invention. For the embodiment, printed circuit board assembly 600 includes printed circuit board 620, includes buses 614a-614b, processor 602, non-volatile memory 604, memory 606, bus bridge 608, interface to persistent storage 610, interface to networking equipment 614 and interfaces to other I/O devices 612 coupled to each other as shown. Buses 614a-614b comprise a number of signal traces for carrying signals between various devices on the printed circuit board as illustrated. In the embodiment illustrated, a top layer of the printed circuit board 620 contains microstrip traces on a dielectric material. The dielectric material may separate the microstrip traces from a reference plane (not illustrated). Reference slots may be utilized in the reference plane for one or more signal trace pairs to advantageously modify the impedance of signal using the signal trace pairs. FIG. 7 illustrates a system 700 included a printed circuit board having reference slots, in accordance with one embodiment. System 700 contains a printed circuit board 710. The printed circuit board 710 contains reference slots associated with signal trace pairs, in accordance with one embodiment of the present invention. In addition, the system 700 comprises a number of peripheral devices coupled to the circuit board 710 via various interfaces 712-716. For example, networking equipment 726 may interface to circuit board 710 via a Universal Serial Bus 716. Persistent storage 722 may interface to circuit board 710 via an Parallel Advanced Technology Attachment (UATA-100) interface. Although specific embodiments have been illustrated and described herein for purposes of description of the preferred embodiment, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations calculated to achieve the same purposes may be substituted for the specific embodiment shown and described without departing from the scope of the present invention. For example, the above description may apply to other apparatus such as integrated circuits. Those with skill in the art will readily appreciate that the present invention may be implemented in a very wide variety of embodiments. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.
<SOH> BACKGROUND OF INVENTION <EOH>Increasingly complex designs are resulting in challenges to designers of printed circuit boards. Printed circuit board designs are becoming more complex due to various factors. One factor making printed circuit board designs more complex is related to the increase in the density of integrated circuit devices (i.e. the amount of logic on integrated circuit devices) that are used as part of a printed circuit board assembly. As integrated circuits increase in density, the number of input/output (I/O) signals to those integrated circuits increases while trying to maintain similar footprints on the printed circuit board. Thus, printed circuit boards supporting these increasingly dense integrated circuits become more complex with respect to the increased number of signal traces they support.
<SOH> BRIEF DESCRIPTION OF DRAWINGS <EOH>Embodiments of the present invention will be described referencing the accompanying drawings in which like references denote similar elements, and in which: FIGS. 1A and 1B illustrate a top view and a cross section view of a portion of a prior art printed circuit board design. FIGS. 2A and 2B illustrate views of a printed circuit board design including a slot in the reference plane, in accordance with one embodiment. FIG. 3 illustrates a top view of a portion of a printed circuit board utilizing reference slots, in accordance with one embodiment. FIGS. 4A-4C illustrate cross sectional views of regions of the portion of a printed circuit board of FIG. 3 . FIG. 5 illustrates a stripline signal trace pair, in accordance with one embodiment. FIG. 6 illustrates a printed circuit board assembly design utilizing an embodiment of the present invention. FIG. 7 illustrates a system included a printed circuit board having reference slots, in accordance with one embodiment. detailed-description description="Detailed Description" end="lead"?
20040309
20060919
20050915
63701.0
0
SEMENENKO, YURIY
REFERENCE SLOTS FOR SIGNAL TRACES
UNDISCOUNTED
0
ACCEPTED
2,004
10,797,808
ACCEPTED
Learning method and apparatus
A method of learning and apparatus useful therein in which a card carrying a visual representation of a concept to be learned in displayed through a window carried on a common-use article, such as luggage items, decorative desk or table accouterments.
1. (canceled) 2. A reinforced-learning method for instilling a plurality of concepts in the mind of a user, said method comprising: (a) providing a plurality of cards, each said card carrying a visible representation of one of said plurality of concepts; (b) inserting a first one of said cards into a pocket carried by a normally portable common personal-use article that a user has occasion to observe at multiple times during the course of the user's normal public or business activities outside the home, said pocket having a transparent window visible to said user formed therein, said pocket be sized to accommodate one of said cards; (c) repetitively observing said first card and replacing it with another of said plurality of cards; and (d) repeating steps (b)-(d), using other cards of said plurality of cards. 3. A reinforced-learning system employing a series of printed visible representations of concepts to be learned by repetitive visual representations of visible representations of concepts to be learned by repetitive visual exposure thereto, said system comprising: (a) a normally portable common personal use article that a user has occasion to observe at multiple times during the course of the user's normal public or business activities outside the home, having a visible surface, wherein said personal use article is a member selected from the group consisting of purses, briefcases, book covers, backpacks, handbags and attache cases; (b) a transparent window on said surface; (c) a pocket carried by said article behind said window; and (d) a plurality of cards each carrying at least one of said representations, said cards sized for insertion into said pocket such that said one representation is visible through said transparent window. 4. The method of claim 2, wherein said personal-use article is a member selected from the group consisting of purses, briefcases, book covers, backpacks, handbags and attache cases.
FIELD OF THE INVENTION This invention pertains to a reinforced, self-instructional learning method and to apparatus useful in the practice of such method. More particularly, the method is specially adapted to instilling in the mind of the user a series of concepts, by repetitive sequential visual exposure to a series of visible representations of each of a plurality of such concepts. These and other, further and more specific aspects of the invention will be apparent to those skilled in the art from the following description thereof, taken in conjunction with the drawings, in which: BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 depicts a typical book carrier embodying various elements of apparatus of the invention; FIG. 2 is a sectional view of the apparatus of FIG. 1, taken along section line 2-2 thereof. FIG. 3 depicts the book carrier or briefcase of FIGS. 1 and 2, opened to show the details of the interior thereof; FIG. 4 is an exterior view of a purse or handbag, embodying the invention; FIG. 5 is an exterior view of a backpack, embodying the invention; FIG. 6 depicts an exterior view of an attache case, embodying the invention; and FIG. 7 depicts a picture frame, embodying the invention; and FIG. 8 depicts a decorative table box, embodying the invention. BACKGROUND OF THE INVENTION AND THE PRIOR ART Professional educators have long understood that an effective way of teaching a body of information to a student is to break the information into smaller discrete elements and present these elements repetitively and sequentially to the student. Indeed, the repetitive use of so-called “flash cards” as self-education tools is a common example of this technique. Moreover, it is known to provide common personal use items, such as luggage and the like with windows for the display of information such as the owner's name and address or decorative items, such as photographs, drawings, etc. For example, it is well known to provide a suitcase, attache case, computer carrying case, etc. with an integral pocket having a transparent side, into which one can insert a business card or equivalent card with written information indicating the owner's name, address, employer, etc. The present invention uses the general educational technique of repetitive self-instruction, employing a new combination of physical elements, which provides a convenient and effective method for enhancing learning of multiple concepts by a user. BRIEF DESCRIPTION OF THE INVENTION Briefly, my reinforced-learning system employs a series of visible representations of a series of concepts to be learned by the user by repetitive visual exposure of the representations to the user. A common-use article is provided having a visible surface. A transparent window is carried on the visible surface of the common-use article. A pocket is carried by the article behind the window. A plurality of cards are provided, each carrying at least one of the visible representations. These cards are shaped and sized to be inserted into the pocket with the representation is carried by the card is visible through the window. Using this apparatus, the method of instilling these concepts in the mind of the user comprises inserting a first one of the cards into the pocket behind the window, repetitively observing the first card through the window, removing the first card and replacing it with another of the plurality of cards and then repeating this process of inserting a new card and repetitively observing it by the user. DEFINITIONS As used herein the term “common-use article” includes a wide variety of items that a user has occasion to observe at multiple times during the course of the user's normal activities. For example, such items include normally portable items such as purses, briefcases, book covers, backpacks and the like, as well as normally non-portable items such as picture frames, decorative boxes, wall hangings and the like, which are not carried by the user, but which are normally prominently visible on multiple occasions in the user's normal environment, e.g., in the home, office or automobile. “Visible representation” means indica carried on a card suitable for insertion behind the window on the common use article. The indicia can be handwritten or printed and can include words, pictures, scientific formulae and combinations thereof suitable to visibly represent the concept to be impressed on the brain of the user of the common-use article. DETAILED DESCRIPTION OF THE INVENTION AND THE PRESENTLY PREFERRED EMBODIMENTS Turning now to the drawings, in which like reference characters identify the same elements in the several views, FIGS. 1-3 depicts a book cover 10, one side 11 of which is provided with a window 12 sewn or otherwise permanently affixed to the side 11. A card 13 is inserted downwardly in the direction of the arrow A into the pocket 14 carried by the cover 10, behind the window 12, so that indicia on the face of the card is visible through the window 12. The card 13 (shown by dashed lines in FIG. 3) is retained in place behind the window 12 by the pocket forming member 15, also carried by the cover 10. Optionally, the cover 10 can also include a second pocket forming member, which forms a pocket 17, which is used to store other cards (not shown) which are ultimately placed behind the window 12 to display further concepts represented by visible representations. FIGS. 4-8 illustrate other common use items which are constructed to embody the apparatus of the invention and which are used according to the method of the invention. FIG. 4 depicts a typical ladies purse or handbag 41. FIG. 5 depicts a backpack 51. FIG. 6 depicts an attache case 61. FIG. 7 depicts a decorative box which might be placed on a table or desk. Each of these common use items is provided with the window and the interior details are the same as shown in FIGS. 2-3. Having described my invention in such terms as to enable one skilled in the art to understand and practice it and, having disclosed the presently preferred embodiments thereof,
<SOH> BACKGROUND OF THE INVENTION AND THE PRIOR ART <EOH>Professional educators have long understood that an effective way of teaching a body of information to a student is to break the information into smaller discrete elements and present these elements repetitively and sequentially to the student. Indeed, the repetitive use of so-called “flash cards” as self-education tools is a common example of this technique. Moreover, it is known to provide common personal use items, such as luggage and the like with windows for the display of information such as the owner's name and address or decorative items, such as photographs, drawings, etc. For example, it is well known to provide a suitcase, attache case, computer carrying case, etc. with an integral pocket having a transparent side, into which one can insert a business card or equivalent card with written information indicating the owner's name, address, employer, etc. The present invention uses the general educational technique of repetitive self-instruction, employing a new combination of physical elements, which provides a convenient and effective method for enhancing learning of multiple concepts by a user.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>FIG. 1 depicts a typical book carrier embodying various elements of apparatus of the invention; FIG. 2 is a sectional view of the apparatus of FIG. 1 , taken along section line 2 - 2 thereof. FIG. 3 depicts the book carrier or briefcase of FIGS. 1 and 2 , opened to show the details of the interior thereof; FIG. 4 is an exterior view of a purse or handbag, embodying the invention; FIG. 5 is an exterior view of a backpack, embodying the invention; FIG. 6 depicts an exterior view of an attache case, embodying the invention; and FIG. 7 depicts a picture frame, embodying the invention; and FIG. 8 depicts a decorative table box, embodying the invention. detailed-description description="Detailed Description" end="lead"?
20040309
20051227
20050915
64829.0
0
FERNSTROM, KURT
LEARNING METHOD AND APPARATUS
SMALL
0
ACCEPTED
2,004
10,797,836
ACCEPTED
Highly configurable PLL architecture for programmable logic
A programmable logic device includes configurable phase-locked loop (PLL) circuitry that outputs multiple clock signals having programmable phases and frequencies. Each output signal is programmably selectable for use as an external clock, internal global clock, internal local clock, or combinations thereof. The PLL circuitry has programmable frequency dividing, including programmable cascaded frequency dividing, and programmable output signal multiplexing that provide a high degree of clock design flexibility.
1. A method of concurrently generating a plurality of clock signals derived from a reference signal, said method comprising: receiving said reference signal; producing a plurality of signals each having a frequency and a different phase; dividing said frequency of each of said produced signals concurrently in accordance with programmable selections of frequency divisors to produce output signals each having a frequency and phase; and multiplexing said output signals in accordance with programmable selections such that each clock signal is usable as an off-chip clock signal, an on-chip clock signal, or both. 2. The method of claim 1 wherein said frequency of each of said output signals is different than or the same as one or more of the other of said output signals. 3. The method of claim 1 wherein said multiplexing comprises programmably coupling one of said output signals to an output pin for use as an off-chip clock signal. 4. The method of claim 1 wherein said multiplexing comprises programmably coupling one of said output signals to a global clock network for use as an on-chip global clock signal, said global clock network being on the same integrated circuit chip on which said producing and said dividing are performed. 5. The method of claim 1 wherein said multiplexing comprises programmably coupling one of said output signals to a clock network for use as an on-chip local clock signal, said clock network coupled to only a portion of circuits on an integrated circuit chip, said integrated circuit chip being the same on which said producing and said dividing are performed. 6. The method of claim 1 further comprising: receiving a plurality of input signals; synchronizing said plurality of input signals with an enable signal; and selecting one of said plurality of input signals to be said reference signal. 7. The method of claim 5 wherein said receiving comprises: generating one of said plurality of input signals on an integrated circuit chip on which said producing and said dividing are performed; and receiving from another integrated circuit chip via an input pin another one of said plurality of input signals. 8. A method of providing a plurality of clock signals concurrently, said method comprising: programming a first divisor into a first frequency divider that receives a reference signal; programming a plurality of divisors into a respective plurality of frequency dividers that receive substantially concurrently a signal processed by said first frequency divider; and programming at least one multiplexer to couple one of a plurality of output signals received from said plurality of frequency dividers to any one of an integrated circuit output pin, a global clock network, or a local clock network. 9. The method of claim 8 further comprising after said programming a plurality of divisors: programming the output of one of said plurality of frequency dividers to be fed into another one of said plurality of frequency dividers. 10. The method of claim 9 further comprising repeating said programming the output at least once. 11. A method of converting an input clock signal to a plurality of output clock signals, said method comprising: modifying said input clock signal having an input frequency to produce a first signal having a first frequency; phase-shifting said first signal to produce a plurality of second signals each having a phase and said first frequency, each of said second signals having a phase different than the phase of the others of said second signals; modifying each of said second signals substantially concurrently to produce an output signal having a phase and an output frequency, each of said output signals having an individually selectable output frequency; and selectably coupling any one of said output signals to an integrated circuit chip output pin; selectably coupling any one of said output signals to a global clock network, said global clock network providing clock signals to all clockable circuits on an integrated circuit chip; and selectably coupling any one of said output signals to at least one local clock network, said local clock network providing clock signals to only a portion of clockable circuits on said integrated circuit chip. 12. A method of providing multiple clock signals based on a reference signal, said method comprising: generating a first plurality of clock signals in response to receiving said reference signal; each of said plurality of clock signals having a different phase; generating concurrently a second plurality of clock signals each having a phase and a selectable frequency; and making each of said second plurality of clock signals available for a same plurality of clocking applications. 13. The method of claim 12 wherein said clocking applications include off-chip clocking, on-chip global clocking, on-chip local clocking, frequency synthesizing, and zero delay buffering. 14. A circuit on a programmable logic device operative to output a plurality of clock signals having programmable phases and frequencies, said circuit comprising: first frequency-divider circuitry operative to receive an input signal; phase/frequency detector circuitry coupled to receive the output of said frequency divider and having a second input; a voltage-controlled oscillator (VCO) coupled to receive the output of said phase/frequency detector circuitry and operative to output a plurality of signals each having a different phase; feedback frequency-divider circuitry coupled to receive said plurality of VCO output signals and operative to output a frequency-divided signal to said second input of said phase/frequency detector; first multiplexing circuitry coupled to receive said plurality of VCO output signals and operative to output a plurality of signals selected from said plurality of VCO output signals; a plurality of frequency dividers each coupled to said multiplexing circuit to receive one of said output signals from said first multiplexing circuitry and operative to output a frequency-divided signal; and second multiplexing circuitry coupled to receive each of said frequency-divided signals from said plurality of frequency dividers, said second multiplexing circuitry operative to programmably output each received frequency-divided signal to any one of a plurality of signal conductors coupled to said second multiplexing circuitry. 15. The circuit of claim 14 wherein said plurality of signal conductors are coupled to clock output pins, a global clock network, and at least one local clock network. 16. The circuit of claim 14 further comprising third multiplexer circuitry coupled to receive a plurality of input signals and operative to programmably output one of said signals to said first frequency-divider circuitry. 17. The circuit of claim 16 wherein said third multiplexer circuitry comprises a synchronization circuit coupled to receive an enable signal and a selectable two of said plurality of input signals, said synchronization circuit comprising two latches clocked by said enable signal, each latch coupled to receive a respective one of said selectable two signals and operative to output a synchronized signal. 18. The circuit of claim 17 further comprising switchover circuitry coupled to receive said two synchronized signals from said two latches and operative to automatically output the other of said two synchronized signals should one of said two synchronized signals not be received. 19. The circuit of claim 14 wherein said feedback frequency-divider circuitry comprises a multiplexer and a programmable frequency-divider circuit, said multiplexer coupled to receive said plurality of VCO output signals and operative to output one of said VCO output signals to said frequency-divider circuit, said frequency-divider circuit operative to output a frequency-divided signal to said second input of said phase/frequency detector. 20. The circuit of claim 14 wherein said circuit is a low voltage differential signaling (LVDS) phase-locked loop circuit. 21. The circuit of claim 14 wherein said circuit is a general purpose phase-locked loop circuit. 22. An integrated circuit chip comprising the circuit of claim 14. 23. A programmable logic device comprising the circuit of claim 14. 24. A printed circuit board comprising the circuit of claim 14 mounted on said printed circuit board. 25. The printed circuit board of claim 24 further comprising a memory mounted on said printed circuit board. 26. The printed circuit board of claim 24 further comprising processing circuitry mounted on said printed circuit board. 27. A system comprising: a processor; a memory coupled to said processor; and the circuit of claim 14 coupled to at least one of said processor and said memory. 28. A digital processing system comprising: a processor; a memory; a programmable logic device comprising the circuit of claim 13; input/output circuitry; and a system bus coupling said processor, said memory, said programmable logic device, and said input/output circuitry. 29. A phase-locked loop circuit comprising: means for phase-shifting a received signal to produce a plurality of phase-shifted signals, each phase-shifted signal having a frequency and being shifted by a different amount; means for modifying the frequency of at least a subplurality of said phase-shifted signals; and means for selectively applying each of said frequency-modified signals to any one of several clocking networks. 30. The phase-locked loop circuit of claim 29 wherein said clocking networks include an off-chip network and an on-chip network, said chip comprising the phase-locked loop circuit of claim 29.
BACKGROUND OF THE INVENTION This invention relates to programmable logic integrated circuit devices, and more particularly to configurable phase-locked loop (PLL) circuitry for programmable logic devices. Programmable logic integrated circuit devices are well known and often include large numbers of programmable logic blocks, memory blocks, and programmable interconnection resources. Logic blocks are programmable by a user to perform various logic functions desired by the user. Memory blocks may be used by the user to store and subsequently output data. Interconnection resources are programmable by the user to make any of a wide range of connections between inputs of the programmable logic device and inputs of the logic and memory blocks, between outputs of the logic and memory blocks and outputs of the device, and between outputs and inputs of the logic and memory blocks. Although each logic block is typically able to perform only a relatively small logic task, such interconnections allow the programmable logic device to perform extremely complex logic functions. Providing PLL circuitry on programmable logic devices is also well known. PLL circuitry produces an output signal that is continually adjusted to maintain a constant frequency and phase relationship with an input reference signal (the PLL circuitry thus “locks” onto that frequency and phase relationship). PLL circuitry may be used to counteract clock signal propagation delay on the programmable logic device, convert from one clock signal frequency (e.g., an input clock signal frequency) to another different clock signal frequency (e.g., to be output by the device), and more generally to provide one or more external clock signals, internal global clock signals, or internal local/regional clock signals. The configurability of known PLL circuitry, however, is typically limited. For example, the frequency range of output signals produced by known PLL circuitry may be too narrow for many applications in which a programmable logic device could be used. Furthermore, the number and configurability of PLL outputs may be too limited. For example, known PLL circuitry may not have enough outputs available for connection to I/O pins for off-chip clocking applications. Moreover, known PLL circuitry may not have enough outputs available for connection to on-chip global or local clocking networks. Thus, the configurability of known PLL circuitry on programmable logic devices may limit the number of designs that can be implemented on the device and thus the number of applications in which a programmable logic device could otherwise be used. In view of the foregoing, it would be desirable to be able to provide highly configurable PLL circuitry in order to increase the number of designs and applications in which programmable logic devices can be used. SUMMARY OF THE INVENTION In accordance with the invention, programmable logic devices are provided with highly configurable phase-locked loop (PLL) circuitry. PLL circuitry of the invention outputs multiple signals of which each can be programmably connected to any or all of the following: one or more I/O pins for use as an external (e.g., off-chip) clock, one or more internal (e.g., on-chip) global clock networks, one or more internal local/regional clock networks, and combinations thereof. The PLL circuitry performs phase-shifting with respect to an input reference signal such that each output signal can have a different phase if desired. Furthermore, the frequency of each output signal can be individually programmed. In other embodiments of the invention, PLL outputs can be programmably cascaded in selectable numbers of stages to provide output signal frequency ranges that are orders of magnitude wide. In still other embodiments of the invention, PLL circuitry can receive multiple input signals (e.g., from off-chip and/or on-chip sources) from which a reference signal can be programmably selected. Methods of providing such clock signal outputs are also provided in accordance with the invention. Advantageously, PLL circuitry and methods of the invention can be used to implement a wide range of designs including, for example, frequency synthesizers and zero delay buffers. This notably increases the number of designs and applications in which a programmable logic device can be used. BRIEF DESCRIPTION OF THE DRAWINGS The above and other advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which: FIG. 1 is a simplified block diagram of an illustrative embodiment of representative portions of a programmable logic integrated circuit device according to the invention; FIG. 2 is a simplified block diagram of a first embodiment of PLL circuitry according to the invention; FIG. 2a is a simplified block diagram of an embodiment of a dynamically configurable multiplexer according to the invention; FIG. 3 is a more detailed, but still simplified block diagram of a typical portion of the PLL circuitry of FIG. 2; FIG. 4 is a simplified block diagram of another embodiment of PLL circuitry according to the invention; FIGS. 5, 5a, and 5b are simplified block diagrams illustrating programmable logic integrated circuit devices employing PLLs configured in transmit and receive modes according to the invention; FIG. 6 is a simplified block diagram of a synchronizing circuit for PLL circuitry according to the invention; FIG. 6a is a timing diagram of signals from FIG. 6; FIG. 6b is a simplified block diagram of an alternative portion of the synchronizing circuit of FIG. 6 according to the invention; FIG. 7 is a simplified block diagram of a clock multiplexing pattern according to the invention; FIG. 8 is a simplified block diagram of an external clock multiplexing pattern according to the invention; FIG. 9 is a simplified block diagram of a cascaded portion of PLL circuitry according to the invention; FIG. 10 is a simplified block diagram of configurable clock buffer circuitry according to the invention; FIG. 11 is a simplified block diagram of PLL enablement circuitry according to the invention; and FIG. 12 is a simplified block diagram of an illustrative system employing the invention. DETAILED DESCRIPTION OF THE INVENTION FIG. 1 shows an illustrative programmable logic integrated circuit device (PLD) 100 in accordance with the invention. PLD 100 has one or more clock signal input pins 102 for receiving one or more clock signals from circuitry external to the device. PLD 100 also includes a plurality of input/output (“I/O”) pins 104 for receiving data and/or control signals from external circuitry. (For convenience herein, all data and control signals other than clock signals will be referred to simply as data signals.) The data signals from pins 104 may be applied to I/O registers 106 for temporary storage and output by those registers. An input clock signal applied to a pin 102 may be applied to I/O registers 106 to control the operation (in particular, the timing) of those registers. The data signals output by registers 106 are applied to programmable logic 108 of PLD 100. (As an alternative to using registers 106, data from pins 104 may be applied more directly to logic 108 (i.e., without first being input to registers 106).) Programmable logic 108 may also receive an input clock signal from a pin 102 and generally performs at least some operations on the input data from pins 104 and/or registers 106 at a rate determined by the frequency of a received clock signal. In other words, some or all of the data applied to pins 104 may be synchronized with a clock signal received from a pin 102, and programmable logic 108 may partially process that data in synchronism with that clock signal. Multiple input clock signals applied to pins 102 may be applied to phase-locked loop (“PLL”) circuitry 110 in accordance with the invention. PLL circuitry 110 may also receive an internal clock signal from programmable logic 108, which may have been generated on PLD 100 and/or derived from another clock signal received from one of clock pins 102. PLL circuitry 110 programmably selects one of the input clock signals for use as an input reference signal and provides multiple modified clock output signals which have desired frequency relationships to the input reference signal. For example, the frequencies of the modified clock output signals produced by PLL circuitry 110 may be higher and/or lower than the input reference signal frequency. The modified clock signals produced by PLL circuitry 110 advantageously may be programmably applied to any or all of clock signal output pins 112, programmable logic 108, and I/O registers 114. Programmable logic 108 can be configured to perform at least some data processing at one or more rates determined by the one or more modified clock signals produced by PLL circuitry 110. For example, programmable logic 108 may perform some data processing in synchronism with a modified clock signal produced by PLL circuitry 110. Output data signals from programmable logic 108 may be applied to I/O pins 116, possibly via I/O registers 114, which may register those data signals on their way to pins 116 at possibly another modified clock signal rate. Furthermore, PLD 100 may output data via pins 116 at a modified clock signal frequency that may or may not be the same as, and/or in synchronism with, any of the modified clock signals applied to output clock pins 112. Note that in other embodiments of the invention (see, e.g., FIG. 10 and its accompanying description below), pins 102 and 112 may be dynamically used as either clock or data I/O pins. Although FIG. 1 may appear to show fixed interconnections among the various circuit elements, note that on a programmable logic device such as PLD 100 there is typically a high degree of programmability and therefore signal routing flexibility in the interconnection resources that are provided. This programmability of interconnection resources, which is well known in the art, is not shown to avoid unnecessarily complicating the FIGS. Thus not all of the interconnections shown in FIG. 1 (or in any of the subsequently described FIGS.) may be present in all uses of PLD 100, and/or other interconnections not shown in FIG. 1 (or other FIGS.) may be present in some uses of PLD 100. Those skilled in the art will also appreciate that the circuit elements and interconnection resources shown in FIG. 1 may be only a part of more extensive circuit element and interconnection resources provided on PLD 100. Examples of programmable logic devices in which the invention can be implemented are found in Cliff et al. U.S. Pat. No. 5,689,195; Cliff et al. U.S. Pat. No. 5,909,126; and Jefferson et al. U.S. Pat. No. 6,215,326; all of which are hereby incorporated by reference herein in their entireties. FIG. 2 shows an embodiment of PLL circuitry in accordance with the invention. PLL circuitry 210 receives an input reference signal via input 218 (unlike PLL circuitry 110, only one input signal is received in this embodiment). That input signal is applied to prescale frequency divider 220. Divider 220 divides the frequency of the input reference signal by a factor N, which is preferably a programmable parameter of PLD 100 stored in, for example, a programmable function control element of PLD 100. The output of divider 220 is applied as a driving clock signal to one input of phase/frequency detector (PFD) circuitry 222. PFD circuitry 222, which can be conventional, also receives the output signal of feedback frequency divider 224. PFD circuitry 222 produces an output signal which is indicative of the phase/frequency difference between the two signals applied to it. (A more complete depiction of PFD circuitry 222 is shown in FIG. 3 and described below). The output signal of PFD circuitry 222 is applied as a control signal to voltage controlled oscillator (VCO) 226. VCO 226 produces k1 output signals (where K1 is an integer), each of which is phase-shifted by preferably an increasing multiple of 360°/k1. In one embodiment, for example, VCO 226 may output six signals (i.e., k1=6), wherein the output signals are each preferably phase-shifted with respect to the input reference signal at 60° intervals (e.g., 60°, 120°, 180°, 240°, 300°, and 360°). In another embodiment, for example, eight signals may be output (resulting in 45° phase shift increments). The output signals of VCO 226 are applied to multiplexer circuitry 228 and feedback multiplexer 230. Multiplexer 230 feeds one of the VCO 226 output signals to feedback frequency divider 224. The particular VCO 226 output signal fed to divider 224 can be fixed by design, programmed by a user, or rotated or alternated among the VCO 226 output signals by control logic that either is fixed by design or programmed by a user. Divider 224 divides the frequency of the signal applied to it by factor M to produce the above-mentioned second (feedback) input to PFD circuitry 222. Factor M is preferably a programmable parameter of PLD 100 stored in, for example, a programmable function control element of PLD 100. Multiplexer circuitry 228 receives all k1 VCO 226 output signals and programmably selects which of those signals to feed to post-scale frequency-divider circuitry 232. Divider circuitry 232 preferably includes multiple counter/frequency-divider circuits, which in the embodiment shown in FIG. 2 is six. Note that the number of individual counter or frequency-divider circuits does not have to equal the number of VCO output signals. Multiplexer circuitry 228 is preferably programmable by a user, but may alternatively be fixed to output, for example, each VCO output signal to a respective one of the individual frequency-divider circuits, assuming the number of divider circuits equals the number of VCO output signals. Each individual divider circuit divides the frequency of the signal applied to it by its corresponding factor C0-Cn1 (where n1 is an integer and in FIG. 2 equals five). Each of factors C0-Cn1 is preferably an independently programmable parameter stored in, for example, one or more programmable function control elements of PLD 100. Thus, each of factors C0-Cn1 may be different, the same, or combinations thereof. The resulting output signals of post-scale frequency-divider circuitry 232 are applied to multiplexers 234, 236, and 238. Multiplexers 234, 236, and 238 are each dynamically programmably controlled to output any one of their inputs to any one of their outputs. Multiplexer 234 couples selected signals to up to k2 clock I/O pins (CLKOUT; e.g., pins 112 of FIG. 1). Constant k2 is an integer typically less than or equal to k1. For example, if k1 is equal to eight, k2 may be equal to six. Multiplexer 236 couples selected signals to up to k3 global clock (GCLK) networks. Constant k3 is also an integer typically less than or equal to k1. Thus, for example, if k1 is equal to eight, k3 may be equal to four. Lastly, multiplexer 238 couples selected signals to up to k4 local clock (LCLK) networks. Constant k4 is likewise an integer typically less than or equal to k1. For example, if k1 is equal to eight, k4 may also be equal to eight. Moreover, the eight may be two groups of the same four signals for use in two local regions designed to have the same clocking. FIG. 2a shows an embodiment of a dynamically configurable multiplexer that can be used for each of multiplexers 234, 236, and 238 in accordance with the invention. Multiplexer 235 includes a group 237 of inputs which are dynamically selectable by a user. Advantageously, multiplexer 235 allows any one of a PLL output, clock pin, or core signal, for example, to be selectably driven onto, for example, a global (gclk) or local (lclk) clock network. Signals CR_GCLKMUXCTRL and CR_GCLKMUXSEL are programming bits used to either configure multiplexer 235 to be dynamically reconfigurable or fixed (i.e., not dynamically reconfigurable). An embodiment of enablement circuitry 239 is shown in FIG. 11 and described further below. Advantageously, PLL circuitry 210 provides a high degree of configurability. For example, by appropriately programming multiplexer circuitry 228 and divider circuitry 232, the six modified clock signals produced by circuitry 232 can have different phases and different frequencies, different phases and the same frequencies, the same phase and different frequencies, or combinations thereof. Moreover, each of the six modified clock signals can be programmably routed where needed. None are limited or partitioned to only particular circuits, I/O pins, or uses. FIG. 3 shows an embodiment of phase/frequency detector (PFD) circuitry 222. PFD circuitry 322 typically includes a phase/frequency detector circuit 323, which receives the input and feedback clock signals. Detector circuit 323 produces “up” or “down” output signal pulses depending on whether the phase of the input clock signal leads or lags the phase of the feedback clock signal. The width of the “up” or “down” signal pulses is typically controlled by detector circuit 323 to be proportional to the phase difference between the input and feedback clock signals. The “up” or “down” signals are fed to charge pump circuit 325, which provides a transfer function of those signals to an output signal voltage at a level between the power supply voltage of PLD 100 and ground. The “up” and “down” signals switch an internal current source to deliver a charge to move the charge pump output signal voltage up or down during each clock cycle. The output signal of charge pump circuit 325 is applied to low-pass filter circuit 327, which smoothes the signal for application as a control signal to an associated VCO (e.g., VCO 226). In sum, when the phase of the input clock signal leads the phase of the feedback clock signal, an “up” signal is generated by detector circuit 323. This results in an increase in the frequency of the feedback clock signal. Conversely, when the phase of the input clock signal lags the phase of the feedback clock signal, detector circuit 323 produces a “down” signal, which causes a decrease in the frequency of the feedback clock signal. FIG. 4 shows another embodiment of PLL circuitry in accordance with the invention. PLL circuitry 410 includes prescale frequency divider 420, phase/frequency detector (PFD) circuitry 422, voltage controlled oscillator (VCO) 426, multiplexer circuitry 428, feedback multiplexer 430, post-scale frequency-divider circuitry 432, and multiplexers 434, 436, and 438. These elements operate similarly, if not identically, to the corresponding elements of PLL circuitry 210. Note that the number of outputs shown in FIG. 4 for VCO 426 (8 outputs), multiplexer circuitry 428 (6 outputs), multiplexer 434 (6 outputs), multiplexer 436 (4 outputs), and multiplexer 438 (8 outputs) are merely illustrative and that these elements may be configured or replaced with other elements to have more or less outputs. PLL circuitry 410 advantageously has enhanced input signal selection and synchronization capability. PLL circuitry 410 includes multiplexers 440, 442, and 448, synchronizing circuit 446, switchover circuit 450, and AND gate 452. Multiplexers 440 and 442 both receive multiple input signals from a number of clock input pins (which in this embodiment is four; note that other numbers of input signals from clock pins may be used). These clock input pins are preferably closely located and available as a matched reference to PLL circuitry 410. Any of these pins may be used for I/O delay compensation and clock network delay compensation. These pins may be used, for example, by memory interfaces, such as for RLDRAM (reduced latency dynamic random access memory). Multiplexers 440 and 442 both also receive a core input clock signal, which may be an internal clock signal originating from any clock pin on the chip or it may be generated by another PLL on the chip. Advantageously, this input, if selected, allows the PLL reference clock signal to come from another PLL on the chip via, e.g., PLL cascading. A single reference clock can therefore be used to drive multiple PLLs, rather than having separate clocks (typically requiring respectively separate I/O clock pins) drive respective PLLS. This feature is particularly useful for multiple PCI interfaces, multiple memory interfaces, and those interfaces adhering to known source synchronous protocols where multiple transmit channels using a common reference clock are required. FIG. 5 shows an embodiment of a PLD in accordance with the invention in which a core clock signal is used to drive multiple PLL circuitries adhering to a source synchronous protocol. PLD 500 includes core clock network 554 and PLL circuitries 510a-h, which are each preferably LVDS PLL circuitries. LVDS (low voltage differential signaling) is a signaling protocol employing very low voltages and differential signaling, which involves the transmission of pairs of signals that propagate in parallel. Each signal is usually a logical complement of the other. That is, when one signal is at a high voltage (e.g., a logical 1), the other is at a low voltage (e.g., a logical 0), and vice versa. LVDS PLL circuitries 510a-d operate in transmit mode (TX), while LVDS PLL circuitries 510e-h operate in receive mode (RX). (Note that PLL circuitries 510a-h can each operate in either or both modes in accordance with the invention). RX PLL circuitries 510e-h receive external clock signals from clock pins 502 and generate modified clock signals that can be used on-chip, off-chip, or both. TX PLL circuitries 510a-d each receive a core clock signal that can enter clock network 554 at node 556. This core clock signal may be driven by any clock pin or by any general purpose or LVDS PLL circuitry output. This core clock signal can advantageously serve as the input reference signal to LVDS PLL circuitries 510a-d, which then generate modified clock signals that can be used on-chip, off-chip or both. FIG. 5a further illustrates PLL circuitry operating in receive mode. PLL circuitry 510j receives an external clock from clock pins 502. This external clock has its edge in a particular phase relationship with data being received at I/O pins 504. PLL circuitry 510j generates several clocks. One is a high speed clock at output 558 used for registers 506, which are closest to the I/O pins. A second clock at output 560 is at a lower speed. It is equal to the high speed clock frequency divided by a deserialization factor. A common deserialization factor is 8, resulting in a clock frequency ⅛ the frequency of the clock at output 558. This second clock is routed to a second set of registers. A third clock at output 562 typically has the same frequency as the second clock and is routed to registers in programmable logic 508. Multiple registers are used for each data channel, and the number of registers preferably equals the deserialization factor. PLL circuitry 510j advantageously establishes and maintains the phase relationship and frequency of clocks at outputs 558, 560, and 562 with respect to the external clock. Note that in receive mode, PLL circuitry 510j uses only the reference clock sent with the data. Thus, individual PLL circuitry is used for each interface, because each interface can have a different phase of frequency relationship. FIG. 5b further illustrates PLL circuitry operating in transmit mode. In transmit mode, the source synchronous channel sends out both data (at I/O pins 516) and a TX clock (at clock pins 512). PLL circuitry 510k can therefore receive a reference clock from any pin or internally generated core clock because no phase relationship is required between this reference clock and the TX data and clock. If multiple channels are required, a single core clock advantageously can be used to drive multiple TX PLL circuitries, as shown in FIG. 5. Returning to FIG. 4, multiplexers 440 and 442 are programmable preferably by a user to select two of the multiple input signals to feed to synchronizing circuit 446. Synchronizing circuit 446 ensures that the start-up of PLL circuitry 410 occurs in a synchronous manner. In particular, circuit 446 is intended to prevent glitches on the reference clock signal, which could result in erroneous timing for PLL circuitry 410. FIG. 6 shows an embodiment of a synchronizing circuit in accordance with the invention. Synchronizing circuit 646 includes latches 647 and 649 and AND gates 651 and 653. Latch 647 receives at input 655 the input signal selected by multiplexer 440, while latch 649 receives at input 657 the input signal selected by multiplexer 442. A PLL start signal enables the reference clock on the falling edge to ensure that adequate time is allowed before the next rising edge of the clock. Corresponding waveforms are shown in FIG. 6a. Additional registers could be inserted to delay the enabling of the reference clock to allow portions of the PLL circuitry to be enabled before the two output signals, CLKIN0 and CLKIN1, begin toggling. This alternative embodiment is illustrated in FIG. 6b, where the PLL start signal is used to generate a staged start-up sequence that first enables the counters/frequency dividers and then the VCO. Returning to FIG. 4, the two synchronizing circuit outputs are fed to multiplexer 448 and switchover circuit 450. Multiplexer 448 is programmable by a user and accordingly outputs one of the two signals selected by the user to serve as the input reference signal. The selected input reference signal is fed to AND gate 452, which also receives an input signal from switchover circuit 450. In normal operating mode, switchover circuit 450 allows the selected reference signal to propagate through AND gate 452 to prescale frequency divider 420. Switchover circuit 450 monitors the two output signals received from synchronizing circuit 446. If the selected clock signal stops running for some reason, switchover circuit 450 will automatically cause the other output signal from synchronizing circuit 446 to be used as the input reference signal. This feature can be used for clock redundancy or for a dual clock domain application. Moreover, switchover circuit 450 can be preferably manually controlled based on a user control signal. This allows a user, for example, to switch between two input reference signals of different frequencies. PLL circuitry 410 further has enhanced feedback capability and includes feedback frequency divider 424, spread spectrum counter 458, and multiplexer 460. Multiplexer 460 is programmable and receives an output signal from multiplexer 430 and an external feedback signal. By programming multiplexer 460 to output the external feedback signal, an external clock signal can be aligned with the input reference clock signal. This advantageously allows a user to remove clock delay and skew between devices/chips. Spread spectrum counter 458 helps prevent corrupted data and intermittent system errors that can be caused by radiated noise from high frequency clock signals. Spread spectrum counter 458, which is coupled to frequency dividers 420 and 424, accomplishes this by modulating clock frequencies over a small range. PLL circuitries 210 and 410 are both advantageously fully programmable both at power up and during user mode (i.e., dynamically), thus providing a high degree of flexibility. Programmable parameters include coarse and fine phase shifting, counter values (i.e., frequency divisors), and duty cycle. As mentioned previously, each counter/frequency divider circuit of frequency-divider circuitries 232 and 432 can be connected to several different output sources including global clock networks, local clock networks, and external clock buffers. By providing these flexible multiplexing regions on the divider circuit outputs, a user can advantageously configure their system in a very flexible manner. PLL circuitries 210 and 410 can thus be used to generate multiple internal clock references as well as provide off-chip reference clocks. Advantageously, a single frequency divider circuit can be used to generate both an internal reference clock and an external clock reference. Other advantages include being able to dynamically switch to any of the multiple input reference signals (in PLL circuitry 410) and to any of the global or local clocks. Allowing a user to dynamically configure PLL circuitry of the invention avoids having to reprogram an entire PLD, which advantageously reduces overall system cost. FIG. 7 shows an example of a clock multiplexer pattern that can be used with PLL circuitries of the invention. Pattern 700 includes two general purpose PLL circuitries 710, which may be, for example, either PLL circuitry 210 or 410. Each vertical line can be thought of as a single multiplexer with each circle representing a signal that can connect to the multiplexer. CLKPIN# represents standard clock pins, while nCLKPIN# represent additional clock pins available when the input clock is not a differential signal. The GCKDRV# (global clock driver) and LCKDRV# (local clock driver) signals provide a way for generic logic to drive onto clock networks without having to first drive out via an I/O pin and then back into the clock network via another I/O pin. These multiplexer connections can be used for signals that have a high fanout. FIG. 8 shows an example of a multiplexer pattern for external clock outputs that can be used with PLL circuitries of the invention. Pattern 800 includes output pins 812 and general purpose PLL circuitry 810, which may be, for example, either PLL circuitry 210 or 410. Any output signal from PLL circuitry 810 can be routed to any output pin 812. The extclken# (external clock enable) signals advantageously allow a user to dynamically enable and disable clock pins synchronously. This can be used to implement a system power-down capability to reduce power consumption. Note that the even numbered outputs (i.e., ECK0, ECK2, . . . ) can be used with their adjacent odd numbered outputs (i.e., ECK1, ECK3, . . . ) for differential signaling. FIG. 9 shows an alternative arrangement to multiplexer circuitries 228/428 and frequency-divider circuitries 232/432. Cascaded PLL output stage 900 advantageously allows PLL circuitries of the invention to programmably divide down signal frequencies by orders of magnitude. The output of any of the first n−1 frequency dividers 932 (where n is the total number of frequency dividers) can be programmably selected by the appropriate multiplexer of multiplexer circuitry 928 to be the input of the next frequency divider 932. Thus, for example, the output of frequency divider C0 can be used as an on-chip local clock and as an input to frequency divider C1. Moreover, the programmable cascading does not need to begin with the output of frequency divider C0, nor does it need to continue to the nth frequency divider (which in this embodiment is divider C5). For example, the output of divider C2 can be cascaded to divider C3, whose output can be cascaded to divider C4, while the outputs of dividers C0, C1, and C5 can be used independently. Note that the VCO/test clk input to each frequency divider represents the multiple VCO output signals. FIG. 10 shows an embodiment of configurable clock buffer circuitry in accordance with the invention. Advantageously, clock buffer circuitry 1000 supports generic I/O functionality as well as I/O clock functions and both input and output capability. Buffer circuitry 1000 includes multiplexers 1062 and 1064; buffer/drivers 1066, 1068, 1070, 1072, and 1074; and differential buffer 1076. Buffer circuitry 1000 is coupled to I/O-clock pins 1078 and can be configured to allow pins 1078 to be driven by PLL circuitry (thus making them clock pins) or to be driven by an I/O interface (thus making them generic I/O pins). Buffer circuitry 1000 can further be configured to allow one of pins 1078 to be used as a PLL external feedback pin (thus becoming a delay compensation buffer). When buffer circuitry 1000 is configured bidirectionally (allowing both input and output), PLL circuitry can be configured as a zero delay buffer. This is preferable to known methods of using delay cells because only the buffers being compensated out are used in this configuration. Preferably, all clock sources (global clock, local clocks, and external clocks) associated with PLDs of the invention can be synchronously enabled and disabled. This allows users to dynamically shut down and turn on various portions of their design for power management. FIG. 11 shows synchronous PLL enablement circuitry in accordance with the invention. Enablement circuitry 1100 includes latch 1182, AND gate 1184, and clock driver 1186. Signal ENOUT is a core signal under user control used to dynamically control enabling and disabling of clocks. Signal ENOUTCTRL is a programming bit that allows the clock to always be enabled if a user does not use the disable feature. NPST is the register preset, which is active low, meaning that a low voltage signal (e.g., a logical 0 signal) at that input causes the output to go high. Note that while multiplexers have been shown throughout the FIGS., they may be alternatively replaced with other types of programmable logic connectors (PLCs). For example, PLCs can be a relatively simple programmable connector such as a switch or a plurality of switches for connecting any one of several inputs to an output. Alternatively, each PLC can be a somewhat more complex element which is capable of performing logic (e.g., by logically combining several of its inputs) as well as making a connection. In the latter case, for example, each PLC can be product term logic, implementing functions such as AND, NAND, OR, or NOR. Examples of components suitable for implementing PLCs are EPROMs, EEPROMs, pass transistors, transmission gates, antifuses, laser fuses, metal optional links, etc. Further note that PLDs having PLL circuitry of the invention are not limited to any one technology, but advantageously can be implemented in various technologies. As mentioned above, PLCs (e.g., multiplexers) and divider circuits of the invention are programmable, and their programmable parameters may be stored in various types of programmable, function control elements (“FCEs”) (although with certain implementations (e.g., fuses and metal optional links) separate FCE devices are not required.) FCEs can be implemented in any of several different ways. For example, FCEs can be SRAMs, DRAMs, first-in first-out (“FIFO”) memories, EPROMs, EEPROMs, function control registers (e.g., as in Wahlstrom U.S. Pat. No. 3,473,160), ferro-electric memories, fuses, antifuses, or the like. The FCEs that control the PLCs and divider circuits of the invention are preferably programmed in the same way and at the same time that programmable logic 108 in FIG. 1 is programmed. Although the circuitry of the invention has many possible applications, one illustrative use is shown in FIG. 12. Data processing system 1200 includes programmable logic device 100, which is an integrated circuit, and may be an integrated circuit chip, that includes PLL circuitry in accordance with the invention. PLD 100 may be field programmable, mask programmable, or programmable in any other way. It may be one-time-only programmable, or it may be reprogrammable. System 1200 may also include one or more of the following components: a processor 1203; memory 1205; I/O circuitry 1207; and peripheral devices 1209. These components are coupled together by a system bus 1211 and are populated on a circuit board 1213, which is contained in an end-user system 1215. Communication among the various components shown in FIG. 12, and/or with external circuitry, may be of any known type to any desired extent. System 1200 can be used in a wide variety of applications, such as computer networking, data networking, instrumentation, video processing, digital signal processing, or any other application where the advantage of using programmable or reprogrammable logic is desirable. PLD 100 can be used to perform a variety of different logic functions. For example, PLD 100 can be configured as a processor or controller that works in cooperation with processor 1203. PLD 100 may also be used as an arbiter for arbitrating access to a shared resource in system 1200. In yet another example, PLD 100 can be configured as an interface between processor 1203 and one of the other components in system 1200. Note that system 1200 is only exemplary and in no way should be construed to limit the true scope and spirit of the invention. Thus it is seen that highly configurable PLL circuitry outputting multiple signals having programmable phases and frequencies for programmable use as external or internal clocks is provided. One skilled in the art will appreciate that the invention can be practiced by other than the described embodiments, which are presented for purposes of illustration and not of limitation, and the invention is limited only by the claims which follow.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to programmable logic integrated circuit devices, and more particularly to configurable phase-locked loop (PLL) circuitry for programmable logic devices. Programmable logic integrated circuit devices are well known and often include large numbers of programmable logic blocks, memory blocks, and programmable interconnection resources. Logic blocks are programmable by a user to perform various logic functions desired by the user. Memory blocks may be used by the user to store and subsequently output data. Interconnection resources are programmable by the user to make any of a wide range of connections between inputs of the programmable logic device and inputs of the logic and memory blocks, between outputs of the logic and memory blocks and outputs of the device, and between outputs and inputs of the logic and memory blocks. Although each logic block is typically able to perform only a relatively small logic task, such interconnections allow the programmable logic device to perform extremely complex logic functions. Providing PLL circuitry on programmable logic devices is also well known. PLL circuitry produces an output signal that is continually adjusted to maintain a constant frequency and phase relationship with an input reference signal (the PLL circuitry thus “locks” onto that frequency and phase relationship). PLL circuitry may be used to counteract clock signal propagation delay on the programmable logic device, convert from one clock signal frequency (e.g., an input clock signal frequency) to another different clock signal frequency (e.g., to be output by the device), and more generally to provide one or more external clock signals, internal global clock signals, or internal local/regional clock signals. The configurability of known PLL circuitry, however, is typically limited. For example, the frequency range of output signals produced by known PLL circuitry may be too narrow for many applications in which a programmable logic device could be used. Furthermore, the number and configurability of PLL outputs may be too limited. For example, known PLL circuitry may not have enough outputs available for connection to I/O pins for off-chip clocking applications. Moreover, known PLL circuitry may not have enough outputs available for connection to on-chip global or local clocking networks. Thus, the configurability of known PLL circuitry on programmable logic devices may limit the number of designs that can be implemented on the device and thus the number of applications in which a programmable logic device could otherwise be used. In view of the foregoing, it would be desirable to be able to provide highly configurable PLL circuitry in order to increase the number of designs and applications in which programmable logic devices can be used.
<SOH> SUMMARY OF THE INVENTION <EOH>In accordance with the invention, programmable logic devices are provided with highly configurable phase-locked loop (PLL) circuitry. PLL circuitry of the invention outputs multiple signals of which each can be programmably connected to any or all of the following: one or more I/O pins for use as an external (e.g., off-chip) clock, one or more internal (e.g., on-chip) global clock networks, one or more internal local/regional clock networks, and combinations thereof. The PLL circuitry performs phase-shifting with respect to an input reference signal such that each output signal can have a different phase if desired. Furthermore, the frequency of each output signal can be individually programmed. In other embodiments of the invention, PLL outputs can be programmably cascaded in selectable numbers of stages to provide output signal frequency ranges that are orders of magnitude wide. In still other embodiments of the invention, PLL circuitry can receive multiple input signals (e.g., from off-chip and/or on-chip sources) from which a reference signal can be programmably selected. Methods of providing such clock signal outputs are also provided in accordance with the invention. Advantageously, PLL circuitry and methods of the invention can be used to implement a wide range of designs including, for example, frequency synthesizers and zero delay buffers. This notably increases the number of designs and applications in which a programmable logic device can be used.
20040309
20060829
20050915
83907.0
0
NGUYEN, LINH M
HIGHLY CONFIGURABLE PLL ARCHITECTURE FOR PROGRAMMABLE LOGIC
UNDISCOUNTED
0
ACCEPTED
2,004
10,797,967
ACCEPTED
Fishing rod holding apparatus and method
A fishing rod holding apparatus which enables the fisherman to resist lateral and twisting loads imposed on the rod by a fish which is pulling the line from one side to the other. The apparatus comprises a forearm mounting section which is connected securely to the forearm, and a hand engagement section which engages the person's hand and also enables a gripping of the handle of the rod. The hand engagement apparatus is able to rotate about a side-to-side axis of rotation, but limits movement about a back-and-forth axis of rotation.
1. A gripping apparatus to assist a fisherman in gripping a fishing rod, with said fisherman having a lower arm portion, which comprises a forearm having a rear elbow location and a rod gripping hand connected thereto at a wrist location, and with the hand having at the wrist location a side to side hand axis of rotation and a back and forth hand axis of rotation, and with the hand comprising a main hand portion with a front palm surface and a back surface and comprising a finger portion that has a base connecting finger location and an outer finger portion, said apparatus having a rear to front longitudinal axis and being arranged to be mounted in an operating position to said forearm, said apparatus comprising: a) a forearm mounting section which comprises a forearm engaging portion arranged to be connected in engagement to the forearm in said operating position and a forearm interconnecting portion which, with the forearm engaging portion in the operating positions, is located proximate to the wrist location; b) a hand engagement section which comprises a hand interconnecting portion and a forward hand engaging portion, and which is arranged to be engaged by the hand; c) said hand interconnecting portion and said forearm interconnecting portion being arranged to be connected to one another in a manner that in the operating position the hand engagement section is able to rotate about a side to side apparatus axis of rotation which is coincident with, or proximate to, and substantially parallel to, the side to side hand axis of rotation, and the hand engagement section is restrained from rotational movement about a second axis having a substantial alignment component perpendicular to said side to side apparatus axis of rotation, in a manner that in the operating position with the hand in engagement with the hand engagement section, the hand and the hand engagement section are limited in movement about said back and forth hand axis of rotation. 2. The apparatus as recited in claim 1, wherein said hand interconnecting portion has a main hand engagement surface portion which in the operating position comes into engagement with at least a portion of a surface of the main hand portion. 3. The apparatus as recited in claim 2, wherein said main hand engagement surface portion is located to engage at least a portion of the front palm surface of the hand. 4. The apparatus as recited in claim 2, wherein said main hand engagement surface portion is located to engage at least a portion of the back surface of the hand. 5. The apparatus as recited in claim 2, wherein there is at said side to side apparatus axis of rotation a pivot member connecting said hand interconnecting portion with said forearm interconnecting portion. 6. The apparatus as recited in claim 2, wherein said hand interconnecting portion and said forearm interconnecting portion have contact surfaces arranged to limit relative movement between said hand interconnecting portion and said forearm interconnecting portion to rotational movement about said side to side apparatus axis of rotation. 7. The apparatus as recited in claim 1, wherein said hand interconnecting portion and said forearm interconnecting portion have contact surfaces arranged to limit relative movement between said hand interconnecting portion and said forearm interconnecting portion to rotational movement about said side to side apparatus axis of rotation. 8. The apparatus as recited in claim 2, wherein said forearm engaging portion has a forearm contact surface that forms with said main hand engagement surface portion a substantially longitudinally aligned contact surface. 9. The apparatus as recited in claim 1, wherein said forward hand engaging portion comprises a rod engaging portion having a hand gripping surface which in the operating position is positioned to be engaged at least in part by a front surface portion of the finger portion of the hand. 10. The apparatus as recited in claim 9, wherein said hand gripping surface is contoured to substantially match the front surface portion of the finger portion so as to be shaped in a contour of the hand in a rod gripping position. 11. The apparatus as recited in claim 9, wherein said rod engaging portion has a hand gripping surface which in the operating position is positioned to be engaged at least in part by a front surface portion of the finger portion of the hand. 12. The apparatus as recited in claim 11, wherein said hand gripping surface is contoured to substantially match the front surface portion of the finger portion so as to be shaped of the hand in a rod gripping position. 13. The apparatus as recited in claim 12, wherein said rod engaging portion has a rod receiving recess extending along a rod receiving axis and said rod engaging portion extends at least partially around said rod receiving axis and defines a rod receiving side opening through which the rod can be moved laterally into and out of said rod receiving recess. 14. The apparatus as recited in claim 1, wherein said forward hand engaging portion has a rod receiving recess extending along a rod receiving axis and said rod engaging portion extends at least partially around said rod receiving axis and defines a rod receiving side opening through which the rod can be moved laterally into and out of said rod receiving recess. 15. The apparatus as recited in claim 14, wherein said hand engagement section is formed with an open thumb accommodating region to receive a thumb of the hand in a manner that the thumb and can be positioned to enable the thumb to retain the rod in the receiving recess. 16. The apparatus as recited in claim 14, wherein at least a portion of rod engaging portion that is engaged by said an outer finger portion of said finger portion of the hand has at least a moderate degree of flexibility so that a fisherman is able to apply a gripping force with the hand to squeeze said at least a portion of said rod engaging portion inwardly toward the fishing rod. 17. The apparatus as recited in claim 14, wherein said rod receiving recess is defined by a rod receiving surface made of a high friction material to resist a twisting rotational movement of the rod in the rod receiving recess. 18. The apparatus as recited in claim 1, wherein said hand engagement section comprises a main hand engaging portion and a finger engaging portion, with said main hand engaging portion and said finger engaging portion engaging, respectively, a back surface of the main hand portion and a back surface of the hand finger portion, said finger engaging portion being contoured to engage the finger portion of the hand when in a gripping position. 19. The apparatus as recited in claim 18, wherein said hand engagement section further comprises a glove portion positioned to be able to engage at least a finger portion of the person's hand with the hand being positioned adjacent to the hand engagement section. 20. A method to assist a fisherman in gripping a fishing rod, with said fisherman having a lower arm portion, which comprises a forearm having a rear elbow location and a rod gripping hand connected thereto at a wrist location, and with the hand having at the wrist location a side to side hand axis of rotation and a back and forth hand axis of rotation, and with the hand comprising a main hand portion with a back surface and a front palm surface, and comprising a finger portion that has a base connecting finger location and an outer finger portion, said apparatus having a rear to front longitudinal axis and being arranged to be mounted in an operating position to said forearm, said method comprising: a) providing a forearm mounting section which comprises a forearm engaging portion arranged to be connected in firm engagement to the forearm in an operating position and a forearm interconnecting portion which, with the forearm engaging portion in the operating position, is located proximate to the wrist location; b) providing a hand engagement section which comprises a hand interconnecting portion and a forward hand engaging portion, and which is arranged to be engaged by the hand; c) connecting said hand interconnecting portion and said forearm interconnecting portion in a manner that in the operating position the hand engagement section is able to rotate about a side to side apparatus axis of rotation which is coincident with, or proximate to, and substantially parallel to, the side to side hand axis of rotation, and the hand engagement section is restrained from rotational movement about a second axis having a substantial alignment component perpendicular to said side to side apparatus axis of rotation, in a manner that in the operating position; and d) positioning the hand in engagement with the hand engagement section and causing the rod to be gripped so that the hand and the hand engagement section are limited in movement about said back and forth hand axis of rotation.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a hand grip apparatus and a method of using the same for better enabling a fisherman to effectively grip the fishing rod while alleviating the effect of some of the forces imposed on the rod in the performance in the task of landing the fish. 2. Background Art When a fisherman is fishing for larger fish, a substantial amount of force from the pull of the line can be exerted at the tip end of the fishing rod to bend the rod in the direction of the pull. With regard to the stance that a fisherman will generally take when holding the fishing rod is that a right handed fisherman would commonly have his (her) left hand gripping the handle of the fishing rod at a more forward location and the fisherman's right hand would be operating the reel. The butt end of the rod would be braced against the fisherman's body, possible at the lower portion of the torso. As the fish swims from side to side and further away and toward the fisherman, this will in some situations cause a force exerted in the fisherman's hand that is gripping the rod so that it will tend to cause a fisherman's wrist to twist from side to side as the fisherman is gripping the pole, and to rotate the pole in the person's hand. This can cause a certain amount of fatigue which would compromise the fisherman's ability to land the fish. The embodiment of the present invention is designed to alleviate this problem. A search of the U.S. patent literature has disclosed a number of U.S. patents, some of these relating to assisting the fisherman, and some being in somewhat unrelated arts. These are as follows: U.S. Pat. No. 6,564,389 B1 (Laughlin) shows a device to assist a person in lifting and manipulating a pot. A brace-like element 10 fits against the person's wrist. There is a forward end 12B which has a U-shape and engages the handle 102 of the pot. This is also connected to a mitt 20 which has a forward mitt portion 20B that fits around the person's hand. U.S. Pat. No. 6,435,284 B1 (Aman) discloses a gardening tool where there is an upright handle 10 which is grasped by the person's hand, and there is a bracing member that engages the bottom of the handle and also fits over the person's wrist. There is a tool end portion, such as at the end of a hoe or several prongs that could dig into the soil. U.S. Pat. No. 6,295,755 B1 (Macaluso) shows a fishing rod attachment that is secured to the butt end of the handle and has a support member 22 to engage the elbow. The person's hand (shown at 28) grasps the rod. U.S. Pat. No. 5,809,614 (Kretser, Jr.) shows a weed trimming device where there is a cradle or support that fits around the forearm and is held by Velcro or the like, and the forward end of this is clamped to the drive shaft assembly of a weed trimming device. The drive shaft assembly is shown at 60 in FIG. 6. U.S. Pat. No. 5,716,087 (Backich et al.) shows a hand operated ergonomic scoop member that has a hand gripping portion 48, and a rearwardly extending frame member 50 that engages the person's forearm to provide support. U.S. Pat. No. 5,275,068 (Wrench) shows a device which relieves stress on the wrist joint when the person is manipulating, for example, a knife. The person's hand grasps a handle, and there is a forearm engaging member which extends rearwardly from the knife along the fisherman's forearm, and which is strapped at its end closest to the elbow around the forearm. U.S. Pat. No. 5,212,900 (Perry) shows what is called a “limb brace support device for fishing rods.” There is an articulated brace which has an upper portion which engages the upper arm, and also a forearm portion engaging the forearm. Then, at the elbow joint there is a connection that can be made to the butt end 40 of a fishing pole. The person's hand at 46 grasps the fishing pole. U.S. Pat. No. 5,159,775 (Sutula, Jr.) shows a support handle for a fishing rod where there is an arm clamp that extends along the fishing rod, and this also clamps to the person's forearm. The hand is positioned at the end of this member and grasps the fishing rod. U.S. Pat. No. 3,367,056 (Johnson) shows what is called “cradle support extension for short casting rod,” where there is a support arm member 13 engaging the fisherman's forearm and having a cradle member 14 at its upper end engaging the upper portion of the person's forearm. The person's arm is positioned so that the hand can grasp the handle of the fishing rod. U.S. Pat. No. 3,372,510 (Arsenault) discloses a fishing rod handling device where there is a forward hand grip portion 28 extending upwardly from the length of the pole, and a rear arm support brace 34 which grasps the person's forearm 50. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a side elevational view showing a fisherman utilizing the apparatus of an embodiment of the present invention; FIG. 2 is a side elevational view, with a portion thereof being drawn in an isometric fashion; FIG. 3 is a elevational view similar to FIG. 2 except that it shows that the apparatus of this embodiment from the opposite side, and also with the hand engagement portion being shown in solid lines in one position, and broken lines in another position; FIG. 4 is a isometric view that is taken perpendicular to the plain of the paper on which FIG. 3 is shown, and looking toward a thumb location of the embodiment; FIG. 5 is a sectional view taken along line 5-5 of FIG. 3, but with this view being rotated from it's cross section orientation in FIG. 3, so that it is at the same orientation as in FIG. 4; FIG. 6 is a view similar to FIG. 4, but showing the fisherman's forearm and hand with the apparatus in it's operating position, and also showing the fishing rod being gripped by the fisherman; FIG. 7 is a view looking toward to palm of a fisherman's hand and lower forearm with the hand in an extended position generally parallel to the forearm; and FIG. 8 is a view similar to FIG. 7, but looking at the side of the fisherman's hand where the thumb is located. DESCRIPTIONS OF THE EMBODIMENTS OF THE INVENTION As illustrated in FIG. 1, a fisherman will commonly grasp a fishing rod by having at least one hand gripping the fishing rod and another hand operating the reel. The butt end of the rod could be positioned, for example, against the fisherman's lower torso. If a larger fish is on the line, there can be substantial forces exerted in various directions, this resulting from the pull on the line, when the fish is swimming from side to side and towards and away from the boat or dock. The pull that the fish exerts into the line is reacted at the tip end of the fishing rod and is transmitted into the handle portion. This will often result in a bending and/or twisting force exerted on the fisherman's hand that is gripping the rod. This can prove to be rather tiring and can compromise the ability of the fisherman properly landing the fish. This embodiment of the present invention is directed toward alleviating this problem. The embodiment is an apparatus that comprises a forearm mounting section and a hand engagement section. The forearm mounting section in turn comprises a forearm engaging portion arranged to be connected in firm engagement with the forearm of the fisherman in an operating position, and a forearm interconnecting portion which, with the forearm engaging portion in it's operating position, is located proximate to the wrist location. The hand engagement section comprises a hand interconnecting portion and a rod connecting portion, and is arranged to be engaged by the fisherman's hand. The hand interconnecting portion and the forearm interconnecting portion are arranged to be connected to one another in a manner that in the operating position, the hand engagement section is able to rotate about a side to side apparatus axis of rotation which is coincident with, or proximate to, and substantially parallel to, a side to side hand axis of rotation about which a fisherman's hand rotates relative to the wrist. This is done in a manner that the hand engagement section is restrained from a rotational movement about an axis having a substantial alignment component perpendicular to said side to side apparatus axis of rotation. Thus, with apparatus in the operating position with the hand in engagement with the hand engagement section, the hand engagement section is restrained from movement that would cause any substantial rotational movement of the hand about a back and forth axis of rotation. The rod engaging portion of the hand engagement section is arranged to engage a gripping location of the rod in a manner to retain the rod at least when the rod is subjected to a force directed to urge a backward rotation of the hand engagement section and react the force into the hand engagement section and into the forearm mounting section. In this embodiment, the hand interconnecting portion has a main hand engagement surface portion which in the operating position comes into engagement with at least a portion of a surface of the main hand portion. In one arrangement the main hand engagement surface portion is located to engage at least a portion of the front palm surface of the hand. To describe the embodiment in more detail, and with further reference to FIG. 1, there is shown a fisherman 10 who is holding an elongate fishing rod 12 having a longitudinal rod axis 14. The fishing rod 12 has a rear handle section 16 and a forward rod section 18. A reel 20 is mounted to the handle section 16 and there is a hand grip location 22 on the handle section 16. The fisherman 10 is shown in a stance which would be typical in the situation where the fisherman is deep sea fishing, has landed a fish, and is in the middle of the task of landing the fish. The butt end 24 of the handle section 16 bears against the lower portion of the fisherman's torso (i.e. in the groin area as shown here), the right hand 26 of the fisherman is operating the reel 20 (either reeling in the fish, paying out line while placing a certain amount of drag on the line or neither of these), and the left hand 28 is located at the handgrip location 22 grasping the handle section 16. The rod gripping apparatus 30 of this embodiment of the present invention is shown in it's operating position in FIG. 1. The apparatus 30 comprises a forearm mounting section 32, and a hand engagement section 34. The forearm mounting section 32 is in firm engagement with the fisherman's left forearm 36, and the hand engagement section 30 is engaged by the fisherman's left hand 28. The two apparatus sections 32 and 34 are joined to one another for limited relative rotation about an operating axis of rotation 38, and this will be described in more detail later herein. When the fisherman 10 is in the position shown in FIG. 10, with a fish on the line, the fish will commonly be swimming from side to side and thus will be imparting lateral/twisting loads into the front end of the fishing rod 12. These loads are in turn reacted into the fisherman's body by the butt end 24 of the handle section 16 that engages the fisherman's lower torso, and also into the fisherman's left hand 28 that is gripping the rod 12 at the gripping location 22 to extend both a lateral force and a twisting force (a force moment) that tends to rotate the handle about the longitudinal rod axis 14 of the fishing rod. As will be described more completely later herein, the rod gripping apparatus 30 of the present invention effectively alleviates some of the stress felt in the fisherman's hand and wrist because of such imposed loads, and yet better enables the fisherman to effectively grip and position the rod while rotating the hand to various side-to-side orientations in performing the task of eventually reeling in the fish. It is believed that a better appreciation of structure and function of the embodiment of the present invention will be obtained by first discussing with reference to FIGS. 7 and 8 the anatomy of the fisherman's left forearm 36 and left hand 28 as it relates to the apparatus 30 of this embodiment of the present invention. Then this embodiment of the invention and its mode of operation will be described in more detail. The left forearm 36 has a left elbow location which is identified and approximated by the numeral 40 in FIG. 1, and a wrist location 42 shown in 7 and 8. This forearm 36 also has a forearm alignment axis which is indicated at 44 in FIGS. 7 and 8 and extends from the elbow location 40 and through the center of the wrist location 42. In the following description this axis will be referred to as the longitudinal axis of orientation 44. With reference to FIGS. 7 and 8, the fisherman's hand comprises the metacarpal portion of the hand (hereinafter for ease of expression being called the main hand portion 46), fingers 48, and a thumb 50. The fingers 48 connect to the main hand portion 46 at a finger connecting location 52 and the fingertips are indicated at 54. The main hand portion 46 has at the palm of the hand a front palm surface 56, and at the back of the hand a back hand surface 58. The heel 60 of the hand is at the base of the palm surface 56 near the wrist location 42. To facilitate the description of the embodiment there will be established three axes of orientation, and reference is again made to FIGS. 7 and 8 which show the fisherman's left hand 28 and the forward part of the forearm 36, with the fisherman's fingers 48 being in the extended position and the front surfaces of the fingers 48 being aligned in approximately the same plane as the plane occupied by the front palm surface 56. There is the aforementioned longitudinal axis of orientation 44, and a vertical axis of orientation 62 which passes through the longitudinal axis of orientation 44 at the wrist location 42 at a right angle to the longitudinal axis of orientation 44 and is nearly parallel to the plane occupied by the front palm surface 56 as shown in the position of FIG. 8. (The term “vertical axis” is simply a term selected for convenience and does not relate necessarily to orientation relative to the earth's gravity.) A transverse axis of orientation axis 64 passes through the longitudinal axis 44 at the same location as does the vertical axis of orientation 62, is perpendicular to both of the longitudinal axis of orientation 44 and the vertical axis of orientation 62, and is approximately perpendicular to the front palm surface 56 in the position shown in FIGS. 7 and 8. In the this embodiment of the present invention, we will consider primarily two modes of rotational movement of the fisherman's hand 28 at the wrist location 42 relative to the forearm 36. One mode of rotational movement will be considered as the “back and forth movement”, and the second mode is the “side to side movement”. The back and forth rotational movement will be considered as rotational movement about a “back and forth axis of rotation” which is coincident with the vertical axis of orientation 62. Thus, the back and forth movement about the back and forth axis of rotation occurs where the movement of the hand 28 is such that the front palm surface 56 of the hand moves in a direction that is perpendicular to the front palm surface 56 of the hand 28. Then the “side to side” rotational movement occurs when the hand 28 is being rotated about the transverse axis of orientation 64. Thus, when the fisherman is rotating the hand 28 at the wrist location 42 in the side to side rotational movement, with the hand extended and parallel with the longitudinal axis 44, the palm surface 56 of the hand is moving in a plane parallel to the orientation of the palm surface 56. Thus, in the text which follows, the back and forth movement of the hand 28 will be considered to be about a “back and forth” axis of rotation that coincides with the vertical axis of orientation 62 will be given the same numerical designation 62. In like manner, since the side to side movement of the hand will be considered to be about a side to side axis of rotation that is coincides with the transverse axis 64, the side to side axis of rotation shall be given the same numerical designation 64. With the foregoing text being given as background information, let us now turn our attention to FIGS. 2 through 6 to describe this embodiment of the present invention in more detail. The forearm mounting section 32 comprises a forearm engaging portion 66 which has a rearward end 68 and a forward end 70, and which can be considered as having a rearward to front forearm alignment axis 72 that would be generally parallel to the longitudinal axis 40 of the forearm 36 when engaging the forearm in the operating position. The forearm engaging portion 66 has a concave inner forearm engaging surface 74 and a convex outer surface 76. The inner surface 74 is contoured to generally match the contour of the fisherman's forearm at the location to which it is mounted, which in this embodiment is that portion of the forearm surface that is aligned with the palm surface 56 of the fisherman's hand 28. The forearm mounting section 32 is securely connected to the forearm by means of a pair of spaced Velcro strap connections 78. There are spaced Velcro patches 80 that are connected at spaced locations on the convex outer surface 76, and the straps 82 have end Velcro portions 84 that attach to the patch 78. The forearm mounting section 32 also comprises a forwardly positioned forearm interconnecting portion 84 by which the forearm engaging section 32 is pivotally connected to the hand engagement section 34. This forearm interconnecting portion 84 can be considered as a forward extension of the forearm engaging portion 66 that has a more flattened configuration to better match the contour of the wrist location 42 of the fisherman's hand 28. The inwardly facing surface portion of the forearm interconnecting portion 84 is formed with a shallow recess 86 having a contact surface 88 so as to be spaced a short distance away from the hand surface at the wrist location 42 of the fisherman when the apparatus 30 is in it's operating position engaging the fisherman's forearm and hand. At a central location in this contact surface 88, there is a pivot location 90 which has a through opening to receive a pivot connecting pin. The recessed portion 86 has a curved edge portion 92 which, as will be described later herein, is proximate to an interconnecting portion of the hand engagement section 34. The hand engagement section 34 comprises a hand interconnecting portion 96 by which the hand engagement portion is pivotally connected to the interconnecting portion 84 of the forearm mounting section 32, and a rod engaging portion 98 to engage the handle section 16 of the fishing rod 12. Also, the hand interconnecting portion 96 and the rod engaging portion 98 can be considered as having a transition portion 100. The hand interconnecting portion 96 has a main hand engagement surface portion 102 which, with the apparatus 30 in it's operating location bears against at least the heel portion of the fisherman's hand. The hand interconnecting portion also has a contact surface portion 104 that is on the opposite side of the hand interconnecting portion 96 relative to the main hand engagement surface portion 102 to engage the contact surface 88 of the forearm interconnecting portion 84. The hand interconnecting portion 96 has a centrally located pivot location 106 which receives a connecting pivot pin 108, which was mentioned previously herein as also extending through the opening at the pivot location 90 of the interconnecting portion 84 of the forearm mounting section 32. The axis of rotation defined by the pivot pin 108 is the same as the operating axis 38 that was mentioned earlier in this text. This operating axis of rotation 38 is located so that with the apparatus 30 in it's operating position the axis of the rotation 38 that is defined by the pivot pin 108 is at, or proximate to, the side to side axis of the rotation 64 of the hand, and as will be described later herein, it restrains the motion of the hand engagement section 34 to rotational movement in a rotational side to side movement generally matching the side to side movement of the hand 28 with the apparatus 30 in it's operating position. The contact surface 104 of the hand interconnecting portion 96 matches the contour of the contact surface 88 of the interconnecting portion 84 of the forearm engaging section 32 so that these surfaces 88 and 104 can rotate relative to one another as the hand engagement section 34 rotates relative to the forearm engaging section 32. For example, both of these surfaces 88 and 104 can be made flat, or these could be made as matching conical surfaces. The rod engaging portion 98 of the hand engagement portion 34 extends outwardly from the hand interconnecting portion 96 and is formed as a wall 114 which has a concavely curved inner surface 116 which defines an elongate laterally aligned recess 118 which in cross sectional configuration has an interior rounded surface that generally matches the circular configuration of the handle section 16 of the fishing rod 12. This inner surface 116 is made with a high friction material such as a rubber or rubber like surface, to resist the rotational twisting of the axis of the rod handle 16 about the longitudinal rod axis 14 when the fisherman is gripping the handle 16. The curved wall of the 114 of the pole engaging portion 98 has an outer generally curved convex gripping surface 122 which is shaped to be gripped by the fingers of the 48 of the fisherman's left hand 28. In the particular form shown herein, the gripping surface 122 is formed with finger receiving grooves 124, 126, 128, and 130 which receive, respectively, the index finger, the middle finger, and the ring finger, and the little finger, and the little finger. At a location adjacent to the index finger location, there is a side thumb recess 132 to accommodate the inner portion of the fisherman's thumb 50 and to permit the thumb 50 to be positioned around the fishing rod handle 16 when the handle is positioned in the handle receiving recess 116, as shown in FIG. 6. Also, it will be seen in FIG. 6 that there is a raised portion 134 which is positioned as seen in FIG. 6, upwardly and somewhat forwardly of the thumb recess 132 to engage the fisherman's hand 28 at the location near the base of the index finger 124. To describe now the method of this embodiment, the fisherman 10 first positions the forearm mounting section 32 of the apparatus so that forearm engaging portion 66 is positioned against the forearm 36 with the alignment axis 72 forearm mounting section 32 being generally aligned with the longitudinal axis of orientation 44 of the forearm 36. Then the Velcro straps 78, positioned at forward and rearward locations on the forearm engaging portion 66 are strapped tightly around the forearm 36 and the forearm engaging portion 66 to hold the forearm engaging portion 66 firmly against the forearm 36. The positioning of the forearm engaging portion 66 relative to it's location along the longitudinal axis of orientation 44 of the forearm 36 is such that the pivot location 90 of the interconnecting portion 84 of the forearm engaging portion 34 is coincident with (or in proximity with) the side to side axis of rotation 64 of the left hand 28. This places the hand gripping apparatus 30 in it's proper operating position. As shown in FIG. 1, the fisherman has the gripping apparatus 30 mounted to his left forearm 36. This fisherman 10 as shown is right handed, so (as mentioned previously), in the normal mode of operation, the fisherman would have the rod mounted as shown in FIG. 1, with the left hand 28 gripping the hand engagement section 134 of the gripping apparatus 30 to in turn grip the rod handle 16 at the gripping location 22, the right hand 26 being used to operate the reel 20, and the butt end 24 of the handle 16 engaging the fisherman's lower torso, possibly in the groin area. Obviously, if the fisherman is left handed, then the same type of stance would be assumed by the fisherman 10 but in the configuration of a mirror image, shifting the left to the right, etc. With the apparatus 30 in this operating position, the fisherman now grasps the fishing rod 12 and operates the fishing rod 12 in the customary manner when he (she) is fishing. Let us assume that the bait of the fisherman has now been taken by a fish and the fish is swimming in various directions toward and away from the boat, from side to side, at greater or lesser depths etc. As this happens, the tension force on the fish line is pulling the outer end portion of the rod in various directions and at various slants relative to the horizontal. Let us assume that in the situation of FIG. 1, the fish is moving off to the left and pulling the outer end of the rod 12 toward the left. When this occurs, with the butt end 24 of the rod engaging the fisherman's body and thus being essentially stationary, the force exerted on the end of the rod tends to pull the gripping location 22 of the handle 16 to the left. If the apparatus 30 were not used, this force would be pushing against the fisherman's left hand 28 to be pushed to the left, so that it would tend to rotate the hand 28 backwards relative to the wrist 42, with this rotation taking place about the back and forth axis 62 of the fisherman's left hand 28. Also, with the front end of the rod being deflected downwardly and pulled laterally there is a twisting force transmitted into the handle 16 to twist the handle 16 about the longitudinal rod axis 14 which in turn tends to twist the gripping hand 28 in a direction to tend to rotate the hand 28 about the back and both axis of rotation 62. The repeated application of this force on the fisherman's left hand can eventually prove tiring, and the resulting fatigue can compromise the fisherman's physical ability to operate the rod 12 in an optimized manner. However, with the apparatus of the present invention being mounted to the fisherman's left forearm 36, the force that is exerted from the tip of the rod down to the hand gripping portion 22 of the handle 16 is now applied into the rod engaging portion 98 of the hand engagement section 32 to transmit this force through the interconnecting portions 84 and 96, to the forearm engaging portion 66 into the forearm 36. It is not possible, however, to rotate the hand engagement section 34 about a back and forth axis rotation since the contact surface 88 and the contact surface 104 remain in contact with one another and are held together by means of the connecting pivot pin 108. However, at the same time, rotation of the hand engagement section 34 about the side to side operating axis 38 is not restrained, and this mode of rotation is shown in FIG. 3. Thus the fisherman is able to maintain the same grip on the handle 16 as he is pulling the rod 18 up towards his body and more toward a vertical position, or lowering the rod 18 downwardly toward a more horizontal position, as shown in FIG. 1. To explain another facet of the present invention, reference is made to FIG. 5. It can be seen that FIG. 5 is a sectional view taken along the lines 5-5 of FIG. 3, and it has in placed in an orientation which would correspond to FIG. 4. It can be seen that the inter surface 116 that forms the recess 118 is in a nearly 180 degree curve so that it can snuggly grip the handle grip portion 22 of the rod. The apparatus 30 can be made of plastic or some other material, and be molded into the shape as shown in FIG. 5 in the other drawings. In this particular configuration the outer most end finger portion 136 has a lesser thickness dimension than a middle portion of the rod engaging portion 98. Thus, the fingertip portion 136 has a moderate amount of flexibility so that when the fingertip portion of the fisherman's fingers is gripping the outer end portion 136 of the rod engaging portion 98, the fisherman is able to squeeze the outer portions of the fingers inwardly and have the feel of grasping the rod handle grip portion 122 as well as applying a gripping force to prevent rotation of the rod 12 about the longitudinal rod axis. In FIG. 5, only an edge portion of the hand engagement surface portion 102 is shown, and it can be seen that from examining the section line at FIG. 5, that this represents the tapering of the hand interconnecting portion 96 to a narrow edge. A second embodiment of the present invention will now be described with reference to FIGS. 9-11. Components of the second embodiment which are similar to, or correspond to, components of the first embodiment, will be given like numerical designations, with an “a” suffix distinguishing those of the second embodiment. The apparatus 30a of the this second embodiment comprises a forearm engaging section 32a and a hand engagement section 34a. The apparatus 30a of the first embodiment differs from the first embodiment in that the forearm mounting section 32a and the hand engagement 34a are positioned on the forearm 36 and the hand 28, respectively, at side locations opposite to the positions of the forearm mounting section 32 and hand engagement section 34 of the first embodiment. Thus, the hand engagement section 34a is in engagement with the back surface 58 of the main hand portion 46, and the forearm mounting section 32a is positioned on the side surface of the forearm 36 that is in alignment with the back surface portion 58 of the fisherman's main hand portion 46. The forearm mounting section 30a has generally the same configuration as the forearm mounting section 30 of the first embodiment, except possibly for the contouring of the inside contact surface of the forearm mounting section 32a to conform more closely to the contours of that surface portion of the person's forearm 36. In like manner, the main hand engagement surface portion 102a of the hand engagement section 34a has a contact surface contour which matches the configuration of the back surface 58 of the fisherman's hand. In the first embodiment the forward part of the hand engagement section 34 comprises a forward end portion that is designated as a rod engagement portion 98 that has a transition portion 100 connecting to the hand interconnecting portion 96. This second embodiment differs from the first embodiment in that the forward portion 98a of the hand engagement section 34a does not function directly as a rod engaging portion such as indicated at 98 in the description of the first embodiment. Rather, the forward portion of the hand engagement section 34 functions as a finger positioning and support function for the person's fingers 48 to enable the fingers 48 themselves to engage the rear handle section 16 of the rod 12, and only indirectly engages the rod handle 16 in the operating position. Thus, this forward hand engagement portion 98a of the second embodiment has a contour matching the back surfaces of the fingers 48 when these fingers 48 are in the gripping position, as shown in FIGS. 9 and 10, grasping the rod handle 16. The forward interconnecting portion 84a of the forearm section 32a and the hand interconnecting portion 96a of the hand engagement section 38a function basically in substantially the same way as the corresponding components 84 and 96 of the first embodiment by providing for a limited relative rotation around a pivot location 90a which corresponds to pivot location 90 of the first embodiment. Thus, the side to side motion of the person's hand is permitted while the back and forth motion of the hand is restrained by the hand engagement section 34. In the operation of this second embodiment, the apparatus 30a is mounted to the person's forearm 36 as shown in FIGS. 9 and 10, with the forearm mounting section 32a being attached to the forearm 36 by the straps 78a (in these embodiments Velcro straps) in a manner similar to the first embodiment. This automatically positions the hand engagement section 34a so that it is located adjacent to the back surface 58 of the main hand portion and also the back surface portion of the person's fingers 48. Thus the person grasps the rod handle 16 directly by the fingers engaging the rod handle 16. Thereafter, the fisherman operates the fishing rod 12 in the customary manner as described above. As the fish line is pulled in various directions by the fish, the person's hand and fingers are supported by the hand engagement portion 34a in the gripping position as shown in both FIGS. 9 and 10. The fisherman grips the rod handle 16 with the person's fingers 48 and thumb 50 pressing against the surface of the fishing rod handle 16. The forward portion 98a of the hand engagement section 34a may in one configuration be to some extent be resilient and be positioned so that there is an initial biasing force provided by the forward hand engagement portion 98a to assist the person in gripping the rod handle 16. It would be possible to provide an auxiliary fitting that would extend from the backside of the hand engagement section 34a around or partly around the portion of the person's hand at or closer to the front palm surface 56, and partly extending to the region of the thumb 52. FIGS. 10 and 11 show substantially the same arrangement as in FIG. 9 except that the forward hand engaging portion 98a is provided with a finger glove member 140a that is attached to the adjacent surface of the hand engagement portion 98a and extends outwardly there from to form separate finger engaging components 142a. The surface of the finger glove member 140a could be made of a high friction material so as to improve the grip of the person on the rod handle 16 to prevent rotational movement of the rod along the longitudinal axis of the pole 12. Further, this glove member could be extended rearwardly to engage the palm of the person's hand so as to maintain the person's hand in engagement with the hand engagement section 34a. Thus, the overall operation the second embodiment of the present invention is substantially similar to the first embodiment in its basic function of permitting the maneuverability of the person's hand gripping the rod in the side to side motion which usually occurs when the fisherman is pulling the rod 12 back toward the fisherman or letting the rod move outwardly and downwardly from the fisherman. Yet the back force component and also the twisting force components that are imposed on the person's hand by the action of the fish pulling on the line and moving from one side to the other are resisted to assist the person in reliably and maneuvering the rod 12 gripping the rod handle 16. It is obvious that various modifications could be made to the embodiments of the present invention. For example, the forearm engaging portion 32 or 32a could be modified in various ways to firmly engage the forearm 36. Also, while the Velcro straps 78 and 78a are used to connect the forearm engaging portion 66 to the forearm 36, other fastening means and connectors could be used. Further, various modifications could be made to the hand engagement section 34 and 34a as well as to enter connecting portions 84, 96, 84a and 96a, since there are various ways of connecting two members together to rotate about a single axis of rotation.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a hand grip apparatus and a method of using the same for better enabling a fisherman to effectively grip the fishing rod while alleviating the effect of some of the forces imposed on the rod in the performance in the task of landing the fish. 2. Background Art When a fisherman is fishing for larger fish, a substantial amount of force from the pull of the line can be exerted at the tip end of the fishing rod to bend the rod in the direction of the pull. With regard to the stance that a fisherman will generally take when holding the fishing rod is that a right handed fisherman would commonly have his (her) left hand gripping the handle of the fishing rod at a more forward location and the fisherman's right hand would be operating the reel. The butt end of the rod would be braced against the fisherman's body, possible at the lower portion of the torso. As the fish swims from side to side and further away and toward the fisherman, this will in some situations cause a force exerted in the fisherman's hand that is gripping the rod so that it will tend to cause a fisherman's wrist to twist from side to side as the fisherman is gripping the pole, and to rotate the pole in the person's hand. This can cause a certain amount of fatigue which would compromise the fisherman's ability to land the fish. The embodiment of the present invention is designed to alleviate this problem. A search of the U.S. patent literature has disclosed a number of U.S. patents, some of these relating to assisting the fisherman, and some being in somewhat unrelated arts. These are as follows: U.S. Pat. No. 6,564,389 B1 (Laughlin) shows a device to assist a person in lifting and manipulating a pot. A brace-like element 10 fits against the person's wrist. There is a forward end 12B which has a U-shape and engages the handle 102 of the pot. This is also connected to a mitt 20 which has a forward mitt portion 20B that fits around the person's hand. U.S. Pat. No. 6,435,284 B1 (Aman) discloses a gardening tool where there is an upright handle 10 which is grasped by the person's hand, and there is a bracing member that engages the bottom of the handle and also fits over the person's wrist. There is a tool end portion, such as at the end of a hoe or several prongs that could dig into the soil. U.S. Pat. No. 6,295,755 B1 (Macaluso) shows a fishing rod attachment that is secured to the butt end of the handle and has a support member 22 to engage the elbow. The person's hand (shown at 28) grasps the rod. U.S. Pat. No. 5,809,614 (Kretser, Jr.) shows a weed trimming device where there is a cradle or support that fits around the forearm and is held by Velcro or the like, and the forward end of this is clamped to the drive shaft assembly of a weed trimming device. The drive shaft assembly is shown at 60 in FIG. 6. U.S. Pat. No. 5,716,087 (Backich et al.) shows a hand operated ergonomic scoop member that has a hand gripping portion 48, and a rearwardly extending frame member 50 that engages the person's forearm to provide support. U.S. Pat. No. 5,275,068 (Wrench) shows a device which relieves stress on the wrist joint when the person is manipulating, for example, a knife. The person's hand grasps a handle, and there is a forearm engaging member which extends rearwardly from the knife along the fisherman's forearm, and which is strapped at its end closest to the elbow around the forearm. U.S. Pat. No. 5,212,900 (Perry) shows what is called a “limb brace support device for fishing rods.” There is an articulated brace which has an upper portion which engages the upper arm, and also a forearm portion engaging the forearm. Then, at the elbow joint there is a connection that can be made to the butt end 40 of a fishing pole. The person's hand at 46 grasps the fishing pole. U.S. Pat. No. 5,159,775 (Sutula, Jr.) shows a support handle for a fishing rod where there is an arm clamp that extends along the fishing rod, and this also clamps to the person's forearm. The hand is positioned at the end of this member and grasps the fishing rod. U.S. Pat. No. 3,367,056 (Johnson) shows what is called “cradle support extension for short casting rod,” where there is a support arm member 13 engaging the fisherman's forearm and having a cradle member 14 at its upper end engaging the upper portion of the person's forearm. The person's arm is positioned so that the hand can grasp the handle of the fishing rod. U.S. Pat. No. 3,372,510 (Arsenault) discloses a fishing rod handling device where there is a forward hand grip portion 28 extending upwardly from the length of the pole, and a rear arm support brace 34 which grasps the person's forearm 50.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>FIG. 1 is a side elevational view showing a fisherman utilizing the apparatus of an embodiment of the present invention; FIG. 2 is a side elevational view, with a portion thereof being drawn in an isometric fashion; FIG. 3 is a elevational view similar to FIG. 2 except that it shows that the apparatus of this embodiment from the opposite side, and also with the hand engagement portion being shown in solid lines in one position, and broken lines in another position; FIG. 4 is a isometric view that is taken perpendicular to the plain of the paper on which FIG. 3 is shown, and looking toward a thumb location of the embodiment; FIG. 5 is a sectional view taken along line 5 - 5 of FIG. 3 , but with this view being rotated from it's cross section orientation in FIG. 3 , so that it is at the same orientation as in FIG. 4 ; FIG. 6 is a view similar to FIG. 4 , but showing the fisherman's forearm and hand with the apparatus in it's operating position, and also showing the fishing rod being gripped by the fisherman; FIG. 7 is a view looking toward to palm of a fisherman's hand and lower forearm with the hand in an extended position generally parallel to the forearm; and FIG. 8 is a view similar to FIG. 7 , but looking at the side of the fisherman's hand where the thumb is located. detailed-description description="Detailed Description" end="lead"?
20040311
20061024
20050915
93437.0
0
ALIMENTI, SUSAN C
FISHING ROD HOLDING APPARATUS AND METHOD
SMALL
0
ACCEPTED
2,004
10,797,984
ACCEPTED
Packet network monitoring device
A network diagnostic device is disclosed that digitally samples the voltages on the cabling of the network, but does so at a much higher rate and with greater resolution then is required to minimally detect digital transmissions on the cabling. This sampling provides information on the analog characteristics of digital, noise, and interference signals on the network. Thus, network problems can be precisely diagnosed. The device includes a fast digitizer with a long memory and a system processor that statistically analyzes the signal events captured by the digitizer. The invention is also capable of performing time domain reflectometry (TDR) analysis of a functioning network. This is accomplished by placing a TDR signal on the network surrounded by a transmission that the network devices will interpret as a broadcast diagnostic packet. This will cause the network nodes to ignore the transmission. The digitizer, however, is able to detect the networks response to the TDR signal. Methods for identifying unknown network sources and Manchester decoding are also disclosed.
1. A network analysis device for a digital data computer network, comprising: a digitizer which digitally samples analog characteristics of digital communication events between network device connected to the network; a system processor which downloads data of the sampled signal events from the digitizer, which analyzes the analog characteristics, and which decodes the signal events, which are digital communications between the devices, based on the data, and wherein the system processor classifies the signal events as digital communications, noise, interference and/or crosstalk. 2. A network analysis device as described in claim 1, wherein the system processor classifies the signal events as digital communications, noise, interference and/or crosstalk. 3-12. (Canceled) 13. A method for monitoring the operation of a computer network, comprising: digitally sampling analog characteristics of signal events on the network with a digitizer; downloading data arrays of the signal events to a system processor; analyzing the data arrays in the system processor to identify the signal events; determining analog characteristics of the signal events; and decoding the signal events, which are digital communications between network devices, based on the data. 14. A method as described in claim 13, further comprising classifying the events as collisions between network devices; determining transmission start and stop times for colliders in collision signal events. 15. A method as described in claim 13, further comprising locating network devices that improperly react to collisions with other network devices by reference to the start and stop times. 16. A method as described in claim 13, further comprising identifying sources of transmissions on a network by calculating parameters for transmissions from known sources, calculating the parameters for a transmission from an unknown source, and identifying the unknown source based upon the degree to which the parameters match parameters from the known sources. 17. A method as described in claim 13, further comprising classifying the signal events as digital communications, noise, interference and/or crosstalk based on the analog characteristics. 18. A method as described in claim 13, further comprising classifying the signal events as digital communications, noise, interference and/or crosstalk based using parametric analysis of each event. 19. A method as described in claim 13, further comprising simultaneously connecting to multiple links of the network. 20. A method as described in claim 13, further comprising simultaneously connecting to multiple links of a star topology network. 21. A method as described in claim 20, further comprising tagging sampled signal events to identify the link from which the event originated. 22. A method as described in claim 20, further comprising determining whether the network communications are within frequency and voltage specifications for the network. 23. A method as described in claim 20, further comprising analyzing transmission characteristics of the network analysis by driving predetermined signal out onto the network and detecting the response of the network.
RELATED APPLICATIONS This application is a Continuation of U.S. application Ser. No. 08/619,934, filed Mar. 18, 1996, and also claims priority to U.S. Provisional Application No. 60/010,719, filed Jan. 29, 1996, the entire teachings of which are incorporated herein by reference. BACKGROUND OF THE INVENTION The several common protocols for local area networks (LANs) include CSMA/CD (Carrier Sense Multiple Access with Collision Detection), token bus, and token ring. CSMA/CD is sometimes generically, but incorrectly, referred to as Ethernet, which is a product of the XEROX corporation using the protocol. I.E.E.E. has promulgated standards for these protocols, collectively known as IEEE 802, or also known as ISO 8802. IEEE 802.3 covers one-persistent CSMA/CD LAN; IEEE 802.4 and 802.5 cover token ring and token bus, respectively. These standards differ at the physical layer but are compatible at the data link layer in the seven layer OSI (Open Systems Interconnection) reference model. CSMA/CD, token bus, and token ring are similar in the sense that they are all packet or frame based systems in which inter-node communications are broadcast over a shared transmission medium. In CSMA/CD, a node wishing to transmit over the network cabling listens to ensure that the network is idle, i.e., no other node is currently transmitting. When the network is idle, the node may begin transmission. Due to the physical extent of the cable, however, the simultaneous transmission of two or more nodes may occur. This gives rise to what is termed a collision. To compensate for this eventuality, each node also listens while it transmits. In some cases, the average voltage during the transmission will be different if a collision is occurring on the network. In other cases, a jamming signal will be generated by a network hub unit. Each node should terminate their respective transmissions during a collision and generate a jamming signal for a predetermined period. The nodes then individually wait for a random time interval before seeking to retransmit. Token bus and ring architectures mediate access to the network cabling by passing an abstraction known as a token between nodes. A node must wait until it receives the token before it may transmit. If the node receives the token but does not wish to transmit or once it has finished its transmission, it simply passes the token to the next node, by signaling that node. Under this system, collisions should never occur. Thus, there is no requirement that the nodes listen during their transmissions as required by CSMA/CD. Different protocols can be used in networks that have larger physical extent such as metropolitan area networks (MANs) and wide area networks (WANs). MAN protocols tend to be similar to the LAN protocols. WANs typically have comparatively low data rates. Also, lower reliability increases the need for more error checking. WAN protocols are selected to compensate for these differences. Other technologies are also emerging. Asynchronous transfer mode, more commonly known as ATM, is specially designed for inter-network communications. It relies on fixed sized packets which makes the protocol suboptimal for most, but compatible with virtually all, applications, but this compromise increases the speed at which the packets can be routed. Optical fiber based systems are becoming more common such as the fiber distributed data interface (FDDI). In each protocol, the nodes must comply with the relevant rules that dictate the timing of transmissions to fairly allocate access to the network's transmission bandwidth. Proper operation also dictates the format for the transmitted data. Packets must usually include a preamble to synchronize data decoding, comply with an error detection/correction scheme, and meet requirements for maximum and minimum lengths. There are a few techniques or devices that enable a network administrator to detect the violation of these rules, enabling diagnosis and location of the problems in the networks. Protocol analyzers and remote monitoring (RMon) probes are commercially available devices that decode properly formatted digital transmissions on LANs, or similar networks. The devices function as passive network nodes that acquire packets and detect the cable voltages that are indicative of collisions. The origin, destination, and number of packets can be determined by reference to the packet's headers and bandwidth utilization statistics accumulated for analysis. The number and frequency of collisions can also be monitored. FIG. 1 illustrates the architecture for the network interface portion 1410 of a protocol analyzer or RMon probe, which incidently is similar to any other network interface chip for a node in a CSMA/CD-type network. The interface comprises a phase-locked loop 1420 that uses each packet's preamble to synchronize to the source node. A decoder 1430 then extracts the destination address DA, source address SA, and data from the packet and performs error checking in response to a cyclic redundancy check CRC data contained in the frame check sequence (FCS) to ensure the packet 1440 is valid. On the assumption that it is, the decoder 1430 sends out only the destination address DA, source address SA, and data on the output line 1450. Simultaneously, a d.c. voltage threshold detector 1460 monitors the average voltage on the input line. In the example of 10Base(2) and (5), it will indicate a collision if the magnitude of the input voltage is more negative than −1.6 Volts. This occurs because the simultaneous transmission from two or more sources are additive on the network cable. When a collision is detected, the threshold detector generates the signal on a collision sense line 1470 and also disables the decoder 1430. Two packets 1440 and a noise signal 1480 represent successive inputs to the network interface 1410. The analyzer can only interpret properly formatted packets, however. Noise 1480 is not detectable by the device. Moreover, if the noise exceeds the −1.6 Volt threshold of the detector 1460, the network interface 1410 may actually indicate the presence of a collision, but the source will not have been from typical network traffic. In many cases, the protocol analyzers or RMon probes will not properly capture even valid packets on the network. If the gap between packets is less than 9.6 microseconds known as the inter-frame gap (IFG), the chip will usually miss the second in-time packet. Further, transmissions experiencing excessive attenuation or originating from a bad transmitter can result in collisions that are below the collision threshold. As a result, the analyzer will still attempt to decode the transmissions since the decoder will not be disabled. These devices can also saturate when a series of packet transmissions occur in quick succession. Some of the shortcomings in the protocol analyzer and RMon probes are compensated by techniques that enable the analog analysis of the network transmission media. The most common one is called time domain reflectometry (TDR). According to this technique, a pulse of a known shape is injected into the cabling of the network. As the pulse propagates down the cable and hits electrical “obstacles,” or changes in the cable's characteristic impedance, an echo is generated that travels back to the point of injection. The existence of the echo can indicate cable breaks, frayed cables, bad taps, loose connections or poorly matched terminations. The time interval between the initial transmission of the pulse and the receipt of the echo is a function of a distance to the source of the echo. In fact, by carefully timing this interval, the source of the echo can be located with surprising accuracy. TDR analysis is typically used by installers to ensure that the newly laid wiring does not have any gross faults. The TDR signal is injected into the wiring while the network is non-operational to validate the transmission media. If a network is already installed, the network is first turned off so that TDR analysis can be performed. In a star topology network, the manager will typically check each link between the hub and host, marking any suspect wires. In bus topologies, the TDR signal is generated on the main trunk. In either case, reflections indicate breaks or defects in the network cables. SUMMARY OF THE INVENTION The shortcomings in the protocol analyzers and RMon probes surround the fact that they operate on the assumption that the physical layer, hardware and media, are operational. They attempt to decode the voltages transitions on the network cabling as data and sense collisions based upon the voltages relative to some preset thresholds, as in any other network card. The operation of the analyzers impacts the available information, and thus limits their ability to accurately diagnose many of the problems that may afflict the network. Network cards, usually in nodes such as workstations or personal computers, may have been improperly manufactured, begin to degrade or become damaged. For example, one of the nodes on a network could have a defective driver in its output stage that transiently prevents it from driving the network cabling with sufficient power. The protocol analyzer or RMon probe would attempt to decode the packets from this node. If its phase-locked loop, however, can not lock on to the transmission, the analyzer will not recognize the attempt at transmission. If the analyzer can lock but the packet is invalid, the analyzer may label the packet as containing an error checking problem but will otherwise simply discard the packet without further analysis. Thus, the analyzer would provide no direct indication of the problems. A packet can be undecodable for a number of other reasons such as improper formatting at the transmitter, failure to detect a collision or a defect in the cabling, to list a few possibilities. Interference is another problem. Elevators and fluorescent lights are common sources of network noise. This can corrupt otherwise valid packets or cause network devices to interpret the noise as communications or collisions. Moreover, 60 Hertz power frequencies can leak on the cabling, which can also confuse the decision structures in the network cards. Crosstalk with other communications networks can also occur. These problems are invisible to the analyzers. Depending upon the particularities of the problems, the effect on the network can be nonexistent to catastrophic. The cards may simply generate bad packets or noise, which will be unrecognizable by the rest of the network but consume bandwidth. The performance impact can be high. A 1% loss of packets can lead to an 80% loss in bandwidth in some situations since the source node will attempt to retransmit until an “acknowledge” is received. Network cards have also been know to “jabber,” or continuously transmit. This will cripple the network by blocking other nodes from transmitting. TDR techniques can provide some information concerning cabling problems. However, TDR typically can only be used when the network is not operating. An isolated TDR pulse on the network can cause the nodes to behave unpredictably. This limits its usefulness to testing cabling after initial installation but before operation. In light of these problems, the present invention is directed to a network diagnostic device that samples the voltages on the cabling of the network by analog-to-digital (A/D) conversion, but preferably does so at a higher rate and with greater resolution then is required to minimally detect digital transitions on the cabling. This A/D sampling provides information on the analog characteristics of digital and noise signals on the network. As a result, the reasons why a particular packet may be illegal, either because of a subthreshold voltage transition or transient noise, for example, can be determined. Also, the nature of any network noise, crosstalk or interference can be identified and distinguished from legal and illegal transmissions. Further, node transmitters that cause improperly timed transmissions or fail to correctly detect or respond to collisions can be located. Defective cabling can also be identified. In short, the present invention provides the network manager or technician with a greater spectrum of information than would be available through typical digital decoding or TDR techniques. Even proactive maintenance is possible, allowing the network manager to predict rather than react to a failure mode. In general, according to one aspect, the invention features a network analysis device for a digital data network. The device comprises a digitizer which digitally samples analog characteristics of signal events on the network and a system processor which downloads data of the sampled signal events from the digitizer, and which analyzes the signal events. In specific embodiments, the system processor classified the signal events as network communications or noise based upon parametric analysis of each event. The processor calculates certain parameters related to the voltage and frequency characteristics of the event and compares the parameters to ranges that are characteristic of different event classifications. The analysis can also include determining whether network communications are within frequency and voltage specifications for the In specific embodiments, the system processor classifies the signal events as network communications or noise based upon parametric analysis of each event. The processor calculates certain parameters related to the voltage and frequency characteristics of the event and compares the parameters to ranges that are characteristic of different event classifications. The analysis can also include determining whether network communications are within frequency and voltage specifications for the network. The communications can also be Manchester and packet decoded by the system processor based upon the data. In other specific embodiments, the network analysis device comprises an attachment unit for connecting the digitizer to the network. Typically, the unit comprises receivers which detect signals on the network and drivers which generate signals on the network. When the network has star topology, the unit comprises plural receivers which detect signals transmitted over separate links of the network and a summing circuit which combines the signals from each of the links on a channel of the digitizer. This summing, however, usually requires that asynchronous events, such as link pulses, on the links be eliminated. Thus, the unit also preferably comprises a link pulse elimination circuit which eliminates link pulses from the combined signal received by the digitizer. The attachment unit may have other features. A selector circuit can be provided which individually enable the receivers to provide the detected signals to the summing circuit. Tagging circuits are also useful to generate a signal that identifies the link from which a sampled signal event originated for the system processor. The tagging signal can be combined with the signal events prior to the sampling by the digitizer or stored in a buffer and correlated to the sampled signal events by the system processor. The invention is also capable of performing TDR analysis on a functioning network. This is accomplished by placing a TDR signal on the network, surrounded by a pseudo-packet transmission. The pseudo-packet can be configured to have a source and destination address of a diagnostic packet and thus be transparent so that the network nodes to ignore the transmission. Accordingly in other embodiments, the network analysis device further comprises a signal generator which generates a predetermined signal for transmission over the network. The digitizer is then configured to sample the response of the network to the predetermined signal. System processor determines the signal transmission characteristics of the network from the response of the network to the predetermined signal. Preferably, the signal generator generates a packet-like transmission surrounding a voltage edge and the system processor extracts the response of the network to the edge. The packet-like transmission ensures that other network devices will not react to the signal. In general, according to another aspect, the invention can also be characterized in the context of a method for monitoring the operation of a network. This method comprises digitally sampling analog characteristics of signal events on the network with a digitizer. The data arrays of the signal events are then downloaded to a system processor, which analyzes the data arrays to identify the signal events. The processor is then able to determine physical level characteristics of the network based upon the analysis. In specific embodiments, the processor implements an event finder by comparing successive samples from the data arrays to thresholds and declaring the beginnings of events if the thresholds are satisfied. The ends of events are declared when the thresholds are no longer satisfied. The processor then records start times and stop times for the signal events. Once found, parameters are calculated for the signal events from the data arrays including frequency and voltage characteristics, and the event are classified as transmissions from other network devices or interference by comparing the parameters to parameter ranges for event classifications. Collision are also determined along with start and stop times for colliders. This analysis allows the processor to locate network devices that improperly react to collisions with other network devices or are otherwise improperly operating. In general, according to this other aspect, the invention features a method for performing time domain reflectometry on an operational network. The method comprises generating a packet-like transmission on the network and embedding a TDR signal in the packet-like transmission. The response of the network to the TDR signal is then detected and analyzed to determine the signal transmission characteristics of the network. In specific embodiments, the packet-like transmission has source and destination addresses that are indicative of a broadcast diagnostic packet. The TDR signal is then embedded in a data payload portion of this packet. This TDR signal is preferably a step function that has a very fast rise time. In still other aspects, the invention concerns a method for Manchester decoding a digitally sampled network transmission. The process includes first comparing digital samples of the network transmission to a threshold and locating transitions in which successive digital samples change values relative to the threshold. The time periods between successive transitions are compared to a minimum bit period, which is preferably derived from a measure frequency of the transmission. Only transitions that are greater than the minimum period from a prior transition are interpreted as transmitted data. In specific embodiments, the processor implements an event finder by comparing successive samples from the data arrays to thresholds and declaring the beginnings of events if the thresholds are satisfied. The ends of events are declared when the thresholds are no longer satisfied. The processor then records start times and stop times for the signal events. Once found, parameters are calculated for the signal events from the data arrays including frequency and voltage characteristics, and the event are classified as transmissions from other network devices or interference by comparing the parameters to parameter ranges for event classifications. Collision are also determined along with start and stop times for colliders. This analysis allows the processor to locate network devices that improperly react to collisions with other network devices or are otherwise improperly operating. The analog characteristics include parameter such as: Midpoint: min, max, mean, quantity; Preamble Frequency: min, max, mean, sdev; Event High Frequency: min, max, mean, sdev; Event Low Frequency: min, max, mean, sdev; Maximum Voltage Distribution: min, max, mean, sdev; Minimum Voltage Distribution: min, max, mean, sdev; Peak to Peak Distribution: min, max, mean, sdev; Rise Time Mean: min, max, mean, sdev; Fall Time Mean: min, max, mean, sdev; Overshoot: min, max, mean, sdev; Undershoot: min, max, mean, sdev; First Bit peak-to-peak Voltage; First Bit Min Voltage; First Bit Max Voltage; First Bit Width Voltage; First Bit Rise Time; First Bit Fall Time; Jitter: min, max, mean, sdev. In another aspect, the invention also concerns a method for identifying sources of transmissions on a network. This is referred to signature matching. The process involves calculating a plurality of analog parameters for transmissions from known sources. The parameters are also calculated for a transmission from an unknown source. The unknown source can then be identified based upon the degree to which the parameters match parameters from the known sources. In anther aspect, the invention also concerns a method for identifying sources of transmissions on a network. This is referred to signature matching. The process involves calculating a plurality of parameters for transmissions from known sources. The parameters are also calculated for a transmission from an unknown source. The unknown source can then be identified based upon the degree to which the parameters match parameters from the known sources. Examples of the parameters include any combination of the following: Midpoint: min, max, mean, quantity; Preamble Frequency: min, max, mean, sdev; Event High Frequency: min, max, mean, sdev; Event Low Frequency: min, max, mean, sdev; Maximum Voltage Distribution: min, max, mean, sdev; Minimum Voltage Distribution: min, max, mean, sdev; Peak to Peak Distribution: min, max, mean, sdev; Rise Time Mean: min, max, mean, sdev; Fall Time Mean: min, max, mean, sdev; Overshoot: min, max, mean, sdev; Undershoot: min, max, mean, sdev; First Bit Max Voltage; First Bit Width Voltage; First Bit Rise Time; First Bit Fall Time; Jitter: min, max, mean, sdev. The above and other features of the invention including various novel details of construction and combinations of parts, and other advantages, will now be more particularly described with reference to the accompanying drawings and pointed out in the claims. It will be understood that the particular method and device embodying the invention is shown by way of illustration and not as a imitation of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention. BRIEF DESCRIPTION OF THE DRAWINGS In the accompanying drawings, reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale; emphasis has instead been placed upon illustrating the principles of the invention. Of the drawings: FIG. 1 is a schematic block and timing diagram showing the internal architecture of a prior art protocol analyzer or RMon probe and the response to exemplary packets and noise; FIG. 2 is a block diagram showing the principle components of the network diagnostic device of the present invention; FIGS. 3A and 3B are a timing diagrams showing a hybrid packet/TDR transmission for performing TDR analysis on an idle network such as 10Base(2)(5) and 10Base(T), respectively; FIG. 4A is a block diagram showing the components of the packet/TDR generator of the present invention; FIG. 4B is a block diagram showing the components of the packet generator of the present invention; FIG. 4C is a block diagram showing the components of the TTL pulse generator of the present invention; FIG. 4D is a state diagram illustrating the operation of the timing and control circuit of the packet/TDR generator of the present invention; FIG. 5 is a schematic block diagram of an attachment unit for a 10Base(2),(5) or similar bus architecture network; FIG. 6A is a schematic block diagram showing the host transmit Tx side of an inventive attachment unit for a 10Base(T) local area network; FIG. 6B is a schematic block diagram showing the host receive Rx side of the inventive attachment unit for the 10Base(T) local area network; FIG. 7 is a tiring diagram showing exemplary traffic on host transmit Tx and receive Rx lines of the network links; FIG. 8A shows a packet event and a 5-bit Manchester encoded tag produced by a first embodiment of the data tagging circuit; FIG. 8B shows a packet event and a level and period encoded tag produced by a second embodiment of the data tagging circuit; FIG. 8C shows a hardware data tagging circuit according to a third embodiment; FIG. 9 is a detailed circuit diagram showing the attachment unit for one link of the network; FIGS. 10A and 10B are circuit diagrams for another embodiment of the invention including a leading edge capturing circuit that captures portions of signals eliminated by the link pulse elimination circuit; FIG. 11 shows the steps involved in initializing the inventive device; FIG. 12 shows the process steps performed for the listen mode of operation in which the device monitors the events on the network; FIG. 13 is a process diagram showing the process for finding events in the data arrays of the invention; FIG. 14 show the process of further analysis and classification that is performed on packet and collision events in the invention; FIGS. 15A and 15B are a flow diagram showing method for Manchester decoding the sampled packet transmissions of the present invention; FIGS. 16A and 16B are a flow diagram showing method for packet decoding the Manchester decoded transmissions of the present invention; FIG. 17 shows an exemplary 10 Base(2)(5) collision waveform and the data extracted from it; FIG. 18 is a flow diagram showing the signature matching process of the present invention; FIG. 19 shows the process steps performed in the TDR analysis mode in accordance with the invention; and FIG. 20 is a schematic block diagram showing a client/server embodiment of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS 1. Hardware FIG. 2 illustrates the principle hardware components of the network diagnostic device 100 of the present invention and an exemplary, schematically depicted, network 10. An attachment unit 110 physically connects the device 100 to the network 10. The unit's design is dependent on the type of cabling and the frequency of transmission for the network 10. Different forms of cabling; twisted pair, coaxial cable or fiber optics, for example; and different topologies; such as bus, ring, or star; used in various networks dictate the specifics of the attachment unit used. The following description details the implementation of the invention for 10Base(2), (5), and (T)-type CSMA/CD networks. 10Base(2) and (5) are 10 megabit per second (MBPS) networks using different gauges of coaxial cable (2 and 5) in a bus topology. 10Base(T) also operates at 10 MBPS but uses twisted-pair cabling in a star topology. Those skilled in the art will recognize, however, that the underlying principles of the invention are equally applicable to CSMA/CD networks generally such as faster 100 MBPS networks, e.g., 100 Base (T), and also less related architectures, such as token ring and token bus networks, wide area networks (WANs), fiber distributed data interface (FDDI) based networks, and asynchronous transfer mode (ATM) networks. The attachment unit 110 provides a two-channel input to a digitizer 120 in the particular embodiment illustrated. Preferably, the digitizer is based upon a LeCroy Corporation digital oscilloscope card, Part No. 9350AL, with long memory capability. In any event, for adequate analog resolution, the digitizer should have at least a 500 MHZ sampling frequency and a long memory capacity of at least one megabyte, preferably 2 to 4 megabytes for 10 MBPS networks. This capacity enables events of approximately 2 milliseconds (msec) and longer to be captured. The longest legal packet on the network should last approximately 1.2 msec in duration, or about 12,000 bits at a period of 0.1 microseconds per bit. Thus, the sampling time of 2 msec is almost twice as long as the longest packet making these capabilities sufficient to capture and analyze an entire transmission from a network node including the timing between events and multiple transmissions. Analysis of 100 MBPS networks suggests the need for correspondingly faster sampling frequencies and longer memory capacities. The digitizer 120 is usually a two channel device, although the principles of the invention can be adapted to single or multi-channel devices. The digitizer 120 comprises a buffering amplifier 122a, 122b on each of the two channels Ch1, Ch2. Two sample-and-hold circuits 124a, 124b downstream of each amplifier freezes the detected voltage in each channel for digitizing by two analog-to-digital converters 126a, 126b. The digital outputs of the converters are written into two long memories 128a, 128b, one assigned to each channel Ch1, Ch2. The memories 128a, 128b function as first-in, first-out (FIFO) buffers that continuously receive and store the output from the converters 126a, 126b until a trigger signal is received. A trigger device 130 generates the trigger signal usually in response to some monopolar or bipolar trigger condition that is applied to the signal output of the buffering amplifiers 122a, 122b. Bipolar trigger conditions are preferred for 10Base(T) networks. Preferably, the trigger signal is generated in response to the detected voltage either exceeding 300 mV or becoming more negative than −300 mV. Alternatively, the trigger condition can be based upon the electrical properties such as frequency or rise-time exceeding some defined range. Although the sources for the trigger device 130 are programmable so that a trigger signal could be generated for both memories based upon the voltages on only one channel, typically it triggers each channel based upon the voltages on that channel. The generation of the trigger signal causes the freezing of the contents of the two long memories 128a, 128b. Some fixed or variable delay, however, may be added on the trigger signal so that the first samples of the event stored in the memory are contemporaneous with the occurrence of the trigger condition. In other words, the delay ensures that the contents of the memories represent the sampled voltages from the network cabling only after the occurrence of the trigger condition. The trigger device 130 is also be able to apply digital trigger conditions under software control. Many times, a network administrator may want to sample only packets with a specific source or destination address. Accordingly, the trigger device 130 can also function as a decoder that generates the trigger signal to the memories 128a, 128b in response to the digitally decoded transmissions over the network 10. A system processor 140 is connected to read the arrays of data from the long memories 128a, 128b of the digitizer 120. In one implementation, it is a personal computer running the Microsoft NT (trademark) operating system. The system processor 140 performs signal processing, event finding, and event classification based upon parametric analysis of the data arrays and diagnoses problems with the network's physical layers based upon this analysis. The system processor 140 also provides the overall control of the LAN monitoring device 100. It controls the readout of the Ch1 and Ch2 long memories 128a, 128b, arms the hardware trigger 130, and also controls the configuration of the attachment unit 110. Some finite time is required for the system processor 140 to perform the signal processing and event classification. In fact, in many cases it can take over one minute. Thus, not every event can be captured by the digitizer if the system processor performs the analysis in real time. Digitizer 120 would be triggered by some event, capture its data, download the data, and then be required to wait until the system processor 140 is ready to receive the next array of data. This can be overcome by other techniques. The speed of the processor 140 could be increased by including multiple, faster processors or a larger memory 128 could be used implemented. A packet/TDR signal generator 150, also under the control of the system processor 140, is connected to the network 10 via the attachment unit 110. The signal generator 150 has much of the control logic that would be contained in a network card for the relevant network. It can determine when other nodes are transmitting, determine the presence of collisions, and assess when a packet transmission can be made in accordance with the network's protocol. The signal generator 150 produces a hybrid TDR/packet transmission in order to allow the device 100 to perform TDR network analysis while the network 10 is operational. As described above, nodes can behave unpredictably if a lone TDR pulse is transmitted over an idle network. The nodes, however, will generally ignore a packet transmission as long as it is not addressed to the nodes. In fact, the signal generator is configured to generate a broadcast diagnostic packet. Packets with this source and destination address will be universally ignored by the network's nodes. Thus, when the TDR step function is generated where a data payload would typically be found, the step function will be transparent and the nodes should simply ignore the event, even though the transmission is a non-conforming packet. FIG. 3A schematically shows the hybrid TDR/packet transmission 200 for 10Base(2)(5). In compliance with the network's protocol, the packet 200 has a standard length preamble 210. The source and destination addresses 220, 230 conform to a diagnostic broadcast packet. A data payload 240 is started, but then after some predetermined time, the voltage on the cabling is held at a quiescent level, i.e. 0 Volts in most networks, for time t1. This period corresponds to the time that is required for a signal to traverse the entire network, usually between 1 and 6 microseconds. This delay allows any echoes to die out. Then, the edge 250 of the TDR pulse is generated, raising the voltage on the cabling to some selected level. As shown, this voltage is preferably close to the normal voltage swings experienced during data transmission, but a stronger signal-to-noise ratio can be obtained by using higher voltages. In any event, the voltage swing should not be so large as to create the risk of damage to any of the node's network cards. The new voltage level is then held long enough to allow the TDR edge to propagate throughout the network and any echoes to be received back by the digitizer at time t2. At the expiration of this time, the voltage on the network is brought back to a quiescent state allowing the other nodes on the network to recognize the end of the transmission. The digitizer 120 is used to detect the response of the network 10 to the TDR pulse. The trigger device 130 of the digitizer is armed in response an idle condition on the network 10 and triggered by the packet/TDR generator 150 on line 152 in response to the transmission of hybrid packet. The system processor then extracts any detectable echo from the sampled event. By analyzing the echo, the location of any cabling problems can be found. FIG. 3B is a timing diagram showing the hybrid packet/TDR transmission for 10Base(T) media. Here, the voltages vary positively and negatively around 0 Volts. The approach can be applied, however, to other medias and protocols. The concept is to embed the TDR transition in a transmission that otherwise conforms to the typical network traffic. Preferably, the transmission is formatted as a broadcast-type transmission that will be ignored by the nodes, thus ensuring that the nodes will not react unpredictably. FIG. 4A is a block diagram showing the internal construction of the packet/TDR signal generator 150. In one embodiment, the signal generator is an IBM-PC ((E)ISA) compatible design which is connected to the bus of the system processor 140 via an interface 262. A timing and control module 264 receives a transmission sense line that connects to the network cabling via the attachment unit 110. The module also generates the trigger out signal to the trigger device 130 via line 152. The operation of a packet generator 266 and TTL pulse generator 268 are coordinated by the timing and control module 264. The packet generator 266 is programmable by the system processor 140 to generate any arbitrary packet on line 272. In the context of TDR analysis, however, it is typically programmed to generate the broadcast packet as described in connection with FIGS. 3A and 3B. The TTL pulse generator 268 generates the fast transition contained in the TDR edge on line 271. During TDR analysis, the operation of the packet generator 266 and the pulse generator 268 are coordinated by the timing and control unit 264 to produce the packet shown in FIGS. 3A and 3B. The outputs are then separately passed to the attachment unit 110. Finally, an AU interface 274 provides control signals to the attachment unit 110 to coordinate the operation of the packet/TDR signal generator 150 and the attachment unit 110. FIG. 4B is a block diagram showing the internal architecture of the packet generator 266. A data memory 274 stores any packet data downloaded from the system processor 140. In the particular example of a 10Base(T) compatible device, an 802.3 interface IC 276, such as an AM79C960, generates the Manchester encoded packet data which is transmitted over the network 10 via the attachment unit 110. In many situations, the interface IC 276 may have an on-board FIFO that eliminates the need for the separate data memory 274 and memory controller 278. The signal conditioner 280 is required to convert the interface IC output to the required voltage to drive the current amplifiers in the attachment unit 110. Using a conventional interface IC as the packet generator 266 provides more functionality than is strictly required to generate the broadcast packet shell 200 surrounding the TDR edge 250. This allows the system controller 140 to probe the response of the network 10 with other types of transmissions. For example, I.P. ping or other packet generators could be developed to stress network for analog problems. Similarly, successive packets can be generated onto the network 10 to assess whether the devices on the network can compensate for this spacing. Many times, this spacing can be less than the 9.6 microsecond gap required by IEEE 803 for some transmitters that do not properly comply with the protocol. This process determines whether other network devices can compensate for these out of specification transmissions. In other situations, the packet generated by the packet generator can be out of specifications with regard to its transmission rate. Bit rates of higher than 10 MBPS can be generated on the 10Base(T) network to determine whether network devices can also compensate for this situation. FIG. 4C is a block diagram showing the construction of the TTL pulse generator 268. A pulse width controller 282 controls the length of the TDR pulse, specifically t2 in FIGS. 3A and 3B. The pulse generator 284 generates a voltage pulse under control of the timing control logic 264. By properly controlling the packet generator and the pulse generator, t1 of FIGS. 3A and 3B can be controlled. FIG. 4D is a state diagram for the timing and control module 264. The module is activated by a transmit command that is received via the ISA interface 262 in step 290. It then prepares to send the TDR packet in step 291. First, it waits until the network is idle in step 292. This occurs by monitoring for any activity on the transmission sense line 151. When there are no transmissions on the network cabling, the timing control module 264 simultaneously sends an external trigger to the trigger device 150 of the digitizer 120 in step 293 and signals the packet generator 266 to begin sending the packet 200 in step 294. The module then waits until the transmission packet is finished in step 295 when it sends the TDR edge 250 by signaling the TTL pulse generator 268 in step 296. It again waits for the conclusion and then signals the system controller 140 via the ISA interface 262 in steps 297 and 298. FIG. 5 is a more-detailed block diagram of the attachment unit 110 for a 10Base(2) or 10Base(5) IEEE 802.3 network. These types of networks rely on a bus architecture in which a number of nodes 12 are connected by taps to the coaxial cable 14. The cable 14 has terminations 16 at either end to prevent signal reflection. The attachment unit 110 comprises a differential driver 310 that receives the signal output of the packet/TDR signal generator 150 and couples this signal into to the network 10. The driver is paired with a receiver 320a connected to Ch1 of the digitizer 120. A second receiver 320b is connected to Ch2 of the digitizer. The receivers 320a, 320b are preferably high impedance/high bandwidth differential amplifiers. The receiver 320a, which is paired with the driver 310, is connected directly across the coaxial conductors of the network cabling 14. The high input impedance of the receiver and its direct connection to the cabling ensure a low capacitance connection that will not affect the signal transmission characteristics of the cabling 14 and thus distort the analysis. The second receiver 320b is connected to receive the signal input from the other end of the network cable 14. Typically, this end of the network is physically remote from the point of connection of the first receiver 320a. As a result, a linear amplifier 340 with a high input impedance is preferably directly connected to the far end of the network and then a return cable 350 of known length extends between the linear amplifier 340 and the second receiver 320b. Signals propagate over the cable at a finite speed. In fact, a given signal will propagate a meter or less during the sampling period of the digitizer 120. These characteristics can be used to resolve the sources of the signals on the cable 14. The origin of the echoes or signals can be determined by comparing the time difference between the receipt of the signal on the respective digitizer channels Ch1 and Ch2 according to the following formula: From the following constants: (System cable propagation time) (Return cable propagation time) (System cable propagation velocity) The following values are calculated: 1) (Total propagation time)=(System cable propagation time)+(Return cable propagation time) 2) (Delta time)=(Start time(Channel 1 event))−(Start time(Channel 2 event)) The event location is then determined relative to Ch1: 3) (Event location time)=(Total propagation time+delta time)/2 2) (Event location position)=(Event location time) (System cable propagation velocity) The driver 310 receives both lines 271, 272 from the packetDR signal generator 150. The signals are delivered with the proper voltage and time wave forms. The driver 310 is voltage to current driving networks that drives the current out onto the network 10. Preferably, emitter-collector logic is used that has transition times of 100 picoseconds or less. FIGS. 6A and 6B show the configuration of the attachment unit 110 for 10Base(T)-type networks for the host transmit Tx and host receive Rx lines, respectively. A 10Base(T) network uses a star topology. A hub 20 is located at the origin of several cable links 22 to separate host computers 24-1 to 24-n. Inter-hub transmissions are handled usually with a faster coaxial or optical fiber interface 402 to another hub 20′. The separate links 22 between hub 20 and host 24 use twisted-pair cabling. And, the links are in a common collision domain. Basically, the hub 20 rebroadcasts signals it receives from one of the hosts over the host transmit Tx lines (hub Rx lines) to every one of the other hosts over the host receive lines Rx. FIG. 7 is a timing diagram showing, among other features, the hub's retransmission role. Packets P comprising digital bits of data are transmitted over links 22 from hosts 1-3 on the Tx lines. Any of the Host Rx lines, the Hub Tx, carries the combination of these packets that appeared in the links 22. FIG. 6A shows the host transmit side of the attachment unit 110 of this embodiment. The unit has a Tx summer 410 that combines all of the communications from hosts 24 to the hub 20 on Ch1 of the digitizer 120. In more detail, on every one of the host transmit Tx conductors of the links 22, a “T” connector 412 is spliced into the link 22. This provides a tap for sampling the voltages on the link conductors without interfering with communications between the hub 20 and hosts 24. Each of these T connectors 412 connects to a differential Tx driver 414-1 to 414-n and Tx receiver 416-1 to 416-n of the unit 110. Each Tx differential driver 414-1 to 414-n separately receives the packet and TDR signals or other packet transmission from the packet/TDR signal generator 150 on lines 271, 272 to current drive the corresponding links. The differential drivers are individually selectable by the signal generator select circuit 404. The signal generator selector 404 has the capability of individually selecting the Tx drivers 414 to 414-n, or any combination of the drivers, to transmit the hybrid packets/TDR signal onto the corresponding Tx conductors of the links 22. Typically, only one of the Tx drivers will be selected, however, at one time. This prevents the hub 20 from declaring a collision and transmitting a jamming signal to the hosts 24. A Tx select circuit 420 is provided to separately enable the Tx receivers 416 to 416-n. The Tx select circuit 420 is controlled by the system controller to individually enable any one of the Tx receivers or enable any combination of these receivers. Returning to FIG. 7, since the Tx summer 410 generates the analog combination of the transmissions over each of the links for which the corresponding Tx receivers are enabled, the waveform from the Tx summer during a collision C is non-physical in the context of the network 10. As described previously, in 10Base(T), the packets never actually collide; the hub and hosts sense the collision and generate jamming signals J. The Tx summer 410, however, combines the two packet transmission and generates the collision waveform C. Link pulses create a problem when the signals from the host Tx conductors are summed from more than one link 22. Star topologies are commonly designed to send a link pulse L from the hosts 24 and hub 20 if the link 22 has been silent for some predetermined time. This way, the hub 20 can ensure that the host is still operational, and the link is simply idle rather than dead. The pulses L, however, are asynchronously generated and do not comply with the network's common collision domain. They must, therefore, be removed before the signals from each link are summed together. Otherwise link pulse on the Host 2 Tx, for example, will interfere with the analysis of the packet transmission on Host 1 Tx. Link pulse elimination circuits 418-1 to 418-n, in FIG. 6A, prevent this conflict by providing the capability to eliminate these signals but still allow packet transmissions and most noise or interference signals to pass to the digitizer. The link pulse elimination circuitry 418-1 to 418-n, however, can cause the device 100 to eliminate any events that are shorter than the link pulse in duration, which in some circumstances may not be acceptable. To overcome this problem, the Tx receivers can be selectively enabled for detection by the Tx select circuit 420. By enabling only one of the Tx receivers 416 to 416-n, conflicts between events that do not comply with the common collision domain are prevented. A link pulse elimination select circuit 406 is then used to control each of the link pulse elimination circuits 418-1 to 418-n by disabling the link pulse elimination function. This allows the digitizer to sample link pulse events or any other events that would otherwise be eliminated by the link pulse elimination circuits 418. Tagging circuits 422-1 to 422-n also receive the sampled link signals from the Tx receivers 416-1 to 416-n. The tagging circuits 422-1 to 422-n generate a characteristic tag signal that identifies the origin of every signal that is sampled from the links. The tag signals are combined in the Tx summer 410 and digitized in by the digitizer. This allows the location of a transmission to be determined among the hosts of the network. FIG. 8A shows one implementation of the tag signal as a 5-bit Manchester encoded bit sequence. The tag signal follows the waveform event, here shown as a packet, by at least 100 ns to ensure that the event has actually terminated. The tag at the end of the waveform event, however, should not so long as to conflict with the sampling of other events on the network. Properly functioning nodes should wait at least 9.6 microseconds after the end of each packet before sending their own packet, and the tag is shorter than this period. FIG. 8B shows another implementation of the tag signal as a controlled level impulse function which is placed after the event. Since the digitizer encodes with 8-bit precision, a large number of unique level signals are available to encode the event's origin. Also, the tag encoder circuitry can be simplified to a voltage divider that operates in response to a reference voltage. This implementation has the advantage of shortening the tag signal to approximately one bit period. t3 is limited to 100 nanoseconds maximum. In a modification of this implementation, data can be encoded in both the voltage and pulse width providing two dimensions of modulation. The analog to digital converters 126 in the digitizer 120 can resolve 32 unique voltage levels, allowing some margin for noise. Four unique pulse durations t3 could be also be used. This scheme would result in 128 unique data tags. FIG. 8C is a block diagram showing a hardware implementation of the tag signal generator 422. In this implementation, the tag signal is not stored following the signal event in the digitizer 120. Instead, in response to detecting an event, the tag signal generator 422-1 signals a corresponding address generator 470-1 which transmits an address unique to the link on which the event was detected. This address is stored in a first-in first-out buffer (FIFO) 472 along with the unique addresses of events from any of the other links. The system processor 140 is then able to read out these addresses and correlate them to events captured in the digitizer 120. Returning to FIG. 6A, when monitoring the Tx side of the network 10, the system controller 140 operates the link pulse enable select circuit 406, and the Tx select circuit 420 to operate in one of four modes. Most commonly, the Tx select circuit 420 enables every one of the Tx receivers 416-1 to 416-n. The link pulse enable select circuit 406 similarly enables each of the link pulse elimination circuits 418-1 to 418-2. Thus, Ch1 of the digitizer 120 receives the analog summation of all of the events on every one of the Tx conductors of the links 22 as shown in FIG. 7. Only those events that activate the link pulse elimination circuits are prevented from reaching the digitizer. This is the most common operating mode since it allows the network manager to capture any of the events occurring on the network 10. Alternatively, every one of the Tx receivers 416-1 to 416-n could be again enabled to receive signals by the Tx selector circuit 420. The link pulse elimination select circuit 406, however, could disable each of the link pulse elimination circuits 418-1 to 418-n. This allows Ch1 of the digitizer 120 to receive and sample link pulse events and short events that would otherwise be eliminated by the link pulse elimination circuits 418. The operator must remember, however, that in this mode, it would be common for non-physical events to be detected on Ch1, which are the result of simultaneous occurrence of two link pulses on different links 22. Finally, only a single Tx receiver 416 could be enabled to sample only events on a single Tx line of a single link 22. This mode has the advantage of ensuring that any detected events actually physically occurred on the enabled link; two separate events will never combine to form a non-physical signal in this case. Typically in this mode, the link pulse elimination circuits 418 will be disabled since there is no likelihood of conflict between the links. Sometimes, however, when it is known that the host 24 is properly signaling the hub with link pulses, the operator may want to eliminate the link pulses to capture other types of events. The system described thus far only has connections for receiving transmissions from the hosts 24 to the hub 20. FIG. 6B shows attachment unit connections to the host receive lines Rx of the network. As on the Tx side, T connectors 452 are spliced into the network links 22 to connect each Rx driver 454-1 to 454-n and Rx receiver 456-1 to 456-n. The output of the Rx receivers 456-1 to 456-n is directly received by an Rx summer 460 which provides the input to Ch2 of the digitizer 120. An Rx selector circuit 470 is provided to selectively enable the Rx receivers 456-1 to 456-n individually or any combination of the receivers. As on the Tx side, this allows any combination of the signals from the Rx lines to be combined on Ch 2 of the digitizer. The signal generator select 404 also controls each of the Rx drivers 454-1 to 454-n. Thus, the signal from the packet/TDR generator 150 can be selectively provided on any of the Rx conductors of the links 22 by enabling the corresponding Rx driver 454. The differences between the Rx and Tx sides of the attachment unit 110 derive for differences in the signals on the Rx and Tx lines. When the hub 20 receives a transmission from a host 24 over the link's Tx lines, the hub forwards the transmission to every other host over the receive Rx lines for those links, as shown in FIG. 7. Therefore, the host receive lines generally cannot be simply summed since the same signal from each of the links would interfere with each other. An Rx enable circuit 470 provides separate enable signals to each of the Rx receivers. Typically, only one of the Rx receivers will ever be enabled at one time in contrast to the Tx side, which usually sums the signals from all the links. The attachment unit 110 also has the capability to sample inter-hub or behind the hub transmissions. This functionality is provided by connecting an inter-hub driver 454-h and inter-hub receiver 456-h to inter-hub link 402 between hubs 20 and 20′. The signal generator select circuit 404 has a control over the driver so that TDR analysis can additionally be performed on link 402. Many times inter-hub transmissions will utilize different protocols to which the packet/TDR generator 150 must be compatible. The inter-hub receiver 456-h is selectable by the Rx select circuit so that when it is enabled, inter-hub transmissions are provided on Ch 2 of the digitizer. This configuration allows the network operator to determine whether the hub is properly forwarding packets addressed to hosts serviced by hub 20′. The packet will be first detected as a host-to-hub transmission by the Tx side of the attachment unit 110. Then by enabling only inter-hub receiver 456-h, the packet is detected as it is transmitted to hub 20′. FIG. 9 is more detailed circuit diagram for the attachment unit 110 on one link 22 of the 10Base(T) network. As described previously, two T connectors 412, 452 are spliced into the host transmit Tx and host receive Rx twisted pair wires. These provide connection for the Tx driver/receiver pair 414/416 and the Rx driver/receiver pair 454, 456. The internal structure of the link pulse elimination circuit 418 is also shown. A link pulse elimination control circuit 480 monitors the received signal from the Tx receiver 416 for a link pulse. When no pulse is detected, it generates an enable signal to a buffer amplifier 482 that connects the receiver to the Tx summner 410. If a link pulse is detected, however, the control circuit 480 disables the buffer amplifier 482, thus blocking the signal from being combined with the responses from other links. The link pulse elimination selector 406 gates enable signal from the control circuit 480 so that the link pulse elimination function can be disabled. FIG. 10A is circuit diagram for another embodiment of the attachment unit 110 on one link 22 of the 10Base(T) network. This circuit preserves the signal information that is otherwise lost as a result of the link pulse elimination. A leading edge capturing circuit 1880 captures only the leading portions of signals that would otherwise be eliminated by the link pulse elimination circuit 418. The leading edge signals are sampled on the other channel Ch2 of the digitizer 120. A multiplexor 1882 enables the LPE selector 406 to determine whether Ch2 receives the Rx transmissions or the leading edge signals of the Tx transmissions. A data tagger 1883 is under control of the LPE selector to label the leading edge signals according to the link on which they originated. The output of tagger 1883 is transmitted to the Rx summer 460 via a buffer amplifier 1884, which is also controlled by the selector 406. FIG. 10B is a more detailed circuit diagram of the leading edge capturing circuit 1880. The level of the output of the Tx receiver 416 is detected by two comparators 1885A,B receiving reference voltages Vref. The comparators 1885A,B drive a NAND gate 1888. The Vref is selected so that the comparators 1885A, B will trigger under the same conditions as the link pulse elimination circuit 418. The comparators 1885A, B control the reset and start of a 400 nsec timer 1895 that enables and disables a buffer amplifier 1890. When enabled, the buffer amplifier 1890 passes the output from the Tx receiver 418, which is received through a 10 nsec delay 1898. As a result, the approximately 400 nsec long leading edge portions of signals that are typically eliminated due to the operation of the link pulse elimination circuitry can be selectively captured on Ch2 of the digitizer 120 while still preserving the link pulse elimination function. The foregoing description of the attachment unit 110 has been generally specific to connecting the attachment unit 110 across the hub 20 of a 10Base(T)-type network. This same attachment unit, however, would be appropriate to monitor the transmissions to and from other types of network devices such as repeaters, concentrators, and switches. Switches, for example, connect in the same basic star network as the hub 20 in FIGS. 6A. A major difference in the context of the invention is the fact that each of the links 22 could have multiple hosts connected via a single pair of conductors and, more significantly, are in different collision domains. Consequently, the multiple link summation performed by Tx summer port 410 can not be supported. Only a single link could be monitored at one moment by each channel Ch1, Ch2 of the digitizer 120. Otherwise, different packets in different collision domains will be combined to result in non-physical waveforms. In another implementation, the attachment unit 110 shown in FIG. 5 could also be used in a switched environment. The linear amplifier 340 could be connected behind the switch. In this way, transmissions coming into the switch could be monitored as well as the transmission after being forwarded by the switch. 2. Hardware Operation FIG. 11 is a flow diagram illustrating the device initialization. The first step 810 involves selecting between the protocols that are supported by the device 100. A few illustrated options are CSMA/CD protocols such as IEEE 802.3 or token ring/bus protocols IEEE 802.4 and 802.5. More specific protocols such as Ethernet or fast Ethernet are other possibilities as are ATM and FDDI. Next, the media type must be input in step 820; 10Base(2), (5), and (T) are a few examples if CSMA/CD is selected in step 810. 100 MBPS media are also equivalents such as 100Base(T). Finally in step 830, the user must also select whether or not the system should actively probe the circuit for cabling problems in a TDR mode or passively listen to evaluate the performance of the network. a. Listen Mode FIG. 12 shows the operation of the device in listen mode. First, system controller 140 configures the attachment unit 110 in step 910. For the 10Base(2) and (5) unit of FIG. 5, the single driver 310 must be disabled and the receivers 320a, 320b enabled. In the 10Base(T) attachment unit of FIGS. 6A and 6B, only one of the Rx receivers 456-1 to 456-n is enabled to sample of the hub transmissions. All of the Tx receivers 416-1 to 416-n are typically enabled by the Tx selector so that transmissions over the entire network are sampled. None of the Tx and Rx drivers 414, 454 is enabled by the Tx and Rx signal generator select 404. The other alternative configurations are also possible. When monitoring a switching device only one receiver will typically be enabled for each channel. The digitizer 120 is then prepared to capture the event by arming the trigger 130 for Ch1 and Ch2 in step 920. At this point, the digitizer 120 will operate independently to capture the next event that satisfies the trigger thresholds. After the events have been captured and stored in the digitizer 120, the system processor 140 downloads the captured data in step 930 from the digitizer for both Ch1 and Ch2. The system processor then makes a first pass over the data and converts it into an IEEE floating point format in step 940. In step 950, the signal processor 140 again passes over the data and generates a histogram showing the voltage distributions for the sampled array of data. From this statistical analysis, the system processor 120 develops software event thresholds, Thres_High and Thres_Low. Essentially, thresholds are found that will yield a reasonable number of events from the data array. The thresholds are then applied to the data to extract the events, and their start and stop times. FIG. 13 is a flow diagram showing the process for extracting the events. In steps 1005 to 1015, the system processor 120 increments through the data applying the high and low software thresholds, Thres_High and Thres_Low. The start time for event n is set in step 1020 when the thresholds are satisfied. In steps 1025 and 1030, the processor passes through the data points within the Event(n) until the thresholds are no longer satisfied. The stop time for Event(n) is then set in step 1035. In the following steps 1040-1060, the array pointer point(I) is incremented, a variable IEG Count incremented by the sampling period for the data array (Time/point), and then IEG Count is compared to a constant IEG Time. IEG time, preferably 500 nanoseconds (nsec), corresponds to the maximum Inter Event Gap in which the sampled points may be sub-threshold and an event still declared. If the thresholds are satisfied anytime within the IEG time, control returns to steps 1025 and 1030, indicating the continuation of the Event(n). These steps compensate for situations in which lone aberrant data points will prematurely terminate an otherwise continuous event. In other words, the event extraction process will not terminate an event condition in response to a sub-threshold data points of less than 500 nsec. In steps 1065 to 1080, events stretching across the end or the beginning of the data array are indicated by setting the stop time to EOR (end of record) and start time to BOR (beginning of record), respectively. Typically, these events are discarded as being incomplete. Finally, in step 1085 the stop and start time of Event(n) are saved. Program flow then returns to step 1010 to find the next event. Returning to the flow diagram in FIG. 12, once the events have been located in the data array, an absolute time is determined for each of the events based upon the location of the events in the data array and the time when hardware trigger was activated for the each channel. This places the events from the channels in a common time frame. In steps 960, signal processing is performed. Specifically, the attributes or parameters shown in Table I below are computed for each event and for each channel. TABLE I PARAMETERS 1. Midpoint min, max, mean, quantity 2. Preamble Frequency min, max, mean, sdev 3a. Entire Event Frequency High min, max, mean, sdev 3b. Entire Event Frequency Low min, max, mean, sdev 4a. End of Event Frequency High min, max, mean, sdev 4b. End of Event Frequency Low min, max, mean, sdev 5. Maximum Voltage Distribution min, max, mean, sdev 6. Minimum Voltage Distribution min, max, mean, sdev 7. Peak to Peak Distribution min, max, mean, sdev 8. Rise Time min, max, mean, sdev 9. Fall Time min, max, mean, sdev 10. Overshoot min, max, mean, sdev 11. Undershoot min, max, mean, sdev 12. First Bit peak-to-peak Voltage 13. First Bit Min Voltage 14. First Bit Max Voltage 15. First Bit Width Voltage 16. First Bit Rise Time 17. First Bit Fall Time 18. Jitter min, max, mean, sdev The meaning or relevance of each of these parameters is evident from the description. For example, preamble frequency refers to the frequency in the preamble of a packet event. The event frequencies high and low for the entire and end of event refer to the high and low frequency peaks in the spectral distribution. Parameters 8-17 provide information that is more descriptive of the ability of the source to drive the network cabling dependably and with adequate power. The rise times and fall times quantify the sharpness of the voltage transitions. Maximum/minimum voltages indicate whether the voltage levels are with the media's specifications. The midpoints refer to the center values or mean positions across a set of transitions. For example, in 10Base(2)(5) the mean point of a typical packet will usually be −0.8 volts, halfway between the 0 Volt idle and the maximum non-collision voltage swing of −1.6 volts. To calculate midpoints, the average values are determined for each voltage transition and then a histogram of the values is generated. The midpoints are extracted from the histograms by searching looking for groupings of the average values. Midpoint analysis is helpful in determining whether a collision has occurred. The classic collision waveform appears as a two-sided staircase, or possibly more accurately a stepped pyramid. A typical 2-party collision will have two midpoints for the event. The first midpoint corresponding to the time when the first transmitter is broadcasting alone, the second, higher level midpoint occurring when both transmitters are broadcasting simultaneously, and a third midpoint, typically equal to the first midpoint, that resulting from the second in time transmitter broadcasting alone after the first broadcaster has terminated its transmission in response to the collision. A usually greater number of midpoints will be generated when more than two sources collide simultaneously. Based upon the calculated attributes, the event is classified in step 970 as being a collision, a packet, noise, interference or crosstalk using parametric analysis. The Table II below is the Parameter Range Table against which the event classifications are made. TABLE II PARAMETER UNITS COLLISION_1 COLLISION_2 COLLISION_3 COLLISION_4 Midpoint Quantity 1:1 2:2 3:3 4:4 Midpoint mean Volts −1.4:−4.42 Midpoint mean Volts −1.8:−4.5 Midpoint mean Volts −2.3:−5.22 Midpoint mean Volts −3.78:−5.22 Peak-peak Distr. Max Volts Peak-peak Distr. SDEV Volts Min. Voltage Distr. Max Volts Max Voltage Distr. Max Volts 0.2:−7 0.2:−7 0.2:−7 0.2:−7 Preamble Frequency MHZ End of Event Frequency High Mean MHZ Entire Event Frequency High Mean MHZ Entire event frequency High SDEV MHZ Max Voltage Distr. SDEV Volts PARAMETER UNITS PACKET_1 PACKET_2 NOISE_1 NOISE_2 NOISE_3 Midpoint Quantity 1:1 1:1 0:1 0:1 0:1 Midpoint mean Volts −0.3:−1.35 −0.3:−1.35 0:−1.35 0:−1.35 0:−1.35 Midpoint mean Volts Midpoint mean Volts Midpoint mean Volts Peak-peak Distr. Max Volts .3:2.8 .3:2.8 Peak-peak Distr. SDEV Volts 0:0.245 0:0.245 0.25:1 0:0.245 0.25:1 Min. Voltage Distr. Max Volts 0:0.245 0:0.245 0.25:1 0:0.245 0.25:1 Max Voltage Distr. Max Volts 0.2:−1 0.2:−1 0.2:−7 0.2:−7 0.2:−7 Preamble Frequency Volts 4.5-5.5 5.5:13 End of Event Frequency High Mean MHZ 1.7:13 1.7:13 Entire Event Frequency High Mean MHZ 1.7:13 1.7:13 Entire Event Frequency High SDEV MHZ 0:0.7 0:0.7 0:0.7 0.71:10 0.71:10 Max Voltage Distr. SDEV MHZ INTERFERENCE XTALK XTALK XTALK XTALK PARAMETER UNITS (TRANSIENT) (4 MHZ) (10 MHZ) (16 MHZ) (100 MHZ) Midpoint Quantity Midpoint mean Volts Midpoint mean Volts Midpoint mean Volts Midpoint mean Volts Peak-peak Distr. Max Volts Peak-peak Distr. SDEV Volts Min. Voltage Distr. Max Volts Max Voltage Distr. Max Volts 0.205:1 0.205:1 0.205:1 0.205:1 0.205:1 Preamble Frequency Volts End of Event Frequency High Mean MHZ Entire Event Frequency High Mean MHZ 3.6:4.4 9:11 14.4:17.6 90:110 Entire Event Frequency High SDEV MHZ Max Voltage Distr. SDEV Volts 0.02:1 0.02:1 0.02:1 0.02:1 0.02:1 Table II shows the criteria for characterizing the 10Base(2)(5) events. The classification Collision_1 indicates a waveform that has the requisite voltage levels for a collision, but the classic staircase or pyramid waveform was not produced since there is only a single midpoint. This usually occurs when the colliders begin broadcasting at precisely the same moment from the perspective of the device 100. Collision_2, Collision_3, and Collision_4 denote collisions typically between 2, 3, and 4 parties, respectively. In the case of each of these collision classifications, the classic staircase or pyramid waveform is formed since each of the classifications require that at least 2 or up to four midpoints are produced during the collision. The difference between classifications packet_1 and packet_2 derives from the frequency of the preamble. Packet_1 indicates the typical packet in which the voltage distributions, midpoint voltages, and midpoint quantities generally indicate a properly generated packet within the media's specifications. Packet_2 indicates a packet that has otherwise generally valid parameters but is out of specification with regard to transmission frequency since the classification is inclusive of preamble frequencies up to 13 MHZ. Typically in 10 megabit per second networks, the preamble frequency should be close to 5 MHZ. Three different noise classifications are provided: Noise_1, Noise_2, and Noise_3. The classifications are generally designed to pick up most transmissions that are produced by network device but fall outside the packet classification. Noise_1 is designed for malfunctioning source device amplifiers. The classification has a relatively tight frequency distribution parameter but relatively broad voltage amplitude parameters to indicate source devices that are out of specification with regard to the voltages they produce. Noise_2 has very broad parameters for frequency distribution, but tighter parameters with regard to the voltages on the line. In fact, the voltage distributions are similar to those for a packet. Thus, Noise_2 is designed to pick up transmitters that are out of specification with regard to frequency indicating a bad transmission clock, but are generally driving the lines with the proper voltage. Finally, Noise_3 is designed to pick up transmitters that are out of specification both with regard to frequency and amplitude. It has a very broad range for the frequency standard deviation and for minimum/maximum voltage distributions. The parameters for interference are generally broad and few in number. This classification is designed to be satisfied when interference sources from outside the network generate voltages on the network cabling. Finally, the device is designed to find specific frequencies of crosstalk. Four different classifications are provided for 4, 10, 16, and 100 MHZ. These are usually satisfied where the interference has a particular frequency that would indicate its origin is another network or communications devices. FIG. 14 illustrates further analysis that is performed for packets and collisions. In the case of events that are classified as packets, the process branches to determine the digital contents of the packets in step 1105. This is similar to the analysis that would be performed by a protocol analyzer but the analysis is based upon the sampled array of data captured by the digitizer. Manchester decoding is first performed in step 1110 by again passing over the data and finding the location of transitions. According to this coding technique, a 0 is represented by transition from high to low across the period of the bit, and a 1 is represented by a transition from low to high across the period of the bit. This scheme ensures that every bit has a transition in the middle, and this makes it easier for the receiver to synchronize to the decoder. The Manchester decoding process for a digitally sampled packet/frame transmission is shown in FIGS. 15B and 15B in detail. Some aspects of the process are specific to 10Base(2)(5) type networks, but those skilled in the art will understand that the general principles can be applied to other networks. Inputs to the decoding process are the array of sampled voltages (point(I)) downloaded from the digitizer and the event location information (event(n)) developed by the event finder processing. The output is an array MBIT(n) that represents the successive bits in the Manchester decoded packet/frame. The first operation performed in the Manchester decoding entails finding the first positive-going transition in the packet in steps 1502-1509. In 10Base(2)(5) media, this event represents the end of the first bit of the preamble. The variable I is set to start_index, which represents the location where the beginning of the packet event is located. Then, Thres_First is applied to the next data points in point(I) until the stored sampled voltage is less than Thres_First. Satisfaction of this comparison means that the start of the transmission, the first negative going transition of the preamble in a 10Base(2) or (5) data transmission, has been found. Recall that in 10Base(2) or (5), the voltage varies between 0 and −1.6 Volts. The value of the Thres_First constant derives from the first bit parameters calculated as part of the signal processing parameters of Table I. By reference to such parameters as First Bit MI, MAX Voltages and First Bit Width Voltage, Thres_First is specified to ensure that the first bit can be located in the Manchester decoding. In steps 1508 and 1509, the next data points are again compared to Thres_First to determine when a voltage now exceeds the constant. When 1509 is satisfied, the first positive transition has been found, and the first data point of the array MBIT is initialized to 1. Steps 1512-1522 construct a new array sample(I) that holds the information whether each data point in the array of sampled voltage point(I) is above or below a Manchester decoding threshold Thres_Man. Each successive voltage is compared to the Manchester decoding threshold in step 1514 and the corresponding value in the array sample(I) set to either above or below in steps 1518 and 1516. The process in repeated with the pointer variable being incremented in step 1522 until the end of the event is reached, as determined in step 1520. The Manchester decoding threshold Thres_Man is also derived from the parameters shown in Table I. Parameters such as Maximum Voltage Distribution, and Minimum Voltage Distribution, which are predictive of the typical, i.e., other than first bit, voltage transitions in the packet, are used to calculate the threshold. Next, in steps 1524-1540, pointer(l) is reset to First_Index to step through the array sample(I) to find the transitions after the first bit and store into MBIT whether each transition is low to high or high to low. A second indexing array m_index(n) holds the location of transitions in the packet by reference to the pointer variable used to step through the sample(I) array. In detail, in steps 1526 and 1530, the pointer (I) is incremented until successive points in sample(I) are different. If (I-1) was below Thres_Man then the corresponding position in the MBIT array is set to 1 indicating a positive-going transition between (I-1) and (I); otherwise, MBIT is set to 0 indicating a negative-going transition between (I-1) and I. m_index holds the corresponding location of the transition stored in the array MBIT. This process repeats itself until stop_index is detected in step 1540. Steps 1545 to 1560 determine whether the transitions represent a bit of data or simply a preliminary transition prior to a bit transition. Recall that in Manchester encoding, a 1 is represented from a low to high transition, and a 0 is represented by a high to low transition. If two successive 1's or 0's are sent, however, there must be an intermediate or preliminary transition to enable the voltage to again make the appropriate transition. These intermediate transitions are not directly indicative of data and therefore, must be ignored when determining the encoded data bits. Only the transitions at a clock edge represent valid data bits. This function is accomplished in steps 1550, 1555, and 1560 in which the intermediate transitions are filtered out and the array MBIT repacked with only the decoded data bits of the packet. The filtering process is accomplished by defining a constant Decode_Delta. This constant represents the minimum number of data points or samples that will exist between two valid data transitions. This is calculated by determining the bit period by reference to the preamble frequency calculated in Table I. In a 10 megabit per second network, the ideal bit period will be 100 microseconds. This is multiplied by a factor representing the maximum conceivable clock skew. For example, if the maximum clock skew is never greater than 25 percent, subsequent bits should never be closer than 75 microsecond. This is multiplied by the sampling frequency period to determine the corresponding number of bit periods in the point(I). Decode_Delta=(bit period) * (0.75) * (sampling frequency) Steps 1550 determines whether successive locations in the m_index array are greater than Decode_delta apart. If the two locations are separated by less than Decode_delta, the bit is ignored; and if the separation is greater, the bit is repacked into the MBIT array. Thus, when the process is completed, the array MBIT contains an array of the decoded data bits. Packet decoding is then performed in step 1115 followed by FCS verification in step 1120. This is a cyclic redundancy check to assist in determining whether or not any errors have occurred in the transmission of the packet. Transmitter timing jitter is also determined in step 1125 by looking at bit periods in the preamble and across the remainder of the packet. Finally, if relevant, InterNet protocol decoding is also performed in step 1130. The next step in FIG. 14 is packet decoding, which is based upon the MBIT array generated in the Manchester decoding, provides information regarding whether or not the packet was properly formatted. For example, the preamble can be reviewed to make sure there are no consecutive zeros since the preamble should only contain a 5 MHZ square wave. The destination and source suffixes and prefixes can be checked to ensure they have the proper values. The CRC data of the frame check sequence (FCS) can be compared to the ones and zeros of the packet to determine whether there is agreement. The total length of the packet can be reviewed to make sure that it is not too long or too short. The length of the preamble and the set frame delimiter (SFD) are reviewed to ensure that it has the proper length. Further, the inter-event gap EEG, being the time between the end of the packet and the beginning of the next broadcast, is checked to make sure that it is at least the 9.6 microsecond specification for this time. FIGS. 16A and 16B illustrate the packet decoding process. The specific example formats binary data according to the IEEE data structure. The process operates on the data array MBIT produced from the Manchester decoder and determines the length and contents of the preamble, destination address, source address, length/type field, LLC data field, and the FCS field. Also, it indicates if there is a CRC or dribble bit error. The packet decoder begins by finding the successive 1's of the start of frame delimiter (SFD). If the SFD is not found in step 1602, the preamble length is set to the length of the MBIT array and the preamble contents are set to the MBIT array's contents in step 1604. If the SFD is found, then in step 1606, the preamble length is set to the (SFD position-8) and the preamble contents are set to the contents of the MBIT array up to the preamble length. The SFD length is set to 8, and the SFD contents are set to the MBIT contents between the end of the preamble and SFD position. In steps 1608, the number of bits remaining in the MBIT array is checked. If it is less than 48 bits, the destination address is set to the number of remaining bits and the contents of the destination address are set to the contents of the MBIT array for these bits in step 1610. If, however, 48 bits remain in the MBIT array, then these bits are set to the destination contents, and the address length is set to 48 bits in step 1612. Again, in step 1614, it is determined whether another 48 bits remain in the MBIT array. If 48 bits do not remain, the source address length and contents are set in view of these remaining bits in step 1616. If 48 bits do remain, however, they are assigned to the source address contents and the source address length is set to 48 bits in step 1618. In steps 1620, 1622, and 1624 the next 16 bits are set to the length/type field contents and length if they exist. The remaining number of bits in the MBIT array is checked in step 1624 to determine if greater than 32 bits remain. If less than 32 bit remain, then these remaining bits are set as the data field contents and the length is set to the number of remaining bits. If greater than 32 bits remain, then the data field length is set to the number of remaining bits −32. The last 32 bits are assumed to be the frame check sequence (FCS) used in the CRC check. Steps 1630 and 1632 are relevant to whether the packet conforms with the Ethernet (trademark) packet format or the format set forth in IEEE 802.3 format. In 802.3, the length/field indicates the length of the data portion of the packet; in Ethernet, the field is a type field which is always less than 1,500. If the field length is greater than 1,500 as determined in step 1630, this indicates an 802.3 type packet allowing more processing to take place. In steps 1632, 1634, and 1636, the length field is used to determine the length and contents of any pad field. FIG. 16B shows the steps involved in the CRC check. In step 1640, the CRC algorithm is applied to the packet contents. If there is agreement between the result and the FCS variable, the CRC is good and processing is completed. If, however, an error is determined further processing takes place to determine if a dribble bit error is the source of the CRC failure. Steps 1642-1654 concern the recalculation of the CRC in the possible situation of a dribble bit error. In the preceding analysis, the 32 bits of the FCS were assumed to be the last 32 bits of the packet, which will lead to an error if a dribble bit, a random bit at the end of the packet, is present. The FCS bits, however, can be alternatively located according to the length/type field in 802.3. This double-check can not be performed on the packet was formatted under the Ethernet (trademark) regime, which is determined in step 1644. In step 1646, the location of the FCS is determined from the length field rather than assuming it is the last 32 bits. If agreement exists between the field length calculated FCS and the last 32 bits of the packet, no further computing can be performed, and the CRC is concluded to be bad indicating a transmission error or similar problem. If the length field determined FCS is different, then the CRC is recomputed in the 1652. If the recomputed CRC is still bad than the packet is again concluded to be invalid. A good CRC calculation here, however, indicates a dribble bit error. The data field contents and FCS fields updated in step 1652. The remaining bits after this newly located bits, if any, are then assumed to be dribble bits in step 1654. It should be noted, however, that this packet analysis can be carried out even if there is some problem in packet formatting in contrast to the operation of the protocol analyzer. The analyzer will only decode properly formatted packets. A packet that does not conform to the error connect scheme, for example, will be discarded without further processing. In contrast, the present process can still analyze the data contents of the packet to extract any available information. In fact each transition can be analyzed to determined why an typical digital decoding device would fail to decode the packet. Returning to FIG. 14, when the event type is a collision, the process branches to perform collision timing analysis in step 1140. The start and stop times for parties participating in the collision are determined in step 1145. In a properly operating network, the difference between the start times for the two colliders should not be greater than the time it takes for a signal to propagate across the entire length of the network. If the start time is greater than the total propagation time, it means that the second in time party should have realized a transmission was occurring on the network and not started its own transmission. This is a late collision. The jam times are also found and compared to the specifications of the network. FIG. 17 shows an exemplary collision waveform 1210 and the timing information (T_Start and T_Stop Times) that are extracted from the waveform during the collision analysis. Specifically, for the level 1 and level 2 midpoints, the start and stop times are determined. This provides information regarding whether the jam times are too long or too short for each of the nodes taking part in the collision and whether any late collisions took place. Returning to FIG. 14, if, in the packet or collision analysis, any failures or improper operation have been detected, the source is identified and the severity determined in step 1150. This can be accomplished a number of ways. The source addresses of packets can be decoded. In the present invention, this decoding can occur even in the case of a collision by extracting the source address from the waveform. Also, the source of packets that fail error checking can usually be determined by matching the source address to the possible addresses in the network. In the case of noise or invalid packets, the 10Base(2) and (5) attachment unit also allows the location of the source to be identified by comparing the time of receipt at Ch1 and Ch2 of the digitizer. In fact, 500 MHz sampling frequency provides a resolution of less than a meter when the length of the cable 350 to the linear amplifier 340 is know. The 10Base(T) unit has the tagging circuits 422 that identify the link from which the event originated. Table III below lists the failure types for Event Type. In the table, DEST refers to destination address, SRC to source address, CRC to cyclic redundancy check, SFD to start of frame, delimiter, and IFG to interframe gap. TABLE III FAILURE TYPES BY EVENT TYPE PACKET COLLISION 1 COLLISION 2 COLLISION 3 COLLISION 4 00 in Preamble Jam too long Jam too long Jam too long Jam too long Wrong Value Jam too short Jam too short Jam too short Jam too short in DEST Suffix Wrong Value IFG Before <9.6 μsec Late Collision Late Collision Late Collision in SRC Suffix Wrong Value IFG Before <9.6 μsec IFG Before <9.6 μsec IFG Befare <9.6 μsec in DEST Prefix Wrong Value in SRC Prefix Wrong Value in CRC Bit Alignment Runt packet Giant packet Preamble + SFD too Short Preamble + SFD too Long Length After SFD Short − HOLD Length After SFD Long − HOLD Data Wrong Length Signature IFG Before <9.6 μsec NOISE 1 NOISE 2 NOISE 3 INTERFERENCE (TRAN) XTALK(4 MHz) Noise Noise Noise Interference Xtalk (Token Ring) IFG Before <9.6 μsec IFG Before <9.6 μsec IFG Before <9.6 μsec XTALK (16 MHz) XTALK (10 MHZ) XTALK (100 MHz) Xtalk (Token Ring Fast) Xtalk (Ethernet) Xtalk (Ethernet 100) If the failure merits corrective action, the system assesses which unit on the node or the cabling should be replaced in step 1155. Further, the location of this unit among the various nodes is also determined in step 1160 and then this provided to the user interface to inform a technician as to the appropriate corrective action in step 1165. FIG. 18 shows the process for signature matching. Commonly, a transmission is detected on the network but due to a collision or other noise, the source address can not be identified and decode even with the above described technique for packet decoding. Signature matching is a process by which the analog characteristics of the waveform are matched to known characteristics associated with each of the network transmitters to provide a prediction of the transmission's source. In detail, a two dimensional array Value(n,m) is first constructed of the parameters calculated in Table I for each of the transmitters on the network, in steps 1910, 1915, from previous analysis. The rows of the array correspond to the different hosts and the columns correspond to the parameters set forth in Table I. In steps 1920, 1925, 1930, and 1935, the parameters of a transmission, the source of which is unknown, are compared to the parameters held in the array value(n,m) for a host. The difference between the known host's parameter and the parameter from the known source is detected and then normalized. A sum is calculated for each host. In step 1940, the square-root of the sum divided by the number of parameters is stored to an array match(j). Steps 1945 and 1950 perform the comparison for every host in the value array. In steps 1955, 1960, and 1965, a match is declared if any of the match indicators stored in Match(j) is less than a threshold. In the case of multiple sums satisfying the threshold, a probability for a match should be calculated. The jitter in the transmitter clock can be determined by comparing the time between successive bits in the packet. The calculation is performed according to the following technique: For j=0 to n−1 do Diff = Reference_Period − (((m_index(j+1) − m_index(j)) * Time_per_point) RMS_Jitter=RMS_Jitter + (Diff)2 next j RMS_Jitter = SQRT(RMS_Jitter/n) Reference_Period is the defined bit period for the network, which is 100 ns in a 10 MBPS network, for example. The number of samples between each pair of success bits is held in the m_index array and is subtracted from the reference_period. The result is multiplied by Time_per_point, which refers to the sampling period of the digitizer. The result is the time in seconds between successive bits. This series of differences is used to calculate an root-mean-square (RMS) jitter according to a standard formula. It should be noted that the resolution of the this technique, however, is limited by the size of Time_per_point. b. Active Analysis Mode FIG. 19 shows the steps involved in TDR analysis for the network. First, the attachment unit must be configured in step 1310. In 10Base(2) or (5), the driver 310 must merely be enabled and the packet/TDR generator 150 armed. The 10Base(T) attachment unit should be configured to provide the hybrid TDR signal on only one pair of wires, either Tx or Rx, of a link 22 and detect any echo on the wires. The system processor 120 accomplishes this by sending the proper address to one of the Rx or Tx selector circuits 470, 420 and the signal generation select 404. The Tx or Rx selector 420, 470 and signal generator select circuits 404 decode the address then send the proper enabling signal to the receiver and driver. If host transmit Tx conductors are being checked, then one Tx driver 414 and Tx receiver 416 should be enabled; if host receiver Rx conductor are being checked then one Rx driver 454 and Rx receiver 456 should be enabled. The hybrid packet/TDR signal is then generated on the conductor pair of interest in step 1320. The digitizer 120 will be triggered by the timing and control circuit 264 to record the entire signal. Only the TDR portion is of interest, however, and specifically any echo in response to the TDR edge. The system processor 120 processes the data from the digitizer and locates this echo. By computing the time between the generation of the edge on the network and the return echo, the source of the echo is located in step 1340. The shape of the echo provides information about the cause. This information leads to the identification of the possible sources listed below in Table IV: TABLE IV Terminator Loose Terminator Disconnected Wrong Terminator Value Extra Terminator Cable With Open Cable With Short Bad Impedance Length (Between Repeaters) too Long Total Length Too Long Cable Signature Bad Split Pair: Reversed, Crossed Excess Cross Connectors Shielding defective In order to uniquely locate the position of any terminations on the network cabling, the TDR analysis mode also includes extracting the termination's response to the TDR signal in step 1345. Based on the delay from when the TDR signal was first injected into the cabling and the detection of the termination's response, the location of the termination can be uniquely determined or calculated in Step 1350. Other types of active analysis are also possible. As discussed previously in connection with FIGS. 4A-D, the packet/TDR generator 150 has the capability of generating packets without the TDR edge, that conform with the network's protocol. For example, packets can be generated to collide with transmissions from other network sources to determine whether those sources properly react to the collision. In another type of analysis, packets are generated with a destination address of one of the other network nodes. The node's response can then be monitored to determine whether it reacts properly. The ability of other nodes to properly decode successive packets can also be assessed with the invention. Two packets are sent with a spacing either within the specification of 9.6 microseconds or less. In other examples, out of specification packets, with regard to frequency, can also be transmitted to determine whether or not the other network devices can properly lock onto the out of spec packets. Generally, these other modes of analysis are used either to test how well a particular network device is operating or further probe a possibly improperly operating network device to assess or predict failure modes. c. Client/Server Embodiment FIG. 20 is a schematic block diagram showing a client/server embodiment of the invention. A plurality of network diagnostic devices 100, including attachment units 110, as described above in FIGS. 1-19 are connected to separate local area networks 10 having bus and star topologies. The networks 10 are connected to each other via repeaters and switches. Each of the network diagnostic devices 100 download its acquired information to a central master monitor 101. Preferably, the transmission of information between devices 100 and master 101 occurs in a separate redundant wired or wireless network. It can alternatively be accomplished through the networks being monitored. Thus, an entire distributed network can be monitored and tested from a single device. While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. For example, while the system has been described in connection with LANs, other data networks will benefit from the invention such as: Metropolitan Area Networks (MANs) and Wide Area Networks (WANs). Also, while the explanation is specific to 10Base(2), (5), or (T) networks, other protocols and media are possible such as ATM or FDDI, for example.
<SOH> BACKGROUND OF THE INVENTION <EOH>The several common protocols for local area networks (LANs) include CSMA/CD (Carrier Sense Multiple Access with Collision Detection), token bus, and token ring. CSMA/CD is sometimes generically, but incorrectly, referred to as Ethernet, which is a product of the XEROX corporation using the protocol. I.E.E.E. has promulgated standards for these protocols, collectively known as IEEE 802, or also known as ISO 8802. IEEE 802.3 covers one-persistent CSMA/CD LAN; IEEE 802.4 and 802.5 cover token ring and token bus, respectively. These standards differ at the physical layer but are compatible at the data link layer in the seven layer OSI (Open Systems Interconnection) reference model. CSMA/CD, token bus, and token ring are similar in the sense that they are all packet or frame based systems in which inter-node communications are broadcast over a shared transmission medium. In CSMA/CD, a node wishing to transmit over the network cabling listens to ensure that the network is idle, i.e., no other node is currently transmitting. When the network is idle, the node may begin transmission. Due to the physical extent of the cable, however, the simultaneous transmission of two or more nodes may occur. This gives rise to what is termed a collision. To compensate for this eventuality, each node also listens while it transmits. In some cases, the average voltage during the transmission will be different if a collision is occurring on the network. In other cases, a jamming signal will be generated by a network hub unit. Each node should terminate their respective transmissions during a collision and generate a jamming signal for a predetermined period. The nodes then individually wait for a random time interval before seeking to retransmit. Token bus and ring architectures mediate access to the network cabling by passing an abstraction known as a token between nodes. A node must wait until it receives the token before it may transmit. If the node receives the token but does not wish to transmit or once it has finished its transmission, it simply passes the token to the next node, by signaling that node. Under this system, collisions should never occur. Thus, there is no requirement that the nodes listen during their transmissions as required by CSMA/CD. Different protocols can be used in networks that have larger physical extent such as metropolitan area networks (MANs) and wide area networks (WANs). MAN protocols tend to be similar to the LAN protocols. WANs typically have comparatively low data rates. Also, lower reliability increases the need for more error checking. WAN protocols are selected to compensate for these differences. Other technologies are also emerging. Asynchronous transfer mode, more commonly known as ATM, is specially designed for inter-network communications. It relies on fixed sized packets which makes the protocol suboptimal for most, but compatible with virtually all, applications, but this compromise increases the speed at which the packets can be routed. Optical fiber based systems are becoming more common such as the fiber distributed data interface (FDDI). In each protocol, the nodes must comply with the relevant rules that dictate the timing of transmissions to fairly allocate access to the network's transmission bandwidth. Proper operation also dictates the format for the transmitted data. Packets must usually include a preamble to synchronize data decoding, comply with an error detection/correction scheme, and meet requirements for maximum and minimum lengths. There are a few techniques or devices that enable a network administrator to detect the violation of these rules, enabling diagnosis and location of the problems in the networks. Protocol analyzers and remote monitoring (RMon) probes are commercially available devices that decode properly formatted digital transmissions on LANs, or similar networks. The devices function as passive network nodes that acquire packets and detect the cable voltages that are indicative of collisions. The origin, destination, and number of packets can be determined by reference to the packet's headers and bandwidth utilization statistics accumulated for analysis. The number and frequency of collisions can also be monitored. FIG. 1 illustrates the architecture for the network interface portion 1410 of a protocol analyzer or RMon probe, which incidently is similar to any other network interface chip for a node in a CSMA/CD-type network. The interface comprises a phase-locked loop 1420 that uses each packet's preamble to synchronize to the source node. A decoder 1430 then extracts the destination address DA, source address SA, and data from the packet and performs error checking in response to a cyclic redundancy check CRC data contained in the frame check sequence (FCS) to ensure the packet 1440 is valid. On the assumption that it is, the decoder 1430 sends out only the destination address DA, source address SA, and data on the output line 1450 . Simultaneously, a d.c. voltage threshold detector 1460 monitors the average voltage on the input line. In the example of 10Base(2) and (5), it will indicate a collision if the magnitude of the input voltage is more negative than −1.6 Volts. This occurs because the simultaneous transmission from two or more sources are additive on the network cable. When a collision is detected, the threshold detector generates the signal on a collision sense line 1470 and also disables the decoder 1430 . Two packets 1440 and a noise signal 1480 represent successive inputs to the network interface 1410 . The analyzer can only interpret properly formatted packets, however. Noise 1480 is not detectable by the device. Moreover, if the noise exceeds the −1.6 Volt threshold of the detector 1460 , the network interface 1410 may actually indicate the presence of a collision, but the source will not have been from typical network traffic. In many cases, the protocol analyzers or RMon probes will not properly capture even valid packets on the network. If the gap between packets is less than 9.6 microseconds known as the inter-frame gap (IFG), the chip will usually miss the second in-time packet. Further, transmissions experiencing excessive attenuation or originating from a bad transmitter can result in collisions that are below the collision threshold. As a result, the analyzer will still attempt to decode the transmissions since the decoder will not be disabled. These devices can also saturate when a series of packet transmissions occur in quick succession. Some of the shortcomings in the protocol analyzer and RMon probes are compensated by techniques that enable the analog analysis of the network transmission media. The most common one is called time domain reflectometry (TDR). According to this technique, a pulse of a known shape is injected into the cabling of the network. As the pulse propagates down the cable and hits electrical “obstacles,” or changes in the cable's characteristic impedance, an echo is generated that travels back to the point of injection. The existence of the echo can indicate cable breaks, frayed cables, bad taps, loose connections or poorly matched terminations. The time interval between the initial transmission of the pulse and the receipt of the echo is a function of a distance to the source of the echo. In fact, by carefully timing this interval, the source of the echo can be located with surprising accuracy. TDR analysis is typically used by installers to ensure that the newly laid wiring does not have any gross faults. The TDR signal is injected into the wiring while the network is non-operational to validate the transmission media. If a network is already installed, the network is first turned off so that TDR analysis can be performed. In a star topology network, the manager will typically check each link between the hub and host, marking any suspect wires. In bus topologies, the TDR signal is generated on the main trunk. In either case, reflections indicate breaks or defects in the network cables.
<SOH> SUMMARY OF THE INVENTION <EOH>The shortcomings in the protocol analyzers and RMon probes surround the fact that they operate on the assumption that the physical layer, hardware and media, are operational. They attempt to decode the voltages transitions on the network cabling as data and sense collisions based upon the voltages relative to some preset thresholds, as in any other network card. The operation of the analyzers impacts the available information, and thus limits their ability to accurately diagnose many of the problems that may afflict the network. Network cards, usually in nodes such as workstations or personal computers, may have been improperly manufactured, begin to degrade or become damaged. For example, one of the nodes on a network could have a defective driver in its output stage that transiently prevents it from driving the network cabling with sufficient power. The protocol analyzer or RMon probe would attempt to decode the packets from this node. If its phase-locked loop, however, can not lock on to the transmission, the analyzer will not recognize the attempt at transmission. If the analyzer can lock but the packet is invalid, the analyzer may label the packet as containing an error checking problem but will otherwise simply discard the packet without further analysis. Thus, the analyzer would provide no direct indication of the problems. A packet can be undecodable for a number of other reasons such as improper formatting at the transmitter, failure to detect a collision or a defect in the cabling, to list a few possibilities. Interference is another problem. Elevators and fluorescent lights are common sources of network noise. This can corrupt otherwise valid packets or cause network devices to interpret the noise as communications or collisions. Moreover, 60 Hertz power frequencies can leak on the cabling, which can also confuse the decision structures in the network cards. Crosstalk with other communications networks can also occur. These problems are invisible to the analyzers. Depending upon the particularities of the problems, the effect on the network can be nonexistent to catastrophic. The cards may simply generate bad packets or noise, which will be unrecognizable by the rest of the network but consume bandwidth. The performance impact can be high. A 1% loss of packets can lead to an 80% loss in bandwidth in some situations since the source node will attempt to retransmit until an “acknowledge” is received. Network cards have also been know to “jabber,” or continuously transmit. This will cripple the network by blocking other nodes from transmitting. TDR techniques can provide some information concerning cabling problems. However, TDR typically can only be used when the network is not operating. An isolated TDR pulse on the network can cause the nodes to behave unpredictably. This limits its usefulness to testing cabling after initial installation but before operation. In light of these problems, the present invention is directed to a network diagnostic device that samples the voltages on the cabling of the network by analog-to-digital (A/D) conversion, but preferably does so at a higher rate and with greater resolution then is required to minimally detect digital transitions on the cabling. This A/D sampling provides information on the analog characteristics of digital and noise signals on the network. As a result, the reasons why a particular packet may be illegal, either because of a subthreshold voltage transition or transient noise, for example, can be determined. Also, the nature of any network noise, crosstalk or interference can be identified and distinguished from legal and illegal transmissions. Further, node transmitters that cause improperly timed transmissions or fail to correctly detect or respond to collisions can be located. Defective cabling can also be identified. In short, the present invention provides the network manager or technician with a greater spectrum of information than would be available through typical digital decoding or TDR techniques. Even proactive maintenance is possible, allowing the network manager to predict rather than react to a failure mode. In general, according to one aspect, the invention features a network analysis device for a digital data network. The device comprises a digitizer which digitally samples analog characteristics of signal events on the network and a system processor which downloads data of the sampled signal events from the digitizer, and which analyzes the signal events. In specific embodiments, the system processor classified the signal events as network communications or noise based upon parametric analysis of each event. The processor calculates certain parameters related to the voltage and frequency characteristics of the event and compares the parameters to ranges that are characteristic of different event classifications. The analysis can also include determining whether network communications are within frequency and voltage specifications for the In specific embodiments, the system processor classifies the signal events as network communications or noise based upon parametric analysis of each event. The processor calculates certain parameters related to the voltage and frequency characteristics of the event and compares the parameters to ranges that are characteristic of different event classifications. The analysis can also include determining whether network communications are within frequency and voltage specifications for the network. The communications can also be Manchester and packet decoded by the system processor based upon the data. In other specific embodiments, the network analysis device comprises an attachment unit for connecting the digitizer to the network. Typically, the unit comprises receivers which detect signals on the network and drivers which generate signals on the network. When the network has star topology, the unit comprises plural receivers which detect signals transmitted over separate links of the network and a summing circuit which combines the signals from each of the links on a channel of the digitizer. This summing, however, usually requires that asynchronous events, such as link pulses, on the links be eliminated. Thus, the unit also preferably comprises a link pulse elimination circuit which eliminates link pulses from the combined signal received by the digitizer. The attachment unit may have other features. A selector circuit can be provided which individually enable the receivers to provide the detected signals to the summing circuit. Tagging circuits are also useful to generate a signal that identifies the link from which a sampled signal event originated for the system processor. The tagging signal can be combined with the signal events prior to the sampling by the digitizer or stored in a buffer and correlated to the sampled signal events by the system processor. The invention is also capable of performing TDR analysis on a functioning network. This is accomplished by placing a TDR signal on the network, surrounded by a pseudo-packet transmission. The pseudo-packet can be configured to have a source and destination address of a diagnostic packet and thus be transparent so that the network nodes to ignore the transmission. Accordingly in other embodiments, the network analysis device further comprises a signal generator which generates a predetermined signal for transmission over the network. The digitizer is then configured to sample the response of the network to the predetermined signal. System processor determines the signal transmission characteristics of the network from the response of the network to the predetermined signal. Preferably, the signal generator generates a packet-like transmission surrounding a voltage edge and the system processor extracts the response of the network to the edge. The packet-like transmission ensures that other network devices will not react to the signal. In general, according to another aspect, the invention can also be characterized in the context of a method for monitoring the operation of a network. This method comprises digitally sampling analog characteristics of signal events on the network with a digitizer. The data arrays of the signal events are then downloaded to a system processor, which analyzes the data arrays to identify the signal events. The processor is then able to determine physical level characteristics of the network based upon the analysis. In specific embodiments, the processor implements an event finder by comparing successive samples from the data arrays to thresholds and declaring the beginnings of events if the thresholds are satisfied. The ends of events are declared when the thresholds are no longer satisfied. The processor then records start times and stop times for the signal events. Once found, parameters are calculated for the signal events from the data arrays including frequency and voltage characteristics, and the event are classified as transmissions from other network devices or interference by comparing the parameters to parameter ranges for event classifications. Collision are also determined along with start and stop times for colliders. This analysis allows the processor to locate network devices that improperly react to collisions with other network devices or are otherwise improperly operating. In general, according to this other aspect, the invention features a method for performing time domain reflectometry on an operational network. The method comprises generating a packet-like transmission on the network and embedding a TDR signal in the packet-like transmission. The response of the network to the TDR signal is then detected and analyzed to determine the signal transmission characteristics of the network. In specific embodiments, the packet-like transmission has source and destination addresses that are indicative of a broadcast diagnostic packet. The TDR signal is then embedded in a data payload portion of this packet. This TDR signal is preferably a step function that has a very fast rise time. In still other aspects, the invention concerns a method for Manchester decoding a digitally sampled network transmission. The process includes first comparing digital samples of the network transmission to a threshold and locating transitions in which successive digital samples change values relative to the threshold. The time periods between successive transitions are compared to a minimum bit period, which is preferably derived from a measure frequency of the transmission. Only transitions that are greater than the minimum period from a prior transition are interpreted as transmitted data. In specific embodiments, the processor implements an event finder by comparing successive samples from the data arrays to thresholds and declaring the beginnings of events if the thresholds are satisfied. The ends of events are declared when the thresholds are no longer satisfied. The processor then records start times and stop times for the signal events. Once found, parameters are calculated for the signal events from the data arrays including frequency and voltage characteristics, and the event are classified as transmissions from other network devices or interference by comparing the parameters to parameter ranges for event classifications. Collision are also determined along with start and stop times for colliders. This analysis allows the processor to locate network devices that improperly react to collisions with other network devices or are otherwise improperly operating. The analog characteristics include parameter such as: Midpoint: min, max, mean, quantity; Preamble Frequency: min, max, mean, sdev; Event High Frequency: min, max, mean, sdev; Event Low Frequency: min, max, mean, sdev; Maximum Voltage Distribution: min, max, mean, sdev; Minimum Voltage Distribution: min, max, mean, sdev; Peak to Peak Distribution: min, max, mean, sdev; Rise Time Mean: min, max, mean, sdev; Fall Time Mean: min, max, mean, sdev; Overshoot: min, max, mean, sdev; Undershoot: min, max, mean, sdev; First Bit peak-to-peak Voltage; First Bit Min Voltage; First Bit Max Voltage; First Bit Width Voltage; First Bit Rise Time; First Bit Fall Time; Jitter: min, max, mean, sdev. In another aspect, the invention also concerns a method for identifying sources of transmissions on a network. This is referred to signature matching. The process involves calculating a plurality of analog parameters for transmissions from known sources. The parameters are also calculated for a transmission from an unknown source. The unknown source can then be identified based upon the degree to which the parameters match parameters from the known sources. In anther aspect, the invention also concerns a method for identifying sources of transmissions on a network. This is referred to signature matching. The process involves calculating a plurality of parameters for transmissions from known sources. The parameters are also calculated for a transmission from an unknown source. The unknown source can then be identified based upon the degree to which the parameters match parameters from the known sources. Examples of the parameters include any combination of the following: Midpoint: min, max, mean, quantity; Preamble Frequency: min, max, mean, sdev; Event High Frequency: min, max, mean, sdev; Event Low Frequency: min, max, mean, sdev; Maximum Voltage Distribution: min, max, mean, sdev; Minimum Voltage Distribution: min, max, mean, sdev; Peak to Peak Distribution: min, max, mean, sdev; Rise Time Mean: min, max, mean, sdev; Fall Time Mean: min, max, mean, sdev; Overshoot: min, max, mean, sdev; Undershoot: min, max, mean, sdev; First Bit Max Voltage; First Bit Width Voltage; First Bit Rise Time; First Bit Fall Time; Jitter: min, max, mean, sdev. The above and other features of the invention including various novel details of construction and combinations of parts, and other advantages, will now be more particularly described with reference to the accompanying drawings and pointed out in the claims. It will be understood that the particular method and device embodying the invention is shown by way of illustration and not as a imitation of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention.
20040311
20080422
20050317
87002.0
0
NGUYEN, STEVEN H D
PACKET NETWORK MONITORING DEVICE
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,798,074
ACCEPTED
Enforcing computer security utilizing an adaptive lattice mechanism
Method and apparatus for ensuring secure access to a computer system (1000). The method can begin with the step of receiving in the computer system a request from an entity (using 1002). The entity can have a predetermined access authorization level for access to a first base node (110) representing an information type (102) or a computer system function (104). The system determines if the access request completes a prohibited temporal access pattern for the entity. The system also compares a minimum access level established for the first base node to the predetermined access authorization level assigned to the entity. Thereafter, the system can grant the access request only if the minimum access level for the first base node does not exceed to the predetermined access authorization level.
1. A method for secure access to a computer system, comprising the steps of: receiving in said computer system a request from an entity with a predetermined access level for access to a first base node representing at least one of an information type and a computer system function; determining if said access request completes a prohibited temporal access pattern for said entity; and comparing a minimum access level established for said first base node to said predetermined access level; and granting said access request only if it does not complete a prohibited temporal access pattern for said entity, and said minimum access level for said first base node does not exceed said predetermined access level. 2. The method according to claim 1, further comprising the step of denying said request if said access request completes a prohibited temporal access pattern for said entity. 3. The method according to claim 1, further comprising the step of denying said request if said minimum access level for said first base node exceeds said predetermined access level for said entity. 4. The method according to claim 1, further comprising the steps of: logically organizing said computer system in the form of a tree hierarchy having a plurality of leaf nodes and higher-level nodes; defining a plurality of said base nodes as comprising respectively a plurality of leaf nodes of said tree hierarchy; and defining said higher-level nodes as aggregations of said base nodes. 5. The method according to claim 4 further comprising the step of identifying within said hierarchy any higher-level nodes that are aggregations comprising said first base node. 6. The method according to claim 5, further comprising the step of identifying within said hierarchy any nodes that comprise children of any generation of said higher-level nodes that are aggregations comprising said first base node. 7. The method according to claim 6, further comprising the step of updating a minimum required entity access level for any base nodes that comprise children of any generation of said higher-level nodes that are aggregations comprising said first base node. 8. The method according to claim 7, wherein said updating step further comprises the steps of: comparing said entity's predetermined access level against the minimum required access level of said higher-level nodes that are aggregations comprising said first base node; and updating a minimum required access level of any said base node that is also a member of any aggregation comprising said first base node if a minimum required access level for said higher-level node comprising said aggregation has a required access level that is higher than said entity's predetermined access level. 9. The method according to claim 1, further comprising the steps of: comparing said entity's predetermined access level against the minimum required access level of at least one higher-level node that is an aggregation of base nodes including said first base node; and updating a minimum required access level of any said base node that is also a member of any aggregation comprising said first base node if a minimum required access level for said higher-level node comprising said aggregation has a required access level that is higher than said entity's predetermined access level. 10. A method for restricting access to a computer system having a plurality of logical base nodes representing at least one of an information type and a computer system function, and a plurality of higher-level nodes arranged together with said base nodes in the form of a tree hierarchy, comprising the steps of: receiving in said computer system a request from an entity with a predetermined access level for access to a first base node; determining if said access request completes a prohibited temporal access pattern for said entity; and comparing a minimum access level established for said first base node to said predetermined access level; and granting said access request only if it does not complete a prohibited temporal access pattern for said entity, and said minimum access level for said first base node does not exceed said predetermined access level. 11. A secure computer system comprising: a plurality of logical base nodes representing at least one of an information type and a computer system function; a plurality of higher-level nodes arranged together with said base nodes in the form of a tree hierarchy; a computer system interface capable of receiving a request from an entity with a predetermined access level for access to a first base node; a temporal access table; processing means programmed for comparing said access request to said temporal access table to determine if said access request completes a prohibited temporal access pattern for said entity, and for comparing a minimum access level established for said first base node to said predetermined access level; and wherein said processing means grants said access request only if it does not complete a prohibited temporal access pattern for said entity, and said minimum access level for said first base node does not exceed said predetermined access level. 12. The secure computer system according to claim 11, wherein said processing means denies said request if said access request completes a prohibited temporal access pattern for said entity. 13. The secure computer system according to claim 11, wherein said processing means denies said request if said minimum access level for said first base node exceeds said predetermined access level for said entity. 14. The secure computer system according to claim 11 wherein said higher-level nodes are aggregations of said base nodes. 15. The secure computer system according to claim 14 wherein said processing means identifies within said hierarchy any higher-level nodes that are aggregations comprising said first base node. 16. The secure computer system according to claim 15 wherein said computer processing means identifies within said hierarchy any nodes that comprise children of any generation of said higher-level nodes that are aggregations comprising said first base node. 17. The secure computer system according to claim 16 wherein said processing means updates a minimum required entity access level for any base nodes that comprise children of any generation of said higher-level nodes that are aggregations comprising said first base node. 18. The secure computer system according to claim 17 wherein said processing means compares said entity's predetermined access level against the minimum required access level of said higher-level nodes that are aggregations comprising said first base node; and automatically updates a minimum required access level of any said base node that is also a member of any aggregation comprising said first base node if a minimum required access level for said higher-level node comprising said aggregation has a required access level that is higher than said entity's predetermined access level. 19. The secure computer system according to claim 11 wherein said processing means compares said entity's predetermined access level against the minimum required access level of at least one higher-level node that is an aggregation of base nodes including said first base node; and updates a minimum required access level of any said base node that is also a member of any aggregation comprising said first base node if a minimum required access level for said higher-level node comprising said aggregation has a required access level that is higher than said entity's predetermined access level.
BACKGROUND OF THE INVENTION 1. Statement of the Technical Field The inventive arrangements relate generally to computer and information security and more particularly to security measures that enforce security based on logical implementation methods. 2. Description of the Related Art Control of access to information and computer system resources is a continuing problem for system, database, and network administrators across the government, military, and private industry. Providing system security in such multi-user environments requires a balance between permitting access to resources necessary to perform the business functions for the enterprise and limiting access. Current security methods fall within two basic categories. These include physical and logical implementation methods. Methods for implementing logical security safeguards typically provide access based on a user/group/role identifier and an access control list for the file, database, or system function to be accessed. However, there are a number of serious limitations to such an approach, primarily because control over information access is limited to a simple relational comparison. Significantly, such systems do not enforce security based on patterns of behavior, aggregation of data, or information clustering. Further, conventional systems make use of simple point tests which do not support the ability to look at temporal patterns of access. For example, U.S. Pat. No. 6,453,418 to Ooki et al. concerns a method for accessing information. The invention addresses some aspects of accessing portions of information based on user access authority. However, the invention makes no use of access patterns or temporal activities to control access. U.S. Pat. No. 6,446,077 to Straube et al. concerns an inherited information propagator for objects. The invention utilizes an inheritance graph to propagate changes in security descriptors to affected objects. The invention focuses on the propagation of security tagging but does not address the process of enforcing the security policy and does not mention aggregation or temporal patterns. U.S. Pat. No. 6,334,121 to Primeaux et al. concerns a usage pattern based user authenticator. The system utilizes a neural network and a set of rules to track usage patterns and flag suspicious activities. This patent focuses on flagging suspicious activity but does not address enforcement of a security policy based on such flagging. SUMMARY OF THE INVENTION The invention concerns a method for ensuring secure access to a computer system. The method can involve several steps. The method can begin with the step of receiving in the computer system a request from an entity. The entity can be a user or a process and can have a predetermined access authorization level for access to a first base node representing an information type or a computer system function. The computer system determine if the access request completes a prohibited temporal access pattern for the entity. If so, the request is rejected. Otherwise, the system can compare a minimum access level established for the first base node to the predetermined access authorization level assigned to the entity. Thereafter, the system can grant the access request only if the minimum access level for the first base node does not exceed to the predetermined access authorization level. The method can also include the step of denying the request if the minimum access level for the first base node exceeds the predetermined access authorization level assigned to the entity. The method can also include logically organizing the computer system in the form of a tree hierarchy having a plurality of leaf nodes and higher-level nodes. A plurality of the base nodes can be defined as comprising respectively a plurality of leaf nodes of the tree hierarchy. Higher-level nodes can be defined as aggregations of the base nodes. Further, the method can include the step of identifying within the hierarchy any higher-level nodes that are aggregations comprising the first base node. The method can also include identifying within the hierarchy any nodes that directly or indirectly comprise children of any of the higher-level nodes that are aggregations comprising the first base node. The minimum required entity access level can thereafter be updated for any base nodes that directly or indirectly comprise children of any of the higher-level nodes that are aggregations comprising the first base node. For example the updating step can include comparing the entity's predetermined access authorization level against the minimum required access level of the higher-level nodes that are aggregations comprising the first base node. Thereafter, a minimum required access level of any the base node that is also a member of any aggregation comprising the first base node can be updated if a minimum required access level for the higher-level node comprising the aggregation has a required access level that is higher than the entity's predetermined access level. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a representation of data primitives and hierarchical graph that is useful for understanding the invention. FIG. 2A is an example of a partially ordered set with transitive closure table. FIG. 3 is an example of a temporal order table. FIG. 4A is an example of a process/user access table. FIG. 5 is an example of a combinatorial classification table. FIG. 6 is a flowchart that is useful for understanding the invention. FIG. 7 is a flowchart that is useful for understanding the invention. FIGS. 8A-8E show a series of tables that are useful for understanding how the inventive process can operate in one example. FIGS. 9A-9J show a series of tables that are useful for understanding how the inventive process can operate in a second example. FIG. 10 is a drawing of a computer system that is useful for understanding the implementation of the inventive arrangements. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The invention concerns a method and system for using an adaptive lattice mechanism to enforce computer security. Data and function access security levels form an initial basis for controlling access. These security access primitives can be organized within a partially ordered set (POSET) so as to define a hierarchical, directed graph. The security access primitives can form base nodes in the hierarchical, directed graph. Higher level nodes within the graph represent information aggregation sets and/or temporal patterns of access. Each of the nodes within the graph can have an associated security level representing the mandatory security level for the particular aggregation or pattern. Access authorities are maintained dynamically for each user/process, thereby allowing system objects to have multiple levels of access classification based on historical access by each user. Referring now to FIG. 1, a secure computer system can comprise a plurality of object types 1021-1024 and system functions 1041-1043. The object types can include one or more information types A, B, C, D. Instantiations 106 of object types can include multiple type instances 108 as illustrated. Further, each object type can have a minimum required security access level associated therewith. In FIG. 1, the minimum required security access level for each object type 1021-1024 is represented in parenthesis along with the letter identifying the information type. For example, object 1024 in FIG. 1 is labeled as “D(2)”. The number 2 in parenthesis indicates that information type D has a minimum required security access level of two. Any process or user requesting to access any instantiation of object type D must have a security access level greater than or equal to two. Similarly, access to object 1022, which is shown as B(1), requires a security access level of one or higher. The system functions 1041-1043 represent functions which can be accessed by a process or user. In FIG. 1, the functions are shown as including directory (dir), execute (exec), and delete (del). However, it should be understood that these are merely intended as some examples of computer system functions, and the invention is not limited to any particular type of computer system function. Similar to the notation described above with respect to object types 1021-1024, each system function 1041-1043 in FIG. 1 is followed by a number in parenthesis. The number represents a minimum security access level required for any process or user to access that particular function. Thus, for example, the “exec” system function labeled exec(2) requires that a process or user possess a security level of at least two in order to access that function. The various object types 1021-1024 and system functions 1041-1043 can be represented in a hierarchical tree graph as shown in FIG. 1. According to one aspect of the invention, the various object types and system functions can be defined as a plurality of leaf or base nodes 110 in the hierarchical tree 100. Further, higher-level nodes 112 can be constructed to represent aggregations of base nodes 110. As illustrated in FIG. 1, higher-level nodes 112 can include aggregations of base nodes 110, as well as higher order aggregations, i.e. aggregations of previously constructed aggregations. According to one embodiment of the invention, the hierarchical directed graph of FIG. 1 can be implemented by organizing the object types 1021-1024 and system functions 1041-1043 within a partially ordered set (POSET). A POSET defines relationships that exist between pairs of elements, e.g. x→R→y within a set of elements. Within the set of elements, there exists pairs of elements, e.g. m and n, for which no relation R exists. Thus, the set is partially ordered. Consequently, POSETs may have multiple root and leaf nodes in contrast to a tree structure which has a single root node and multiple leaf nodes. Because of the multiplicity of root nodes representing information access and operational functions for which the security operations are to be enforced, the POSET is used to represent the multiplicity of security relationships. FIG. 2A is an example of such a POSET 200 with a transitive closure table 202 that can be produced for the hierarchical tree 100 in FIG. 1. Referring again to FIG. 1, it can be seen that relationships can be asserted for temporal access patterns. In this figure the curved arrows labeled T1 denote a temporal ordering between the accesses defined by items 1141 and 1142. Thus, for item 1142, a temporal order is asserted between items 104, and 1042, e.g. 1041→1042. Thus, node d(3) not only identifies an aggregation of the primitive functions denoted by 1041 and 1042 but also specifies that an explicit temporal ordering exists in that 1041 is accessed before 1042. So, for the security policy associated with item 1142 to be activated, not only must both 1041 and 1042 be accessed but they must be accessed in the order indicated by the temporal relationship. In addition to specifying a temporal order of access activities for a single node, temporal relations may be subsumed within other nodes through aggregation. This is illustrated by item 1141 in FIG. 1. Item 1141 has three access items associated with the node, item 1024, 1142, and 1043. As shown on the diagram, a temporal ordering has been identified that specifies 1024→1142→1043. However, item 1142 is an aggregation of access operations. Thus the operations identified by item 1142 become subsumed into the overall temporal ordering of item 1141 and the full temporal order is 1024→1041→104 2→1043, where item 1142 in the original temporal order has been replaced by its constituent parts, 1041→1042. FIG. 3 is the Temporal Order Table (TOT) that captures the above relationships. The TOT is useful for capturing the relative temporal order of actions and allows relative or approximate temporal pattern matching to identify hostile actions. So, for access to node d, item 1142, the table shows that first the dir operation, item 1041, is performed, followed by the exec operation, item 1042. This ordering is shown in the row labeled “d” with a numerical ordering of the accesses listed in the columns. FIG. 3 further shows that for node e, item 1141, the initial access is a data class D, item 1024, followed by the constituent elements of node d, item 1142, which is the dir, item 1041, and exec, item 1042, operations. In this case the row labeled “e” stores the order of the accesses using numerical values. In the case of row “e”, the inclusion of the access ordering associated with node d, item 1142 is shown as 2.1 and 2.2 representing the fact that both accesses are grouped as the second item in the temporal ordering for node e, item 1141, and that the order for these grouped items is denoted by the second number after the 2. Referring now to FIG. 4A, there is shown an example of a Process/User Access Table (PUAT) that can be used in the present invention. The PUAT is a table of access authority that shows the minimum security level that each particular process or user is required to have in order to access the object type 102 or system function 104 in FIG. 1. For example, FIG. 3 shows that users 1-5 can be required (at least initially) to possess a security access level of at least one (1) to access information type B. Since users 1-5 in FIG. 4A all have a security access level of at least one (1), this means that all users can, at least initially, access information type B. Significantly, however, the PUAT is a dynamic table in which the minimum security level required for a particular process or user to access a particular object type 102 or system function 104 can be changed depending on access history and/or identified temporal patterns. In this way, access authorities are maintained dynamically for each user allowing system objects to have multiple levels of access classification based on historical access by a particular process or user. The transitive closure table of the complete set of access operations and aggregate nodes is illustrated in FIG. 2A. The transitive closure table is obtained by adding a row and column for each of the aggregate nodes to the table of primitive actions. This yields an n-by-n table where the number of columns and rows are equal and the number of rows and columns is equal to the sum of the number primitive operations and number of aggregation nodes. A subset, item 202, of the transitive closure table of the POSET of FIG. 2A is then used to produce a combinatorial classification table (CCT) which is illustrated in FIG. 5. The CCT is obtained by taking the subset of the transitive closure table, item 202, corresponding to the set of aggregations shown in the columns and the primitive operations shown in the rows. This subset identifies the dependencies between the primitive access operations and the aggregations to which they are associated. This subset of the transitive closure, item 202, is then flipped about its diagonal axis yielding the aggregation items, a through e as the rows and the primitive access operations as the columns, as shown in FIG. 2B. Finally, each row is inspected and for each column containing a 1 entry, the number 1 is replaced with the security access level associated with the aggregation. This yields the final CCT as illustrated in FIG. 5. A flowchart that is useful for understanding the invention is shown in FIGS. 6 and 7. As illustrated therein, the process can begin in step 602 of FIG. 6 by monitoring requests from computer system users and/or processes. Messages are tested in step 604 to determine if they comprise requests to access an information type or system function. If so, then the system continues on to step 606 to determine if the request completes a temporal access pattern for the particular user. If the request does complete a temporal access pattern, this means that the sequence of operations performed matches an identified pattern and is subject to the security access level specified for the that temporal order. If a temporal pattern is completed, the user's access level is compared to the access level required for the requested access action, illustrated in step 607. Note that the temporal ordering of primitive access operations mandates that the operations occur in the order specified for the security policy to be enforced. Thus, in FIG. 1, if 1042 is accessed first followed by item 1041, the security policy associated with node d, item 1142, will not be activated because the temporal order was not satisfied. If the access level of the user is not sufficient for the requested action, then the request is rejected in step 608. If the request does not complete a temporal access pattern for the particular user or the user's access level is sufficient for the temporal pattern completed, then the system continues on to step 610 and logs the request in the Temporal Access Table (TAT). As shown in FIG. 4B, the Temporal Access Table maintains a history of the primitive operations performed by a user. As a user is granted authorization to perform a primitive access operation, the operation is time-stamped and stored within the TAT. The time stamps are compared against the temporal patterns identified in the Temporal Order Table, FIG. 3, to check for matches. Thus, in FIG. 4B user 1 performed a dir operation at time 102 and then requested an exec operation at time 112. Since 112 is after 102, this request would trigger a match in the Temporal Order Table for node d, item 1142 in FIG. 1, and the request would be denied. However, in the case of user 3, the exec operation was performed at time 103 followed by the dir operation at time 111. This pair does not match the defined temporal order and the operations are permitted. In step 612, the computer system makes a determination as to whether the security access level of the user making the request is less than the current minimum required security access level for the specified information type. This determination can be completed by reference to the table in FIG. 4A. If the user does not have authorization for at least the current minimum required security access level, then the request is rejected. Alternatively, if the user does have a sufficiently high security access level then the request is granted in step 616. Aggregation nodes 112 are comprised of two or more nodes which may be base nodes 110, other aggregation nodes 112, or a combination of both base and aggregation nodes. Accordingly, such aggregation nodes will often have a higher minimum required security level for permitting access as compared to security levels required for access to participant information types and/or system functions that comprise base nodes 110. This is true because aggregated data is often of a more sensitive nature since it provides greater context and can identify relationships between the various individual information types. Consequently aggregated information will inevitably be of greater interest to unauthorized users and system administrators will naturally wish to impose higher level restrictions on its access. Still, it will be appreciated that access to all of the information types or system functions associated with base nodes 110 that are participants in a particular aggregation node is, in many instances, tantamount to directly accessing the aggregation node. Accordingly, it can be desirable to increase a security authorization level necessary for a particular user or process to access certain information types once the user or process has accessed certain other information types. For example, this may be true in those instances where both of the data types are participants in a common aggregation node. In such instances, it can be desirable to increase the required security authorization level for a particular user to access a base node to be at least equal to the security authorization level of an aggregation node to which the base node is a participant. Accordingly, the process can continue in step 702 of FIG. 7 by identifying all higher-level aggregation nodes 112 in which the base node containing the requested information type is a participant. In step 704 the computer system can determine if the minimum required security level for access to identified aggregation nodes is greater than the particular user's authorized security access level. If so, then in step 706 the computer system can identify all base nodes that are also participants in that particular aggregation node. This can be accomplished, for example, by following all paths from the identified aggregation nodes back to all of their corresponding base nodes. Once so identified, the minimum required security level for accessing base nodes of the information type that has been already accessed remains the same. However, the minimum required security level for the user to access the other participant base nodes (i.e., other than the originally requested base node) can be updated in step 708. For example, the required minimum security level to access a participant base node can be increased for a particular user to match the minimum required security level for accessing an aggregation node in which the participant base node is a participant. The invention can be better understood by considering the following examples which are illustrative of the process. EXAMPLE 1 Referring to FIGS. 1 and 8, consider the case in which access authorization for users 1-5 is established in accordance with PUAT in FIG. 8A. User 2 with access level 1, U2(1) can request access to an object 1021 of information type A as previously described in relation to step 604. In accordance with step 606, the system consults the TOT (Temporal Order Table) in FIG. 8B and determined that the access request time does not complete a temporal access pattern. Subsequently, the request is logged in the (Temporal Access Table) as provided in step 610. In accordance with step 612 the request is tested to determine if user 2 has a sufficiently high level of access authorization. In this case U2(1)≧A(0) and therefore access is granted to the requested information type A in accordance with step 616. Thereafter, in step 702 the computer system can identify aggregations with object A using the CCT (Combinatorial Classification Table) in FIG. 8C. In step 704, the system checks to determine if the minimum required security level for accessing the aggregation node 1121 of type “a” is greater than the user's authorized security access level. In this case, the condition is satisfied since the user's authorized security access level is 1 and the minimum required level to access aggregation node 1121 of type “a” is equal to 2. Accordingly, the system continues to step 706 and identifies any other base nodes 110 that are part of the aggregation node 1121 of type “a”. In this case, the system identifies information type B as being a participant in the aggregation of type “a”. Thereafter, in step 708 the PUAT in FIG. 8A is updated such that (1) the minimum security level required for accessing the originally requested base node 110 of information type “A” remains unchanged; and (2) the other participant of the aggregation node 1121 are updated so that their minimum required security level is increased to equal to the minimum required security level established for the aggregation node “a”. This can be expressed as follows: If PUAT(i)<CCT(i) then CCT(i)→PUAT(i). The result is an updated PUAT table as shown in FIG. 8D. The updated table in FIG. 8D shows that for the base node 110 of information type A the minimum security access level continues to be zero. The notation 0/1 for information type A in FIG. 8D indicates that the object has a zero security level and is the first one accessed by User 2. However, with regard to User 2, the minimum security level for accessing an object of information type B in the PUAT of FIG. 8D has been increased to level 2. Subsequently, if User 2 with access level 1, U2(1) requests access to an object 1022 of information type B the system will determine in step 606 that the access request time does not complete a temporal access pattern. This is accomplished by comparing the access time to the TOT in FIG. 8E. The TOT is unchanged from its earlier state in FIG. 8B and therefore the request does not get rejected in step 606. However, in step 612, a check of the updated PUAT of FIG. 8D reveals that the minimum security level required for user 2 to access information of type B is now set to level 2. Accordingly, the request is rejected in step 614. This can be expressed as U2(1)-≧A(2) therefore deny access. EXAMPLE 2 Referring to FIGS. 1 and 9, consider the case in which access authorization for users 1-5 is established in accordance with PUAT in FIG. 9A. User 3 with access level 2, U3(2) can request access to an object 102, of information type A as previously described in relation to step 604. In accordance with step 606, the system consults the TOT (Temporal Order Table) in FIG. 9B and determined that the access request time does not complete a temporal access pattern. Subsequently, the request is logged as provided in step 610. In accordance with step 612 the request is tested to determine if User 3 has a sufficiently high level of access authorization. In this case U3(2)>A(0) and therefore access is granted to the requested object 102, in accordance with step 616. Thereafter, in step 702 the computer system can identify aggregations with object A using the CCT (Combinatorial Classification Table) in FIG. 9C. In step 704, the system checks to determine if the minimum required security level for accessing the aggregation node 1121 of type “a” is greater than the authorized security access level of user 3. In this case, the condition is not satisfied since the user's authorized security access level is 2 and the minimum required level to access aggregation node 1121 (i.e., type “a”) is equal to 2. Accordingly, the system concludes that the user has an adequate security access level and continues to step 706 where it identifies any other base nodes 110 that are part of the aggregation node 1121. In this case, the system identifies 1022 (information type B) as being a participant in the aggregation. Thereafter, in step 708 the PUAT in FIG. 9A is updated such that (1) the minimum security level required for accessing the originally requested base node 110 (information type “A”) remains unchanged; and (2) the other participant of the aggregation node 1121 of type “a” are updated so that their minimum required security level is increased to equal to the minimum required security level established for the aggregation node 1121 of type “a”. This can be expressed as follows: If PUAT(i)<CCT(i) then CCT(i)→PUAT(i). The result is an updated PUAT table as shown in FIG. 9D. The updated table in FIG. 9D shows that for the base node 102, of information type A the minimum security access level continues to be zero for User 3. The notation 0/1 for information type A in FIG. 9D indicates that the object has a zero security level and was the first information type accessed by User 3. However, the minimum security level for accessing an object 1022 of information type B in the PUAT of FIG. 9D has been increased to level 2. Subsequently, if User 3 with access level 2, U3(2) requests access to an object 1024 of information type D, the computer system will determine in step 606 that the access request time does not complete a temporal access pattern. This is accomplished by comparing the access time to the TOT in FIG. 9E. The TOT is unchanged from its earlier state in FIG. 9B and therefore the request does not get rejected in step 606. In step 612, a check of the updated PUAT of FIG. 9D reveals that the minimum security level required for user 3 to access information of type D is set (as it was initially) at level 2. Accordingly, the request is granted in step 616. This can be expressed as U3(2)≧D(2) therefore grant access. Thereafter, in step 702 the computer system can identify aggregations with the object of information type D using the CCT (Combinatorial Classification Table) in FIG. 9F. In this case node 1024 (information type D) is a participant in aggregation node 1122 of type “b”. In step 704, the system checks to determine if the minimum required security level for accessing the aggregation node 1122 is greater than the user's authorized security access level. In this case, the condition is satisfied since the user's authorized security access level is 2 and the minimum required level to access aggregation node 1122 of type “b” is equal to 3. Accordingly, the system continues to step 706 and identifies any other base nodes 110 that are part of the aggregation node 1122 of type “b”. In this case, the system identifies information types A and B (nodes 1021 and 1022) as being a participant in the aggregation of node 1122 of type “b”. Thereafter, in step 708 the PUAT in FIG. 9D is updated such that (1) the minimum security level required for accessing the originally requested base node 1024 of information type “D” remains unchanged; and (2) the other participant of the aggregation node 1122 of type “b” are updated so that their minimum required security level is increased to be equal to the minimum required security level established for the aggregation node 1122 of information type “b”. This can be expressed as follows: If PUAT(i)<CCT(i) then CCT(i)→PUAT(i). The result is an updated PUAT table as shown in FIG. 9G. The updated table in FIG. 9G shows that for the base node 1024 of information type D the minimum security access level continues to be two. The notation 2/2 for information type D in FIG. 9G indicates that the object 1024 has a security level of 2 and is the second one accessed by User 3. However, with regard to User 3, the minimum security level for accessing an object of information type B in the PUAT of FIG. 9G has been increased to level 3. Continuing with the foregoing example, User 3 with access level 2, U3(2) can request access to an object 1022 of information type B. As illustrated in FIG. 9H, the access request time does not complete a temporal access pattern (step 606). However, in step 612 a comparison is made of the security authorization level for User 3 to the minimum security level required for User 3 to access as specified by the PUAT in FIG. 9G. This test reveals that User 3 (security authorization level 2) does not have a sufficiently high security level to access information type B which now has a minimum required security of 3, at least with respect to requests by user 3. This can be expressed as U3(2)-≧B(3). Accordingly, the request for access is rejected in step 614. The inventive arrangements described herein can be used in conjunction with a wide variety of computer systems. These can include stand-alone computer systems, computer networks or client-server arrangements as shown in FIG. 10. The invention can be integrated within computer application software or implemented as an external component to existing software systems to provide modular accessibility. Further, the invention is not restricted to use with any particular type of software application or access request from any particular type of entity. Accordingly, to the extent that the invention has been described herein in terms of requests from users or processes, it will be understood by those skilled in the art that the techniques described herein can have much broader application. For example, the invention can be used to provide security for database access, to operating system calls, and/or to identifying hostile patterns of remote access which may be initiated by computer viruses and worms. Referring again to FIG. 10, it will be appreciated that the present invention can be realized in software in a centralized fashion in one computer system 1000, or in a distributed fashion where different elements are spread across several interconnected computer systems 1000, 1002. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical implementation can include a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention also can be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form. This invention can be embodied in other forms without departing from the spirit or essential attributes thereof. Accordingly, reference should be made to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Statement of the Technical Field The inventive arrangements relate generally to computer and information security and more particularly to security measures that enforce security based on logical implementation methods. 2. Description of the Related Art Control of access to information and computer system resources is a continuing problem for system, database, and network administrators across the government, military, and private industry. Providing system security in such multi-user environments requires a balance between permitting access to resources necessary to perform the business functions for the enterprise and limiting access. Current security methods fall within two basic categories. These include physical and logical implementation methods. Methods for implementing logical security safeguards typically provide access based on a user/group/role identifier and an access control list for the file, database, or system function to be accessed. However, there are a number of serious limitations to such an approach, primarily because control over information access is limited to a simple relational comparison. Significantly, such systems do not enforce security based on patterns of behavior, aggregation of data, or information clustering. Further, conventional systems make use of simple point tests which do not support the ability to look at temporal patterns of access. For example, U.S. Pat. No. 6,453,418 to Ooki et al. concerns a method for accessing information. The invention addresses some aspects of accessing portions of information based on user access authority. However, the invention makes no use of access patterns or temporal activities to control access. U.S. Pat. No. 6,446,077 to Straube et al. concerns an inherited information propagator for objects. The invention utilizes an inheritance graph to propagate changes in security descriptors to affected objects. The invention focuses on the propagation of security tagging but does not address the process of enforcing the security policy and does not mention aggregation or temporal patterns. U.S. Pat. No. 6,334,121 to Primeaux et al. concerns a usage pattern based user authenticator. The system utilizes a neural network and a set of rules to track usage patterns and flag suspicious activities. This patent focuses on flagging suspicious activity but does not address enforcement of a security policy based on such flagging.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention concerns a method for ensuring secure access to a computer system. The method can involve several steps. The method can begin with the step of receiving in the computer system a request from an entity. The entity can be a user or a process and can have a predetermined access authorization level for access to a first base node representing an information type or a computer system function. The computer system determine if the access request completes a prohibited temporal access pattern for the entity. If so, the request is rejected. Otherwise, the system can compare a minimum access level established for the first base node to the predetermined access authorization level assigned to the entity. Thereafter, the system can grant the access request only if the minimum access level for the first base node does not exceed to the predetermined access authorization level. The method can also include the step of denying the request if the minimum access level for the first base node exceeds the predetermined access authorization level assigned to the entity. The method can also include logically organizing the computer system in the form of a tree hierarchy having a plurality of leaf nodes and higher-level nodes. A plurality of the base nodes can be defined as comprising respectively a plurality of leaf nodes of the tree hierarchy. Higher-level nodes can be defined as aggregations of the base nodes. Further, the method can include the step of identifying within the hierarchy any higher-level nodes that are aggregations comprising the first base node. The method can also include identifying within the hierarchy any nodes that directly or indirectly comprise children of any of the higher-level nodes that are aggregations comprising the first base node. The minimum required entity access level can thereafter be updated for any base nodes that directly or indirectly comprise children of any of the higher-level nodes that are aggregations comprising the first base node. For example the updating step can include comparing the entity's predetermined access authorization level against the minimum required access level of the higher-level nodes that are aggregations comprising the first base node. Thereafter, a minimum required access level of any the base node that is also a member of any aggregation comprising the first base node can be updated if a minimum required access level for the higher-level node comprising the aggregation has a required access level that is higher than the entity's predetermined access level.
20040311
20071127
20050915
68430.0
2
SHAIFER HARRIMAN, DANT B
ENFORCING COMPUTER SECURITY UTILIZING AN ADAPTIVE LATTICE MECHANISM
UNDISCOUNTED
0
ACCEPTED
2,004
10,798,285
ACCEPTED
Dynamic web storefront technology
A computer implemented method of conducting commerce over the Internet wherein a customer uses a client machine to request a web page through the Internet and a web server receives the request and sends a web page in hypertext mark up language (HTML) format that presents the customer with a form. The customer then enters information regarding a transaction at a web store. The form is set up so that the form values, i.e., the name of each variable, implies a way to store the variable's data in a database located in a web server. The forms data is processed into extensible markup language (XML) objects. By using XML path information in the HTML form variable names, the server is able to convert the HTML input into XML objects. This methodology allows the addition of any input fields without having to modify the code or programs residing on the server to accommodate these changes.
1. A method of conducting commerce with a server over the Internet comprising: receiving a request for a web page from a consumer; transmitting the web page over the Internet from the server to the consumer; prompting for information from the consumer through the web page; assigning variables with variable names to the information; incorporating XML path information into the variable names; submitting the variables to the server; reading the information from the variables; placing the information in an XML type format based on the XML path information; and creating another web page for the consumer. 2. The method according to claim 1, wherein the variables are transmitted in a universal resource locator. 3. The method according to claim 2, wherein any extra information in the universal resource locator is ignored by the web server. 4. The method according to claim 1, wherein the variables are transmitted in hidden HTML form fields. 5. The method according to claim 1, wherein the variables are transmitted by cookies. 6. An apparatus for conducting commerce over the Internet comprising: a web server for producing a web page having variables therein that incorporate data said variables having variable names that incorporate XML path information; client software for displaying the web page; and a connection formed over the Internet for transmitting the web page from the server to the client software and the variables and variable names from the client software to the server, said server further including a database for storing the data in an XML type format based on the XML path information whereby said server creates another web page for the client software based on the data in the XML type format. 7. The apparatus according to claim 6, wherein the connection including means for transmitting the variables in a universal resource locator. 8. The apparatus according to claim 7, wherein the web server includes means for ignoring any information found in the universal resource locator other than the data and XML path information. 9. The apparatus according to claim 6, wherein the web page further includes hidden HTML form fields for transmitting the data and XML path information over the connection. 10. The apparatus according to claim 6, wherein the web page further includes cookies for transmitting the data and XML path information over the connection. 11. A method of conducting commerce over the Internet comprising the steps of: creating a first web page that presents a form for a customer to input information; assigning variables to information inputted by the customer, each variable having a name that indicates how the information is to be stored; transferring the variables to a central location; collecting the variables and storing the information in a database according to the name of each said variable; and creating a second web page based on the database and a template. 12. A software program residing on a web server that is easily adapted to many different types of Electronic commerce stores comprising: means for creating a web page readable by a web browser, said web page including a form for a customer to input information; means for assigning variables to the input information; and means for naming the variables based on how the variable information is to be stored in XML format.
BACKGROUND OF THE INVENTION 1. Field of the Invention In general, the present invention relates to the field of displaying web pages via the Internet and, more particularly, to a system that can easily store data related to the web pages in extensible markup language (XML). 2. Background Increasingly, buyers and sellers involved in commerce are turning to the Internet to conduct their business electronically in a relatively fast and quick manner. The Internet is particularly attractive to buyers because it provides a vast knowledge base from which they can research and find information about respective purchases of various goods. Time can be saved because a consumer does not have to travel to various places, such as libraries or stores, to obtain information regarding the various goods to be purchased. Indeed, the entire process of shopping for goods and services can be completed using a personal computer at one's home so long as the computer is connected to a network such as the Internet. Likewise, using the Internet for commerce is extremely attractive to businesses as they can provide the same type of information to consumers that was traditionally provided through catalogs or other advertising, but at much lower cost. Furthermore, transactions can occur between customers and sellers in a similar manner as customarily done at a checkout stand in a store. Indeed, in the case of all digital products, such as computer software, videos, music or funds transfer, the goods or services themselves can be delivered through the Internet and payment can be received through the Internet so that the entire transaction occurs through a computer network without the consumer or merchant ever actually meeting in a store. This method of doing business provides tremendous cost savings to manufacturers and sellers. Even items that have to be physically shipped can benefit from this form of commerce. Once a customer browses a merchant's website and selects various goods to purchase, the merchant simply needs to verify the use of the payment instrument and then ship the goods to the customer. Typically, a merchant provides what is known as a web-store or an Electronic commerce store on the web. That is, the merchant either has a web server or uses a web server to create the store and the customer has client software to view the store. The client software can be any piece of code or software that resides on a computer, telephone, or any other type of computing/communication device that can talk to another computer such as a server. Typically, the client software is simply a standard piece of software such as a web browser. Typical web browsers on the Internet would include, for example, NETSCAPE NAVIGATOR or INTERNET EXPLORER. Such browsers provide a graphical user interface for retrieving and reviewing web pages found on web servers. In order for the client web browser to function properly, the web server must send information in a format that the web client can display in a useful manner. Mainly, browsers will use hypertext transfer protocol (HTTP) via transmission protocol/Internet protocol (TCP/IP) to pass information back and forth between the web browser and web server. The actual document read by the web browser will most likely be in Hypertext Mark up Language (HTML). In addition, web browsers can read and display any type of text document. Originally, web servers were designed just to present data. The data was transferred via the Internet by the above mentioned protocols in the HTML format and web browsers would simply present the data to an end user in a graphical manner. A browser would simply go to the web server and request a certain file and the web server would present the data in the HTML format such that the file would be transmitted to the web browser and a user could see something displayed on the screen in a graphical format. For example, a scientific paper about particle acceleration in a lab might be processed in this manner. As technology has advanced on the Internet, web servers have become more complex and have gone beyond simply presenting a text document. For example, databases are now common on web servers. For example, if one wished to look up a telephone number, instead of having the web server send the entire phone book through the Internet as a large text document to a web browser, it is desirable to simply send the phone number. Essentially, software on the server has been developed that responds to a request for a phone number by determining what the phone number is from the large text file of a whole phone book, converting the answer into an HTML document and sending the answer to a web server as though it was a full text file. Therefore, a user would simply be able to see the single phone number, as opposed to all the phone numbers within the database. Essentially a text file is specially created for that one moment to respond to that one request. The text file does not actually exist in a database, rather the client web browser simply receives a HTML document that was requested. In fact, the browser is simply getting a set of data created based on the browser's query. Currently, Electronic commerce stores are based on this interaction of data being sent from the client to a server. The server then processes the data and sends the data back to the web browser in a certain format. In the process of sending data back and forth, ultimately a purchase transaction occurs. Of course, this transaction is much more complex than simply retrieving a phone number. There may be a full list of different types of products available such as T-shirts or other clothing. Additionally, the clothing could have certain attributes such as different colors and prices. The problem with this exchange of data is that the server has to remember all the previous data. For example, if a customer were to ask for a T-shirt and then request that the shirt be a blue T-shirt, the server would have to remember the customer was asking about T-shirts initially and that now the request is for a blue T-shirt rather than, for example, a blue set of long johns. All the information about the transaction, such as color, size and price, must be remembered in each session. In order to make this process work, typically the data used for each session is stored in what is referred to as a “shopping cart”, essentially modeling the process on the idea of going through a grocery store with a shopping cart and putting various products having various attributes within the cart which may be purchased at a later time. Additional information might also be important, such as the location of the purchaser. If, for example, the purchaser lives in another country, such as Turkey, a cash payment simply will not work. Perhaps the only payment that might work is through a credit card, such as a VISA card, which may necessitate some currency exchange transactions based on the purchase. A lot of different data has to be collected and stored during this type of session. Also, most store owners on the Internet would like their shop to look unique. In addition to the overall look of the store, store owners would like to tailor what information is collected from the customer and how various input fields are arranged on the customer's computer screen. A typical Electronic commerce store may address this problem by collecting a bunch of data in a pre-set step by step conversation in each customer session. On a first page, the web server asks exactly what is being bought out of a list. The second page in the session asks how the user is going to pay for the items selected. The third page will indicate whether or not the transaction will go forward, followed by authorization of the financial instrument. The system is fairly simple because there are only three pages, three interactions and the interactions always process the same information in the same order. If the transaction had not proceeded in this order, and if a customer changed his or her mind, the entire transaction would have to re-start from the beginning. The advantage is that the server knows exactly what information is going to come back at exactly what time so it can be stored easily by the server. Essentially, the customer fills out a form such that the data is sent in exactly the correct format because all the data elements are strictly defined. This sort of system works fairly well so long as all the variables to be used in the session are known ahead of time. However, the order and number of the steps cannot be changed. Therefore, if a store is going to sell encryption software, for example, it needs to know in what country the customer resides before the store can show an order page because encryption software cannot be sent to certain countries. This is a different business process in that the order of presentation of the data has been changed. Such a change requires essentially an entire rewrite of the software residing on the web server and is extremely expensive. In simple terms, a store A could be designed to process a certain order form and payment information, while a store B could be designed to process almost the same order form and payment information, yet the entire code would have to be rewritten to change store A into store B. Indeed for every single minor change to the process of asking for information, a relatively large amount of code must be rewritten. More specifically, stores have been made with HTML, requiring a backend script or program unique to each store. Such scripts generally expect to see variables input in a particular manner and order. The variable names are generally incorporated into the script and therefore are not easily modified. Of course, when a storeowner wishes to collect custom or additional information from a customer, the backend script or code must be changed to accommodate the new data coming into the web page. Currently each store has an HTML form that is sent to a client computer into which customers enter information. The customer fills out the form and then the form data is sent to the storeowner's server. For example a traditional HTML input form may use the following variables: <input name=“name”> <input name=“street”> <input name=“city”> <input name=“state”> <input name=“zip”> A web server then parses the form data and collects the various pre-specified variables from the parsed form data. The data is then inserted into an organized database by the web server. Next, the web server creates a HTML response page which is transmitted to the customer and appears as a web page on the client computer. However, a small change in the web store quickly illustrates the problem with this traditional HTML form. Say the store owner wished to collect the customer's first and last name. The form code would have to be modified to handle the new variables. A similar problem occurs when a store wants to group information about a product that a customer is buying, such as product size or color. Another approach to the problem has been the use of electronic commerce stores which are relatively configurable. Essentially, these electronic commerce stores are programs that reside on web servers that have a tremendous number of options all preprogrammed. However, if the programmer has not thought of all the possible ways a merchant would like to configure the store, an extensive rewrite is necessary. Furthermore, the costs of writing a program with a large number of preprogrammed options is expensive. Based on the above, there exists a need in the art for a piece of software that resides in a web server that can be easily adapted to many different types of Electronic commerce web stores. SUMMARY OF THE INVENTION The subject invention provides a way of conducting Electronic commerce over the Internet using web stores that are easily modified and avoid the problem of having to completely rewrite the server code to make small changes in a web store. The form data used in the various web stores is processed into eXtensible Markup Language (XML) objects. By using XML path information in the HTML form variable names, the server is able to convert the HTML input into XML objects. This methodology allows the addition of any input fields without having to modify the backend code residing on the server to accommodate the changes. More specifically, the process proceeds with the customer using a client machine to request a web page through the Internet or some other network. The web server receives the request and sends a web page in HTML format that presents the customer with a form. The customer then enters information into the form regarding a transaction in the web store. The form is set up so that the form values, i.e., the name of each variable, implies a way to store the data in a database located on the web server. For example, instead of the traditional store variables listed previously, the following variables would be used: <input name=“/customer/name/first”> <input name=“/customer/name/last”> <input name=“/customer/address/street”> <input name=“/customer/address/city”> <input name=“/customer/address/state”> <input name=“/customer/address/zip”> The variables are then sent through the Internet to the web server. The web server code then parses the form variables and, because the names of the variables indicate where and how the data should be stored, the web server stores the data according to the variable names. This is distinct from the prior method of storing the data according to a predetermined algorithm defined by the back end code in the web server. For example the following XML type document could be built from the variable names listed above: <customer> <name> <first></first> <last></last> </name> <address> <street></street> <city></city> <zip></zip> </address> </customer> By inspection, we can see that the various positions of variables in the data are derived from the variable names. Once the data has been stored in the database, the web server creates the next web page. Such a web page can easily be created by merging the data from the XML document with an eXtensible Stylesheet Language Transformation (XSLT) template to form an HTML document, and sent to the client machine. This action, of course, enables the customer to see the next web page. The great advantage of this process is that user data collected and displayed does not need to be pre-specified to the web server code. The way the input data is named tells the web server code how to organize the data without having to know exactly what the data is and in what order it will be received. Additional objects, features and advantages of the present invention will become more readily apparent from the following detailed description of a preferred embodiment when taken in conjunction with the drawings wherein like reference numerals refer to corresponding parts in the several views. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram of a system with computers interconnected by the Internet for conducting commerce over the Internet in accordance with a first embodiment of the invention; FIG. 2 is a block diagram illustrating in more detail the first preferred embodiment of the invention shown in FIG. 1; FIG. 3 is a block diagram illustrating in more detail the first is preferred embodiment of the invention shown in FIG. 1; and FIG. 4 is a flow chart of a computer procedure employed by the seller's computer according to a first preferred embodiment of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT FIG. 1 details a first preferred embodiment in which a system for conducting commerce over the Internet includes a seller's computer system 10 which can be selectively called upon by one or more customer computer systems 12 over an electronic communications link such as the Internet 14. As illustrated in FIGS. 1-3, seller's computer system 10 is formed of one or more computers 62, and includes an input-output unit 20 for transmitting and receiving digital information to or from the Internet 14 and indirectly to a customer's computer 42. Likewise, a customer's computer 42 is also set up to contact the Internet 14 through an input-output unit 45. Customer's computer 42 typically has a monitor 54, a central processing unit 55, some type of memory 56 and an input-output unit such as a keyboard 57. Typically when in use, customer's computer 42 would have some type of operating system such as Macintosh, Unix, Windows, which would run the basic operations of the computer 42. Additionally, specialized applications such as a web browser 60 would be used to interpret the various protocols of the Internet 14 into an understandable interface for a computer user, namely the customer. In a similar manner, a seller's computer 62 may be formed of one or more computers, having one or more monitors 64, a central processing unit 65, some type of memory 66 and an input-output device such as a keyboard 67. Additionally, various applications such as a web server 70 and/or specialized applications that form a website 71 providing information regarding seller's products 72, and additional applications designed to process financial transactions 74 and/or provide a database 76 for remembering and storing various bits of information regarding the various customers visiting the seller's website. Further, seller's computer 62 has the programming to compare inputted data 77 and authorize shipping of goods 78. Although in theory seller's computer system 10 could be part of any data network, most preferably seller's computer system 10 is connected to the Internet 14 or an Internet service provider (ISP) 80 by a high speed integrated service digital network (ISDN), a T-1 line, a T-3 line or any other type of system that communicates with other computers or ISP's through the Internet 14. FIG. 3 shows a more specific application of the invention's preferred embodiment, in which the customer's computer 12 is able to process HyperText Markup Language (HTML) forms 90. A pair of arrows 95 represents information that may include variables flowing to and from the customer's computer 12. As in FIG. 2, customer's computer 12 may be communicating with a seller throughout an entire transaction. However, in this case the seller may be using multiple servers. One server may handle displaying an overall website while some portions of the website may actually transfer a customer to a second server to handle a different part of the transaction. For the sake of discussion, we will assume the customer is communicating with a single server through the Internet 14 and that a certain program or script that resides and operates on the server is of interest here. For simplicity sake we will call the program or script a “store” 100. In the preferred embodiment of the invention the information may be passed to store 100 using parameters. The parameters may be passed in one of three ways: 1) In the calling URL. I.e., ?storeID=ABC&lang=en 2) In the form of hidden HTML form fields. I.e., <input type=“HIDDEN” name=“lang” value=“en”> 3) Or as browser cookies. Here is a list of common store Parameters: Parameter Description storeID Usually a multi character Supplier code that identifies the store. Action The action that this invocation of the store is expected to carry out. View The XSLT template that will be used in processing the output. OrderID The Id of the current transaction. CustomerID The Id of the current customer. Currency The currency the customer wishes to view the prices/order totals in. Lang The language the customer wishes to view the store in. Product ID The Id of a specific product for purposes of viewing the details of that product. ItemID The Id of an item in the shopping cart. Shipping/method The desired shipping method. SetCookie If true we will set a cookie in the Customer's browser that remembers their customer ID for the next time they visit us. Customer/* Where * is any XML path. The path, and the associated value will be either added or updated in the customer XML object of the current transaction. Order/* Where * is any XML path. The path, and the associated value will be either added or updated in the order XML object of the current transaction. Product/<product Where product ID is the ID of the product in the product.xml ID document. Item ID is the ID of the item in the current shopping >/<itemID>/<attribute> cart, or 0 for an item that has yet to be added to the cart. Attribute is the name of any attribute to be set related to this item in the shopping cart. Most generically this will be “quantity”. Additionally, located in the server is a database 110. Database 110 contains numerous eXtensible Markup Language (XML) documents 140 organized into sets. At least one set of XML documents 140 is a default set of documents that is used by store 100. XML documents 140 are arranged so that all the data that drives store 100 is stored in XML Objects. All data from configuration information, to order and customer information, to pull down lists, is stored in these Objects. By using XML Objects store 100 is able to completely separate the data from the presentation of data and maintain a highly organized and easily modifiable form. Below is a list of proposed Objects: Objects Description Products.xml Contains the product configuration information, including, for example, product ID, name, description, price, attributes, shipping weight, etc.. Example: <products> <product id=“0000-0000-0000-0001” taxable=YES”> <name>T-Shirt</name> <desc>The cheesy T you can't live without</desc> <price quantity=“1-10” currency=“USD”>20.95</price> <price quantity=“11-999” currency=USD>18.00</price> <image>cheese.gif</image> <attribute name=“Size” required=“YES”> <option>S</option> <option>M</option> <option>L</option> </attribute> <weight>1</weight> </product> </products> shipping.xml Contains the shipping methods available. <shipping> <method name=“UPS Ground (US)” id=“1”> <base>3</base> <costperunit currency=“USD”>1</costperunit> </method> </method name=“FedEx (US)” id=“2”> <base>15</base> <costperunit currency=“USD”>5</costperunit> </method> </shipping> Where base is the minimum charge per order, and costperunit is the cost that will be multiplied by the <weight> * <quantity> of each item. Discounts.xml Contains the order total discount scheme. Example: <discounts> <discount currency=“USD” id=“1”min=“100”max=“200”>5</discount> <discount currency=“USD”id=“1”min=“201”max=“99999999”>10</discount> </discounts> In this example if the order total is between 100 and 200 there will be a 5% discount on the entire order, if the order total is between 201 and a bazillion, there will be a 10% discount. Order.xml Contains the order data for the current transaction. Customer.xml Contains the customer data for the current transaction. Rates.xml Contains currency exchange rates. paymethods.xml Contains payment instrument, and currency options available to the Customer. Tax.xml Contains the tax schedule based on location. Vendor.xml Contains Supplier data for the store “owner”. cards.xml Contains the list of credit cards. Currencies.xml Contains the list of currencies. Lang.xml Contains translated language keys. Languages.xml Contains the list of languages supported. Months.xml Contains the list of months. Years.xml Contains the list of years. Countries.xml Contains the list of countries. In addition to the objects listed above, database 110 stores a collection of extensible Stylesheet Language Transformation (XSLT) templates 120 that may be combined with XML data in documents 140 in order to create web pages. Templates 120 are responsible for how the web pages appear or how the data is presented. Through the use of an XSLT processor 130 the XML objects are “merged” with templates 120 to create the dynamic output in HTML format for the customer. A preferred set of templates is shown below: Template Description products.xsl This template displays the catalog or product list. Details.xsl This template displays the expanded details of a single product. Cart.xsl This template displays the shopping cart. Checkout.xsl This template gathers the customer information. Receipt.xsl This template displays the “thanks page” for card purchases. Invoice.xsl This template displays the “thanks page” for cash/check/purchases. Email.xsl This template is used to convert the customer and order XML objects into an email format. Site.xsl This template contains the “global” look and feel of the site. Declines.xsl This template displays when a sale is declined. Paymethods.xsl This template displays the vast array of payment and currency options available to the customer. All store XML documents 140 are located under a root directory on the web server 70. For example: /var/local/orderdata/stores. A copy of these files may be stored in a database 110 and are sent to a local system when modified. The directory structure according to a preferred arrangement is as follows: /DEFAULT/site.xsl /products.xsl /detail.xsl /cart.xsl /checkout.xsl /receipt.xsl /invoice.xsl /en/lang.xml /en/cards.xml /<lang>/... /OPTION1 /OPTION..N /<STOREID>/store.xml /products.xml /vendor.xml Where <STOREID> is generally the multi-character Supplier Code for any given Supplier. In addition to the three mandatory documents: store.xml, product.xml, and vendor.xml, any Supplier folder may contain a copy of any of the files or subfolders that are contained in the DEFAULT or OPTION folders. These copies can be modified to provide unique customization for any given Supplier. When locating files to use, the store 100 will first look for the most specific file, then look up an “Order of Precedence” until it finds the file it needs to complete the action/view. An example of an “Order of Precedence” is as follows: 1) The specific supplier and specified language 2) The specific supplier and us_english 3) The option and specified language 4) The option and us_english 5) The default and specified language 6) The default When store 100 is first invoked by a customer sending a request, store 100 will take an “action”. That is, store 100 will either perform some requested task or if no task is specified, store 100 will perform the default action of displaying a product page. If a specific action is requested then that action will be formed, assuming the action is valid. Normally an action will modify the customer and order objects in the XML database 110 that are associated with the transaction. A preferred set of “actions” is listed below: Action Description product (default) This is the action that is used if no action is specified. It returns the catalog of products. Cart This action accepts products to be added, removed, or updated in the cart. The cart is displayed. Checkout This action ensures the order is ready for checkout, and displays a form requesting customer information. Process This action validates the order and customer objects and contacts the authorization system to obtain authorization. If approved, the “receipt” is displayed for card purchases, or the “invoice” for cash/check, and PO orders. Otherwise the “declined” message is displayed. Remove This action removes an item from the cart, and re-displays the cart. Detail This action will display a single product “detail” screen. Paymethods This action will display a table of payment options available. Each action requires a certain set of data inputs either as parameters or XML Objects in a certain state. If these requirements are not met, usually store 100 will send an error message. Upon successful completion of an action, an appropriate view is set up in store 100 and the presentation is sent to the customer. In other words once the action is complete, an associated “view” (XSLT template 120) will be merged with the resultant XML Objects. The merging will produce an HTML document 15 that is returned to the customer who sees it as a new web page. Generating such HTML content dynamically is resource intensive. Although not required, preferably a system of template caching will reduce the strain on available computing power. Additionally, templates 120 should not contain any language specific static text in the root of any folder. All language text (English, Spanish, etc.) should be stored in separate language files. Further, to simplify text, pop up lists (i.e. country lists) should be replaced prior to runtime. In other words, all data that is relatively static should be “embedded” in the templates used by store 100 prior to runtime. Indeed all of the customer purchase transactions are conducted with HTML forms 90 presented to the customer. Because HTML forms 90 are flexible, other client machines may be supported. For example, wireless application protocol (WAP) clients commonly used in cellular phones may be supported through the use of different XSLT templates 120. Store 100 can also duplicate current web store abilities by providing actions associated with a product page to display product information, a “checkout” action to gather customer data, and a “process” action to process a financial transaction which includes the step of contacting an authorization system. Once the order is completed the order information is sent to the supplier to ship the appropriate items and to the customer verifying the order. The whole process can be adjusted to alter the language presented to the customer. Language keys may be placed in templates 120. These keys correspond to values in the lang.xml document. The selected language is determined by a lang=<lang> parameter submitted by the customer's web browser 60. If not specified, then the preferred language of browser 60 is used. A separate lang.xml document is created for each supported language. The language keys are replaced in each template 120 prior to the results being returned to each customer's computer 12. All language specific text should be replaced with language keys that can be found in the lang.xml documents. After the lang.xml file is changed, it will be merged with the root template to create a language specific template that will reside in a language subdirectory. If a language key has not been translated then the English value will be used. Text like the following placed in an XSLT template will be replaced with the proper language specific text to be displayed to the customer: <xsl:value-of select=“//lang/pageTitle”/> where page Title is a language key that has been translated, and can be found in the lang.xml document. As shown in FIG. 4, the process of the store 100 proceeds with store 100 being activated at step 210. In step 220, variables are assigned to the different information that has to be stored. Each variable is assigned a name which indicates how the information is to be stored. Store 100 then, at step 230, sends a web page to a customer with an input form 90 displayed on customer's browser 60. The customer then enters the transaction information or data into form 90 at essentially what appears to be a web store. In step 240, the variables are sent through the Internet 14 to web server 70 via an input form, URL or cookies. In step 250, the web server code or store 100 parses the variables and arranges the data based on the names of the variables in a database 76. Next, the store 100 performs a requested or default action on the XML data in step 270. The store selects one of the XSLT templates 120 in step 280 which is appropriate for the next web page. In step 290, the next web page or output HTML document is created by merging the XML database objects with the selected XSLT template 120 using an XSLT processor 130. The output HTML document is essentially a new web page that is sent to the customer's computer 12 in step 300. The process continues with a different portion of store 100. An example of a “store” 100 is represented by the following pseudo code: set the currency and language to the values passed or set to defaults if the storeID and action are valid set the view to the view passed in or default to products if this is a new order generate an orderID create the order object with defaults add any order parameters passed in else read in the order from “file” based on the orderID add/or modify any order parameters passed in set the character encoding based on the language if this is a new customer generate a customerID create the customer object with defaults add any customer parameters passed in else read in the customer from “file” based on the customerID add/or modify any customer parameters passed in add/modify any products passed in if action is “checkout” add shipping if action is “process” total the order validate the customer and order if valid send the order to an authorization system if approved set order status=approved if card order set the view to “receipt” else set the view to “invoice” if declined set order status=declined set the view to “declined” if error set order status=error set the view to “receipt” send email to report results else set order status=incomplete add error codes/messages to order set the view to “checkout” save the customer object if action is “detail” read the product from file matching “productID” set the view to “detail” if action is “cart” set the view to “cart” if action is “remove” remove the item from the cart matching “itemID” if action is “paymethods”: read the paymethods file if the action is anything else read the products file total the order (including discounts, shipping, and tax) save the order save the customer read all other XML objects transform the XML objects using the XSLT template (the view) do post XSLT substitutions for legacy system compatibility return the resultant HTML page to the customer else the storeID and or action are invalid display an error Although described with reference to a preferred embodiment of the invention, it should be readily understood that various changes and/or modifications can be made to the invention without departing from the spirit thereof. In general, the invention is only intended to be limited by the scope of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention In general, the present invention relates to the field of displaying web pages via the Internet and, more particularly, to a system that can easily store data related to the web pages in extensible markup language (XML). 2. Background Increasingly, buyers and sellers involved in commerce are turning to the Internet to conduct their business electronically in a relatively fast and quick manner. The Internet is particularly attractive to buyers because it provides a vast knowledge base from which they can research and find information about respective purchases of various goods. Time can be saved because a consumer does not have to travel to various places, such as libraries or stores, to obtain information regarding the various goods to be purchased. Indeed, the entire process of shopping for goods and services can be completed using a personal computer at one's home so long as the computer is connected to a network such as the Internet. Likewise, using the Internet for commerce is extremely attractive to businesses as they can provide the same type of information to consumers that was traditionally provided through catalogs or other advertising, but at much lower cost. Furthermore, transactions can occur between customers and sellers in a similar manner as customarily done at a checkout stand in a store. Indeed, in the case of all digital products, such as computer software, videos, music or funds transfer, the goods or services themselves can be delivered through the Internet and payment can be received through the Internet so that the entire transaction occurs through a computer network without the consumer or merchant ever actually meeting in a store. This method of doing business provides tremendous cost savings to manufacturers and sellers. Even items that have to be physically shipped can benefit from this form of commerce. Once a customer browses a merchant's website and selects various goods to purchase, the merchant simply needs to verify the use of the payment instrument and then ship the goods to the customer. Typically, a merchant provides what is known as a web-store or an Electronic commerce store on the web. That is, the merchant either has a web server or uses a web server to create the store and the customer has client software to view the store. The client software can be any piece of code or software that resides on a computer, telephone, or any other type of computing/communication device that can talk to another computer such as a server. Typically, the client software is simply a standard piece of software such as a web browser. Typical web browsers on the Internet would include, for example, NETSCAPE NAVIGATOR or INTERNET EXPLORER. Such browsers provide a graphical user interface for retrieving and reviewing web pages found on web servers. In order for the client web browser to function properly, the web server must send information in a format that the web client can display in a useful manner. Mainly, browsers will use hypertext transfer protocol (HTTP) via transmission protocol/Internet protocol (TCP/IP) to pass information back and forth between the web browser and web server. The actual document read by the web browser will most likely be in Hypertext Mark up Language (HTML). In addition, web browsers can read and display any type of text document. Originally, web servers were designed just to present data. The data was transferred via the Internet by the above mentioned protocols in the HTML format and web browsers would simply present the data to an end user in a graphical manner. A browser would simply go to the web server and request a certain file and the web server would present the data in the HTML format such that the file would be transmitted to the web browser and a user could see something displayed on the screen in a graphical format. For example, a scientific paper about particle acceleration in a lab might be processed in this manner. As technology has advanced on the Internet, web servers have become more complex and have gone beyond simply presenting a text document. For example, databases are now common on web servers. For example, if one wished to look up a telephone number, instead of having the web server send the entire phone book through the Internet as a large text document to a web browser, it is desirable to simply send the phone number. Essentially, software on the server has been developed that responds to a request for a phone number by determining what the phone number is from the large text file of a whole phone book, converting the answer into an HTML document and sending the answer to a web server as though it was a full text file. Therefore, a user would simply be able to see the single phone number, as opposed to all the phone numbers within the database. Essentially a text file is specially created for that one moment to respond to that one request. The text file does not actually exist in a database, rather the client web browser simply receives a HTML document that was requested. In fact, the browser is simply getting a set of data created based on the browser's query. Currently, Electronic commerce stores are based on this interaction of data being sent from the client to a server. The server then processes the data and sends the data back to the web browser in a certain format. In the process of sending data back and forth, ultimately a purchase transaction occurs. Of course, this transaction is much more complex than simply retrieving a phone number. There may be a full list of different types of products available such as T-shirts or other clothing. Additionally, the clothing could have certain attributes such as different colors and prices. The problem with this exchange of data is that the server has to remember all the previous data. For example, if a customer were to ask for a T-shirt and then request that the shirt be a blue T-shirt, the server would have to remember the customer was asking about T-shirts initially and that now the request is for a blue T-shirt rather than, for example, a blue set of long johns. All the information about the transaction, such as color, size and price, must be remembered in each session. In order to make this process work, typically the data used for each session is stored in what is referred to as a “shopping cart”, essentially modeling the process on the idea of going through a grocery store with a shopping cart and putting various products having various attributes within the cart which may be purchased at a later time. Additional information might also be important, such as the location of the purchaser. If, for example, the purchaser lives in another country, such as Turkey, a cash payment simply will not work. Perhaps the only payment that might work is through a credit card, such as a VISA card, which may necessitate some currency exchange transactions based on the purchase. A lot of different data has to be collected and stored during this type of session. Also, most store owners on the Internet would like their shop to look unique. In addition to the overall look of the store, store owners would like to tailor what information is collected from the customer and how various input fields are arranged on the customer's computer screen. A typical Electronic commerce store may address this problem by collecting a bunch of data in a pre-set step by step conversation in each customer session. On a first page, the web server asks exactly what is being bought out of a list. The second page in the session asks how the user is going to pay for the items selected. The third page will indicate whether or not the transaction will go forward, followed by authorization of the financial instrument. The system is fairly simple because there are only three pages, three interactions and the interactions always process the same information in the same order. If the transaction had not proceeded in this order, and if a customer changed his or her mind, the entire transaction would have to re-start from the beginning. The advantage is that the server knows exactly what information is going to come back at exactly what time so it can be stored easily by the server. Essentially, the customer fills out a form such that the data is sent in exactly the correct format because all the data elements are strictly defined. This sort of system works fairly well so long as all the variables to be used in the session are known ahead of time. However, the order and number of the steps cannot be changed. Therefore, if a store is going to sell encryption software, for example, it needs to know in what country the customer resides before the store can show an order page because encryption software cannot be sent to certain countries. This is a different business process in that the order of presentation of the data has been changed. Such a change requires essentially an entire rewrite of the software residing on the web server and is extremely expensive. In simple terms, a store A could be designed to process a certain order form and payment information, while a store B could be designed to process almost the same order form and payment information, yet the entire code would have to be rewritten to change store A into store B. Indeed for every single minor change to the process of asking for information, a relatively large amount of code must be rewritten. More specifically, stores have been made with HTML, requiring a backend script or program unique to each store. Such scripts generally expect to see variables input in a particular manner and order. The variable names are generally incorporated into the script and therefore are not easily modified. Of course, when a storeowner wishes to collect custom or additional information from a customer, the backend script or code must be changed to accommodate the new data coming into the web page. Currently each store has an HTML form that is sent to a client computer into which customers enter information. The customer fills out the form and then the form data is sent to the storeowner's server. For example a traditional HTML input form may use the following variables: <input name=“name”> <input name=“street”> <input name=“city”> <input name=“state”> <input name=“zip”> A web server then parses the form data and collects the various pre-specified variables from the parsed form data. The data is then inserted into an organized database by the web server. Next, the web server creates a HTML response page which is transmitted to the customer and appears as a web page on the client computer. However, a small change in the web store quickly illustrates the problem with this traditional HTML form. Say the store owner wished to collect the customer's first and last name. The form code would have to be modified to handle the new variables. A similar problem occurs when a store wants to group information about a product that a customer is buying, such as product size or color. Another approach to the problem has been the use of electronic commerce stores which are relatively configurable. Essentially, these electronic commerce stores are programs that reside on web servers that have a tremendous number of options all preprogrammed. However, if the programmer has not thought of all the possible ways a merchant would like to configure the store, an extensive rewrite is necessary. Furthermore, the costs of writing a program with a large number of preprogrammed options is expensive. Based on the above, there exists a need in the art for a piece of software that resides in a web server that can be easily adapted to many different types of Electronic commerce web stores.
<SOH> SUMMARY OF THE INVENTION <EOH>The subject invention provides a way of conducting Electronic commerce over the Internet using web stores that are easily modified and avoid the problem of having to completely rewrite the server code to make small changes in a web store. The form data used in the various web stores is processed into eXtensible Markup Language (XML) objects. By using XML path information in the HTML form variable names, the server is able to convert the HTML input into XML objects. This methodology allows the addition of any input fields without having to modify the backend code residing on the server to accommodate the changes. More specifically, the process proceeds with the customer using a client machine to request a web page through the Internet or some other network. The web server receives the request and sends a web page in HTML format that presents the customer with a form. The customer then enters information into the form regarding a transaction in the web store. The form is set up so that the form values, i.e., the name of each variable, implies a way to store the data in a database located on the web server. For example, instead of the traditional store variables listed previously, the following variables would be used: <input name=“/customer/name/first”> <input name=“/customer/name/last”> <input name=“/customer/address/street”> <input name=“/customer/address/city”> <input name=“/customer/address/state”> <input name=“/customer/address/zip”> The variables are then sent through the Internet to the web server. The web server code then parses the form variables and, because the names of the variables indicate where and how the data should be stored, the web server stores the data according to the variable names. This is distinct from the prior method of storing the data according to a predetermined algorithm defined by the back end code in the web server. For example the following XML type document could be built from the variable names listed above: <customer> <name> <first></first> <last></last> </name> <address> <street></street> <city></city> <zip></zip> </address> </customer> By inspection, we can see that the various positions of variables in the data are derived from the variable names. Once the data has been stored in the database, the web server creates the next web page. Such a web page can easily be created by merging the data from the XML document with an eXtensible Stylesheet Language Transformation (XSLT) template to form an HTML document, and sent to the client machine. This action, of course, enables the customer to see the next web page. The great advantage of this process is that user data collected and displayed does not need to be pre-specified to the web server code. The way the input data is named tells the web server code how to organize the data without having to know exactly what the data is and in what order it will be received. Additional objects, features and advantages of the present invention will become more readily apparent from the following detailed description of a preferred embodiment when taken in conjunction with the drawings wherein like reference numerals refer to corresponding parts in the several views.
20040312
20080408
20050915
94047.0
51
LIM, KRISNA
DYNAMIC WEB STOREFRONT TECHNOLOGY
SMALL
0
ACCEPTED
2,004
10,798,477
ACCEPTED
LED display with overlay
A light emitting diode (LED) display device comprises a substrate and a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, the cavity being filled with an encapsulant not including fluorescent material. An LED is disposed on a first portion of the substrate within the cavity. An electrical connection exists between the LED and a second portion of the substrate, and a fluorescent material overlay is located at a top end of the cavity. The LED display device alternatively includes a plurality of LEDs, wherein each LED is disposed within a separate cavity.
1. A light emitting diode (LED) display device comprising: a substrate; a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, the cavity being filled with an encapsulant, the encapsulant not including fluorescent material; an LED disposed on a first portion of the substrate within the cavity; an electrical connection between the LED and a second portion of the substrate; and a fluorescent material overlay at a top end of the cavity. 2. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay includes a layer of phosphor particles. 3. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay has a substantially consistent thickness and includes a substantially uniform matrix of phosphor particles. 4. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay includes a combination of two or more fluorescent material types. 5. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 1 micrometer to 50 micrometer. 6. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 10 nanometer to 100 nanometer. 7. A light emitting diode display device according to claim 1, wherein the fluorescent material overlay includes organic dye. 8. A light emitting diode (LED) display device comprising: a substrate; a plurality of walls disposed on the substrate, the plurality of walls forming a cavity; an LED disposed on a first portion of the substrate within the cavity; an electrical connection between the LED and a second portion of the substrate; and a fluorescent material overlay at a top end of the cavity, the fluorescent material overlay including a plastic layer and layer of fluorescent material. 9. A light emitting diode display device according to claim 8, wherein the fluorescent material overlay has a substantially consistent thickness and includes a uniform matrix of phosphor particles. 10. A light emitting diode display device according to claim 8, wherein the fluorescent material overlay includes a combination of two or more fluorescent material types. 11. A light emitting diode display device according to claim 8, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 1 micrometer to 50 micrometer. 12. A light emitting diode display device according to claim 8, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 10 nanometer to 100 nanometer. 13. A light emitting diode display device according to claim 8, wherein the fluorescent material overlay includes organic dye. 14. A light emitting diode (LED) display device comprising: a substrate; a plurality of cavities, each of the plurality of cavities formed within a plurality of walls disposed on the substrate; a plurality of LEDs, each of the plurality of LEDs disposed within a separate one of the plurality of cavities, each of the plurality of LEDs disposed on a first portion of the substrate; a plurality of electrical connections, each of the plurality of electrical connections connecting one of the plurality of LEDs to one or more respective second portions of the substrate; and a fluorescent material overlay at a top end of the plurality of cavities. 15. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay includes a layer of phosphor particles. 16. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay has a substantially consistent thickness and includes a substantially uniform matrix of phosphor particles. 17. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 1 micrometer to 50 micrometer. 18. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay includes phosphor particles having a mean diameter within the range of 10 nanometer to 100 nanometer. 19. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay includes organic dye. 20. A light emitting diode display device according to claim 14, wherein the fluorescent material overlay include a plurality of fluorescent material types, and each of the plurality of fluorescent material types corresponds to a portion or portions of the plurality of cavities.
FIELD OF THE INVENTION This invention relates to light emitting devices and particularly to a light emitting diode (LED) display with an overlay layer of wavelength converting material. BACKGROUND OF THE INVENTION Light emitting diode display devices are useful for a variety of display applications. Known display devices use an LED to excite a wavelength or color converting material, such as a fluorescent or luminescent material, and then combine the emission of the fluorescent or luminescent material with the unconverted first emission from the LED. However, while these known LED display devices perform well with a single-LED device, known multi-LED devices have difficulty maintaining color consistency. Accordingly, there remains a need for a device that addresses existing shortcomings relating to multiple-LED displays. SUMMARY OF THE INVENTION According to one embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, the cavity being filled with an encapsulant, the encapsulant not including fluorescent material, an LED disposed on a first portion of the substrate within the cavity, an electrical connection between the LED and a second portion of the substrate, and a fluorescent material overlay at a top end of the cavity. According to a second embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, an LED disposed on a first portion of the substrate within the cavity, an electrical connection between the LED and a second portion of the substrate, and a fluorescent material overlay at a top end of the cavity, the fluorescent material overlay including a plastic layer and a layer of fluorescent material. According to a third embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of cavities, each of the plurality of cavities formed within a plurality of walls disposed on the substrate, a plurality of LEDs, each of the plurality of LEDs disposed within a separate one of the plurality of cavities, each of the plurality of LEDs disposed on a first portion of the substrate, a plurality of electrical connections, each of the plurality of electrical connections connecting one of the plurality of LEDs to one or more respective second portions of the substrate, and a fluorescent material overlay at a top end of the plurality of cavities. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a cross-sectional view of a prior art device showing a fluorescent or luminescent material used in combination with an LED. FIG. 2 is a prior art display using multiple LEDs. FIG. 3 is a cross-sectional view of an LED device according to an embodiment of the present invention. FIG. 4 is a cross-sectional view of an LED device according to a second embodiment of the present invention. DETAILED DESCRIPTION Referring to FIG. 1, a cross-section view of a prior art device shows a fluorescent or luminescent material used in combination with an LED 100. The LED 100 is placed on a first portion 110 of a substrate. An electrical connection 120 is made from the LED 100 to a second portion 130 of the substrate. The LED 100 is generally placed in a cavity or cup 140 having a reflective wall. An encapsulant 150 fills the cavity to protect the LED 100, the electrical connection 120, and the substrate. Particles of the fluorescent or luminescent material are dispersed within the encapsulant. One known fluorescent or luminescent material used in LED display devices is phosphor. When an electrical current passes through the LED 100, the LED radiates light. The phosphor particles in the encapsulant absorb a portion of the radiation of light from the LED 100 and then emit a radiation of light of a different color. The resultant color that emerges from the cavity is a combination of both the LED emitted light and the phosphor emitted light. One known combination in the prior art is the use of a blue LED and a yellow phosphor to emit a white light. FIG. 2 shows one prior art display using multiple LEDs. In FIG. 2, LEDs 200a-200n, are attached or disposed onto a substrate. The substrate is placed inside a reflector 220 that has multiple cavities corresponding to each of the LEDs. An encapsulant (not shown) embedded with phosphor (not shown) fills each of the cavities. In such an arrangement, each of the cavities may not have the same dimensions. Therefore, the quantity of the phosphor particles and their dispersion within each cavity may be different and cause color variation among the cavities. Referring to FIG. 3, a cross-section view of an LED device, according to an embodiment of the present invention, is shown. An LED 300 is attached or disposed on a first portion 310 of a substrate. An electrical connection 320 is made from the LED to a second portion 330 of the substrate. The LED 300 is shown located toward the bottom of a cavity or cup 340. The cavity 340 is formed within a plurality of walls disposed on or above the substrate. The cavity 340 may include reflective walls. The cavity may be filled with an encapsulant 350 to protect the LED 300. A fluorescent material overlay 360 is located at or near the top of the cavity 340, on the end of the cavity opposing the LED 300. In the embodiment illustrated in FIG. 3, when an electrical current passes through the LED 300, the LED 300 emits a radiation. The fluorescent material overlay 360 absorbs a portion of the LED radiation and emits a fluorescent material radiation. The resultant perceived color is a combination of the fluorescent material radiation and the unabsorbed portion of the LED radiation. According to one embodiment of the present invention, the LED 300 emits a blue radiation and the fluorescent material overlay 360 emits a yellow radiation. The combination of the blue and yellow radiation may produce a white light. The thickness of the fluorescent material overlay 360 may be varied to produce a desired ratio of the LED radiation to the fluorescent material radiation, thereby creating different shades of white such as, for example, a bluish-white to yellowish-white. According to another embodiment, the LED 300 emits a blue radiation and the fluorescent material overlay 360 emits a green radiation. The combination of the blue and green radiation may produce a cyan light. The thickness of the fluorescent material overlay 360 may be varied to produce a desired ratio of the LED radiation to the fluorescent material radiation, thereby creating colors ranging from blue to green. The above color combinations are given for purposes of illustration. Any suitable color combinations of LED radiation and fluorescent material radiation may be used to achieve the desired purpose and effect. For example, a UV or green LED may be used. Also, a fluorescent material that emits green or red may be used. Any suitable color combinations are to be within the scope of the present invention. According to another embodiment, the LED radiation is substantially fully converted into fluorescent material radiation. Accordingly, there is little or no combination of LED radiated light and fluorescent material radiated light, and the light emitted from the LED device is substantially that emitted by the fluorescent material. For example, where an ultra-violet (UV) LED is used in an LED display device, it is desirable that potentially harmful UV radiation is not emitted from the display. According to yet another embodiment of the present invention, a blend of two or more fluorescent material types may be used in the fluorescent material overlay 360. Such a combination of multiple fluorescent material types may be used to create novel eye-catching colors. The blend of two or more fluorescent material types may be intermixed homogeneously in the fluorescent material overlay, laid down in a pixel manner, or combined in any suitable manner. In the pixel manner of combination, the fluorescent material overlay may include distinct pixels of each fluorescent material type combined in a repeatable pattern. For example, the overlay may include repeated pixels of red, green and blue fluorescent material. According to another embodiment of the present invention, a fabrication of a multi-LED display is provided. In a multiple-LED display device including multiple cavities, color inconsistencies between separate cavities of the multiple-LED devices may be reduced, minimized, or eliminated. One multi-LED display device includes a substrate, a plurality of cavities, each of the plurality of cavities formed within a plurality of walls disposed on the substrate, a plurality of LEDs, each of the plurality of LEDs disposed within a separate one of the plurality of cavities, each of the plurality of LEDs disposed on a first portion of the substrate, a plurality of electrical connections, each of the plurality of electrical connections connecting one of the plurality of LEDs to one or more respective second portions of the substrate, and a fluorescent material overlay at a top end of the plurality of cavities. The electrical connections may be made to provide the desired control of the LEDs. For example, the electrical connections may be made such that each LED is controlled separately, or such that one or more subsets of the plurality of LEDs are controlled together. The fluorescent material overlay 360 may have a different type of fluorescent material at locations corresponding to the separate cavities of the display device. Therefore, different cavities will produce different colors according to the type of fluorescent material at the particular cavity location. In the multi-LED embodiment, one or more fluorescent material overlays may be used. For example, each cavity, or one or more subsets of the plurality of cavities may each have a separate fluorescent material overlay. According to one embodiment of the invention, the fluorescent material overlay 360 has a substantially consistent thickness and a substantially uniform matrix of fluorescent material or fluorescent particles. By having a substantially consistent thickness, the proportion of the LED radiation that is converted to the fluorescent material radiation is kept generally constant, and, for each LED 300 and associated cavity 340, the amount of the LED radiation absorbed by the fluorescent material overlay 360 will be substantially the same, even if the sizes of the cavities 340 are different. According to another embodiment, the fluorescent material overlay 360 may have the shape of the cavity 340 opening. Also, the area of fluorescent material in the overlay 360 may be shaped such that only a portion of the overlay includes fluorescent material. Also, the LED device may also include micro-features or micro-structures, such as dots, indentations, or lenses, disposed on the overlay 360 or at the top end of the cavity 340. According to another embodiment, the fluorescent material overlay 360 is a layer independent from the encapsulant 350 and abutting the encapsulant 350. The fluorescent material overlay 360 may occupy a layer of the top end of the cavity 340. The fluorescent material overlay 360 may also be substantially outside of the cavity 340. Accordingly, the amount of fluorescent material in the fluorescent material overlay 360 may be substantially independent from the volume of the cavity 340. According to one embodiment, the encapsulant does not include fluorescent material, or the encapsulant is substantially free from phosphor or fluorescent material such that the encapsulant does not affect the resulting color of the LED display. According to another embodiment of the present invention, the cavity of the display device may not necessarily be filled with an encapsulant, as other suitable methods of protecting the LED may be used. The fluorescent material overlay 360 may be fabricated using any suitable method. One example fabrication process is a plastic sheet forming process such as, for example, injection molding, rolling, casting, laminating, and other suitable processes. In the case of plastic sheet forming, the fluorescent material is mixed into the plastic material. Examples of plastic materials that may be used include polycarbonate, polypropylene, polyethylene, polyester, polymethyl methacrylate, silicone, and other suitable thermoplastics or thermoset polymers. In accordance with another embodiment, inorganic glass films may also be used. Referring now to FIG. 4, a cross-section view of an LED device, according to a second embodiment of the present invention, is shown. An LED 400 is attached or disposed on a first portion 410 of a substrate. An electrical connection 420 is made from the LED to a second portion 430 of the substrate. The LED 400 is shown located toward the bottom of a cavity or cup 440. The cavity 440 is disposed on or above the substrate. The cavity 440 may include a reflective wall. The cavity may be filled with an encapsulant 450 to protect the LED 400. A fluorescent material overlay 460 is located at or near the top of the cavity 440, on the side of the cavity opposing the LED 400. In the second embodiment, the fluorescent material overlay 460 includes a layer of fluorescent material 470 or phosphor particles laid down on one side of a plastic layer 480 using an adhesive or other method of joining the layer of fluorescent material 470 or phosphor particles to the plastic layer 480. The layer of fluorescent material 470 or phosphor particles maybe be disposed on either side or on both sides of the plastic layer 480. The plastic layer 480 may be any suitable plastic material, glass films, or other suitable materials. In an alternative embodiment, the layer of fluorescent material is laminated between a first plastic layer and a second plastic layer such that the layer of fluorescent particles is sandwiched between the first plastic layer and the second plastic layer. In one embodiment, the fluorescent material includes inorganic phosphor, and the inorganic phosphor may include inorganic phosphor particles. Example inorganic phosphor materials include, but are not limited to, Cerium activated Yttrium Aluminium Garnet (YAG:Ce) and Europium activated Strontium Thiogallate (SrTg:Eu). One example of a nano-phosphor is Zinc Cadmium (ZnCd). Other suitable fluorescent or luminescent materials may be used including organic dyes, for example, DCM (4-Dicyanmethylene-2-methyl-6-(p-dimethylaminostyryl)-4H-pyran), expressed chemically as C19H17N3. Such an organic material is available from Lambda Physik, Inc. of Fort Lauderdale, Fla. Other suitable inorganic and organic materials are known by those skilled in the art. Any suitable size of fluorescent particles can be used. The size of the fluorescent particle used may vary depending on the thickness of the fluorescent material overlay. In one embodiment, the fluorescent particles have a mean diameter d50 ranging from approximately 10 nanometer to approximately 100 micrometer. In another embodiment, the fluorescent particles have a mean diameter d50 ranging from approximately 1 micrometer to approximately 50 micrometer. In yet another embodiment, nano-size particles may be used. In one embodiment, the nano-size particles have a mean diameter d50 ranging from approximately 10 nanometer to approximately 100 nanometer. While the embodiments of the present invention have been illustrated in detail, it should be apparent that modifications and adaptations to these embodiments may occur to one skilled in the art without departing from the scope of the present invention as set forth in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Light emitting diode display devices are useful for a variety of display applications. Known display devices use an LED to excite a wavelength or color converting material, such as a fluorescent or luminescent material, and then combine the emission of the fluorescent or luminescent material with the unconverted first emission from the LED. However, while these known LED display devices perform well with a single-LED device, known multi-LED devices have difficulty maintaining color consistency. Accordingly, there remains a need for a device that addresses existing shortcomings relating to multiple-LED displays.
<SOH> SUMMARY OF THE INVENTION <EOH>According to one embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, the cavity being filled with an encapsulant, the encapsulant not including fluorescent material, an LED disposed on a first portion of the substrate within the cavity, an electrical connection between the LED and a second portion of the substrate, and a fluorescent material overlay at a top end of the cavity. According to a second embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of walls disposed on the substrate, the plurality of walls forming a cavity, an LED disposed on a first portion of the substrate within the cavity, an electrical connection between the LED and a second portion of the substrate, and a fluorescent material overlay at a top end of the cavity, the fluorescent material overlay including a plastic layer and a layer of fluorescent material. According to a third embodiment of the present invention, a light emitting diode display device is disclosed. The device comprises a substrate, a plurality of cavities, each of the plurality of cavities formed within a plurality of walls disposed on the substrate, a plurality of LEDs, each of the plurality of LEDs disposed within a separate one of the plurality of cavities, each of the plurality of LEDs disposed on a first portion of the substrate, a plurality of electrical connections, each of the plurality of electrical connections connecting one of the plurality of LEDs to one or more respective second portions of the substrate, and a fluorescent material overlay at a top end of the plurality of cavities.
20040311
20070703
20050915
57730.0
3
QUARTERMAN, KEVIN J
LED DISPLAY WITH OVERLAY
UNDISCOUNTED
0
ACCEPTED
2,004
10,798,604
ACCEPTED
Method and apparatus for controlling transmissions in communications systems
In a bandwidth allocation protocol for a mobile communications network, mobile terminals report their bandwidth requirements to the network, while the network controls the amount of bandwidth that is used by the mobiles in reporting their bandwidth requirements. The mobiles indicate the total quantity of data awaiting transmission, the maximum delay time of the most urgent portion of the data and the maximum delay time of the least urgent portion. If a collision occurs between transmission by two mobiles, the mobiles wait for an interval controlled by the network before attempting another contention-based access transmission. The network periodically varies the contention-based access capacity available according to the observed usage level and/or collision rate in the previously allocated contention-based access capacity. The network analyses the forward traffic to individual mobiles and predicts the return bandwidth requirements which are likely to result from the forward traffic. The network stores associations between forward and return frequency channels, so that when a mobile receiving a forward frequency channel request return capacity, the network preferentially assigns return bandwidth to the mobile in one or more of the associated return channels.
1-12. (canceled) 13. A method of transmission in a contention-based access channel by a wireless transceiver, comprising: a) transmitting a burst in said channel; b) detecting whether said burst has collided with another burst in said channel; and, if a collision is detected at said detecting step, waiting for a period determined according to a repeat parameter before repeating steps a) and b), wherein said repeat parameter is received by said transceiver. 14. A method as claimed in claim 13, wherein said period is randomly or pseudo-randomly selected from a range indicated by said repeat parameter. 15. A method as claimed in claim 13, wherein said repeat parameter includes a increment by which said range is increased after each repetition of steps a) and b). 16-17. (canceled) 18. A method as claimed in claim 26, including detecting the content of said monitored data, wherein the demand for capacity is predicted according to said content. 19. A method of allocating frequency channels to a plurality of wireless transceivers, comprising: transmitting to each of said transceivers a forward frequency channel allocation signal indicating an allocation of one or more forward frequency channels which that transceiver is to receive; and transmitting to each of said transceivers, in at least one said forward frequency channels assigned to that transceiver, a respective return channel allocation signal indicating an allocation of one or more return frequency channels in which that transceiver may transmit; wherein, for each forward frequency channel, a set of preferred return frequency channels is stored, such that for each of said transceivers to which a specified one of said forward frequency channels is allocated, the allocated one or more return frequency channels is preferentially selected from said corresponding set of preferred return frequency channels. 20. A method of allocating contention-based capacity to a plurality of wireless transceivers, comprising: transmitting to said transceivers a first contention-based capacity allocation signal indicating a first channel capacity assigned for contention-based access to said transceivers; receiving in said first channel capacity, transmissions from said transceivers; detecting a level of usage by said transmissions of said first channel capacity; determining, according to said level and said first channel capacity, a second channel capacity assigned for contention-based access to said transceivers; and transmitting a second contention-based capacity allocation signal, indicating said second channel capacity, to said transceivers. 21-25. (canceled) 26. A method of controlling transmission by a wireless transceiver in a channel shared with transmission by other transceivers, comprising: monitoring data transmitted to said transceiver; predicting, on the basis of said monitoring step, a demand for capacity in said channel by said transceiver, and transmitting to said transceiver an allocation signal indicating an allocation in said channel determined according to said predicted demand. 27. A method as claimed in claim 26, including generating a statistical model based on previous traffic flow to and from wireless transceivers, wherein the demand for capacity is predicted according to said statistical model.
The present invention relates to communications apparatus and methods, particularly but not exclusively for wireless communications, particularly but not exclusively via satellite. A number of wireless communications systems have already been proposed to support shared access by many simultaneous communications sessions of different types. For example, the patent publication WO 98/25358 discloses a mobile satellite communications system which supports the variable bandwidth requirements of multiple simultaneous communications sessions. With this type of system, it is difficult to allocate bandwidth to meet the varying requirements of multiple terminals or sessions, while using the overall bandwidth efficiently. The bandwidth allocation protocols themselves incur a significant signalling overhead, but the more information that is exchanged in these protocols, the better the network is able to adapt to constantly changing demands for bandwidth. Some bandwidth may be designated as being available for contention-based access, which allows data and signalling to be transmitted by mobiles without a bandwidth allocation specific to that mobile, but contention-based access is very bandwidth-inefficient; if the probability of collision is to be kept low, much more bandwidth needs to be allocated than is likely to be actually used. According to one aspect of the present invention, there is provided a bandwidth allocation protocol in a mobile communications network in which mobiles report their bandwidth requirements to the network, while the network controls the amount of bandwidth that is used by the mobiles in reporting their bandwidth requirements. In this way, the network can control the signalling overhead used by the bandwidth allocation protocol, so as to make more bandwidth available for user data when a channel becomes congested. Alternatively, when the channel is not congested, the network can allow the mobiles to report changes in their bandwidth requirements more quickly, increasing the likelihood that the quality of service demands by active communications sessions on the mobiles can be met. According to another aspect of the present invention, there is provided a bandwidth allocation protocol in which mobiles indicate both the quantity of data awaiting transmission and the maximum delay requirements for transmission of that data. Instead of indicating individually the delay requirements of each block of data awaiting transmission, the mobiles indicate the total quantity of data awaiting transmission, the maximum delay time of the most urgent portion of said data and the maximum delay time of the least urgent portion. This provides enough information for the network to allocate the necessary bandwidth at the right time to meet the delay requirements of all of the data, while reducing the amount of information needed to indicate the delay requirements. According to another aspect of the present invention, there is provided a contention-based access protocol for wireless mobile terminals, in which, if a collision occurs between transmission by two mobiles, the mobiles wait for an interval controlled by the network before attempting another contention-based access transmission. In one example, the network transmits an interval range signal to the mobiles, indicating a range for the interval for which the mobiles must wait before retransmitting, and the mobiles select an interval within the range; preferably, this selection is random or pseudo-random. This protocol allows the network to control the likelihood of collision in contention-based access, without necessarily having to allocate more bandwidth to contention-based access; instead, some of the mobiles may be forced to wait longer before retrying. A further refinement of this protocol involves the network specifying a further increment by which the mobiles must increase the range of the interval each time a subsequent attempt at transmitting the same burst fails. If there are repeated collisions, this indicates that there is not enough contention-based capacity to meet the current demands of the mobiles. According to this refinement, mobiles experiencing repeated collisions are automatically spread over an increasingly broader range of contention-based access capacity to increase the chance of the burst getting through, while the interval range applied by mobiles waiting after their first unsuccessful transmission is not affected. According to another aspect of the present invention, there is provided a method of managing contention-based access capacity for mobile terminals in a wireless network, in which the network periodically varies the contention-based access capacity available according to the observed usage level and/or collision rate in the previously allocated contention-based access capacity. This adaptive allocation has the advantage of allowing excess allocation of contention-based access capacity to be avoided, while keeping collision rates at an acceptable level. According to another aspect of the present invention, there is provided a method of allocating return bandwidth to mobiles in a network, in which the network analyses the forward traffic to individual mobiles and predicts the return bandwidth requirements which are likely to result from the forward traffic. At least two possible analytical approaches may be taken, separately or in combination: interpreting the forward traffic by identifying for example requests to send data or to set up specific types of call, and forming a statistical model relating patterns of forward traffic to patterns of return traffic. This aspect has the advantage that the mobile does not need to request additional bandwidth because the network can detect that it is required and allocate it in advance, thus reducing the signalling overhead and reducing the delay before the required bandwidth becomes available. According to another aspect of the present invention, there is provided a frequency channel allocation scheme in which a wireless network stores associations between forward and return frequency channels, so that when a mobile receiving a forward frequency channel requests return capacity, the network preferentially assigns return bandwidth to the mobile in one or more of the associated return channels. As a result, mobiles assigned capacity in a particular set of return channels are likely to be tuned to a small number of different forward channels, so that bandwidth allocation schedules for return channels need only be transmitted on a small number of associated forward channels. Aspects of the present invention extend to apparatus adapted to carry out the above methods and protocols, as well as signals generated by these methods and protocols. Specific embodiments of the present invention will now be described with reference to the accompanying drawings, in which: FIG. 1 is a diagram of components of a satellite communication system incorporating embodiments of the present invention; FIG. 2 shows the channels used for communication between the SAN and the MAN's in a packet data service implemented in the system of FIG. 1; FIG. 3 is a diagram of transmitter and receiver channel units in a satellite access node (SAN) of the system of FIG. 1; FIG. 4 is a diagram of transmitter and receiver channel units in a Mobile Access Node (MAN) of the system of FIG. 1; FIGS. 5a to 5d show the structure of one of the LESP channels of FIG. 4; FIG. 6a shows the burst structure of a 5 ms burst in one of the MESP channels of FIG. 4; FIG. 6b shows the burst structure of a 20 ms burst in one of the MESP channels of FIG. 4; FIG. 7 is a timing diagram illustrating the operation of an initial timing correction protocol for correcting the timing of transmissions in the MESP channels; FIG. 8a is a timing diagram illustrating the timing of a transmission in one of the MESP channels immediately following a timing correction; FIG. 8b is a timing diagram illustrating the timing of a transmission in one of the MESP channels at an interval after a timing correction, where there is timing uncertainty; FIG. 9 is a diagram of a MAC layer in one of the MAN's; and FIG. 10 is a diagram of a MAC layer in one of the SAN's. System Overview FIG. 1 shows the principal elements of a satellite communications system in an embodiment of the present invention. A plurality of Mobile Access Nodes (MAN) 2 communicate via a satellite 4 with a satellite earth station, hereinafter referred to as a Satellite Access Node (SAN) 6. The satellite 4 may for example be an Inmarsat-3™ satellite, as described for example in the article ‘Launch of a New Generation’ by J R Asker, TRANSAT, Issue 36, January 1996, pages 15 to 18, published by Inmarsat, the contents of which are included herein by reference. The satellite 4 is geostationary and projects a plurality of spot beams SB (five spot beams in the case of an Inmarsat-3™ satellite) and a global beam GB, which encompasses the coverage areas of the spot beams SB, on the earth's surface. The MAN's 2 may be portable satellite terminals having manually steerable antennas, of the type currently available for use with the Inmarsat mini-M™ service but with modifications as described hereafter. There may be a plurality of SAN's 6 within the coverage area of each satellite 4 and capable of supporting communications with the MAN's 2 and there may also be further geostationary satellites 4 with coverage areas which may or may not overlap that of the exemplary satellite 4. Each SAN 6 may form part of an Inmarsat Land Earth Station (LES) and share RF antennas and modulation/demodulation equipment with conventional parts of the LES. Each SAN 6 provides an interface between the communications link through the satellite 4 and one or more terrestrial networks 8, so as to connect the MAN's 2 to terrestrial access nodes (TAN) 10, which are connectable directly or indirectly through further networks to any of a number of communications services, such as Internet, PSTN or ISDN-based services. Channel Types FIG. 2 shows the channels used for communication between a sample one of the MAN's 2 and the SAN 6. All communications under this packet data service from the MAN 2 to the SAN 6 are carried on one or more slots of one or more TDMA channels, referred to as MESP channels (mobile earth station—packet channels). Each MESP channel is divided into 40 ms blocks, divisible into 20 ms blocks. Each 20 ms block carries either one 20 ms burst or four 5 ms bursts, in a format which will be described below. All communications under this packet data service from the SAN 6 to the MAN 2 are carried on one or more slots of one or more TDM channels, referred to as LESP channels (land earth station—packet channels). The slots are each 80 ms long, and comprise two subframes of equal length. For the purposes of channel set-up and other network signalling, the MAN 2 also communicates with a network co-ordination station (NCS) 5, as is known in the Inmarsat Mini-M™ service. The SAN 6 communicates through the network 8 to a regional land earth station (RLES) 9 which communicates with the NCS 5 so as to perform channel set-up and other network signalling. Satellite Link Interface The satellite link interface between the MAN's 2 and the SAN 6 to which the MAN's 2 are connected will now be described. This interface can be considered as a series of communications layers: a physical layer, a medium access control (MAC) layer and a service connection layer. SAN Channel Unit FIG. 3 shows the functions within the SAN 6 of a transmitter channel unit ST, which performs the transmission of data packets over a single frequency channel of the satellite link, and a receiver channel unit SR, which performs the reception of data packets over a single frequency channel of the satellite link. Preferably, the SAN 6 includes multiple transmitter channel units ST and receiver channel units SR so as to be able to provide communications services to a sufficient number of MAN's 2. A hardware adaptation layer (HAL) 10 provides an interface between the channel units and higher level software, and controls the settings of the channel units. In the transmitter channel unit ST, the HAL 10 outputs data bursts Td which are scrambled by a scrambler 12, the output timing of which is controlled by a frame timing function 14 which also provides frame timing control signals to the other transmitter channel units ST. The scrambled data bursts are then redundancy encoded by an encoder 16, by means for example of a turbo encoding algorithm as described in PCT/GB97/03551. The data and parity bits are output from the encoder 16 to a transmit synchronising function 18 which outputs the data and parity bits as sets of four bits for modulation by a 16QAM modulator 20. Unique word (UW) symbols are also input to the modulator 20 according to a slot format which is described below. The output timing of the encoder 16, transmit synchroniser 18 and modulator 20 is controlled by the HAL 10, which also selects the frequency of the transmit channel by controlling a transmit frequency synthesiser 22 to output an upconversion frequency signal. This frequency signal is combined with the output of the modulator 20 at an upconverter 24, the output of which is transmitted by an RF antenna (not shown) to the satellite 4. In the receiver channel unit SR, a frequency channel is received by an RF antenna (not shown) and downconverted by mixing with a downconversion frequency signal at a downconverter 26. The downconversion frequency signal is generated by a reception frequency signal synthesiser 28, the output frequency of which is controlled by the HAL 10. In order to demodulate the received bursts correctly, the timing of reception of the bursts is predicted by a receive timing controller 29, which receives the frame timing control information from the frame timing function 14 and parameters of the satellite 4 from the HAL 10. These parameters define the position of the satellite 4 and of its beams and allow the timing of arrival of data bursts from the MAN's 2 to the SAN 6 to be predicted. The propagation delay from the SAN 6 to the satellite 4 varies cyclically over a 24 hour period as a result of the inclination of the satellite's orbit. This delay variation is similar for all of the MAN's 2 and is therefore used to modify the reference timing of the MESP channels, so that the timing of the individual MAN's 2 does not need to be modified to compensate for variations in satellite position. The predicted timing information is output to each of the receive channel units SR. The received bursts are of either 5 ms or 20 ms duration according to a scheme controlled by the SAN 6. The HAL 10 provides information about the expected slot types to a slot controller 32, which also receives information from the receive timing controller 29. FIG. 3 shows separate reception paths for 5 ms and 20 ms bursts; references to functions on each of these paths will be denoted by the suffixes a and b respectively. The slot controller 32 selects which reception path to use for each received burst according to the predicted length of the burst. The burst is demodulated by a 16QAM demodulator 34a/34b and the timing of the burst is acquired by a UW acquisition stage 36a/36b. Once the start and end of the burst is determined, the burst is turbo-decoded by a decoder 38a/38b and descrambled by a descrambler 40a/40b. The recovered 5 or 20 ms data burst is then received by the HAL 10. MAN Channel Unit FIG. 4 shows the functions within one of the MAN's 2 of a receiver channel unit MR and a transmitter channel unit MT. The MAN 2 may have only one each of the receiver and transmitter channel unit, for reasons of compactness and cost, but if increased bandwidth capacity is required, multiple receiver and transmitter channel units may be incorporated in the MAN 2. In the receiver channel unit MR a signal is received by an antenna (not shown) and down-converted by a down-converter 42 which receives a down-conversion frequency signal from a receive frequency signal synthesiser 44, the frequency of which is controlled by an MAN hardware adaptation layer 46. The down-converted signal is demodulated by a 16QAM demodulator 48 which outputs the parallel bit values of each symbol to a UW detection stage 50, where the timing of the received signal is detected by identifying a unique word (UW) in the received signal. The timing information is sent to a frame and symbol timing unit 52 which stores timing information and controls the timing of the later stages of processing of the signal, as shown in FIG. 4. Once the block boundaries of the received data have been detected, the received blocks are turbo decoded by a decoder 54, descrambled by a descrambler 56 and output as received bursts to the HAL 46. In the transmitter channel unit MT, data for bursts of 5 or 20 ms duration are output from the HAL 46. Separate paths identified by the suffixes a and b are shown in FIG. 4 for the 5 and 20 ms bursts respectively. The data is scrambled by a scrambler 48a/48b and encoded by a turbo encoder 50a/50b. Unique Words (UW) are added as dictated by the burst format at step 52a/52b and the resultant data stream is mapped onto the transmission signal set at step 54a/54b and filtered at step 56a/56b. The transmission timing is controlled at a transmission timing control step 58a/58b. At this step, the TDMA slot position is controlled by a slot control step 60 according to a designated slot position indicated by the HAL 46. A timing offset is output by the HAL 46 and is supplied to a timing adjustment step 62 which adjusts the timing of the slot control step 60. This timing offset is used to compensate for variations in propagation delay caused by the relative position of the MAN 2, the satellite 4 and the SAN 6 and is controlled by a signalling protocol, as will be described in greater detail below. The sets of data bits are output at a time determined according to the slot timing and the timing adjustment to a 16QAM modulator 64. The modulated symbols are upconverted by an upconverter 66 to a transmission channel frequency determined by a frequency output by a transmission frequency synthesiser 68 controlled by the HAL 46. The upconverted signal is transmitted to the satellite 4 by an antenna (not shown). LESP Channel Format FIG. 5a shows the frame structure of one of the LESP channels. Each frame LPF has a duration of 80 ms and has a header consisting of a constant unique word UW which is the same for all frames. The unique word UW is used for frame acquisition, to resolve phase ambiguity of the output of the demodulator 48 and to synchronise the descrambler 56 and the decoder 54. FIG. 5b shows the structure of each frame, which consists of the unique word UW of 40 symbols. followed by 88 blocks of 29 symbols each followed by a single pilot symbol PS, terminating in 8 symbols so as to make up the total frame length to 2688 symbols, of which 2560 are data symbols. These data symbols are divided, as shown in FIG. 5c, into two subframes SF1, SF2 each encoded separately by the encoder 16, each of 5120 bits, making 1280 symbols. The encoder 16 has a coding rate of 0.509375, so that each subframe is encoded from an input block IB1, IB2 of 2608 bits, as shown in FIG. 5d. This structure is summarised below in Table 1: TABLE 1 LESP Frame Format Modulation 16QAM Data Rate (kbit/s) 65.2 Interface frame length (ms) 80 Interface Frame Size (bits) 5120 Subframe length (ms) 40 Input Bits per Subframe 2608 Coding Rate 0.509375 Output Bit per Subframe 5120 Output Symbol Per Subframe 1280 Frame Length (ms) 80 Data Symbol per Frame 2560 Pilot Symbol Insertion Rate 1/(29 + 1) Pilot Symbols per Frame 88 UW symbols 40 Frame Size 2688 Symbol Rate (ksym/s) 33.6 MESP Channel Format The MESP channel structure is based on 40 ms blocks with a channel timing referenced to the timing of the associated LESP channel as received by the MAN's 2. Each 40 ms block can be divided into two 20 ms slots, each of which can be further divided into four 5 ms slots, and the division of each block into slots is determined flexibly by higher level protocols. FIG. 6a shows the format of a 5 ms burst, consisting of a pre-burst guard time G1 of 6 symbols, a preamble CW of 4 symbols, an initial unique word UW1 of 20 symbols, a data subframe of 112 symbols, a final unique word UW2 of 20 symbols and a post-burst guard time G2 of 6 symbols. The preamble CW is not intended for synchronisation purposes by receivers (for example, the demodulators 30a, 30b) but conveniently provides a constant power level signal to assist the automatic level control of a high-power amplifier (HPA, not shown) in the transmitting MAN 2. In one example, each of the symbols of the preamble CW has the value (0,1,0,0). In an alternative format, the preamble may consist of less than 4 symbols and the symbol times not used by the preamble CW are added to the pre-burst and post-burst guard times G1, G2. For example, the preamble CW may be omitted altogether and the pre-and post-burst guard times increased to 8 symbols each. The unique words include only the symbols (1,1,1,1), which is mapped onto a phase of 45° at maximum amplitude, and (0,1,0,1), which is mapped onto a phase of 225° at maximum amplitude. Hence, the unique words are effectively BPSK modulated, although the symbols are modulated by the 16QAM modulator 64. Indicating the (1,1,1,1) symbol as (1) and the (0,1,0,1) symbol as (0), the initial unique word UW1 comprises the sequence 10101110011111100100, while the final unique word UW2 comprises the sequence of symbols 10111011010110000111. The 5 ms burst is designed for carrying short signalling messages or data messages; the structure is summarised below in Table 2: TABLE 2 5 ms Burst Structure Modulation 16QAM Input Bits per Burst 192 Coding rate 3/7 Output Bits per Burst 448 Output Symbols per Subframe 112 Preamble 4 Initial UW (symbols) 20 Final UW (symbols) 20 Total symbols 152 Total Guard Time (symbols) 12 Symbol Rate (ksym/s) 33.6 Slot Length (ms) 5 FIG. 6b shows the structure of a 20 ms burst of the MESP channel. The same reference numerals will be used to denote the parts of the structure corresponding to those of the 5 ms burst. The structure consists of a pre-burst guard time G1 of 6 symbols, a preamble CW of 4 symbols, an initial unique word UW1 of 40 symbols, a data subframe of 596 symbols, a final unique word of 20 symbols and a post-burst guard time G2 of 6 symbols. The structure is summarised below in Table 3: TABLE 3 20 ms Burst Structure Modulation 16QAM Input Bits per Burst 1192 Coding rate 1/2 Output Bits per Burst 2384 Output Symbols per Subframe 596 Preamble 4 Initial UW (symbols) 40 Final UW (symbols) 20 Total symbols 660 Total Guard Time (symbols) 12 Symbol Rate (ksym/s) 33.6 Slot Length (ms) 20 The preamble CW has the same form and purpose as that of the 5 ms burst. The initial unique word UW1 comprises the sequence: 0000010011010100111000010001111100101101 while the final unique word UW2 comprises the sequence 11101110000011010010, using the same convention as that of the 5 ms burst. MESP Timing Correction As shown above, the MESP slot structure incorporates a very short guard time of about 0.24 ms at each end. However, the difference in the SAN 6 to MAN 2 propagation delay between the MAN 2 being at the sub-satellite point and at the edge of coverage is about 40 ms for a geostationary satellite, so the position of each MAN 2 will affect the timing of reception of transmitted bursts in the MESP channel, and may cause interference between bursts from MAN's 2 at different distances from the sub-satellite point. Moreover the satellite, although nominally geostationary, is subject to perturbations which introduce a small inclination to the orbit and cause the distance between the satellite 4 and the SAN 6, and between the satellite 4 and the MAN 2, to oscillate. Although the position of the SAN 6 is fixed and that of the satellite 4 can be predicted, the MAN's are mobile and therefore their positions change unpredictably, and their clocks are subject to jitter and drift. A timing correction protocol is used by the SAN 6 to measure the propagation delay from the MAN 2 and send a timing correction value to the MAN 2 to compensate for differences in propagation delay between the different MAN's 2, so as to avoid interference between bursts from different MAN's caused by misalignment with the slots. The protocol will now be illustrated with reference to the timing diagram of FIG. 7. FIG. 7 shows LESP frames LPF including subframes SF1, SF2 and initial unique words UW. When the MAN 2 is switched on, or is able to acquire one of the LESP channels after an interval of not being able to do so, the MAN 2 receives (step 70) a 40 ms LESP subframe SF including return schedule information which dictates the slot usage of a corresponding MESP channel. Return schedule information is transmitted periodically with a periodicity controlled by the SAN 6. The subframe SF includes the designation of a block of at least nine contiguous 5 ms slots as a timing acquisition group consisting of random access slots not assigned to any specific MAN 2. The MESP return schedule to which the subframe SF relates begins 120 ms after the beginning of reception of the subframe SF. This 120 ms period allows 90 ms for the MAN 2 to demodulate the LESP subframe SF (step 72) and 30 ms for the MAN 2 to initialise itself for transmission (step 74). At the beginning of the MESP return schedule there is allocated a timing allocation group of 5 ms slots. Initially, it is assumed that the MAN 2 has the maximum timing uncertainty of 40 ms, corresponding to eight 5 ms slots. Therefore, the MAN 2 can only transmit after the first eight slots of the timing acquisition group, and cannot transmit at all in acquisition groups containing less than nine slots, so as to avoid interfering with transmissions in slots preceding the timing acquisition group. The MAN 2 randomly selects (step 78) one of the slots of the timing acquisition group following the first eight slots and transmits (step 79) a burst in the selected slot, the burst including an indication of the slot selected. In the example shown in FIG. 7, the slots of the timing acquisition group are numbered from 0 to M-1, where M is the number of slots in the timing acquisition group, and the number R, selected at random from 8 to M-1, is transmitted in the burst at step 79. The burst may also indicate the type of the mobile, such as land-based, maritime or aeronautical. The SAN 6 receives and records the time of arrival of the burst transmitted by the MAN 2. From the slot number R indicated in the burst, the SAN 6 calculates the differential propagation delay to that MAN 2. Since the timing of transmission of the burst was (120+R×5) ms after the time of reception of the LESP subframe SF, the timing of reception TR of the burst is approximately (2×DP+C+120+5×R) ms after the time of transmission of the LESP subframe LPSF, where DP is the differential propagation delay to that MAN 2 and C is a delay which is the same for all the MAN's in a group, and includes various factors such as the propagation delay to and from the satellite 4 and the retransmission delay of the satellite 4. Hence, in this example, the differential propagation delay is calculated as: DP=TR−C−120−5×R (1) The SAN 6 then transmits to the MAN 2 a data packet indicating a timing correction offset X in the range 0 to 40 ms. The offset replaces the initial timing offset of 40 ms in step 76, for subsequent transmissions. The MAN 2 receives the timing correction offset and adjusts its transmission timing accordingly. If the burst transmitted by the MAN 2 interferes with a burst transmitted by another MAN 2 also attempting to receive a timing correction, the SAN 6 may not be able to read the contents of either burst and in that case will not transmit a timing offset correction to either MAN 2. If the MAN 2 does not receive a timing offset correction from the SAN 6 within a predetermined time, the MAN 2 waits for a random interval within a predetermined range before attempting to transmit a burst in the next subsequently available timing acquisition group. The predetermined range of intervals is determined by a signalling packet transmitted by the SAN 6 which indicates maximum and minimum intervals to be observed by MAN's 2 after a first unsuccessful transmission before attempting retransmission, together with a further waiting interval to be added to the total waiting interval each time a further retransmission is made following an unsuccessful transmission. FIG. 8a illustrates the transmission timing of one of the MAN's 2 which has previously received a timing correction offset value X. As in FIG. 7, the MAN 2 receives (step 80) the LESP subframe SF which includes return schedule information. The MAN 2 demodulates (step 82) the LESP subframe LPSF and initialises (step 84) its transmitting channel unit, during a total allotted time of 120 ms after the beginning of reception of the LESP subframe LPSF. The MAN 2 calculates the start of the MESP return schedule as being (120+X) ms from the beginning of reception of the subframe SF which carries the return schedule information. The MAN 2 therefore waits for the timing offset period X (step 86) after the end of the 120 ms period before being able to transmit. In this example, the return schedule dictated by the LESP subframe LPSF includes a four 5 ms slots, followed by a 20 ms slot. If the MAN 2 has been allocated a 20 ms slot, then it will transmit (step 88) in the designated 20 ms slot; if the MAN 2 has been allocated a 5 ms slot, then it will transmit in the designated 5 ms slot. Alternatively, if the 5 ms slots are designated as being random access slots and the MAN 2 has a short packet that is due to be sent to the SAN 6, the MAN 2 selects one of the four slots at random and transmits in that slot (step 89). If the SAN 6 detects from the transmission by the MAN 2 that a correction in the timing offset is needed, for example if the time between the start of the burst and the slot boundary as measured by the SAN 6 is less than a predetermined number of symbols, the SAN 6 indicates a new timing correction to the MAN 2 in a subsequent data packet. This may be indicated as an absolute timing offset X or as a relative timing offset to be added or subtracted from the current value of X. Timing Uncertainty In the timing correction offset burst the SAN 6 transmits to the MAN 2, together with the timing offset, a timing uncertainty rate RU indicating the rate at which the timing of the MAN 2 is likely to change. For example, the timing uncertainty rate may represent a number of symbols per second by which the MAN 2 is likely to change its timing. The SAN 6 determines the timing uncertainty rate from the class of the MAN 2 (e.g. land mobile, aeronautical) and other factors such as the inclination of the orbit of the satellite 6. The MAN 2 times the interval elapsed since the last timing correction was received and multiplies this by the timing uncertainty rate RU to give a timing uncertainty tU, where tU=MIN (T−TC×RU, 40 ms) (2) where T is the current time and TC is the time at which the last correction was received. The MIN function means that the timing uncertainty cannot exceed the maximum uncertainty of 40 ms. The timing offset X is reduced by the timing uncertainty tU such that: X=MIN(XC−tU, 0) (3) where Xc is the initial value of X indicated in the last timing correction, the MIN function ensuring that X cannot fall below zero. FIG. 8b illustrates the transmission timing of one of the MAN's 2 with timing uncertainty. Steps 80 to 84 correspond to those shown in FIG. 8a and their description will not be repeated. At step 86, the MAN 2 calculates the MESP return schedule as starting (120+X) ms after the beginning of reception of the subframe SF, using the value of X as reduced by the timing uncertainty tu. As a result of the timing uncertainty tU, the MAN 2 must ignore the first I slots of a random access group, where I=INT[(tS−tG+tU)/tS] (4) tS is the slot duration of 5 ms and tG is the guard time G1, which is 6 symbol periods in this case. In the example shown in FIG. 8b, there are four 5 ms slots at the start of the MESP return schedule, but tu is 7 ms, so that the first two slots must be ignored. The MAN 2 can then only transmit in the third and fourth slots. If the timing uncertainty tu is greater than a predetermined value, such as the value of the guard time. the MAN 2 reverts to the random access timing correction request process shown in FIG. 7 and inhibits transmission in time slots allocated exclusively to itself, except where a sufficient number of these are concatenated so that their total length can accommodate both the timing uncertainty and the burst itself, until a new timing correction offset has been received from the SAN 6. However, the protocol differs from that of FIG. 7 in that the MAN 2 uses its current timing offset X instead of returning to the default value of 40 ms in step 76. This protocol reduces the chance of interference between bursts in allocated slots. In the above embodiment, the timing offset X is reduced by the timing uncertainty tU for all transmissions by the MAN 2. In an alternative embodiment, the timing offset X is reduced by the timing uncertainty tU only for transmissions by the MAN 2 in random access slots, while the original timing offset XC received in the last timing correction message from the SAN 6 is applied when transmitting in allocated slots. In this alternative embodiment, it is important to distinguish between timing correction messages initiated by the SAN 6, after detection of a transmission by the MAN 2 in an allocated slot too close to the slot boundary, and timing correction messages sent by the SAN 6 in response to a timing correction request by the MAN 2, which will have a different timing offset from the transmissions in allocated slots. Therefore, the SAN 6 indicates in the timing correction message whether this is being sent in response to a request by the MAN 2, or was initiated by the SAN 6. The MAN 2 then determines the new timing offset XC from the timing offset indicated in the timing correction message according to how the timing correction message was initiated. MAC Layer As described above, the satellite link interface at each of the MAN's 2 and at the SAN 6 includes a medium access control (MAC) layer which provides an interface between the physical layer, aspects of which are described above, and the service connection layer, which provides access to the satellite link for one or more service connections. The MAC layer may have a structure substantially as described in UK patent application no. 9822145.0. FIG. 9 illustrates the layer structure at the MAN 2, with a physical layer MPL managing the transmission of packets on one of the MESP channels and the reception of packets on one of the LESP channels, and the MAC layer MMAC dynamically mapping service connections at the service connection layer MSCL to slots in the MESP and LESP channels. FIG. 10 illustrates the layer structure at the SAN 6, with a physical layer LPL managing the transmission of packets on multiple LESP channels and reception of packets on multiple MESP channels, and the MAC layer LMAC dynamically mapping service connections at the service connection layer LSCL to slots in the MESP and LESP channels. The SAN MAC layer LMAC is responsible for allocating channel resources both on the LESP and on the MESP channels. The MAN MAC layer MMAC generates signalling packets indicating its current channel requirements for supporting the quality of service (QoS) requirements of all of the service connections of the service connection layer MSCL. The term ‘quality of service’ (QoS) includes one or more of minimum and maximum bitrate. average bitrate, and maximum delay requirements and may also include other requirements peculiar to certain types of communication. For example, where encryption is handled at the physical layer and encrypted data are transmitted on a dedicated channel, the quality of service may include an encryption requirement. The service connections may specify, both when being set up and during the lifetime of a service connection. QoS parameters without the need to specify how this QoS is to be achieved and it is the task of the MAC layer to meet the QoS requirements of all its service connections in the mapping of the service connections onto the physical layer. The MAN MAC layer MMAC requests the channel capacity necessary for this task by sending signalling packets to the SAN MAC layer LMAC. The SAN MAC layer determines how the LESP channel slots are to be assigned to its own transmitting service connections, determines the sequence of 5 ms and 20 ms slots in each MESP channel and the allocation of these slots to the MAN's 2 or to random access, and transmits signalling packets, indicating the slot sequences and allocations, in the LESP channels. Each LESP subframe contains one-or more packets of variable length with any unused bits being filled with padding bits. The MAN MAC layer MMAC receives the packet indicating its current allocation and decides how this allocation is to be divided between its service connections. Each MAC layer MAC receives data from service connections, formats the data into packets, and maps the data packets onto physical channels according to the current allocation scheme. Each data packet includes an identifier field identifying to which service connection the packet belongs. The receiving MAC layer receives data packets read by the physical layer and assigns the data contents to the service connections identified by the packets. The packets are of variable length depending on their type and content, and each LESP subframe or MESP 5 or 20ms burst can contain an integral number of packets, with padding if not all of the data bits are used. Resource Management Resource management algorithms are performed by the SAN MAC layer LMAC in order to meet the QoS requirements of each MAN MAC layer MMAC as closely as possible, as will now be described. Periodically, the SAN 6 transmits a return schedule signalling packet on one or more of the LESP channels, indicating the allocation of slots in one of the MESP channels. The SAN MAC layer LMAC selects on which LESP channel to transmit a return schedule signalling packet according to the current allocation of MAN's 2 to the LESP channels and the MAN's which are allocated capacity in the return schedule. Thus, a return schedule signalling packet allocating MESP capacity to one of the MAN's 2 is transmitted on the LESP channel to which that MAN 2 is tuned. To minimise the number of different return schedules which need to be transmitted, the SAN MAC layer LMAC stores an association table linking a set of one or more MESP frequency channels to each of the LESP frequency channels. Where a MAN 2 is tuned to a specified LESP channel, the SAN MAC layer LMAC preferentially assigns capacity to that MAN 2 on the MESP channel or channels linked to that LESP channel. The association table is not fixed, but may be modified by the SAN MAC layer LMAC. Each MESP channel may be associated with more than one LESP channel. The return schedule also allocates random access slots in the MESP channels linked to the LESP channel on which the return schedule is broadcast. Even if the whole of an MESP channel is allocated as random access, the return schedule indicating this will be transmitted on each of the forward bearers linked to that MESP channel. Each MAN MAC layer MMAC sends signalling packets to the SAN MAC layer LMAC, including a queue status report indicating how much data needs to be transmitted and the time at which the data needs to be sent. The queue status report has three fields: the latest delivery time of the data packet at the head of the queue and therefore with highest priority, the latest delivery time of the data packet at the tail of the queue and therefore having the lowest priority, and the total length of data in the queue, as shown in Table 4 below: TABLE 4 Status Packet Format Bits 8 7 6 5 4 3 2 1 Octet 1 x 0 0 0 1 1 0 0 Octet 2 <SeqNum> U < Octet 3 Queue Length> Octet 4 <Time Head Octet 5 > < Octet 6 Time Tail> where the fields are defined as follows: SeqNum: Identifies the sequence number of the status packet, so that the SAN 6 can identify the sequence order of different status packets from the same MAN 2; U: Small units flag, which identifies whether the subsequent queue length is expressed in large or small units of data; the large units may be equal to the capacity of a 20 ms slot; Queue Length: the length of the data queue at the MAN2, expressed in large or small units according to the small units flag; Time-Head: the delivery time, as an offset from the time of transmission of the queue status report, of the first packet in the data queue; and Time-Tail: the delivery time, as an offset from the time of transmission of the queue status report, of the last packet in the data queue. This format is particularly efficient in that it avoids transmitting the transmission time requirements of each of the data packets, which would require too great a signalling overhead, while providing the SAN MAC layer LMAC with enough information to decide how much capacity, and when, to allocate to the requesting MAN 2. However, the queue status reports still take up significant bandwidth on the MESP channels which may be required to transmit data packets at times of high loading. Moreover, the MAN MAC layer MMAC may transmit queue status information in a contention based slot if no reserved capacity is available, increasing the probability of collision in the contention based slots. To reduce the contention slot loading, and therefore to allow some of this bandwidth to be reclaimed for data packet allocation, the SAN 6 may transmit reporting level control signalling packets addressed to all the MAN's 2. The control signalling packets may indicate the minimum delay required before queue status should be reported in a contention slot, and also a reporting control parameter which determines whether the MAN's 2 will transmit queue status information as soon as possible (subject to the minimum delay), as late as possible, or at a specified point between these two extremes. The latest possible delay is determined from the QoS delay requirements and the round trip (MAN-SAN-MAN) delay and allows for only a minimum time for the SAN 6 to allocate the return capacity on receipt of the queue status information. Each MAN MAC layer MMAC, on receiving a reporting level control signalling packet, applies the parameters indicated therein. In cases where the QoS demands of the service connections to a MAN 2 increase very quickly, a long minimum reporting interval and/or a high reporting control parameter may delay the MAN MAC layer's requests for capacity so that the SAN 6 is unable to meet the required delay times indicated for all the MAN's within the QoS delay requirements. A short minimum reporting interval and/or a low reporting control parameter will increase the probability of the MAN MAC layer requests reaching the SAN 6 in time for the required capacity to be allocated but will increase the number of contention slots required. The SAN 6 may determine the appropriate parameters for the mix of traffic being carried. The SAN MAC layer LMAC periodically allocates a contiguous block of at least nine 5 ms slots as a timing acquisition group and transmits a signalling packet indicating this allocation. The length and frequency of timing acquisition groups is allocated by the SAN MAC layer LMAC according to anticipated demand (which may be determined by detected timing acquisition group loading), subject to a predetermined maximum interval between timing acquisition groups, to allow efficient operation of the timing acquisition protocol. The SAN MAC layer LMAC also determines the minimum and maximum randomising intervals and further interval by which the MAN's 2 wait, as described above, before retransmitting a timing acquisition burst following an unsuccessful timing acquisition. These intervals determine the timing spread of timing acquisition burst retransmissions and are selected so as to keep the probability of collision between retransmissions low, without causing excessive delay to the MAN's 2 performing timing acquisition. The SAN MAC layer LMAC also monitors the traffic transmitted on the LESP channels in order to predict the future transmission capacity needs of each of the MAN's 2. For example, for each service connection which is operating in ARQ mode, resources are allocated to the MAN 2 through which the connection is operating when an ARQ time-out period is about to expire. Service-specific resource prediction may also be performed. For example, if the SAN MAC layer LMAC detects that a packet transmitted to a MAN 2 contains a request for transmission of a block of data, the capacity necessary to transmit that block of data is allocated to the MAN 2 without waiting for the MAN 2 to request the additional capacity. However, it may not be possible to interpret the data contents of packets, for example if the contents are already encrypted or the type of application is unknown to the SAN MAC layer LMAC. Moreover, the interpretation of user data by communications interfaces may not be acceptable to users. Therefore, additionally or alternatively a statistical model may be stored at the SAN 6 and used to predict demand by the MAN's 2; optionally, the statistical model may be modified by monitoring the traffic flow on individual duplex connections over the LESP and MESP channels and deducing statistical patterns. For example, it may be detected that a sequence of short data packets with a constant length and interval transmitted to a service connection on the MAN 2 is usually followed by a high flow of data transmitted by the MAN 2 from that service connection. The statistical model is then updated so that, every time the same sequence of data packets is subsequently detected, additional capacity is allocated to the MAN 2 in the from-mobile direction, if available. This reverse data flow prediction reduces the amount of queue status signalling that need to be transmitted by the MAN 2. The above embodiments have been described with reference to certain Inmarsat™ systems purely by way of example and aspects of the present invention are not limited thereto. Instead, aspects of the present invention may be applied to terrestrial wireless networks, particularly those that support contention-based access. The above embodiments are illustrated with reference to an architecture in which multiple mobile terminals access a network via a single access point (the SAN) via a satellite which acts only as a repeater. However, aspects of the present invention are also applicable to satellite networks in which one or more satellites perform resource management and/or formatting functions. Furthermore, it is not essential that the mobile terminals receive resource allocation signals from the same node with which the allocated resources are used to communicate. While the apparatus of the specific embodiments has been described in terms of functional blocks, these blocks do not necessarily correspond to discrete hardware or software objects. As is well known, most baseband functions may in practice be performed by suitably programmed DSP's or general purpose processors and the software may be optimised for speed rather than structure.
20040312
20090414
20050203
68275.0
0
NGUYEN, TU X
METHOD AND APPARATUS FOR CONTROLLING TRANSMISSIONS IN COMMUNICATIONS SYSTEMS
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,798,680
ACCEPTED
Methods and structure for testing responses from SAS device controllers or expanders
Improved methods and structures for testing of SAS components, in situ, in a SAS domain. A first SAS component is adapted to generate stimuli such as error conditions to elicit a response to the error condition from a second SAS component coupled to the first in the intended SAS domain configuration. In one aspect, a SAS device controller generates stimuli applied to a SAS expander coupled thereto and verifies proper response from the SAS expander. In another aspect, a SAS expander generates stimuli applied to a SAS device controller coupled thereto and verifies proper response from the SAS device controller. Stimuli may be generated by custom circuits or firmware/software within the first component. Vendor specific SAS SMP transactions may be used to cause the first component to enter the special verification mode.
1. A method for testing a SAS component in situ in a SAS domain, the method comprising: generating a stimulus representing an anomalous condition within a first SAS component; applying the stimulus to a second SAS component coupled to the first SAS component; receiving within the first SAS component a response from the second SAS component; and verifying within the first SAS component the received response. 2. The method of claim 1 wherein the first SAS component is a SAS device controller and the second SAS component is a SAS expander. 3. The method of claim 1 wherein the first SAS component is a SAS expander and the second SAS component is a SAS device controller. 4. The method of claim 1 wherein the step of generating comprises generating an exception primitive. 5. The method of claim 4 wherein the step of generating an exception primitive comprises generating at least one of: BREAK, BROADCAST, NAK, and ERROR. 6. The method of claim 1 wherein the step of generating comprises generating invalid frames. 7. The method of claim 6 wherein the step of generating invalid frames comprises generating at least one of: a frame with a CRC error, an invalid SMP Response frame, an illegal frame type, a frame with an invalid SAS address, a frame representing an invalid SAS protocol a frame indicating an invalid connection rate, a character representing an invalid primitive, and a frame with an invalid SMP function. 8. The method of claim 1 further comprising: configuring the first SAS component to enable testing operation. 9. The method of claim 8 wherein the step of configuring comprises: transmitting an SMP Request to the first SAS component requesting that the first SAS component commence testing operation of the second SAS component. 10. The method of claim 9 wherein the SMP Request is a vendor specific SMP Request. 11. A system comprising: a SAS communication medium; a first SAS component coupled to the SAS communication medium; a second SAS component coupled to the SAS communication medium wherein the second SAS component is adapted to generate a stimulus representing an anomalous condition and wherein the second SAS component is further adapted to apply the generated stimulus to the first SAS component. 12. The system of claim 11 wherein the second SAS component is further adapted to verify a response received from the first SAS component in response to the generated stimulus applied to the first SAS component. 13. The system of claim 11 wherein the first SAS component is a SAS device controller and the second SAS component is a SAS expander. 14. The system of claim 11 wherein the first SAS component is a SAS expander and the second SAS component is a SAS device controller. 15. The system of claim 11 wherein the second SAS component is adapted to selectively enable generation of the stimulus. 16. The system of claim 15 wherein the second SAS component is selectively enabled to generate the stimulus in response to a vendor specific SMP Request received by the second SAS component. 17. A system for testing a SAS component in situ in a SAS domain, the system comprising: means for generating a stimulus representing an anomalous condition within a first SAS component; means for applying the stimulus to a second SAS component coupled to the first SAS component; means for receiving within the first SAS component a response from the second SAS component; and means for verifying within the first SAS component the received response. 18. The system of claim 17 wherein the first SAS component is a SAS device controller and the second SAS component is a SAS expander. 19. The system of claim 17 wherein the first SAS component is a SAS expander and the second SAS component is a SAS device controller. 20. The system of claim 17 further comprising: means for configuring the first SAS component to enable testing operation. 21. The system of claim 20 wherein the means for configuring comprises: means for transmitting an SMP Request to the first SAS component requesting that the first SAS component commence testing operation of the second SAS component. 22. The system of claim 21 wherein the SMP Request is a vendor specific SMP Request.
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention relates generally to serial attached SCSI (“SAS”) domains and more specifically to testing of responses to stimuli applied to SAS device controllers or SAS expanders. 2. Discussion of Related Art Small Computer Systems Interface (“SCSI”) is a set of American National Standards Institute (“ANSI”) standard electronic interface specification that allow, for example, computers to communicate with peripheral hardware. Common SCSI compatible peripheral devices may include: disk drives, tape drives, Compact Disc-Read Only Memory (“CD-ROM”) drives, printers and scanners. SCSI as originally created included both a command/response data structure specification and an interface and protocol standard for a parallel bus structure for attachment of devices. SCSI has evolved from exclusively parallel interfaces to include both parallel and serial interfaces. “SCSI” is now generally understood as referring either to the communication transport media (parallel bus structures and various serial transports) or to a plurality of primary commands common to most devices and command sets to meet the needs of specific device types as well as a variety of interface standards and protocols. The collection of primary commands and other command sets may be used with SCSI parallel interfaces as well as with serial interfaces. The serial interface transport media standards that support SCSI command processing include: Fibre Channel, Serial Bus Protocol (used with the Institute of Electrical and Electronics Engineers 1394 FireWire physical protocol; “IEEE 1394”) and the Serial Storage Protocol (SSP). SCSI interface transports and commands are also used to interconnect networks of storage devices with processing devices. For example, serial SCSI transport media and protocols such as Serial Attached SCSI (“SAS”) and Serial Advanced Technology Attachment (“SATA”) may be used in such networks. These applications are often referred to as storage networks. Those skilled in the art are familiar with SAS and SATA standards as well as other SCSI related specifications and standards. Information about such interfaces and commands is generally obtainable at the website http://www.t10.org. Such SCSI storage networks are often used in large storage systems having a plurality of disk drives to store data for organizations and/or businesses. The network architecture allows storage devices to be physically dispersed in an enterprise while continuing to directly support SCSI commands directly. This architecture allows for distribution of the storage components in an enterprise without the need for added overhead in converting storage requests from SCSI commands into other network commands and then back into lower level SCSI storage related commands. A SAS network typically comprises one or more SAS initiators coupled to one or more SAS targets often via one or more SAS expanders. In general, as is common in all SCSI communications, SAS initiators initiate communications with SAS targets. The expanders expand the number of ports of a SAS network domain used to interconnect SAS initiators and SAS targets (collectively referred to as SAS devices or SAS device controllers). It is a particular problem to thoroughly test SAS device controllers and SAS expanders as regards the full complement of possible responses to command, status or data exchanges and associated anomalous conditions. For example, it is a particular difficulty to verify proper operation of a SAS device controller or SAS expander in response to certain anomalous communication conditions such as BREAK, BROADCAST, and NAK conditions, or CRC errors, or invalid protocols or packets, etc. Prior techniques address this testing dilemma through external SAS emulators to generate a variety of stimuli including anomalous conditions and SAS analyzers to detect and verify the response from the SAS device controller or SAS expander under test. An exemplary SAS emulator may be programmed by a user to generate particular desired sequences and apply the desired sequences as a stimulus to the attached SAS expander or SAS device controller. The response generated may then be captured and analyzed to verify proper operation. Though the emulation and analyzer features may be integrated in a single test component, such external SAS analyzers and emulators can be costly devices. Furthermore, coupling an external test component to the SAS device controller or SAS expander under test may induce undesirable characteristics into the system under test. Since the external SAS analyzer or emulator must couple into the transport media coupled to the SAS device controller or SAS expander under test, by definition the analysis and testing is not performed in a real world environment in which the system may be normally configured. It is evident from the above discussion that a need exists for improved testing of SAS device controllers and SAS expanders in an environment more closely resembling real world application environments in which the SAS device controller or SAS expander may be configured. SUMMARY OF THE INVENTION The present invention solves the above and other problems, thereby advancing the state of the useful arts, by providing methods and structures for improved testing of SAS device controllers and SAS expanders in an environment closely resembling a real world environment in which such devices and expanders are applied. In one aspect hereof, the responses of a SAS device controller under test may be analyzed based upon stimuli generated by a SAS expander suitably programmed and applied to the SAS device controller over an appropriate transport medium. In such a test environment, responses of the SAS device controller may be evaluated in an environment more closely resembling the intended application environment for the SAS device controller (i.e., coupled to the SAS expander through the transport medium intended for such use). In another aspect hereof, responses of a SAS expander under test may be analyzed based upon stimuli generated by a SAS device controller suitably programmed and applied to the SAS expander over an appropriate transport medium. In such a test environment, responses of the SAS expander may be evaluated in an environment more closely resembling the intended application environment for this SAS expander (i.e., coupled to the SAS device controller through the transport medium intended for such use). A feature hereof therefore provides a method for testing a SAS component in situ in a SAS domain, the method comprising: generating a stimulus representing an anomalous condition within a first SAS component; applying the stimulus to a second SAS component coupled to the first SAS component; receiving within the first SAS component a response from the second SAS component; and verifying within the first SAS component the received response. Another aspect hereof further provides that the first SAS component is a SAS device controller and the second SAS component is a SAS expander. Another aspect hereof further provides that the first SAS component is a SAS expander and the second SAS component is a SAS device controller. Another aspect hereof further provides that step of generating comprises generating an exception primitive. Another aspect hereof further provides that the step of generating an exception primitive comprises generating at least one of: BREAK, BROADCAST, NAK, and ERROR. Another aspect hereof further provides that the step of generating comprises generating invalid frames. Another aspect hereof further provides that the step of generating invalid frames comprises generating at least one of: a frame with a CRC error, an invalid SMP Response frame, an illegal frame type, a frame with an invalid SAS address, a frame representing an invalid SAS protocol a frame indicating an invalid connection rate, a character representing an invalid primitive, and a frame with an invalid SMP function. Another aspect hereof further provides for configuring the first SAS component to enable testing operation. Another aspect hereof further provides that the step of configuring comprises: transmitting an SMP Request to the first SAS component requesting that the first SAS component commence testing operation of the second SAS component. Another aspect hereof further provides that the SMP Request is a vendor specific SMP Request. Another feature hereof provides for a system comprising: a SAS communication medium; a first SAS component coupled to the SAS communication medium; a second SAS component coupled to the SAS communication medium wherein the second SAS component is adapted to generate a stimulus representing an anomalous condition and wherein the second SAS component is further adapted to apply the generated stimulus to the first SAS component. Another aspect hereof further provides that the second SAS component is further adapted to verify a response received from the first SAS component in response to the generated stimulus applied to the first SAS component. Another aspect hereof further provides that the second SAS component is adapted to selectively enable generation of the stimulus. Another aspect hereof further provides that the second SAS component is selectively enabled to generate the stimulus in response to a vendor specific SMP Request received by the second SAS component. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a SAS domain embodying features and aspects hereof. FIG. 2 is a block diagram of an exemplary enhanced SAS component in accordance with features and aspects hereof. FIG. 3 is a block diagram providing a function/logical decomposition of an enhanced test mode control elements in accordance with features and aspects hereof. FIG. 4 is a flowchart describing methods of operation of an enhanced SAS component in accordance with features and aspects hereof. DETAILED DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of an exemplary SAS domain 100 including features and aspects hereof. SAS domain consists of a plurality of SAS devices (some acting as initiators and some acting as targets) and one or more SAS expander components to permit flexible expansion and configuration of ports coupling the various SAS devices to one another. As shown in FIG. 1, SAS device controllers 101, 102 and 108 are coupled to one another through SAS expanders 104 and 106. Though not shown, it is common for devices to be coupled through multiple paths and/or multiple expanders. In other words, multiple redundant ports and paths may be employed to couple devices and expanders to one another. “SAS component” as used herein refers to SAS devices (or SAS device controllers—whether initiators or targets) as well as SAS expanders. “SAS device controller” as used herein refers to control logic features within a SAS device used for coupling the SAS device to the SAS domain. Such a SAS device controller may be implemented as standard or customized circuits providing logic for interacting with other SAS components of a SAS domain in accordance with SAS specifications. Further, such a SAS device controller may be implemented as programmed instructions executed by a suitably programmable general or special purpose processor. Such design choices to implement as custom or standard circuits or as programmed instructions are well known to those of ordinary skill in the art. Similarly, SAS expanders (such as expanders 104 and 106) may be implemented as customized or standard integrated circuit components or other electronic circuit designs. Often, such SAS expander circuit designs include programmable general or special purpose processors such that various logic and control features of the SAS expander may be provided by suitably programmed instructions. The enhanced test mode features and aspects hereof may therefore be implemented within the circuits or programmed instructions of the SAS expander. Such design choices for SAS expander components are well known to those of ordinary skill in the art. In accordance with features and aspects hereof, a SAS device controller 108 may be enhanced to test functionality of a SAS expander (i.e., SAS expander 106 coupled to enhanced SAS device controller 108). Features and aspects hereof operable within enhanced SAS device controller 108 may implement testing of SAS expander 106 by generating stimuli and applying the stimuli to the SAS expander to test a variety of responses from SAS expander 106. More specifically, numerous anomalous conditions may be generated by creating appropriate stimuli within enhanced SAS device controller 108 and applying the generated stimuli to SAS expander under test 106. The anomalous conditions may include any of several exception and error conditions not frequently encountered in normal operation of SAS domain 100. In like manner, SAS expander 104 is enhanced in accordance with features and aspects hereof to permit testing of SAS device controllers 101 and 102 coupled thereto. As above with respect to enhanced SAS device controller 108, enhanced SAS expander 104 may include custom or standard circuits or logic for generating anomalous condition stimuli to be applied to SAS device controllers under test 101 and 102. More generally, FIG. 1 therefore shows a variety of examples where a first SAS component is operable to test operations of a second SAS component. For example, first SAS component 108 is operable to test operation of second SAS component expander 106. Or, for example, first SAS component 104 is operable to test second SAS components 101 and 102. In accordance with testing features and aspects hereof discussed further herein below, a first SAS component generates stimuli representing any of several anomalous conditions not frequently encountered during normal operation of SAS domain 100. The stimuli so generated are applied by the first SAS component to the second SAS component (the SAS component under test). The second SAS component will receive the generated stimuli and, if operating properly, will generate an appropriate response in accordance with SAS specifications and protocols. The first SAS component receives the response generated by the second SAS component and verifies propriety of the received response with respect to corresponding SAS specifications and protocols. The first SAS component may be directed to enter a test mode to commence such testing operations by any means including, for example, an external request such as test requestor 110 of FIG. 1. Test requestor 110 therefore represents any means for signaling the first SAS component to enter a test mode in accordance with features and aspects hereof. In accordance with features and aspects hereof, test requester 110 may include logic internal to SAS domain 100 (not shown) or external from SAS domain 100 (as shown). Further, the logic of test requestor 110 may be incorporated within the first SAS component and actuated in response to external user input (not shown). Where, for example, the first SAS component is a SAS device controller, the system which incorporates the SAS device controller logic may provide signals outside the normal band of SAS domain communication directing the SAS device controller circuits to enter test mode in accordance with features and aspects hereof. In another example, where the first SAS component is a SAS expander enhanced in accordance with features and aspects hereof, a SAS device coupled to a port of the SAS expander may instruct the SAS expander to enter the test mode features and aspects hereof by transmitting an appropriate message to the enhanced SAS expander. The message so transmitted and received indicates to the SAS expander that it should commence testing of one or more SAS devices coupled to the SAS expander. In one aspect hereof, such a message may be transmitted and received as a SAS SMP message request message. More specifically, in another aspect hereof, the message may be a SAS SMP request providing a vendor unique function or code to request that the SAS expander commence testing of one or more attached SAS devices. FIG. 1 also shows a first SAS component (SAS device controller 108) coupled directly to a second SAS component (SAS device controller 112) and adapted to test responses generated by SAS device controller 112. This configuration demonstrates another variant of SAS topologies, as known to those of ordinary skill in the art, wherein SAS devices are directly coupled (i.e., initiator to target) without need for an intermediate SAS expander. Those of ordinary skill in the art will recognize a wide variety of equivalent SAS domain topologies and architectures wherein features and aspects hereof to provide enhanced testing of SAS components may be provided. A particular feature and aspect hereof provides that the testing performed is within the SAS domain 100 as generally configured for the desired application. In other words, the testing performed by features and aspects hereof is performed in situ within the SAS domain 100 configured as desired for its intended application. By contrast with previous techniques and structures using external analyzers and emulators, features and aspects hereof are capable of testing SAS devices and SAS expanders (i.e., SAS components) in an environment more closely related to that in which they are intended to operate for a particular application. FIG. 2 is a block diagram providing additional detail of an exemplary enhanced SAS component 200 operable in accordance with features and aspects hereof as a first SAS component to provide testing of a second SAS component coupled thereto. Enhanced SAS component 200 may include SAS component functional logic and interface 208 to provide any requisite functions for control of the SAS component and/or for interfacing between the SAS component and a system incorporating the component (such as a system incorporating a SAS device controller). Normal SAS component logic 202 is coupled to SAS component functional logic and interface 208 via path 220. Normal SAS component logic 202 provides standard SAS interface and protocol management and control in accordance with standard SAS specifications and protocols. In response to functions requested through SAS component functional logic and interface 208 and applied to normal SAS component logic 202 via path 220, SAS protocol exchanges are performed via path 226 through switch/multiplexer 206 and applied to SAS transport medium 230. Elements 208 and 202 and the associated paths through the SAS transport medium 230 therefore provide for normal operation of the enhanced SAS component 200. Normal SAS component operation transmitting and receiving SAS messages performed by a SAS device controller or a SAS expander may be controlled and managed through these components and internal paths. In accordance with the enhanced test mode features and aspects hereof, enhanced SAS component 200 may include enhanced test control test mode control logic 204. Enhanced test mode control logic 204 provides test mode features for generating stimuli representing anomalous conditions, applying the generated stimuli via path 224 through switch/multiplexer 206 onto SAS transport medium 230, and for verifying responses received via medium 230 through switch/multiplexer 206 on path 224. Enhanced test mode control logic 204 may receive a signal on path 228 requesting entry to the enhanced test mode. As noted above, such a signal may be generated by any desired means, including means internal to enhanced SAS component 200 (not shown) or means external to enhanced SAS component 200. In particular, as discussed above, the signal to commence such enhanced testing may be provided as a SAS SMP Request transmitted to the SAS component on one of its ports. Further, a signal to commence test mode operations may be provided to a SAS device controller via a system bus coupling the SAS device controller to an associated system. For example, a PCI bus may be used by a host system to instruct a SAS device controller within the system to initiate the test mode operations. In response to such a request to commence test mode operation, enhanced test mode control logic 204 applies a signal to path 222 indicating entry to the enhanced test mode operation. The signal so applied on path 222 may be applied to normal SAS component logic 202 to inform the normal processing functions and features thereof that test mode of operation has commenced and normal operation may not proceed. In addition, the test mode signal applied to path 222 may be applied to switch/multiplexer 206 to selectively couple path 224 to SAS transport medium 230. When in normal operation, switch/multiplexer 206 is selectively controlled to apply SAS exchanges from path 226 to path 230. In test mode operation, switch/multiplexer 206 is selectively controlled to apply transactions representing anomalous conditions on path 224 through to path 230. Those of ordinary skill in the art will recognize a wide variety of equivalent logical and functional decompositions of features and aspects within enhanced SAS component 200. FIG. 2 is therefore merely intended to suggest one possible decomposition of functions and logic within enhanced SAS component 200 to provide for both normal operation of the SAS component and enhanced test mode operation thereof. FIG. 3 provides additional detail of typical functional elements within enhanced test mode control logic 204 of FIG. 2. Test mode control logic 300 provides functions to receive or detect a request to enter the enhanced test mode of operation and to appropriately signal related logic to cease normal operation of the associated SAS component. Exception primitive generation logic 302 is operable upon entry to test mode in response to logic 300 to generate any requested exception primitives such as BREAK, BROADCAST, NAK and ERROR primitives. Error/invalid frame generation logic 304 is operable in the test mode operation to generate any requested erroneous or invalid frames including, for example, invalid frame types, invalid SAS addresses, CRC errors, etc. Error/invalid protocol generation logic 306 is operable in the enhanced test mode operation to generate any requested erroneous or invalid protocol sequences in accordance with the SAS specifications. Response verification logic 308 is operable to receive responses generated by the second SAS component (i.e. the SAS component under test having received a generated stimulus) to verify propriety of the received responses in accordance with the applied stimulus and the SAS specifications. Test mode control logic 300 is cooperatively operable with logic 302, 304, 306 and 308 to initiate desired sequences of anomalous conditions. A test request signal received by a test mode control logic 300 (i.e., from means internal to the associated SAS component or externalized thereto) may include indicia representing the type of anomalous condition or conditions to be generated as stimuli and applied to the second SAS component under test. Further, the signal or message received by logic 300 may indicate the second SAS component or components to be tested in the requested test mode operation. Those of ordinary skill in the art will recognize that the functional and logical decomposition represented by FIG. 3 is intended merely as exemplary of numerous equivalent functional and logical decompositions of such a test mode control logic element. FIG. 4 is a flowchart describing a method of operation within a first SAS component to provide enhanced testing of a second SAS component in accordance with features and aspects hereof. In particular, the flowchart of FIG. 4 is operable in accordance with features and aspects hereof to generate stimuli representing anomalous conditions in a SAS communication exchange and to verify proper response thereto. Stimuli are generated by the first SAS component and applied to the second SAS component. The responses generated by the second SAS component are returned to the first SAS component and verified therein relative to SAS specifications. Results of the test and verification may then be reported or otherwise returned to an associated test requestor for appropriate processing. Element 400 is first operable to await a request to enter the enhanced test mode. As noted above, such a request may be provided as a signal from within the first SAS component or external to the first SAS component. Until such a request is detected by the first SAS component, element 402 is operable to continue normal SAS component operation. Processing then continues looping back to element 400 to await detection of a request to enter the enhanced test mode. Upon detecting a request to enter the enhanced test mode by element 400, element 404 is operable to determine the type of test requested and the component to be tested. As noted above, the signal or message requesting entry to the enhanced test mode may include indicia of the particular type of test or tests to be performed and may further include indicia of the particular SAS component or components to be tested. Those of ordinary skill in the art will recognize a variety of methods and structures for providing such indicia of tests to be performed and the components to be tested. Such options represent well known design choices to those of ordinary skill in the art. Element 406 is next operable to generate appropriate test stimuli. As noted, the stimuli may represent anomalous conditions not frequently encountered in normal operation of the second SAS component (the identified SAS component to be tested). Examples of such anomalous conditions are numerous and may include the following: Exemplary Exception Primitives: BREAK BROADCAST NAK ERROR Invalid primitives Exemplary Transmission Errors: Send a bad CRC for a frame Send bad disparity Coding error (8b/10b error) Exemplary Framing Errors: Unsupported frame type Frame with unknown tag Xfer_Rdy frame errors Data frame errors Unsupported frame type Wrong Destination SAS address Wrong Hashed SAS address Invalid frame type Exemplary Timeouts: COMSAS detect timeout Await ALIGN timeout Hot-Plug timeout Dword Synchronization Reset timeout Receive Identify timeout Open timeout BREAK timeout CLOSE timeout ACK/NAK timeout DONE timeout Credit timeout Those of ordinary skill in the art will recognize other anomalous conditions that may be simulated in accordance with features and aspects hereof. For example, the SAS specifications include the above and other conditions that may be simulated for testing purposes in accordance with features and aspects hereof. Element 408 is then operable to apply the generated stimuli to the second SAS component (the SAS component under test). Element 410 then evaluates the received response from the component under test. In accordance with SAS specifications, each anomalous condition generated and applied as a stimulus to the second SAS component should generate some appropriate response. Element 410 is therefore responsible for receiving the response (if any) and verifying its proprietary in accordance with SAS specifications. Element 412 then determines whether the requested test mode has been completed. If the test request includes indicia requesting multiple or repetitive test operations, processing continues by looping back to element 404 to perform further requested test operations. If element 412 determines that the requested test mode has been completed, element 414 is operable to report or otherwise return the test results to the test requestor. The test results may be returned or reported in any suitable fashion according to the needs of the particular application of the test mode features hereof. Simple pass/fail indicators (i.e., LED indicators on the first SAS component that performed the test) may be utilized to provide indicia of the results of the test mode operation. More complex test reporting features may be provided by other processing (not shown) to format and present the information to an appropriate user or technician. Processing then continues by looping back to element 400 to continue normal operation of the first SAS component until detection of another request for entry to enhance test mode. Those of ordinary skill in the art will recognize a variety of equivalent methods and processes for performing enhanced test features in accordance with features and aspects hereof. The flowchart a FIG. 4 is therefore intended merely as representative of one possible implementation of such a method. While the invention has been illustrated and described in the drawings and foregoing description, such illustration and description is to be considered as exemplary and not restrictive in character. One embodiment of the invention and minor variants thereof have been shown and described. Protection is desired for all changes and modifications that come within the spirit of the invention. Those skilled in the art will appreciate variations of the above-described embodiments that fall within the scope of the invention. In particular, those of ordinary skill in the art will readily recognize that features and aspects hereof may be implemented equivalently in electronic circuits or as suitably programmed instructions of a general or special purpose processor. Such equivalency of circuit and programming designs is well known to those skilled in the art as a matter of design choice. As a result, the invention is not limited to the specific examples and illustrations discussed above, but only by the following claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The invention relates generally to serial attached SCSI (“SAS”) domains and more specifically to testing of responses to stimuli applied to SAS device controllers or SAS expanders. 2. Discussion of Related Art Small Computer Systems Interface (“SCSI”) is a set of American National Standards Institute (“ANSI”) standard electronic interface specification that allow, for example, computers to communicate with peripheral hardware. Common SCSI compatible peripheral devices may include: disk drives, tape drives, Compact Disc-Read Only Memory (“CD-ROM”) drives, printers and scanners. SCSI as originally created included both a command/response data structure specification and an interface and protocol standard for a parallel bus structure for attachment of devices. SCSI has evolved from exclusively parallel interfaces to include both parallel and serial interfaces. “SCSI” is now generally understood as referring either to the communication transport media (parallel bus structures and various serial transports) or to a plurality of primary commands common to most devices and command sets to meet the needs of specific device types as well as a variety of interface standards and protocols. The collection of primary commands and other command sets may be used with SCSI parallel interfaces as well as with serial interfaces. The serial interface transport media standards that support SCSI command processing include: Fibre Channel, Serial Bus Protocol (used with the Institute of Electrical and Electronics Engineers 1394 FireWire physical protocol; “IEEE 1394”) and the Serial Storage Protocol (SSP). SCSI interface transports and commands are also used to interconnect networks of storage devices with processing devices. For example, serial SCSI transport media and protocols such as Serial Attached SCSI (“SAS”) and Serial Advanced Technology Attachment (“SATA”) may be used in such networks. These applications are often referred to as storage networks. Those skilled in the art are familiar with SAS and SATA standards as well as other SCSI related specifications and standards. Information about such interfaces and commands is generally obtainable at the website http://www.t10.org. Such SCSI storage networks are often used in large storage systems having a plurality of disk drives to store data for organizations and/or businesses. The network architecture allows storage devices to be physically dispersed in an enterprise while continuing to directly support SCSI commands directly. This architecture allows for distribution of the storage components in an enterprise without the need for added overhead in converting storage requests from SCSI commands into other network commands and then back into lower level SCSI storage related commands. A SAS network typically comprises one or more SAS initiators coupled to one or more SAS targets often via one or more SAS expanders. In general, as is common in all SCSI communications, SAS initiators initiate communications with SAS targets. The expanders expand the number of ports of a SAS network domain used to interconnect SAS initiators and SAS targets (collectively referred to as SAS devices or SAS device controllers). It is a particular problem to thoroughly test SAS device controllers and SAS expanders as regards the full complement of possible responses to command, status or data exchanges and associated anomalous conditions. For example, it is a particular difficulty to verify proper operation of a SAS device controller or SAS expander in response to certain anomalous communication conditions such as BREAK, BROADCAST, and NAK conditions, or CRC errors, or invalid protocols or packets, etc. Prior techniques address this testing dilemma through external SAS emulators to generate a variety of stimuli including anomalous conditions and SAS analyzers to detect and verify the response from the SAS device controller or SAS expander under test. An exemplary SAS emulator may be programmed by a user to generate particular desired sequences and apply the desired sequences as a stimulus to the attached SAS expander or SAS device controller. The response generated may then be captured and analyzed to verify proper operation. Though the emulation and analyzer features may be integrated in a single test component, such external SAS analyzers and emulators can be costly devices. Furthermore, coupling an external test component to the SAS device controller or SAS expander under test may induce undesirable characteristics into the system under test. Since the external SAS analyzer or emulator must couple into the transport media coupled to the SAS device controller or SAS expander under test, by definition the analysis and testing is not performed in a real world environment in which the system may be normally configured. It is evident from the above discussion that a need exists for improved testing of SAS device controllers and SAS expanders in an environment more closely resembling real world application environments in which the SAS device controller or SAS expander may be configured.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention solves the above and other problems, thereby advancing the state of the useful arts, by providing methods and structures for improved testing of SAS device controllers and SAS expanders in an environment closely resembling a real world environment in which such devices and expanders are applied. In one aspect hereof, the responses of a SAS device controller under test may be analyzed based upon stimuli generated by a SAS expander suitably programmed and applied to the SAS device controller over an appropriate transport medium. In such a test environment, responses of the SAS device controller may be evaluated in an environment more closely resembling the intended application environment for the SAS device controller (i.e., coupled to the SAS expander through the transport medium intended for such use). In another aspect hereof, responses of a SAS expander under test may be analyzed based upon stimuli generated by a SAS device controller suitably programmed and applied to the SAS expander over an appropriate transport medium. In such a test environment, responses of the SAS expander may be evaluated in an environment more closely resembling the intended application environment for this SAS expander (i.e., coupled to the SAS device controller through the transport medium intended for such use). A feature hereof therefore provides a method for testing a SAS component in situ in a SAS domain, the method comprising: generating a stimulus representing an anomalous condition within a first SAS component; applying the stimulus to a second SAS component coupled to the first SAS component; receiving within the first SAS component a response from the second SAS component; and verifying within the first SAS component the received response. Another aspect hereof further provides that the first SAS component is a SAS device controller and the second SAS component is a SAS expander. Another aspect hereof further provides that the first SAS component is a SAS expander and the second SAS component is a SAS device controller. Another aspect hereof further provides that step of generating comprises generating an exception primitive. Another aspect hereof further provides that the step of generating an exception primitive comprises generating at least one of: BREAK, BROADCAST, NAK, and ERROR. Another aspect hereof further provides that the step of generating comprises generating invalid frames. Another aspect hereof further provides that the step of generating invalid frames comprises generating at least one of: a frame with a CRC error, an invalid SMP Response frame, an illegal frame type, a frame with an invalid SAS address, a frame representing an invalid SAS protocol a frame indicating an invalid connection rate, a character representing an invalid primitive, and a frame with an invalid SMP function. Another aspect hereof further provides for configuring the first SAS component to enable testing operation. Another aspect hereof further provides that the step of configuring comprises: transmitting an SMP Request to the first SAS component requesting that the first SAS component commence testing operation of the second SAS component. Another aspect hereof further provides that the SMP Request is a vendor specific SMP Request. Another feature hereof provides for a system comprising: a SAS communication medium; a first SAS component coupled to the SAS communication medium; a second SAS component coupled to the SAS communication medium wherein the second SAS component is adapted to generate a stimulus representing an anomalous condition and wherein the second SAS component is further adapted to apply the generated stimulus to the first SAS component. Another aspect hereof further provides that the second SAS component is further adapted to verify a response received from the first SAS component in response to the generated stimulus applied to the first SAS component. Another aspect hereof further provides that the second SAS component is adapted to selectively enable generation of the stimulus. Another aspect hereof further provides that the second SAS component is selectively enabled to generate the stimulus in response to a vendor specific SMP Request received by the second SAS component.
20040311
20070424
20050915
75546.0
0
IQBAL, NADEEM
METHODS AND STRUCTURE FOR TESTING RESPONSES FROM SAS DEVICE CONTROLLERS OR EXPANDERS
UNDISCOUNTED
0
ACCEPTED
2,004
10,798,692
ACCEPTED
Prodrugs of phosphonate nucleotide analogues
A novel method has led to the identification of novel mixed ester-amidates of PMPA for retroviral or hepadnaviral therapy, including compounds of structure (5a) having substituent groups as defined herein. Compositions of these novel compounds in pharmaceutically acceptable excipients and their use in therapy and prophylaxis are provided.
1 A diastereomerically enriched compound having the structure (3) which is substantially free of the diastereomer (4) wherein R1 is an oxyester which is hydrolyzable in vivo, or hydroxyl; B is a heterocyclic base; R2 is hydroxyl, or the residue of an amino acid bonded to the P atom through an amino group of the amino acid and having each carboxy substituent of the amino acid optionally esterified, but not both of R1 and R2 are hydroxyl; E is —(CH2)2—, —CH(CH3)CH2—, —CH(CH2F)CH2—, —CH(CH2OH)CH2—, —CH(CH═CH2)CH2—, —CH(C≡CH)CH2—, —CH(CH2N3)CH2—, —CH(R6)OCH(R6)—, —CH(R9)CH2O— or —CH(R8)O—, wherein the right hand bond is linked to the heterocyclic base; the broken line represents an optional double bond; R4 and R5are independently hydrogen, hydroxy, halo, amino or a substituent having 1-5 carbon atoms selected from acyloxy, alkyoxy, alkylthio, alkylamino and dialkylamino; R6 and R6′ are independently H, C1-C6 alkyl, C1-C6 hydroxyalkyl, or C2-C7 alkanoyl; R7 is independently H, C1-C6 alkyl, or are taken together to form —O— or —CH2—; R8 is H, C1-C6 alkyl, C1-C6 hydroxyalkyl or C1-C6 haloalkyl; and R9 is H, hydroxymethyl or acyloxymethyl; and their salts, free base, and solvates. 2 A diastereomerically enriched compound having the structure (5a) which is substantially free of diastereomer (5b) wherein R5 is methyl or hydrogen; R6 independently is H, alkyl, alkenyl, alkynyl, aryl or arylalkyl, or R6 independently is alkyl, alkenyl, alkynyl, aryl or arylalkyl which is substituted with from 1 to 3 substituents selected from alkylamino, alkylaminoalkyl, dialkylaminoalkyl, dialkylamino, hydroxyl, oxo, halo, amino, alkylthio, alkoxy, alkoxyalkyl, aryloxy, aryloxyalkyl, arylalkoxy, arylalkoxyalkyl, haloalkyl, nitro, nitroalkyl, azido, azidoalkyl, alkylacyl, alkylacylalkyl, carboxyl, or alkylacylamino; R7 is the side chain of any naturally-occurring or pharmaceutically acceptable amino acid and which, if the side chain comprises carboxyl, the carboxyl group is optionally esterified with an alkyl or aryl group; R11 is amino, alkylamino, oxo, or dialkylamino; and R12 is amino or H; and its salts, tautomers, free base and solvates. 3 A diastereomerically enriched compound of structure (6) and its salts, tautomers, free base and solvates 4 A diastereomerically enriched compound of structure (7) which is substantially free of diastereomer (7a) 5 A composition comprising a compound of any of claims 1-4 and a pharmaceutically effective excipient. 6 The composition of claim 5 wherein the excipient is a gel. 7 The composition of claim 5 which is suitable for topical administration. 8 A method for antiviral therapy or prophylaxis comprising administering a compound of any of claims 1-4 in a therapeutically or prophylactically effective amount to a subject in need of such therapy or prophylaxis.
This non-provisional application is a continuation application of pending application Ser. No. 10/354,207, filed Jan. 28, 2003, Ser. No. 09/909,560, filed Jul. 20, 2001, which is a regular utility application of provisional application 60/220,021, filed Jul. 21, 2000, all of which are incorporated herein by reference. This application relates to prodrugs of methoxyphosphonate nucleotide analogues. In particular it relates to improved methods for making and identifying such prodrugs. Many methoxyphosphonate nucleotide analogues are known. In general, such compounds have the structure A-OCH2P(O)(OR)2 where A is the residue of a nucleoside analogue and R independently is hydrogen or various protecting or prodrug functionalities. See U.S. Pat. Nos. 5,663,159, 5,977,061 and 5,798,340, Oliyai et al, “Pharmaceutical Research” 16(11):1687-1693 (1999), Stella et al., “J. Med. Chem.” 23(12):1275-1282 (1980), Aarons, L., Boddy, A. and Petrak, K. (1989) Novel Drug Delivery and Its Therapeutic Application (Prescott, L. F. and Nimmo, W. S., ed.), pp. 121-126; Bundgaard, H. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 70-74 and 79-92; Banerjee, P. K. and Amidon, G. L. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 118-121; Notari, R. E. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 135-156; Stella, V. J. and Himmelstein, K. J. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 177-198; Jones, G. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 199-241; Connors, T. A. (1985) Design of Prodrugs (Bundgaard, H., ed.) pp. 291-316. All literature and patent citations herein are expressly incorporated by reference. SUMMARY OF THE INVENTION Prodrugs of methoxyphosphonate nucleotide analogues intended for antiviral or antitumor therapy, while known, traditionally have been selected for their systemic effect. For example, such prodrugs have been selected for enhanced bioavailability, i.e., ability to be absorbed from the gastrointestinal tract and converted rapidly to parent drug to ensure that the parent drug is available to all tissues. However, applicants now have found that it is possible to select prodrugs that become enriched at therapeutic sites, as illustrated by the studies described herein where the analogues are enriched at localized focal sites of HIV infection. The objective of this invention is, among other advantages, to produce less toxicity to bystander tissues and greater potency of the parental drug in tissues which are the targets of therapy with the parent methoxyphosphonate nucleotide analogue. Accordingly, pursuant to these observations, a screening method is provided for identifying a methoxyphosphonate nucleotide analogue prodrug conferring enhanced activity in a target tissue comprising: (a) providing at least one of said prodrugs; (b) selecting at least one therapeutic target tissue and at least one non-target tissue; (c) administering the prodrug to the target tissue and to said at least one non-target tissue; and (d) determining the relative antiviral activity conferred by the prodrug in the tissues in step (c). In preferred embodiments, the target tissue are sites where HIV is actively replicated and/or which serve as an HIV reservoir, and the non-target tissue is an intact animal. Unexpectedly, we found that selecting lymphoid tissue as the target tissue for the practice of this method for HIV led to identification of prodrugs that enhance the delivery of active drug to such tissues. A preferred compound of this invention, which has been identified by this method has the structure (1), where Ra is H or methyl, and chirally enriched compositions thereof, salts, their free base and solvates thereof. A preferred compound of this invention has the structure (2) and its enriched diasteromers, salts, free base and solvates. In addition, we unexpectedly found that the chirality of substituents on the phosphorous atom and/or the amidate substituent are influential in the enrichment observed in the practice of this invention. Thus, in another embodiment of this invention, we provide diastereomerically enriched compounds of this invention having the structure (3) which are substantially free of the diastereomer (4) wherein R1 is an oxyester which is hydrolyzable in vivo, or hydroxyl; B is a heterocyclic base; R2 is hydroxyl, or the residue of an amino acid bonded to the P atom through an amino group of the amino acid and having each carboxy substituent of the amino acid optionally esterified, but not both of R1 and R2 are hydroxyl; E is —(CH2)2—, —CH(CH3)CH2—, —CH(CH2F)CH2—, —CH(CH2OH)CH2—, —CH(CH═CH2)CH2—, —CH(C≡CH)CH2—, —CH(CH2N3)CH2—, —CH(R6)OCH(R6′)—, —CH(R9)CH2O— or —CH(R8)O—, wherein the right hand bond is linked to the heterocyclic base; the broken line represents an optional double bond; R4 and R5 are independently hydrogen, hydroxy, halo, amino or a substituent having 1-5 carbon atoms selected from acyloxy, alkyoxy, alkylthio, alkylamino and dialkylamino; R6 and R6′ are independently H, C1-C6 alkyl, C1-C6 hydroxyalkyl, or C2-C7 alkanoyl; R7 is independently H, C1-C6 alkyl, or are taken together to form —O— or —CH2—; R8 is H, C1-C6 alkyl, C1-C6 hydroxyalkyl or C1-C6 haloalkyl; and R9 is H, hydroxymethyl or acyloxymethyl; and their salts, free base, and solvates. The diastereomers of structure (3) are designated the (S) isomers at the phosphorus chiral center. Preferred embodiments of this invention are the diastereomerically enriched compounds having the structure (5a) which is substantially free of diastereomer (5b) wherein R5 is methyl or hydrogen; R6 independently is H, alkyl, alkenyl, alkynyl, aryl or arylalkyl, or R6 independently is alkyl, alkenyl, alkynyl, aryl or arylalkyl which is substituted with from 1 to 3 substituents selected from alkylamino, alkylaminoalkyl, dialkylaminoalkyl, dialkylamino, hydroxyl, oxo, halo, amino, alkylthio, alkoxy, alkoxyalkyl, aryloxy, aryloxyalkyl, arylalkoxy, arylalkoxyalkyl, haloalkyl, nitro, nitroalkyl, azido, azidoalkyl, alkylacyl, alkylacylalkyl, carboxyl, or alkylacylamino; R7 is the side chain of any naturally-occurring or pharmaceutically acceptable amino acid and which, if the side chain comprises carboxyl, the carboxyl group is optionally esterified with an alkyl or aryl group; R11 is amino, alkylamino, oxo, or dialkylamino; and R12 is amino or H; and its salts, tautomers, free base and solvates. A preferred embodiment of this invention is the compound of structure (6), 9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine, also designated herein GS-7340 Another preferred embodiment of this invention is the fumarate salt of structure (5) (structure (7)),9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine fumarate (1:1), also designated herein GS-7340-2 The compounds of structures (1)-(7) optionally are formulated into compositions containing pharmaceutically acceptable excipients. Such compositions are used in effective doses in the therapy or prophylaxis of viral (particularly HIV or hepadnaviral) infections. In a further embodiment, a method is provided for the facile manufacture of 9-[2-(phosphonomethoxy)propyl]adenine (hereinafter “PMPA” or 9-[2-(phosphonomethoxy)ethyl] adenine (hereinafter “PMEA”) using magnesium alkoxide, which comprises combining 9-(2-hydroxypropyl)adenine or 9-(2-hydroxyethyl)adenine, protected p-toluenesulfonyloxymethylphosphonate and magnesium alkoxide, and recovering PMPA or PMEA, respectively. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows HPLC/C-14 traces of PBMC extracts from human blood incubated for 1 h at 37° C. with TDF, GS-7340 and PMPA. FIG. 2 shows PMPA and Prodrug concentration in plasma and PBMCs following oral administration of GS 7340-2 to Dogs at 10 mg-eq/kg. Figure depicts Tenofovir exposure in PBMCs and plasma upon administration of 10 mg-eq/kg in dogs. DETAILED DESCRIPTION OF THE INVENTION The methoxyphosphonate nucleotide analogue parent drugs for use in this screening method are compounds having the structure A-OCH2P(O)(OH)2 wherein A is the residue of a nucleoside analogue. These compounds are known per se and are not part of this invention. More particularly, the parent compounds comprise a heterocyclic base B and an aglycon E, in general having the structure wherein the group B is defined below and group E is defined above. Examples are described in U.S. Pat. Nos. 4,659,825, 4,808,716, 4,724,233, 5,142,051, 5,130,427, 5,650,510, 5,663,159, 5,302,585, 5,476,938, 5,696,263, 5,744,600, 5,688,778, 5,386,030, 5,733,896, 5,352,786, and 5,798,340, and EP 821,690 and 654,037. The prodrugs for use in the screening method of this invention are covalently modified analogues of the parent methoxyphosphonate nucleotide analogues described in the preceding paragraph. In general, the phosphorus atom of the parent drug is the preferred site for prodrug modification, but other sites are found on the heterocyclic base B or the aglycon E. Many such prodrugs are already known. Primarily, they are esters or amidates of the phosphorus atom, but also include substitutions on the base and aglycon. None of these modifications per se is part of this invention and none are to be considered limiting on the scope of the invention herein. The phosphorus atom of the methoxyphosphonate nucleotide analogues contains two valences for covalent modification such as amidation or esterification (unless one phosphoryl hydroxyl is esterified to an aglycon E hydroxyl substituent, whereupon only one phosphorus valence is free for substitution). The esters typically are aryloxy. The amidates ordinarily are naturally occurring monoamino acids having free carboxyl group(s) esterified with an alkyl or aryl group, usually phenyl, cycloalkyl, or t-, n- or s- alkyl groups. Suitable prodrugs for use in the screening method of this invention are disclosed for example in U.S. Pat. No. 5,798,340. However, any prodrug which is potentially believed to be capable of being converted in vivo within target tissue cells to the free methoxyphosphonate nucleotide analogue parent drug, e.g., whether by hydrolysis, oxidation, or other covalent transformation resulting from exposure to biological tissues, is suitable for use in the method of this invention. Such prodrugs may not be known at this time but are identified in the future and thus become suitable candidates available for testing in the method of this invention. Since the prodrugs are simply candidates for screening in the methods their structures are not relevant to practicing or enabling the screening method, although of course their structures ultimately are dispositive of whether or not a prodrug will be shown to be selective in the assay. The pro-moieties bound to the parent drug may be the same or different. However, each prodrug to be used in the screening assay will differ structurally from the other prodrugs to be tested. Distinct, i.e. structurally different, prodrugs generally are selected on the basis of either their stereochemistry or their covalent structure, or these features are varied in combination. Each prodrug tested, however, desirably is structurally and stereochemically substantially pure, else the output of the screening assay will be less useful. It is of course within the scope of this invention to test only a single prodrug in an individual embodiment of the method of this invention, although typically then one would compare the results with prior studies with other prodrugs. We have found that the stereochemistry of the prodrugs is capable of influencing the enrichment in target tissues. Chiral sites are at the phosphorus atom and are also found in its substituents. For example, amino acid used in preparing amidates may be D or L forms, and the phosphonate esters or the amino acid esters can contain chiral centers as well. Chiral sites also are found on the nucleoside analogue portion of the molecules, but these typically are already dictated by the stereochemistry of the parent drug and will not be varied as part of the screen. For example the R isomer of PMPA is preferred as it is more active than the corresponding S isomer. Typically these diasteromers or enantiomers will be chirally enriched if not pure at each site so that the results of the screen will be more meaningful. As noted, distinctiveness of stereoisomers is conferred by enriching or purifying the stereoisomer (typically this will be a diastereomer rather than an enantiomer in the case of most methoxyphosphonate nucleotide analogues) free of other stereoisomers at the chiral center in question, so that each test compound is substantially homogeneous. By substantially homogeneous or chirally enriched, we mean that the desired stereoisomer constitutes greater than about 60% by weight of the compound, ordinarily greater than about 80% and preferably greater than about 95%. Novel Screening Method Once at least one candidate prodrug has been selected, the remaining steps of the screening method of this invention are used to identify a prodrug possessing the required selectivity for the target tissue. Most conveniently the prodrugs are labeled with a detectable group, e.g. radiolabeled, in order to facilitate detection later in tissues or cells. However, a label is not required since other suitable assays for the prodrug or its metabolites (including the parent drug) can also be employed. These assays could include mass spectrometry, HPLC, bioassays or immunoassays for instance. The assay may detect the prodrug and any one or more of its metabolites, but preferably the assay is conducted to detect only the generation of the parent drug. This is based on the assumption (which may not be warranted in all cases) that the degree and rate of conversion of prodrug to antivirally active parent diphosphate is the same across all tissues tested. Otherwise, one can test for the diphosphate. The target tissue preferably will be lymphoid tissue when screening for prodrugs useful in the treatment of HIV infection. Lymphoid tissue will be known to the artisan and includes CD4 cells, lymphocytes, lymph nodes, macrophages and macrophage-like cells including monocytes such as peripheral blood monocytic cells (PBMCs) and glial cells. Lymphoid tissue also includes non-lymphoid tissues that are enriched in lymphoid tissues or cells, e.g. lung, skin and spleen. Other targets for other antiviral drugs of course will be the primary sites of replication or latency for the particular virus concerned, e.g., liver for hepatitis and peripheral nerves for HSV. Similarly, target tissues for tumors will in fact be the tumors themselves. These tissues are all well-known to the artisan and would not require undue experimentation to select. When screening for antiviral compounds, target tissue can be infected by the virus. Non-target tissues or cells also are screened as part of the method herein. Any number or identity of such tissues or cells can be employed in this regard. In general, tissues for which the parent drug is expected to be toxic will be used as non-target tissues. The selection of a non-target tissue is entirely dependent upon the nature of the prodrug and the activity of the parent. For example, non-hepatic tissues would be selected for prodrugs against hepatitis, and untransformed cells of the same tissue as the tumor will suffice for the antitumor-selective prodrug screen. It should be noted that the method of this invention is distinct from studies typically undertaken to determine oral bioavailability of prodrugs. In oral bioavailability studies, the objective is to identify a prodrug which passes into the systemic circulation substantially converted to parent drug. In the present invention, the objective is to find prodrugs that are not metabolized in the gastrointestinal tract or circulation. Thus, target tissues to be evaluated in the method of this invention generally do not include the small intestines or, if the intestines are included, then the tissues also include additional tissues other than the small intestines. The target and non-target tissues used in the screening method of this invention typically will be in an intact living animal. Prodrugs containing esters are more desirably tested in dogs, monkeys or other animals than rodents; mice and rat plasma contains high circulating levels of esterases that may produce a misleading result if the desired therapeutic subject is a human or higher mammal. It is not necessary to practice this method with intact animals. It also is within the scope of this invention to employ perfused organs, in vitro culture of organs (e.g. skin grafts) or cell lines maintained in various forms of cell culture, e.g. roller bottles or zero gravity suspension systems. For example, MT-2 cells can be used as a target tissue for selecting HIV prodrugs. Thus, the term “tissue” shall not be construed to require organized cellular structures, or the structures of tissues as they may be found in nature, although such would be preferred. Rather, the term “tissue” shall be construed to be synonymous with cells of a particular source, origin or differentiation stage. The target and non-target tissue may in fact be the same tissue, but the tissues will be in different biological status. For example, the method herein could be used to select for prodrugs that confer activity in virally-infected tissue (target tissue) but which remain substantially inactive in virally-uninfected cells (corresponding non-target tissue). The same strategy would be employed to select prophylactic prodrugs, i.e., prodrugs metabolized to antivirally active forms incidental to viral infection but which remain substantially unmetabolized in uninfected cells. Similarly, prodrugs could be screened in transformed cells and the untransformed counterpart tissue. This would be particularly useful in comparative testing to select prodrugs for the treatment of hematological malignancies, e.g. leukemias. Without being limited by any particular theory of operation, tissue selective prodrugs are thought to be selectively taken up by target cells and/or selectively metabolized within the cell, as compared to other tissues or cells. The unique advantage of the methoxyphosphonate prodrugs herein is that their metabolism to the dianion at physiological pH ensures that they will be unable to diffuse back out of the cell. They therefore remain effective for lengthy periods of time and are maintained at elevated intracellular concentrations, thereby exhibiting increased potency. The mechanisms for enhanced activity in the target tissue are believed to include enhanced uptake by the target cells, enhanced intracellular retention, or both mechanisms working together. However, the manner in which selectivity or enhanced delivery occurs in the target tissue is not important. It also is not important that all of the metabolic conversion of the prodrug to the parent compound occurs within the target tissue. Only the final drug activity-conferring conversion need occur in the target tissue; metabolism in other tissues may provide intermediates finally converted to antiviral forms in the target tissue. The degree of selectivity or enhanced delivery that is desired will vary with the parent compound and the manner in which it is measured (% dose distribution or parent drug concentration). In general, if the parent drug already possess a generous therapeutic window, a low degree of selectivity may be sufficient for the desired prodrug. On the other hand, toxic compounds may require more extensive screening to identify selective prodrugs. The relative expense of the method of this invention can be reduced by screening only in the target tissue and tissues against which the parent compound is known to be relatively toxic, e.g. for PMEA, which is nephrotoxic at higher doses, the primary focus will be on kidney and lymphoid tissues. The step of determining the relative antiviral activity of a prodrug in the selected tissues ordinarily is accomplished by assaying target and non-target tissues for the relative presence or activity of a metabolite of the prodrug, which metabolite is known to have, or is converted to, a metabolite having antiviral or antitumor activity. Thus, typically one would determine the relative amount of the parent drug in the tissues over substantially the same time course in order to identify prodrugs that are preferentially metabolized in the target tissue to an antivirally or antitumor active metabolite or precursor thereof which in the target tissue ultimately produces the active metabolite. In the case of antiviral compounds, the active metabolite is the diphosphate of the phosphonate parent compounds. It is this metabolite that is incorporated into the viral nucleic acid, thereby truncating the elongating nucleic acid strand and halting viral replication. Metabolites of the prodrug can be anabolic metabolites, catabolic metabolites, or the product of anabolism and catabolism together. The manner in which the metabolite is produced is not important in the practice of the method of this invention. The method of this invention is not limited to assaying a metabolite which per se possesses antiviral or antitumor activity. Instead, one can assay inactive precursors of the active metabolites. Precursors of the antivirally active diphosphate metabolite include the monophosphate of the parent drug, monophosphates of other metabolites of the parent drug (e.g., an intermediate modification of a substituent on the heterocyclic base), the parent itself and metabolites generated by the cell in converting the prodrug to the parent prior to phosphorylation. The precursor structures may vary considerably as they are the result of cellular metabolism. However, this information is already known or could be readily determined by one skilled in the art. If the prodrug being assayed does not exhibit antitumor or antiviral activity per se then adjustments to the raw assay results may be required. For example, if the intracellular processing of the inactive metabolite to an active metabolite occurs at different rates among the tissues being tested, the raw assay results with the inactive metabolite would need to be adjusted to take account of the differences among the cell types because the relevant parameter is the generation of activity in the target tissue, not accumulation of inactive metabolites. However, determining the proper adjustments would be within the ordinary skill. Thus, when step (d) of the method herein calls for determining the activity, activity can be either measured directly or extrapolated. It does not mean that the method herein is limited to only assaying intermediates that are active per se. For instance, the absence or decline of the prodrug in the test tissues also could be assayed. Step (d) only requires assessment of the activity conferred by the prodrug as it interacts with the tissue concerned, and this may be based on extrapolation or other indirect measurement. Step (d) of the method of this invention calls for determining the “relative” activity of the prodrug. It will be understood that this does not require that each and every assay or series of assays necessarily must also contain runs with the selected non-target tissue. On the contrary, it is within the scope of this invention to employ historical controls of the non-target tissue or tissues, or algorithms representing results to be expected from such non-target tissues, in order to provide the benchmark non-target activity. The results obtained in step (d) are then used optimally to select or identify a prodrug which produces greater antiviral activity in the target tissue than in the non-target tissue. It is this prodrug that is selected for further development. It will be appreciated that some preassessment of prodrug candidates can be undertaken before the practice of the method of this invention. For example, the prodrug will need to be capable of passing largely unmetabolized through the gastrointestinal tract, it will need to be substantially stable in blood, and it should be able to permeate cells at least to some degree. In most cases it also will need to complete a first pass of the hepatic circulation without substantial metabolism. Such prestudies are optional, and are well-known to those skilled in the art. The same reasoning as is described above for antiviral activity is applicable to antitumor prodrugs of methoxyphosphonate nucleotide analogues as well. These include, for example, prodrugs of PMEG, the guanyl analogue of PMEA. In this case, cytotoxic phosphonates such as PMEG are worthwhile candidates to pursue as their cytotoxicity in fact confers their antitumor activity. A compound identified by this novel screening method then can be entered into a traditional preclinical or clinical program to confirm that the desired objectives have been met. Typically, a prodrug is considered to be selective if the activity or concentration of parent drug in the target tissue (% dose distribution) is greater than 2×, and preferably 5×, that of the parent compound in non-target tissue. Alternatively, a prodrug candidate can be compared against a benchmark prodrug. In this case, selectivity is relative rather than absolute. Selective prodrugs will be those resulting in greater than about 10× concentration or activity in the target tissue as compared with the prototype, although the degree of selectivity is a matter of discretion. Novel Method for Preparation of Starting Materials or Intermediates Also included herein is an improved method for manufacture of preferred starting materials (parent drugs) of this invention, PMEA and (R)-PMPA. Typically, this method comprises reacting 9-(2-hydroxypropyl)adenine (HPA) or 9-(2-hydroxyethyl)adenine (HEA) with a magnesium alkoxide, thereafter adding the protected aglycon synthon p-toluene-sulfonyloxymethylphosphonate (tosylate) to the reaction mixture, and recovering PMPA or PMEA, respectively. Preferably, HPA is the enriched or isolated R enantiomer. If a chiral HPA mixture is used, R-PMPA can be isolated from the chiral PMPA mixture after the synthesis is completed. Typically the tosylate is protected by lower alkyl groups, but other suitable groups will be apparent to the artisan. It may be convenient to employ the tosylate presubstituted with the prodrug phosphonate substituents which are capable of acting as protecting groups in the tosylation reaction, thereby allowing one to bypass the deprotection step and directly recover prodrug or an intermediate therefore. The alkyl group of the magnesium alkoxide is not critical and can be any C1-C6 branched or normal alkyl, but is preferably t-butyl (for PMPA) or isopropyl (for PMEA). The reaction conditions also are not critical, but preferably comprise heating the reaction mixture at about 70-75° C. with stirring or other moderate agitation. If there is no interest in retaining the phosphonate substituents, the product is deprotected (usually with bromotrimethylsilane where the tosylate protecting group is alkyl), and the product then recovered by crystallization or other conventional method as will be apparent to the artisan. Heterocyclic Base In the compounds of this invention depicted in structures (3) and (4), the heterocyclic base B is selected from the structures wherein R15 is H, OH, F, Cl, Br, I, OR16, SH, SR16, NH2, or NHR17; R16 is C1-C6 alkyl or C2-C6 alkenyl including —CH3, —CH2CH3, —CH2C≡CH, —CH2CH═CH2 and —C3H7; R17 is C1-C6 alkyl or C2-C6 alkenyl including —CH3, —CH2CH3, —CH2C≡CH, —CH2CH═CH2, and —C3H7; R18 is N, CF, CCl, CBr, CI, CR19 , CSR19, or COR19; R19 is H, C1-C9 alkyl, C2-C9 alkenyl, C2-C9 alkynyl, C1-C9 alkyl-C1-C9 alkoxy, or C7-C9 aryl-alkyl unsubstituted or substituted by OH, F, Cl, Br or I, R19 therefore including —CH3, —CH2CH3, —CHCH2, —CHCHBr, —CH2CH2Cl, —CH2CH2F, —CH2CCH, —CH2CHCH2, —C3H7, —CH2OH, —CH2OCH3, —CH2OC2H5, —CH2OCCH, —CH2OCH2CHCH2, —CH2C3H7, —CH2CH2OH, —CH2CH2OCH3, —CH2CH2OC2H5, —CH2CH2OCCH, —CH2CH2OCH2CHCH2, and —CH2CH2OC3H7; R20 is N or CH; R21 is N, CH, CCN, CCF3, CC≡CH or CC(O)NH2; R22 is H, OH, NH2, SH, SCH3, SCH2CH3, SCH2C≡CH, SCH2CH═CH2, SC3H7, NH(CH3), N(CH3)2, NH(CH2CH3), N(CH2CH3)2, NH(CH2C≡CH), NH(CH2CHCH2), NH(C3H7), halogen (F, Cl, Br or I) or X wherein X is —(CH2)m(O)n(CH2)mN(R10)2 wherein each m is independently 0-2, n is 0-1, and R10 independently is H, C1-C15 alkyl, C2-C15 alkenyl, C6-C15 arylalkenyl, C6-C15 arylalkynyl, C2-C15 alkynyl, C1-C6-alkylamino-C1-C6 alkyl, C5-C15 aralkyl, C6-C15 heteroaralkyl, C5-C6 aryl, C2-C6 heterocycloalkyl, C2-C15 alkyl, C3-C15 alkenyl, C6-C15 arylalkenyl, C3-C15 alkynyl, C7-C15 arylalkynyl, C1-C6-alkylamino-C1 -C6 alkyl, C5-C15 aralkyl, C6-C15 heteroalkyl or C3-C6 heterocycloalkyl wherein methylene in the alkyl moiety not adjacent to N6 has been replaced by —O—, optionally both R10 are joined together with N to form a saturated or unsaturated C2-C5 heterocycle containing one or two N heteroatoms and optionally an additional O or S heteroatom, or one of the foregoing R10 groups which is substituted with 1 to 3 halo, CN or N3; but optionally at least one R10 group is not H; R23 is H, OH, F, Cl, Br, I, SCH3, SCH2CH3, SCH2C≡CH, SCH2CHCH2, SC3H7, OR16, NH2, NHR17 or R22; and R24 is O, S or Se. B also includes both protected and unprotected heterocyclic bases, particularly purine and pyrimidine bases. Protecting groups for exocyclic amines and other labile groups are known (Greene et al. “Protective Groups in Organic Synthesis”) and include N-benzoyl, isobutyryl, 4,4′-dimethoxytrityl (DMT) and the like. The selection of protecting group will be apparent to the ordinary artisan and will depend upon the nature of the labile group and the chemistry which the protecting group is expected to encounter, e.g. acidic, basic, oxidative, reductive or other conditions. Exemplary protected species are N4-benzoylcytosine, N6-benzoyladenine, N2-isobutyrylguanine and the like. Protected bases have the formulas Xa.1, XIa.1, XIb.1, XIIa.1 or XIIIa.1 wherein R18, R20, R21, R24 have the meanings previously defined; R22A is R39 or R22 provided that R22 is not NH2; R23A is R39 or R23 provided that R23 is not NH2; R39 is NHR40, NHC(O)R36 or CR41N(R38)2 wherein R36 is C1-C19 alkyl, C1-C19 alkenyl, C3-C10 aryl, adamantoyl, alkylanyl, or C3-C10 aryl substituted with 1 or 2 atoms or groups selected from halogen, methyl, ethyl, methoxy, ethoxy, hydroxy and cyano; R38 is C1-C10 alkyl, or both R38 together are 1-morpholino, 1-piperidine or 1-pyrrolidine; R40 is C1-C1a alkyl, including methyl, ethyl, propyl, isopropyl, butyl, isobutyl, t-butyl, pentyl, hexyl, octyl and decanyl; and R41 is hydrogen or CH3. For bases of structures XIa.1 and XIb.1, if R39 is present at R22A or R23A, both R39 groups on the same base will generally be the same. Exemplary R36 are phenyl, phenyl substituted with one of the foregoing R36 aryl substituents, —C10H15 (where C10H15 is 2-adamantoyl), —CH2—C6H5, —C6H5, —CH(CH3)2, —CH2CH3, methyl, butyl, t-butyl, heptanyl, nonanyl, undecanyl, or undecenyl. Specific bases include hypoxanthine, guanine, adenine, cytosine, inosine, thymine, uracil, xanthine, 8-aza derivatives of 2-aminopurine, 2,6-diaminopurine, 2-amino-6-chloropurine, hypoxanthine, inosine and xanthine; 7-deaza-8-aza derivatives of adenine, guanine, 2-aminopurine, 2,6-diaminopurine, 2-amino-6-chloropurine, hypoxanthine, inosine and xanthine; 1-deaza derivatives of 2-aminopurine, 2,6-diaminopurine, 2-amino-6-chloropurine, hypoxanthine, inosine and xanthine; 7-deaza derivatives of 2-aminopurine, 2,6-diaminopurine, 2-amino-6-chloropurine, hypoxanthine, inosine and xanthine; 3-deaza derivatives of 2-aminopurine, 2,6-diaminopurine, 2-amino-6-chloropurine, hypoxanthine, inosine and xanthine; 6-azacytosine; 5-fluorocytosine; 5-chlorocytosine; 5-iodocytosine; 5-bromocytosine; 5-methylcytosine; 5-bromovinyluracil; 5-fluorouracil; 5-chlorouracil; 5-iodouracil; 5-bromouracil; 5-trifluoromethyluracil; 5-methoxymethyluracil; 5-ethynyluracil and 5-propynyluracil. Preferably, B is a 9-purinyl residue selected from guanyl, 3-deazaguanyl, 1-deazaguanyl, 8-azaguanyl, 7-deazaguanyl, adenyl, 3-deazaadenyl, 1-dezazadenyl, 8-azaadenyl, 7-deazaadenyl, 2,6-diaminopurinyl, 2-aminopurinyl, 6-chloro-2-aminopurinyl and 6-thio-2-aminopurinyl, or a B′ is a 1-pyrimidinyl residue selected from cytosinyl, 5-halocytosinyl, and 5-(C1-C3-alkyl)cytosinyl. Preferred B groups have the formula wherein R22 independently is halo, oxygen, NH2, X or H, but optionally at least one R22 is X; X is —(CH2)m(O)n(CH2)mN(R10)2 wherein m is 0-2, n is 0-1, and R10 independently is H, C1-C15 alkyl, C2-C15 alkenyl, C6-C15 arylalkenyl, C6-C1 arylalkynyl, C2-C15 alkynyl, C1-C6-alkylamino-C1-C6 alkyl, C5-C15 aralkyl, C6-C15 heteroaralkyl, C5-C6 aryl, C2-C6 heterocycloalkyl, C2-C15 alkyl, C3-C15 alkenyl, C6-C15 arylalkenyl, C3-C15 alkynyl, C7-C15 arylalkynyl, C1-C6-alkylamino-C1-C6 alkyl, C5-C15 aralkyl, C6-C15 heteroalkyl or C3-C6 heterocycloalkyl wherein methylene in the alkyl moiety not adjacent to N6 has been replaced by —O—, optionally both R10 are joined together with N to form a saturated or unsaturated C2-C5 heterocycle containing one or two N heteroatoms and optionally an additional O or S heteroatom, or one of the foregoing R10 groups is substituted with 1 to 3 halo, CN or N3; but optionally at least one R10 group is not H; and Z is N or CH, provided that the heterocyclic nucleus varies from purine by no more than one Z. E groups represent the aglycons employed in the methoxyphosphonate nucleotide analogues. Preferably, the E group is —CH(CH3)CH2— or —CH2CH2—. Also, it is preferred that the side groups at chiral centers in the aglycon be substantially solely in the (R) configuration (except for hydroxymethyl, which is the enriched (S) enantiomer). R1 is an in vivo hydrolyzable oxyester having the structure —OR35 or —OR6 wherein R35 is defined in column 64, line 49 of U.S. Pat. No. 5,798,340, herein incorporated by reference, and R6 is defined above. Preferably R1 is aryloxy, ordinarily unsubstituted or para-substituted (as defined in R6) phenoxy. R2 is an amino acid residue, optionally provided that any carboxy group linked by less than about 5 atoms to the amidate N is esterified. R2 typically has the structure wherein n is 1 or 2; R11 is R6 or H; preferably R6=C3-C9 alkyl; C3-C9 alkyl substituted independently with OH, halogen, O or N; C3-C6 aryl; C3-C6 aryl which is independently substituted with OH, halogen, O or N; or C3-C6 arylalkyl which is independently substituted with OH, halogen, O or N; R12 independently is H or C1-C9 alkyl which is unsubstituted or substituted by substituents independently selected from the group consisting of OH, O, N, COOR11 and halogen; C3-C6 aryl which is unsubstituted or substituted by substituents independently selected from the group consisting of OH, O, N, COOR11 and halogen; or C3-C9 aryl-alkyl which is unsubstituted or substituted by substituents independently selected from the group consisting of OH, O, N, COOR11 and halogen; R13 independently is C(O)—OR11; amino; amide; guanidinyl; imidazolyl; indolyl; sulfoxide; phosphoryl; C1-C3 alkylamino; C1-C3 alkyldiamino; C1-C6 alkenylamino; hydroxy; thiol; C1-C3 alkoxy; C1-C3 alkthiol; (CH2)nCOOR11; C1-C6 alkyl which is unsubstituted or substituted with OH, halogen, SH, NH2, phenyl, hydroxyphenyl or C7-C10 alkoxyphenyl; C2-C6 alkenyl which is unsubstituted or substituted with OH, halogen, SH, NH2, phenyl, hydroxyphenyl or C7-C10 alkoxyphenyl; and C6-C12 aryl which is unsubstituted or substituted with OH, halogen, SH, NH2, phenyl, hydroxyphenyl or C7-C10 alkoxyphenyl; and R14 is H or C1-C9 alkyl or C1-C9 alkyl independently substituted with OH, halogen, COOR11, O or N; C3-C6 aryl; C3-C6 aryl which is independently substituted with OH, halogen, COOR11, O or N; or C3-C6 arylalkyl which is independently substituted with OH, halogen, COOR11, O or N. Preferably, R11 is C1-C6 alkyl, most preferably isopropyl, R13 is the side chain of a naturally occurring amino acid, n=1, R12 is H and R14 is H. In the compound of structure (2), the invention includes metabolites in which the phenoxy and isopropyl esters have been hydrolyzed to —OH. Similarly, the de-esterified enriched phosphonoamidate metabolites of compounds (5a), 5(b) and (6) are included within the scope of this invention. Aryl and “O” or “N” substitution are defined in column 16, lines 42-58, of U.S. Pat. No. 5,798,340. Typically, the amino acids are in the natural or l amino acids. Suitable specific examples are set forth in U.S. Pat. No. 5,798,340, for instance Table 4 and col. 8-10 therein. Alkyl as used herein, unless stated to the contrary, is a normal, secondary, tertiary or cyclic hydrocarbon. Unless stated to the contrary alkyl is C1-C12. Examples are —CH3, —CH2CH3, —CH2CH2CH3, —CH(CH3)2, —CH2CH2CH2CH3), —CH2CH(CH3)2, —CH(CH3)CH2CH3, —C(CH3)3, —CH2CH2CH2CH2CH3, —CH(CH3)CH2CH2CH3, —CH(CH2CH3)2, —C(CH3)2CH2CH3), —CH(CH3)CH(CH3)2, —CH2CH2CH(CH3)2), —CH2CH(CH3)CH2CH3, —CH2CH2CH2CH2CH2CH3, —CH(CH3)CH2CH2CH2CH3, —CH(CH2CH3)(CH2CH2CH3), —C(CH3)2CH2CH2CH3, —CH(CH3)CH(CH3)CH2CH3, —CH(CH3)CH2CH(CH3)2, —C(CH3)(CH2CH3)2, —CH(CH2CH3)CH(CH3)2, —C(CH3)2CH(CH3)2, and —CH(CH3)C(CH3)3. Alkenyl and alkynyl are defined in the same fashion, but contain at least one double or triple bond, respectively. Where enol or keto groups are disclosed, the corresponding tautomers are to be construed as taught as well. The prodrug compounds of this invention are provided in the form of free base or the various salts enumerated in U.S. Pat. No. 5,798,340, and are formulated with pharmaceutically acceptable excipients or solvating diluents for use as pharmaceutical products also as set forth in U.S. Pat. No. 5,798,340. These prodrugs have the antiviral and utilities already established for the parent drugs (see U.S. Pat. No. 5,798,340 and other citations relating to the methoxyphosphonate nucleotide analogues). It will be understood that the diastereomer of structure (4) at least is useful as an intermediate in the chemical production of the parent drug by hydrolysis in vitro, regardless of its relatively unselective character as revealed in the studies herein. The invention will be more fully understood by reference to the following examples: EXAMPLE 1a Adenine to PMEA using Magnesium Isopropoxide. To a suspension of adenine (16.8 g, 0.124 mol) in DMF (41.9 ml) was added ethylene carbonate (12.1 g, 0.137 mol) and sodium hydroxide (.100 g, 0.0025 mol). The mixture was heated at 130° C. overnight. The reaction was cooled to below 50° C. and toluene (62.1 ml) was added. The slurry was further cooled to 5° C. for 2 hours, filtered, and rinsed with toluene (2×). The wet solid was dried in vacuo at 65° C. to yield 20.0 g (90%) of 9-(2-hydroxyethyl)adenine as an off-white solid. Mp: 238-240° C. 9-(2-Hydroxyethyl)adenine (HEA) (20.0 g, 0.112 mol) was suspended in DMF (125 ml) and heated to 80° C. Magnesium isopropoxide (11.2 g, 0.0784 mol), or alternatively magnesium t-butoxide, was added to the mixture followed by diethyl p-toluenesulfonyloxymethylphosphonate (66.0 g, 0.162 mol) over one hour. The mixture was stirred at 80° C. for 7 hours. 30 ml of volatiles were removed via vacuum distillation and the reaction was recharged with 30 ml of fresh DMF. After cooling to room temperature, bromotrimethylsilane (69.6 g, 0.450 mol) was added and the mixture heated to 80° C. for 6 hours. The reaction was concentrated to yield a thick gum. The gum was dissolved into 360 ml water, extracted with 120 ml dichloromethane, adjusted to pH 3.2 with sodium hydroxide, and the resulting slurry stirred at room temperature overnight. The slurry was cooled to 4° C. for one hour. The solids were isolated by filtration, washed with water (2×), and dried in vacuo at 56° C. to yield 20 g (65.4%) of 9-[2-(phosphonomethoxy)ethyl]adenine (PMEA) as a white solid. Mp:>200° C. dec. 1H NMR (D2O) δ 3.49 (t, 2H); 3.94 (t, 2H); 4.39 (t, 2H); 8.13 (s, 1H); 8.22 (s, 1H). EXAMPLE 1b Adenine to PMPA using Magnesium t-Butoxide. To a suspension of adenine (40 g, 0.296 mol) in DMF (41.9 ml) was added (R)-propylene carbonate (34.5 g, 0.338 mol) and sodium hydroxide (0.480 g, 0.012 mol). The mixture was heated at 130° C. overnight. The reaction was cooled to 100° C. and toluene (138 ml) was added followed by methanesulfonic acid (4.7 g, 0.049 mol) while maintaining the reaction temperature between 100-110° C. Additional toluene (114 ml) was added to create a homogeneous solution. The solution was cooled to 3° C. over 7 hours and then held at 3° C. for one hour. The resulting solid was isolated by filtration and rinsed with acetone (2×). The wet solid was dried in vacuo at 80° C. to yield 42.6 g (75%) of (R)-9-[2-(hydroxy)propyl]adenine (HPA) as an off-white solid. Mp: 188-190° C. (R)-9-[2-(hydroxy)propyl]adenine (HPA) (20.0 g, 0.104 mol) was suspended in DMF (44.5 ml) and heated to 65° C. Magnesium t-butoxide (14.2 g, 0.083 mol), or alternatively magnesium isopropoxide, was added to the mixture over one hour followed by diethyl p-toluenesulfonyloxymethylphosphonate (66.0 g, 0.205 mol) over two hours while the temperature was kept at 78° C. The mixture was stirred at 75° C. for 4 hours. After cooling to below 50° C., bromotrimethylsilane (73.9 g, 0.478 mol) was added and the mixture heated to 77° C. for 3 hours. When complete, the reaction was heated to 80° C. and volatiles were removed via atmospheric distillation. The residue was dissolved into water (120 ml) at 50° C. and then extracted with ethyl acetate (101 ml). The pH of the aqueous phase was adjusted to pH 1.1 with sodium hydroxide, seeded with authentic (R)-PMPA, and the pH of the aqueous layer was readjusted to pH 2.1 with sodium hydroxide. The resulting slurry was stirred at room temperature overnight. The slurry was cooled to 4° C. for three hours. The solid was isolated by filtration, washed with water (60 ml), and dried in vacuo at 50° C. to yield 18.9 g (63.5%) of crude(R)-9-[2-(phosphonomethoxy)propyl]adenine (PMPA) as an off-white solid. The crude(R)-9-[2-(phosphonomethoxy)propyl]adenine was heated at reflux in water (255 ml) until all solids dissolved. The solution was cooled to room temperature over 4 hours. The resulting slurry was cooled at 4° C. for three hours. The solid was isolated by filtration, washed with water (56 ml) and acetone (56 ml), and dried in vacuo at 50° C. to yield 15.0 g (50.4%) of (R)-9-[2-(phosphonomethoxy)propyl]adenine (PMPA) as a white solid. Mp: 278-280° C. EXAMPLE 2 Preparation of GS-7171 (III) A glass-lined reactor was charged with anhydrous PMPA, (I) (14.6 kg, 50.8 mol), phenol (9.6 kg, 102 mol), and 1-methyl-2-pyrrolidinone (39 kg). The mixture was heated to 85° C. and-triethylamine (6.3 kg, 62.3 mol) added. A solution of 1,3-dicyclohexylcarbodiimide (17.1 kg, 82.9 mol) in 1-methyl-2-pyrrolidinone (1.6 kg) was then added over 6 hours at 100° C. Heating was continued for 16 hours. The reaction was cooled to 45° C., water (29 kg) added, and cooled to 25° C. Solids were removed from the reaction by filtration and rinsed with water (15.3 kg). The combined filtrate and rinse was concentrated to a tan slurry under reduced pressure, water (24.6 kg) added, and adjusted to pH=11 with NaOH (25% in water). Fines were removed by filtration through diatomaceous earth (2 kg) followed by a water (4.4 kg) rinse. The combined filtrate and rinse was extracted with ethyl acetate (28 kg). The aqueous solution was adjusted to pH=3.1 with HCl (37% in water) (4 kg). Crude II was isolated by filtration and washed with methanol (12.7 kg). The crude II wet cake was slurried in methanol (58 kg). Solids were isolated by filtration, washed with methanol (8.5 kg), and dried under reduced pressure to yield 9.33 kg II as a white powder: 1H NMR (D2O) δ 1.2 (d, 3H), 3.45 (q, 2H), 3.7 (q, 2H), 4 (m, 2H), 4.2 (q, 2H) 4.35 (dd, 2H), 6.6 (d, 2H), 7 (t, 1H), 7.15 (t, 2H), 8.15 (s, 1H), 8.2 (s, 1H); 31P NMR (D2O) δ 15.0 (decoupled). GS-7171 (III). (Scheme 1) A glass-lined reactor was charged with monophenyl PMPA, (II), (9.12 kg, 25.1 mol) and acetonitrile (30.7 kg). Thionyl chloride (6.57 kg, 56.7 mol) was added below 50° C. The mixture was heated at 75° C. until solids dissolved. Reaction temperature was increased to 80° C. and volatiles (11.4 kg) collected by atmospheric distillation under nitrogen. The pot residue was cooled to 25° C., dichloromethane (41 kg) added, and cooled to −29° C. A solution of (L)-alanine isopropyl ester (7.1 kg, 54.4 mol) in dichloromethane (36 kg) was added over 60 minutes at −18° C. followed by triethylamine (7.66 kg, 75.7 mol) over 30 minutes at −18 to −11° C. The reaction mixture was warmed to room temperature and washed five times with sodium dihydrogenphosphate solution (10% in water, 15.7 kg each wash). The organic solution was dried with anhydrous sodium sulfate (18.2 kg), filtered, rinsed with dichloromethane (28 kg), and concentrated to an oil under reduced pressure. Acetone (20 kg) was charged to the oil and the mixture concentrated under reduced pressure. Acetone (18.8 kg) was charged to the resulting oil. Half the product solution was purified by chromatography over a 38×38 cm bed of 22 kg silica gel 60, 230 to 400 mesh. The column was eluted with 480 kg acetone. The purification was repeated on the second half of the oil using fresh silica gel and acetone. Clean product bearing fractions were concentrated under reduced pressure to an oil. Acetonitrile (19.6 kg) was charged to the oil and the mixture concentrated under reduced pressure. Acetonitrile (66.4 kg) was charged and the solution chilled to 0 to −5° C. for 16 hours. Solids were removed by filtration and the filtrate concentrated under reduced pressure to 5.6 kg III as a dark oil: 1H NMR (CDCl3) δ 1.1 (m 12H), 3.7 (m, 1H), 4.0 (m, 5H), 4.2 (m, 1H), 5.0 (m, 1H), 6.2 (s, 2H), 7.05 (m, 5H), 8.0 (s, 1H), 8.25 (d, 1H); 31 P NMR (CDCl3) δ 21.0, 22.5 (decoupled). Alternate Method for GS-7171(III) Monophenyl PMPA (II). A round-bottom flask with reflux condenser and nitrogen inlet was placed in a 70° C. oil bath. The flask was charged with anhydrous PMPA (I) (19.2 g, 67 mmol), N,N-dimethylformamide (0.29 g, 3.3 mmol), and tetramethylene sulfone (40 mL). Thionyl chloride (14.2 g, 119 mmol) was added over 4 hours. Heating was increased to 100° C. over the same time. A homogeneous solution resulted. Phenoxytrimethylsilane (11.7 g, 70 mmol) was added to the solution over 5 minutes. Heating in the 100° C. oil bath continued for two hours more. The reaction was poured into rapidly stirring acetone (400 mL) with cooling at 0° C. Solids were isolated by filtration, dried under reduced pressure, and dissolved in methanol (75 mL). The solution pH was adjusted to 3.0 with potassium hydroxide solution (45% aq.) with cooling in ice/water. The resulting solids were isolated by filtration, rinsed with methanol, and dried under reduced pressure to 20.4 g II (Scheme 2) as a white powder. GS-7171 (III). Monophenyl PMPA (II) (3 g, 8.3 mmol), tetramethylene sulfone (5 mL), and N,N-dimethylformamide (1 drop) were combined in a round bottom flask in a 40° C. oil bath. Thionyl chloride (1.96 g, 16.5 mmol) was added. After 20 minutes the clear solution was removed from heat, diluted with dichloromethane (10 ml), and added to a solution of (L)-alanine isopropyl ester (5 g, 33 mmol) and diisopropylethylamine (5.33 g, 41 mmol) in dichloromethane (20 mL) at −10° C. The reaction mixture was warmed to room temperature and washed three times with sodium dihydrogenphosphate solution (10% aq., 10 mL each wash). The organic solution was dried over anhydrous sodium sulfate and concentrated under reduced pressure to a oil. The oil was combined with fumaric acid (0.77 g, 6.6 mmol) and acetonitrile (40 mL) and heated to reflux to give a homogeneous solution. The solution was cooled in an ice bath and solids isolated by filtration. The solid GS-7171 fumarate salt was dried under reduced pressure to 3.7 g. The salt (3.16 g, 5.3 mmol) was suspended in dichloromethane (30 mL) and stirred with potassium carbonate solution (5 mL, 2.5 M in water) until the solid dissolved. The organic layer was isolated, then washed with water (5 mL), dried over anhydrous sodium sulfate, and concentrated under reduced pressure to afford 2.4 g III as a tan foam. EXAMPLE 3 Diastereomer Separation by Batch Elution Chromatography The diastereomers of GS-7171 (III) were resolved by batch elution chromatography using a commercially available Chiralpak AS, 20 μm, 21×250 mm semi-preparative HPLC column with a Chiralpak AS, 20 μm, 21×50 mm guard column. Chiralpak® AS is a proprietary packing material manufactured by Diacel and sold in North America by Chiral Technologies, Inc. (U.S. Pat. Nos. 5,202,433, RE 35,919, 5,434,298, 5,434,299 and 5,498,752). Chiralpak AS is a chiral stationary phase (CSP) comprised of amylosetris[(S)-α-methylbenzyl carbamate] coated onto a silica gel support. The GS-7171 diastereomeric mixture was dissolved in mobile phase, and approximately 1 g aliquots of GS-7171 were pumped onto the chromatographic system. The undesired diastereomer, designated GS-7339, was the first major broad (approx. 15 min. duration) peak to elute from the column. When the GS-7339 peak had finished eluting, the mobile phase was immediately switched to 100% methyl alcohol, which caused the desired diastereomer, designated GS-7340 (IV), to elute as a sharp peak from the column with the methyl alcohol solvent front. The methyl alcohol was used to reduce the over-all cycle time. After the first couple of injections, both diastereomers were collected as a single large fractions containing one of the purified diastereomers (>99.0% single diastereomer). The mobile phase solvents were removed in vacuo to yield the purified diastereomer as a friable foam. About 95% of the starting GS-7171 mass was recovered in the two diastereomer fractions. The GS-7340 fraction comprised about 50% of the total recovered mass. The chromatographic conditions were as follows: Mobile Phase (Initial): GS-7171-Acetonitrile: Isopropyl Alcohol (90:10) (Final): 100% Methyl Alcohol Flow: 10 mL/minute Run Time: About 45 minute Detection: UV at 275 nm Temperature: Ambient Elution Profile: GS-7339 (diastereomer B) :GS-7340 (diastereomer A; (IV)) Diastereomer Separation of GS-7171 by SMB Chromatography For a general description of simulated moving bed (SMB) chromatography, see Strube et al., “Organic Process Research and Development” 2:305-319 (1998). GS-7340 (IV). GS-7171 (III), 2.8 kg, was purified by simulated moving bed chromatography over 10 cm by 5 cm beds of packing (Chiral Technologies Inc., 20 micron Chiralpak AS coated on silica gel) (1.2 kg). The columns were eluted with 30% methanol in acetonitrile. Product bearing fractions were concentrated to a solution of IV in acetonitrile (2.48 kg). The solution solidified to a crystalline mass wet with acetonitrile on standing. The crystalline mass was dried under reduced pressure to a tan crystalline powder, 1.301 kg IV, 98.7% diastereomeric purity: mp 117-120° C.; 1H NMR (CDCl3) δ 1.15 (m 12H), 3.7 (t, 1H), 4.0 (m, 5H), 4.2 (dd, 1H), 5.0 (m, 1H), 6.05 (s, 2H), 7.1 (m, 5H), 8.0 (s, 1H), 8.2 (s, 1H); 31P NMR (CDCl3) δ 21.0 (decoupled). Diastereomer Separation by C18 RP-HPLC GS-7171 (III) was chromatographed by reverse phase HPLC to separate the diastereomers using the following summary protocol. Chromatographic column: Phenomenex Luna™ C18(2), 5 μm, 100 Å pore size, (Phenomenex, Torrance, Calif.), or equivalent Guard column: Pellicular C18 (Alltech, Deerfield, Ill.), or equivalent Mobile Phase: A—0.02% (85%) H3PO4 in water: acetonitrile (95:5) B—0.02% (85%) H3PO4 in water: acetonitrile (50:50) Mobile Phase Gradient: Time % Mobile Phase A % Mobile Phase B 0 100 0 5 100 0 7 70 30 32 70 30 40 0 100 50 0 100 Run Time: 50 minutes Equilibration Delay: 10 min at 100% mobile phase A Flow Rate: 1.2 mL/min Temperature: Ambient Detection: UV at 260 nm Sample Solution: 20 mM sodium phosphate buffer, pH 6 Retention Times: GS-7339, about 25 minutes GS-7340, about 27 minutes Diastereomer Separation by Crystallization GS-7340 (IV). A solution of GS-7171 (III) in acetonitrile was concentrated to an amber foam (14.9 g) under reduced pressure. The foam was dissolved in acetonitrile (20 mL) and seeded with a crystal of IV. The mixture was stirred overnight, cooled to 5° C., and solids isolated by filtration. The solids were dried to 2.3 g IV as white crystals, 98% diastereomeric purity (31P NMR): 1H NMR (CDCl3) δ 1.15 (m 12H), 3.7 (t, 1H), 3.95 (m, 2H), 4.05 (m, 2H), 4.2 (m, 2H), 5.0 (m, 1H), 6.4 (s, 2H), 7.1 (m, 5H), 8.0 (s, 1H), 8.2 (s, 1H); 31P NMR (CDCl3) δ 19.5 (decoupled). X-ray crystal analysis of a single crystal selected from this product yielded the following data: Crystal Color, Habit colorless, column Crystal Dimensions 0.25 × 0.12 × 0.08 mm Crystal System orthorhombic Lattice Type Primitive Lattice Parameters a = 8.352(1) Å b = 15.574(2) Å c = 18.253(2) Å V = 2374.2(5) Å3 Space Group P212121 (#19) Z value 4 Dcalc 1.333 g/cm3 F000 1008.00 μ(MoKα) 1.60 cm−1 EXAMPLE 4 Preparation of Fumarate Salt of GS-7340 GS-7340-02 (V). (Scheme 1) A glass-lined reactor was charged with GS-7340 (IV), (1.294 kg, 2.71 mol), fumaric acid (284 g, 2.44 mol), and acetonitrile (24.6 kg). The mixture was heated to reflux to dissolve the solids, filtered while hot and cooled to 5° C. for 16 hours. The product was isolated by filtration, rinsed with acetonitrile (9.2 kg), and dried to 1329 g (V) as a white powder: mp 119.7-121.1° C.; [α]D20−41.7° (c 1.0, acetic acid). EXAMPLE 5 Preparation of GS-7120 (VI) A 5 L round bottom flask was charged with monophenyl PMPA, (II), (200 g, 0.55 mol) and acetonitrile (0.629 kg); Thionyl chloride (0.144 kg, 1.21 mol) was added below 27° C. The mixture was heated at 70° C. until solids dissolved. Volatiles (0.45 L) were removed by atmospheric distillation under nitrogen. The pot residue was cooled to 25° C., dichloromethane (1.6 kg) was added and the mixture was cooled to −20° C. A solution of (L)-α aminobutyric acid ethyl ester (0.144 kg, 1.1 mol) in dichloromethane (1.33 kg) was added over 18 minutes at −20 to −10° C. followed by triethylamine (0.17 kg, 1.65 mol) over 15 minutes at −8 to −15° C. The reaction mixture was warmed to room temperature and washed four times with sodium dihydrogenphosphate solution (10% aq., 0.3 L each wash). The organic solution was dried with anhydrous sodium sulfate (0.5 kg) and filtered. The solids were rinsed with dichloromethane (0.6 kg) and the combined filtrate and rinse was concentrated to an oil under reduced pressure. The oil was purified by chromatography over a 15×13 cm bed of 1.2 kg silica gel 60, 230 to 400 mesh. The column was eluted with a gradient of dichloromethane and methanol. Product bearing fractions were concentrated under reduced pressure to afford 211 g VI (Scheme 3) as a tan foam. EXAMPLE 5a Diastereomer Separation of GS-7120 by Batch Elution Chromatography The diastereomeric mixture was purified using the conditions described for GS-7171 in Example 3A except for the following: Mobile Phase (Initial): GS-7120-Acetonitrile: Isopropyl Alcohol (98:2) (Final): 100% Methyl Alcohol Elution Profile: GS-7341 (diastereomer B) :GS-7342 (diastereomer A) EXAMPLE 6 Diastereomer Separation of GS-7120 by Crystallization A 1 L round bottom flask was charged with monophenyl PMPA, (II), (50 g, 0.137 mol) and acetonitrile (0.2 L). Thionyl chloride (0.036 kg, 0.303 mol) was added with a 10° C. exotherm. The mixture was heated to reflux until solids dissolved. Volatiles (0.1 L) were removed by atmospheric distillation under nitrogen. The pot residue was cooled to 25° C., dichloromethane (0.2 kg) was added, and the mixture was cooled to −20° C. A solution of (L)-α aminobutyric acid ethyl ester (0.036 kg, 0.275 mol) in dichloromethane (0.67 kg) was added over 30 minutes at −20 to −8° C. followed by triethylamine (0.042 kg, 0.41 mol) over 10 minutes at up to −6° C. The reaction mixture was warmed to room temperature and washed four times with sodium dihydrogenphosphate solution (10% aq., 0.075 L each wash). The organic solution was dried with anhydrous sodium sulfate (0.1 kg) and filtered. The solids were rinsed with ethyl acetate (0.25 L, and the combined filtrate and rinse was concentrated to an oil under reduced pressure. The oil was diluted with ethyl acetate (0.25 L), seeded, stirred overnight, and chilled to −15° C. The solids were isolated by filtration and dried under reduced pressure to afford 17.7 g of GS-7342 (Table 5) as a tan powder: 1H NMR (CDCl3) δ 0.95 (t, 3H), 1.3 (m, 6H), 1.7, (m, 2H), 3.7 (m, 2H), 4.1(m, 6H), 4.4 (dd, 1H), 5.8 (s, 2H), 7.1 (m, 5H), 8.0 (s, 1H), 8.4 (s, 1H); 31P NMR (CDCl3) δ 21 (decoupled). EXAMPLE 7 Diastereomer Separation of GS-7097 The diastereomeric mixture was purified using the conditions described for GS-7171 (Example 3A) except for the following: Mobile Phase (Initial): GS-7120-Acetonitrile: Isopropyl Alcohol (95:5) (Final): 100% Methyl Alcohol Elution Profile: GS-7115 (diastereomer B) :GS-7114 (diastereomer A) EXAMPLE 8 Alternative Procedure for Preparation of GS-7097 GS-7097: Phenyl PMPA, Ethyl L-Alanyl Amidate. Phenyl PMPA (15.0 g, 41.3 mmol), L-alanine ethyl ester hydrochloride (12.6 g, 83 mmol) and triethylamine (11.5 mL, 83 mmol) were slurried together in 500 mL pyridine under dry N2. This suspension was combined with a solution of triphenylphosphine (37.9 g, 145 mmol), Aldrithiol 2 (2,2′-dipyridyl disulfide) (31.8 g, 145 mmol), and 120 mL pyridine. The mixture was heated at an internal temperature of 57° C. for 15 hours. The complete reaction was concentrated under vacuum to a yellow paste, 100 g. The paste was purified by column chromatography over a 25×11 cm bed of 1.1 kg silica gel 60, 230 to 400 mesh. The column was eluted with 8 liters of 2% methanol in dichloromethane followed by a linear gradient over a course of 26 liters eluent up to a final composition of 13% methanol. Clean product bearing fractions were concentrated to yield 12.4 g crude (5), 65% theory. This material was contaminated with about 15% (weight) triethylamine hydrochloride by 1H NMR. The contamination was removed by dissolving the product in 350 mL ethyl acetate, extracting with 20 mL water, drying the organic solution over anhydrous sodium sulfate, and concentrating to yield 11.1 g pure GS-7097 as a white solid, 58% yield. The process also is employed to synthesize the diastereomeric mixture of GS-7003a and GS-7003b (the phenylalanyl amidate) and the mixture GS-7119 and GS-7335 (the glycyl amidate). These diastereomers are separated using a batch elution procedure such as shown in Example 3A, 6 and 7. EXAMPLE 9 In Vitro Studies of Prodrug Diastereomers The in vitro anti-HIV-1 activity and cytotoxicity in MT-2 cells and stability in human plasma and MT-2 cell extracts of GS-7340 (freebase) and tenofovir disoproxil fumarate (TDF), are shown in Table 1. GS-7340 shows a 10-fold increase in antiviral activity relative to TDF and a 200-fold increase in plasma stability. This greater plasma stability is expected to result in higher circulating levels of GS-7340 than TDF after oral administration. TABLE 1 In Vitro Activity and Stability HIV-1 Stability T ½ (min) Activity Cytotoxicity Human MT-2 IC50 μM CC50 μM Plasma Cell Extract (P/MT-2) GS 7340 0.005 >40 90.0 28.3 3.2 TDF 0.05 70 0.41 70.7 0.006 Tenofovir 5 6000 — — — In order to estimate the relative intracellular PMPA resulting from the intracellular metabolism of TDF as compared to that from GS-7340, both prodrugs and PMPA were radiolabeled and spiked into intact human whole blood at equimolar concentrations. After 1 hour, plasma, red blood cells (RBCs) and peripheral blood mononuclear cells (PBMCs) were isolated and analyzed by HPLC with radiometric detection. The results are shown in Table 2. After 1 hour, GS-7340 results in 10× and 30× the total intracellular concentration of PMPA species in PBMCs as compared to TDF and PMPA, respectively. In plasma after 1 hour, 84% of the radioactivity is due to intact GS-7340, whereas no TDF is detected at 1 hour. Since no intact TDF is detected in plasma, the 10× difference at 1 hour between TDF and GS-7340 is the minimum difference expected in vivo. The HPLC chromatogram for all three compounds in PBMCs is shown in FIG. 1. TABLE 2 PMPA Metabolites in Plasma, PBMCs and RBCs After 1 h Incubation of PMPA Prodrugs or PMPA in Human Blood. Total C-14 Recovered, Metabolites (% of Total Peak Area) Compound Matrix μg-eq PMPA % PMPAp, % PMPApp, % Met. X, % Met. Y, % GS 7340, % GS-7340 Plasma/FP 43.0 1 — — 2 13 84 (60 μg-eq) PBMC 1.25 45 16 21 18 — — RBC/FP 12.6 8 — — 24 11 57 PMPA PMPAp PMPApp Mono-POC GS-4331 GS-4331 Plasma/FP 48.1 11 — — 89 — (TDF) PBMC 0.133 50 25 18 7 — (60 μg-eq) RBC/FP 10.5 93 7.0 — — — PMPA PMPAp PMPApp PMPA Plasma/FP 55.7 100 — — (60 μg-eq) PBMC 0.033 86 14 — RBC/FP 3.72 74 10 16 Met. X and Met Y (metabolites X and Y) are shown in Table 5. Lower case “p” designates phosphorylation. These results were obtained after 1 hour in human blood. With increasing time, the in vitro differences are expected to increase, since 84% of GS-7340 is still intact in plasma after one hour. Because intact GS-7340 is present in plasma after oral administration, the relative clinical efficacy should be related to the IC50 values seen in vitro. in Table 3 below, IC50 values of tenofovir, TDF, GS-7340, several nucleosides and the protease inhibitor nelfinivir are listed. As shown, nelfinavir and GS-7340 are 2-3 orders of magnitude more potent than all other nucleotides or nucleosides. TABLE 3 In Vitro Anti-HIV-1 Activities of Antiretroviral Compounds Compound IC50 (μM) Adefovir (PMEA) 13.4 ± 4.21 Tenofovir (PMPA) 6.3 ± 3.31 AZT 0.17 ± 0.081 3TC 1.8 ± 0.251 d4T 8 ± 2.51 Nelfinavir 0.006 ± 0.0021 TDF 0.05 GS 7340 0.005 1A. S. Mulato and J. M. Cherrington, Antiviral Research 36, 91 (1997) Additional studies of the in vitro cell culture anti-HIV-1 activity and CC50 of separated diastereomers of this invention were conducted and the results tabulated below. TABLE 4 Effect of Diastereomer Diastereomer Fold A/B CC50 Compound residue IC50 (μM) change activity (μM) PMPA — 5 1× — 6000 Ala-methylester Mixture 1:1 0.025 200× 20× 80 GS-6957a A 0.0075 670× GS-6957b 0.15 33× Phe-methylester Mixture 1:1 0.03 170× 10× 60 GS-7003a A 0.01 500× GS-7003b B 0.1 50× Gly-ethylester Mixture 1:1 0.5 10× 20× GS-7119 A 0.05 100× >100 GS-7335 B 1.0 5× Ala-isopropyl Mixture 1:1 0.01 500× 12× GS-7340 A 0.005 1,000× 40 GS-7339 B 0.06 83× >100 ABA-ethyl Mixture 1:1 0.008 625× 7.5× >100 GS-7342 A 0.004 1,250× GS-7341 B 0.03 170× Ala-ethyl Mixture 1:1 0.02 250× 10× 60 GS-7114 A 0.005 1,000× GS-7115 B 0.05 100× Assay reference: Arimilli, M N, et al., (1997) Synthesis, in vitro biological evaluation and oral bioavailability of 9-[2-(phosphonomethoxy)propyl]adenine (PMPA) prodrugs. Antiviral Chemistry and Chemotherapy 8(6):557-564. “Phe-methylester” is the methylphenylalaninyl monoamidate, phenyl monoester of tenofovir; “gly-methylester” is the methylglycyl monoamidate, phenyl monoester of tenofovir. In each instance above, isomer A is believed to have the same absolute stereochemistry as GS-7340 (S), and isomer B is believed to have the same absolute stereochemistry that of GS-7339. The in vitro metabolism and stability of separated diastereomers were determined in PLCE, MT-2 extract and human plasma. A biological sample listed below, 80 μL, was transferred into a screw-capped centrifuge tube and incubated at 37° C. for 5 min. A solution containing 0.2 mg/mL of the test compound in a suitable buffer, 20 μL, was added to the biological sample and mixed. The reaction mixture, 20 μL, was immediately sampled and mixed with 60 μL of methanol containing 0.015 mg/mL of 2-hydroxymethylnaphthalene as an internal standard for HPLC analysis. The sample was taken as the time-zero sample. Then, at specific time points, the reaction mixture, 20 μL, was sampled and mixed with 60 μL of methanol containing the internal standard. The mixture thus obtained was centrifuged at 15,000 G for 5 min and the supernatant was analyzed with HPLC under the conditions described below. The biological samples evaluated are as follows. (1) PLCE (porcine liver carboxyesterase from Sigma, 160 u/mg protein, 21 mg protein/mL) diluted 20 fold with PBS (phosphated-buffered saline). (2) MT-2 cell extract was prepared from MT-2 cells according to the published procedure [A. Pompon, I. Lefebvre, J.-L. Imbach, S. Kahn, and D. Farquhar, “Antiviral Chemistry & Chemotherapy”, 5:91-98 (1994)] except for using HEPES buffer described below as the medium. (3) Human plasma (pooled normal human plasma from George King Biomedical Systems, Inc.) The buffer systems used in the studies are as follows. In the study for PLCE, the test compound was dissolved in PBS. PBS (phosphate-buffered saline, Sigma) contains 0.01 M phosphate, 0.0027 M potassium chloride, and 0.137 M sodium chloride. pH 7.4 at 37° C. In the study for MT-2 cell extracts, the test compound was dissolved in HEPES buffer. HEPES buffer contains 0.010 M HEPES, 0.05 M potassium chloride, 0.005 M magnesium chloride, and 0.005 M dl-dithiothreitol. pH 7.4 at 37° C. In the study for human plasma, the test compound was dissolved in TBS. TBS (tris-buffered saline, Sigma) contains 0.05 M Tris, 0.0027 M potassium chloride, and 0.138 M sodium chloride. pH 7.5 at 37° C. The HPLC analysis was carried out under the following conditions. Column: Zorbax Rx-C8, 4.6×250 mm, 5μ (MAC-MOD Analytical, Inc. Chadds Ford, Pa.) Detection: UV at 260 nm Flow Rate: 1.0 mL/min Run Time: 30 min Injection Volume: 20 μL Column Temperature: Ambient temperature Mobile Phase A: 50 mM potassium phosphate (pH 6.0)/CH3CN=95/5 (v/v) Mobile Phase B: 50 mM Potassium phosphate (pH 6.0)/CH3CN=50/50 (v/v) Gradient Run: 0 min 100% Mobile Phase A 25 min 100% Mobile Phase B 30 min 100% Mobile Phase B The results are shown below in Table 5 (also including selected IC50 data from Table 4). TABLE 5 In Vitro Metabolism of Isomers A and B of PMPA monoamidate at 37° C. Human MT-2 extract Plasma PMPA monoamidate HIV IC50 PLCE hydrolysis hydrolysis rate Stability No. structure (μM) rate and product and product (HP) 1 0.005 t½ = 2.9 min Met. X & PMPA t½ = 2.9 min Met. X & PMPA t{fraction (1/2 )} = 148 min Met. Y 2 0.05 t½ = 8.0 min Met. X & PMPA t½ = 150.6 min Met. X & PMPA t½ = 495 min Met. Y 3 0.005 t½ = 3.3 min Met. X & PMPA t½ = 28.3 min Met. X & PMPA t½ = 90.0 min Met. Y 4 0.06 t½ = 10.1 min Met. X & PMPA t½ > 1000 min t½ = 231 min Met. Y 5 0.004 t½ = 3.9 min Met. X t½ = 49.2 min Met. X & PMPA t½ = 103 min Met. Y 6 0.03 t½ = 11.3 min Met. X t½ > 1000 min t½ = 257 min Met. Y 7 0.05 t½ < 0.14 min MonoPOC PMPA t½ = 70.7 min monoPOC PMPA t½ = 0.41 min monoPOC PMPA EXAMPLE 10 Plasma and PBMC Exposures Following Oral Administration Of Prodrug Diastereomers to Beagle Dogs The pharmacokinetics of GS 7340 were studied in dogs after oral administration of a 10 mg-eq/kg dose. Formulations. The prodrugs were formulated as solutions in 50 mM citric acid within 0.5 hour prior to dose. All compounds used in the studies were synthesized by Gilead Sciences. The following lots were used: Amidate AA Lot GSI Amino acid Ester Diastereoisomer Number GS- Alanine i-Propyl Isomer A 1504-187-19 7340-2 GS-7339 Alanine i-Propyl Isomer B 1509-185-31 GS7114 Alanine Ethyl Isomer A 1509-181-26 GS7115 Alanine Ethyl Isomer B 1509-181-22 GS7119 Glycine Ethyl Isomer A 1428-163-28 GS7342 α-Aminobutyric Ethyl Isomer A 1509-191-12 Acid GS7341 α-Aminobutyric Ethyl Isomer B 1509-191-7 Acid Dose Administration and Sample Collection. The in-life phase of this study was conducted in accordance with the recommendations of the “Guide for the Care and Use of Laboratory Animals” (National Institutes of Health publication 86-23) and was approved by an Institutional Animal Care and Use Committee. Fasted male beagle dogs (10±2 kg) were used for the studies. Each drug was administered as a single dose by oral gavage (1.5-2 ml/kg). The dose was 10 mg-equivalent of PMPA/kg. For PBMCs, blood samples were collected at 0 (pre-dose), 2,8, and 24 h post-dose. For plasma, blood samples were collected at 0 (pre-dose), 5, 15, and 30 min, and 1, 2, 3, 4, 6, 8, 12 and 24 h post-dose. Blood (1.0 ml) was processed immediately for plasma by centrifugation at 2,000 rpm for 10 min. Plasma samples were frozen and maintained at 70° C. until analyzed. Peripheral Blood Mononuclear Cell (PBMC) preparation. Whole blood (8 ml) drawn at specified time points was mixed in equal proportion with phosphate buffered saline (PBS), layered onto 15 ml of Ficoll-Paque solution (Pharmacia Biotech,) and centrifuged at 400×g for 40 min. PBMC layer was removed and washed once with PBS. Formed PMBC pellet was reconstituted in 0.5 ml of PBS, cells were resuspended, counted using hemocytometer and maintained at 70° C. until analyzed. The number of cells multiplied by the mean single-cell volume was used in calculation of intracellular concentrations. A reported value of 200 femtoliters/cell was used as the resting PBMC volume (B. L. Robins, R. V. Srinivas, C. Kim, N. Bischofberger, and A. Fridland, Antimicrob. Agents Chemother. 42, 612 (1998). Determination of PMPA and Prodrugs in plasma and PBMCs. The concentration of PMPA in dog plasma samples was determined by derivatizing PMPA with chloroacetaldehyde to yield a highly fluorescent N1, N6-ethenoadenine derivative (L. Naesens, J. Balzarini, and E. De Clercq, Clin. Chem. 38, 480 (1992). Briefly, plasma (100 μl) was mixed with 200 μl acetonitrile to precipitateprotein. Samples were then evaporated to dryness under reduced pressure at room temperature. Dried samples were reconstituted in 200 μl derivatization cocktail (0.34% chloroacetaldehyde in 100 mM sodium acetate, pH 4.5), vortexed, and centrifuged. Supernatant was then transferred to a clean screw-cap tube and incubated at 95° C. for 40 min. Derivatized samples were then evaporated to dryness and reconstituted in 100 μl of water for HPLC analysis. Before intracellular PMPA could be determined by HPLC, the large amounts of adenine related ribonucleotides present in the PBMC extracts had to be removed by selective oxidation. We used a modified procedure of Tanaka et al (K. Tanaka, A. Yoshioka, S. Tanaka, and Y. Wataya, Anal. Biochem., 139, 35 (1984). Briefly, PBMC samples were mixed 1:2 with methanol and evaporated to dryness under reduced pressure. The dried samples were derivatized as described in the plasma assay. The derivatized samples were mixed with 20 μL of 1M rhamnose and 30 μL of 0.1M sodium periodate and incubated at 37° C. for 5 min. Following incubation, 40 μL of 4M methylamine and 20 μL of 0.5M inosine were added. After incubation at 37° C. for 30 min, samples were evaporated to dryness under reduced pressure and reconstituted in water for HPLC analysis. No intact prodrug was detected in any PBMC samples. For plasma samples potentially containing intact prodrugs, experiments were performed to verify that no further conversion to PMPA occurred during derivatization. Prodrug standards were added to drug-free plasma and derivatized as described. There were no detectable levels of PMPA present in any of the plasma samples, and the projected % of conversion was less than 1%. The HPLC system was comprised of a P4000 solvent delivery system with AS3000 autoinjector and F2000 fluorescence detector (Thermo Separation, San Jose, Calif.). The column was an Inertsil ODS-2 column (4.6×150 mm). The mobile phases used were: A, 5% acetonitrile in 25 mM potassium phosphate buffer with 5 mM tetrabutyl ammonium bromide (TBABr), pH 6.0; B, 60% acetonitrile in 25 mM potassium phosphate buffer with 5 mM TBABr, pH 6.0. The flow rate was 2 ml/min and the column temperature was maintained at 35° C. by a column oven. The gradient profile was 90% A/10% B for 10 min for PMPA and 65%A/35%B for 10 min for the prodrug. Detection was by fluorescence with excitation at 236 nm and emission at 420 nm, and the injection volume was 10 μl. Data was acquired and stored by a laboratory data acquisition system (PeakPro, Beckman, Allendale, N.J.). Pharmacokinetic Calculations. PMPA and prodrug exposures were expressed as areas under concentration curves in plasma or PBMC from zero to 24 hours (AUC). The AUC values were calculated using the trapezoidal rule. Plasma and PBMC Concentrations. The results of this study is shown in FIGS. 2 and 3. FIG. 2 shows the time course of GS 7340-2 metabolism summary of plasma and PBMC exposures following oral administration of pure diastereoisomers of the PMPA prodrugs. The bar graph in FIG. 2 shows the AUC (0-24 h) for tenofovir in dog PBMCs and plasma after administration of PMPA s.c., TDF and amidate ester prodrugs. All of the amidate prodrugs exhibited increases in PBMC exposure. For example, GS 7340 results in a ˜21-fold increase in PBMC exposure as compared to PMPA s.c. and TDF; and a 6.25-fold and 1.29-fold decrease in plasma exposure, respectively. These data establish in vivo that GS 7340 can be delivered orally, minimizes systemic exposure to PMPA and greatly enhances the intracellular concentration of PMPA in the cells primarily responsible for HIV replication. TABLE 6 PMPA Exposure in PBMC and Plasma from Oral Prodrugs of PMPA in Dogs PMPA AUC PMPA AUC in Plasma in PBMC Prodrug PBMC/Plasma GS# Moiety Mean StDev N Mean StDev N in Plasma Exposure Ratio GS-7114 Mono-Ala-Et-A 5.8 0.9 2 706 331 5 YES 122 GS-7115 Mono-Ala-Et-B 6.6 1.5 2 284 94 5 YES 43 GS-7340-2 Mono-Ala-iPr-A 5.0 1.1 5 805 222 5 YES 161 GS-7339 Mono-Ala-iPr-A 6.4 1.3 2 200 57 5 YES 31 GS-7119 Mono-Gly-Et-A 6.11 1.86 2 530 304 5 YES 87 GS-7342 Mono-ABA-Et-A 4.6 1.2 2 1060 511 5 YES 230 GS7341 Mono-ABA-Et-B 5.8 1.4 2 199 86 5 YES 34 EXAMPLE 11 Biodistribution of GS-7340 As part of the preclinical characterization of GS-7340, its biodistribution in dogs was determined. The tissue distribution of GS-7340 (isopropyl alaninyl monoamidate, phenyl monoester of tenofovir) was examined following oral administration to beagle dogs. Two male animals were dosed orally with 14C=GS-7340 (8.85 mg-equiv. of PMPA/kg, 33.2 μCi/kg; the 8-carbon of adenine is labeled) in an aqueous solution (50 mM citric acid, pH 2.2). Plasma and peripheral blood mononuclear cells (PBMCs) were obtained over the 24-hr period. Urine and feces were cage collected over 24 hr. At 24 h after the dose, the animals were sacrificed and tissues removed for analysis. Total radioactivity in tissues was determined by oxidation and liquid scintillation counting. The biodistribution of PMPA after 24 hours after a single oral dose of radiolabelled GS 7340 is shown in Table 4 along with the data from a previous study with TDF (GS-4331). In the case of TDF, the prodrug concentration in the plasma is below the level of assay detection, and the main species observed in plasma is the parent drug. Levels of PMPA in the lymphatic tissues, bone marrow, and skeletal muscle are increased 10-fold after administration of GS-7340. Accumulation in lymphatic tissues is consistent with the data observed from the PBMC analyses, since these tissues are composed primarily of lymphocytes. Likewise, accumulation in bone marrow is probably due to the high percentage of lymphocytes (70%) in this tissue. TABLE 7 Excretion and Tissue Distribution of Radiolabelled GS-7340 in Dogs (Mean, N = 2) Following an Oral Dose at 10 mg-eq. PMPA/kg. GS-4331 GS-7340 Tissue Conc. Conc. Conc. Ratio of GS 7340 Tissue/Fluid % Dose (ug-eq/g) % Dose (ug-eq/g) to GS-4331 Liver 12.40 38.30 16.45 52.94 1.4 Kidney 4.58 87.90 3.78 80.21 0.9 Lungs 0.03 0.53 0.34 4.33 8.2 Iliac Lymph Nodes 0.00 0.51 0.01 5.42 10.6 Axillary Lymph Nodes 0.00 0.37 0.01 5.54 14.8 Inguinal Lymph Nodes 0.00 0.28 0.00 4.12 15.0 Mesenteric Lymph Nodes 0.00 1.20 0.04 6.88 5.7 Thyroid Gland 0.00 0.30 0.00 4.78 15.8 Pituitary Gland 0.00 0.23 0.00 1.80 7.8 Salivary Gland (L + R) 0.00 0.45 0.03 5.54 12.3 Adrenal Gland 0.00 1.90 0.00 3.47 1.8 Spleen 0.00 0.63 0.17 8.13 12.8 Pancreas 0.00 0.57 0.01 3.51 6.2 Prostate 0.00 0.23 0.00 2.14 9.1 Testes (L + R) 0.02 1.95 0.02 2.01 1.0 Skeletal Muscle 0.00 0.11 0.01 1.12 10.1 Heart 0.03 0.46 0.15 1.97 4.3 Femoral Bone 0.00 0.08 0.00 0.28 3.5 Bone Marrow 0.00 0.20 0.00 2.05 10.2 Skin 0.00 0.13 0.00 0.95 7.2 Abdominal fat 0.00 0.16 0.00 0.90 5.8 Eye (L + R) 0.00 0.06 0.00 0.23 3.7 Brain 0.00 <LOD 0.00 <LOD n.d. Cerebrospinal Fluid 0.00 <LOD 0.00 0.00 n.d. Spinal Cord 0.00 <LOD 0.00 0.04 n.d. Stomach 0.11 1.92 0.26 2.68 1.4 Jejunum 1.34 3.01 0.79 4.16 1.4 Duodenum 0.49 4.96 0.44 8.77 1.8 Ileum 0.01 0.50 0.16 4.61 9.2 Large Intestine 1.63 5.97 2.65 47.20 7.9 Gall bladder 0.00 3.58 0.04 25.02 7.0 Bile 0.00 9.63 0.22 40.48 4.2 Feces 40.96 n.d. 0.19 n.d. n.a. Total GI Tract Contents 5.61 n.d. 21.64 n.d. n.a. Urine 23.72 n.d. 14.73 n.d. n.a. Plasma at 24 h 0.00 0.20 0.00 0.20 1.0 Plasma at 0.25 h n.a. 3.68 n.a. 3.48 0.9 PBMC* 0.00 n.d. 0.00 63.20 n.d. Whole Blood 0.00 0.85 0.16 0.20 0.2 Total Recovery 81.10 68.96 Calculated using typical recovery of 15 × 106 cells total, and mean PBMC volume of 0.2 picoliters/cell n.s. = no sample, n.a. = not applicable, n.d. = not determined.
<SOH> SUMMARY OF THE INVENTION <EOH>Prodrugs of methoxyphosphonate nucleotide analogues intended for antiviral or antitumor therapy, while known, traditionally have been selected for their systemic effect. For example, such prodrugs have been selected for enhanced bioavailability, i.e., ability to be absorbed from the gastrointestinal tract and converted rapidly to parent drug to ensure that the parent drug is available to all tissues. However, applicants now have found that it is possible to select prodrugs that become enriched at therapeutic sites, as illustrated by the studies described herein where the analogues are enriched at localized focal sites of HIV infection. The objective of this invention is, among other advantages, to produce less toxicity to bystander tissues and greater potency of the parental drug in tissues which are the targets of therapy with the parent methoxyphosphonate nucleotide analogue. Accordingly, pursuant to these observations, a screening method is provided for identifying a methoxyphosphonate nucleotide analogue prodrug conferring enhanced activity in a target tissue comprising: (a) providing at least one of said prodrugs; (b) selecting at least one therapeutic target tissue and at least one non-target tissue; (c) administering the prodrug to the target tissue and to said at least one non-target tissue; and (d) determining the relative antiviral activity conferred by the prodrug in the tissues in step (c). In preferred embodiments, the target tissue are sites where HIV is actively replicated and/or which serve as an HIV reservoir, and the non-target tissue is an intact animal. Unexpectedly, we found that selecting lymphoid tissue as the target tissue for the practice of this method for HIV led to identification of prodrugs that enhance the delivery of active drug to such tissues. A preferred compound of this invention, which has been identified by this method has the structure (1), where Ra is H or methyl, and chirally enriched compositions thereof, salts, their free base and solvates thereof. A preferred compound of this invention has the structure (2) and its enriched diasteromers, salts, free base and solvates. In addition, we unexpectedly found that the chirality of substituents on the phosphorous atom and/or the amidate substituent are influential in the enrichment observed in the practice of this invention. Thus, in another embodiment of this invention, we provide diastereomerically enriched compounds of this invention having the structure (3) which are substantially free of the diastereomer (4) wherein R 1 is an oxyester which is hydrolyzable in vivo, or hydroxyl; B is a heterocyclic base; R 2 is hydroxyl, or the residue of an amino acid bonded to the P atom through an amino group of the amino acid and having each carboxy substituent of the amino acid optionally esterified, but not both of R 1 and R 2 are hydroxyl; E is —(CH 2 ) 2 —, —CH(CH 3 )CH 2 —, —CH(CH 2 F)CH 2 —, —CH(CH 2 OH)CH 2 —, —CH(CH═CH 2 )CH 2 —, —CH(C≡CH)CH 2 —, —CH(CH 2 N 3 )CH 2 —, —CH(R 6 )OCH(R 6′ )—, —CH(R 9 )CH 2 O— or —CH(R 8 )O—, wherein the right hand bond is linked to the heterocyclic base; the broken line represents an optional double bond; R 4 and R 5 are independently hydrogen, hydroxy, halo, amino or a substituent having 1-5 carbon atoms selected from acyloxy, alkyoxy, alkylthio, alkylamino and dialkylamino; R 6 and R 6′ are independently H, C 1 -C 6 alkyl, C 1 -C 6 hydroxyalkyl, or C 2 -C 7 alkanoyl; R 7 is independently H, C 1 -C 6 alkyl, or are taken together to form —O— or —CH 2 —; R 8 is H, C 1 -C 6 alkyl, C 1 -C 6 hydroxyalkyl or C 1 -C 6 haloalkyl; and R 9 is H, hydroxymethyl or acyloxymethyl; and their salts, free base, and solvates. The diastereomers of structure (3) are designated the (S) isomers at the phosphorus chiral center. Preferred embodiments of this invention are the diastereomerically enriched compounds having the structure (5a) which is substantially free of diastereomer (5b) wherein R 5 is methyl or hydrogen; R 6 independently is H, alkyl, alkenyl, alkynyl, aryl or arylalkyl, or R 6 independently is alkyl, alkenyl, alkynyl, aryl or arylalkyl which is substituted with from 1 to 3 substituents selected from alkylamino, alkylaminoalkyl, dialkylaminoalkyl, dialkylamino, hydroxyl, oxo, halo, amino, alkylthio, alkoxy, alkoxyalkyl, aryloxy, aryloxyalkyl, arylalkoxy, arylalkoxyalkyl, haloalkyl, nitro, nitroalkyl, azido, azidoalkyl, alkylacyl, alkylacylalkyl, carboxyl, or alkylacylamino; R 7 is the side chain of any naturally-occurring or pharmaceutically acceptable amino acid and which, if the side chain comprises carboxyl, the carboxyl group is optionally esterified with an alkyl or aryl group; R 11 is amino, alkylamino, oxo, or dialkylamino; and R 12 is amino or H; and its salts, tautomers, free base and solvates. A preferred embodiment of this invention is the compound of structure (6), 9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine, also designated herein GS-7340 Another preferred embodiment of this invention is the fumarate salt of structure (5) (structure (7)),9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine fumarate (1:1), also designated herein GS-7340-2 The compounds of structures (1)-(7) optionally are formulated into compositions containing pharmaceutically acceptable excipients. Such compositions are used in effective doses in the therapy or prophylaxis of viral (particularly HIV or hepadnaviral) infections. In a further embodiment, a method is provided for the facile manufacture of 9-[2-(phosphonomethoxy)propyl]adenine (hereinafter “PMPA” or 9-[2-(phosphonomethoxy)ethyl] adenine (hereinafter “PMEA”) using magnesium alkoxide, which comprises combining 9-(2-hydroxypropyl)adenine or 9-(2-hydroxyethyl)adenine, protected p-toluenesulfonyloxymethylphosphonate and magnesium alkoxide, and recovering PMPA or PMEA, respectively.
20040311
20080624
20050113
75253.0
1
SRIVASTAVA, KAILASH C
PRODRUGS OF PHOSPHONATE NUCLEOTIDE ANALOGUES
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,798,780
ACCEPTED
Methods and pharmaceutical compositions for reliable achievement of acceptable serum testosterone levels
The present invention relates to pharmaceutical compositions, formulated for injectable administration, which comprises a testosterone ester, in particularly testosterone undecanoate, in a vehicle comprising castor oil and a co-solvent. Upon injecting the compositions according to a particular administration scheme, reliable levels of testosterone in serum in the normal physiological range is achieved for a long period. This allows for the use of the compositions in hormone replacement therapy and male contraception without concomitant monitoring of testosterone levels in serum by a physician.
1. A composition formulated for intramuscular injection comprising a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates; and a vehicle comprising castor oil and a co-solvent. 2. The composition according to claim 1, wherein the testosterone ester is selected from the group consisting of testosterone esters of linear and branched noncanoates, decanoates, undecanoates, dodecanoates, tridecanoates, tetradecanoates, pentadecanoates, and hexadecanoates. 3. The composition according to claim 2, wherein the testosterone ester is testosterone undecanoate. 4. The composition according to claim 1, wherein the vehicle comprises the castor oil in a concentration of less than 50 vol %. 5. The composition according to claim 1, wherein the vehicle comprises said castor oil and co-solvent in a volume ratio ranging between 1:0.2 to 1:3. 6. The composition according to claim 1, wherein the co-solvent is benzyl benzoate. 7. A method of treating diseases and symptoms associated with deficient endogenous levels of testosterone in a man, comprising injectable administration of a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, the method further comprises; i) an initial phase comprising 2 to 4 injections of a dose of said testosterone ester with an interval of 4 to 8 weeks between each injections, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg; followed by ii) a maintenance phase comprising subsequent injections of a dose of said testosterone ester with an interval of at least 9 weeks between each subsequent injection, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg. 8. The method according to claim 7, wherein said initial phase comprises 2 injections of said dose of said testosterone ester. 9. The method according to claim 7, wherein said interval is 6 weeks. 10. The method according to claim 7, wherein said subsequent injections of said dose is with an interval of 10 weeks. 11. The method according to claim 7, wherein said dose of said testosterone ester is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 750 to 1500 mg. 12. The method according to claim 7 wherein the man is a hypogonadal man, a man with hypophyseal diseases or a man in therapy with gonadotropin-suppressive agents or progestins. 13. The method according to claim 7, wherein said diseases and symptoms is associated with primary and secondary hypogonadism and hypophyseal diseases. 14. The method according to claim 13, wherein said primary hypogonadism is derived from testicular failure associated with cryptorchidism, bilateral testicular torsion, orchitis, orchidectomy, Klinefelter syndrome, chemotherapy or toxic damage from alcohol or heavy metals. 15. The method according to claim 13, wherein said secondary hypogonadism is associated with idiopathic gonadotropin releasing hormone (GnRH) deficiency or pituitary-hypothalamic injury from tumours, trauma or radiation. 16. The method according to claim 7, further comprising administering a progestin or a further gonadotropin suppressive agent. 17. The method according to claim 16, for male contraception. 18. The method according to claim 7, wherein the testosterone ester is selected from the group consisting of testosterone esters of linear and branched noncanoates, decanoates, undecanoates, dodecanoates, tridecanoates, tetradecanoates, pentadecanoates, and hexadecanoates. 19. The method according to claim 18, wherein the testosterone ester is testosterone undecanoate. 20. The composition according to claim 1, wherein the vehicle comprises the castor oil in a concentration of less than 45 vol %. 21. The composition according to claim 1, wherein the vehicle comprises the castor oil in a concentration of less than 40 vol %. 22. The composition according to claim 1, wherein the vehicle comprises the castor oil in a concentration of less than 30 vol %. 23. The composition according to claim 1, wherein the vehicle comprises said castor oil and co-solvent in a volume ratio ranging between 1:0.5 to 1:3. 24. The composition according to claim 1, wherein the vehicle comprises said castor oil and co-solvent in a volume ratio ranging between 1:0.75 to 1:2.5. 25. The composition according to claim 1, wherein the vehicle comprises said castor oil and co-solvent in a volume ratio ranging between 1:1 to 1:2. 26. The method according to claim 7, wherein said subsequent injections of said dose is with an interval of 11 weeks between injections. 27. The method according to claim 7, wherein said subsequent injections of said dose is with an interval of 12 weeks between injections. 28. The method according to claim 7, wherein said dose of said testosterone ester is in an amount therapeutically equivalent to a dose of testosterone undecanoate of about 1000 mg.
The entire disclosure[s] of all applications, patents and publications, cited herein and of corresponding U.S. Provisional Application Ser. No. 60/454,312, filed Mar. 14, 2003, is incorporated by reference herein. This application claims priority benefit of U.S. Provisional Application Ser. No. 60/454,312, filed Mar. 14, 2003. FIELD OF INVENTION The present invention relates to the field of pharmaceutical formulation science as well as the field of therapeutic applications of hormones in hormone replacement therapy in men and in male contraception. In particular, the invention relates to compositions of testosterone esters in castor oil that upon intramuscular injection provides reliable physiological acceptable serum testosterone levels for a prolonged period. BACKGROUND For several decades, testosterone preparations have been used clinically to treat primary and secondary male hypogonadism in order to achieve normal physiologic levels of testosterone and to relieve symptoms of androgen deficiency. Furthermore, testosterone preparations have been used in male contraception as the sole active therapeutic agent for suppressing spermatogenesis or as an active agent in combination with progestins or further gonadotropin suppressive agents. Male hypogonadism is characterised by a deficiency of endogenous testosterone production resulting in abnormally low levels of circulating testosterone, i.e. serum testosterone levels below 10 nmol/l. Male hypogonadism may be classified in primary and secondary causes: primary or hypergonadotropic hypogonadism, congenital or acquired, may be derived from testicular failure due to cryptorchidism, bilateral testicular torsion, orchitis, orchidectomy, Klinefelter syndrome, chemotherapy or toxic damage from alcohol or heavy metals. Secondary or hypogonadotropic hypogonadism, congenital or acquired, is caused by idiopathic gonadotropin releasing hormone (GnRH) deficiency or pituitary-hypothalamic injury from tumours, trauma, or radiation. In the vast majority of cases, hypogonadism is related to a primary defect of the testes. The clinical picture of hypogonadal adult men varies a lot. For example, testosterone deficiency is accompanied by symptoms of different severity, including sexual dysfunction, reduced muscle mass and muscle strength, depressed mood and osteoporosis. Current standard therapies aims at restoring physiologically relevant levels of testosterone in serum, which applies to concentrations of about 12 nmol to about 36 nmol. Intramuscular injection of testosterone esters, such as testosterone enanthate or testosterone cypionate, administered every two to three weeks, still represents the standard of testosterone replacement therapy in most countries of the world. Apart from the inconvenience of frequent visits to the doctor's office, the patients complain about variations in well-being due to short-term fluctuations of serum testosterone levels resulting from the pharmacokinetic profile after intramuscular injection of for example testosterone enanthate. Recently, the use of testosterone esters with longer aliphatic chain length and/or higher hydrophobicity, such as testosterone undecanoate, has become interesting in terms of prolonging the interval between injections. Longer intervals between injections are advantageous from a patient's point of view. For example Zhang G et al, 1998, report the injection of compositions comprising testosterone undecanoate in a concentration of 250 mg in 2 ml tea seed oil so as to administer a dose of 500 mg or 1000 mg of testosterone undecanoate (Zhang G et al., A pharmacokinetic study of injectable testosterone undecanoate in hypogonadal men. J. Andrology, vol 19, No 6, 1998). Zhang et al, 1999, relates to injectable testosterone undecanoate as a potential male contraceptive (Zhang et al, J clin Endocrin & metabolism, 1999, vol 84, no 10, p 3642-3646). Furthermore, Behre et al, 1999, relates to testosterone undecanoate preparations for testosterone replacement therapy such as testosterone undecanoate 125 mg/ml in teaseed oil and testosterone undecanoate 250 mg/ml in castor oil (Behre et al, Intramuscular injection of testosterone undecanoate for the treatment of male hypogonadism: phase I studies. European J endocrin, 1999, 140, p 414-419). Intramuscular injections of 250 mg testosterone undecanoate and 200 mg MPA every month have been suggested for male contraception (Chen Zhao-dian et al, clinical study of testosterone undecanoate compound on male contraception. J Clin androl, 1986, vol 1, issue 1, abstract) Wang Lie-zhen et al. report testosterone replacement therapy using monthly intramuscular injections of 250 mg testosterone undecanoate (Wang Lie-zhen et al. The therapeutic effect of domestically produced testosterone undecanoate in Klinefelt syndrome. New Drugs Market 8: 28-32, 1991. WO 95/12383 (Chinese application) relates to injectable compositions of testosterone undecanoate in vegetable oils, optionally in admixture with benzyl benzoate. The compositions are injected monthly when applied for male contraception and substitution therapy. U.S. Pat. No. 4,212,863 is a patent which relates to a lipid formulation of steroids for oral or parenteral administration various oil carriers, optionally including benzyl benzoate, which is said to lower the viscosity of the lipid carrier and/or enhance the solubility. Eckardstein and Niesclag, 2002, report the treatment of hypogonadal men with testosterone undecanoate, wherein physiological relevant levels of testosterone may be achieved for an extended period of time upon initially injecting testosterone undecanoate four times in intervals of 6-weeks followed by subsequent injections of longer intervals (Eckardstein and Niesclag, treatment of male hypogonadism with testosterone undecanoate injected at extended intervals of 12 weeks, J Andrology, vol 23, no 3, 2002) However, it is well known that therapies with testosterone esters, such as testosterone undecanoate, still need to be improved in terms of achieving reliable serum testosterone levels in the physiologically acceptable range for a prolonged period of time. There is a need of providing reliable standard regimens acceptable for a broad population of men in need thereof, preferably regimens without the need of occasional control of serum testosterone levels, and regimens wherein steady state conditions are achieved within a shorter time period. SUMMARY OF INVENTION The present invention relates to injectable compositions comprising long-term acting testosterone esters for use in testosterone replacement therapy. Upon injecting the compositions, physiologically normal levels of testosterone in serum are reached within a short time period. Furthermore, the physiologically normal serum levels of testosterone are maintained for an extended period of time, without showing fluctuations in the hypogonadal range. The compositions are chemically stable with respect to the testosterone ester as well as physically stable with respect to the vehicle for a prolonged time. Therefore, in a first aspect the present invention relates to a composition intended for injectable administration, such as by intramuscular injections, the composition comprises a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, preferably testosterone undecanoate; and a vehicle, which comprises castor oil and a co-solvent. Furthermore, in a second aspect the invention relates to a method of treating diseases and symptoms associated with deficient endogenous levels of testosterone in a man. For example methods of treating primary and secondary hypogonadism; hypophyseal diseases; symptoms of sexual dysfunction; symptoms of reduced muscle mass and muscle strength; symptoms of depressed mood; or symptoms of osteoporosis. The method comprises administering by injection a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, such as testosterone undecanoate, according to a particular scheme comprising: i) an initial phase of 2 to 4 injecting a dose of said testosterone ester with an interval of 4 to 8 weeks between each administration, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg; followed by ii) a maintenance phase of subsequent injecting a dose of said testosterone ester with an interval of at least 9 weeks between each subsequent administration, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg. Further aspects relate to the use of the above-mentioned compositions for male contraception. Still further aspects relate to the use of a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates for the preparation of medicaments that are in a form for parenteral administration, such as in a form for intramuscular injection and further comprises a vehicle comprising castor oil and a co-solvent. The medicaments in question are primarily for treating primary and secondary hypogonadism in a male for treating diseases and symptoms associated with deficient levels of testosterone in a male who are in therapy with a progestin or a further gonadotropin suppressive agent. DETAILED DESCRIPTION OF THE INVENTION The present inventors provide, herein, standard methods resulting in superior pharmacokinetic profiles of testosterone in vivo. Physiologically normal serum levels of testosterone are achieved quickly after initiating the therapy with the testosterone preparations of the invention and reliable testosterone serum levels within the normal physiological range is maintained for an extended period of time. Advantageously, the standard methods reported herein, allows for significant prolonged intervals between injections, and the serum testosterone levels may not necessarily need to be controlled. According to the invention, the standard method includes combining the suitable formulation of a composition comprising slowly degradable testosterone esters, such as testosterone undecanoate, and suitable injection schemes of well defined doses of such testosterone esters. Without being adapted to a particular theory, a number of parameters will influence the pharmacokinetic profile of a testosterone ester that is injected intramuscularly, in particularly if a depot effect is desirable. A depot effect can in general be achieved by selecting a testosterone ester that slowly degrades into free testosterone once it has entered the blood circulation. An additional factor contributing to the depot effect is the diffusion rate of the testosterone ester from the site of injection to the circulating blood system. The diffusion rate may depend on the dose and the volume injected in that the concentration gradient of the testosterone ester at the site of administration is thought to affect the diffusion rate. Furthermore, the type of vehicle injected together with the testosterone esters will influence the rate of diffusion of testosterone esters from the vehicle into the surrounding tissues and the rate of absorption into the blood circulation. Therefore, the partition coefficient (n-octanol-water partition coefficient) of the testosterone ester in the vehicle as well as the viscosity of the vehicle should be considered in order for adapting a depot effect following intramuscular injection of testosterone esters. Moreover, for safety reasons and ease of handling, the testosterone ester should be proper dissolved in a vehicle. Often it is impossible to predict which kind of vehicles that both can dissolve the testosterone ester and provide the needed depot effect. Therefore, mixtures of various solvents may be required, although undesirable from a manufacturing point of view. The present inventors have recognised that an effective depot effect in vivo of testosterone esters, such as testosterone undecanoate, is achieved when injecting the testosterone esters intramuscularly in a vehicle comprising castor oil and a suitable co-solvent. The co-solvent may lower the viscosity of the castor oil and then solve the problem with high viscosity of the castor oil when being injected. On the other hand, the co-solvent may increase the diffusion rate of the testosterone ester, resulting in a lower depot effect following intramuscular injection. As may be understood, a first aspect of the invention relates to a composition comprising a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates; and a vehicle comprising castor oil and a co-solvent. The composition is formulated for parenteral administration, preferably intramuscular injection. The term “linear and branched C-9 to C-16 alkanoates” is denoted to mean aliphatic esters with chain lengths from 9 to 16 carbon atoms. That is to say that the aliphatic esters are made of 9 to 16 carbon atoms. Thus, in suitable embodiments of the invention, the testosterone ester is selected from esters, wherein the ester group is a noncanoate, a decanoate, an undecanoate, a dodecanoate, a tridecanoate, a tetradecanoate, a pentadecanoates, or a hexadecanoate. Preferably, the ester group may be placed in the 17β-position of the testosterone molecule. In a presently interesting embodiment, the testosterone ester is testosterone undecanoate, a testosterone ester with an aliphatic side chain in 17β position. The chemical name is 17β-hydroxyandrost-4-en-3-one undecanoate. The term “castor oil” is meant to encompass castor oil refined for parenteral use, for example as described in DAB, wherein the castor oil is provided in a form without antioxidants and obtained with the first pressure of ricinus communis without using extraction processes. It should also be understood that the castor oil are not hydrogenated or at least in part not hydrogenated. In some embodiments, a minor part of the double bonds may be hydrogenated, For example, less than 20% w/w of the double bonds may be hydrogenated. Preferably less than 10% w/w of the double bonds may be hydrogenated, more preferably less than 5% w/w, even more preferably less than 2% w/w, most preferably less than 1% w/w of the double bonds are hydrogenated. Castor oil appears as a liquid at room temperature. As stated, the co-solvent of the vehicle is, at least in part, an essential element of the compositions of the invention. Such co-solvents may in general be defined by its capability of reducing the viscosity of castor oil, as determined by a Höppler viscosimeter. Injection of high viscous vehicles, such as castor oil, is associated with technical limitations to the size of cannula due to the resistance of the vehicle when passing the cannula. It is commonly recommended that the viscosity of an injection solution should be kept below 100 mPas. In certain instances, the viscosity of a final product, ready to be injected, such as a re-constituted product may be, e.g., less than 100 mPas, such as 90 mPas, 80 mpas, 70 mPas at room temperature. In some embodiments, the viscosity of the vehicle is less than 60 mPas, 50 mpas, 40 mPas or 30 mPas at room temperature. Thus, suitable embodiments of the invention relate to those wherein the co-solvent is selected from those that when being mixed with castor oil in an oil:co-solvent volume ratio of between 1:0.2 to 1:3, the viscosity drops from 950-1100 mPas to 20 mPas at room temperature. Preferably, the co-solvent is selected from those, wherein the viscosity drops from 950-1100 mPas to about 80-100 mPas, when the co-solvent is being mixed with castor oil in an oil:co-solvent volume ratio of about 1:1 to 1:3. The viscosity of the vehicle may be determined with a Höppler type viscometer. The Höppler type viscometer consists of an inclined glass tube inside which a sphere with known density, mass and diameter glides through the liquid to be measured, and the falling time of the ball is measured. The viscosity is measured at a fixed temperature, often room temperature such as 20° C. or 25° C. The measurements are repeated until the values are constant. The co-solvent may be characterised by is ability to reduce the viscosity of a vehicle, such as castor oil, of the solvent in a ratio dependent manner. In one interesting embodiment of the invention the viscosity of a mixture of castor oil and a co-solvent in a volume ratio of 1:0.1 to 1:1.7 is reduced from 60% to 5% to that of castor oil. In a suitable embodiment of the invention, the viscosity of a mixture of castor oil and a co-solvent in a ratio of 1:0.02 by volume is reduced by about 10% relatively to the viscosity of castor oil. In other various embodiments, when the ratio between the oil and co-solvent is of 1:0.04 by volume the viscosity is reduced by 20% relatively to the viscosity of castor oil, when the ratio is of 1:0.08 by volume the viscosity is reduced by 25%, when the ratio is of 1:0.1 by volume the viscosity is reduced by 40%, when the ratio is of 1:0.2 by volume the viscosity is reduced by 50%, when the ratio is 1:0.35 by volume the viscosity is reduced by 75%, when the ratio is of 1:0.5 by volume the viscosity is reduced by 80%, when the ratio is of 1:1 by volume the viscosity is reduced by 90%, or when the ratio is 1:1.6 by volume the viscosity is reduced by 95%. In further interesting embodiments, the viscosity of the composition is below 100 mPas. Furthermore, in some embodiments the viscosity of vehicle, such as the mixture of castor oil and a co-solvent, such as benzyl benzoate is below 90 mPas, the viscosity of the vehicle is about 60-100 mpas, such as 70 to 100 mPas, such as 80-90 mPas at room temperature (20° C. to 25° C.). As mentioned, the viscosity of the injected vehicle may determine the pharmacokinetic profile of an injected substance. Thus, in order to obtain a final product with a suitable depot effect in vivo, the castor oil and co-solvent is in a volume ratio ranging between 1:0.2 to 1:3, such as between 1:0.5 to 1:3, or between 1:0.75 to 1:2.5. Preferably, the volume ratio is in the range from 1:1 to 1:2. In presently interesting embodiments of the invention, the co-solvent is benzyl benzoate. In principle, other types of co-solvents may be applicable for use in combination with castor oil, such as for example ethanol or benzyl alcohol. Interesting co-solvents of the present invention are those which are capable of dissolving the testosterone esters and is miscible with castor oil. Of special interest are co-solvents suitable for dissolving about 100-500 mg, such as 250 mg of testosterone undecanoate in 1 mL of the co-solvent within 50 minutes at 40° C. or within 20 minutes at 60° C. The solubility of the testosterone esters may be affected upon adding a co-solvent to the castor oil vehicle. Probably the solubility may be improved. Thus, in some embodiments, the testosterone ester is completely dissolved in the composition, and in other embodiments the testosterone ester is partly dispersed in the composition. Preferably, the testosterone esters are fully dissolved in the vehicle. That is to say that no particles of testosterone may be detected by X-ray diffraction analysis. The present invention provides compositions, wherein the co-solvent is present in the vehicle at concentrations ranging from 10 to 90 vol %. Preferably, the concentration of the co-solvent in the vehicle ranges between 15 to 85 vol %, more preferably between 20 to 80 vol %, such as between 45 to 85 vol % or 55 to 85 vol %. In other words, the vehicle comprises the castor oil in a volume concentration ranging between 20 to 85 vol %. Preferably, the concentration of castor oil in the vehicle ranges between 25 to 60 vol %, such as between 25 to 55 vol %. In preferred embodiments of the invention, the concentration of castor oil in the vehicle ranges between 25 to 50 vol %, such as between 25 to 45 vol % or 25 to 40 vol %. It should be understood that intentionally the composition should not comprise another plant oil, such as for example tea seed oil. That is to say that castor oil is the only plant oil present in the composition or that castor oil makes up at least 50% by volume of the total content of the plant oil in the vehicle, such as at least 60%, 70%, 80% or 90% by volume. It is generally considered that the needed concentration of the co-solvent depends on a number of factors, such as i) the amount of testosterone ester in the injection vehicle, ii) the required reduction of viscosity and iii) the release properties of the injection vehicle with respect to the testosterone ester at the site of injection (diffusion rate). In interesting embodiments of the invention, the co-solvent makes up at least 10 vol % of the vehicle, preferably at least 15 vol %, more preferably of at least 25 vol %, most preferably at least 40 vol %, such as at least 50 vol %. Interestingly, the co-solvent is in an amount ranging from about 40 to 80 vol % of the vehicle, such as about 50 to 70 vol %, most preferably the co-solvent is in an amount ranging from about 55 to 65 vol % of the vehicle. In some embodiments of the invention, the concentration of the co-solvent in the vehicle should be limited in order to reduce the diffusion rate of the testosterone esters, for instance at the site of injection. Therefore in some embodiments the concentration of co-solvent in the vehicle should be less than 90 vol %, preferably less than 85 vol %, more preferably less than 80 vol %, such as less than 75 vol %. The volume that can be injected intramuscularly is known to affect the release rate of an active principle from a vehicle. An injection volume of 5 mL is generally considered as the maximum volume that can be administrated by one single intramuscular injection to one injection site. When intramuscular injection of volumes greater than 5 mL is required, the injection volume needs to be divided into two or more separate injections to different injection sites. However, multiple injections for the administering of one dose are generally not preferred because of the inconvenience conferred to the patient. The injection of a single dose to one injection site offers great advantages in controlling the release rate of an active principle, rather than multiple injection of divided single doses. The present invention relates to injection schemes wherein a single dose of a testosterone ester is divided into no more than two separate injections to one or more injection sites. Most preferable, a single dose of a testosterone ester is injected as one single injection to one injection site. Therefore, in presently interesting embodiments of the invention the dose of the testosterone esters is administered as a single injection to one injection site, wherein the injected volume is of 1 to 5 mL, preferably of 1 to 4 mL, such as of 1.5 to 4 mL. Suitable injection volumes of the invention for ensuring reproducible administration volumes and uniform release of the testosterone esters is lower than 5 mL, such as about 5 mL, about 4 mL, about 3 mL, about 2 mL and about 1 mL. In order for using single injections and low injections volumes, the concentration of the testosterone esters in the compositions need to be relatively high. Thus, a testosterone ester, such as testosterone undecanoate is in a concentration of 100 mg to 1000 mg per mL of the vehicle. In still interesting embodiments, the testosterone ester, such as testosterone undecanoate, is in a concentration of 130 to 750 mg per mL of the vehicle, more preferably of 150 to 500 mg per mL, most preferably of 175 to 400 mg per mL, such as about 250 mg/mL of the vehicle. The composition may be suitable formulated as a unit dose form such as a unit dose intended for being injected as one single dose. In such embodiments, the testosterone ester, such as testosterone undecanoate, is in a dose of 500 to 4000 mg, preferably of 500 mg to 3000 mg, more preferably of 750 mg to 2000 mg, most preferably of 750 mg to 1500 mg, such as 1000 mg. It is further contemplated that compositions of the invention comprise a further therapeutically active agent, such as a progestin and/or a further gonadotropin suppressive agent other than a testosterone ester. As used herein, the term “progestin” encompasses all compounds with progestinic activity such as cyproterone, drospirenone, etonogestrel, desogestrel, gestodene, levonorgestrel, norethisterones, norgestimate, norethindrone, norethindrone acetate, norethynodrel, norgestimate, norgestrel, medrogestone, medroxyprogesterone acetate and progesterone. The compositions of the invention are chemically stable with respect to the testosterone esters. That is to say that degradation products could not be detected after long term storage (such as after 7 weeks or 17 weeks or even longer) at conditions normally known to accelerate degradation processes, such as variations in temperatures, high and low temperatures and various relative humidity. For example, less than 1% by weight of degradation products of testosterone esters is present after storage of the composition for at least 7 weeks, such as for 16 or 17 weeks, for 6 months, or for 9 or 12 months at 40° C. and 25% RH in darkness. Preferably, less than 0.5% w/w, such as less than 0.2% w/w of degradation products of testosterone esters is present after storage at the above-mentioned conditions. Moreover, the vehicle comprising castor oil and benzyl benzoate is also highly stable in that no sublimate of the solution is seen upon storage of the composition for a long time at various temperatures. Compositions according to the invention may be prepared according to techniques known by the skilled person. A first step in the preparation of a composition of the invention comprises dissolving the testosterone ester in the co-solvent. Then, the testosterone undecanoate/co-solvent solution is combined with castor oil. The final solution may then be filtrated through a 0,2 μm filter, optionally filled into, for instance, amber-glass bottles, before finally sterilised at 180° C. for 3 hours. It is submitted that the vehicle, wherein the testosterone ester is dissolved, may further comprise one or more excipients, such as preservatives, stabilising agents, other co-solvents and antioxidants. Suitable vehicles are sterile, pyrogen-free and free of particles. As stated supra, the present inventors have provided a formulation of testosterone esters possessing superior pharmacokinetic profiles of testosterone in the blood upon selecting a proper injection vehicle for the testosterone esters so as to ensure slowly diffusion of the testosterone esters from the site of injection and slowly disintegration of the testosterone ester into free testosterone in the blood and selecting a simple and reliable administration scheme of such compositions for treating diseases and symptoms associated with deficient endogenous levels of testosterone in a man. Thus, a further aspect of the invention relates to a method of treating diseases and symptoms associated with deficient endogenous levels of testosterone in a male, such as a mammalian male, such as a man, comprising administering by injection, such as by intramuscular injection, a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, the method further comprises; i) an initial phase comprising 2 to 4 injections of a single dose of said testosterone ester with an interval of 4 to 10 weeks between each injections, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg; followed by ii) a maintenance phase comprising subsequent injections of a single dose of said testosterone ester with an interval of at least 9 weeks between each subsequent injection, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg. The phrase “therapeutically equivalent” is meant to define the dose of any testosterone ester of the invention in terms of the therapeutically relevant dose of testosterone undecanoate. For example, if it has been shown that the therapeutically relevant dose of testosterone undecanoate for reinstating testosterone blood levels in the range of 12-35 nmol is about 1000 mg, the dose of any testosterone ester of the invention is the dose achieving the same effect as testosterone undecanoate. The term “administration by injection” is meant to encompass any form for injection into a muscle or subcutaneous injection. The preferred form of injection is by intramuscular injection. Preferably, the initial phase comprises 2 or 3 injections of a dose of said testosterone ester, such as testosterone undecanoate, with an interval of 4 to 8 weeks between each injection. In a most interesting embodiment, the initial phase includes 2 injections of a single dose of said testosterone ester with an interval of 4 to 10 weeks between each injection. In currently interesting embodiments, the interval between injections in the initial phase is 6 weeks. In further aspects, the invention relates to the use of a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates for the preparation of a medicament for treating primary and secondary hypogonadism in a male, said medicament is in a form intended for injectable administration and further comprises a vehicle comprising castor oil and a co-solvent. The present inventors provide herein evidence for that upon applying a first injection interval of 6 weeks (injection of a first dose followed by a second dose 6 weeks after the first injection), the time until steady-state conditions is shortened. Thus, a maintenance phase may start already after 6 weeks of therapy. As further shown herein, the subsequent injection of testosterone undecanoate can be conducted using intervals of 10 weeks or 12 weeks between injections so as to achieve serum testosterone levels remaining well within the normal range of 10 to 35 nmol/l throughout the entire period between injections. Thus, an injection scheme resulting in reliable serum testosterone levels ranging from 10-35 nmol/L has been found. The pharmacokinetic profile of the composition of the invention allows for extended periods between injections when steady state conditions is first achieved. Thus, in preferred embodiments of the invention, the maintenance phase comprises that the subsequent injections are conducted with an interval of 10 weeks between subsequent injections, preferably with an interval of 11 weeks, such as intervals of 12, 13, 14, 15 and 16 weeks between subsequent injections of the compositions of the invention. The actual dose of testosterone ester being injected will also modify the depot effect of the compositions of the invention. Therefore, in suitable embodiments of the invention, the injected single dose of said testosterone ester is in an amount therapeutically equivalent to a single dose of testosterone undecanoate of between 750 to 1500 mg. Preferably, 1000 mg of testosterone undecanoate is injected as a single dose or any therapeutically equivalent dose of another testosterone undecanoate of the invention. As may be understood, the single doses referred to above, such as the doses injected during the initial phase and the doses injected during the maintenance phase may be similar or different. Therefore, in some embodiments of the invention, the doses injected during the initial phase comprise the same amount of testosterone ester. In other embodiments, the doses injected during the initial phase are different from one injection to another. Similarly, in some embodiments, the doses injected during the maintenance phase are similar throughout the period or they may vary. Obviously, the doses applied in the initial phase may differ from those applied in the maintenance phase. However, preferably the doses of the testosterone esters injected in the initial phase and maintenance phase comprises the same amount of testosterone ester. As mentioned above, the invention relates to a method of treating diseases and symptoms associated with deficient endogenous levels of testosterone in a male, such as a mammalian male, such as a man. As used herein, deficient levels of testosterone in a man, such as a hypogonadal man, is meant to encompass levels testosterone in serum less than 10 or 9 nmol/l. In one embodiment of the invention, the deficient endogenous levels of testosterone may be caused by therapy with progestins or gonadotropin suppressive agents. Thus, methods of treating deficient endogenous levels of testosterone in a male may imply methods for male contraception. Therefore, in some embodiments of the invention, methods of treatment and uses are directed to male contraception, optionally wherein a progestin or a further gonadotropin suppressive agent is included in the treatment. Hence, in still further aspects, the invention relates to the use of a of a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates for the preparation of a medicament for treating diseases and symptoms associated with deficient levels of testosterone in a male in therapy with a progestin or a further gonadotropin suppressive agent, said medicament is in a form intended for being injected, such as in a form for intramuscular injection, and the testosterone ester, such as testosterone undecanoate is in a vehicle comprising castor oil and a co-solvent. In general, the invention relates to the use of a composition as defined herein for male contraception or for treating diseases and symptoms associated with deficient endogenous levels of testosterone in a male. Generally speaking, diseases and symptoms of deficient endogenous levels of testosterone in a male may imply sexual dysfunction, reduced muscle mass and muscle strength, depressed mood and/or osteoporosis. Diseases of interest relate in general to primary and secondary hypogonadism and hypophyseal diseases. Thus, embodiments of the invention include treatment of diseases associated with primary and secondary hypogonadism and hypophyseal diseases. Primary hypogonadism may be derived from testicular failure such as resulting from cryptorchidism, bilateral testicular torsion, orchitis, orchidectomy, Klinefelter syndrome, chemotherapy and toxic damage from alcohol or heavy metals. Secondary hypogonadism may be derived from idiopathic gonadotropin releasing hormone (GnRH) deficiency or pituitary-hypothalamic injury associated with tumours, trauma or radiation. Hence, in some embodiments of the invention, the treatment and uses of the invention is directed to a hypogonadal man, a man with hypophyseal diseases and/or a man in therapy with gonadotropin-suppressive agents or progestins. Furthermore, as stated the single dose of a testosterone ester need to be justified so as to achieve reliable serum testosterone levels. Thus, in some embodiments, said use of a testosterone ester for the preparation of a medicament comprises that said testosterone ester is in a unit dose therapeutically equivalent to a dose of testosterone undecanoate, or that said testosterone ester is in a dose, corresponding to a 6-week dose of 500 mg to 2000 mg of testosterone undecanoate. In some embodiments, the dose corresponds to a 9-week dose of 500 mg to 2000 mg of testosterone undecanoate, a 10-week dose of 500 mg to 2000 mg, a 11-week dose of 500 mg to 2000 mg, a 12-week dose of 500 mg to 2000 mg, a 13-week dose of 500 mg to 2000 mg, a 14-week dose of 500 to 2000 mg, a 15-week dose of 500 to 2000 mg and a 16-week dose of 500 mg to 2000 mg. Preferably, such 6-, 9-, 10-, 11-, 12-, 13-, 14-, 15- and 16-week doses of a testosterone ester are therapeutically equivalent to a dose of testosterone undecanoate of 750 mg to 1500 mg, preferably of 1000 mg. As may be further understood, the method of treatments and uses as described herein include embodiments wherein the testosterone ester, such as testosterone undecanoate is provided in a composition as defined herein. FIGURES FIG. 1. Total levels of testosterone in serum following injection of testosterone undecanoate. The FIGURE shows the levels of testosterone (total amounts) following injecting a formulation of testosterone undecanoate in a vehicle containing 4 ml of a mixture of castor oil and benzyl benzoate in a ratio of 1:1.7 by volume. See Example 3 for the injection scheme. The dotted lines shows the initial phase of two injections of 1000 mg of TU with an interval of 6 weeks, followed by 3 injections of TU with an interval of 10 weeks between injections. The filled lines show the continued injection of 1000-mg TU with an interval of 12 weeks between injections. EXAMPLES Example 1 Compositions according to the present invention are formulated for intramuscular injection and prepared according to techniques known by a person skilled in the art. Compositions are in general prepared by incorporating a therapeutically effective amount of any of testosterone ester of the invention, such as the testosterone undecanoate, in an appropriate vehicle comprising castor oil and a co-solvent, such as benzyl benzoate. Further excipients may be added. Finally, the compositions are subjected to a sterilisation process. The vehicle wherein the active substance is dissolved may comprise excipients such as preservatives, stabilising agents, co-solvents and antioxidants. Suitable vehicles are sterile, pyrogen-free and free of particles. The compositions may be presented in unit dosage form, e.g., in ampoules or in multi-dose containers. The preparation of compositions according to one embodiment of the invention may comprise the following steps: i) Pre sterilisation of excipients and testosterone esters. ii) Preparation of a solution of testosterone esters iii) Addition of one or more excipients to the solution of testosterone esters iv) Filtration of the composition v) Preparation/filling of single or multi-dose containers vi) Sterilisation. In one specific example of the invention the testosterone undecanoate is dissolved in benzyl benzoate, the testosterone undecanoate/co-solvent solution is then combined with the castor oil, which is then filtrated through a 0,2 μm filter, filled into amber-glass bottles, and finally sterilised at 180° C. for 3 hours. Example 2 The therapeutic efficacy and safety of a formulation containing testosterone undecanoate 1000 mg in a vehicle of 4 ml of a mixture of castor oil and benzyl benzoate in a ratio of 1:1.7 by volume has been investigated in hypogonadal men. The formulation (4 mL, 1000 mg of testosterone undecanoate) was injected intramuscularly to the hypogonadal men according to the following scheme: initial phase comprising 4 injections of the formulation with intervals of 6 weeks between the injections. maintenance phase comprising injecting the formulation in intervals of 10 or 12 weeks between injections. The present study relates to a one-arm study examining the efficacy and safety of long-term intramuscular injection of testosterone undecanoate for the treatment of symptoms of hypogonadism in men. The patients received 4 testosterone undecanoate injections of 1000 mg the first three times of injections with an interval of 6 weeks, the 4th injection and subsequent injections with 12-week intervals. Protocol: Name of active Testosterone Undecanoate (TU) ingredient: Objectives: To obtain further information on efficacy and safety of the TU preparation after long-term administration over a period of more than 18 months at prolonged (12-week) intervals between the injections of 1000 mg TU in 4 ml oily solution Methodology: Open, one-arm, multiple-dose study Total number of planned: 36 subjects: Diagnosis and main Hypogonadal men aged 18 to 65 years and with criteria for serum T (testosterone) levels without androgen inclusion: treatment lower than 5 nmol/L, who orderly completed the main study with a final examination, did not exhibit any relevant pathological findings, and gave their written informed consent to either extend the TU treatment from the main study or switch over from TE (testosterone enanthate) to TU Test product: Testosterone Undecanoate (TU) dose: in patients on TU: 8 × 1000 mg at 12-week intervals mode of Intramuscular injections (gluteus medius muscle) administration: Duration of 80 weeks treatment: 84 weeks Efficacy end Primary variables: erythropoiesis (hemoglobin, points: hematocrit), grip strength; Secondarv variables: serum levels of testosterone (T), dihydrotestos- terone (DHT), estradiol (E2), luteinizing hormone (LH), follicle stimulating hormone (FSH), leptin and sex hormone-binding globulin (SHBG); bone density; parameters of bone metabolism; body composition; lipids (total cholesterol, triglycerides, low-density, high-density and very low-density lipoproteins, apolipoprotein A1 and B, lipoprotein (a)) Safety end Adverse events (AEs); serum level of prostate- points: specific antigen (PSA); ultrasonographic findings in prostate; hematological and liver (ASAT, ALAT, gamma-GT, total bilirubin) parameters, ferritin, iron; The results of this study allow for the following conclusion: Treatment with only 4 TU doses of 1000 mg i.m. per year was sufficient to restore physiological serum T levels in all 36 patients over most of the measurement times. This demonstrates that an injection interval of 12 weeks is adequate for most of the patients. Example 3 Pharmacokinetic profile of compositions of the invention: The pharmacokinetic profile of a formulation containing testosterone undecanoate (TU) 1000 mg in a vehicle of 4 ml of a mixture of castor oil and benzyl benzoate in a ratio of 1:1.7 by volume was tested in hypogonadal men (having testosterone levels in serum of less than 10 nmol/l). An initial phase of two first intramuscularly injections of 1000 mg TU with 6-weeks interval between the two injections, followed by a maintenance phase of subsequent 3 intramuscularly injections of 1000 mg TU separated by an interval of 10 weeks between each of the injections. Then 1000 mg of testosterone undecanoate (TU) was intramuscularly injected every 12 weeks. 5 treatment periods were provided with an interval of 12 weeks between each injection. The result from this study shows (see FIG. 1) that the treatment scheme resulted in testosterone levels (total levels) wherein the maximal and minimal levels are within the physiological acceptable range and no accumulation of testosterone is seen over time. Furthermore, the minimum testosterone levels (total levels) after 12 weeks do not fall below the lowest acceptable concentration of testosterone of about 10 nmol. The same was shown to apply for a treatment period of 14 weeks upon extrapolating the serum levels of testosterone. The study also demonstrated that injection of 1000 mg of TU in the above-mentioned formulation in intervals of 12 weeks between injections was efficient over a period of 14 weeks. Example 4 Comparison of initial phases with 6 weeks between injections and 10 weeks between injections. The pharmacokinetic profile of a formulation containing testosterone undecanoate (TU)1000 mg in a vehicle of 4 ml of a mixture of castor oil and benzyl benzoate in a ratio of 1:1.7 by volume was tested using two different regimens in hypogonadal men. In regimen A, an initial phase of two first intramuscularly injections of 1000 mg TU with mean of 9.2-weeks (64.4 days) interval between the two injections, followed by a maintenance phase of subsequent intramuscularly injections of 1000 mg TU separated by an interval of a mean of 10.2 weeks (76.2 days) after second injection. In regimen B, an initial phase of two first intramuscularly injections of 1000 mg TU with mean of 6.1-weeks (42.5 days) interval between the first two injections, followed by a maintenance phase of subsequent intramuscularly injections of 1000 mg TU separated by an interval of mean of 10.1 weeks (70.5 days) after second injections. The concentration of testosterone (total) was determined in serum before each additional injection of TU. Results. The table below shows the mean serum levels of testosterone (total) for regimen A versus regimen A based on data for 6 men. Mean Testosterone Levels (Total) in Serum According to the Number of Weeks Between Injections. Base value; mean ↓ 1st injection ↓ 2nd injection testosterone Mean Mean level (nmol/l) Mean weeks testosterone Mean weeks testosterone before 1st after 1st level (nmol/l) after 2nd level (nmol/l) Regime injection injection after weeks injection after weeks A 7.9 9.2 7.0 10.8 8.8 B 6.8 6.1 12.2 10.1 12.5 It appears that regimens including long-term intervals between injections, both with respect to the initial phase and maintenance phase, do not result in the sufficient levels of testosterone above 10 nmol over the entire period and up to the following injection (Regimen A). However, upon decreasing the interval between injections in the initial phase to 6 weeks, a reliable regimen is achieved, wherein sufficient testosterone levels are re-instated very fast and remains at levels above 10 nmol/l.
<SOH> BACKGROUND <EOH>For several decades, testosterone preparations have been used clinically to treat primary and secondary male hypogonadism in order to achieve normal physiologic levels of testosterone and to relieve symptoms of androgen deficiency. Furthermore, testosterone preparations have been used in male contraception as the sole active therapeutic agent for suppressing spermatogenesis or as an active agent in combination with progestins or further gonadotropin suppressive agents. Male hypogonadism is characterised by a deficiency of endogenous testosterone production resulting in abnormally low levels of circulating testosterone, i.e. serum testosterone levels below 10 nmol/l. Male hypogonadism may be classified in primary and secondary causes: primary or hypergonadotropic hypogonadism, congenital or acquired, may be derived from testicular failure due to cryptorchidism, bilateral testicular torsion, orchitis, orchidectomy, Klinefelter syndrome, chemotherapy or toxic damage from alcohol or heavy metals. Secondary or hypogonadotropic hypogonadism, congenital or acquired, is caused by idiopathic gonadotropin releasing hormone (GnRH) deficiency or pituitary-hypothalamic injury from tumours, trauma, or radiation. In the vast majority of cases, hypogonadism is related to a primary defect of the testes. The clinical picture of hypogonadal adult men varies a lot. For example, testosterone deficiency is accompanied by symptoms of different severity, including sexual dysfunction, reduced muscle mass and muscle strength, depressed mood and osteoporosis. Current standard therapies aims at restoring physiologically relevant levels of testosterone in serum, which applies to concentrations of about 12 nmol to about 36 nmol. Intramuscular injection of testosterone esters, such as testosterone enanthate or testosterone cypionate, administered every two to three weeks, still represents the standard of testosterone replacement therapy in most countries of the world. Apart from the inconvenience of frequent visits to the doctor's office, the patients complain about variations in well-being due to short-term fluctuations of serum testosterone levels resulting from the pharmacokinetic profile after intramuscular injection of for example testosterone enanthate. Recently, the use of testosterone esters with longer aliphatic chain length and/or higher hydrophobicity, such as testosterone undecanoate, has become interesting in terms of prolonging the interval between injections. Longer intervals between injections are advantageous from a patient's point of view. For example Zhang G et al, 1998, report the injection of compositions comprising testosterone undecanoate in a concentration of 250 mg in 2 ml tea seed oil so as to administer a dose of 500 mg or 1000 mg of testosterone undecanoate (Zhang G et al., A pharmacokinetic study of injectable testosterone undecanoate in hypogonadal men. J. Andrology , vol 19, No 6, 1998). Zhang et al, 1999, relates to injectable testosterone undecanoate as a potential male contraceptive (Zhang et al, J clin Endocrin & metabolism, 1999, vol 84, no 10, p 3642-3646). Furthermore, Behre et al, 1999, relates to testosterone undecanoate preparations for testosterone replacement therapy such as testosterone undecanoate 125 mg/ml in teaseed oil and testosterone undecanoate 250 mg/ml in castor oil (Behre et al, Intramuscular injection of testosterone undecanoate for the treatment of male hypogonadism: phase I studies. European J endocrin, 1999, 140, p 414-419). Intramuscular injections of 250 mg testosterone undecanoate and 200 mg MPA every month have been suggested for male contraception (Chen Zhao-dian et al, clinical study of testosterone undecanoate compound on male contraception. J Clin androl, 1986, vol 1, issue 1, abstract) Wang Lie-zhen et al. report testosterone replacement therapy using monthly intramuscular injections of 250 mg testosterone undecanoate (Wang Lie-zhen et al. The therapeutic effect of domestically produced testosterone undecanoate in Klinefelt syndrome . New Drugs Market 8: 28-32, 1991. WO 95/12383 (Chinese application) relates to injectable compositions of testosterone undecanoate in vegetable oils, optionally in admixture with benzyl benzoate. The compositions are injected monthly when applied for male contraception and substitution therapy. U.S. Pat. No. 4,212,863 is a patent which relates to a lipid formulation of steroids for oral or parenteral administration various oil carriers, optionally including benzyl benzoate, which is said to lower the viscosity of the lipid carrier and/or enhance the solubility. Eckardstein and Niesclag, 2002, report the treatment of hypogonadal men with testosterone undecanoate, wherein physiological relevant levels of testosterone may be achieved for an extended period of time upon initially injecting testosterone undecanoate four times in intervals of 6-weeks followed by subsequent injections of longer intervals (Eckardstein and Niesclag, treatment of male hypogonadism with testosterone undecanoate injected at extended intervals of 12 weeks, J Andrology , vol 23, no 3, 2002) However, it is well known that therapies with testosterone esters, such as testosterone undecanoate, still need to be improved in terms of achieving reliable serum testosterone levels in the physiologically acceptable range for a prolonged period of time. There is a need of providing reliable standard regimens acceptable for a broad population of men in need thereof, preferably regimens without the need of occasional control of serum testosterone levels, and regimens wherein steady state conditions are achieved within a shorter time period.
<SOH> SUMMARY OF INVENTION <EOH>The present invention relates to injectable compositions comprising long-term acting testosterone esters for use in testosterone replacement therapy. Upon injecting the compositions, physiologically normal levels of testosterone in serum are reached within a short time period. Furthermore, the physiologically normal serum levels of testosterone are maintained for an extended period of time, without showing fluctuations in the hypogonadal range. The compositions are chemically stable with respect to the testosterone ester as well as physically stable with respect to the vehicle for a prolonged time. Therefore, in a first aspect the present invention relates to a composition intended for injectable administration, such as by intramuscular injections, the composition comprises a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, preferably testosterone undecanoate; and a vehicle, which comprises castor oil and a co-solvent. Furthermore, in a second aspect the invention relates to a method of treating diseases and symptoms associated with deficient endogenous levels of testosterone in a man. For example methods of treating primary and secondary hypogonadism; hypophyseal diseases; symptoms of sexual dysfunction; symptoms of reduced muscle mass and muscle strength; symptoms of depressed mood; or symptoms of osteoporosis. The method comprises administering by injection a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates, such as testosterone undecanoate, according to a particular scheme comprising: i) an initial phase of 2 to 4 injecting a dose of said testosterone ester with an interval of 4 to 8 weeks between each administration, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg; followed by ii) a maintenance phase of subsequent injecting a dose of said testosterone ester with an interval of at least 9 weeks between each subsequent administration, each dose is in an amount therapeutically equivalent to a dose of testosterone undecanoate of between 500 mg and 2000 mg. Further aspects relate to the use of the above-mentioned compositions for male contraception. Still further aspects relate to the use of a testosterone ester selected from the group of esters consisting of linear and branched C-9 to C-16 alkanoates for the preparation of medicaments that are in a form for parenteral administration, such as in a form for intramuscular injection and further comprises a vehicle comprising castor oil and a co-solvent. The medicaments in question are primarily for treating primary and secondary hypogonadism in a male for treating diseases and symptoms associated with deficient levels of testosterone in a male who are in therapy with a progestin or a further gonadotropin suppressive agent.
20040312
20100518
20050210
66080.0
1
HUI, SAN MING R
METHODS AND PHARMACEUTICAL COMPOSITIONS FOR RELIABLE ACHIEVEMENT OF ACCEPTABLE SERUM TESTOSTERONE LEVELS
UNDISCOUNTED
0
ACCEPTED
2,004
10,799,053
ACCEPTED
Microelectromechanical system pressure sensor and method for making and using
According to some embodiments, an apparatus includes a substrate that defines a plane. The apparatus also includes a first conducting plate that is substantially normal to the substrate and a second conducting plate that is (i) substantially normal to the substrate and (ii) deformable in response to a pressure.
1. An apparatus, comprising: a substrate defining a plane; a first conducting plate substantially normal to the substrate; and a second conducting plate substantially normal to the substrate and deformable in response to a pressure. 2. The apparatus of claim 1, wherein the substrate is associated with a microelectromechanical system wafer. 3. The apparatus of claim 1, wherein the second conducting plate is deformable in a direction substantially in the first plane. 4. The apparatus of claim 3, wherein the two conducting plates are electrically isolated, and the pressure is to be measured based at least in part on capacitance between the two conducting plates. 5. The apparatus of claim 4, wherein a voltage level is associated with at least one of the conducting plates. 6. The apparatus of claim 1, wherein the first conducting plate is also deformable in response to the pressure. 7. The apparatus of claim 6, wherein the conducting plates comprise diaphragms. 8. The apparatus of claim 1, wherein the substrate includes at least one of: (i) a silicon layer, (ii) an oxide layer, and (iii) a bonding layer. 9. The apparatus of claim 1, wherein the substrate is bonded to a backing wafer. 10. An apparatus, comprising: a substrate defining a first plane; a first finger, including a first pair of conducting plates, wherein at least one of the conducting plates is substantially normal to the substrate and deformable in response to pressure, and wherein a vacuum is provided between the first pair of conducting plates; and a second finger, including a second pair of conducting plates, wherein at least one of the conducting plates is substantially normal to the substrate and deformable in response to pressure, and wherein a vacuum is provided between the second pair of conducting plates. 11. The apparatus of claim 10, wherein the first pair of conducting plates is electrically isolated from the second pair of conducting plates. 12. The apparatus of claim 11, wherein pressure is to be measured based at least in part on capacitance between the fingers. 13. The apparatus of claim 12, wherein (i) the first finger is part of a first comb having a plurality of fingers that are electrically coupled to each other, and (ii) the second finger is part of a second comb having a plurality of fingers that are electrically coupled to each other and electrically isolated from the fingers of the first comb. 14. The apparatus of claim 13, wherein fingers of the first are second combs are interleaved. 15. The apparatus of claim 14, wherein the combs form an array of capacitors connected in parallel. 16. The apparatus of claim 12, wherein the measured pressure is an absolute pressure. 17. The apparatus of claim 12, wherein at least one of the conducting plates is deformable in response to a first pressure and at least one of the conducting plates is deformable in response to a second pressure, and wherein the measured pressure is associated with the difference between the first and second pressures. 18. The apparatus of claim 12, wherein an increase in pressure is associated with a decrease in capacitance. 19. The apparatus of claim 12, wherein an increase in pressure increases a distance between one of the conducting plates of the first finger and one of the conducting plates of the second finger. 20. The apparatus of claim 12, wherein air acts as a dielectric associated with the capacitance. 21. A method, comprising: providing a voltage to one of a first conducting plate and a second conducting plate, the first conducting plate being substantially normal to a substrate defining a plane and the second conducting plate being (i) electrically isolated from the first conducting plate, (ii) substantially normal to the substrate, and (iii) deformable in response to pressure; and measuring pressure based at least in part on capacitance between the two conducting plates. 22. A method, comprising: on a wafer that includes a first non-conducting layer bonded onto a conducting layer, etching substantially parallel trenches through the layers to form a plurality of conducting plates substantially normal to a plane defined by the wafer, wherein at least one conducting plate is to be deformable in response to pressure; and bonding a second non-conducting layer onto the first non-conducting layer. 23. The method of claim 22, wherein pairs of conducting plates form fingers. 24. The method of claim 23, wherein a first set of fingers is formed on a first comb and a second set of fingers is formed on a second comb, the fingers of the first and second combs being interleaved. 25. The method of claim 24, further comprising: etching away a portion of the second non-conducting layer and the first non-conducting layer to expose a portion of the conducting layer. 26. The method of claim 25, further comprising: creating a vacuum within a finger. 27. The method of claim 25, further comprising: bonding a cap wafer onto the second non-conducting layer. 28. The method of claim 27, wherein the cap wafer includes at least one of: (i) a ground via, (ii) a voltage via, (iii) a first pressure via, and (iv) a second pressure via. 29. The method of claim 22, wherein at least one pressure input cavity is formed while etching the trenches. 30. A system, comprising: a microelectromechanical system pressure sensor, including: a substrate defining a plane, a first conducting plate substantially normal to the substrate, and a second conducting plate substantially normal to the substrate and deformable in response to a pressure; and a pressure dependent device. 31. The system of claim 30, wherein the pressure dependent device is associated with at least one of: (i) a pressure display, (ii) a tire pressure monitor, (iii) an ultrasonic transducer, (iv) a blood pressure sensor, and (v) a barometer. 32. An apparatus, comprising: a substrate defining a plane; and a deformable plate substantially normal to the substrate and deformable in response to a pressure. 33. The apparatus of claim 32, wherein an amount of resistance associated with the deformable plate varies with stress. 34. The apparatus of claim 33, wherein the substrate is associated with a microelectromechanical system wafer. 35. The apparatus of claim 34, wherein the deformable plate is a diaphragm deformable in a direction substantially in the plane defined by the substrate. 36. The apparatus of claim 35, wherein the diaphragm is associated with at least one of: (i) piezoelectric characteristics, (ii) piezoresistance characteristics, (iii) an embedded device having piezoelectric characteristics, and (iv) an embedded device having piezoresistance characteristics.
BACKGROUND A pressure sensor may convert an amount of pressure into an electrical value. For example, a pressure sensor may use a sensor diaphragm or membrane positioned parallel to a plane of a wafer to convert an amount of pressure into a capacitance value. Note that the overall size of the pressure sensor may be important. For example, the amount of space on a wafer that is occupied by a pressure sensor (referred to as the sensor's “footprint”) might make a device expensive to produce and/or make the sensor impractical for some applications. Thus, it may be important that a pressure sensor does not occupy too large of an area on a wafer. In addition, increasing the sensitivity of a pressure sensor might require an increase in the sensor's footprint. Moreover, such a change could require that some parts of the sensor are completely re-designed (which can be a difficult and time-consuming process). SUMMARY According to some embodiments, an apparatus includes a substrate that defines a plane. The apparatus also includes a first conducting plate that is substantially normal to the substrate and a second conducting plate that is (i) substantially normal to the substrate and (ii) deformable in response to a pressure. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view of a known pressure sensor. FIG. 2 is a side view of the pressure sensor of FIG. 1. FIG. 3 is a perspective view of an apparatus constructed in accordance with an exemplary embodiment of the invention. FIG. 4 is a side view of the apparatus of FIG. 3. FIG. 5 is a cross-sectional view of a sealed pressure sensor constructed in accordance with an exemplary embodiment of the invention. FIG. 6 is a perspective view of the sealed pressure sensor of FIG. 5. FIG. 7 is a side view of an apparatus constructed in accordance with another exemplary embodiment of the invention. FIG. 8 is a top view of a pressure sensor with a vertical capacitor array constructed in accordance with another exemplary embodiment of the invention. FIG. 9 is a side view of the pressure sensor of FIG. 8. FIG. 10 illustrates a method to measure pressure according to some embodiments. FIG. 11 illustrates a method to create a pressure sensor according to some embodiments. FIG. 12 is a perspective view of a wafer constructed in accordance with another exemplary embodiment of the invention. FIG. 13 is a top view of the wafer of FIG. 12 after trenches have been etched. FIG. 14 is side view of the wafer of FIG. 13. FIG. 15 is side view of the wafer of FIG. 14 after another non-conducting layer has been added. FIG. 16 is a side view of a wafer of FIG. 15 after a portion of the top non-conducting layer has been removed. FIG. 17 is a differential pressure sensor constructed in accordance with another exemplary embodiment of the invention. FIG. 18 is a system constructed in accordance with another exemplary embodiment of the invention. FIG. 19 is a piezoresistance pressure sensor constructed in accordance with another exemplary embodiment of the invention. FIG. 20 is a top view of a bare die after deep trenches have been etched according to an exemplary embodiment of the invention. FIG. 21 is a top view of the die of FIG. 20 after an oxide cap has been placed on the die and portions of the oxide cap have been etched away according to an exemplary embodiment of the invention. FIG. 22 is a perspective view of a cap wafer that might be used in connection with the die of FIG. 21 according to an exemplary embodiment of the invention. FIG. 23 is a perspective view of a pressure sensor according to an exemplary embodiment of the invention. DETAILED DESCRIPTION FIG. 1 illustrates a capacitive pressure sensor 100. The sensor 100 includes a pair of conducting plates 110, 120 that are positioned substantially parallel to a horizontal plane that is defined by a non-conducting substrate 130 (e.g., a wafer). Note that in some cases, the plate 110 could formed as an integral part of the substrate 130. One of these plates 120 is deformable in response to pressure (P). In particular, as shown in the side view of the sensor 100 illustrated in FIG. 2, the plate 120 might be a thin film diaphragm that flexes such that the distance between the two plates 110, 120 will decrease when a pressure P acting on the conducting plates 110, 120 is increased. Note that the capacitance C between the plates 110, 120 depends in part on the distance between them. In particular, when the two plates 110, 120 are electrically isolated from each other, it can be detected that the amount of capacitance C increases as the plates 110, 120 move together. An increase in the pressure P, therefore, can be measured based on the increased capacitance C, since the increased pressure will push one plate 120 closer to the other plate 110. Instead of capacitance, a resistance associated with a single deformable plate or diaphragm might be used to measure pressure. For example, one or more piezoreistors could be embedded in a diaphragm. In this case, the diaphragm itself might be formed of a non-conducting material. The plates 110, 120 used for the pressure sensor 100 sensor might be, for example, several hundred microns wide. Moreover, improving the sensitivity of the sensor 100 may require even larger plates 110, 120. The relatively large footprint associated with the sensor 100 might make the device expensive to produce and/or make the sensor 100 impractical for some applications. In addition, the large plates 110, 120 could be damaged if too much pressure is applied (e.g., the flexible plate 120 could detach from a supporting structure). FIG. 3 is a diagram of an apparatus 300 according to some embodiments. The apparatus 300 may be, for example, a Microelectromechanical System (MEMS) device. As before, a first conducting plate 310 and a second conducting plate 320 are provided on a non-conducting substrate 330. The plates 310, 320 may be formed, for example, using silicon and the substrate may formed using oxide. As illustrated, the plates 310, 320 are substantially normal to the substrate 330. That is, the plates 310, 320 extend vertically from a horizontal plane defined by the substrate 330. At least one of the plates 310, 320 is deformable in response to a pressure P. The deformable plate may, for example, flex in a direction substantially in the horizontal plane. Referring to the side view of the apparatus 300 illustrated in FIG. 4, the second plate 320 may flex such that the distance between the two plates 310, 320 will decrease when the pressure P is increased. Thus, when the two plates 310, 320 are electrically isolated from each other, it can be detected that the capacitance C increases as the pressure P increases. Because the plates 310, 320 extend vertically from the substrate 330, the footprint of the apparatus 300 might be, for example, a few microns in width. FIG. 5 is a cross-sectional view of a sealed pressure sensor 500 according to some embodiments. A first conducting plate 510 and a second conducting plate 520 extend vertically from a horizontal plane defined by a substrate 530. Note that, as illustrated, both plates 510, 520 are deformable in response to pressure. This capability increases the change in capacitance, and therefore, improves the sensitivity of the sensor 500. A cap 540 has been provided at an end of the plates 510, 520 opposite from the substrate 530. FIG. 6 is a perspective view of the sensor 500 including the substrate 530 and cap 540. A back wall 550 and a front wall 560 (which is shown apart from the sensor 500 in FIG. 6 only for the purpose of illustration) are also provided so that a vacuum (V) can be created in the chamber between the two conducting plates 510, 250 (this may also improve the sensitivity of the sensor 500). With respect to the embodiment illustrated in FIGS. 5 and 6, the cap 540 may be formed using a non-conducting material so that the plates are electrically isolated from each other. Note a reference pressure other than a vacuum might be provided in the chamber between the two conducting plates 510, 520. In this case, the side walls of the chamber may deflect inward. That is, the center of the side walls might flex toward the vacuum while the four edges of each side wall remain fixed. FIG. 7 is a side view of an apparatus 700 according to other embodiments. In this case, two pairs of conducting plates are provided, each pair enclosing a vacuum V therebetween. As used herein, the term “finger” will refer to such a pair of conducting plates (with or without a vacuum). Note that, in this embodiment, two plates within a finger may be electrically coupled to each other. According to this embodiment, the first finger 710 is electrically isolated from the second finger 720. When the ambient pressure increases, the plates on the fingers 710, 720 deform inward. Thus, the capacitance C between one plate of the first finger and another plate of the second finger decreases. An imbalance between the ambient pressure and the pressure between the plates of each finger causes the plates of each finger to bow inwardly and thus away from the nearest plate of the adjacent finger, thereby causing the decrease in the capacitance C. In this way, the capacitance C can be used to sense pressure (e.g., with an increase in C representing a decrease in P). Note that, in this embodiment, air acts as the dielectric of the capacitor (unlike FIG. 2, where the vacuum acted as the dielectric). As a result, a change in temperature and/or humidity may also result in a change in the capacitance C. Therefore, in some applications a separate temperature and/or humidity sensor may be provided to account for this effect. Also note that any technique might be used to measure an amount of and/or a change in the capacitance C. For example, a change in capacitance might be converted into a voltage that can be measured and/or approaches using Alternating Current (AC) could be implemented. FIG. 8 is a top view of a pressure sensor 800 with a vertical capacitor array according to some embodiments. In particular, the sensor 800 includes a first comb 810 with a conducting base and three fingers that extend away from the base (as well as vertically from a substrate not illustrated in FIG. 8). The sensor 800 also has a second comb 820 with a conducting base and three fingers. The combs 810, 820 are positioned such that the fingers of one are interleaved with the fingers of the other. Note that although each comb 810, 820 illustrated in FIG. 8 has three fingers, any number of fingers may be provided. The first comb 810 is electrically isolated from the second comb 820. Note that when the ambient pressure increases, the plates on all of the fingers will deform inwardly. Thus, the capacitance C between the fingers will decrease (e.g., because neighboring plates are pushed further apart). Also note that the five capacitance values C associated with this embodiment are connected in parallel. Therefore, the values will add to each other, improving the pressure sensitivity of the sensor 800. FIG. 9 is a side view of the pressure sensor 800 according to this embodiment. Note that the combs may be provided on a non-conducting layer 920 (e.g., such that the two combs are electrically isolated from each other). Moreover, the non-conducting layer 920 may be bonded to another layer 910 to provide structural support. According to some embodiments, this supporting layer 910 is a glass wafer (e.g., to reduce parasitic capacitance effects). The support layer 910 could also be a lightly doped or intrinsic silicon wafer. Note that the characteristics of the pressure sensor 800 may depend in part on the geometry of the elements, such as the thickness height, and length of the plates as well as the gap between neighboring plates. By way of example only, the thickness of a conducting plate might be from 2 to 15 micrometers (μm), the height of a conducting plate might be from 100 to 500 μm, the gap between conducting plates might be from 2 to 20 μm, and the length of a conducting plate might be 1000 μm. The appropriate dimensions for a particular sensor might depend on, for example, the applications for which that sensor will be used. Thus, some embodiments provide a sensor that is sensitive to changes in pressure while occupying a relatively small area since the sensor is disposed in a vertical relationship to the wafer surface. Such an approach may provide a MEMS sensor that is scalable and inexpensive to produce (e.g., because new fingers may be added without any change in the fabrication process and with only a small increase in the sensor's footprint). Moreover, new pressure sensors may be easy to design by adding fingers as appropriate, and be less likely to be damaged. FIG. 10 is a flow chart of a method to measure pressure according to some embodiments. a voltage is provided to one of a first conducting plate and a second conducting plate, the first conducting plate being substantially normal to a substrate defining a plane and the second conducting plate being (i) electrically isolated from the first conducting plate, (ii) substantially normal to the substrate, and (iii) deformable in response to pressure. The first conducting plate may be, for example, associated with a finger of a first comb while the second conducting plate is associated with a finger of a second comb that is electrically isolated from the first comb. At Step 1004, pressure is measured based at least in part on an amount of capacitance that is detected between the two plates. For example, a decrease in capacitance may indicate an increase in the absolute atmospheric pressure. FIG. 11 is flow chart of a method to create a pressure sensor according to some embodiments. Note that the actions described with respect to FIG. 11 may be performed in any order that is practical. At Step 1102, a substrate of conducting silicon is provided. In some cases, a backing wafer is bonded to the substrate at Step 1104 to provide additional support. At Step 1106, vertical trenches are etched into the substrate using an appropriate etch mask. The etch mask may, for example, comprise a layer in which a pattern of oxide defines areas that will not be etched. According to some embodiments, a capping substrate is bonded to the etched structure at Step 1108. Note that in this embodiment, the etched substrate and the capping substrate might not need to be electrically isolated from each other. At Step 1110, a vacuum or other pressure level is created in a cavity formed by the etched structure and capping substrate. At Step 1112, the capping substrate is etched as appropriate to create isolated figures with caps. If desired, a cap wafer may then be attached at Step 1114 to provide pressure and electrical feed-throughs or vias. According to another embodiment, after the vertical trenches are etched in the substrate at Step 1106, a capping structure or wafer with an insulating layer is bonded to the etched structure at Step 1116. That is, the capping wafer may be electrically isolated from the etched structure. At Step 1118, a vacuum or other pressure level is created in a cavity formed by the etched structure and the capping wafer. At Step 1120, the capping wafer is patterned as appropriate to provide pressure and electrical feed-throughs or vias. By way of example, consider the wafer 1200 illustrated in FIG. 12. The wafer 1200 may include a base layer 1210 of non-conducting material, such as an oxide layer. In some embodiments, the base layer 1210 is bonded onto a backing wafer 1240, such as a layer of glass (or lightly doped silicon), that provides structural support for the wafer 1200. A conducting layer 1220 is provided on the base layer 1210. The conducting layer 1220 may be, for example, a layer of highly-doped, single-crystal silicon. An etch mask layer 1230 (e.g., oxide) is then deposited on layer 1220 and patterned. Note that the materials used to form these (and other) layers described herein might be selected based at least in part on thermal coefficients of expansion (e.g., to ensure that a device will operate correctly over a range of temperatures). Materials might also be selected in accordance with conductivity characteristics (e.g., to insure that device electrodes remain electrically isolated from each other). The etch mask layer 1230 may then be used to etch substantially parallel trenches through the conducting layer 1220. FIG. 13 is a top view of the wafer 1200 after the trenches have been etched (with the cross-hatched areas representing the trenches) according to some embodiments. The trenches define a series of substantially parallel, conducting plates. Moreover, the plates are substantially vertical to a horizontal plane defined by the wafer 1200, and at least one of the plates is deformable in response to pressure. Note that pairs of plates, or fingers 1330, are formed for both a first comb 1310 and a second comb 1320. According to some embodiments, at least one pressure input cavity is also formed while the trenches are etched. FIG. 14 is side view of the wafer 1200 after trenches have been etched according to some embodiments. An additional non-conducting layer may then be bonded onto the wafer. FIG. 15 is side view of the wafer 1200 after the non-conducting layer 1250 has been added according to some embodiments. This non-conducting layer 1250 may be an oxide capping structure. Note that vacuums V may now be provided between pairs of vertical plates. For example, some or all of the steps described herein might be performed within a vacuum to create the vacuums V. A portion of the additional non-conducting layer 1250 may then be etched away. One potential etching material may include potassium hydroxide. For example, FIG. 16 is a side view of the wafer 1200 after a portion of the top non-conducting layer has been removed according to some embodiments. In particular, the non-conducting layer 1250 now includes caps over pairs of plates that were formed in the conducting layer 1220, resulting a number of sealed fingers 1260. According to some embodiments, a cap wafer is bonded onto the additional non-conducting layer 1250. The cap wafer may include, for example, a ground via (e.g., a hole through which a ground wire may be routed to allow some fingers to be held at a ground voltage level), a voltage via (e.g., to allow some fingers to be at voltage level other than ground), and/or pressure vias. The following illustrates various additional embodiments of the present invention. These do not constitute a definition of all possible embodiments, and those skilled in the art will understand that the present invention is applicable to many other embodiments. Further, although the following embodiments are briefly described for clarity, those skilled in the art will understand how to make any changes, if necessary, to the above-described apparatus and methods to accommodate these and other embodiments and applications. Some embodiments have been described herein with respect to an absolute pressure sensor, but embodiments may be used in connection with a gauge or differential pressure sensor. For example, FIG. 17 is a differential pressure sensor 1700 according to some embodiments. As before, some fingers are deformable in response to a first pressure P1. In this case, however, channels are provided so that some or all of the fingers are deformable in response to a second pressure P2. As a result, a change in capacitance may be associated with a difference between the first and second pressures. Note that the vias through the substrate for electrical and pressure connection may be located in either the backing substrate 1740 or a capping substrate. While embodiments have been described with respect to pressure sensors, note that any of the embodiments may be associated with a system that uses a pressure sensor. For example, FIG. 18 is a system 1800 according to some embodiments. The system 1800 includes a MEMS pressure sensor 1810 that operates in accordance with any of the embodiments described herein. For example, the MEMS pressure sensor 1810 might include a substrate that defines a horizontal plane, a first conducting plate substantially vertical to the substrate, and a second conducting plate substantially vertical to the substrate and deformable in response to a pressure (P). Information from the MEMS pressure sensor 1810 is provided to a pressure dependent device 1820 (e.g., via an electrical signal). The pressure dependent device 1820 might be, for example, associated with a pressure display, an engine or automotive device (e.g., a tire pressure monitor), an ultrasonic transducer, a medical device (e.g., a blood pressure sensor), and/or a barometer. In addition, although some embodiments have been described with respect to the use of a capacitance value to sense an amount of pressure, embodiments might be associated with other types of displacement sensing techniques. FIG. 19 is a pressure sensor 1900 constructed in accordance with another exemplary embodiment of the invention. In this case, a plate 1910 or diaphragm is provided on a substrate 1920. As illustrated, the plate 1910 extend vertically from a horizontal plane defined by the substrate 1920. Moreover, the plate 1910 is deformable in response to a pressure P. The deformable plate 1910 may, for example, flex in a direction substantially in the horizontal plane. According to this embodiment, an amount of resistance R associated with the plate 1910 varies depending on an amount of stress (e.g., a portion of the plate 1910 may have piezoelectric and/or piezoresistance characteristics or devices having such characteristics may be embedded into or onto the plate 1910). As a result, the resistance R may be measured and used to determine a corresponding amount of pressure P. Because the plate 1910 extends vertically from the substrate 1920, the footprint of the sensor 1900 may be reduced as compared to traditional devices (e.g., having a diaphragm positioned horizontal to the substrate 1920). Note that according to this embodiment, the substrate 1920 may or may not be conductive. Also note that the sensor 1900 may be constructed using any of the techniques described herein (e.g., by etching trenches into a substrate). In addition, although particular layouts and manufacturing techniques have been described herein, embodiments may be associated with other layouts and/or manufacturing techniques. For example, FIG. 20 is a top view of a die 2000 according to an exemplary embodiment of the invention. In particular, trenches have been etched into the die 2000 to create a chamber 2030 that opens into the cavities of a number of fingers 2040 associated with a first comb 2020. Similarly, another chamber 2032 opens into cavities of fingers 2042 associated with a second comb 2022. A wall 2010 surrounding the two combs 2020, 2022 may be provided so that a cap can be bonded to the die 2000. Note that all of the etching illustrated in FIG. 20 might be performed during a single process step. FIG. 21 is a top view of the die of FIG. 20 after an oxide cap has been placed on the die and portions of the oxide cap have been etched away according to an exemplary embodiment of the invention. The remaining portion of the layer of oxide 2100 is illustrated by cross-hatching. The oxide layer 2100 may include windows through which pressure can reach the chambers 2030, 2032 and, eventually, the otherwise sealed cavities of the fingers. FIG. 22 is a perspective view of a cap wafer 2200 that might be used in connection with the die of FIG. 21 according to an exemplary embodiment of the invention. The cap wafer 2200 includes five vias through which internal portions of the sensor can be reached. In particular, one via is provided for a first pressure P1 and two vias are provided for a second pressure P2. Moreover, two electrical vias 2202 may associated with opposite sides of a capacitor. FIG. 23 is a perspective view of a pressure sensor package 2300 according to an exemplary embodiment of the invention. In particular, the cap wafer 2200 has been bonded onto the oxide layer 2100. The cap wafer 2200 might be oriented, for example, such that the vias associated with pressure P2 are aligned with the chambers 2030, 2032. A bottom cap 2310 might also be provided for the package 2300. Pressure ports and electrical ports may be individually interchangeable between front and back side. The present invention has been described in terms of several embodiments solely for the purpose of illustration. Persons skilled in the art will recognize from this description that the invention is not limited to the embodiments described, but may be practiced with modifications and alterations limited only by the spirit and scope of the appended claims.
<SOH> BACKGROUND <EOH>A pressure sensor may convert an amount of pressure into an electrical value. For example, a pressure sensor may use a sensor diaphragm or membrane positioned parallel to a plane of a wafer to convert an amount of pressure into a capacitance value. Note that the overall size of the pressure sensor may be important. For example, the amount of space on a wafer that is occupied by a pressure sensor (referred to as the sensor's “footprint”) might make a device expensive to produce and/or make the sensor impractical for some applications. Thus, it may be important that a pressure sensor does not occupy too large of an area on a wafer. In addition, increasing the sensitivity of a pressure sensor might require an increase in the sensor's footprint. Moreover, such a change could require that some parts of the sensor are completely re-designed (which can be a difficult and time-consuming process).
<SOH> SUMMARY <EOH>According to some embodiments, an apparatus includes a substrate that defines a plane. The apparatus also includes a first conducting plate that is substantially normal to the substrate and a second conducting plate that is (i) substantially normal to the substrate and (ii) deformable in response to a pressure.
20040312
20061003
20050915
72051.0
0
ALLEN, ANDRE J
MICROELECTROMECHANICAL SYSTEM PRESSURE SENSOR AND METHOD FOR MAKING AND USING
UNDISCOUNTED
0
ACCEPTED
2,004
10,799,209
ACCEPTED
Device and method for exothermic treatment of eyelid diseases
Provided herein is a pad for treating eye conditions comprising a multipart container having an impermeable outer membrane sized to fit generally within the peri-orbital region and sufficiently flexible to mold to the eye; a first chemical in a first storage area in the multipart container; a second chemical in a second storage area in the multipart container, the first and second chemicals selected to have an exothermic reaction when mixed for producing a temperature suitable for treating eye conditions, the exothermic reaction providing the suitable temperature for a period of time suitable for treating eye conditions; and an inner membrane for initially separating the first and second chemicals, the inner membrane being renderable permeable, without causing the impermeable outer membrane to become permeable, to permit mixing the first and second chemicals to cause the exothermic reaction. This multipart container is covered with a soft, non-abrasive, lint-free material which is presoaked in a pH controlled antibacterial soap with or without an antibiotic.
1. A pad for treating eye conditions comprising: a multipart container having an impermeable outer membrane sized to fit generally within the peri orbital region and sufficiently flexible to mold to the eye; a first chemical in a first storage area in the multipart container; a second chemical in a second storage area in the multipart container, the first and second chemicals selected to have an exothermic reaction when mixed for producing a temperature suitable for treating eye conditions, the exothermic reaction providing the suitable temperature for a period of time suitable for treating eye conditions; and an inner membrane for initially separating the first and second chemicals, the inner membrane being renderable permeable, without penetration of the impermeable outer membrane, to permit mixing the first and second chemicals to cause the exothermic reaction. 2. The invention of claim 1 wherein the second storage area surrounds the first storage area. 3. The invention of claim 1 wherein the second storage area is adjacent to the first storage area. 4. The invention of claim 1 wherein the inner membrane is breakable by application of pressure to the outside of the device. 5. The invention of claim 1, further comprising: a soft material attached to at least part of the impermeable membrane, said soft material suitable for absorbing and retaining a cleansing substance suitable for cleansing the eye. 6. The invention of claim 5 further comprising: a cleansing substance retained in or on the soft material, the cleansing substance suitable for cleansing the peri-orbital region. 7. The invention of claim 6 wherein the cleansing substance is pH controlled so as not to cause ocular irritation. 8. The invention of claim 6 wherein the cleansing substance is present in the soft material in breakable containers. 9. The invention of claim 8 wherein the cleansing substance breakable containers are breakable by a quick application of pressure to the outside of the device. 10. The invention of claim 5 further comprising: an antibacterial antibiotic retained in or on the soft material, the antibacterial antibiotic suitable for killing bacteria in the peri-orbital region. 11. The invention of claim 10 wherein the antibiotic is present in a mix with the cleansing substance. 12. The invention of claim 10 wherein the antibiotic is selected from the group consisting of Bacitracin, Erythromycin, Gentamicin, Neomycin, Chloramphenicol, optical fluoroquinolones and combinations thereof. 13. The invention of claim 12 wherein the optical fluoroquinolones are selected from Ciprofloxacin, Norfloxacin, Ofloxacin, Moxifloxacin and combinations thereof. 14. The invention of claim 5 wherein the soft material is non-abrasive. 15. The invention of claim 5 wherein the soft material is lint free. 16. The invention of claim 5 wherein the soft material is comprised of gauze. 17. The invention of claim 5 wherein the soft material covers at least the part of the heat source touching a user's peri-orbital region. 18. The invention of claim 1 wherein the suitable temperature is in a range of 100-108 degrees Fahrenheit. 19. The invention of claim 1 wherein the suitable time period is at least 5 minutes. 20. The invention of claim 1 wherein the suitable time period is at least 10 minutes. 21. The invention of claim 1 wherein the suitable time period is at least 15 minutes. 22. The invention of claim 1 further comprising a handle. 24. The invention of claim 22 wherein the handle is attached away from the portion of the device applied to a user's peri-ocular region.
RELATED APPLICATION INFORMATION This application claims priority to U.S. Provisional Application Ser. No. 60/526,251 filed Dec. 1, 2003, hereby incorporated by reference as if set forth fully herein. BACKGROUND There is a myriad of common eye diseases known in the field of Ophthalmology that necessitate the regular use of warm compresses applied to the periocular skin. The current gold standard of treatment for these conditions includes the simultaneous use of heat to unclog the openings of the eyelid sebaceous glands and increase blood flow to the affected areas, while massaging the eyelids with a non-irritating baby shampoo to wash off oily debris. A bacteriostatic antibiotic ointment is optionally used to cleanse the bacterial flora that reside at the eyelid margin and are believed to lead to these conditions. This set of steps has been proven to treat many of these conditions listed below and is currently the preferred means of achieving proper eyelid hygiene. Eye diseases which can be treated in this manner include, but are not limited to, acutely infected/inflamed internal or external hordeola or chalazia (Styes), any form of microbioallergic disease (blepharitis, blepharoconjunctivitis, or conjunctivitis), any eyelid skin rash (e.g., as caused by Herpes Simplex/Zoster Virus, or contact dermatitis), orbital or preseptal cellulitis, acute dacryocystitis, meibomitis, dry eye syndrome, meibomian gland dysfunction, ocular rosacea, Staphylococcal hypersensitivity, contact lens related ocular irritation, cat-scratch disease, oculoglandular tularemia, and conjunctival tuberculosis or syphilis. The inconvenience of this ritual is a common cause of poor compliance (and treatment failure) frequently encountered in clinical practice. Patients often use a warm tea-bag or a warm towelette that they hold under warm running water, both of which lose heat within mere seconds. Some run their eyes under hot tap water or try microwave-heated compresses with resulting second-degree burns severe enough that they have even been reported in the scientific literature (Eisman et al., Opthal. Plast. Reconstr. Sturg. 2000 July; 16(4):304-5). Needless to say, these methods of applying heat are not lengthy enough to be effective, and can be hot enough to be harmful to the delicate ocular adnexa. Some users advocate the use of a boiled egg or a warm potato or rice wrapped in a thin towel to provide heat for a longer duration of time. This exercise is quite cumbersome, and may still burn the thin eyelid skin because of high and uncontrolled temperatures. Also, many ophthalmologists recommend Q-tip applicators be used to scrub the eyelids and lashes with baby shampoo. Not only is this exercise tedious and inconvenient for even young, healthy individuals, but is quite a difficult task for the elderly, especially those who suffer from arthritis, those who fatigue easily, have poor near visual acuity, or those whose hands shake. SUMMARY OF THE INVENTION In one aspect of the present invention, the ritual of frequent use of warm compresses, scrubbing the lids with baby shampoo, and applying antibiotic ointment, is replaced with a much more convenient procedure, which combines these three steps into one. In one embodiment, a product is provided that makes treating those affected by the aforementioned eye diseases more convenient, effective, and safe. In another aspect of the present invention, a convenient product promotes better eyelid hygiene by making this exercise less tedious, thereby preventing the occurrence and/or recurrence of the underlying problem. In a preferred aspect of the present invention, compliance with the best medical treatment for these conditions is enhanced through ease of use. In yet another aspect, a convenient method for reducing the potential infectious complications of intraocular surgery is provided. In another preferred aspect, the invention provides pain relief to sufferers of certain conditions of the eye, such as dry eyes, or post-surgical pain. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows a cross sectional view of an eye pack. FIG. 2 shows the cross sectional view of the eye pack with burst inner membrane and resulting exothermic reaction. FIG. 3 shows an alternative cross sectional view of the exothermic heat pack. FIG. 4 shows a cross sectional view of an exothermic heat pack with an external handle. FIG. 5 shows a cross sectional view of an alternative exothermic heat pack with a penetrating handle. FIG. 6 shows a cross sectional view of an exothermic heat pack with an arcuate handle. FIG. 7 shows an eye pad on the peri-orbital region. FIG. 8 shows a material that contains cleansing and/or antibiotic in breakable capsules. DETAILED DESCRIPTION OF THE INVENTION In a first aspect, the disclosure shows an eye pad that provides heat, a cleansing material, and an antibacterial substance, wherein the eye pad is sufficiently flexible to conform to the peri-orbital region, yet sufficiently stiff to be rolled over that area. As used herein, the term “impermeable” means that the contents of the container that is created by the impermeable membrane cannot pass through that membrane under ordinary use of the system. The term “permeable” means that the contents of adjoining compartments separated by the permeable membrane can mix with each other by passage through the permeable membrane. In a particular embodiment, the separating membrane is rendered permeable by breakage of the membrane. The term “membrane” refers to a flexible or inflexible barrier. Referring now to FIG. 1 which shows eye pad system 10, multipart container 100 having impermeable outer membrane 110 is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to that region of the user's face. First chemical 120 is stored in first, inner, concentric storage area 130 of multipart container 100. Second chemical 140 is stored in second, outer, concentric storage area 150 of multipart container 100. The first and second chemicals have been chosen to cause an exothermic reaction when mixed. Internal membrane 160 separates the first and second chemicals in container 100. Internal membrane 160 can be rendered permeable through such actions as the application of physical force to container 100, while at the same time impermeable outer membrane 110 maintains its impermeability. Outer wrap 170 covers at least part of impermeable outer membrane 110 and is attached at enough places to create a smooth surface at least the size of the peri-orbital region. Outer wrap 170 may completely cover multipart container 100, or it may cover a smaller part of container 100, such as the portion of impermeable outer membrane 110 that would otherwise come in contact with the user's face, as shown in FIG. 7. Outer wrap 170 is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. Referring now to FIG. 2 and eye pad system 12, container 190 having impermeable outer membrane 110 is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to the eye region of the user's face. Internal membrane 200 has been rendered permeable by rupture. First chemical 120 and second chemical 140 are mixed in container 190. The first and second chemicals have been chosen to cause an exothermic reaction when mixed, releasing heat 210 from the system 12. Impermeable outer membrane 110 remains impermeable when internal membrane 200 is rendered permeable. Outer wrap 170, which covers at least the area to be placed on the user's face (see FIG. 7), is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. FIG. 3 is similar to FIG. 1, showing an eye pad system 14 having multipart container 220 with impermeable outer membrane 110 that is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to the eye region of the user's face. First chemical 120 is stored in first adjacent storage area 230 of multipart container 220. Second chemical 140 is stored in second adjacent storage area 240 of multipart container 220, abutting first adjacent storage area 230. The first and second chemicals have been chosen to cause an exothermic reaction when mixed. Internal membrane 250 that can be rendered permeable, separates the first and second chemicals in container 220. Internal membrane 250 can be rendered permeable through such actions as the application of physical force to container 220 while at the same time the impermeablity of outer membrane 110 is maintained. Outer wrap 170, which covers at least the area to be placed on the user's face (see FIG. 7), is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. Referring now to FIG. 4 and eye pad system 16, multipart multipart container 100 having impermeable outer membrane 110 is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to that region of the user's face. First chemical 120 is stored in first, inner, concentric storage area 130 of multipart container 100. Second chemical 140 is stored in second, outer, concentric storage area 150 of multipart container 100. The first and second chemicals have been chosen to cause an exothermic reaction when mixed. Internal membrane 160 separates the first and second chemicals in container 100. Internal membrane 160 can be rendered permeable through such actions as the application of physical force to container 100 while at the same time the impermeablity of outer membrane 110 is maintained. Outer wrap 170 covers at least part of impermeable outer membrane 110 and is attached at enough places to create a smooth surface at least the size of the peri-orbital region. Outer wrap 170 may completely cover multipart container 100, or it may cover a smaller part of container 100, such as the portion of impermeable outer membrane 110 that would otherwise come in contact with the user's face, as shown in FIG. 7. Outer wrap 170 is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. External handle 260 can be rigidly attached to impermeable outer membrane 110 to provide a convenient way for a user to hold the eye pad. External handle 260 is also useful in the manual rupture of internal membrane 160 by providing a means for grasping and pushing firmly on outer membrane 110. Likewise, external handle 260 can be useful in the manipulation of system 16, especially around the peri-orbital region. Referring now to FIG. 5, and eye pad system 18, multipart container 220 with impermeable outer membrane 110, is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to the eye region of the user's face. First chemical 120 is stored in first adjacent storage area 230 of multipart container 220. Second chemical 140 is stored in second adjacent storage area 240 of multipart container 220, abutting first adjacent storage area 230. The first and second chemicals have been chosen to cause an exothermic reaction when mixed. Interior membrane 250 that can be rendered permeable, separates the first and second chemicals in container 220. Internal membrane 250 can be rendered permeable through such actions as the application of physical force to container 220 while at the same time the impermeablity of outer membrane 110 is maintained. Outer wrap 170, which covers at least the area to be placed on the user's face (see FIG. 7), is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. Penetrating handle 270 can be rigidly attached to impermeable outer membrane 110 to provide a convenient way for a user to hold the eye pad. The presence of a portion of penetrating handle 270 inside first storage area 230 adds further stability to penetrating handle 270. Penetrating handle 270 is useful in the manual rupture of internal membrane 250 by providing a means for grasping and pushing firmly on outer membrane 110. Likewise, penetrating handle 270 can be useful in the manipulation of system 18, especially around the peri-orbital region. Referring now to FIG. 6, and eye pad system 20, multipart container 220 with impermeable outer membrane 110, is sized to fit generally within a user's peri-orbital region, and is sufficiently flexible to mold to the eye region of the user's face. First chemical 120 is stored in first adjacent storage area 230 of multipart container 220. Second chemical 140 is stored in second adjacent storage area 240 of multipart container 220, abutting first adjacent storage area 230. The first and second chemicals have been chosen to cause an exothermic reaction when mixed. Interior membrane 250 that can be rendered permeable, separates the first and second chemicals in container 220. Internal membrane 250 can be rendered permeable through such actions as the application of physical force to container 220 while at the same time the impermeablity of outer membrane 110 is maintained. Outer wrap 170, which covers at least the area to be placed on the user's face (see FIG. 7), is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing the peri-orbital region. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around the peri-orbital region to cleanse the region. Arcuate handle 280, having finger slot 290 allows a user's fingers to wrap around and better hold arcuate handle 280. Arcuate handle 280 can penetrate into first adjacent storage area 230 with one arm 300, and into second adjacent storage area 240 with the other arm 310. Outer membrane 110 can be sealingly attached to the sides of arcuate handle 280, to maintain the impermeability of container 220. Alternatively, the arms of arcuate handle 280 can be attached to the exterior of outer membrane 110. FIG. 7 shows the application of an eye pad such as described herein to peri-orbital region 320 of a user. Referring now to eye pad system 22, container 330 having an impermeable outer membrane 110 is sized to fit generally within a user's peri-orbital region 320, and is sufficiently flexible to mold to the eye region of the user's face. Internal membrane 200 has been rendered permeable by rupture. First chemical 120 and second chemical 140 are mixed in container 330. The first and second chemicals have been chosen to cause an exothermic reaction when mixed, releasing heat 210 from the system 22. Impermeable outer membrane 110 remains impermeable when internal membrane 200 is rendered permeable. Outer wrap 340, which covers the area to be placed on the user's face but does not cover the complete outer membrane 110, is made of soft, non-abrasive, lint-free material 180 such as gauze. Material 180 is suitable for absorbing and retaining a cleansing substance suitable for cleansing peri-orbital region 320. Material 180 is also suitable for absorbing and retaining a topical non-allergenic bacteriostatic or bactericidal antibiotic. Material 180 is also flexible in the region to be applied to the face so that the contained cleanser and/or antibiotic can be moved around peri-orbital region 320 to cleanse the region. Arcuate handle 280 is attached to outer membrane 110 on the side of system 22 opposite that to be applied to the user's face. Arcuate handle 280 can aid in applying pressure to rupture an intact internal membrane to result in internal membrane 200, and can assist user in holding system 22 at or around peri-oribital region 320. To further aid the user in handling system 22, the portion of container 330 facing away from the facial-contact region, and to which arcuate handle 280 is afixed, can be firmer and less flexible than the facial-contact region. FIG. 8 provides an example of outer wrap 340. In this embodiment, small breakable capsules 350 are contained in material 180. Each capsule 350 holds cleansing material, antibiotic, or a combination thereof. Each capsule 350 can be broken, such as by the same application of pressure used to cause internal membrane 160 or 250 to be rendered permeable. Capsules 350 then release their contents into material 180, to be massaged onto the skin of the peri-orbital region 320. This embodiment is especially useful when the cleansing material and/or the antibiotic needs to be protected from the air in order to prolong its life. In a preferred embodiment, the invention provides a one step treatment of a variety of conditions of the eyelid region. Instead of relying on three separate elements, all three are joined into one device. As a result, when in use, the heat element can combine with the wash and antibiotic to create a better and more efficient result. It is thought that in treating the aforementioned conditions, the provided heat causes the clogged meibomian gland orifices (which drain behind the insertions of the eyelashes at the eyelid margin) to widen. This allows the viscous (infected) meibomian discharge to drain more easily, while drawing detergent and antibiotic into the openings of these orifices. This exercise improves the viscosity of the oily meibomian discharge, destroys the abnormal microbacterial flora that has lead to the overall poor hygiene of these orifices, and ultimately relieves the blockage. Performed separately, the lid scrubs are not as effective as without the heat, the gland orifices are clogged and narrowed due to the residing abnormal bacterial flora and the resulting inflammation, and the detergent and antibiotic molecules do not penetrate as easily. A preferred embodiment of the invention is comprised of a heat source, which utilizes an exothermic chemical reaction, supplied in a small, flexible container to be applied over the eyelids; the exothermic reaction produces heat when two different ingredients contained within the container are intermixed. In one embodiment, a small outer container is made of an air-tight bag or other flexible container, for example made from plastic or silicone. The first container is filled with one of the two ingredients of an exothermic chemical reaction. Inside this outer container, there is another smaller, tightly-sealed, breakable sack, which contains the second ingredient (FIG. 1). This pack includes or is wrapped with a soft material that is preferably lint-free and/or non-abrasive (e.g. gauze, lintfree cotton or other such material), which has been or is then presoaked in a mild, non-irritating antibacterial detergent and a topical non-allergenic bacteriostatic or bactericidal antibiotic. Before use, the consumer applies pressure to the inner bag (through the outer container) causing it to break, thereby mixing the two necessary ingredients and initiating the exothermic reaction. (FIG. 2). The heat pack is then massaged over the eyelids for the duration of the exothermic phase of the reaction. The temperature of the heat source is controlled and remains approximately the same for a desired period of time. The surface of the covering material that comes in contact with the skin includes a gentle detergent and/or an antibacterial solution. This solution or combination of solutions can be present on the surface when the product is unwrapped, or one or more containers of the solution(s) can be provided, into which the unwrapped heat pack is dipped prior to use. The combination of these elements is a flexible product for placement on the periocular region for treating or preventing a variety of the aforementioned conditions that commonly affect the eyelids. Uses This product may be utilized in any of the conditions of the eyelids in which the use of heat has been indicated. The etiology may be infectious (e.g., blepharitis, meibomitis, acute dacryocystitis, orbital or preseptal cellulitis); inflammatory (e.g., inflamed hordeola, chalazia, or contact dermatitis), or combinations thereof. Additionally, dry-eyes, such as caused by wearing contact lenses, can be treated in this manner. Ocular infection (endophthalmitis) is the most feared complication of any ocular operation (e.g., cataract extraction, corneal transplantation, laser in-situ keratomileusis (LASIK), or glaucoma surgery) (Aaberg T M Jr., et al., Ophthalmology 1998 June; 105(6):1004-1010). Intra-operative contamination of the surgical field with the bacteria that usually reside on the eyelashes and the eyelid margins has been found to be a major nidus for infection (Speaker M G et al., Ophthalmology 1991 May; 98(5):639-49). As a result, proper eyelid hygiene has become an absolute prerequisite to any intraocular procedure, and a gold standard of ophthalmic surgery today. The various products of the invention are applicable toward this end, and help reduce the possibility of complications that may arise from operating on an eye with existing, poorly-treated blepharitis. The products are also useful following any intra- or extraocular surgery to provide for symptomatic relief as well as to provide a clean sterile environment until the fresh wounds re-epithelialize, further reducing any chance of infection. Eyelid edema and/or hematomas resulting from orbital contusion injuries are resolved faster with the use of any of the products of the invention (after an initial 48-hour period of using ice to minimize the initial phase of the inflammatory response). Heat Source The heat source is provided by a small, flexible container as described above. Both temperature and duration of the heat production are controlled so as to provide sufficient heat without damaging tissue. For instance, it is extremely important that the maximum temperature reached not be so high as to burn the skin. The temperature and length of time of the reaction can be controlled by the choice of chemicals used to create the reaction, and by the amount of the chemical in each pouch prior to mixing. For the present embodiment of the invention, the preferred temperature is 100-108 degrees Fahrenheit (38-42° C.), as this is the maximum threshold temperature not to cause any thermal injury to the skin (a total delivery of less than 16 J/cm2). Additionally, in the present embodiment, the temperature remains within the desired range for a minimum period of about 5 minutes, preferably about 10-15 minutes. This period of time increases the tear lipid layer thickness by 80%. It is important, however, that the duration of heat application be longer than a mere 20-60 seconds, which is what is available in prior art methods. In a preferred embodiment, the compounds used to create the exothermic reaction are inert and/or not irritating to skin so that no injury occurs in case the impermeable outer membrane breaks and releases the compounds. It is also preferred strongly that the compounds be environmentally friendly so that the products can be easily and safely disposed of after use. Structure In one preferred embodiment, one pouch is contained inside of the second pouch, as is shown in FIGS. 1-3. Although these figures show the eye pad as spherical, it can take any shape as long as it is flexible enough to mold to the approximate shape of the user's periorbital region. In the example shown in these figures, one of the substances is a liquid while the other is a powder, although other forms are acceptable. When the membrane between these compounds is broken, the two ingredients intermix to initiate the exothermic reaction and release adequate heat energy to rapidly raise the temperature of the eye pad to the desired level, and to maintain the reaction for the desired period of time or longer. In another preferred embodiment, the pouches abut each other, as shown in FIG. 4. Examples of the breakable membrane include but are not limited to plastics, silicone and combinations thereof. Chemical Reaction Examples of combinations that will work in the described embodiments to create exothermic reactions include water plus magnesium sulfate, and liquid sodium acetate trihydrate plus stainless steel (aluminum). Other combinations that result in the appropriate temperature and that have reactions that maintain the temperature for the desired period of time are also included. Shape The pouch is sufficiently flexible to fit within the user's peri-orbital region, with little or no overlap to the rest of the face. This allows application of heat to the desired area without overlapping onto areas that do not need the treatment. Further, it allows the pouch to be more flexible, and more easily handled. A handle, such as one made of lightweight but sturdy plastic, can be used as part of the eye pad. The handle is placed away from the portion of the eye pad that will contact skin. Preferably it is placed away from any cleansing material. The handle can be of any shape or construction that enables the user to easily hold the eye pad in place for the prescribed period of time. Examples are shown in FIG. 4. The pouches are preferably disposable. They can be made of lightweight low-cost materials that need not withstand long periods of use, and are therefore inexpensive and easy to handle for the user. Cleansing In addition to the heat source, the pouch contains a cleansing material to clean the periocular region. The material is present on the outside of the pouch so as to be next to the skin. The pouch may be wrapped in a soft, non-abrasive, lint-free material; may have a section of such material attached to it on the side that will be in direct contact with the skin; may be composed of such material; or may have the material provided in any other manner that will allow the material to contact the peri-orbital skin. In a preferred embodiment, a cleansing substance that is gentle to the skin yet thoroughly cleanses the area is present in the material. Alternatively, a container of such a solution can be supplied with the pouch, to be applied to the material prior to placing the pouch on the skin. In yet another embodiment, the cleanser can be packaged within the material, for example using small breakable cells containing the cleanser, and released by pressure such as is used to initiate the exothermic reaction. Cleansers can include, but are not limited to any detergent that has been pH controlled not to cause any ocular irritation or cause harm to the cornea if it gets into the eye. One preferred example is baby shampoo. Preferably the cleanser has antibacterial qualities that can improve the removal of bacterial flora from the treatment area. Antibiotic In another preferred embodiment, a topical bacteriostatic or bactericidal antibiotic is also present. As with the cleanser, the antibiotic can be supplied in or on the material or packaged within the material. Alternatively, it can be supplied separately, alone or mixed with the cleanser, to be applied to the material prior to placement of the pouch on the skin. Any antibiotic that can reduce the number of bacterial colonies residing in the peri-ocular adnexa can be used. Antibiotic solutions can include, but are not limited to, Bacitracin, Erythromycin, Gentamicin, Neomycin, Chloramphenicol, and combinations thereof, as the eyelid bacterial flora has been found to be most susceptible to these agents (Dougherty J M et al. Br. J. Ophthalmol. 1984 68:524). Bacitracin and Erythromycin ophthalmic ointments are preferred because they have a wide spectrum of activity and are usually very well tolerated. Topical fluoroquinolones, such as, but not limited to, Ciprofloxacin, Norfloxacin, Ofloxacin, and Moxifloxacin may also be utilized in this product as these formulations have very broad antibiotic coverage, pose minimum chances of bacterial resistance, and are very well tolerated by patients (Bloom P A et al. Eur. J Ophthalmol. 1994 4:6; Miller I M et al. Am. J. Ophthalmol. 1992 113:638; Gwon A. Arch. Ophthalmol. 1992 110:1234). Antibiotic resistance has been reported with the use of Sulfonamides or Tetracycline, and as such these agents are usable but not preferred for this product in their present state (McCulley J P Int. Ophthalmol. Clin. 1984 24:65). Method of Use In a preferred embodiment, the product is a small, flexible eye pad that can fit within the peri-orbital region without substantially overlapping other skin. It is wrapped in a sterile wrapping. The user preferably cleans his/her hands before unwrapping the eye pad. Prior to use, and preferably while the eye pad is still wrapped, the user massages the container to mix the detergent, with or without antibiotic, mixture and “foam” the non-abrasive material that surrounds the heat pack. S/he then breaks the barrier between the two compartments by applying pressure, starting the exothermic reaction. If the cleanser and/or antibiotic are also contained in breakable compartments, this action will also release these components into the non-abrasive material on the eye pad. (If the cleanser and/or antibiotic are provided separately from the heat pack, the cleanser and/or antibiotic are applied to the material after removing the wrapper.) The user then unwraps the eye pad, holds it by its handle (if provided), and gently massages the side of the eye pad having the cleanser and antibiotic around the affected peri-orbital region for a period of about 5-15 minutes as tolerated. After about ten to fifteen minutes, the user stops the treatment and discards the eye pad. EXAMPLES The following examples illustrate some embodiments of the invention. Example 1 Construction of Product A 2 inch by 2 inch by 3 inch flexible heat pack is obtained from, for example, Hospital Marketing Services (HMS) Co, Inc. The heat pack has two compartments, one containing magnesium sulfate in powder form, and the other containing water in an inner breakable plastic bag. A round hard plastic handle is attached to the pack on one end. The heat pack is covered with a soft, lint free material, such as a layer of polyester and several layers of guaze. The guaze surrounding the heat pack is coated with a mixture of baby shampoo (Johnson & Johnson or Neutrogena) with or without Bacitricin Ophthalmic Ointment (E. Fougera & Co. Melville, N.Y.) or Ciloxan Ophthalmic Solution (Alcon, Inc.) in an amount sufficient to transfer to the user's skin when the eye pad is being used. A removable piece of plastic is optionally placed over the coating to keep the coating in place. The eye pad is wrapped under sterile conditions in a plasticized paper covering which is easily removable by the user. Example 2 Use of Product to Treat Chalazia A patient presenting with a chalazion (stye) is advised to start using this product immediately after the onset of symptoms, and to follow up with his/her ophthalmologist as soon as possible. The patient foams the pack inside its sterile wrap and breaks the inner container by applying force. The patient then unwraps the heat pack, holds it by its handle. The patient then gently places the medicated side of the eye pad against the affected eyelid and moves the eye pad in small circles across the skin for ten minutes. When the treatment is finished, the patient disposes of the eye pad in the trash. Example 3 Use of Product on Post-Surgical Wound The procedures of example 2 are followed, except that the bandage is removed from the eye prior to treatment, and a clean bandage is reapplied to the eye after treatment.
<SOH> BACKGROUND <EOH>There is a myriad of common eye diseases known in the field of Ophthalmology that necessitate the regular use of warm compresses applied to the periocular skin. The current gold standard of treatment for these conditions includes the simultaneous use of heat to unclog the openings of the eyelid sebaceous glands and increase blood flow to the affected areas, while massaging the eyelids with a non-irritating baby shampoo to wash off oily debris. A bacteriostatic antibiotic ointment is optionally used to cleanse the bacterial flora that reside at the eyelid margin and are believed to lead to these conditions. This set of steps has been proven to treat many of these conditions listed below and is currently the preferred means of achieving proper eyelid hygiene. Eye diseases which can be treated in this manner include, but are not limited to, acutely infected/inflamed internal or external hordeola or chalazia (Styes), any form of microbioallergic disease (blepharitis, blepharoconjunctivitis, or conjunctivitis), any eyelid skin rash (e.g., as caused by Herpes Simplex/Zoster Virus, or contact dermatitis), orbital or preseptal cellulitis, acute dacryocystitis, meibomitis, dry eye syndrome, meibomian gland dysfunction, ocular rosacea, Staphylococcal hypersensitivity, contact lens related ocular irritation, cat-scratch disease, oculoglandular tularemia, and conjunctival tuberculosis or syphilis. The inconvenience of this ritual is a common cause of poor compliance (and treatment failure) frequently encountered in clinical practice. Patients often use a warm tea-bag or a warm towelette that they hold under warm running water, both of which lose heat within mere seconds. Some run their eyes under hot tap water or try microwave-heated compresses with resulting second-degree burns severe enough that they have even been reported in the scientific literature (Eisman et al., Opthal. Plast. Reconstr. Sturg. 2000 July; 16(4):304-5). Needless to say, these methods of applying heat are not lengthy enough to be effective, and can be hot enough to be harmful to the delicate ocular adnexa. Some users advocate the use of a boiled egg or a warm potato or rice wrapped in a thin towel to provide heat for a longer duration of time. This exercise is quite cumbersome, and may still burn the thin eyelid skin because of high and uncontrolled temperatures. Also, many ophthalmologists recommend Q-tip applicators be used to scrub the eyelids and lashes with baby shampoo. Not only is this exercise tedious and inconvenient for even young, healthy individuals, but is quite a difficult task for the elderly, especially those who suffer from arthritis, those who fatigue easily, have poor near visual acuity, or those whose hands shake.
<SOH> SUMMARY OF THE INVENTION <EOH>In one aspect of the present invention, the ritual of frequent use of warm compresses, scrubbing the lids with baby shampoo, and applying antibiotic ointment, is replaced with a much more convenient procedure, which combines these three steps into one. In one embodiment, a product is provided that makes treating those affected by the aforementioned eye diseases more convenient, effective, and safe. In another aspect of the present invention, a convenient product promotes better eyelid hygiene by making this exercise less tedious, thereby preventing the occurrence and/or recurrence of the underlying problem. In a preferred aspect of the present invention, compliance with the best medical treatment for these conditions is enhanced through ease of use. In yet another aspect, a convenient method for reducing the potential infectious complications of intraocular surgery is provided. In another preferred aspect, the invention provides pain relief to sufferers of certain conditions of the eye, such as dry eyes, or post-surgical pain.
20040312
20070501
20050602
68016.0
3
KIDWELL, MICHELE M
DEVICE AND METHOD FOR EXOTHERMIC TREATMENT OF EYELID DISEASES
SMALL
0
ACCEPTED
2,004
10,799,293
ACCEPTED
Method and system for separating multiple sound sources from monophonic input with non-negative matrix factor deconvolution
A method and system separates components in individual signals, such as time series data streams. A single sensor acquires concurrently multiple individual signals. Each individual signal is generated by a different source. An input non-negative matrix representing the individual signals is constructed. The columns of the input non-negative matrix represent features of the individual signals at different instances in time. The input non-negative matrix is factored into a set of non-negative bases matrices and a non-negative weight matrix. The set of bases matrices and the weight matrix represent the individual signals at the different instances of time.
1. A method for separating components in individual signals, comprising: acquiring concurrently a plurality of individual signals generated by a plurality of sources by a single sensor; constructing an input non-negative matrix representing the plurality of individual signals, the input non-negative matrix including columns representing features of the plurality of individual signals at different instances in time; and factoring the first non-negative matrix into a set of non-negative bases matrices and a non-negative weight matrix, the set of bases matrices and the weight matrix representing the plurality of individual signals at the different instances of time. 2. The method of claim 1, in which there is one non-negative bases matrix for each individual signal. 3. The method of claim 1, in which the input non-negative matrix is V, the set of non-negative bases matrices is Wt, and the non-negative weight matrix is H such that V ≈ ∑ t = 0 T - 1 ⁢ W t · H t → , where Vε≧0,M×N is the input non-negative matrix to be factored, the set of non-negative bases matrices is Wt ε≧0,M×R and the non-negative weight matrix is Hε≧0,M×N over successive time intervals t, and an operator ( . ) t -> shifts columns of corresponding matrices by i time increments to the right. 4. The method of claim 3, further comprising: shifting left most corresponding columns of the matrix H to zero to maintain an original size of the matrix H when the operator ( . ) t -> is applied. 5. The method of claim 1, further comprising: reconstructing the input non-negative matrix from the set of non-negative bases matrices and the non-negative weight matrices. 6. The method of claim 5, in which the reconstructing is according to V ≈ ∑ t = 0 T - 1 ⁢ W t · H t -> . 7. The method of claim 6, further comprising; measuring on error of the reconstructing by a cost function D =  V ⊗ ln ⁡ ( V Λ ) - V + Λ  F , where Λ = ∑ t = 0 T - 1 ⁢ W t · H t -> . 8. The method of claim 5, further comprising: updating the cost function for each iteration of t according to H = H ⊗ W t T · [ V Λ ] ← t W t T · 1 ⁢ ⁢ and ⁢ ⁢ W t = W t ⊗ V Λ · H t ⁢ -> T 1 · H t ⁢ -> T , ∀ t ∈ [ 0 ⁢ ⁢ … ⁢ ⁢ T - 1 ] , where an inverse operation ( . ) ← t shifts columns of corresponding matrices to the left by i time increments. 9. The method of claim 5, in which the reconstructing is partial to generate an output non-negative matrix representing a selected one of the plurality of individual signals to perform source separation. 10. The method of claim 1 in which the first non-negative matrix represents a plurality of acoustic signals, each acoustic signal generated by a different source. 11. The method of claim 10, in which columns of the set of non-negative bases matrices columns represent spectral features of the plurality of acoustic signals, and rows of the non-negative weight matrix represent instances in time when the spectral features occur. 12. The method of claim 1, in which the first non-negative matrix represents a plurality of time series data streams. 13. The method of claim 1, further comprising: performing source separation on the 14. A system separating components in individual signals, comprising: a single sensor configured to acquire concurrently a plurality of individual signals generated by a plurality of source; a buffer configured to store an input non-negative matrix representing the plurality of individual signals, the input non-negative matrix including columns representing features of the plurality of individual signals at different instances in time; and means for factoring the first non-negative matrix into a set of non-negative bases matrices and a non-negative weight matrix, the set of bases matrices and the weight matrix representing the plurality of individual signals at the different instances of time.
FIELD OF THE INVENTION The invention relates generally to the field of signal processing and in particular to detecting and separating components of time series signals acquired from multiple sources via a single channel. BACKGROUND OF THE INVENTION Non-negative matrix factorization (NMF) has been described as a positive matrix factorization, see Paatero, “Least Squares Formulation of Robust Non-Negative Factor Analysis,” Chemometrics and Intelligent Laboratory Systems 37, pp. 23-35, 1997. Since its inception, NMF has been applied successfully in a variety of applications, despite a less than rigorous statistical underpinning. Lee, et al, in “Learning the parts of objects by non-negative matrix factorization,” Nature, Volume 401, pp. 788-791, 1999, describe NMF as an alternative technique for dimensionality reduction. There, non-negativity constraints are enforced during matrix construction in order to determine parts of human faces from a single image. However, that system is restricted within the spatial confines of a single image. That is, the signal is strictly stationary. It is desired to extend NMF for time series data streams. Then, it would be possible to apply NMF to the problem of source separation for single channel inputs. Non-Negative Matrix Factorization The conventional formulation of NMF is defined as follows. Starting with a complex non-negative M×N matrix Vε≧0,M×N, the goal is to approximate the matrix V as a product of two simple non-negative matrices Wε≧0,M×R and Hε≧0,M×N, where R≦M, and an error is minimized when the matrix V is reconstructed approximately by W·H. The error of the reconstruction can be measured using a variety of cost functions. Lee et al., use a cost function: D =  V ⊗ ln ⁡ ( V W · H ) - V + W · H  F , ( 1 ) where ∥·∥F is the Frobenius norm, and {circumflex over (×)} is the Hadamard product, i.e., an element-wise multiplication. The division is also element-wise. Lee et al., in “Algorithms for Non-Negative Matrix Factorization,” Neural Information Processing Systems 2000, pp. 556-562, 2000, describe an efficient multiplicative update process for optimizing the cost function without a need for constraints to enforce non-negativity: H = H ⊗ W ⊤ · V W · H W ⊤ · 1 , W = W ⊗ V W · H · H ⊤ 1 · H ⊤ , ( 2 ) where 1 is an M×N matrix with all its elements set to unity, and the divisions are again element-wise. The variable R corresponds to the number of basis functions to extract. The variable R is usually set to a small number so that the NMF results into a low-rank approximation. NMF for Sound Object Extraction It has been shown that sequentially applying principle component analysis (PCA) and independent component analysis (ICA) on magnitude short-time spectra results in decompositions that enable the extraction of multiple sounds from single-channel inputs, see Casey et al., “Separation of Mixed Audio Sources by Independent Subspace Analysis,” Proceedings of the International Computer Music Conference, August, 2000, and Smaragdis, “Redundancy Reduction for Computational Audition, a Unifying Approach,” Doctoral Dissertation, MAS Dept., Massachusetts Institute of Technology, Cambridge Mass., USA, 2001. It is desired to provide a similar formulation using NMF. Consider a sound scene s(t), and its short-time Fourier transform arranged into an M×N matrix: F = DFT ⁡ [ s ⁡ ( t 1 ) s ⁡ ( t 2 ) s ⁡ ( t N ) ⋮ ⋮ ⋯ ⋮ s ⁡ ( t 1 + M - 1 ) s ⁡ ( t 2 + M - 1 ) s ⁡ ( t N + M - 1 ) ] , ( 3 ) where M is a size of the discrete Fourier transform (DFT), and N is a total number of frames processed. Ideally, some window function is applied to the input sound signal to improve the spectral estimation. However, because the window function is not a crucial addition, it is omitted for notational simplicity. From the matrix FεM×R, the magnitude of the transform V=|F|, i.e., Vε≧0,M×R can be extracted, and then, the NMF can be applied. To better understand this operation, consider the plots 100 of a spectrogram 101, spectral bases 102 and corresponding time weights 103 in FIG. 1. The plot 101 on the lower right is the input magnitude spectrogram. The plot 101 represents two sinusoidal signals with randomly gated amplitudes. Note, that the signals are from a single source, or monophonic signal. The two columns of the matrix W 102, interpreted as spectral bases, are shown in the lower left. The rows of H 103, depicted in the top, are the time weights corresponding to the two spectral bases of the matrix W. There is one row of weights for each column of bases. It can be seen that this spectrogram defines an acoustic scene that is composed of sinusoids of two frequencies ‘beeping’ in and out in some random manner. By applying a two-component NMF to this signal, the two factors W and H can be obtained as shown in FIG. 1. The two columns of W, shown in the lower left plot 102, only have energy at the two frequencies that are present in the input spectrogram 101. These two columns can be interpreted as basis functions for the spectra contained in the spectrogram. Likewise the rows of H, shown in the top plot 103, only have energy at the time points where the two sinusoids have energy. The rows of H can be interpreted as the weights of the spectral bases at each time instance. The bases and the weights have a one-to-one correspondence. The first basis describes the spectrum of one of the sinusoids, and the first weight vector describes the time envelope of the spectrum. Likewise, the second sinusoid is described in both time and frequency by the second bases and second weight vector. In effect, the spectrogram of FIG. 1 provides a rudimentary description of the input sound scene. Although the example in FIG. 1 is simplistic, the general method is powerful enough to dissect even a piece of complex piano music to a set of weights and spectral bases describing each note played and its position in time for that note, effectively performing musical transcription, see Smaragdis et al., “Non-Negative Matrix Factorization for Polyphonic Music Transcription,” IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, October 2003, and U.S. patent application Ser. No. 10/626,456, filed on Jul. 23, 2003, titled “Method and System for Detecting and Temporally Relating Components in Non-Stationary Signals,” incorporated herein by reference. The above described method works well for many audio tasks. However, that method does not take into account relative positions of each spectrum, thereby discarding temporal information. Therefore, it is desired to extend the conventional NMF so that it can be applied to multiple time series data streams so that source separation is possible from single channel input signals. SUMMARY OF THE INVENTION The invention provides a non-negative matrix factor deconvolution (NMFD) that can identify signal components with a temporal structure. The method and system according to the invention can be applied to a magnitude spectrum domain to extract multiple sound objects from a single channel auditory scene. A method and system separates components in individual signals, such as time series data streams. A single sensor acquires concurrently multiple individual signals. Each individual signal is generated by a different source. An input non-negative matrix representing the individual signals is constructed. The columns of the input non-negative matrix represent features of the individual signals at different instances in time. The input non-negative matrix is factored into a set of non-negative bases matrices and a non-negative weight matrix. The set of bases matrices and the weight matrix represent the plurality of individual signals at the different instances of time. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 are plots of a spectrogram, bases and weights of a non-negative matrix factorization of a sound scene according to the prior art; FIG. 2 are plots of a spectrogram, bases and weights of a non-negative matrix factor deconvolution of a sound scene according to the invention; FIG. 3 are plots of a spectrogram, bases and weights of a non-negative matrix factor deconvolution of a sound scene according to the invention; and FIG. 4 is a block diagram of a system and method according to the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Non-Negative Matrix Factor Deconvolution The invention provides a method and system that uses a non-negative matrix factor deconvolution (NMFD). Here, deconvolving means ‘unrolling’ a complex mixture of time series data streams into separate elements. The invention takes into account relative positions of each spectrum in a complex input signal from a single channel. This way multiple signal sources of time series data streams can be separated from a single input channel. In the prior art, the model used is V=W·H. The invention extends this model to: V ≈ ∑ t = 0 T - 1 ⁢ W t · H t → , ( 4 ) where an input matrix Vε≧0,M×N is decomposed to a set of non-negative bases matrices Wtε≧0,M×R and a non-negative weight matrix Hε≧0,M×N, over successive time intervals. The operator ( . ) t -> shifts the columns of the matrix H by i time increments to the right, for example A = [ 1 2 3 4 5 6 7 8 ] , A 0 → = [ 1 2 3 4 5 6 7 8 ] , A 1 → = [ 0 1 2 3 0 5 6 7 ] , A 2 → = [ 0 0 1 2 0 0 5 6 ] , … ⁢ . ( 5 ) The left most columns of the matrix H are appropriately set to zero to maintain the original size of the input matrix. Likewise, an inverse operation ( . ) ← t shifts columns of the weight matrix H to the left by i time increments. The objective is to determine sets of bases matrices Wt and the weight matrix H to approximate the input matrix V representing the input signal as best as possible. Cost Function to Measure Error of Reconstruction A value Λ is set ∑ t = 0 T - 1 ⁢ W t · H t → , and a cost function to measure an error of the reconstruction is defined as D =  V ⊗ ln ⁡ ( V Λ ) - V + Λ  F . ( 6 ) In contrast with the prior art, where Λ=W·H, using a similar notation, the invention has to optimize more than two matrices over multiple time intervals to optimize the cost function. To update the cost function for each iteration of t, the columns are shifted to appropriately line up the arguments according to: H = H ⊗ W t ⊤ · [ V Λ ] ← ⁢ t W t ⊤ · 1 ⁢ ⁢ and ⁢ ⁢ W t = W t ⊗ V Λ · H t → ⊤ 1 · H t → ⊤ , ∀ t ∈ [ 0 ⁢ ⁢ … ⁢ ⁢ T - 1 ] . ( 7 ) In every iteration for each time interval t, the matrix H and each matrix Wt is updated. That way, the factors can be updated in parallel and account for their interaction. In complex cases it is often useful to average the updates of the matrix H over all time intervals t. Due to the rapid convergence properties of the multiplicative rules, there is the danger that the matrix H is influenced by the previous matrix Wt used for its update, rather than the entire set of matrices Wt. Example Deconvolution To gain some intuition on the form of the factors Wt and H, consider the plots in FIG. 2, which shows and extracted NMFD bases and weights. The lower right plot 201 is a magnitude spectrogram that is used as an input to NMFD method according to the invention. Note, that signals vary over time, are generated by multiple sources, and are acquired via a single channel. The two lower left plots 202 are derived from the factors Wt, and are interpreted as temporal-spectral bases. The rows of the factor H, depicted at the top plot 203, are the time weights corresponding to the two temporal-spectral bases. Note that the lower left plot 202 has been zero-padded from left and right so as to appear in the same scale as the input plot. Like the example shown for the scene shown in FIG. 1, the spectrogram contains two randomly repeating elements, however, in this case, the elements exhibit a temporal structure, which cannot be expressed by spectral bases spanning a single time interval, as in the prior art. A two-component NMFD with T=10 is applied. This results into a factor H and T×Wt matrices of size M×2. The nth column of the tth Wt matrix is the nth basis offset by t increments in the left-to-right dimension, time in this case. In other words, the Wt matrices contain bases that extend in both dimensions of the input. The factor H, like the conventional NMF, holds the weights of these functions. Examining FIG. 2, it can be seen that the bases in the set of factors Wt contain the finer temporal information in the sound patterns, while the factor H localizes the patterns in time. NMFD for Sound Object Extraction Using the above formulation of NMFD, a sound segment, which contains a set of drum sounds, can be analyzed. In this example, the drum sounds exhibit some overlap in both time and frequency. The input is sampled at 11.025 Hz and analyzed with 256-point DFTs with an overlap of 128-points. A Hamming window is applied to the input to improve the spectral estimate. The NMFD is performed for three basis functions, each with a time extend of ten DFT frames, i.e., R=3 and T=10. FIG. 3 shows the spectrogram plot 301, and the corresponding bases and weight factor plots 302-303 for the scene, as before. There are three types of drum sounds present into the scene including four instances of a bass drum sound at low frequencies, two instances of a snare drum sound with two loud wideband bursts, and a ‘hi-hat’ drum sound with a repeating high-band burst. The lower right plot 301 is the magnitude spectrogram for the input signal. The three lower left plots 302 are the temporal-spectral bases for the factors Wt. Their corresponding weights, which are rows of the factor H, are depicted at the top plot 303. Note how the extracted bases encapsulate the temporal/spectral structure of the three drum sounds in the spectrogram 301. Upon analysis, a set of spectral/temporal basis functions are extracted from Wt. The weights from the factor H show when these bases are placed in time. The bases encapsulated the short-time spectral evolution of each different type of drum sound. For example, the second basis (2) adapts to the bass drum sound structure. Note how the main frequency of this basis decreases over time and is preceded by a wide-band element just like the bass drum sound. Likewise the snare drum basis (3) is wide-band with denser energy at the mid-frequencies, and the hi-hat drum basis (1) is mostly high-band sound. A reconstruction can be performed to recover the full spectrogram or partial spectrograms for any one of the three input sounds to perform source separation. The partial reconstruction of the input spectrogram is performed using one basis function at a time. For example, to extract the bass drum, which was mapped to the jth basis perform: V ^ j = ∑ t = 0 T - 1 ⁢ W t ( j ) · H t → , ( 8 ) where the ( . ) t -> ( j ) operator selects the jth column of the argument. This yields an output non-negative matrix representing a magnitude spectrogram of just one component of the input signal. This can be applied to original phase of the spectrogram. Inverting the result yields a time series of just, for example, the base drum sound. Subjectively, the extracted elements consistently sound substantially like the corresponding elements of the input sound scene. That is, the reconstructed base drum sound is like the base drum sound in the input mixture. However, it is very difficult to provide a useful and intuitive quantitative measure that otherwise describes the quality of separation due to various non-linear distortions and lost information, problems inherent in the mixing and the analysis processes. System Structure and Method As shown in FIG. 4, the invention provides a system and method for detecting components of non-stationary, individual signals from multiple sources acquired via a single channel, and determining a temporal relationship among the components of the signals. The system 400 includes a sensor 410, e.g., microphone, an analog-to digital (A/D) converter 420, a sample buffer 430, a transform 440, a matrix buffer 450, and a deconvolution factorer 500, serially connected to each other. Multiple acoustic signals 401 are generated concurrently by multiple signal sources 402, for example, three different types of drums. The sensor acquires the signals concurrently. The analog signals 411 are provided by the single sensor 410, and converted 420 to digital samples 421 for the sample buffer 430. The samples are windowed to produce frames 431 for the transform 440, which outputs features 441, e.g., magnitude spectra, to the matrix buffer 450. An input non-negative matrix V 451 representing the magnitude spectra is deconvolutionally factored 500 according to the invention. The factors Wt 510 and H 520 are respectively bases and weights that represent a separation of the multiple acoustic signals 401. A reconstruction 530 can be performed to recover the full spectrogram 451 or partial spectrograms 531-533, i.e., each an output non-negative matrix, for any one of the three input sounds. The output matrices 531-533 can be used to perform source separation 540. Effect of the Invention The invention provides a convolutional non-negative matrix factorization. version of NMF that overcomes the problems with the conventional NMF when analyzing temporal patterns. This extension results in an extraction of more expressive basis functions. These basis functions can be used on spectrograms to extract separate sound sources from a sound scenes acquired by a single channel, e.g., one microphone. Although the example application used to describe the invention uses acoustic signals, it should be understood that the invention can be applied to any time series data stream, i.e., individual signals that were generated by multiple signal sources and acquired via a single input channel, e.g., sonar, ultrasound, seismic, physiological, radio, radar, light and other electrical and electromagnetic signals. Although the invention has been described by way of examples of preferred embodiments, it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>Non-negative matrix factorization (NMF) has been described as a positive matrix factorization, see Paatero, “Least Squares Formulation of Robust Non-Negative Factor Analysis,” Chemometrics and Intelligent Laboratory Systems 37, pp. 23-35, 1997. Since its inception, NMF has been applied successfully in a variety of applications, despite a less than rigorous statistical underpinning. Lee, et al, in “Learning the parts of objects by non-negative matrix factorization,” Nature, Volume 401, pp. 788-791, 1999, describe NMF as an alternative technique for dimensionality reduction. There, non-negativity constraints are enforced during matrix construction in order to determine parts of human faces from a single image. However, that system is restricted within the spatial confines of a single image. That is, the signal is strictly stationary. It is desired to extend NMF for time series data streams. Then, it would be possible to apply NMF to the problem of source separation for single channel inputs. Non-Negative Matrix Factorization The conventional formulation of NMF is defined as follows. Starting with a complex non-negative M×N matrix Vε ≧0,M×N , the goal is to approximate the matrix V as a product of two simple non-negative matrices Wε ≧0,M×R and Hε ≧0,M×N , where R≦M, and an error is minimized when the matrix V is reconstructed approximately by W·H. The error of the reconstruction can be measured using a variety of cost functions. Lee et al., use a cost function: D =  V ⊗ ln ⁡ ( V W · H ) - V + W · H  F , ( 1 ) where ∥·∥ F is the Frobenius norm, and {circumflex over (×)} is the Hadamard product, i.e., an element-wise multiplication. The division is also element-wise. Lee et al., in “Algorithms for Non-Negative Matrix Factorization,” Neural Information Processing Systems 2000, pp. 556-562, 2000, describe an efficient multiplicative update process for optimizing the cost function without a need for constraints to enforce non-negativity: H = H ⊗ W ⊤ · V W · H W ⊤ · 1 , W = W ⊗ V W · H · H ⊤ 1 · H ⊤ , ( 2 ) where 1 is an M×N matrix with all its elements set to unity, and the divisions are again element-wise. The variable R corresponds to the number of basis functions to extract. The variable R is usually set to a small number so that the NMF results into a low-rank approximation. NMF for Sound Object Extraction It has been shown that sequentially applying principle component analysis (PCA) and independent component analysis (ICA) on magnitude short-time spectra results in decompositions that enable the extraction of multiple sounds from single-channel inputs, see Casey et al., “Separation of Mixed Audio Sources by Independent Subspace Analysis,” Proceedings of the International Computer Music Conference, August, 2000, and Smaragdis, “Redundancy Reduction for Computational Audition, a Unifying Approach,” Doctoral Dissertation, MAS Dept., Massachusetts Institute of Technology, Cambridge Mass., USA, 2001. It is desired to provide a similar formulation using NMF. Consider a sound scene s(t), and its short-time Fourier transform arranged into an M×N matrix: F = DFT ⁡ [ s ⁡ ( t 1 ) s ⁡ ( t 2 ) s ⁡ ( t N ) ⋮ ⋮ ⋯ ⋮ s ⁡ ( t 1 + M - 1 ) s ⁡ ( t 2 + M - 1 ) s ⁡ ( t N + M - 1 ) ] , ( 3 ) where M is a size of the discrete Fourier transform (DFT), and N is a total number of frames processed. Ideally, some window function is applied to the input sound signal to improve the spectral estimation. However, because the window function is not a crucial addition, it is omitted for notational simplicity. From the matrix Fε M×R , the magnitude of the transform V=|F|, i.e., Vε ≧0,M×R can be extracted, and then, the NMF can be applied. To better understand this operation, consider the plots 100 of a spectrogram 101 , spectral bases 102 and corresponding time weights 103 in FIG. 1 . The plot 101 on the lower right is the input magnitude spectrogram. The plot 101 represents two sinusoidal signals with randomly gated amplitudes. Note, that the signals are from a single source, or monophonic signal. The two columns of the matrix W 102 , interpreted as spectral bases, are shown in the lower left. The rows of H 103 , depicted in the top, are the time weights corresponding to the two spectral bases of the matrix W. There is one row of weights for each column of bases. It can be seen that this spectrogram defines an acoustic scene that is composed of sinusoids of two frequencies ‘beeping’ in and out in some random manner. By applying a two-component NMF to this signal, the two factors W and H can be obtained as shown in FIG. 1 . The two columns of W, shown in the lower left plot 102 , only have energy at the two frequencies that are present in the input spectrogram 101 . These two columns can be interpreted as basis functions for the spectra contained in the spectrogram. Likewise the rows of H, shown in the top plot 103 , only have energy at the time points where the two sinusoids have energy. The rows of H can be interpreted as the weights of the spectral bases at each time instance. The bases and the weights have a one-to-one correspondence. The first basis describes the spectrum of one of the sinusoids, and the first weight vector describes the time envelope of the spectrum. Likewise, the second sinusoid is described in both time and frequency by the second bases and second weight vector. In effect, the spectrogram of FIG. 1 provides a rudimentary description of the input sound scene. Although the example in FIG. 1 is simplistic, the general method is powerful enough to dissect even a piece of complex piano music to a set of weights and spectral bases describing each note played and its position in time for that note, effectively performing musical transcription, see Smaragdis et al., “Non-Negative Matrix Factorization for Polyphonic Music Transcription,” IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, October 2003, and U.S. patent application Ser. No. 10/626,456, filed on Jul. 23, 2003, titled “Method and System for Detecting and Temporally Relating Components in Non-Stationary Signals,” incorporated herein by reference. The above described method works well for many audio tasks. However, that method does not take into account relative positions of each spectrum, thereby discarding temporal information. Therefore, it is desired to extend the conventional NMF so that it can be applied to multiple time series data streams so that source separation is possible from single channel input signals.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention provides a non-negative matrix factor deconvolution (NMFD) that can identify signal components with a temporal structure. The method and system according to the invention can be applied to a magnitude spectrum domain to extract multiple sound objects from a single channel auditory scene. A method and system separates components in individual signals, such as time series data streams. A single sensor acquires concurrently multiple individual signals. Each individual signal is generated by a different source. An input non-negative matrix representing the individual signals is constructed. The columns of the input non-negative matrix represent features of the individual signals at different instances in time. The input non-negative matrix is factored into a set of non-negative bases matrices and a non-negative weight matrix. The set of bases matrices and the weight matrix represent the plurality of individual signals at the different instances of time.
20040312
20080819
20051006
72121.0
0
TSAI, CAROL S W
SYSTEM FOR SEPARATING MULTIPLE SOUND SOURCES FROM MONOPHONIC INPUT WITH NON-NEGATIVE MATRIX FACTOR DECONVOLUTION
UNDISCOUNTED
0
ACCEPTED
2,004
10,799,297
ACCEPTED
Respiration monitoring system and method
An impedance variation respiration monitor determines the variation in human body impedance between two electrodes coupled to the surface of the body. One of the two electrodes is attached to the thorax below the armpit and the other of the two electrodes is attached to the leg extending from the opposing side of the thorax. The variation in impedance between these two electrodes measured by the monitor is closely correlated to the respiration rate of the subject and is particularly responsive to and indicates combined abdominal and thoracic breathing.
1. A patient monitoring system comprising: a plurality of inputs, the plurality of inputs being configured to be coupled to a plurality of electrodes including first, second and third electrodes; a processing circuit coupled to the plurality of inputs, the processing circuit being configured to process signals from the plurality of electrodes to produce a respiration parameter for a patient, the processing circuit having a first mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the first and second electrodes and uses the third electrode to eliminate or reduce a common mode voltage present in the signals obtained from the first and second electrodes, and the processing circuit having a second mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the third electrode and an additional one of the plurality of electrodes. 2. The system of claim 1, wherein the third electrode is connected to the processing circuit by the RL leadwire 3. The system of claim 1, wherein the processing circuit is capable of operating in the first and second modes of operation simultaneously. 4. The system of claim 1, wherein the additional one of the plurality of electrodes is one of the first and second electrodes. 5. The system of claim 1, wherein the respiration parameter is respiration rate. 6. The system of claim 1, wherein the first and second electrodes are attached to a human having a abdomen and at least one lung and further wherein the first electrode and second electrodes are attached to the human such that a straight line extending from the first electrode to the second electrode passes through a lower portion of the lungs adjacent to the abdomen. 7. The system of claim 6, wherein the straight line substantially avoids passing through an aorta, heart, neck, or any shoulder of the patient. 8. The system of claim 6, wherein the first electrode is attached to at least a right or left leg. 9. The system of claim 8, wherein the first electrode is attached to the left leg at a LL location or to the right leg at a RL location. 10. The system of claim 6, wherein the second electrode is attached to an opposite side of abdomen as the first electrode and further wherein the second electrode is located below an armpit. 11. The system of claim 1, wherein the second electrode is attached to an electrode location selected from the group consisting of the V5R, HV5R, V6R, HV6R, V5, HV5, V6, and HV6 electrode locations. 12. The system of claim 11, wherein the second electrode is attached to an electrode location selected from the group consisting of the V5R V6R, HV5R and HV6R electrode locations. 13. An apparatus for monitoring the respiration rate of a human having a thorax and at least one lung, the apparatus comprising: a first input configured to be connected to a first electrode attached to the thorax; a second input configured to be connected to a second electrode attached to an opposite side of the thorax as the first electrode, and such that a conductive path extends through a lower portion of the lungs between the first and second inputs; a third input configured to be connected to a third electrode, the third electrode being a RL electrode that is configured to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrodes; and a processing circuit configured to detect fluctuations in impedance in the conductive path, and derive a respiration signal at least from the fluctuations. 14. The apparatus of claim 13, wherein the processing circuit is also an ECG monitoring circuit that is configured to use a signal from the third electrode as a voltage reference signal in the ECG monitoring circuit. 15. The apparatus of claim 13, wherein the processing circuit is configured to be coupled to the first electrode to at least a right or a left leg. 16. The apparatus of claim 15, wherein the processing circuit is configured to be coupled to the first electrode at the LL location or to the right leg at the RL location. 17. The apparatus of claim 13, wherein the processing circuit is configured to be coupled to the second electrode at the opposite side of thorax below the armpit. 18. The apparatus of claim 12, wherein the processing circuit is configured to be coupled to the second electrode at an electrode location selected from the group consisting of the V5R, HV5R, V6R, HV6R, V5, HV5, V6, and HV6 electrode locations. 19. The apparatus of claim 18, wherein the processing circuit is configured to be coupled to the second electrode at an electrode location selected from the group consisting of the V5R, HV5R, V6R, and HV6R electrode locations. 20. The apparatus of claim 13, wherein the processing circuit includes an electronic display screen, and further wherein the processing circuit is configured to display the respiration signal on the electronic display screen as a respiration rate numeric value. 21. The apparatus of claim 20, wherein the processing circuit is configured to display the respiration signal as a trace. 22. The apparatus of claim 21, wherein the processing circuit is configured to display the trace on the electronic display screen. 23. A patient monitor comprising: a plurality of inputs, the plurality of inputs being configured to receive signals from electrodes attached to a patient; a processing circuit, the processing circuit being configured to process the signals received from the electrodes to generate a respiration parameter relating to respiration of the patient; a display, the display being configured to display respiration parameter and to display an indication that the respiration parameter provides a measurement of abdominal respiration. 24. A patient monitor comprising: an operator input device; a plurality of signal inputs, the plurality of signal inputs being configured to receive signals from electrodes attached to a patient; a processing circuit, the processing circuit being configured to process the signals received from the electrodes to generate a Lead I signal, a Lead II signal, and an abdominal respiration lead signal; a display, the display being configured to display options for selection by the operator using the operator input device, the options including an option to display a parameter associated with the abdominal respiration lead signal. 25. A method of monitoring the respiration rate of a human having an abdomen and at least one lung, the method comprising the steps of: detecting fluctuations in impedance in a conductive path between first and second electrodes and using a third electrode to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrode in a first mode of operation of a processing circuit, the first electrode and second electrode being attached to the human such that a straight line extending from the first electrode to the second electrode passes through a lower portion of the lungs adjacent to the abdomen; detecting fluctuations in impedance in a conductive path between the third electrode and one of the first and second electrodes in a second mode of operation of the processing circuit; and deriving a respiration parameter based at least on the fluctuations. 26. A system for monitoring the respiration rate of a human having a thorax and at least one lung, the apparatus comprising: a first means for sensing body impedance configured to be fixed to the thorax; a second means for sensing body impedance configured to be fixed to an opposite side of the thorax as the first means for sensing body impedance to thereby define a conductive path extending through a lower portion of the lungs between the first and second means for sensing impedance; a third means for eliminating or reducing a common mode voltage present in signals obtained from the first and second means, the third means being a RL electrode; and a means for monitoring respiration configured to detect fluctuations in impedance in the conductive path, and to derive a respiration signal at least from said fluctuations, said monitoring means being coupled to the first and second means for sensing and coupled via the means for sensing to the human. 27. The system of claim 26, wherein the monitoring means is an ECG monitoring circuit that is configured to use a signal from the third means for sensing as a voltage reference signal in the ECG monitoring circuit. 28. The system of claim 27, wherein the monitoring means is configured to be coupled to the first means for sensing at a right or a left leg. 29. The system of claim 28, wherein the monitoring means is configured to be coupled to the first means for sensing on the left leg at the LL location or on the right leg at the RL location. 30. The system of claim 29, wherein monitoring means is configured to be coupled to the second means for sensing on the opposite of thorax below the armpit. 31. The system of claim 26, wherein the monitoring means is configured to be coupled to the second means for sensing at an electrode location selected from the group consisting of the V5R, HV5R, V6R, HV6R, V5, HV5, V6, and HV6 electrode locations. 32. The system of claim 31, wherein the monitoring means is configured to be coupled to the second means for sensing at an electrode location selected from the group consisting of the V5R, HV5R, V6R, and HV6R electrode locations. 33. The system of claim 26, wherein the monitoring means includes an electronic display screen, and further wherein the monitoring means is configured to display the respiration signal on the electronic display screen as a respiration rate numeric value. 34. The system of claim 33, wherein the monitoring means is configured to display the respiration signal as a trace. 35. The system of claim 34, wherein the monitoring means is configured to display the trace on the electronic display screen. 36. The system of claim 26 further comprising a hospital information system, and wherein the monitoring means is coupled to the hospital information system to make information derived from the respiration signal available on the hospital information system.
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to respiration monitoring. More particularly, it relates to respiration monitoring using impedance measuring devices connected to electrodes attached to a human body. 2. Description of the Related Art Current respiration monitoring utilizes a technique known as impedance respiration monitoring. This technique measures the impedance between two electrodes (typically right arm and left arm) to monitor airflow. As a subject inhales, air, which is an insulator, enters the lungs and causes the net impedance in the circuit to increase. When the subject exhales, air leaves the lungs and causes the impedance in the circuit to decrease. The current lead measurement options, i.e., leads I and II, focus on measuring thoracic breathing, which is considered a standard method of breathing in most adults. Thoracic breathing involves using the intercostals to elevate the lungs to begin inspiration. Although the chest moves significantly, only a small amount of air is actually passed into the lungs and usually only as far as the middle lobes. Given the current leads I and II placement, which defines a conductive path across the upper portion of the thorax, left arm (LA) and right arm (RA) electrodes are well suited to measuring thoracic breathing. However, there is another more efficient type of breathing known as “abdominal breathing,” which the traditional electrode placement is less effective at monitoring. While thoracic breathing is normal in most conscious adults, children and adult subjects who relax, sleep or are otherwise unconscious, commonly adopt abdominal breathing. Abdominal breathing occurs when the diaphragm becomes the controlling factor in the respiratory cycle. When the diaphragm controls breathing, each breath becomes deeper as more air enters the lower lobes of the lung where there is a higher concentration of blood vessels, allowing for more efficient gas exchange. Abdominal breathing is the mode of respiration that humans use at birth because it is the most efficient. As humans grow, the conscious breathing pattern elevates to the chest to the point where we tend to forget abdominal breathing. Abdominal breathing is typical in unconscious adults. When an adult relaxes or falls asleep they will unconsciously revert back to the more efficient abdominal breathing. As the subject transitions to abdominal breathing, the respiration signal provided by the arm electrodes is attenuated, since thoracic expansion is progressively reduced, even though the respiration is becoming more efficient. The attenuated signal could mistakenly suggest to an observer that respiration is getting worse, not better. Thus, electrodes used to monitor respiration in their traditional ECG positions (i.e. the LA and RA electrodes) provide a respiration signal that is subject to motion artifact and is attenuated whenever the subject falls asleep. Further, the traditional placement does not indicate abdominal breathing, the dominant mode of respiration for children and unconscious adults. What is needed therefore is a method of monitoring subject respiration that minimizes both motion artifact and cardiogenic artifact. What is also needed is a respiration monitoring method that produces a stronger signal. What is also needed is a method of monitoring respiration that would give the clinician a better option for monitoring abdominal respiration. What is also needed is a new respiration monitoring vector that will provide significant noise reduction and improved signal quality as compared to the traditional respiration monitoring vectors, i.e., leads I and II. These improvements would give clinicians more flexibility in respiration monitoring. SUMMARY OF THE INVENTION In one aspect of the present invention, a patient monitoring system having a plurality of inputs that is configured to be coupled to a plurality of electrodes. The plurality of electrodes includes first, second and third electrodes. A processing circuit is coupled to the plurality of inputs. The processing circuit is configured to process signals from the plurality of electrodes to produce a respiration parameter for a patient. The processing circuit has a first mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the first and second electrodes and uses the third electrode to eliminate or reduce a common mode voltage present in the signals obtained from the first and second electrodes. The processing circuit also has a second mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the third electrode and an additional one of the plurality of electrodes. In accordance with another aspect of the present invention, an apparatus for monitoring the respiration rate of a human having a thorax and at least one lung is provided. A first input is configured to be connected to a first electrode attached to the thorax. A second input is configured to be connected to a second electrode that is attached to an opposite side of the thorax as the first electrode, and such that a conductive path extends through the human body between the first and second inputs input. A third input is configured to be connected to a third electrode. The third electrode is a RL electrode configured to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrodes. A processing circuit is configured to detect fluctuations in impedance in the conductive path, and derive a respiration signal at least from the fluctuations. According to another aspect of the present invention, a patient monitor includes a plurality of inputs that is configured to receive signals from electrodes attached to a patient. A processing circuit is configured to process the signals received from the electrodes to generate a respiration parameter relating to respiration of the patient. A display is configured to display respiration parameter and an indication that the respiration parameter provides a measurement of abdominal respiration. According to further aspect of the present invention, a patient monitor includes an operator input device and a plurality of signal inputs that is configured to receive signals from electrodes attached to a patient. A processing circuit is configured to process the signals received from the electrodes to generate a Lead I signal, a Lead II signal, and an abdominal respiration lead signal. A display is configured to display options for selection by the operator using the operator input device, the options including an option to display a parameter associated with the abdominal respiration lead signal. According to yet another aspect of the present invention, a method of monitoring the respiration rate of a human having an abdomen and at least one lung is provided. The method includes the steps of detecting fluctuations in impedance in a conductive path between first and second electrodes and using a third electrode to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrode in a first mode of operation of a processing circuit. The first electrode and second electrode is attached to the human such that a straight line extending from the first electrode to the second electrode passes through a lower portion of the lungs adjacent to the abdomen. The method further includes detecting fluctuations in impedance in a conductive path between the third electrode and one of the first and second electrodes in a second mode of operation of the processing circuit and deriving a respiration parameter based at least on the fluctuations. According to yet further aspect of the invention, an apparatus for monitoring the respiration rate of a human having a thorax is provided. The apparatus includes a first means for sensing body impedance configured to be fixed to the thorax. A second means for sensing body impedance is configured to be fixed to an opposite side of the thorax as the first means for sensing body impedance to thereby define a conductive path extending through the human body between the first and second means for sensing impedance. A means for monitoring respiration configured to detect fluctuations in impedance in the conductive path, and to derive a respiration signal at least from the fluctuations, the monitoring means being coupled to the first and second means for sensing and coupled via the means for sensing to the human. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view of a resting subject connected to a combined ECG and respiration monitor by electrical leads. FIG. 2 is a front view of the subject's body of FIG. 1 showing the median plane, the horizontal plane, and the locations of the electrodes to which the electrical leads of FIG. 1 are connected in successive arrangements and all the electrical leads have been removed for clarity. FIG. 3 is a right side view of the subject's thorax of FIGS. 1 and 2 with the right arm removed at the shoulder, and showing the positions of the V5R, V6R, HV5R and HV6R electrodes, the V5, HV5, V6 and HV6 electrode locations are located in identical positions on the left side of the subject's body, mirrored about the medial plane of the subject's body. FIG. 4 is a block diagram of a patient monitor for monitoring the respiration rate of the resting subject according to an exemplary embodiment. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 illustrates a respiration monitoring system 100 which includes an ECG monitor 102 and electrical lead wires 104 that are connected to monitor 102 at one end. System 100 also includes a complete or partial subset of electrodes RA, RL, LA, LL, V1, V2, V3, V4, V5, and V6 (i.e., electrodes configured to be mounted to the subject's body at the standard RA, RL, LA, LL, V1, V2, V3, V4, V5, and V6 electrode locations), as well as one or more electrodes located at non-standard locations HV5, HV6, V5R, V6R, HV5R, and HV6R. Several of these electrodes are attached to the other end of corresponding electrical lead wires 104. Electrical lead wires 104 are connected to the monitor 102 in the illustrated embodiment. Several of these electrodes are not used for respiration monitoring purposes, but for generating ECG signals. Monitor 102 is an impedance respiration monitor preferably having the capability of monitoring cardiac activity as well as respiration. Monitor 102 has an electronic display 108. Monitor 102 is configured to generate a respiration trace 110 on the display as well as generate a numeric indicium 112 on the display that indicates the respiration rate. In addition to its respiration monitoring capabilities, monitor 102 is also capable of monitoring ECG signals using standard leads, including I, II, III, V, aVR, aVL, aVF, V2, V3, V4, V5, and V6. It is also capable of simultaneously analyzing leads I, II, III, and V (multi-lead mode). It should be noted that sometimes there may be no need to use all of these electrodes. And, on occasion where 4-10 electrode configurations are mounted on the subject's body, then the lead wire labeled V is permitted to be placed at any of the V (i.e., V1, V2, V3, V4, V5, V6, V7, V8, V9, V3R, V4R, and V5R) location. The standard V leads are V1 through V6. The V7 through V9 are three extra ones wrapping further around on the patient's left side. The V3R through V5R are three extra ones wrapping further around (across) the patient's right side. Monitor 102 is configured to determine and display the subject's respiration rate by impedance variation detection—by determining changes in impedance between two of the electrodes. Monitor 102 is configured to measure the impedance between those electrodes, to track the changes in that impedance as the subject breathes, to calculate the breathing rate based upon the changes in impedance, and to display the respiration on an electronic display both as a numeric rate indicia 112 and as a trace 110 on display 108. To measure respiration, monitor 102 is responsive to a base body impedance of various ranges of ohm and frequency. For example, monitor 102 may be responsive to a 0.1 to 4000 ohm component of this impedance that varies with respiration. The rate and degree of fluctuation indicates the rate and depth of respiration. Monitor 102 is a patient monitoring system which includes a plurality of inputs being configured to be coupled to the plurality of electrodes as noted above. The plurality of electrodes includes first, second and third electrodes. The monitor 102 includes a processing circuit that is coupled to the plurality of inputs. The processing circuit is configured to process signals from the plurality of electrodes to produce a respiration parameter for a patient. In addition, the processing circuit is capable of operating in a first mode of the operation and a second mode of the operation, simultaneously. In the first mode of the operation, the processing circuit produces the respiration parameter by measuring impedance between the first and second electrodes and uses the third electrodes to eliminate or reduce a common mode voltage present in the signals obtained from the first and second electrodes. In the second mode of the operation the processing circuit produces the respiration parameter by measuring impedance between the third electrode and an additional one of the plurality of electrodes. It should be noted that the monitor is configured to monitor both heart rate and breathing rate simultaneously and continuously. Monitor 102 is further configured to have user selectable upper and lower respiration rate limits and is configured to generate an audible alarm for any respiration outside those limits. Monitor 102 is preferably configured to simultaneously monitor ECG signals at the same time it is monitoring the subject's respiration. This arrangement is illustrated in FIG. 1, illustrating the connection of monitor 102 to the ECG electrodes and its ECG signal trace 114 on display 108. Moreover, the monitor is coupled to a hospital information system to make the information derived from the respiration signal available on the hospital information system. The ECG circuits of monitor 102 include amplifier circuits. The electrodes receive signals generated by the heart and transmit these signals through the ECG lead wires to monitor 102. Monitor 102 amplifies and processes these signals and displays them on the monitor's display screen as traces. The ECG circuits require a voltage reference from the subject's skin. The reference is typically provided to monitor 102 by attaching an electrode to the subject's body at the RL location and coupling that electrode to monitor 102. The voltage reference may simply provide a passive low resistance path to ground (in most ECG monitors), or it may be connected to an active circuit in monitor 102 typically called a “right leg driver.” The ECG voltage reference may also be used as one of the two variable impedance respiration monitoring connections on monitor 102. In either case, the voltage reference electrode provides a signal to monitor 102 that permits monitor 102 to reduce or eliminate common mode noise. This common mode noise appears on the ECG electrodes that are used to provide the actual ECG signal that monitor 102 amplifies and displays. Any electrode position described herein with an “R” appended to the end of the name has the same location as an identically named electrode location in the non-R position, but is disposed only on the opposite side of the subject's body's medial plane 116. This applies to any V electrode position. Therefore, the V5R position is even with the V5 position in the horizontal plane 117, just reflected over the medial plane 116. These “R” electrode positions are illustrated most clearly in FIG. 3. All the electrodes shown in FIGS. 1, 2, and 3 are preferably solid gel ECG electrodes. These electrodes are placed on the subject in 4 to 10 or more electrode configurations with the V-electrode in any of V5R through V9 or more position. When the larger leadwire set is used with the additional five lead wires labeled V2-V6, then the V should be placed in the V1 position. FIGS. 1, 2, and 3 also illustrate a number of non-standard R (right side) electrode positions as well. FIG. 3 is a right side view of the subject's body illustrating the positions of the V5R, V6R, HV5R (high V5R) and HV6R (high V6R) electrodes. These positions are all located on the thorax generally below the right armpit. Referring to FIG. 2, the subject 106 has a thorax 118 from which a left arm 120, a right arm 122, a left leg 124 and a right leg 126 extend. Left arm 120 defines a left armpit 128 and right arm 122 defines a right armpit 130. The subject 106 also has a left lung 132, right lung 134 and diaphragm 136. The electrode positions are shown in detail in FIG. 3 and include High V5R (HV5R) and High V6R (HV6R) electrode positions. These positions are inline with V5R and V6R, respectively, and are located halfway between their respective standard positions (V5R and V6R) and the armpit. HV6R is in the midline of the armpit half way between the middle of the armpit and the standard V6R position. HV5R is in the midline of the armpit half way between the middle of the armpit and the standard V5R position. Motion and cardiogenic artifact is reduced by impedance variation monitoring using a vector extending from a leg on one side of the subject's body to the subject's upper thorax on the opposing side of the body. The first electrode is preferably located on a leg, more preferably on a leg on the side of the thorax ipsilateral (same side as) the heart, more particularly at the LL or RL locations. The second electrode is preferably located on the upper thorax, more particularly on the upper thorax below an armpit, more particularly on the side of the upper thorax opposite the first electrode, more particularly on the side of the upper thorax below the armpit, even more particularly on the right side of the thorax at the V5R, HV5R, V6R, or HV6R locations, or alternatively on the left side of the thorax at the V5, V6, HV5, HV6 locations. Of course, non-standard positions may also be used. The second electrode is connected not only to the respiration monitoring circuit of monitor 102, but also to the ECG voltage reference of monitor 102 to provide monitor 102 with a voltage reference signal for the ECG circuitry. An electrode pair selected from any of the above second electrode locations and from any of the first electrode locations on the opposing side of the thorax provides superior respiration impedance monitoring. Since the second electrode is also connected to the voltage reference circuitry of the ECG circuits of monitor 102, the second electrode is selected both to provide the reference signal to the ECG circuitry and to provide one of the two impedance signals that monitor 102 uses to determine the respiration rate. This dual use of the second electrode signal permits ECG monitoring and respiration monitoring to share a common signal line (the leadwire extending between the second electrode and monitor 102) and hence reduces the total number of required connections to the subject's body. The quality of the electrode placement is not only related to the noise response, but to the quality and strength of the average signal as well. A measurement and ranking of the standard signal strength may be used as well. This eliminates the possibility of a poor signal with no response to noise from being picked as the best. Reference is now made to FIG. 4, which illustrates a patient monitor 102 to provide a measurement of abdominal respiration. The patient monitor 102 is equipped, among others, with a lead generation circuit 202, an analog to digital converter (ADC) 204, control logic 206, and a user interface 208. As described above in detail, four of the signal sensing electrodes, namely RA, LA, LL, and V5R are connected to the lead generation circuit 202 by standard ECG electrical lead wires 104. Additional signal sensing electrodes (not shown) may also be connected. A plurality of signal inputs are configured to receive signals from the electrodes attached to a patient. The Lead generation circuit 202 is configured to generate a Lead I signal 210, a Lead II signal 212, and an abdominal respiration lead signal 214 from the plurality of signal inputs. Leads signals 210, 212, and 214 are then converted to digital form signal by the Analog-to-digital converter (ADC) 204 and provided to control logic 206. In this arrangement, the converter 204 is a multi-channel Analog-to-digital converter (ADC) 204 which is used to select whether which lead signals (Lead I, Lead II, Abdominal Vector) is digitized and supplied to the control logic 206. A channel select signal 216 is received by the converter 204 from the control logic 206. The control logic 206 includes a conventional microprocessor 217 and a memory 218 which stores the software program that controls operation of the patient monitor 102 and stores data used in the execution of that program. Input and output circuits interface the control logic 206 to other components of the patient monitor. For example, a user interface 208 is provided which comprising an operator input device 220 (such as a control knob, a key pad, etc.) and a display 108 (such as a liquid crystal display, a cathode ray tube monitor etc.). The display 108 is configured to display respiration parameter and an indication that the respiration parameter provides a measurement of abdominal respiration. Alternatively, the Analog-to-digital converter (ADC) 204 may be a multi-channel ADC (e.g., a separate ADC for each ECG lead) which provides data for multiple ECG leads to the control logic 206. In this configuration, the channel select signal 216 is not transmitted to the multi-channel ADC, but rather is used within the control logic 206, e.g., to determine which ECG leads are displayed by the display 108. This allows the operator to use the operator input device 220 to select a subset of the various ECG leads to be displayed. The control logic 206 and the user interface 208 cooperate to generate an image/data to be displayed by the display 108 that shows the multiple ECG waveforms selected by the operator. Other configurations, such as a time multiplexed ADC may also be used. If the conductive path for respiration impedance monitoring is modeled as a straight line circuit extending from one electrode of the pair of electrodes to the other electrode of the pair, the most preferred electrode positions (i.e. the V5R-LL electrode positions) define a conductive path intersecting a much larger portion of the lungs than the other placements. The V5R-LL pair has the opportunity to go through two or even three lobes of the lungs. The conductive path avoids passing through the aorta and so reduces cardiogenic artifact. By having the right side terminal at V5R position instead of at the RA position, this configuration reduces the motion artifact coming from patient motion of the right arm, neck and head. While the embodiments and application of the invention illustrated in the figures and described above are presently preferred, it should be understood that these embodiments are offered by way of example only. Accordingly, the present invention is not limited to a particular embodiment, but extends to various modifications that nevertheless fall within the scope of this application.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention This invention relates to respiration monitoring. More particularly, it relates to respiration monitoring using impedance measuring devices connected to electrodes attached to a human body. 2. Description of the Related Art Current respiration monitoring utilizes a technique known as impedance respiration monitoring. This technique measures the impedance between two electrodes (typically right arm and left arm) to monitor airflow. As a subject inhales, air, which is an insulator, enters the lungs and causes the net impedance in the circuit to increase. When the subject exhales, air leaves the lungs and causes the impedance in the circuit to decrease. The current lead measurement options, i.e., leads I and II, focus on measuring thoracic breathing, which is considered a standard method of breathing in most adults. Thoracic breathing involves using the intercostals to elevate the lungs to begin inspiration. Although the chest moves significantly, only a small amount of air is actually passed into the lungs and usually only as far as the middle lobes. Given the current leads I and II placement, which defines a conductive path across the upper portion of the thorax, left arm (LA) and right arm (RA) electrodes are well suited to measuring thoracic breathing. However, there is another more efficient type of breathing known as “abdominal breathing,” which the traditional electrode placement is less effective at monitoring. While thoracic breathing is normal in most conscious adults, children and adult subjects who relax, sleep or are otherwise unconscious, commonly adopt abdominal breathing. Abdominal breathing occurs when the diaphragm becomes the controlling factor in the respiratory cycle. When the diaphragm controls breathing, each breath becomes deeper as more air enters the lower lobes of the lung where there is a higher concentration of blood vessels, allowing for more efficient gas exchange. Abdominal breathing is the mode of respiration that humans use at birth because it is the most efficient. As humans grow, the conscious breathing pattern elevates to the chest to the point where we tend to forget abdominal breathing. Abdominal breathing is typical in unconscious adults. When an adult relaxes or falls asleep they will unconsciously revert back to the more efficient abdominal breathing. As the subject transitions to abdominal breathing, the respiration signal provided by the arm electrodes is attenuated, since thoracic expansion is progressively reduced, even though the respiration is becoming more efficient. The attenuated signal could mistakenly suggest to an observer that respiration is getting worse, not better. Thus, electrodes used to monitor respiration in their traditional ECG positions (i.e. the LA and RA electrodes) provide a respiration signal that is subject to motion artifact and is attenuated whenever the subject falls asleep. Further, the traditional placement does not indicate abdominal breathing, the dominant mode of respiration for children and unconscious adults. What is needed therefore is a method of monitoring subject respiration that minimizes both motion artifact and cardiogenic artifact. What is also needed is a respiration monitoring method that produces a stronger signal. What is also needed is a method of monitoring respiration that would give the clinician a better option for monitoring abdominal respiration. What is also needed is a new respiration monitoring vector that will provide significant noise reduction and improved signal quality as compared to the traditional respiration monitoring vectors, i.e., leads I and II. These improvements would give clinicians more flexibility in respiration monitoring.
<SOH> SUMMARY OF THE INVENTION <EOH>In one aspect of the present invention, a patient monitoring system having a plurality of inputs that is configured to be coupled to a plurality of electrodes. The plurality of electrodes includes first, second and third electrodes. A processing circuit is coupled to the plurality of inputs. The processing circuit is configured to process signals from the plurality of electrodes to produce a respiration parameter for a patient. The processing circuit has a first mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the first and second electrodes and uses the third electrode to eliminate or reduce a common mode voltage present in the signals obtained from the first and second electrodes. The processing circuit also has a second mode of operation in which the processing circuit produces the respiration parameter by measuring impedance between the third electrode and an additional one of the plurality of electrodes. In accordance with another aspect of the present invention, an apparatus for monitoring the respiration rate of a human having a thorax and at least one lung is provided. A first input is configured to be connected to a first electrode attached to the thorax. A second input is configured to be connected to a second electrode that is attached to an opposite side of the thorax as the first electrode, and such that a conductive path extends through the human body between the first and second inputs input. A third input is configured to be connected to a third electrode. The third electrode is a RL electrode configured to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrodes. A processing circuit is configured to detect fluctuations in impedance in the conductive path, and derive a respiration signal at least from the fluctuations. According to another aspect of the present invention, a patient monitor includes a plurality of inputs that is configured to receive signals from electrodes attached to a patient. A processing circuit is configured to process the signals received from the electrodes to generate a respiration parameter relating to respiration of the patient. A display is configured to display respiration parameter and an indication that the respiration parameter provides a measurement of abdominal respiration. According to further aspect of the present invention, a patient monitor includes an operator input device and a plurality of signal inputs that is configured to receive signals from electrodes attached to a patient. A processing circuit is configured to process the signals received from the electrodes to generate a Lead I signal, a Lead II signal, and an abdominal respiration lead signal. A display is configured to display options for selection by the operator using the operator input device, the options including an option to display a parameter associated with the abdominal respiration lead signal. According to yet another aspect of the present invention, a method of monitoring the respiration rate of a human having an abdomen and at least one lung is provided. The method includes the steps of detecting fluctuations in impedance in a conductive path between first and second electrodes and using a third electrode to eliminate or reduce a common mode voltage present in signals obtained from the first and second electrode in a first mode of operation of a processing circuit. The first electrode and second electrode is attached to the human such that a straight line extending from the first electrode to the second electrode passes through a lower portion of the lungs adjacent to the abdomen. The method further includes detecting fluctuations in impedance in a conductive path between the third electrode and one of the first and second electrodes in a second mode of operation of the processing circuit and deriving a respiration parameter based at least on the fluctuations. According to yet further aspect of the invention, an apparatus for monitoring the respiration rate of a human having a thorax is provided. The apparatus includes a first means for sensing body impedance configured to be fixed to the thorax. A second means for sensing body impedance is configured to be fixed to an opposite side of the thorax as the first means for sensing body impedance to thereby define a conductive path extending through the human body between the first and second means for sensing impedance. A means for monitoring respiration configured to detect fluctuations in impedance in the conductive path, and to derive a respiration signal at least from the fluctuations, the monitoring means being coupled to the first and second means for sensing and coupled via the means for sensing to the human.
20040312
20080401
20050915
64832.0
0
TOTH, KAREN E
RESPIRATION MONITORING SYSTEM AND METHOD
UNDISCOUNTED
0
ACCEPTED
2,004
10,799,320
ACCEPTED
Sustained release compositions, process for producing the same and utilization thereof
A sustained-release composition containing a hydroxynaphthoic acid salt of a biologically active substance and a biodegradable polymer, a method of its production, and a pharmaceutical composition containing said sustained-release composition.
1-16. (Cancelled) 17. A method of producing a sustained-release composition containing a biologically active substance or salt thereof, a hydroxynaphthoic acid or salt thereof and a biodegradable polymer or salt thereof, comprising removing the organic solvent from a mixture of a bioactive substance or salt thereof in an organic solvent, a biodegradable polymer or salt thereof, and hydroxynaphthoic acid or a salt thereof. 18. The method of claim 17, comprising mixing and dispersing a bioactive substance or salt thereof in an organic solvent solution containing a biodegradable polymer or salt thereof and hydroxynaphthoic acid or a salt thereof, and subsequently removing the organic solvent. 19. The method of producing the sustained-release composition according to claim 18, wherein the bioactive substance or salt thereof is in the form of an aqueous solution. 20. The production method according to claim 17, wherein the salt of the bioactive substance is a salt with a free base or acid. 21-23. (Cancelled) 24. A method of suppressing bioactive substance initial burst from a sustained-release composition, comprising adding hydroxynaphthoic acid or a salt thereof to the sustained-release composition. 25. A method of increasing the efficiency of bioactive substance inclusion in a sustained-release composition, comprising adding hydroxynaphthoic acid or a salt thereof to the sustained-release composition. 26. A hydroxynaphthoate of a bioactive peptide. 27. The hydroxynaphthoate of a bioactive peptide according to claim 26, which is soluble in water or very slightly soluble in water. 28. A sustained-release composition containing the hydroxynaphthoate of a bioactive peptide.
FIELD OF INDUSTRIAL APPLICATION The present invention relates to a sustained-release composition of a biologically active substance, a production method thereof. PRIOR ART Japanese Patent Unexamined Publication No. 97334/1995 discloses a sustained-release preparation comprising a biologically active peptide or salt thereof and a biodegradable polymer having a free carboxyl group at one end, and a production method thereof. The patent publications for GB2209937, GB2234169, GB2234896, GB2257909 and EP626170A2 disclose compositions based on a biodegradable polymer containing a separately prepared water-insoluble salt, such as a pamoate of a peptide or protein, or production methods therefor. The patent publication for WO95/15767 discloses the embonate (pamoate) of cetrorelix (LH-RH antagonist) and a production method therefor, and describes that the peptide-releasing profile of this pamoate remains the same as in its use alone, even when included in a biodegradable polymer. PROBLEMS TO BE SOLVED BY THE INVENTION To provide a novel composition that contains a biologically active substance at high contents, and that is capable of controlling the rate of its release. MEANS OF SOLVING THE PROBLEMS After extensive investigation aiming at resolving the above problem, the present inventors found that when the biologically active substance is incorporated at high contents in the composition by allowing the biologically active substance and the hydroxynaphthoic acid to be co-present during formation of the composition, and when both are included in the biodegradable polymer, the biologically active substance is released at rates differing from those of the biologically active substance from the counterpart composition of the biologically active substance and hydroxynaphthoic acid prepared in the absence of the biodegradable polymer, which rate of release being controllable by choosing the appropriate kind of biodegradable polymer. The inventors conducted further investigation based on this finding, and developed the present invention. Accordingly, the present invention provides: (1) a sustained-release composition containing a biologically active substance or salt thereof, a hydroxynaphthoic acid or salt thereof, and a biodegradable polymer or salt thereof, (2) a sustained-release composition according to term (1) above wherein the biologically active substance is a biologically active peptide, (3) a sustained-release composition according to term (2) above wherein the biologically active peptide is an LH-RH derivative, (4) a sustained-release composition according to term (1) above wherein the hydroxynaphthoic acid is 3-hydroxy-2-naphthoic acid, (5) a sustained-release composition according to term (1) above wherein the biodegradable polymer is an α-hydroxycarboxylic acid polymer, (6) a sustained-release composition according to term (5) above wherein the a-hydroxycarboxylic acid polymer is a lactic acid-glycolic acid polymer, (7) a sustained-release composition according to term (6) above wherein the content ratio of lactic acid and glycolic acid is 100/0 to 40/60 mol %, (8) a sustained-release composition according to term (7) above wherein the content ratio of lactic acid and glycolic acid is 100/0 mol %, (9) a sustained-release composition according to term (6) above wherein the weight-average molecular weight of the polymer is about 3,000 to about 100,000, (10) a sustained-release composition according to term (9) above wherein the weight-average molecular weight of the polymer is about 20,000 to about 50,000, (11) a sustained-release composition according to term (3) above, wherein the LH-RH derivative is a peptide represented by the formula: 5-oxo-Pro-His-Trp-Ser-Tyr-Y-Leu-Arg-Pro-Z wherein Y represents DLeu, DAla, DTrp, DSer(tBu), D2Nal or DHis(ImBzl); Z represents NH—C2H5 or Gly-NH2, (12) a sustained-release composition according to term (6) above, wherein the terminal carboxyl group content of the polymer is 50-90 micromol per unit mass (gram) of the polymer, (13) a sustained-release composition according to term (3) above, wherein the molar ratio of the hydroxynaphthoic acid or salt thereof and the LH-RH derivative or salt thereof is from 3 to 4 to 4 to 3, (14) a sustained-release composition according to term (13) above, wherein the LH-RH derivative or salt thereof is contained at 14% (w/w) to 24% (w/w), (15) a sustained-release composition according to term (1) above, wherein the bioactive substance or salt thereof is very slightly soluble in water or soluble in water, (16) a sustained-release composition according to term (1) above, which is intended for injection, (17) a method of producing the sustained-release composition according to term (1) above, comprising removing the solvent from a mixture of a bioactive substance or salt thereof, a biodegradable polymer or salt thereof, and hydroxynaphthoic acid or a salt thereof, (18) a method of producing the sustained-release composition according to term (17) above, comprising mixing and dispersing a bioactive substance or salt thereof in an organic solvent solution containing a biodegradable polymer or salt thereof and hydroxynaphthoic acid or a salt thereof, and subsequently removing the organic solvent, (19) a method of producing the sustained-release composition according to term (18) above, wherein the bioactive substance or salt thereof is in the form of an aqueous solution, (20) a production method according to term (17) above, wherein the salt of the bioactive substance is a salt with a free base or acid, (21) a pharmaceutical containing the sustained-release composition according to term (1) above, (22) an agent for preventing or treating of prostatic cancer, prostatic hypertrophy, endometriosis, hysteromyoma, metrofibroma, precocious puberty, dysmenorrhea, or breast cancer, or a contraceptive, containing the sustained-release composition according to term (3) above, (23) a sustained-release composition containing the hydroxynaphthoate of a bioactive substance and a biodegradable polymer or salt thereof, (24) a method of suppressing bioactive substance initial burst from a sustained-release composition, comprising using hydroxynaphthoic acid or a salt thereof, (25) a method of increasing the efficiency of bioactive substance inclusion in a sustained-release composition, comprising using hydroxynaphthoic acid or a salt thereof, (26) a hydroxynaphthoate of a bioactive peptide, (27) a hydroxynaphthoate of a bioactive peptide according to term (26) above, which is soluble in water or very slightly soluble in water, and (28) a sustained-release composition containing the hydroxynaphthoate of a bioactive peptide. The present invention further provides: (29) a sustained-release composition according to term (28) above, wherein the content of the hydroxynaphthoic acid or salt thereof is about 1 to about 7 mol, preferably about 1 to about 2 mol, per mol of the bioactive peptide or salt thereof (30) a production method for the sustained-release composition according to term (17) above, comprising producing a W/O emulsion with a solution containing a bioactive substance or salt thereof as an internal aqueous phase and a solution containing a biodegradable polymer and hydroxynaphthoic acid or a salt thereof as an oil phase, and subsequently removing the solvent, (31) a production method for the sustained-release composition according to term (17) above, comprising producing a W/O emulsion with a solution containing hydroxynaphthoic acid or a salt thereof as an internal aqueous phase and a solution containing a bioactive substance or salt thereof and a biodegradable polymer or salt thereof as an oil phase, and subsequently removing the solvent, (32) a production method for the sustained-release composition according to term (28) above, comprising mixing and dissolving a bioactive peptide or salt thereof and hydroxynaphthoic acid or salt thereof, and subsequently removing the solvent, and (33) the production method for sustained-release composition according to any one of terms (30) through (32), wherein the solvent removal method is water-in drying method. Although the biologically active substance used in the present invention is not subject to limitation, as long as it is pharmacologically useful, and it may be a non-peptide substance or a peptide substance. The non-peptide substance includes an agonist, an antagonist, and a substance having an enzyme inhibitory activity. The peptide substance includes, for example, a biologically active peptides, and particularly those having molecular weights of about 300 to about 40,000, preferably about 400 to about 30,000, and more preferably about 500 to about 20,000 are preferred. Such biologically active peptides include, for example, luteinizing hormone-releasing hormone (LH-RH), insulin, somatostatin, growth hormones, growth hormone-releasing hormone (GH-RH), prolactin, erythropoietin, adrenocorticotropic hormone, melanocyte-stimulating hormone, thyroid hormone-releasing hormone, thyroid-stimulating hormone, luteinizing hormone, follicle-stimulating hormone, vasopressin, oxytocin, calcitonin, gastrin, secretin, pancreozymin, cholecystokinin, angiotensin, human placental lactogen, human chorionic gonadotropin, enkephalin, endorphin, kyotorphin, tuftsin, thymopoietin, thymosin, thymostimulin, thymic humoral factor, blood thymic factor, tumor necrosis factor, colony-stimulating factor, motilin, daynorphin, bombesin, neurotensin, caerulein, bradykinin, atrial natriuresis-increasing factor, nerve growth factor, cell growth factor, neurotrophic factor, endothelin-antagonistic peptides, derivatives thereof, fragments of these peptides, and derivatives of such fragments. The biologically active peptide used in the present invention may be as is, or may be a pharmacologically acceptable salt. Such salts include salts with inorganic acids (it may also be called as inorganic free acids) (e.g., carbonic acid, bicarbonic acid, hydrochloric acid, sulfuric acid, nitric acid, boric acid), organic acids (it may also be called as organic free acids)(e.g., succinic acid, acetic acid, propionic acid, trifluoroacetic acid) etc., when said biologically active peptide has a basic group such as an amino group. When said biologically active peptide has an acidic group such as a carboxyl group, such salts include salts with inorganic bases (it may also be called as inorganic free bases) (e.g., alkali metals such as sodium and potassium, alkaline earth metals such as calcium and magnesium), organic bases (it may also be called as organic free bases) (e.g., organic amines such as triethylamine, basic amino acids such as arginine) etc. The biologically active peptide may form a metal complex compound (e.g., copper complex, zinc complex). Preferred examples of the above-described biologically active peptide are LH-RH derivatives or salts thereof that are effective against sex hormone-dependent diseases such as prostatic cancer, prostatic hypertrophy, endometriosis, hysteromyoma, precocious puberty and breast cancer, and effective for contraception. Examples of LH-RH derivatives or salts thereof include, for example, the peptides described in “Treatment with GnRH Analogs: Controversies and Perspectives” (The Parthenon Publishing Group Ltd., published 1996), Japanese Patent Examined Publication No. 503165/1991, Japanese Patent Unexamined Publication Nos. 101695/1991, 97334/1995 and 259460/1996, and elsewhere. LH-RH derivatives may be LH-RH agonists or LH-RH antagonists; useful LH-RH antagonists include, for example, biologically active peptides represented by general formula [I]: X-D2Nal-D4ClPhe-D3Pal-Ser-A-B-Leu-C-Pro-DAlaNH2 [X represents N(4H2-furoyl)Gly or NAc; A represents a residue selected from NMeTyr, Tyr, Aph(Atz) and NMeAph(Atz); B represents a residue selected from DLys(Nic), DCit, DLys(AzaglyNic), DLys(AzaglyFur), DhArg(Et2), DAph(Atz) and DhCi; C represents Lys(Nisp), Arg or hArg(Et2)] or salts thereof. Useful LH-RH agonists include, for example, biologically active peptides represented by general formula [II]: 5-oxo-Pro-His-Trp-Ser-Tyr-Y-Leu-Arg-Pro-Z [Y represents a residue selected from DLeu, DAla, DTrp, DSer(tBu), D2Nal and DHis(lmBzl); Z represents NH2—C2H5, Gly-NH2] or salts thereof. Peptides wherein Y is DLeu and Z is NH—C2H5,(i.e., a peptide represented by the formula: 5-oxo-Pro-His-Trp-Ser-Tyr-DLeu-Arg-Pro-NH—C2H5) in particular, are preferred. These peptides can be produced by the methods described in the above-mentioned references or patent publications, or methods based thereon. The abbreviations used herein are defined as follows: Abbreviation Name N(4H2-furoyl)Gly N-tetrahydrofuroylglycine residue NAc N-acetyl group D2Nal D-3-(2-naphthyl)alanine residue D4ClPhe D-3-(4-chloro)phenylalanine residue D3Pal D-3-(3-pyridyl)alanine residue NMeTyr N-methyltyrosine residue Aph(Atz) N-[5′-(3′-amino-1′H-1′,2′,4′- triazolyl)]phenylalanine residue NMeAph(Atz) N-methyl-[5′-(3′-amino-1′H- 1′,2′,4′-triazolyl)]phenylalanine residue DLys(Nic) D-(e-N-nicotinoyl)lysine residue Dcit D-citrulline residue DLys(AzaglyNic) D-(azaglycylnicotinoyl)lysine residue DLys(AzaglyFur) D-(azaglycylfuranyl)lysine residue DhArg(Et2) D-(N,N′-diethyl)homoarginine residue DAph(Atz) D-N-[5′-(3′-amino-1′H-1′,2′,4′- triazolyl)]phenylalanine residue DhCi D-homocitrulline residue Lys(Nisp) (e-N-isopropyl)lysine residue hArg(Et2) (N,N′-diethyl)homoarginine residue The abbreviations for amino acids are based on abbreviations specified by the IUPAC-IUB Commission on Biochemical Nomenclature [European Journal of Biochemistry, Vol. 138, pp. 9-37 (1984)] or abbreviations in common use in relevant fields. When an optical isomer may be present in amino acid, it is of the L-configuration, unless otherwise stated. The hydroxynaphthoic acid for the present invention consists of a naphthalene ring and 1 hydroxyl group and 1 carboxyl group, both groups binding to different carbons of the ring. There are therefore a total of 14 isomers with the hydroxyl group located at different positions with respect to the carboxyl group located at positions 1 and 2 of the naphthalene ring. Any of these isomers can be used, and their mixtures in any ratios can be used. As described later, it is preferable that the acid dissociation constant be great, or pKa (pKa=−log10 Ka, Ka represents acid dissociation constant) be small. Preference is also given to isomers that are very slightly soluble in water. Isomers that are soluble in alcohols (e.g., ethanol, methanol) are preferred. The term “soluble in alcohols,” as used herein, means that the solubility is not less than 10 g/l in methanol, for example. Regarding the pKa values of the above-described hydroxynaphthoic acid isomers, the only known value is for 3-hydroxy-2-naphthoic acid (pKa=2.708, Kagaku Binran Kisohen II, Chemical Society of Japan, published Sep. 25, 1969; however, useful information is obtained by comparing the pKa values of three isomers of hydroxybenzoic acid. Specifically, the pKa values of m-hydroxybenzoic acid and p-hydroxybenzoic acid are not less than 4, whereas the pKa value of o-hydroxybenzoic acid (salicylic acid) (=2.754) is extremely small. Of the above-mentioned 14 isomers, those consisting of a naphthalene ring and a carboxyl group and a hydroxyl group, both bound to adjoining carbon atoms of the ring, i.e., 3-hydroxy-2-naphthoic acid, 1-hydroxy-2-naphthoic acid, and 2-hydroxy-1-naphthoic acid are therefore preferred. Furthermore, 3-hydroxy-2-naphthoic acid, which consists of a naphthalene ring and a hydroxyl group bound to the carbon at position 3 of the ring and 1 carboxyl group bound to the carbon at position 2 of the ring, is preferred. The hydroxynaphthoic acid may be a salt. Salts include, for example, salts with inorganic bases (e.g., alkali metals such as sodium and potassium, alkaline earth metals such as calcium and magnesium), organic bases (e.g., organic amines such as triethylamine, basic amino acids such as arginine), and salts and complex salts with transition metals (e.g., zinc, iron, copper). An example method of preparing the hydroxynaphthoic acid salt of the bioactive substance of the present invention is given below. (1) A hydrated organic solvent solution of hydroxynaphthoic acid is passed through a weakly basic ion exchange column to adsorb the acid and saturate the column. The excess portion of the hydroxynaphthoic acid is then removed through the hydrated organic solvent, after which a hydrated organic solvent solution of the bioactive substance or salt thereof is passed through the column to cause ion exchange; the solvent is removed from the effluent obtained. Useful organic solvents in said hydrated organic solvent include alcohols (e.g., methanol, ethanol), acetonitrile, tetrahydrofuran, and dimethylformamide. Solvent removal for salt precipitation is achieved using a commonly known method or a method based thereon. Examples of such methods include the method in which the solvent is evaporated, with the degree of vacuum adjusted using a rotary evaporator etc. (2) Through a weakly basic ion exchange column, previously subjected to ion exchange to hydroxide ions, a hydrated organic solvent solution of the bioactive substance or salt thereof is passed, to convert the basic groups to the hydroxide type. Hydroxynaphthoic acid in an amount not more than the molar equivalent is added to the effluent recovered, and dissolved, followed by concentration; the salt precipitated is washed with water as necessary, and dried. Because the hydroxynaphthoic acid salt of a bioactive substance is very slightly soluble in water, although also depending on the bioactive substance used, said salt itself of a bioactive peptide, exhibiting potential for sustained-release, can be used for a sustained-release preparation of a bioactive substance, and can also be used to produce a sustained-release composition. Biodegradable polymers used in the present invention include, for example, polymers and copolymers that have been synthesized from one or more kinds selected from α-hydroxymonocarboxylic acids (e.g., glycolic acid, lactic acid), hydroxydicarboxylic acids (e.g., malic acid), hydroxytricarboxylic acids (e.g., citric acid) etc., and that have a free carboxyl group, or mixtures thereof; poly-α-cyanoacrylic acid esters; polyamino acids (e.g., poly-g-benzyl-L-glutamic acid); and maleic anhydride copolymers (e.g., styrene-maleic acid copolymers). The mode of monomer binding may be random, block, or graft. When the above-mentioned α-hydroxymonocarboxylic acids, α-hydroxydicarboxylic acids, and α-hydroxytricar-boxylic acids have an optical active center in their molecular structures, they may be of the D-, L- or DL-configuration. Of these, lactic acid-glycolic acid polymers [hereinafter also referred to as poly(lactide-co-glycolide), poly(lactic acid-co-glycolic acid) or lactic acid-glycolic acid copolymer; generically refer to lactic acid-glycolic acid homopolymers and copolymers, unless otherwise specified; lactic acid homopolymers are also referred to as lactic acid polymer, polylactic acids, polylactides etc., and glycolic acid homopolymers as glycolic acid polymers, polyglycolic acids, polyglycolides etc.], with preference given to poly(α-cyanoacrylic esters) etc. Greater preference is given to lactic acid-glycolic acid polymers. More preferably, lactic acid-glycolic acid polymers having a free carboxyl group at one end are used. The biodegradable polymer may be a salt. Salts include, for example, salts with inorganic bases (e.g., alkali metals such as sodium and potassium, alkaline earth metals such as calcium and magnesium), organic bases (e.g., organic amines such as triethylamine, basic amino acids such as arginine), and salts and complex salts with transition metals (e.g., zinc, iron, copper). When the biodegradable polymer used is a lactic acid-glycolic acid polymer, the content ratio (mol %) is preferably about 100/0 to about 40/60, more preferably about 100/0 to about 50/50. Lactic acid homopolymers having a content ratio of 100/0 are also preferably used. The optical isomer ratio of lactic acid, one of the minimum repeat units for said lactic acid-glycolic acid polymer is preferably between about 75/25 and about 25/75, as of the D-configuration/L-configuration ratio (mol/mol %). Lactic acid-glycolic acid polymers having a D-configuration/L-configuration ratio (mol/mol %) between about 60/40 and about 30/70 are commonly used. The weight-average molecular weight of said lactic acid-glycolic acid polymer is normally about 3,000 to about 100,000, preferably about 3,000 to about 60,000, more preferably about 3,000 to about 50,000, and still more preferably about 20,000 to about 50,000. The degree of dispersion (weight-average molecular weight/number-average molecular weight) is normally about 1.2 to about 4.0, more preferably about 1.5 to 3.5. The free carboxyl group content of said lactic acid-glycolic acid polymer is preferably about 20 to about 1,000 μmol, more preferably about 40 to about 1,000 μmol, per unit mass (gram) of the polymer. Weight-average molecular weight, number-average molecular weight and degree of dispersion, as defined herein, are polystyrene-based molecular weights and degree of dispersion determined by gel permeation chromatography (GPC) with 15 polystyrenes as reference substances with weight-average molecular weights of 1,110,000, 707,000, 455,645, 354,000, 189,000, 156,055, 98,900, 66,437, 37,200, 17,100, 9,830, 5,870, 2,500, 1,303, and 504, respectively. Measurements were taken using a high-speed GPC device (produced by Toso, HLC-8120GPC, detection: Refractory Index) and a GPC column KF804Lx2 (produced by Showa Denko), with chloroform as a mobile phase. The term free carboxyl group content, as used herein, is defined to be obtained by the labeling method (hereinafter referred to as “carboxyl group content as determined by the labeling method”). Specific procedures for determining this content in a polylactic acid are described below. First, W mg of the polylactic acid is dissolved in 2 ml of a 5 N hydrochloric acid/acetonitrile (v/v=4/96) mixture; 2 ml of a 0.01 M solution of o-ni-trophenylhydrazine hydrochloride (ONPH) (5 N hydrochloric acid/acetonitrile/ethanol=1.02/35/15) and 2 ml of a 0.15 M solution of 1-ethyl-3-(3-dimethylaminopropyl)-carbodi-imide hydrochloride (pyridine/ethanol=4v/96v) were added, followed by a reaction at 40° C. for 30 minutes, after which the solvent is removed. After water washing (4 times), the residue is dissolved in 2 ml of acetonitrile; 1 ml of a 0.5 mol/l ethanolic solution of potassium hydroxide is added, followed by a reaction at 60° C. for 30 minutes. The reaction mixture is diluted with a 1.5 N aqueous solution of sodium hydroxide to Y ml; absorbance a (/cm) at 544 nm is determined, with a 1.5 N aqueous solution of sodium hydroxide as control. Separately, with an aqueous solution of DL-lactic acid as reference, its free carboxyl group content C mol/l is determined by alkali titration. Taking the absorbance at 544 nm of the DL-lactic acid hydrazide prepared by the ONPH labeling method as B (/cm), the molar content of the free carboxyl groups per unit mass (gram) of the polymer can be calculated using the equation: [COOH](mol/g)=(AYC)/(WB) Although said carboxyl group content can also be obtained by dissolving the biodegradable polymer in a toluene-acetone-methanol mixed solvent, and titrating this solution for carboxyl groups with an alcoholic solution of potassium hydroxide, with phenolphthalein as indicator (value obtained by this method hereinafter referred to as “carboxyl group content as determined by the alkali titration method”), it is desirable that quantitation be achieved by the labeling method described above, since it is possible that the titration endpoint is made unclear as a result of competition of the hydrolytic reaction of the polyester main chain during titration. The decomposition/elimination rate of a biodegradable polymer varies widely, depending on copolymer composition, molecular weight or free carboxyl group content. However, drug release duration can be extended by lowering the glycolic acid ratio or increasing the molecular weight and lowering the free carboxyl group content, because decomposition/elimination is usually delayed as the glycolic acid ratio decreases, in the case of lactic acid-glycolic acid polymers. Because the free carboxyl group content affects the rate of bioactive substance incorporation in the preparation, however, it must be above a given level. For this reason, it is preferable, in obtaining a biodegradable polymer for a sustained-release preparation of the long acting type (e.g., 6 months or longer), that in the case of a lactic acid-glycolic acid polymer, a polylactic acid (e.g., D-lactic acid, L-lactic acid, DL-lactic acid, preferably DL-lactic acid etc.) whose weight-average molecular weight and free carboxyl group content as determined as described above are about 20,000 to about 50,000 and about 30 to about 95 μmol/g, preferably about 40 to about 95 μmol/g, more preferably about 50 to about 90 μmol/g, be used. Said “lactic acid-glycolic acid polymer” can be produced by, for example, the catalyst-free dehydration polymerization condensation method (Japanese Patent Unexamined Publication No. 28521/1986) from a lactic acid and a glycolic acid, or ring-opening polymerization from a lactide and a cyclic diester compound such as glycolide by means of a catalyst (Encyclopedic Handbook of Biomaterials and Bioengineering Part A: Materials, Volume 2, Marcel Dekker, Inc., 1995). Although the polymer obtained by the above-mentioned known method of ring-opening polymerization does not always contain a free carboxyl group at one end, it can also be used after being modified to a polymer having a given amount of carboxyl groups per unit mass, by subjecting it to the hydrolytic reaction described in EP-A-0839525. The above-described “lactic acid-glycolic acid polymer having a free carboxyl group at one end” can be produced, with no problem, by a commonly known method (e.g., catalyst-free dehydration polymerization condensation, Japanese Patent Unexamined Publication No. 28521/1986), or by the method described below. (1) First, in the presence of a hydroxymonocarboxylic acid derivative (e.g., tert-butyl D-lactate, benzyl L-lactate) with its carboxyl group protected, or a hydroxydicarboxylic acid derivative (e.g., dibenzyl tartronate, di-tert-butyl 2-hydroxyethylmalonate) with its carboxyl group protected, a cyclic ester compound is subjected to a polymerization reaction using a polymerization catalyst. The above-described “hydroxymonocarboxylic acid derivative with its carboxyl group protected” or “hydroxydicarboxylic acid derivative with its carboxyl group protected” is exemplified by hydroxycarboxylic acid derivatives with its carboxyl group (—COOH) amidated (—CONH2) or esterified (—COOR), with preference given to hydroxycarboxylic acid derivatives with its carboxyl group (—COOH) esterified (—COOR) etc. Here, R for the ester is exemplified by C1-6 alkyl groups such as methyl, ethyl, n-propyl, isopropyl, n-butyl, and tert-butyl, C3-8 cycloalkyl groups such as cyclopentyl and cyclohexyl, C6-12 aryl groups such as phenyl and α-naphthyl, and C7-14 aralkyl groups such as phenyl-C1-2 alkyl groups such as benzyl and phenethyl, and α-naphthyl-C1-2 alkyl groups such as α-naphthylmethyl. Of these groups, tert-butyl groups, benzyl groups etc. are preferred. Said “cyclic ester compound” refers to a cyclic compound having at least one ester linkage in the ring thereof. Specifically, such compounds include cyclic monoester compounds (lactones) or cyclic diester compounds (lactides). Said “cyclic monoester compound” is exemplified by 4-membered ring lactones (β-propiolactone, β-butyrolactone, β-isovalerolactone, β-caprolactone, β-isocaprolactone, β-methyl-β-valerolactone etc.), 5-membered ring lactones (γ-butyrolactone, γ-valerolactone etc.), 6-membered ring lactones (δ-valerolactone etc.), 7-membered ring lactones (ε-caprolactone etc.), p-dioxanone, and 1,5-dioxepan-2-one. Said “cyclic diester compound” is exemplified by the compounds represented by the formula: Wherein R1 and R2, whether identical or not, represent a hydrogen atom or a C1-6 alkyl group such as methyl, ethyl, n-propyl, isopropyl, n-butyl, or tert-butyl), with preference given to the lactides having a hydrogen atom for R1 and a methyl group for R2, or having a hydrogen atom for R1 and R2, etc. Specifically, such compounds include glycolides, L-lactides, D-lactides, DL-lactides, meso-lactides, and 3-methyl-1,4-dioxane-2,5-dione (including optically active configurations). Said “polymerization catalyst” is exemplified by organic tin catalysts (e.g., tin octylate, di-n-butyltin dilaurylate, tetraphenyltin), aluminum catalysts (e.g., triethylaluminum), and zinc catalysts (e.g., diethylzinc). From the viewpoint of ease of removal after reaction, aluminum catalysts and zinc catalysts are preferred; from the viewpoint of safety in case of retention, zinc catalysts are preferred. Useful solvents for polymerization catalysts include benzene, hexane, and toluene, with preference given to hexane, toluene etc. Regarding “method of polymerization,” the mass polymerization method, which is conducted with the reaction product in a molten state, or the solution polymerization method, which is conducted with the reaction product dissolved in an appropriate solvent (e.g., benzene, toluene, xylene, decalin, dimethylformamide). Although polymerization temperature is not limited, it is not lower than the temperature at which the reaction product becomes molten at reaction initiation, normally 100 to 300° C., for mass polymerization, and is normally room temperature to 150° C. for solution polymerization; if the reaction temperature exceeds the boiling point of the reaction solution, the reaction is carried out under refluxing using a condenser or in a pressure-resistant reactor. Determined as appropriate in consideration of polymerization temperature, other reaction conditions, physical properties of the desired polymer, etc., polymerization time is, for example, 10 minutes to 72 hours. After completion of the reaction, polymerization is terminated with an acid (e.g., hydrochloric acid, acetic anhydride, trifluoroacetic acid), with the reaction mixture dissolved in an appropriate solvent (e.g., acetone, dichloromethane, chloroform) if necessary, after which the mixture is mixed in a solvent that does not dissolve the desired product (e.g., alcohol, water, ether, isopropyl ether) or otherwise precipitated, followed by the isolation of a polymer having a protected carboxyl group at the ω-end. The method of polymerization of the present application employs hydroxycarboxylic acid derivatives (e.g., tert-butyl D-lactate, benzyl L-lactate) with a protected carboxyl group or hydroxydicarboxylic acid derivatives (e.g., dibenzyl tartronate, di-tert-butylL-2-hydroxyethyl-malonate) with a protected carboxyl, in place of conventional protonic chain transferring agents such as methanol. Using hydroxycarboxylic acid derivatives (e.g., tertbutyl D-lactate, benzyl L-lactate) with a protected carboxyl group or hydroxydicarboxylic acid derivatives (e.g., dibenzyl tartronate, di-tert-butylL-2-hydroxyethylma-lonate) with a protected carboxyl, as protonic chain transferring agents, it is possible to {circle over (1)} achieve molecular weight control by the composition of the starting materials, and to {circle over (2)} liberate the carboxyl group at the ω-end of the biodegradable polymer obtained, by a deprotection reaction after polymerization. (2) Second, by subjecting the polymer obtained by the polymerization reaction described in paragraph (1) above, which has a protected carboxyl group at the ω-end, to a deprotection reaction, the desired biodegradable polymer having a free carboxyl group at the ω-end can be obtained. Said protecting group can be removed by commonly known methods. Such methods include all methods enabling the removal of the protecting group without affecting the ester linkage of poly(hydroxycarboxylic acid), specifically exemplified by reduction and acid decomposition. Such methods of reduction include, for example, catalytic reduction using catalysts (e.g., palladium carbon, palladium black, platinum oxide), reduction using sodium in liquid ammonium, and reduction with dithiothreitol. When a polymer having a protected carboxyl group at the ω-end is subjected to catalytic reduction, for example, de-protection can be achieved by adding palladium carbon to a solution of the polymer in ethyl acetate, dichloromethane, chloroform, or the like, and supplying hydrogen at room temperature for about 20 minutes to about 4 hours with vigorous shaking. Such methods of acid decomposition include, for example, acid decomposition with inorganic acids (e.g., hydrogen fluoride, hydrogen bromide, hydrogen chloride), organic acids (e.g., trifluoroacetic acid, methanesulfonic acid, trifluoromethanesulfonic acid), or mixtures thereof. Also, where necessary, a cation scavenger (e.g., anisole, phenol, thioanisole) is added as appropriate. When a polymer having a carboxyl group protected with a tert-butyl group, at the ω-end, is subjected to acid decomposition, for example, deprotection can be achieved by adding an appropriate amount of trifluoroacetic acid to a solution of the polymer in dichloromethane, xylene, toluene, or the like, or dissolving the polymer in trifluoroacetic acid, and stirring at room temperature for about 1 hour. Preferably, said acid decomposition is conducted just after the polymerization reaction; in this case, it can serve as a polymerization termination reaction. Furthermore, by subjecting the polymer obtained by the above-described deprotection reaction to an acid hydrolytic reaction as necessary, the weight-average molecular weight, number-average molecular weight or terminal carboxyl group content of said polymer can be regulated according to the purpose. Specifically, this can, for example, be achieved by the method described in EP-A-0839525 or a method based thereon. A biodegradable polymer obtained as described above can be used as a base for producing a sustained-release preparation. In addition, a polymer having a given free carboxyl group at one end can be produced by known production methods (e.g., see Patent Publication for WO94/15587). Also, a lactic acid-glycolic acid polymer with one end rendered a free carboxyl group by a chemical treatment after ring-opening polymerization may be a commercial product of Boehringer Ingelheim KG, for example. The biodegradable polymer may be a salt (salts of biodegradable polymers include, for example, the salts mentioned above). Useful methods of their production include, for example, (a) the method in which a solution of the above-described biodegradable polymer having a carboxyl group in an organic solvent, and an aqueous solution containing the ions of inorganic bases (e.g., alkali metals such as sodium and potassium, alkaline earth metals such as calcium and magnesium) or organic bases (e.g., organic amines such as triethylamine, basic amino acids such as arginine), are mixed together to cause an ion exchange reaction, after which the polymer, now in the form of a salt, is isolated, (b) the method in which a weak acid salt (e.g. acetate, glycolate) of a base listed in (a) above is dissolved in a solution of the above-described biodegradable polymer having a carboxyl group in an organic solvent, after which the polymer, now in the form of a salt, is isolated, and (c) the method in which a weak acid salt (e.g. acetate, glycolate) or oxide of a transition metal (e.g., zinc, iron, copper) is mixed in a solution of the above-described biodegradable polymer having a carboxyl group in an organic solvent, after which the polymer, now in the form of a salt, is isolated. As a biodegradable polymer for a sustained-release preparation of the long acting type (e.g., 6 months or longer), the “lactic acid-glycolic acid polymer having a free carboxyl group at one end” produced by the method described above is preferred. The ratio by weight of the bioactive substance in the composition of the present invention varies depending on kind of bioactive substance, desired pharmacological effect, duration of effect, and other factors. In the case of a sustained-release composition containing three components (bioactive substance or salt thereof, hydroxynaphthoic acid or salt thereof, and biodegradable polymer or salt thereof), the ratio by weight of bioactive peptide or salt thereof, for example, is about 0.001 to about 50% by weight, preferably about 0.02 to about 40% by weight, more preferably about 0.1 to 30% by weight, and most preferably about 14 to 24% by weight, relative to the sum of the three components. In the case of a non-peptide bioactive substance or salt thereof, the ratio is about 0.01 to 80% by weight, preferably about 0.1 to 50% by weight. When the hydroxynaphthoic acid salt of a bioactive substance is contained, similar ratios by weight are applicable. In the case of a sustained-release composition containing the salt of a bioactive peptide (referred to as (A)) with hydroxynaphthoic acid (referred to as (B)), the ratio by weight of (A) is normally about 5 to about 90% by weight, preferably about 10 to about 85% by weight, more preferably about 15 to about 80% by weight, and still more preferably about 30 to about 80% by weight, relative to the sum of the salt (A) with (B). In the case of a sustained-release composition containing three components (bioactive substance or salt thereof, hydroxynaphthoic acid or salt thereof, and biodegradable polymer or salt thereof), the amount of hydroxynaphthoic acid or salt thereof formulated is preferably about ½ to about 2 mol, more preferably about ¾ to about {fraction (4/3)} mol, and still more preferably about ⅘ to about {fraction (6/5)} mol, per mol of bioactive substance or salt thereof. Designing the composition of the present invention is hereinafter described for a sustained-release composition containing three components: basic bioactive substance, hydroxynaphthoic acid, and biodegradable polymer. In this case, the bioactive substance, as a base, and hydroxynaphthoic acid, as an acid, are concurrently present in the composition; whether they are formulated in the composition in the form of free configurations or salts, a dissociation equilibrium for each component is present, in a hydrated state, or in the presence of a trace amount of water, at a point during production of the composition. Because the salt formed by any hydroxynaphthoic acid, which is very slightly soluble in water, with a bioactive substance is assumed to be very slightly soluble in water, although the solubility also depends on the characteristics of said bioactive substance, its dissociation equilibrium shifts toward the formation of a salt very slightly soluble in water. In producing a composition having high contents of a basic bioactive substance, it is desirable that most of the bioactive substance be protonated to render it to a salt very slightly soluble in water as described above, judging from the above-described dissociation equilibrium. For this purpose, it is desirable that the hydroxynaphthoic acid or salt thereof be formulated in an amount at least nearly equivalent to that of the bioactive substance or salt thereof. Next, the mechanism of release of a bioactive substance included in a composition is described below. In the above-described formula composition, the bioactive substance is mostly protonated and present with a counter ion. The counter ion is mainly hydroxynaphthoic acid (preferably hydroxynaphthoic acid). After the composition is administered to the living body, its oligomers and monomers begin to be produced over time due to decomposition of the biodegradable polymer. When said polymer is a lactic acid-glycolic acid polymer, the resulting oligomer (lactic acid-glycolic acid oligomer) and monomer (lactic acid or glycolic acid) always has one carboxyl group, which can also serve as a counter ion for the bioactive substance. The bioactive substance is released without charge transfer, or in the form of a salt with a counter ion; transferable counter ions include hydroxynaphthoic acids, lactic acid-glycolic acid oligomers (of such molecular weights that transfer is possible), and monomers (lactic acid or glycolic acid), as described above. When a plurality of acids are concurrently present, salts of stronger acids are usually preferentially produced, although the outcome also depends on their content ratio. Regarding the pKa values of hydroxynaphthoic acids, 3-hydroxy-2-naphthoic acid, for example, is known to have a pKa value of 2.708 (Kagaku Binran Kisohen II, Chemical Society of Japan, published Sep. 25, 1969). On the other hand, the pKa values of the carboxyl groups of lactic acid-glycolic acid oligomers are unknown but can be calculated on the basis of the pKa value of lactic acid or glycolic acid (=3.86 or 3.83), in accordance with the theory that “the free energy level change due to substituent introduction can be approximated by the addition rule.” The contributions of substituents to dissociation constants have already been determined and can be used for this purpose (Table 4.1 in “pKa Prediction for Organic Acid and Bases,” D. D. Perrin, B. Dempsey, and E. P. Serjeant, 1981). Because the following data are applicable for the hydroxyl group and ester linkage: ΔpKa(OH)=−0.90 ΔpKa(ester linkage)=−1.7 the pKa value of the carboxyl group of lactic acid-glycolic acid oligomers can be determined, in consideration of the contribution of the ester linkage closest to the dissociation group, as follows: pKa=pKa(lactic acid or glycolic acid)−ΔpKa(OH)+ΔpKa(ester linkage)=3.06 or 3.03 Because hydroxynaphthoic acids are therefore stronger acids than lactic acid (pKa=3.86), glycolic acid (pKa=3.83), and lactic acid-glycolic acid oligomers, it is assumed that the hydroxynaphthoic acid salt of the bioactive substance is preferentially produced in the above-described composition, the characteristics of the salt being assumed to predominantly determine the nature of sustained-release of the bioactive substance from the composition. Said bioactive substance is exemplified by the bioactive substances described above. Here, the fact that the salt formed by the hydroxynaphthoic acid with the bioactive substance is very slightly soluble in water, rather than insoluble in water, serves in favor of the sustained-release mechanism. In other words, as demonstrated in the above discussion of acid dissociation constant, the salt of hydroxynaphthoic acid, a stronger acid than the above-described lactic acid-glycolic acid oligomers and monomers, is predominant in the initial stage of release; the initial release pattern of the drug can be regulated by the content ratio of hydroxynaphthoic acid, because the solubility and body tissue distribution profile of the salt serves as determinants of the bioactive substance release rate. Then, as the oligomers and monomers increase, due to reduction in the hydroxynaphthoic acid and hydrolysis of the biodegradable polymer, the bioactive substance release mechanism involving oligomers and monomers as counter ions becomes predominant gradually; even if the hydroxynaphthoic acid disappears substantially from said “composition,” stable bioactive substance release is achieved. The increased efficiency of bioactive substance incorporation for production of a sustained-release composition, and the possibility of suppression of initial burst after administration of the bioactive substance incorporated, can also be explained. The role of the hydroxynaphthoic acid in the sustained-release composition containing the hydroxynaphthoic acid salt of a bioactive peptide can also be explained by the above-described mechanism. The term “insoluble in water,” as used herein, means that when said substance is stirred in distilled water for 4 hours at temperatures of not higher than 40° C., the mass of the substance that dissolves in 1 l of the solution is not more than 25 mg. The term “very slightly soluble in water,” as used herein, means that the above-described mass is not less than 25 mg and not more than 5 g. When said substance is a salt of a bioactive substance, the above definition is applied for the mass of the bioactive substance that dissolved in the above-described operation. Although the sustained-release composition of the present invention is not subject to limitation as to form, microparticles are preferred, with greater preference given to microspheres (also referred to as microcapsules in the case of sustained-release compositions containing biodegradable polymers). The term “microsphere,” as used herein, is defined as an injectable sphere that can be dispersed in solutions. Its shape can be confirmed by, for example, scanning microscopy. [Modes of Embodiment of the Invention] Production methods for sustained-release compositions of the present invention, which contain a biologically active substance or a salt thereof, a hydroxynaphthoic acid or a salt thereof, and a biodegradable polymer or a salt thereof, microspheres, are exemplified below. (I) Water-In Drying Method (i) O/W Method In this method, an organic solvent solution of the hydroxynaphthoic acid or a salt thereof and biodegradable polymer or a salt thereof is prepared. Said organic solvent is exemplified by halogenated hydrocarbons (e.g., dichloromethane, chloroform, dichloroethane, trichloroethane, carbon tetrachloride), ethers (e.g., ethyl ether, isopropyl ether), fatty acid esters (e.g., ethyl acetate, butyl acetate), aromatic hydrocarbons (e.g., benzene, toluene, xylene), alcohols (e.g., ethanol, methanol), and acetonitrile. Among these, dichloromethane is preferable for an organic solvent of the biodegradable polymer or a salt thereof. Alcohols are preferable for an organic solvent of the hydroxynaphthoic acid or a salt thereof. These solvents may be used in mixtures at appropriate ratios. Of these solvents, mixtures of halogenated hydrocarbons and alcohols are preferred, with greater preference given to mixtures of dichloromethane and ethanol. When the organic solvent used is a mixture of dichloromethane and ethanol, the ratio of their concentrations is normally chosen over the range from about 0.01 to about 50% (v/v), preferably from about 0.05 to about 40% (v/v), and more preferably from about 0.1 to about 30% (v/v). The biodegradable polymer concentration in the organic solvent solution varies depending on the molecular weight of biodegradable polymer and the kind of organic solvent. For example, when the organic solvent used is dichloromethane, the biodegradable polymer concentration is normally chosen over the range from about 0.5 to about 70% by weight, preferably from about 1 to about 60% by weight, and more preferably from about 2 to about 50% by weight. The hydroxynaphthoic acid or a salt thereof concentration in the organic solvent solution is normally chosen, for example, over the range from about 0.01 to about 10% by weight, preferably from about 0.1 to about 5% by weight, and more preferably from about 0.5 to about 3% by weight. The biologically active substance or salt thereof is added to thus-obtained organic solvent solution containing a hydroxynaphthoic acid or salt thereof, and a biodegradable polymer, and dissolved or dispersed. The thus-obtained organic solvent solution containing a biologically active substance or salt thereof, a hydroxynaphthoic acid or salt thereof, and a biodegradable polymer, is then added to a water phase to form an O (oil phase)/W (water phase) emulsion, after which the solvent is evaporated from the oil phase to yield microspheres. For this operation, the water phase volume is normally chosen over the range from about 1 time to about 10,000 times, preferably from about 5 times to about 50,000 times, and more preferably from about 10 times to about 2,000 times, the oil phase volume. An emulsifier may be added to the above-described external water phase. Said emulsifier may be any one, as long as it is capable of forming a stable O/W emulsion. Such emulsifiers include, for example, anionic surfactants (e.g., sodium oleate, sodium stearate, sodium lauryl sulfate), nonionic surfactants [e.g., polyoxyethylene sorbitan fatty acid esters (Tween 80, Tween 60, Atlas Powder Company), polyoxyethylene castor oil derivatives (e.g., HCO-60, HCO-50, Nikko Chemicals)], polyvinylpyrrolidone, polyvinyl alcohol, carboxymethyl cellulose, lecithin, gelatin and hyaluronic acid. These emulsifiers may be used singly or in combination. Regarding the concentration, it is preferable that they be used over the range from about 0.01% to 10% by weight, preferably from about 0.05% to about 5% by weight. An osmotic pressure regulator may be added to the above-described external water phase. Said osmotic pressure regulator may be any one, as long as it shows an osmotic pressure when prepared as an aqueous solution. Said osmotic pressure regulator is exemplified by polyhydric alcohols, monohydric alcohols, monosaccharides, disaccharides, oligosaccharides, amino acids, and derivatives thereof. Useful polyhydric alcohols include, for example, dihydric alcohols such as glycerol, pentahydric alcohols such as arabitol, xylitol and adonitol, and hexahydric alcohols such as mannitol, sorbitol and dulcitol. Of these alcohols, hexavalent alcohols are preferred, with greater preference given to mannitol. Useful monohydric alcohols include, for example, methanol, ethanol and isopropyl alcohol, with preference given to ethanol. Useful monosaccharides include, for example, pentoses such as arabinose, xylose, ribose and 2-deoxyribose, and hexoses such as glucose, fructose, galactose, mannose, sorbose, rhamnose and fucose, with preference given to pentoses. Useful oligosaccharides include, for example, trisaccharides such as maltotriose and raffinose, and tetrasaccharides such as stachyose, with preference given to trisaccharides. Useful derivatives of monosaccharides, disaccharides and oligosaccharides include, for example, glucosamine, galactosamine, glucuronic acid and galacturonic acid. Useful amino acids include, for example, glycine, leucine and arginine, with preference given to L-arginine. These osmotic pressure regulators may be used singly, or in combination. These osmotic pressure regulators are normally used at such concentrations that the external water phase osmotic pressure is about {fraction (1/50)} to about 5 times, preferably about {fraction (1/25)} to about 3 times, the physiological saline osmotic pressure. Organic solvent removal can be achieved by commonly known methods or methods based thereon. Such methods include, for example, the method in which the organic solvent is evaporated under normal or gradually reduced pressure during stirring using a propeller stirrer, magnetic stirrer or the like, and the method in which the organic solvent is evaporated while the degree of vacuum is adjusted using a rotary evaporator or the like. The thus-obtained microspheres are centrifuged or filtered to separate them, after which they are washed with distilled water several times to remove the free biologically active substance, hydroxynaphthoic acid, drug support, emulsifier etc. adhering to the microsphere surface, then again dispersed in distilled water etc. and freeze-dried. To prevent mutual aggregation of particles during the production process, an anticoagulant may be added. Said anticoagulant is exemplified by water-soluble polysaccharides such as mannitol, lactose, glucose and starches (e.g., corn starch), amino acids such as glycine, and proteins such as fibrin and collagen. Of these substances, mannitol is preferred. Where necessary, freeze-drying may be followed by heating under reduced pressure without causing mutual adhesion of microspheres, to remove the water and organic solvent from the microspheres. It is preferable that the microspheres be heated at a temperature slightly higher than the intermediate glass transition point of the biodegradable polymer, as determined using a differential scanning calorimeter when the temperature is increased at a rate of 10 to 20° C. per minute. More preferably, the microspheres are heated within the temperature range from the intermediate glass transition point of the biodegradable polymer to a temperature higher by about 30° C. than the glass transition temperature. When a lactic acid-glycolic acid polymer is used as the biodegradable polymer, in particular, it is preferable that the microspheres be heated within the temperature range from the intermediate glass transition point to a temperature higher by 10° C. than the glass transition temperature, more preferably within the temperature range from the intermediate glass transition point to a temperature higher by 5° C. than the glass transition temperature. Although it varies depending on the amount of microspheres and other factors, heating time is normally about 12 hours to about 168 hours, preferably about 24 hours to about 120 hours, and more preferably about 48 hours to about 96 hours, after the microspheres reach a given temperature. Any heating method can be used, as long as microsphere aggregates are uniformly heated. Useful thermal drying methods include, for example, the method in which thermal drying is conducted in a constant-temperature chamber, fluidized bed chamber, mobile chamber or kiln, and the method using microwaves for thermal drying. Of these methods, the method in which thermal drying is conducted in a constant-temperature chamber is preferred. (ii) W/O/W Method (1) First, an organic solvent solution containing a biodegradable polymer or salt thereof is prepared. The concentration of the organic solvent and the biodegradable polymer or salt thereof are the same as those described in paragraph (I) (i) above. When more than two kinds of solvents are used, the ratios of these solvents are the same as those described in paragraph (I) (i) above. The biologically active substance or salt thereof is added to thus-obtained organic solvent solution containing the biodegradable polymer, then dissolved and dispersed. Next, to the organic solvent solution (oil phase) of the biologically active substance and biodegradable polymer, a solution of a hydroxynaphthoic acid or salt thereof [this solvent exemplified by water, alcohols (e.g., methanol, ethanol), pyridine solution, dimethylacetamide solution etc.] is added. This mixture is emulsified by a known method such as homogenization or sonication to form a W/O emulsion. The thus-obtained W/O emulsion containing a biologically active substance or salt thereof, hydroxynaphthoic acid or salt thereof, and a biodegradable polymer or salt thereof, is then added to a water phase to form a W (internal water phase)/O (oil phase)/W (external water phase) emulsion, after which the solvent is evaporated from the oil phase to yield microspheres. For this operation, the external water phase volume is normally chosen over the range from about 1 time to about 10,000 times, preferably from about 5 times to about 50,000 times, and more preferably from about 10 times to about 2,000 times, the oil phase volume. The above-described emulsifier and osmotic pressure regulator that may be added to the external water phase, and the subsequent procedures are the same as those described in paragraph (I) (i) above. (ii) W/O/W Method (2) First, an organic solvent solution containing a hydroxynaphthoic acid and a biodegradable polymer is prepared. Thus-obtained organic solvent solution is called as an oil phase. The preparation method is the same as those described in paragraph (I) (i) above. Althernatively, an organic solvent solution containing a hydroxynaphthoic acid and an organic solvent solution containing a biodegradable polymer may be prepared separately, and mixed together to prepare the oil phase. The biodegradable polymer concentration in the organic solvent solution varies depending on the molecular weight of biodegradable polymer and the kind of organic solvent. For example, when the organic solvent used is dichloromethane, the biodegradable polymer concentration is normally chosen over the range from about 0.5 to about 70% by weight, preferably from about 1 to about 60% by weight, and more preferably from about 2 to about 50% by weight. Next, a solution of a biologically active substance or salt thereof [this solvent exemplified by water, alcohols (e.g., methanol, ethanol)] is prepared. Thus-obtained solution is called as internal water phase. The concentration of the biologically active substance is normally 0.001 mg/ml to 10 g/ml, preferably, 0.1 mg/ml to 5 g/ml, more preferably, 10 mg/ml to 3 g/ml. The oil phase and the internal water phase are emulsified by a known method such as homogenization or sonication to form a W/O emulsion. For this operation, the oil phase volume is normally chosen over the range from about 1 time to about 1,000 times, preferably from about 2 times to about 100 times, and more preferably from about 3 times to about 10 times, the internal water phase volume. The viscosity of the w/o emulsion is normally chosen over the range from about 10 to about 1,0000 cp, preferably from about 100 to about 5,000 cp, more preferably from about 500 to about 2,000 cp. Thus-obtained w/0/emulsion containing a biologically active substance or salt thereof, hydroxynaphthoic acid or salt thereof, and a biodegradable polymer, is then added to a water phase to form a w(internal water phase)/o(oil phase)/w(external water phase) emulsion, after which the solvent is evaporated from the oil phase to yeild microspheres. For this operation, the external water phase volume is normally chosen over the range from about 1 time to about 10,000 times, preferably from about 2 times to about 100 times, and more preferably from about 3 times to about 10 times, the internal water phase volume. The above-described emulsifier and osmotic pressure regulator that may be added to the external water phase, and the subsequent procedures are the same as those described in paragraph (I) (i) above. (II) Phase Separation Method For producing microspheres by this method, a coacervating agent is added little by little to the organic solvent solution described in aqueous drying method paragraph (I) above, which contains a composition consisting of a biologically active substance or salt thereof, hydroxynaphthoic acid or salt thereof and biodegradable polymer or salt thereof, during stirring, to precipitate and solidify the microspheres. Said coacervating agent is added in an amount by volume of about 0.01 to 1,000 times, preferably about 0.05 to 500 times, and more preferably about 0.1 to 200 times, the oil phase volume. Said coacervating agent may be any one, as long as it is a polymer, mineral oil or vegetable oil compound that is miscible in the organic solvent, and that does not dissolve the salt complex of the biologically active substance with the hydroxynaphthoic acid and biocompatible polymer. Specifically, useful coacervating agents include, for example, silicon oil, sesame oil, soybean oil, corn oil, cotton seed oil, coconut oil, linseed oil, mineral oil, n-hexane and n-heptane. These may be used in combination. The microspheres thus obtained are collected, after which they are repeatedly washed with heptane etc. to remove the coacervating agent etc. other than the composition of the biologically active substance, hydroxynaphthoic acid and biodegradable polymer, followed by drying under reduced pressure. Alternatively, the microspheres are washed in the same manner as in aqueous drying method paragraph (I) (i) above, then freeze-dried and thermally dried. (III) Spray Drying Method For producing microspheres by this method, the organic solvent solution described in aqueous drying method paragraph (I) above, which contains a composition consisting of a biologically active substance or salt thereof, hydroxynaphthoic acid or salt therof and biodegradable polymer or salt thereof, is sprayed via a nozzle into the drying chamber of a spray drier to volatilize the organic solvent in the fine droplets in a very short time, to yield microspheres. Said nozzle is exemplified by the double-fluid nozzle, pressure nozzle and rotary disc nozzle. The microspheres may be then freeze-dried and thermally dried as necessary after being washed in the same manner as that described in aqueous drying method paragraph (I) above. For a dosage form other than the above-described microspheres, the organic solvent solution described in aqueous drying method paragraph (I) above, which contains a composition consisting of a biologically active substance or salt thereof, hydroxynaphthoic acid or salt thereof and biodegradable polymer or salt thereof, may be dried by evaporating the organic solvent and water, while the degree of vacuum is adjusted using a rotary evaporator or the like, followed by milling with a jet mill or the like, to yield microparticles. The milled microparticles may be then freeze-dried and thermally dried after being washed in the same manner as that described in aqueous drying method paragraph (I) for microsphere production. The microspheres or microparticles thus obtained enable drug release corresponding to the rate of decomposition of the biodegradable polymer or lactic acid-glycolic acid polymer used. (IV) Two-Step Method A biologically active substance or salt thereof is added to a solution of a hydroxynaphthoic acid or salt thereof in an organic solvent to a weight ratio falling within the above-described content range for biologically active substances, to yield an organic solvent solution of the hydroxynaphthoic acid of the biologically active substance. Said organic solvent is the same as those described in paregraph (I) (i) above. When nore than two kinds of organic solvents are used as a mixed solvent, the ratio of mixture is the same as those described in paragraph (I) (i) above. Organic solvent removal for precipitation of a composition of a hydroxynaphthoic acid of the biologically active substance can be achieved by commonly known methods or methods based thereon. Such methods include, for example, the method in which the organic solvent is evaporated while the degree of vacuum is adjusted using a rotary evaporator or the like. The thus-obtained composition of a hydroxynaphthoic acid of the biologically active substance can be again dissolved in an organic solvent to yield a sustained-release composition (microspheres or microparticles). Said organic solvent is exemplified by halogenated hydrocarbons (e.g., dichloromethane, chloroform, dichloroethane, trichloroethane, carbon tetrachloride), ethers (e.g., ethyl ether, isopropyl ether), fatty acid esters (e.g., ethyl acetate, butyl acetate), and aromatic hydrocarbons (e.g., benzene, toluene, xylene). These solvents may be used in mixtures at appropriate ratios. Of these solvents, halogenated hydrocarbons are preferred, with greater preference given to dichloromethane. The organic solvent solution containing the hydroxynaphthoic acid of the biologically active substance is then added to a water phase to form an O (oil phase)/W (water phase) emulsion, after which the solvent is evaporated from the oil phase to yield microspheres. For this operation, the water phase volume is normally chosen over the range from about 1 time to about 10,000 times, preferably from about 5 times to about 5,000 times, and more preferably from about 10 times to about 2,000 times, the oil phase volume. An emulsifier, an osmotic pressure regulator, and the following step is the same as those described in paragraph (I) (i). Organic solvent removal can be achieved by commonly known methods or methods based thereon. Such methods include, for example, the method in which the organic solvent is evaporated under normal or gradually reduced pressure during stirring using a propeller stirrer, magnetic stirrer or the like, and the method in which the organic solvent is evaporated while the degree of vacuum is adjusted using a rotary evaporator or the like. The thus-obtained microspheres are centrifuged or filtered to separate them, after which they are washed with distilled water several times to remove the free biologically active substance, hydroxynaphthoic acid, emulsifier etc. adhering to the microsphere surface, then again dispersed in distilled water etc. and freeze-dried. To prevent mutual aggregation of particles during the production process, an anticoagulant may be added. Said anticoagulant is exemplified by water-soluble polysaccharides such as mannitol, lactose, glucose and starches (e.g., corn starch), amino acids such as glycine, and proteins such as fibrin and collagen. Of these substances, mannitol is preferred. Where necessary, freeze-drying may be followed by heating under reduced pressure without causing mutual adhesion of microspheres, to further remove the water and organic solvent from the microspheres. Although it varies depending on the amount of microspheres and other factors, heating time is normally about 12 hours to about 168 hours, preferably about 24 hours to about 120 hours, and more preferably about 48 hours to about 96 hours, after the microspheres reach a given temperature. Any heating method can be used, as long as microsphere aggregates are uniformly heated. Useful thermal drying methods include, for example, the method in which thermal drying is conducted in a constant-temperature chamber, fluidized bed chamber, mobile chamber or kiln, and the method using microwaves for thermal drying. Of these methods, the method in which thermal drying is conducted in a constant-temperature chamber is preferred. The microspheres obtained are relatively uniformly spherical and undergo little resistance during administration by injection so that needle clogging is unlikely. Also, possible use of thin injection needles mitigates patient pain at injection. (V) One-Step Method A biologically active substance or salt thereof is added to a solution of a hydroxynaphthoic acid or salt thereof in an organic solvent to a weight ratio falling within the above-described content range for biologically active substances, to yield an organic solvent solution of the hydroxynaphthoic acid of the biologically active substance, after which a sustained-release preparation (microspheres or microparticles) is prepared. Said organic solvent is the same as those described in (I) (i). When more than two organic solvents are used as mixed solvents, the ratio of mixture is as same as those described in (I) (i). The organic solvent solution containing the hydroxynaphthoic acid of the biologically active substance is then added to a water phase to form an O (oil phase)/W (water phase) emulsion, after which the solvent is evaporated from the oil phase to yield microspheres. For this operation, the water phase volume is normally chosen over the range from about 1 time to about 10,000 times, preferably from about 5 times to about 5,000 times, and more preferably from about 10 times to about 2,000 times, the oil phase volume. The above-described emulsifier and osmotic pressure regulator that may be added to the external water phase, and the subsequent procedures are the same as those described in paragraph (IV) above. The sustained-release composition of the present invention can be administered as such or in the form of various dosage forms prepared using it as a starting material, specifically as intramuscular, subcutaneous, visceral and other injectable preparations or implant preparations, nasal, rectal, uterine and other transdermal preparations, oral preparations [e.g., solid preparations such as capsules (e.g., hard capsules, soft capsules), granules and powders; liquids such as syrups, emulsions and suspensions] etc. For example, the sustained-release composition of the present invention can be prepared as injectable preparations by suspending in water with a dispersing agent (e.g, surfactants such as Tween 80 and HCO-60, polysaccharides such as sodium hyaluronate, carboxymethyl cellulose and sodium alginate), a preservative (e.g., methyl paraben, propyl paraben), an isotonizing agent (e.g., sodium chloride, mannitol, sorbitol, glucose, proline) etc. to yield an aqueous suspension, or by dispersing in a vegetable oil such as sesame oil or corn oil to yield an oily suspension, whereby a practically useful sustained-release injectable preparation is obtained. When the sustained-release composition of the present invention is used in the form of an injectable suspension, its particle diameter is chosen over such a range that the requirements concerning the degree of dispersion and needle passage are met. For example, the mean particle diameter normally ranges from about 0.1 to 300 μm, preferably from about 0.5 to 150 μm, and more preferably from about 1 to 100 μm. The sustained-release composition of the present invention can be prepared as a sterile preparation by such methods in which the entire production process is aseptic, the method using gamma rays for sterilization, and the method in which a preservative is added, which methods are not to be construed as limitative. Because of low toxicity, the sustained-release composition of the present invention can be used as a safe pharmaceutical etc. in mammals (e.g., humans, bovines, swines, dogs, cats, mice, rats, rabbits). Although varying widely depending on kind, content and dosage form of the active ingredient biologically active substance, and duration of release of the biologically active substance, target disease, subject animal species and other factors, the dose of the sustained-release composition may be set at any level, as long as the biologically active substance is effective. The dose of the active ingredient biologically active substance per administration can be preferably chosen as appropriate over the range from about 0.01 mg to 10 mg/kg body weight, more preferably from about 0.05 mg to 5 mg/kg body weight, per adult in the case of a 1-month release preparation. The dose of the sustained-release composition per administration can be preferably chosen as appropriate over the range from about 0.05 mg to 50 mg/kg body weight, more preferably from about 0.1 mg to 30 mg/kg body weight per adult. The frequency of administration can be chosen as appropriate, depending on kind, content and dosage form of the active ingredient biologically active substance, duration of release of the biologically active substance, target disease, subject animal species and other factors, e.g., once every several weeks, one every month or once every several months (e.g., 3 months, 4 months, 6 months). The sustained-release composition of the present invention is useful, depending on the biologically active substance which is contained in the sustained-release composition, as an agent for treating or preventing various kinds of diseases. When the biologically active substance is LH-RH derivatives, the sustained-release composition of the present invention is useful as an agent for treating or preventing of hormone-dependent diseases, especially sex hormone-dependent diseases, such as sex hormone-dependent cancer (e.g. prostatic cancer, hysterocarcinoma, breast cancer, hypophysoma, etc.), prostatic hypertrophy, endometriosis, hysteromyoma, precocious puberty, dysmenorrhea, amenorrhea, premenstrual syndrome, multilocular-ovary syndrome. The sustained-release composition of the present invention is also useful for an anticonceptice agent. When the re-bound effect of after medication is used, the sustained-release composition of the present invention is useful as an agent for treating or preventing of infrcundity. Further, the sustained-release composition of the present invention is useful as an agent for treating or preventing of sex hormone-nondependent, but LH-RH sensitive benign or cacoethic neoplasm. EXAMPLES The present invention is hereinafter described in more detail by means of the following examples, which are not to be construed as limitative. Example 1 3,429.6 mg of the acetate (produced by TAP) of N-(S)-tetrahydrofur-2-oyl-Gly-D2Nal-D4ClPhe-D3Pal-Ser-NMeTyr-DLys(Nic)-Leu-Lys(Nisp)-Pro-DAlaNH2 (hereinafter referred to as peptide A) (Chemical Formula of Peptide A) and 685.2 mg of 3-hydroxy-2-naphthoic acid were dissolved in 15 ml of ethanol. This solution was gradually distilled by means of a rotary evaporator to evaporate the organic solvent. This residue was again dissolved in 5.5 ml of dichloromethane and poured in 400 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol (EG-40, produced by The Nippon Synthetic Chemical Industry), previously adjusted to 18° C.; the solution was stirred at 8,000 rpm, using a turbine type homomixer, to yield an O/W emulsion. This O/W emulsion was stirred at room temperature for 3 hours to volatilize the dichloromethane and solidify the oil phase, followed by microsphere collection at 2,000 rpm using a centrifuge (05PR-22, Hitachi, Ltd.). The microspheres were again dispersed in distilled water, after which centrifugation was conducted, and the free drug etc. washed down. The microspheres collected were again dispersed in a small amount of distilled water, then freeze-dried, to yield a powder. The recovery rate was 65%, and the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 75.4% and 1.94, respectively. Example 2 1,785.1 mg of the acetate of peptide A and 1,370.4 mg of 3-hydroxy-2-naphthoic acid were dissolved in 15 ml of ethanol. This solution was gradually distilled by means of a rotary evaporator to evaporate the organic solvent. This residue was again dissolved in 10 ml of dichloromethane and poured in 1,000 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol, previously adjusted to 18° C.; the same procedures as those in Example 1 were followed to yield microspheres. The recovery rate was 58%, the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 54.3% and 6.15, respectively. Example 3 1,800 mg of the acetate of peptide A, 173 mg of 3-hydroxy-2-naphthoic acid, and 2 g of a lactic acid-glycolic acid copolymer (lactic acid/glycolic acid=50/50 (mol %), weight-average molecular weight 10,100, number-average molecular weight 5,670, number-average molecular weight 3,720, as determined by terminal group quantitation, produced by Wako Pure Chemical Industries) were dissolved in a mixture of 6 ml of dichloromethane and 0.2 ml of ethanol. This solution was poured into 900 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol containing 5% mannitol, previously adjusted to 18° C., and stirred at 7,000 rpm using a turbine type homomixer to yield an O/W emulsion. This O/W emulsion was stirred at room temperature for 3 hours to volatilize the dichloromethane and ethanol and solidify the oil phase, followed by microsphere collection at 2,000 rpm using a centrifuge. The microspheres were again dispersed in distilled water, after which centrifugation was conducted, and the free drug etc. washed down. The microspheres collected were again dispersed in 250 mg of mannitol and a small amount of distilled water, then freeze-dried, to yield a powder. The recovery rate was 76%, the rate of peptide A inclusion in the microspheres was 84.6%, and the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 34.7% and 1.19, respectively. Example 4 1,900 mg of the acetate of peptide A, 182 mg of 3-hydroxy-2-naphthoic acid, and 1.9 g of a lactic acid-glycolic acid copolymer (same as in Example 3) were dissolved in a mixture of 6 ml of dichloromethane and 0.2 ml of ethanol. This solution was poured in 900 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol containing 5% mannitol and 0.05% L-arginine, previously adjusted to 18° C.; the same procedures as those in Example 3 were followed to yield microspheres. The recovery rate was 85%, the rate of peptide A inclusion in the microspheres was 88.9%, and the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 38.6% and 0.83, respectively. Example 5 Microspheres were obtained in the same manner as in Example 4, except that the lactic acid-glycolic acid copolymer used in Example 4 was replaced with a lactic acid-glycolic acid copolymer having a lactic acid/glycolic acid content ratio of 75/25 (mol %), a weight-average molecular weight of 10,700, a number-average molecular weight of 6,100, and a number-average molecular weight of 3,770, as determined by terminal group quantitation, and that the amount of dichloromethane was changed to 6.5 ml. The recovery rate was 87%, the rate of peptide A inclusion in the microspheres was 88.3%, and the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 38.3% and 0.92, respectively. Example 6 To a solution of 1,800 mg of the acetate of peptide A and 1.8 g of a lactic acid-glycolic acid copolymer (lactic acid/glycolic acid=50/50 (mol %), weight-average molecular weight 12,700, number-average molecular weight 7,090, number-average molecular weight 4,780, as determined by terminal group quantitation, produced by Wako Pure Chemical Industries) in 7.2 ml of dichloromethane. To this solution, a solution of 196 mg of 3-hydroxy-2-naphthoic acid sodium salt in 2.3 ml of water was added, followed by emulsification using a homogenizer, to yield a W/O emulsion. This emulsion was poured into 800 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol containing 5% mannitol, previously adjusted to 18° C., and stirred at 7,000 rpm using a turbine type homomixer to yield a W/O/W emulsion. The same procedures as those in Example 3 were followed to yield microspheres. The recovery rate was 79%, the rate of peptide A inclusion in the microspheres was 81.2%, and the peptide A content and 3-hydroxy-2-naphthoic acid/peptide A molar ratio in the microspheres were 32.8% and 0.91, respectively. Experimental Example 1 About 40 mg of the microspheres obtained in each of Examples 1 and 2, or about 60 mg of the microspheres obtained in each of Examples 3 through 5, were dispersed in 0.5 ml of a dispersant (distilled water with 0.25 mg of carboxymethyl cellulose, 0.5 mg of Polysorbate 80, and 25 mg of mannitol, all dissolved therein), and subcutaneously administered to the backs of male SD rats at 8 to 10 weeks of age, using a 22G injection needle. After administration, each rat was killed, and the microspheres remaining at the administration site were taken and assayed for peptide A content. The results are shown in Table 1. TABLE 1 1 Day 1 Week 2 Weeks 3 Weeks 4 Weeks Example 1 73% 30% 11% 6% 6% Example 2 85% 37% 9% 1% Example 3 70% 31% 14% 9% Example 4 77% 29% 11% 10% 6% Example 5 81% 44% 25% 17% 13% The experimental results of Examples 1 and 2 demonstrate that the rate of peptide A release from the microspheres consisting of two components, i.e., peptide A and 3-hydroxy-2-naphthoic acid, varied depending on their ratio; peptide A was more rapidly released as the 3-hydroxy-2-naphthoic acid content increased. Also, the experimental results in Examples 3, 4 and 5 demonstrate that the microspheres consisting of three components, i.e., the above two components and a lactic acid-glycolic acid copolymer, showed a peptide A release profile different from that from the microspheres consisting of the two. It was also shown that the release behavior of microspheres can be controlled by combining different lactic acid-glycolic acid copolymer compositions and weight-average molecular weights. The results in Example 7 and Reference Example 1 demonstrate that 3-hydroxy-2-naphthoic acid increases the peptide B content in microspheres. Example 7 A solution of 0.8 g of the acetate of 5-oxo-Pro-His-Trp-Ser-Tyr-DLeu-Leu-Arg-Pro-NH—C2H5 (hereinafter referred to as peptide B, produced by Takeda Chemical) in 0.8 ml of distilled water was mixed with a solution of 3.08 g of a DL-lactic acid polymer (weight-average molecular weight 36,000, number-average molecular weight 18,000, carboxyl group content based on labeling quantitation method 70.4 μmol/g) and 0.12 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 5 ml of dichloromethane and 0.3 ml of ethanol, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was injected to 800 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol (EG-40, produced by The Nippon Synthetic Chemical Industry), previously adjusted to 15° C., and stirred at 7,000 rpm using a turbine type homomixer to yield a W/O/W emulsion. This W/O/W emulsion was stirred at room temperature for 3 hours to volatilize or diffuse in the external aqueous phase the dichloromethane and ethanol, to solidify the oil phase, after which the oil phase was sieved through a sieve of 75 μm pore size, followed by centrifugation at 2,000 rpm for 5 minutes in a centrifuge (05PR-22, Hitachi, Ltd.) to sediment microcapsules, which were collected. The microcapsules were again dispersed in distilled water, then centrifuged, followed by washing free drug etc. and microcapsule collection. The microcapsules were re-dispersed in a small amount of distilled water added, after which they were freeze-dried to yield a powder. The microcapsule mass recovery rate was 46%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 21.3% and 2.96%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 106.6% for peptide B and 98.6% for 3-hydroxy-2-naphthoic acid. Example 8 A solution of 1.2 g of the acetate of peptide B in 1.2 ml of distilled water was mixed with a solution of 4.62 g of a DL-lactic acid polymer (weight-average molecular weight 25,200, number-average molecular weight 12,800, carboxyl group content based on labeling quantitation method 62.5 μmol/g) and 0.18 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 7.5 ml of dichloromethane and 0.45 ml of ethanol, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was then injected to 1,200 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol (EG-40, produced by The Nippon Synthetic Chemical Industry), previously adjusted to 15° C., and stirred at 7,000 rpm using a turbine type homomixer to yield a W/O/W emulsion. This W/O/W emulsion was stirred at room temperature for 3 hours to volatilize or diffuse in the external aqueous phase the dichloromethane and ethanol, to solidify the oil phase, after which the oil phase was sieved through a sieve of 75 μm pore size, followed by centrifugation at 2,000 rpm for 5 minutes in a centrifuge (05PR-22, Hitachi, Ltd.) to sediment microcapsules, which were collected. The microcapsules were again dispersed in distilled water, then centrifuged, followed by washing free drug etc. and microcapsule collection. The microcapsules were re-dispersed in a small amount of distilled water, and 0.3 g of mannitol was added and dissolved, after which the solution was freeze-dried to yield a powder. The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 55.2%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 21.3% and 2.96%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 99.7% for peptide B and 102.2% for 3-hydroxy-2-naphthoic acid. Example 9 A microcapsule powder was obtained in the same manner as in Example 8, except that the DL-lactic acid polymer described in Example 8 was replaced with another DL-lactic acid polymer (weight-average molecular weight 28,800, number-average molecular weight 14,500, carboxyl group content based on labeling quantitation method 78.1 μmol/g). The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 50.2%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 20.8% and 2.78%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 103.4% for peptide B and 92.7% for 3-hydroxy-2-naphthoic acid. Comparative Example 1 A solution of 1.2 g of the acetate of peptide B in 1.2 ml of distilled water was mixed with a solution of 4.8 g of the same DL-lactic acid polymer as of Example 9 in 7.8 ml of dichloromethane, and this mixture was injected to 1,200 ml of a 0.1% (w/w) aqueous solution of polyvinyl alcohol (EG-40, produced by The Nippon Synthetic Chemical Industry), previously adjusted to 15° C., and stirred at 7,000 rpm using a turbine type homomixer to yield a W/O/W emulsion. This W/O/W emulsion was treated in the same manner as in Example 8 to yield a microcapsule powder. The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 53.6%, the microcapsule peptide B content being 12.1%. The peptide B inclusion efficiency as determined by dividing these actual content by the charge content was 60.6%, a rate much lower than that obtained in Example 9. It is therefore evident that peptide B inclusion efficiency was increased by the addition of 3-hydroxy-2-naphthoic acid. Example 10 A solution of 1.00 g of the acetate of peptide B in 1.00 ml of distilled water was mixed with a solution of 3.85 g of a DL-lactic acid polymer (weight-average molecular weight 49,500, number-average molecular weight 17,500, carboxyl group content based on labeling quantitation method 45.9 μmol/g) and 0.15 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 7.5 ml of dichloromethane and 0.4 ml of ethanol, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was then treated in the same manner as in Example 8, except that the amount of 0.1% (w/w) aqueous solution of polyvinyl alcohol and the amount of mannitol added were changed to 1,000 ml and 0.257 g, respectively, to yield a microcapsule powder. The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 53.8%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 18.02% and 2.70%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 90.1% for peptide B and 90.1% for 3-hydroxy-2-naphthoic acid. Example 11 A solution of 1.202 g of the acetate of peptide B in 1.20 ml of distilled water was mixed with a solution of 4.619 g of a DL-lactic acid polymer (weight-average molecular weight 19,900, number-average molecular weight 10,700, carboxyl group content based on labeling quantitation method 104.6 μmol/g) and 0.179 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 7.5 ml of dichloromethane and 0.45 ml of ethanol, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was then treated in the same manner as in Example 8, except that the amount of mannitol added was 0.303 g, to yield a microcapsule powder. The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 61.4%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 15.88% and 2.23%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 77.75% for peptide B and 75.05% for 3-hydroxy-2-naphthoic acid. Example 12 A solution of 1.00 g of the acetate of peptide B in 1.00 ml of distilled water was mixed with a solution of 3.85 g of a DL-lactic acid polymer (weight-average molecular weight 25,900, number-average molecular weight 7,100, carboxyl group content based on labeling quantitation method 98.2 μmol/g) and 0.15 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 5.5 ml of dichloromethane and 0.35 ml of ethanol, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was then treated in the same manner as in Example 7 to yield a microcapsule powder. The microcapsule mass recovery rate was 48.8%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 21.31% and 2.96%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 106.5% for peptide B and 98.7% for 3-hydroxy-2-naphthoic acid. Comparative Example 2 A solution of 1.00 g of the acetate of peptide B in 1.00 ml of distilled water was mixed with a solution of 4.00 g of the same DL-lactic acid polymer as of Example 12 in 5 ml of dichloromethane, and this mixture was emulsified in a homogenizer to yield a W/O emulsion. This W/O emulsion was then treated in the same manner as in Example 7 to yield a microcapsule powder. The microcapsule mass recovery rate was 48.7%, the microcapsule peptide B content being 11.41%. The inclusion efficiency as determined by dividing this actual content by the charge content was 57.1%, a rate much lower than that obtained in Example 12. It is therefore evident that peptide B inclusion efficiency was increased by the addition of 3-hydroxy-2-naphthoic acid. Example 13 A solution of 89.2 g of a DL-lactic acid polymer (weight-average molecular weight 30,600, number-average molecular weight 14,400, carboxyl group content based on labeling quantitation method 63.0 μmol/g) in 115.3 g of dichloromethane was mixed with a solution of 3.45 g of 3-hydroxy-2-naphthoic acid in a mixed organic solvent of 38.8 g of dichloromethane and 6.27 g of ethanol, and this mixture was adjusted to 28.5° C. From this organic solvent solution, 224 g was weighed out and mixed with an aqueous solution of 22.3 g of the acetate of peptide B in 20 ml of distilled water, previously warmed to 44.9° C., followed by 5 minutes of stirring, to yield a crude emulsion, which was then emulsified at 10,000 rpm for 5 minutes in a homogenizer to yield a W/O emulsion. This W/O emulsion was then cooled to 16.3° C., and injected to 20 liters of a 0.1% (w/w) aqueous solution of polyvinyl alcohol (EG-40, produced by The Nippon Synthetic Chemical Industry), previously adjusted to 15° C., over a 5-minute period, and stirred at 7,000 rpm using HOMOMIC LINE FLOW (produced by Tokushu Kika) to yield a W/O/W emulsion. This W/O/W emulsion was stirred at 15° C. for 3 hours to volatilize or diffuse in the external aqueous phase the dichloromethane and ethanol, to solidify the oil phase, after which the oil phase was sieved through a sieve of 75 μm pore size, followed by centrifugation at 2,000 rpm in a centrifuge (H-600S, produced by Kokusan Enshinki) to continuously sediment microcapsules, which were collected. The microcapsules were again dispersed in a small amount of distilled water, then sieved through a sieve of 90 μm pore size, followed by freeze drying, to yield a powder. The microcapsule mass recovery rate as determined by subtracting the amount of mannitol added was 66.5%, the microcapsule peptide B content and 3-hydroxy-2-naphthoic acid content being 22.3% and 2.99%, respectively. The inclusion efficiencies as determined by dividing these actual contents by the respective charge contents were 104.5% for peptide B and 102.1% for 3-hydroxy-2-naphthoic acid. Experimental Example 2 A dispersion of about 45 mg of microcapsules as described in Example 8 in 0.3 ml of a dispersant (distilled water containing 0.15 mg of carboxymethyl cellulose, 0.3 mg of polysorbate 80, and 15 mg of mannitol all dissolved therein) was subcutaneously administered to the backs of male SD rats at 7 weeks of age, using a 22G injection needle. After given time intervals, rats were killed, and microcapsules remaining at the injection site were taken and quantitatively assayed for peptide B and 3-hydroxy-2-naphthoic acid. The retention rates as determined by dividing the assay values by the respective initial contents, and the property profiles of the DL-lactic acid polymer used are shown in Table 2. TABLE 2 Characteristics of the Microcapsule DL-Lactic Acid Polymer Described in Example 8 Mw (Da) 25,200 [COOH] (μmol/g polymer) 62.5 Retention rate: Peptide B 3-Hydroxy-2-naphthoic acid 1 day 93.1% 91.0% 2 weeks 84.2% 54.1% 4 weeks 75.7% 34.5% 8 weeks 63.0% 5.1% 12 weeks 46.9% 0.0% 16 weeks 31.7% 0.0% 20 weeks 24.0% 0.0% As seen in Table 2, the microcapsule described in Example 8 shows a dramatically high bioactive substance retention rate of not less than 90% at 1 day after administration, despite the high bioactive substance content. It is therefore evident that 3-hydroxy-2-naphthoic acid is effective not only in allowing bioactive substance incorporation at high contents in sustained-release preparations, but also in very well suppressing initial burst of bioactive substances. This microcapsule is capable of releasing a bioactive substance at a constant rate over a very long period of time. In addition, although 3-hydroxy-2-naphthoic acid has completely been eliminated from the microcapsule after 12 weeks, the same bioactive substance release rate is maintained, demonstrating efficacy as a sustained-release preparation. Experimental Example 3 After microcapsules as obtained in Examples 7 and 9-12 and Comparative Example 1 were administered and recovered in the same manner as in Experimental Example 2, peptide B therein was quantified. The retention rates as determined by dividing the assay values by the respective initial contents, and the property profiles of the DL-lactic acid polymer used are shown in Table 3. TABLE 3 Characteristics of the DL-Lactic Acid Polymers: Example Example Example Comparative Example 7 Example 9 10 11 12 Example 1 Mw (Da) 36,000 28,800 49,500 19,900 25,900 28,800 [COOH] (μmol/g polymer) 70.4 78.1 45.9 104.6 98.2 78.1 Retention rate 1 day 92.9% 94.6% 93.0% 92.3% 89.4% 83.1% 2 weeks 82.2% 82.2% 80.4% 37.5% 34.3% 73.0% 4 weeks 69.6% 69.2% 58.3% 30.7% 29.7% 65.3% 8 weeks 62.1% 56.0% 36.6% 24.6% 20.8% 12 weeks 47.9% 39.4% 30.8% 18.6% 16 weeks 32.2% 28.0% 20 weeks (not 22.9% determined) 24 weeks 11.6% 28 weeks 4.1% As seen in Tables 2 and 3, the microcapsules described in Examples 7 through 12 show dramatically higher retention rates of about 90% or higher at 1 day after administration, as compared with Comparative Example 1. It is therefore evident that 3-hydroxy-2-naphthoic acid is effective not only in allowing bioactive substance incorporation at high contents in sustained-release preparations, but also in very well suppressing initial burst of bioactive substances. Experiments using the microcapsules described in Examples 7 through 9, in particular, demonstrate that when DL-lactic acids with weight-average molecular weights of about 20,000 to about 50,000, and carboxyl group contents f about 50 to 90 μmol/g, as determined by the labeling quantitation method, are used, it is possible to release a bioactive substance at a constant over a very long period of time. Experimental Example 4 After the microcapsule obtained in Example 7 was subcutaneously administered to rats by the method described in Experimental Example 2, blood was collected, and serum peptide B and testosterone concentrations were determined. The results are shown in Table 4. TABLE 4 12 weeks 16 weeks 24 weeks 26 weeks 28 weeks Peptide B 1.10 1.65 1.46 2.73 1.30 (ng/ml) Testosterone 0.18 0.45 0.68 0.41 0.71 (ng/ml) As seen in Table 4, the blood bioactive substance concentration was kept at constant levels until 28 weeks after administration, meaning that the bioactive substance was continuously released from the microcapsule over a 28-week period. It was shown that the pharmacologically active testosterone concentration was constantly suppressed below normal levels during that period, and that the bioactive substance was stably present in, and released from, the microcapsule over a long period of time, without losing its activity, even when 3-hydroxy-2-naphthoic acid was contained in the preparation. Example 14 A 0.5 N aqueous solution of sodium hydroxide/methanol mixture (v/v=1/5) was passed through a strongly basic ion exchange column (SeP-Pak Plus QMA Cartridge, produced by WATERS) to eliminate chloride ions. After the effluent became non-responsive to the addition of a silver nitrate solution acidified with nitric acid to show white turbidity, a water/methanol mixture (v/v=1/5) was passed to eliminate the excess alkali. After confirmation of effluent neutrality, 18.8 mg of the acetate of peptide B was dissolved in 2 ml of a water/methanol mixture (v/v=1/5) and passed through a column pretreated as described above. This effluent and another effluent resulting from passage of 6 ml of the mixture alone were combined; this mixture was mixed with a solution of 5.91 mg of 3-hydroxy-2-naphthoic acid in 1 ml of a water/methanol mixture (v/v=1/5), followed by concentration using a rotary evaporator. Upon white turbidity formation in the mixture, 2 ml of water was added, followed by stirring. After centrifugation (3,000 rpm, 20° C., 15 minutes), the supernatant was removed, followed by several cycles of water washing, after which the precipitate was vacuum dried (40° C., overnight) to yield 4.09 mg of the 3-hydroxy-2-naphthoic acid salt of peptide B. To this salt, 0.5 ml of water was added, followed by stirring at room temperature for 4 hours, after which the liquid was filtered through a 0.2 μm filter and quantified by HPLC. The peptide B and 3-hydroxy-2-naphthoic acid concentrations were 2.37 g/l and 0.751 g/l, respectively. The salt partially remained non-dissolved even after stirring; the above values are assumed to represent the water solubility of the 3-hydroxy-2-naphthoic acid salt of peptide B, not more than 1/100 lower than the water solubility, not less than 1,000 g/l, of the acetate of peptide B. This demonstrates that the 3-hydroxy-2-naphthoic acid salt of peptide B can be used as a peptide B sustained-release preparation. [Effect of the Invention] The sustained-release composition of the present invention contains a biologically active substance at high contents, and is capable of controlling the rate of its release.
<SOH> FIELD OF INDUSTRIAL APPLICATION <EOH>The present invention relates to a sustained-release composition of a biologically active substance, a production method thereof.
20040312
20080617
20050203
74056.0
0
EBERHARD, JEFFREY S
SUSTAINED RELEASE COMPOSITIONS, PROCESS FOR PRODUCING THE SAME AND UTILIZATION THEREOF
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,799,484
ACCEPTED
A-FRAME MOUNTED ON A FLAT BED TRAILER
A pair of opposed A-frames are positioned uprightly on a flat bed chassis. A downwardly descending side leg on each side of each A-frame rests on an axially mounted beam. The beam is attached to the underside of the flat bed chassis and extends outwardly from a side surface of the flat bed trailer and is angled upwardly to support a bottom edge of a building material slab or sheet.
1. An apparatus mounted on a flat bed trailer chassis for supporting upright building structures during shipment on a public highway, the apparatus comprising: a pair of opposed A-frames positioned uprightly on the flat bed trailer chassis; a pair of downwardly descending side legs on each side of the A-frame, the side legs descending partially below a top surface of the flat bed chassis and outboard of a right and left side surface of the flat bed chassis; the side legs of each A-frame supported by an axially mounted beam attached to an undercarriage of the flat bed chassis, a portion of the beam extending outwardly from the undercarriage of the flat bed chassis and from the right and left side of the flat bed chassis, the beam portion extending outwardly being angled upwardly to support a bottom edge of the building structure with a top portion of the building structure juxtaposed to the side legs on one side of the A-frames. 2. An apparatus according to claim 1 wherein a second pair of A-frames is positioned uprightly on the flat bed chassis. 3. An apparatus according to claim 2 wherein the flat bed chassis on which the A-frames are mounted is expandable. 4. An apparatus according to claim 1 wherein the axially mounted beam has a base component welded to a bottom surface of an intermediate component which in turn is welded to an undercarriage of the chassis along a top surface. 5. An apparatus according to claim 1 wherein the A-frames each have a top horizontal connecting member and a lower horizontal connecting member connecting the pair of downwardly descending side legs. 6. An apparatus according to claim 5 wherein a strut connects the lower horizontal connecting member to the top surface of the flat bed chassis. 7. An apparatus according to claim 1 wherein a strut connects the axially mounted beam to an undercarriage of the flat bed chassis. 8. An apparatus according to claim 1 wherein the building structure is a concrete slab. 9. An apparatus according to claim 1 wherein the building structure is a steel slab. 10. An improved apparatus for transporting building structures on a public highway on a pair of opposed A-frames positioned uprightly on a flat bed trailer chassis, the improvement comprising: a pair of downwardly descending side legs on each side of the A-frame, descending partially below a top surface of the trailer chassis and outboard of a right and left side surface of the trailer chassis; the side legs of each A-frame supported by an axially mounted beam attached to an undercarriage of the flat bed chassis, a portion of the beam extending outwardly from the undercarriage of the flat bed chassis and from the right and left side of the flat bed chassis; and the portion of the beam extending outwardly being angled upwardly to support a bottom edge of the building structure, with a top portion of the building structure juxtaposed to the side legs on one side of the A-frames. 11. The improved apparatus according to claim 10 wherein the beam portion extending outwardly is angled upwardly at an angle of about ten degrees. 12. The improved apparatus according to claim 10 wherein the beam portion extending outwardly has a top surface covered with a rubber pad. 13. The improved apparatus according to claim 10 wherein the axially mounted beam has a base component welded at a top surface to a bottom surface of an intermediate component, a top surface of the intermediate component welded to the undercarriage of the flat bed chassis. 14. The improved apparatus according to claim 10 wherein a strut connects the axially mounted beam to an undercarriage of the flat bed chassis. 15. The improved apparatus according to claim 10 wherein the building structure is a concrete slab. 16. An apparatus mounted on a flat bed trailer chassis for supporting upright building structures during shipment on a public highway, the apparatus comprising: a pair of opposed A-frames positioned uprightly on the flat bed trailer chassis; a pair of downwardly descending side legs on each side of the A-frame the side legs descending partially below a top surface of the flat bed chassis and outboard of a right and left side surface of the flat bed trailer chassis; a top horizontal member and a lower intermediate horizontal member connecting each pair of side legs above the top surface of the flat bed trailer chassis; a strut connecting the intermediate horizontal member to the top surface of the flat bed trailer chassis; the side legs of each A-frame supported by an axially mounted beam attached to an undercarriage of the flat bed trailer chassis, a portion of the beam extending outwardly from the undercarriage of the flat bed trailer chassis and from the right and left side of the flat bed trailer chassis, the beam portion extending outwardly being angled upwardly to support a bottom edge of the building structure with a top portion of the building structure juxtaposed to the side legs on one side of the A-frames; and the beam further connected to the undercarriage of the flat bed trailer chassis by a strut. 17. The apparatus according to claim 16 wherein the beam portion extending outwardly is angled upwardly at an angle of about ten degrees. 18. The apparatus according to claim 16 wherein the beam portion extending outwardly is covered with a rubber mat. 19. The apparatus according to claim 16 wherein the building structure is a cement slab. 20. The apparatus according to claim 16 wherein there are two pair of opposed A-frames positioned uprightly on the flat bed trailer chassis.
BACKGROUND OF THE INVENTION This invention relates to shipping support apparatus mounted on a flat bed trailer. More particularly, it refers to pairs of A-frames mounted on a flat bed trailer for supporting heavy upright loads. Currently, most heavy loads such as concrete slabs are transported on flat bed trailers by laying them down on the trailer top surface. Glass sheets have been transported in an upright position, secured to shipping racks as seen in U.S. Pat. No. 3,955,676. Sheet supporting racks have been used inside trailers as shown by U.S. Pat. No. 4,273,485 and U.S. Pat. No. 4,527,826. Flat bed trailers of differing configuration for supporting loads have been described in U.S. Pat. Nos. 4,626,017; 4,688,976; and 5,209,540. Although these references describe useful methods of carrying upright loads they do not provide a device for easily loading and unloading building materials constituting heavy loads. Such a device is needed to not only provide easy loading and unloading, but also in employing lighter trailers for carrying such heavy loads within current roadway regulations. SUMMARY OF THE INVENTION The present invention solves the prior art need by providing an apparatus for transporting large building structures such as concrete slabs on lighter weight flat bed trailers. The device permits heavy slabs to be leaned against a pair of A-frames mounted on the flat bed trailer instead of being loaded on a top surface of the flat bed trailer. The A-frames are positioned facing oppositely and uprightly with a downwardly descending side leg on each side of the A-frame. The side legs rest at their ends on an axially mounted beam. The beam is attached to the undercarriage of the trailer chassis and has a portion extending outwardly from the right and left side of the trailer. The portion of each beam extending outwardly is angled upwardly to support a bottom edge of a concrete slab with the upper side surface of the slab resting against a side of the A-frame. BRIEF DESCRIPTION OF THE DRAWINGS The invention can be best understood by those having ordinary skill in the art by reference to the following detailed description when considered in conjunction with the accompanying drawings in which; FIG. 1 is a perspective view of a flat bed trailer with a pair of A-frames mounted thereon according to this invention. FIG. 2 is a perspective view of a concrete slab mounted on the trailer of FIG. 1. FIG. 3 is a partial sectional view of the mounting elements for an A-frame on a trailer. FIG. 4 is an exploded view of the mounting elements shown in FIG. 3. FIG. 5 is an elevational side view of a pair of A-frames mounted on a trailer. FIG. 6 is a perspective view of a first alternate embodiment employing two pair of A-frames mounted on a trailer. FIG. 7 is a perspective view of a second alternate embodiment employing two pair of A-frames mounted on an expanded trailer. DETAILED DESCRIPTION Throughout the following detailed description, the same reference numerals refer to the same elements in all figures. Referring to FIG. 1, a flat bed trailer 10 has a front portion 12 attachable by standard methods with a wheel pin 82 to a truck cab. The trailer has a rear portion 14 and a right 16 and left 18 side portion. A top surface 20 has a width of about seventy-eight inches. Beams 22 and 24 are axially mounted to the undercarriage 26 of the flat bed trailer 10, usually by welding to the undercarriage. Alternatively, the beams can be bolted to the undercarriage 26. A portion of each beam 22 and 24 extends outwardly and upwardly from the right 16 and left 18 side of the trailer 10. Referring to FIG. 3, beam 22 is welded to undercarriage 26. The beam 22 is a two piece construction having a maximum width from end 28 to end 30 of 102 inches. Approximately 24 inches of each end portion of beam 22 projects outwardly and upwardly at an angle of about ten degrees from the respective right 16 and left side 18 of the trailer. A-frame 32 has side legs 48 and 49 resting on outwardly extending portion 40 and 42, respectively of beam 22. Beam 22 has a base component 44 shown in FIG. 4 and a rubber or urethane end pad 46 glued or riveted to the top of outwardly extending portions 40 and 42. Each A-frame, as shown in FIG. 4, has a pair of legs 48 and 49, each leg having an outer wood layer 50 and engaged C-channels 52 and 54. A bottom end 56 of the C-channels 52 and 54 rest on ledge 58 of beam 22. The wood layer 50 rests on the pad 46. Horizontal members 60 and 62, respectively space legs 48 and 49 apart. Strut 64 supports the A-frame with respect to top surface 20 of the trailer. Beam component 44 is welded or bolted to an intermediate beam 66 which in turn is welded or bolted to the undercarriage 26 of trailer 10. In addition, struts 68 and 70 are welded to the trailer undercarriage 26 and beam component 44. As seen in FIG. 6, additional A-frames 72 and 74 can be supported on additional beams 76 and 78 so that additional slabs can be carried on a trailer by distributing the load's center of gravity. As seen in FIG. 7, an expandable trailer 10a can be employed with two or more pair of A-frames, 32, 34, 72 and 74 and supported on beams 22, 24, 76 and 78, respectively. The expandable trailer has a rear portion 14a, a front portion 12a, a top surface 20a and an expandable mid-section 80. The A-frames or channels can be made from aluminum, steel, or other high strength material. The beams are steel as is the chassis of the trailer. The trailer 10 or 10a is attached by a wheel pin 82 to a cab for towing of the flat bed trailer. As shown in FIG. 2, a concrete slab 84, steel sheet or other heavy construction material can be loaded on the extended beam ends 40 or 42 and rested on pads 46. The slab 84 leans against legs 49. Usually the slabs are also strapped in place to prevent movement. This arrangement allows concrete slabs to be easily loaded or unloaded from trailer 10 or 10a. The low center of gravity provided by the beam mounting to the trailer undercarriage 26 allows for heavier loads on lighter trailers and the trailer allowable road width of 102 inches is not exceeded. In addition, tall slabs 84 will not exceed the allowable road height of 13 feet, 6 inches. Other equivalent elements can be substituted for the elements described above to provide substantially the same function in substantially the same way to provide substantially the same result.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to shipping support apparatus mounted on a flat bed trailer. More particularly, it refers to pairs of A-frames mounted on a flat bed trailer for supporting heavy upright loads. Currently, most heavy loads such as concrete slabs are transported on flat bed trailers by laying them down on the trailer top surface. Glass sheets have been transported in an upright position, secured to shipping racks as seen in U.S. Pat. No. 3,955,676. Sheet supporting racks have been used inside trailers as shown by U.S. Pat. No. 4,273,485 and U.S. Pat. No. 4,527,826. Flat bed trailers of differing configuration for supporting loads have been described in U.S. Pat. Nos. 4,626,017; 4,688,976; and 5,209,540. Although these references describe useful methods of carrying upright loads they do not provide a device for easily loading and unloading building materials constituting heavy loads. Such a device is needed to not only provide easy loading and unloading, but also in employing lighter trailers for carrying such heavy loads within current roadway regulations.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention solves the prior art need by providing an apparatus for transporting large building structures such as concrete slabs on lighter weight flat bed trailers. The device permits heavy slabs to be leaned against a pair of A-frames mounted on the flat bed trailer instead of being loaded on a top surface of the flat bed trailer. The A-frames are positioned facing oppositely and uprightly with a downwardly descending side leg on each side of the A-frame. The side legs rest at their ends on an axially mounted beam. The beam is attached to the undercarriage of the trailer chassis and has a portion extending outwardly from the right and left side of the trailer. The portion of each beam extending outwardly is angled upwardly to support a bottom edge of a concrete slab with the upper side surface of the slab resting against a side of the A-frame.
20040312
20050830
20050915
95799.0
1
LYJAK, LORI LYNN
A-FRAME MOUNTED ON A FLAT BED TRAILER
SMALL
0
ACCEPTED
2,004
10,799,790
ACCEPTED
Rotatable drill shoe
A rotatable drilling shoe attachable to a section of casing that allows for drilling and casing of a well bore in a single trip. The drilling shoe includes a fixed section and a rotatable section that has a drillable bit attached thereto. The drilling shoe further includes a mechanism for inhibiting rotation of the rotatable section after the casing is cemented into place so that the drillable bit can be drilled out by a subsequent drilling operation.
1. A drilling shoe configured to be coupled to a casing section, said drilling shoe comprising: a fixed section adapted to be coupled to the casing section; and a rotatable section coupled to the fixed section, said drilling shoe being shiftable between a rotatable configuration and a locked configuration, said rotatable section being rotatable relative to the fixed section when the drilling shoe is in the rotatable configuration, said rotatable section being rotationally fixed relative to the fixed section when the drilling shoe is in the locked configuration. 2. The drilling shoe of claim 1, said drilling shoe being shiftable from the rotatable configuration into the locked configuration by axially shifting the rotatable and fixed sections relative to one another. 3. The drilling shoe of claim 1, said fixed and rotatable sections being telescopically intercoupled. 4. The drilling shoe of claim 1, said fixed section having first and second fixed ends, said rotatable section having first and second rotatable ends, said first fixed end being configured to be coupled to the casing section, said second fixed end and said first rotatable end being coupled to one another. 5. The drilling shoe of claim 4, one of said second fixed end and said first rotatable end presenting a projection, the other of said second fixed end and said first rotatable end presenting a recess, said projection being received in said recess when the drilling shoe is in the locked configuration to thereby prevent relative rotation of the fixed and rotatable sections, said projection being removed from the recess when the drilling shoe is in the rotatable configuration to thereby permit relative rotation of the fixed and rotatable sections. 6. The drilling shoe of claim 4, said rotatable section including a drillable drill bit rigidly coupled to the second rotatable end. 7. The drilling shoe of claim 6, said drill bit including a valve for controlling fluid flow therethrough. 8. The drilling shoe of claim 1, said drilling shoe being biased towards the rotatable configuration. 9. The drilling shoe of claim 1, said drilling shoe comprising a compression spring disposed between at least a portion of the fixed section and at least a portion of the rotatable section and operable to bias the drilling shoe towards the rotatable configuration. 10. The drilling shoe of claim 1, said rotatable section including an internal drive member defining a splined opening. 11. The drilling shoe of claim 1, said fixed section being threadably coupled to the casing section. 12. A drilling apparatus coupled with a section of casing, said drilling apparatus comprising: a drilling shoe selectively rotatable relative to the casing section, said shoe including a drillable bit; and a locking mechanism for preventing rotation of the shoe relative to the casing section so that the bit can be drilled out after the casing section is set. 13. The apparatus of claim 12, said shoe being undetachable from the casing while the casing and the shoe are positioned down hole. 14. The apparatus of claim 12, said shoe comprising a fixed section and a rotatable section, said locking mechanism comprising two sets of interlockable teeth, one of said sets attached to the fixed section and the other of said sets attached to the rotatable section. 15. The apparatus of claim 14, said teeth being unlocked during rotation of the shoe relative to the casing and interlocked during drilling out of the bit after the casing section is set. 16. The apparatus of claim 14, said locking mechanism further including a spring biasing the teeth apart during rotation of the shoe relative to the casing. 17. The apparatus of claim 12, said shoe including a drive section for powered rotation of the shoe relative to the casing. 18. The apparatus of claim 17, said drive section comprising a plurality of splines and a complementary drive shaft configured for releaseable engagement with the splines. 19. The apparatus of claim 18, said apparatus further including a mud motor for powering the drive shaft. 20. The apparatus of claim 12, said drillable bit including first and second valves for controlling the flow of fluid therethrough. 21. A method comprising the steps of: (a) coupling a drilling shoe to an end of a casing section; (b) using the drilling shoe to drill a borehole in a subterranean formation by rotating a rotatable portion of the drilling shoe relative to the casing section; and (c) locking the drilling shoe so that relative rotation of the casing section and the rotatable portion is inhibited. 22. The method of claim 21; and (d) while the drilling shoe is locked, drilling out the drilling shoe to thereby permit fluid flow therethrough. 23. The method of claim 22, said rotatable portion of the drilling shoe including a drill bit, step (b) including using the drill bit to drill the borehole, step (d) including drilling out the drill bit. 24. The method of claim 22; and (e) subsequent to step (b) and prior to step (d), cementing the casing by passing cement downwardly through the casing section and out of the drilling shoe. 25. The method of claim 24, steps (b) and (e) being performed without removing the casing section or the drilling shoe from the borehole. 26. The method of claim 24; and (f) producing fluids from the subterranean formation through the drilling shoe. 27. The method of claim 26, steps (b), (c), (d), (e), and (f) being performed without removing the casing section or the drilling shoe from the borehole. 28. The method of claim 21, said drilling shoe including a non-rotatable portion telescopically intercoupled with the rotatable section, step (c) including axially shifting the rotatable and non-rotatable portions relative to one another. 29. The method of claim 21, step (c) including mechanically locking the rotatable portion of the drilling shoe relative to the casing section. 30. The method of claim 29, said non-rotatable section having first and second fixed ends, said rotatable section having first and second rotatable ends, one of said second fixed end and said first rotatable end presenting a projection, the other of said second fixed end and said first rotatable end presenting a recess, step (c) including inserting the projection into the recess. 31. The method of claim 21, step (b) being performed while simultaneously rotating the casing. 32. A method of drilling and completing a well comprising the steps of: (a) providing an apparatus comprising a section of casing, a drilling shoe, and a locking mechanism, said drilling shoe being coupled to the section of casing, said drilling shoe including a drillable drill bit; (b) rotating said shoe relative to the section of casing to thereby drill a well bore to a desired depth; (c) cementing said section of casing into place; and (d) drilling out at least a portion of said drillable bit by a subsequent drilling operation, said locking mechanism preventing rotation of the shoe relative to the section of casing during step (d). 33. The method of claim 32, said drilling shoe comprising a fixed section that is telescopically intercoupled with a rotatable section, said fixed and rotatable sections being axially shiftable relative to one another. 34. The method of claim 33, said locking mechanism comprising two sets of interlockable teeth, one of said sets attached to the fixed section and the other of said sets attached to the rotatable section. 35. The method of claim 34, said teeth being unlocked during step (b) and interlocked during step (d). 36. The method of claim 34, said locking mechanism further including a spring biasing the teeth apart during step (b). 37. The method of claim 32, said drillable bit including first and second valves for controlling the flow of fluid therethrough. 38. The method of claim 32, step (b) being performed while simultaneously rotating the casing.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates generally to an apparatus allowing for simultaneous drilling and casing of a subterranean well. In a further aspect, the invention relates to a rotatable drill shoe coupled with a section of casing and a method of drilling and completing a subterranean well using the same. 2. Description of the Prior Art Conventional techniques of constructing oil and gas wells, especially deep sea wells, involve drilling a well bore using a string of drill pipe having a drill bit attached to the lower end thereof. As the drill string is advanced into the ground, it encounters different rock formations, some of which may be unstable. In order to minimize problems which may arise in connection with traversing these various formations, the drill bit is run to a desired depth and then the drill string is removed from the well bore. Next, casing is lowered into the well bore and cemented in place. Essentially, the casing acts as a lining within the well bore and prevents collapse of the well bore or loss of drilling fluids into the formations. This conventional technique requires two separate trips in and out of the well bore in order to complete the well, ignoring any subsequent trips for increasing the depth of the well bore which may be required. Each trip into and out of the well bore can require hours or even days depending upon the depths involved and leads to costly nonproductive time. Combining these two trips into one would significantly reduce the time involved in well completion and costs associated therewith. Attempts have been made to drill while running casing. These attempts have generally involved using a drill bit rigidly secured to the casing and then rotating the entire casing string in order to turn the drill bit. There are a number of problems associated with this method, especially in the context of deep sea drilling. In deep sea drilling, the casing has a subsea wellhead installed at the top thereof. Conventional drill string is run through the well head and is carried by the drilling rig. The rotation of the casing in the open water between the drilling rig and the mud line can create large stresses at the interface between the casing and the drill pipe. The rotation of the large casing used in deep sea wells in a relatively high water current may also cause vibrations or high excursions from the well center. Furthermore, when landing casing with a high pressure subsea wellhead installed into a low pressure wellhead, rotation may damage one or both wellheads. OBJECTS AND SUMMARY OF THE INVENTION It is, therefore, an object of the present invention to provide an apparatus and method of drilling and completing a well in a single trip, with or without rotation of the casing. One aspect of the present invention concerns a drilling shoe configured to be coupled to a casing section. The drilling shoe comprises a fixed section adapted to be coupled to the casing section, and a rotatable section coupled to the fixed section. The drilling shoe is shiftable between a rotatable configuration and a locked configuration. The rotatable section is rotatable relative to the fixed section when the drilling shoe is in the rotatable configuration. The rotatable section is rotationally fixed relative to the fixed section when the drilling shoe is in the locked configuration. Another aspect of the invention concerns a drilling apparatus coupled with a section of casing. The drilling apparatus comprises a drilling shoe that is selectively rotatable relative to the casing section and includes a drillable bit. The drilling shoe further includes a locking mechanism for preventing rotation of the shoe relative to the casing section so that the bit can be drilled out after the casing section is set. Yet another aspect of the invention concerns a method comprising the steps of: (a) coupling a drilling shoe to an end of a casing section; (b) using the drilling shoe to drill a borehole in a subterranean formation by rotating a rotatable portion of the drilling shoe relative to the casing section; and (c) locking the drilling shoe so that relative rotation of the casing section and the rotatable portion is inhibited. Still another aspect of the invention concerns a method of drilling and completing a well. The method comprises the steps of: (a) providing an apparatus comprising a section of casing, a drilling shoe, and a locking mechanism, with the drilling shoe being coupled to the section of casing and the drilling shoe including a drillable drill bit; (b) rotating the shoe relative to the section of casing to thereby drill a well bore to a desired depth; (c) cementing the casing section into place; and (d) drilling out at least a portion of the drillable bit by a subsequent drilling operation. The locking mechanism prevents rotation of the shoe relative to the section of casing during step (d). Other aspects and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments and the accompanying drawing figures. BRIEF DESCRIPTION OF THE DRAWING FIGURES Preferred embodiments of the present invention are described in detail below with reference to the attached drawing figures, wherein: FIG. 1 is a side view of a drilling shoe apparatus coupled with a section of casing with portions of the drilling shoe being shown in cross-sectional view; FIG. 2 is an isometric, exploded view of a drilling shoe apparatus without the drillable bit attached thereto; FIG. 3 is a cross-sectional view of a drilling shoe apparatus coupled with a casing section showing drilling in a subterranean formation; FIG. 4 is a cross-sectional view of a drilling shoe apparatus coupled with a casing section showing cementing of the casing section into place; FIG. 5 is a cross-sectional view of a drilling shoe apparatus coupled with a section of casing showing the commencement of a subsequent drilling operation to drill out a portion of the drilling shoe; FIG. 6 is a close-up cross-sectional view of a portion of the drilling shoe apparatus of FIG. 5 showing the locking of the shoe to prevent rotation of the shoe relative to the casing section during the drill out operation; and FIG. 7 is a cross-sectional view of a drilling shoe apparatus coupled with a section of casing, the drilling shoe being completely penetrated and subsequent drilling operations continuing into the underlying subterranean formation. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Turning first to FIG. 1, a drilling shoe apparatus 10 attached to a section of casing 12 is shown. The same drilling shoe 10 is shown disassembled in FIG. 2. Drilling shoe 10 comprises a fixed section 14 having first and second fixed ends 16, 18 and a rotatable section 20 having first and second rotatable ends 22, 24. Fixed section 14 is telescopically intercoupled with rotatable section 20, that is, fixed section 14 is slidably received within rotatable section 20 so as to allow axial shifting of sections 14 and 20 relative to each other. First fixed end 16 is threadably coupled with casing section 12 (threading not shown) so as to prevent any rotation of fixed section 14 relative to casing section 12. In order to provide easier assembly of drilling shoe 10, fixed section 14 comprises two portions 14a, 14b which are preferably welded together at seam 25. If another type of connection other than a weld seam is desired, portions 14a and 14b may be threadably coupled, preferably using a left-handed threading arrangement to prevent the connection from becoming loosened during operation of drilling shoe 10. Rotatable section 20 also comprises two portions, 20a and 20b for ease of assembly. Portions 20a and 20b each comprise complementary threading 27 for coupling the portions together. Threading 27 is preferably of a left-handed arrangement to prevent the backing off of portion 20b from portion 20a during operation of drilling shoe 10. Drilling shoe 10 further comprises a locking mechanism 26 which includes two sets of interlockable projections or teeth 28, 30 and a spring 32, preferably a compression spring 32. Teeth 28 are attached to fixed section 14 and teeth 30 are attached to rotatable section 20. A plurality of recesses 31 are provided between teeth 28 on both fixed section 14, and a plurality of recesses 33 are provided between teeth 30 on rotatable section 20. Drilling shoe 10 is shiftable between a rotatable configuration (shown in FIG. 1) wherein teeth 28, 30 are spaced apart and a locked configuration (shown in FIG. 6) wherein teeth 28, 30 are interlocked. In the locked configuration, teeth 28, 30 are received in recesses 31, 33 to prevent relative rotation of fixed section 14 and rotatable section 20. Essentially, in the locked configuration, teeth 28, 30 are interlocked. Teeth 28, 30 are removed from recesses 31, 33 when drilling shoe 10 is in the rotatable configuration to thereby permit relative rotation of fixed section 14 and rotatable section 20. In shifting between locked and rotatable configurations, rotatable section 20 is axially shifted relative to fixed section 14. Spring 32 is disposed between at least a portion of rotatable section 20 and at least a portion of fixed section 14 and normally biases drilling shoe 10 toward the rotatable configuration. Drillable bit 34 is rigidly coupled (preferably welded) with second rotatable end 24 and presents a diameter that is greater than the widest diameter presented by drilling shoe 10 and casing section 12. As used here, “drillable bit” means that the bit is primarily constructed from a material that allows a second drill bit to drill through it. Suitable materials for constructing the drillable bit include cast aluminum, copper, mild steel, or brass alloy; however, any suitable soft material adapted to be drilled through with a standard earth drill bit may be used. By forming the drillable bit from a relatively soft material, the life of the second drill bit utilized to drill through the drillable bit is extended so as to improve drilling performance with the second drill bit. Bit 34 comprises a plurality of valves formed therein for controlling fluid flow through the bit. Float valves 36, 38, and 40 are representative of these valves and allow for unidirectional flow of drilling fluid or cement through bit 34 during drilling and cementing operations, respectively. Drilling shoe 10 also contains a drive section 42 which can be attached to a power source in order to facilitate powered rotation of rotatable section 20 relative to casing section 12. While any means known in the art for attaching a power source to drive section 42 may be used, the present embodiment employs a plurality of splines 44 which define a passage way through drive section 42 and into which the power source is received. Preferably, splines 44 are formed of an easily drilled material. FIG. 2 is an exploded view of drilling shoe 10 so that assembly thereof may be demonstrated. Bit 34 has been omitted for ease of illustration. Spring 32 is placed over the outside of fixed section portion 14b. Portion 14b is then fitted with portion 20a of rotatable section 20. Next, portions 14a and 14b of fixed section 14 are welded together to form weld seam 25. Finally rotatable section portion 20b is coupled with portion 20a via threads 27. FIGS. 3-7 depict the use of drilling shoe 10 in the process of drilling, casing, and completing a subterranean well. Beginning with FIG. 3, drilling shoe 10 is attached to a casing section 12 and is in the process of drilling a bore hole in a subterranean formation 46. For purposes of the present description, the operation of drilling shoe 10 is made in the context of a deep sea oil or gas well. However, nothing in this description should be taken as limiting the operating scope of the present invention to only deep sea wells. Drilling shoe 10 is undetachable from casing section 12 while shoe 10 and casing section 12 are positioned down hole in the well. As used herein, “undetachable” means that the shoe and casing are not capable of being separated without substantially damaging either the casing, the shoe, or both. Unless the entire string of casing 12 is removed from the well bore, drilling shoe 10 cannot be retrieved. Therefore, all drilling, cementing, and any subsequent drilling operations are performed without removing casing section 12 or drilling shoe 10 from the borehole. A mud motor 48 is employed as the power source for drive section 42 and is attached to pipe string 50 which is run through casing 12. Mud motor 48 includes a drive shaft 49 that is complementary to and is releasably engaged with splines 44. Drilling fluid is circulated down pipe string 50, through mud motor 48, and exits bit 34 through float valve 40. The drilling fluid powers mud motor 48 which turns drive section 42 and causes bit 34 to rotate relative to casing section 12. Casing section 12 may remain substantially stationary with respect to formation 46 while bit 34 rotates or casing section 12 may be rotated simultaneously with rotation of bit 34. However, even if casing section 12 is rotated, bit 34 continues to rotate relative to the rotating casing section 12 because bit 34 is separately powered by mud motor 48. The weight of casing section 12 maintains bit 34 in contact with formation 46 and seats second fixed end 18 against a bearing 54 and seal 56. Most importantly, the seating of end 18 along with the biasing action of spring 32 results in the separation of teeth 28, 30 thereby enabling rotation of rotatable section 20 relative to fixed section 14. The back pressure of drilling fluid seats the floats of valves 36,38 to prevent flow of drilling fluid through the annulus of casing section 12. Instead, drilling fluid 52 (carrying particulate matter generated as a result of the drilling operation) is forced through the annulus created between formation 46 and casing section 12 and back up toward the surface or seabed. Drilling continues until the desired depth has been reached. Once the desired depth is reached, casing section 12 is cemented into place as shown in FIG. 4. The flow of drilling fluid down string 50 is stopped and cement is pumped down into the well through string 50. At the same time, a bypass valve 58 is opened and cement 60 flows into the annulus of casing section 12, down through bit 34, and out float valves 36, 38 and into the annulus created between formation 46 and casing 12. Float valve 40 closes to prevent the back flow of cement into string 50. Casing 12 remains filled with sea water 62 above the level of bypass valve 58. Mud motor 48 can remain in drive section 42 during the cementing process or it can be picked up off the bottom. In either case some pack-off method inside casing section 12 will be required. The pack-off is normally incorporated in a standard subsea casing hanger running tool. Second fixed end 18 remains seated against bearing 54 and seal 56. This, along with the action of spring 32 keep teeth 28, 30 separated during the cementing process. After casing section 12 is cemented in place, string 50 is removed from the annulus of casing section 12 and a drill string 64, having a conventional drill bit 66 attached thereto, is run down hole as shown in FIG. 5. Bit 66 contacts splines 44 of drive section 42 and exerts a force on splines 44 causing rotatable section 20 to axially shift downward thereby unseating second fixed end 18 from bearing 54 and seal 56. More importantly, teeth 28, 30 interlock so as to prevent rotation of rotatable section 20 relative to casing section 12. In order to continue drilling operations within the well, splines 44 and drillable bit 34 must be drilled out as shoe 10 cannot be retrieved from the well bore. The drilling out of these parts requires that rotatable section 20 refrains from rotation relative to drill string 64 and be mechanically locked relative to casing section 12. As used herein, “mechanically locked” means that movement of an otherwise moveable portion of an apparatus, such as rotatable section 20, is physically prevented due to the presence of an impeding body, such as fixed section 14. Therefore, it is essential that rotatable section 20 be axially shifted to a locked configuration with teeth 28,30 engaged to prevent rotation of section 20. Bit 66 is now ready to drill out splines 44 and drillable bit 34. In certain instances, especially when the clearance beneath bit 34 is insufficient to allow axial shifting of rotatable section 20 and teeth 28, 30 to interlock, rotatable section 20 may initially rotate along with bit 66 during the drilling out step. In such case, drillable bit 34 will drill out underneath itself until teeth 28, 30 engage and lock section 20. Splines 44, drillable bit 34, and valves 36, 38, 40 are then drilled out by bit 66. Fluids may now be produced from subterranean formation 46 through drilling shoe 10. FIG. 6 is a close-up view of locking mechanism 26 in the same configuration shown in FIG. 5. FIG. 6 clearly shows the compression of spring 32 resulting from the axial shifting of rotatable section 20 and that teeth 28, 30 are interlocked. Therefore, rotation of section 20 relative to fixed section 14 is prevented, and bit 66 can drill out splines 44 and drillable bit 34. Finally, FIG. 7 shows that bit 66 has completely drilled through drillable bit 34 and continues to drill into formation 46. The preferred forms of the invention described above are to be used as illustration only, and should not be used in a limiting sense to interpret the scope of the present invention. Obvious modifications to the exemplary embodiments, set forth above, could be readily made by those skilled in the art without departing from the spirit of the present invention. The inventors hereby state their intent to rely on the Doctrine of Equivalents to determine and assess the reasonably fair scope of the present invention as it pertains to any apparatus not materially departing from but outside the literal scope of the invention as set forth in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates generally to an apparatus allowing for simultaneous drilling and casing of a subterranean well. In a further aspect, the invention relates to a rotatable drill shoe coupled with a section of casing and a method of drilling and completing a subterranean well using the same. 2. Description of the Prior Art Conventional techniques of constructing oil and gas wells, especially deep sea wells, involve drilling a well bore using a string of drill pipe having a drill bit attached to the lower end thereof. As the drill string is advanced into the ground, it encounters different rock formations, some of which may be unstable. In order to minimize problems which may arise in connection with traversing these various formations, the drill bit is run to a desired depth and then the drill string is removed from the well bore. Next, casing is lowered into the well bore and cemented in place. Essentially, the casing acts as a lining within the well bore and prevents collapse of the well bore or loss of drilling fluids into the formations. This conventional technique requires two separate trips in and out of the well bore in order to complete the well, ignoring any subsequent trips for increasing the depth of the well bore which may be required. Each trip into and out of the well bore can require hours or even days depending upon the depths involved and leads to costly nonproductive time. Combining these two trips into one would significantly reduce the time involved in well completion and costs associated therewith. Attempts have been made to drill while running casing. These attempts have generally involved using a drill bit rigidly secured to the casing and then rotating the entire casing string in order to turn the drill bit. There are a number of problems associated with this method, especially in the context of deep sea drilling. In deep sea drilling, the casing has a subsea wellhead installed at the top thereof. Conventional drill string is run through the well head and is carried by the drilling rig. The rotation of the casing in the open water between the drilling rig and the mud line can create large stresses at the interface between the casing and the drill pipe. The rotation of the large casing used in deep sea wells in a relatively high water current may also cause vibrations or high excursions from the well center. Furthermore, when landing casing with a high pressure subsea wellhead installed into a low pressure wellhead, rotation may damage one or both wellheads.
<SOH> OBJECTS AND SUMMARY OF THE INVENTION <EOH>It is, therefore, an object of the present invention to provide an apparatus and method of drilling and completing a well in a single trip, with or without rotation of the casing. One aspect of the present invention concerns a drilling shoe configured to be coupled to a casing section. The drilling shoe comprises a fixed section adapted to be coupled to the casing section, and a rotatable section coupled to the fixed section. The drilling shoe is shiftable between a rotatable configuration and a locked configuration. The rotatable section is rotatable relative to the fixed section when the drilling shoe is in the rotatable configuration. The rotatable section is rotationally fixed relative to the fixed section when the drilling shoe is in the locked configuration. Another aspect of the invention concerns a drilling apparatus coupled with a section of casing. The drilling apparatus comprises a drilling shoe that is selectively rotatable relative to the casing section and includes a drillable bit. The drilling shoe further includes a locking mechanism for preventing rotation of the shoe relative to the casing section so that the bit can be drilled out after the casing section is set. Yet another aspect of the invention concerns a method comprising the steps of: (a) coupling a drilling shoe to an end of a casing section; (b) using the drilling shoe to drill a borehole in a subterranean formation by rotating a rotatable portion of the drilling shoe relative to the casing section; and (c) locking the drilling shoe so that relative rotation of the casing section and the rotatable portion is inhibited. Still another aspect of the invention concerns a method of drilling and completing a well. The method comprises the steps of: (a) providing an apparatus comprising a section of casing, a drilling shoe, and a locking mechanism, with the drilling shoe being coupled to the section of casing and the drilling shoe including a drillable drill bit; (b) rotating the shoe relative to the section of casing to thereby drill a well bore to a desired depth; (c) cementing the casing section into place; and (d) drilling out at least a portion of the drillable bit by a subsequent drilling operation. The locking mechanism prevents rotation of the shoe relative to the section of casing during step (d). Other aspects and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments and the accompanying drawing figures.
20040312
20071002
20050915
73786.0
0
BOMAR, THOMAS S
ROTATABLE DRILL SHOE
UNDISCOUNTED
0
ACCEPTED
2,004
10,799,833
ACCEPTED
Tile sponge washing and conditioning apparatus
A tile sponge washing and conditioning apparatus is disclosed for washing in water a sponge used during a ceramic tile laying operation. The apparatus includes a frame for disposition thereof within the water. The frame includes a first wall and a second wall which is disposed spaced from the first wall. A first roller has an axis of rotation which extends through the walls and a second roller has a rotational axis which also extends through the walls. The rollers cooperate with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned. The arrangement is such that when the rollers are counter rotated relative to each other, the sponge is squeezed and driven through the passageway so that the sponge is washed and conditioned by the water during passage of the sponge through the passageway.
1. A tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation, said apparatus comprising: a frame for disposition thereof within the water, said frame including: a first wall; a second wall disposed spaced from said first wall; a first roller having an axis of rotation which extends through said walls; a second roller having a rotational axis which extends through said walls; and said rollers cooperating with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned such that when said rollers are counter rotated relative to each other, the sponge is squeezed and driven through said passageway so that the sponge is washed and conditioned by the water during passage of the sponge through said passageway. 2. A tile sponge washing and conditioning apparatus as set forth in claim 1 wherein said frame is fabricated from stainless steel. 3. A tile sponge washing and conditioning apparatus as set forth in claim 1 wherein said first wall is of planar configuration said first wall having a first and a second edge, a top and a bottom edge and an inner and an outer surface; said second wall is of planar configuration said second wall having a first and a second side, a top and a bottom end and an inner and an outer face, said second wall being disposed parallel relative to said first wall. 4. A tile sponge washing and conditioning apparatus as set forth in claim 2 wherein said first wall includes: a first ear which extends from said first edge; a second ear which extends from said second edge; said second wall includes: a first extension which extends from said first side; a second extension which extends from said second side. 5. A tile sponge washing and conditioning apparatus as set forth in claim 4 further including: a container for containing the water, said container defining a rim for supporting said ears and said extensions such that when said ears and extensions are being supported by said rim, said rollers are disposed within the water contained within said container. 6. A tile sponge washing and conditioning apparatus as set forth in claim 5 wherein said frame includes: a first reinforcing member which extends between said first ear and said first extension; a second reinforcing member which extends between said second ear and said second extension such that said reinforcing members maintain said first and second walls in a spaced parallel disposition relative to each other. 7. A tile sponge washing and conditioning apparatus as set forth in claim 1 wherein said first roller includes: a hub disposed coaxially relative to said axis of rotation, said hub extending through said walls such that said walls bearingly support said hub for rotation of said hub relative to said walls, said hub having a first and a second end; a first collar defining a peripheral edge, said first collar being secured. to said first end of said hub for rotation with said hub; a second collar defining a further peripheral edge, said second collar being secured to said second end of said hub for rotation with said hub, said collars being disposed between said walls; a plurality of sponge engaging members extending between said collars, said sponge engaging members being spaced relative to each other along and adjacent to said peripheral edges of said collars such that when said first roller rotates, said sponge engaging members squeeze and condition the sponge; said second roller includes: an axle disposed coaxially relative to said rotational axis, said axle extending through said walls such that said walls bearingly support said axle for rotation of said axle relative to said walls, said axle having a first and a second extremity; a first flange defining a periphery, said first flange being secured to said first extremity of said axle for rotation with said axle; a second flange defining a further periphery, said second flange being secured to said second extremity of said axle for rotation with said axle, said flanges being disposed between said walls; a plurality of sponge squeezing members extending between said flanges, said sponge squeezing members being spaced relative to each other along and adjacent to said peripheries of said flanges such that when said second roller rotates, said sponge squeezing members squeeze and condition the sponge; said sponge engaging members and said sponge squeezing members cooperating together to drive the sponge through said passageway while alternately compressing and releasing the sponge for condition the sponge. 8. A tile sponge washing and conditioning apparatus as set forth in claim 1 further including: a plurality of pairs of counter rotating rollers rotatably supported between said walls for further defining said passageway so that as the sponge progressively is driven from a pair of said rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned. 9. A tile sponge washing and conditioning apparatus as set forth in claim 1 further including: a gear wheel secured to said first roller; a further gear wheel secured to said second roller; a drive connected to said gear wheels for driving said gear wheels in opposite rotational directions relative to each other so that the sponge is driven through said passageway. 10. A tile sponge washing and conditioning apparatus as set forth in claim 1 further including: a plurality of pairs of counter rotating rollers rotatably supported between said walls for further defining said passageway so that as the sponge progressively is driven from a pair of said rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned; a gear wheel secured to said first roller; a further gear wheel secured to said second roller; a drive connected to said gear wheels for driving said gear wheels in opposite rotational directions relative to each other so that the sponge is driven through said passageway; a geared wheel secured to each roller respectively of said pairs of rollers so that each of said geared wheels is connected to said drive such that said rollers of each pair are counter rotated relative to each other so that said rollers progressively drive the sponge through said passageway for washing and conditioning the sponge in the water. 11. A tile sponge washing and conditioning apparatus as set forth in claim 9 wherein said drive includes: a manual crank for rotating said first and second rollers. 12. A tile sponge washing and conditioning apparatus as set forth in claim 10 wherein said drive includes: a manual crank for rotating said first and second rollers and said pairs of rollers. 13. A tile sponge washing and conditioning apparatus as set forth in claim 9 wherein said drive includes: a motor for rotating said first and second rollers. 14. A tile sponge washing and conditioning apparatus as set forth in claim 10 wherein said drive includes: a motor for rotating said first and second rollers and said pairs of rollers. 15. A tile sponge washing and conditioning apparatus as set forth in claim 10 wherein each of said gear wheels and each of said geared wheels is intermeshed with an adjacent wheel. 16. A tile sponge washing and conditioning apparatus as set forth in claim 1 wherein said passageway has a first and a second end, the sponge being placed adjacent to said first end of said passageway and the cleaned and conditioned sponge exiting from said apparatus adjacent said second end of said passageway. 17. A tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation, said apparatus comprising: a frame for disposition thereof within the water, said frame including: a first wall; a second wall disposed spaced from said first wall; a first roller having an axis of rotation which extends through said walls; a second roller having a rotational axis which extends through said walls; said rollers cooperating with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned such that when said rollers are counter rotated relative to each other, the sponge is squeezed and driven through said passageway so that the sponge is washed and conditioned by the water during passage of the sponge through said passageway; and a plurality of pairs of counter rotating rollers rotatably supported between said walls for further defining said passageway so that as the sponge progressively is driven from a pair of said rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned. 18. A tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation, said apparatus comprising: a frame for disposition thereof within the water, said frame including: a first wall; a second wall disposed spaced from said first wall; a first roller having an axis of rotation which extends through said walls; a second roller having a rotational axis which extends through said walls; said rollers cooperating with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned such that when said rollers are counter rotated relative to each other, the sponge is squeezed and driven through said passageway so that the sponge is washed and conditioned by the water during passage of the sponge through said passageway; said frame is fabricated from stainless steel; said first wall is of planar configuration said first wall having a first and a second edge, a top and a bottom edge and an inner and an outer surface; said second wall is of planar configuration said second wall having a first and a second side, a top and a bottom end and an inner and an outer face, said second wall being disposed parallel relative to said first wall; said first wall including: a first ear which extends from said first edge; a second ear which extends from said second edge; said second wall includes: a first extension which extends from said first side; a second extension which extends from said second side; a container for containing the water, said container defining a rim for supporting said ears and said extensions such that when said ears and extensions are being supported by said rim, said rollers are disposed within the water contained within said container; said frame including: a first reinforcing member which extends between said first ear and said first extension; a second reinforcing member which extends between said second ear and said second extension such that said reinforcing members maintain said first and second walls in a spaced parallel disposition relative to each other; said first roller including: a hub disposed coaxially relative to said axis of rotation, said hub extending through said walls such that said walls bearingly support said hub for rotation of said hub relative to said walls, said hub having a first and a second end; a first collar defining a peripheral edge, said first collar being secured to said first end of said hub for rotation with said hub; a second collar defining a further peripheral edge, said second collar being secured to said second end of said hub for rotation with said hub, said collars being disposed between said walls; a plurality of sponge engaging members extending between said collars, said sponge engaging members being spaced relative to each other along and adjacent to said peripheral edges of said collars such that when said first roller rotates, said sponge engaging members squeeze and condition the sponge; said second roller including: an axle disposed coaxially relative to said rotational axis, said axle extending through said walls such that said walls bearingly support said axle for rotation of said axle relative to said walls, said axle having a first and a second extremity; a first flange defining a periphery, said first flange being secured to said first extremity of said axle for rotation with said axle; a second flange defining a further periphery, said second flange being secured to said second extremity of said axle for rotation with said axle, said flanges being disposed between said walls; a plurality of sponge squeezing members extending between said flanges, said sponge squeezing members being spaced relative to each other along and adjacent to said peripheries of said flanges such that when said second roller rotates, said sponge squeezing members squeeze and condition the sponge; said sponge engaging members and said sponge squeezing members cooperating together to drive the sponge through said passageway while alternately compressing and releasing the sponge for condition the sponge; a plurality of pairs of counter rotating rollers rotatably supported between said walls for further defining said passageway so that as the sponge progressively is driven from a pair of said rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned; a gear wheel secured to said first roller; a further gear wheel secured to said second roller; a drive connected to said gear wheels for driving said gear wheels in opposite rotational directions relative to each other so that the sponge is driven through said passageway; a plurality of pairs of counter rotating rollers rotatably supported between said walls for further defining said passageway so that as the sponge progressively is driven from a pair of said rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned; a gear wheel secured to said first roller; a further gear wheel secured to said second roller; a drive connected to said gear wheels for driving said gear wheels in opposite rotational directions relative to each other so that the sponge is driven through said passageway; a geared wheel secured to each roller respectively of said pairs of rollers so that each of said geared wheels are connected to said drive such that said rollers of each pair are counter rotated relative to each other so that said rollers progressively drive the sponge through said passageway for washing and conditioning the sponge in the water; said drive including: a motor for rotating said first and second rollers and said pairs of rollers; each of said gear wheels and each of said geared wheels being intermeshed with an adjacent wheel; and said passageway having a first and a second end, the sponge being placed adjacent to said first end of said passageway and the cleaned and conditioned sponge exiting from said apparatus adjacent said second end of said passageway.
FIELD OF THE INVENTION 1. Background of the Invention The present invention relates to a tile sponge washing and conditioning apparatus. More specifically, the present invention relates to a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation. 2. Background Information A tile laying operation includes laying the tiles onto a layer of adhesive. When the adhesive has set, a grouting compound is applied to the tiles for filling the spaces between adjacent tiles. Excess grout must be removed from the tiles before the grout hardens. In order to remove such excess grout, a dampened sponge is applied to the surface of the tile and wiped across the upper surface of the tile for removing the excess grout from the tiles. The initial process of removing excess grout entails the removal of a considerable amount of grout. Therefore, it is essential that the sponge be frequently immersed into clean water to wash away such excess grout from the sponge. Typically, the sponge is submerged in a bowl of water and is hand squeezed in order to release the grout on the sponge into the bowl of water. The aforementioned process is time consuming because it is essential that the sponge be frequently cleaned in order to progressively remove the excess grout from the tiles. Also, because the grout ha s a damaging effect on the skin, the tiler should wear protective gloves when washing and conditioning the sponge in the bowl of water. The apparatus according to the present invention overcomes the aforementioned problems by the provision of an apparatus which is at least partially immersed in a container of water. In operation of the apparatus, a sponge to be cleaned and conditioned is inserted between counter rotating rollers which feed the sponge through the water in the container and progressively squeeze and release the sponge so that the excess grout is removed from the sponge into the water as the sponge progresses through the apparatus. When the. sponge emerges from the apparatus, the sponge has been thoroughly washed and conditioned and is ready for further use on the surface of the tiles for removing further excess grout therefrom. Also, while one sponge is being washed by the apparatus of the present invention, another sponge previously washed and conditioned is used in the removal of excess grout so that no time is wasted waiting for a sponge to be cleaned. The apparatus according to the present invention cuts down on the time needed to complete a tiling project. Also, the apparatus protects a tiler's hands from the damage caused by immersing the tiler's hands in a bowl of sponge washing water. Therefore, a primary feature of the present invention is the provision of a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation that overcomes the problems associated with the prior art arrangements. Another feature of the present invention is the provision of a tile sponge washing and conditioning apparatus that reduces the time required to complete a tiling project. A further feature of the present invention is the provision of a tile sponge washing and conditioning apparatus that protect the tiler's hands from the damage caused by immersion of a tiler's hands in a bowl of water used to wash grout away from a sponge. Other features and advantages of the present invention will be readily apparent to those skilled in the art by a consideration of the detailed description of a preferred embodiment of the present invention contained herein. SUMMARY OF THE INVENTION The present invention relates to a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation. The apparatus includes a frame for disposition thereof within the water. The frame includes a first wall and a second wall which is disposed spaced from the first wall. A first roller has an axis of rotation which extends through the walls and a second roller has a rotational axis which also extends through the walls. The rollers cooperate with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned The arrangement is such that when the rollers are counter rotated relative to each other, the sponge is squeezed and driven through the passageway so that the sponge is washed and conditioned by the water during passage of the sponge through the passageway. In a more specific embodiment of the present invention, the frame is fabricated from stainless steel. Also, the first wall is of planar configuration, the first wall having a first and a second edge, a top and a bottom edge and an inner and an outer surface; Furthermore, the second wall is also of planar configuration, the second wall having a first and a second side, a top and a bottom end and an inner and an outer face, the second wall being disposed parallel relative to the first wall. More specifically, the first wall includes a first ear which extends from the first edge. Also, a second ear extends from the second edge. The second wall includes a first extension which extends from the first side and a second extension which extends from the second side. Moreover, a container is provided for containing the water. The container defines a rim for supporting the ears and the extensions such that when the ears and extensions are being supported by the rim, the rollers are disposed within the water contained within the container. Additionally, the frame includes a first reinforcing member which extends between the first ear and the first extension. A second reinforcing member extends between the second ear and the second extension such that the reinforcing members maintain the first and second walls in a spaced parallel disposition relative to each other. The first roller includes a hub which is disposed coaxially relative to the axis of rotation. The hub extends through the walls such that the walls bearingly support the hub for rotation of the hub relative to the walls. Also, the hub has a first and a second end. More particularly, a first collar defines a peripheral edge, the first collar being secured to the first end of the hub for rotation with the hub. Also, a second collar defines a further peripheral edge, the second collar being secured to the second end of the hub for rotation with the hub. Moreover, the collars are disposed between the walls. A plurality of sponge engaging members extend between the collars. The sponge engaging members are spaced relative to each other along and adjacent to the peripheral edges of the collars. The arrangement is such that when the first roller rotates, the sponge engaging members squeeze and condition the sponge. Additionally, the second roller includes an axle which is disposed coaxially relative to the rotational axis. The axle extends through the walls such that the walls bearingly support the axle for rotation of the axle relative to the walls. Also, the axle has a first and a second extremity. A first flange defines a periphery, the first flange being secured to the first extremity of the axle for rotation with the axle. Additionally, a second flange defines a further periphery, the second flange being secured to the second extremity of the axle for rotation with the axle. Also, the flanges are disposed between the walls. Furthermore, a plurality of sponge squeezing members extend between the flanges. The sponge squeezing members are spaced relative to each other along and adjacent to the peripheries of the flanges. The arrangement is structured such that when the second roller rotates, the sponge squeezing members squeeze and condition the sponge. The sponge engaging members and the sponge squeezing members cooperate together to drive the sponge through the passageway while alternately compressing and releasing the sponge for condition the sponge. Also, a plurality of pairs of counter rotating rollers are rotatably supported between the walls for further defining the passageway. The pairs of rollers are positioned so that as the sponge progressively is driven from a pair of the rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned. Additionally, a gear wheel is secured to the first roller and a further gear wheel is secured to the second roller. A drive is connected to the gear wheels for driving the gear wheels in opposite rotational directions relative to each other so that the sponge is driven through the passageway. Moreover, a geared wheel is secured to each roller respectively of the pairs of rollers so that each of the geared wheels are connected to the drive so that the rollers of each pair are counter rotated relative to each other so that the rollers progressively drive the sponge through the passageway for washing and conditioning the sponge in the water. More particularly, the drive includes a manual crank for rotating the first and second rollers. More specifically, the manual crank is provided for rotating the first and second rollers and the pairs of rollers. In another embodiment of the present invention, the drive includes a motor for rotating the first and second rollers. The drive also includes a motor for rotating the first and second rollers and the pairs of rollers. Additionally, each of the gear wheels and each of the geared wheels is intermeshed with an adjacent gear or geared wheel. Furthermore, the passageway has a first and a second end, the sponge being placed adjacent to the first end of the passageway. Also, the cleaned and conditioned sponge exits from the apparatus adjacent the second end of the passageway. Many modifications and variations of the present invention will be readily apparent to those skilled in the art by a consideration of the detailed description contained hereinafter taken in conjunction with the annexed drawings which show a preferred embodiment of the present invention. However, such modifications and variations fall within the spirit and scope of the present invention as defined by the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a side elevational view of a tile sponge washing and conditioning apparatus according to the present invention for washing in water a sponge used during a ceramic tile laying operation; FIG. 2 is a view taken on the line 2-2 of FIG. 1; FIG. 3 is a view taken on the line 3-3 of FIG. 2; and FIG. 4 is a similar view to that shown in FIG. 3 but shows an alternative embodiment of the present invention. Similar reference characters refer to similar parts throughout the various views of the drawings. DETAILED DESCRIPTION OF THE DRAWINGS FIG. 1 is a side elevational view of a tile sponge washing and conditioning apparatus generally designated 10 according to the present invention for washing in water 12 a sponge 14 used during a ceramic tile laying operation. As shown in FIG. 1, the apparatus 10 includes a frame generally designated 16 for disposition thereof within the water 12. The frame 16 includes a first wall 18. FIG. 2 is a view taken on the line 2-2 of FIG. 1. As shown in FIG. 2, the frame 16 includes a second wall 20 which is disposed spaced from the first wall 18. A first roller generally designated 22 has an axis of rotation 24 which extends through the walls 18 and 20 respectively and a second roller generally designated 26 has a rotational axis 28 which also extends through the walls 18 and 20 respectively. As shown in FIG. 1, the rollers 22 and 26 cooperate with each other to define therebetween a pathway indicated by the arrow P for the passage therethrough of the sponge 14 to be washed and conditioned. The arrangement is such that when the rollers 22 and 26 are counter rotated relative to each other as indicated by the arrows 30 and 32 respectively, the sponge 14 is squeezed and driven through the passageway P so that the sponge 14 is washed and conditioned by the water 12 during passage of the sponge 14 through the passageway P. In a more specific embodiment of the present invention, the frame 16 is fabricated from stainless steel. Also, as shown in FIG. 1, the first wall 18 is of planar configuration, the first wall 18 having a first and a second edge 34 and 36 respectively, a top and a bottom edge 38 and 40 respectively. As shown in FIG. 2, the wall 18 also has an inner and an outer surface 42 and 44 respectively. FIG. 3 is a view taken on the line 3-3 of FIG. 2. As shown in FIG. 3, the second wall 20 is of planar configuration, the second wall 20 having a first and a second side 46 and 48 respectively and a top and a bottom end 50 and 52 respectively. As shown in FIG. 2, the second wall 20 has an inner and an outer face 54 and 56 respectively, the second wall 20 being disposed parallel relative to the first wall 18. More specifically, as shown in FIG. 1, the first wall 18 includes a first ear 58 which extends from the first edge 34. Also, a second ear 60 extends from the second edge 36. As shown in FIG. 3, the second wall 20 includes a first extension 62 which extends from the first side 46 and a second extension 64 which extends from the second side 48. As shown in FIG. 1, a container 66 is provided for containing the water 12. The container 66 defines a rim 68 for supporting the ears 58 and 60 respectively and the extensions 62 and 64 respectively such that when the ears 58 and 60 and extensions 62 and 64 are being supported by the rim 68, the rollers 22 and 26 respectively are disposed within the water 12 contained within the container 66. Additionally, as shown in FIG. 2, the frame 16 includes a first reinforcing member 70 which extends between the first ear 58 and the first extension 62. As shown in FIG. 1, a second reinforcing member 72 extends between the second ear 60 and the second extension 64 such that the reinforcing members 70 and 72 respectively maintain the first and second walls 18 and 20 in a spaced parallel disposition relative to each other. As shown in FIG. 2, the first roller 22 includes a hub 74 which is disposed coaxially relative to the axis of rotation 24. The hub 74 extends through the walls 18 and 20 respectively such that the walls 18 and 20 respectively bearingly support the hub 74 for rotation of the hub 74 relative to the walls 18 and 20. Also, the hub 74 has a first and a second end 76 and 78 respectively. More particularly, a first collar 80 defines a peripheral edge 82 , the first collar 80 being secured to the first end 76 of the hub 74 for rotation with the hub 74. Also, a second collar 84 defines a further peripheral edge 86 , the second collar 84 being secured to the second end 78 of the hub 74 for rotation with the hub 74. Moreover, the collars 80 and 84 respectively are disposed between the walls 18 and 20 respectively. A plurality of sponge engaging members 88, 89 and 90 extend between the collars 80 and 84 respectively. The sponge engaging members 88-90 are spaced relative to each other around and adjacent to the peripheral edges 82 and 86 respectively of the collars 80 and 84 respectively. The arrangement is such that when the first roller 22 rotates, the sponge engaging members 88-90 squeeze and condition the sponge 14. Additionally, the second roller 26 includes an axle 92 which is disposed coaxially relative to the rotational axis 28. The axle 92 extends through the walls 18 and 20 respectively such that the walls 18 and 20 respectively bearingly support the axle 92 for rotation of the axle 92 relative to the walls 18 and 20. Also, the axle 92 has a first and a second extremity 94 and 96 respectively. A first flange 98 of the axle 92 defines a periphery 100, the first flange 98 being secured to the first extremity 94 of the axle 92 for rotation with the axle 92. Additionally, a second flange 102 defines a further periphery 104, the second flange 102 being secured to the second extremity 96 of the axle 92 for rotation with the axle 92. Also, the flanges 98 and 102 respectively are disposed between the walls 18 and 20. Furthermore, a plurality of sponge squeezing members 106, 107 and 108 extend between the flanges 98 and 102 respectively. The sponge squeezing members 106-108 are spaced relative to each other around and adjacent to the peripheries 100 and 104 respectively of the flanges 98 and 102 respectively. The arrangement is structured such that when the second roller 26 rotates as indicated by the arrow 32 as shown in FIG. 1, the sponge squeezing members 106-108 squeeze and condition the sponge 14. The sponge engaging members 88-90 and the sponge squeezing members 106-108 cooperate together to drive the sponge 14 through the passageway P while alternately compressing and releasing the sponge 14 for condition the sponge 14. Also, as shown in FIG. 1, a plurality of pairs of counter rotating rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 are rotatably supported between the walls 18 and 20 for further defining the passageway P. The pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 are positioned so that as the sponge 14 progressively is driven from a pair of the rollers such as 110 and 111 to an adjacent pair of rollers 112 and 113, the sponge 14 is progressively washed and conditioned. Additionally, a gear wheel 120 is secured to the first roller 22 and a further gear wheel 122 is secured to the second roller 26. As shown in FIG. 2, a drive generally designated 124 is connected to the gear wheels 120 and 122 for driving the gear wheels 120 and 122 in opposite rotational directions relative to each other as indicated in FIG. 1 by the arrows 30 and 32 respectively so that the sponge 14 is driven through the passageway P in the direction as indicated by the arrow 130. Moreover, a geared wheel 131, 132, 133, 134, 135, 136, 137 138 139 and 140 is secured to each roller of the pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 so that each of the geared wheels 131-140 are connected to the drive 124 so that the rollers of each pair 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 are counter rotated relative to each other so that the rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 progressively drive the sponge 14 through the passageway P for washing and conditioning the sponge 14 in the water 12. As shown in FIG. 1, reversing gears intermesh with the geared wheels 131-140 of the respective pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 so that all of the pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119 and the first and second rollers 22 and 26 are driven in the directions indicated by the arrows by the drive 124. More particularly, as shown in FIG. 3, the drive 124 includes a manual crank 154 for rotating the first and second rollers 22 and 26. More specifically, the manual crank 154 is provided for rotating the first and second rollers 22 and 26 and the pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119. FIG. 4 is a similar view to that shown in FIG. 3 but shows an alternative embodiment of the present invention. As shown in FIG. 4, the drive 124 includes a motor 156 for rotating the first and second rollers 22 and 26 respectively. The motor 156 which may be an electric motor which has a transformer for connection to a mains supply. The motor 156 is provided for rotating the first and second rollers 22 and 26 and the pairs of rollers 110 and 111, 112 and 113, 114 and 113, 115 and 113, 116 and 113, 116 and 111, 117 and 26, 118 and 119. Additionally, each of the gear wheels 120 and 122 and each of the geared wheels 131-140 is intermeshed with an adjacent wheel. Furthermore, as shown in FIG. 1, the passageway P has a first and a second end 158 and 160 respectively, the sponge 14 being placed adjacent to the first end 158 of the passageway P. Also, the cleaned and conditioned sponge 14 exits from the apparatus 10 adjacent the second end 160 of the passageway P. In operation of the apparatus according to the present invention, a sponge 14 that has been used for removing excess grout from freshly laid tiles is placed between the rollers at the first end 158 of the passageway P so that as the pairs of cooperating rollers rotate, the sponge 14 is progressively squeezed and released in the water within the container so that when the sponge emerges from the pathway P, the sponge is clean and reconditioned and ready for use in the removal of further excess grout from the tiles. The present invention provides a unique apparatus for washing and conditioning a grouting sponge which greatly reduces the time taken to complete a grouting project and which also protects the tiler's hands from excessive contact with the grout.
<SOH> FIELD OF THE INVENTION <EOH>1. Background of the Invention The present invention relates to a tile sponge washing and conditioning apparatus. More specifically, the present invention relates to a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation. 2. Background Information A tile laying operation includes laying the tiles onto a layer of adhesive. When the adhesive has set, a grouting compound is applied to the tiles for filling the spaces between adjacent tiles. Excess grout must be removed from the tiles before the grout hardens. In order to remove such excess grout, a dampened sponge is applied to the surface of the tile and wiped across the upper surface of the tile for removing the excess grout from the tiles. The initial process of removing excess grout entails the removal of a considerable amount of grout. Therefore, it is essential that the sponge be frequently immersed into clean water to wash away such excess grout from the sponge. Typically, the sponge is submerged in a bowl of water and is hand squeezed in order to release the grout on the sponge into the bowl of water. The aforementioned process is time consuming because it is essential that the sponge be frequently cleaned in order to progressively remove the excess grout from the tiles. Also, because the grout ha s a damaging effect on the skin, the tiler should wear protective gloves when washing and conditioning the sponge in the bowl of water. The apparatus according to the present invention overcomes the aforementioned problems by the provision of an apparatus which is at least partially immersed in a container of water. In operation of the apparatus, a sponge to be cleaned and conditioned is inserted between counter rotating rollers which feed the sponge through the water in the container and progressively squeeze and release the sponge so that the excess grout is removed from the sponge into the water as the sponge progresses through the apparatus. When the. sponge emerges from the apparatus, the sponge has been thoroughly washed and conditioned and is ready for further use on the surface of the tiles for removing further excess grout therefrom. Also, while one sponge is being washed by the apparatus of the present invention, another sponge previously washed and conditioned is used in the removal of excess grout so that no time is wasted waiting for a sponge to be cleaned. The apparatus according to the present invention cuts down on the time needed to complete a tiling project. Also, the apparatus protects a tiler's hands from the damage caused by immersing the tiler's hands in a bowl of sponge washing water. Therefore, a primary feature of the present invention is the provision of a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation that overcomes the problems associated with the prior art arrangements. Another feature of the present invention is the provision of a tile sponge washing and conditioning apparatus that reduces the time required to complete a tiling project. A further feature of the present invention is the provision of a tile sponge washing and conditioning apparatus that protect the tiler's hands from the damage caused by immersion of a tiler's hands in a bowl of water used to wash grout away from a sponge. Other features and advantages of the present invention will be readily apparent to those skilled in the art by a consideration of the detailed description of a preferred embodiment of the present invention contained herein.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention relates to a tile sponge washing and conditioning apparatus for washing in water a sponge used during a ceramic tile laying operation. The apparatus includes a frame for disposition thereof within the water. The frame includes a first wall and a second wall which is disposed spaced from the first wall. A first roller has an axis of rotation which extends through the walls and a second roller has a rotational axis which also extends through the walls. The rollers cooperate with each other to define therebetween a pathway for the passage therethrough of the sponge to be washed and conditioned The arrangement is such that when the rollers are counter rotated relative to each other, the sponge is squeezed and driven through the passageway so that the sponge is washed and conditioned by the water during passage of the sponge through the passageway. In a more specific embodiment of the present invention, the frame is fabricated from stainless steel. Also, the first wall is of planar configuration, the first wall having a first and a second edge, a top and a bottom edge and an inner and an outer surface; Furthermore, the second wall is also of planar configuration, the second wall having a first and a second side, a top and a bottom end and an inner and an outer face, the second wall being disposed parallel relative to the first wall. More specifically, the first wall includes a first ear which extends from the first edge. Also, a second ear extends from the second edge. The second wall includes a first extension which extends from the first side and a second extension which extends from the second side. Moreover, a container is provided for containing the water. The container defines a rim for supporting the ears and the extensions such that when the ears and extensions are being supported by the rim, the rollers are disposed within the water contained within the container. Additionally, the frame includes a first reinforcing member which extends between the first ear and the first extension. A second reinforcing member extends between the second ear and the second extension such that the reinforcing members maintain the first and second walls in a spaced parallel disposition relative to each other. The first roller includes a hub which is disposed coaxially relative to the axis of rotation. The hub extends through the walls such that the walls bearingly support the hub for rotation of the hub relative to the walls. Also, the hub has a first and a second end. More particularly, a first collar defines a peripheral edge, the first collar being secured to the first end of the hub for rotation with the hub. Also, a second collar defines a further peripheral edge, the second collar being secured to the second end of the hub for rotation with the hub. Moreover, the collars are disposed between the walls. A plurality of sponge engaging members extend between the collars. The sponge engaging members are spaced relative to each other along and adjacent to the peripheral edges of the collars. The arrangement is such that when the first roller rotates, the sponge engaging members squeeze and condition the sponge. Additionally, the second roller includes an axle which is disposed coaxially relative to the rotational axis. The axle extends through the walls such that the walls bearingly support the axle for rotation of the axle relative to the walls. Also, the axle has a first and a second extremity. A first flange defines a periphery, the first flange being secured to the first extremity of the axle for rotation with the axle. Additionally, a second flange defines a further periphery, the second flange being secured to the second extremity of the axle for rotation with the axle. Also, the flanges are disposed between the walls. Furthermore, a plurality of sponge squeezing members extend between the flanges. The sponge squeezing members are spaced relative to each other along and adjacent to the peripheries of the flanges. The arrangement is structured such that when the second roller rotates, the sponge squeezing members squeeze and condition the sponge. The sponge engaging members and the sponge squeezing members cooperate together to drive the sponge through the passageway while alternately compressing and releasing the sponge for condition the sponge. Also, a plurality of pairs of counter rotating rollers are rotatably supported between the walls for further defining the passageway. The pairs of rollers are positioned so that as the sponge progressively is driven from a pair of the rollers to an adjacent pair of rollers, the sponge is progressively washed and conditioned. Additionally, a gear wheel is secured to the first roller and a further gear wheel is secured to the second roller. A drive is connected to the gear wheels for driving the gear wheels in opposite rotational directions relative to each other so that the sponge is driven through the passageway. Moreover, a geared wheel is secured to each roller respectively of the pairs of rollers so that each of the geared wheels are connected to the drive so that the rollers of each pair are counter rotated relative to each other so that the rollers progressively drive the sponge through the passageway for washing and conditioning the sponge in the water. More particularly, the drive includes a manual crank for rotating the first and second rollers. More specifically, the manual crank is provided for rotating the first and second rollers and the pairs of rollers. In another embodiment of the present invention, the drive includes a motor for rotating the first and second rollers. The drive also includes a motor for rotating the first and second rollers and the pairs of rollers. Additionally, each of the gear wheels and each of the geared wheels is intermeshed with an adjacent gear or geared wheel. Furthermore, the passageway has a first and a second end, the sponge being placed adjacent to the first end of the passageway. Also, the cleaned and conditioned sponge exits from the apparatus adjacent the second end of the passageway. Many modifications and variations of the present invention will be readily apparent to those skilled in the art by a consideration of the detailed description contained hereinafter taken in conjunction with the annexed drawings which show a preferred embodiment of the present invention. However, such modifications and variations fall within the spirit and scope of the present invention as defined by the appended claims.
20040313
20080408
20050915
98153.0
0
PERRIN, JOSEPH L
TILE SPONGE WASHING AND CONDITIONING APPARATUS
SMALL
0
ACCEPTED
2,004
10,799,983
ACCEPTED
Method and apparatus for providing momentary torque reversal for a transmission having an automated shift system
An automated vehicle transmission having a wet clutch and an auxiliary motor that is operatively connected to the transmission to overcome residual torque forces in the wet clutch. Residual torque forces in the wet clutch may prevent disengagement of a gear train and also prevent the transmission from shifting into neutral. A control system determines whether residual torque is resisting the disengagement of the gear train for more than a predetermined time period. According to the method, if a shift is delayed for more than the predetermined time period, the auxiliary motor is actuated to apply an oppositely oriented torque to the transmission gear train to overcome the residual torque and allow the transmission to shift into neutral.
1. A vehicle transmission for providing a plurality of selectable speed ratios, comprising: an input shaft that receives torque in a first direction of rotation, a plurality of gear sets that each selectively provide one of the plurality of gear ratios, wherein each gear set has a plurality of gears arranged in a gear train; a wet master clutch may be disengaged to facilitate sufficient disengagement of the engine from the transmission, allowing the transmission to change from one of the gear sets to another gear set, wherein a residual torque in the wet clutch caused by viscous drag resists disengagement of the transmission; at least one shifter motor shifts the transmission from one gear set, to a neutral position between gear sets, and to another gear set; a control system determines if shifting of the transmission into the neutral position is delayed for more than a predetermined period; and an auxiliary motor is operatively connected to the transmission to selectively apply torque in a second direction of rotation that is opposite to the first direction of rotation when the control system determines that shifting into the neutral position is delayed for more than the predetermined period to overcome the residual torque and thereby facilitate shifting the transmission to the neutral position. 2. The transmission of claim 1 wherein the auxiliary motor is provided with an axially shifted gear that engages a gear in the transmission. 3. The transmission of claim 2 wherein the auxiliary motor is a fluid driven motor. 4. The transmission of claim 3 wherein the fluid driven motor is a hydraulic motor. 5. The transmission of claim 1 wherein the auxiliary motor engages a gear that is attached to the input shaft. 6. The transmission of claim 1 wherein a counter shaft is provided and wherein at least some of the gears are attached to the counter shaft and the auxiliary motor engages one of the gears that is attached to the counter shaft, or is meshed to the counter shaft. 7. The transmission of claim 1 further comprising a power take off connection provided on the transmission and wherein the auxiliary motor is connected to the transmission at the power take off connection. 8. The transmission of claim 1 wherein the control system signals the auxiliary motor to disengage the gear after the transmission shifts to neutral. 9. The transmission of claim 1 wherein the at least one shifter motor further comprises a set of X-Y shifter motors, and wherein a position sensor is disposed in the set of X-Y shifter motors, the position sensor providing a signal to the control system that is used to determine whether the transmission is in the neutral position. 10. A method for controlling an automated vehicular transmission system that receives torque in a first direction of rotation from an engine, a multiple speed transmission having a wet clutch that is disengaged to permit shifting the transmission into a neutral position, the wet clutch being subject to a residual torque in the first direction of rotation caused by the shearing of fluid between elements of the wet clutch that have a speed differential, and a control unit for shifting the transmission, the method comprising the steps of: (a) determining if the residual torque is delaying movement of the transmission into the neutral position for more than a predetermined period; and (b) applying a reverse output torque to the transmission in a second direction of rotation when the control system determines that the predetermined period is exceeded to counteract the residual torque and allow the transmission to move to the neutral position. 11. The method of claim 10, further including the step of determining if a transmission neutral mode or a gear change has been selected but not achieved within the predetermined time period. 12. The method of claim 10, wherein the step of applying a reverse output torque further comprises providing an auxiliary motor that engages a gear that is attached to the input shaft. 13. The method of claim 10, wherein the step of applying a reverse output torque further comprises providing an auxiliary motor that engages a gear that is attached to a counter shaft and the auxiliary motor engages a gear that is attached to the counter shaft. 14. The method of claim 10, further comprising the step of stopping the application of the reverse output torque when the control system determines that the transmission is in the neutral position. 15. The method of claim 10, wherein the step of determining if the residual torque is delaying movement further comprises monitoring a position sensor disposed in a set of X-Y shifter motors and providing a signal to the control system to determine whether the transmission is in the neutral position.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to transmissions having an automated shift system. 2. Background Art Transmissions for vehicles having an automated shift mechanism have been developed that automatically shift a shift lever mechanism similar to a manual transmission shift mechanism. One example of such a transmission has been developed for medium and heavy-duty trucks is known as the “AutoShift” transmission by Applicants' assignee primarily for medium and heavy-duty trucks. This system uses an electronic control that operates X-Y motors in a shift actuator to shift between a plurality of different gear trains to provide a range of gear ratios. Using this technique, operation of a vehicle is simplified and shifting performance may be optimized by reducing or minimizing human error. While the AutoShift system has proven effective in higher gear ratios, in lower gear ratios when the truck is operated at slow speeds, it would be desirable to provide quicker shift response when shifting from gear to gear. In some transmission applications, it may be preferred to provide a wet clutch to disengage the transmission from the vehicle engine or source of drive torque to provide superior clutch durability. The torque load to the transmission is relieved by disengaging the clutch. Disengaging the clutch theoretically permits the torque load to go to zero and allows the transmission system to shift into neutral and prior to changing gears. However, with a wet clutch, even a small amount of rotation between the transmission and engine may cause the wet clutch to remain sufficiently engaged to prevent the transmission from being shifted into neutral. A wet clutch resists pulling to neutral as a result of “torque lock” caused by viscous drag in the wet clutch which may be as little as seven foot pounds of torque. The viscous drag is caused by the shearing of fluid between members that have a speed differential in the clutch pack. If an X-Y shifter is provided, it may not be able to overcome the residual torque. If the X-Y shifter motors cannot overcome the residual torque, shifting will be delayed until the torque is reduced sufficiently to be overcome by the X-Y shifter motors. The time required to fully disengage the clutch may lead the operator to believe that the transmission is sticking or not properly shifting. A delay of a half a second or more may be noticeable to an operator. There is a need for a control system and method of operating a vehicle transmission system that breaks, or reverses, the torque load resulting from wet clutch viscous drag. By counteracting the torque load from the wet clutch, one gear set can be disengaged allowing the transmission to be shifted into neutral. These and other problems facing prior art vehicle transmission systems are addressed by Applicants' invention as summarized below. SUMMARY OF THE INVENTION According to one aspect of the present invention, a vehicle transmission is provided that provides a plurality of selectable speed ratios. The transmission comprises an input shaft that receives torque in a first direction of rotation that is directed to a plurality of gear sets that each selectively provide one of the plurality of gear ratios. Each gear set comprises a plurality of gears that are arranged in a drivetrain. A wet master clutch is disengaged to facilitate sufficient disengagement of the engine from the transmission allowing the transmission to change from one gear set to another. Residual viscous drag torque may be created by the wet clutch that, in some circumstances, resists disengagement of the transmission. The transmission may also include at least one shift motor that shifts the transmission from one gear set to a neutral position between gear sets and then to another gear set. The control system determines whether shifting the transmission into neutral is delayed for more than a predetermined time period. If so, an auxiliary motor may apply torque in a second direction of rotation that is opposite to the first direction of rotation when the control system determines that shifting into a neutral position is delayed for more than the predetermined period of time. Applying torque in the second direction overcomes the residual clutch drag torque and thereby facilitates shifting the transmission into the neutral position by creating a torque reversal across the transmission. According to other aspects of the invention as they relate to the vehicle transmission embodiment of the invention, the auxiliary motor is provided with an axially shifted gear that engages a gear in the transmission. An example of such an auxiliary motor and an axially shifted gear combination is commonly referred to as a Bendix motor. The auxiliary motor may be a fluid driven motor such as a hydraulic or pneumatic motor. Alternatively, the auxiliary motor could be an electric motor, or the like. The auxiliary motor may engage a gear that is attached to the input shaft or, if the transmission is provided with a counter shaft, the auxiliary motor may engage a gear that is attached to the counter shaft or is meshed to the counter shaft. The auxiliary motor may be connected to the transmission through a power take off connection or may be connected in another location on the housing of the transmission. According to another aspect of the invention as it relates to the transmission, the control system may signal the auxiliary motor to disengage the gear after the transmission shifts to neutral. According to another aspect of the invention as it relates to the transmission, at least one shifter motor may further comprise a set of X-Y shifter motors. A position sensor may be disposed in the set of X-Y shifter motors when the position sensor provides a signal to the control system that is used to determine whether the transmission is in the neutral position. According to another aspect of the invention, a method of controlling an automated vehicle transmission system is provided. The transmission system receives torque in the first direction of rotation from an engine. A multiple speed transmission that has a wet clutch, disengages the wet clutch to permit shifting the transmission into a neutral position that is subject to a residual torque in the first direction of rotation. A control unit is provided for shifting the transmission. The method comprises the steps of determining if the residual torque is delaying movement of the transmission into the neutral position for more than the predetermined period of time. If so, a reverse output torque is applied to the transmission in a second direction of rotation to counteract the residual torque and allow the transmission to be placed into neutral. According to another aspect of the invention as it relates to the method of controlling the automated vehicle transmission, the method may further include the step of determining if a transmission neutral mode or gear change has been selected but not achieved within the predetermined time period. According to another aspect of the method, the step of applying a reverse output torque further comprises providing an auxiliary motor that engages a gear that is attached to the input shaft. Alternatively, reverse output torque may be applied by the auxiliary motor engaging a gear that is attached to a counter shaft. Another aspect of the method may comprise the step of stopping the application of reverse output torque when the control system determines that the transmission is in the neutral position. According to another aspect of the method, the step of determining whether the residual torque is delaying movement may further comprise monitoring the position sensor disposed in the set of X-Y shifter motors and by providing a signal to the control system to determine whether the transmission is in the neutral position. These and other aspects of the vehicle transmission and method of controlling the vehicle transmission of the present invention will be better understood in view of the attached drawings when taken in connection with the detailed description of the illustrated embodiments of the invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic illustration of an automated vehicle transmission system according to the present invention; FIG. 2 is a side elevation view of one embodiment of a transmission system made in accordance with the present invention; FIG. 3 is a fragmentary schematic view of a portion of a vehicle transmission including an auxiliary motor adapted to engage a gear of the transmission; FIG. 4 is a side elevation view of a vehicle transmission equipped with an alternative embodiment of an auxiliary motor of the present invention; and FIG. 5 is a fragmentary side elevation view of an auxiliary motor of the embodiment shown in FIG. 4. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S) Referring now to FIG. 1, a vehicle transmission 10 and engine 12 of a vehicle (not shown) are connected by a wet clutch 14. The wet clutch 14 connects the drive shaft 16 of the engine 12 to an input shaft 18 of the transmission 10. The wet clutch 14 allows for hydrostatic engagement and disengagement of the transmission 10 by the engine 12. The wet clutch 14 provides increased durability in comparison to a dry clutch. The wet clutch 14 is of conventional design and relies upon fluids such as oil (natural, synthetic or any other combination) to cool the clutch pack that may become heated as a result of repeated engagements and disengagements. While the wet clutch 14 provides an interrupt mechanism for drive line torque, in certain applications, if a limited amount of residual torque is present in the clutch due to viscous drag, it will make the gear train difficult to disengage and pull to neutral. Residual torque of seven foot pounds or more in the wet clutch 14 may be sufficient to prevent the gear train from being pulled to neutral. According to one embodiment of the invention, an auxiliary motor 20 (that may be of the type that is commonly referred to as a “Bendix” motor) may be provided to overcome the residual torque counteracting the residual torque generated by a wet clutch. Counteracting the residual viscous torque allows the gear train to disengage. A control system 22 is provided on the transmission to control shifting the transmission into different gear ratios. The control system 22 may comprise a shifter motor or a set of X-Y shifter motors 24 that provide automated shifting of a transmission. The X-Y shifter motors 24 act upon a shift bar housing (not shown) to move the gear selection mechanism in a shift pattern comparable to a manual shift pattern of a conventional manual transmission. The auxiliary motor 20 engages a gear 26 within the transmission 10 to exert a reverse torque that counteracts the residual torque and permits the control system 22 to shift the transmission out of one gear into neutral and into a new gear ratio. Referring now to FIG. 2, a transmission 10 is shown that has an auxiliary motor 20 mounted to a side mounting plate 28. The side mounting plate 28 secures the auxiliary motor 20 to a housing 30 of the transmission 10. The input shaft 18 of the transmission 10 is provided at the engine end of the transmission 10 while the auxiliary motor 20 is secured to a transmission housing 30 and extends radially relative to the input shaft 18. Referring now to FIG. 3, the auxiliary motor 20 is shown with the side mounting plate 28. An axially shifted gear 36 having a plurality of gear teeth 38 is secured to a shaft 40. The shaft 40 is axially shiftable relative to the auxiliary motor 20 to cause the gear teeth 38 of the axially shifted gear 36 to engage axially extending gear teeth 42 that extend in an axial direction relative to the gear 26. The axially extending gear teeth 42 are provided on a side wall 44, or flange, that is associated with the gear 26. The gear 26 may be an input shaft gear or any other gear that may transmit reversely oriented torque through the transmission to the wet clutch 14. In operation, the auxiliary motor 20 is actuated by the control system 22 of the transmission 10 when it is desired to shift a transmission but residual torque present in the wet clutch prevents disengagement of the gear train. If the residual torque present in the wet clutch prevents disengagement, the gear train may not disengage and the transmission 10 may not shift into neutral within the predetermined time period. If, for example, residual torque prevents the gear train from disengaging for a period of more than one half of a second, the control system 22 may actuate the auxiliary motor 20. When the auxiliary motor 20 is actuated, the shaft 40 shifts the axially shifted gear 36 causing gear teeth 38 to engage gear teeth 38 of the gear 26. The auxiliary motor 20 applies torque to the gear 26 that in turn imparts torque to the wet clutch 14 countering the residual torque. When the control system determines that the transmission is in neutral, application of torque to the gear 26 is stopped by turning off the auxiliary motor 20 and retracting the axially shifted gear 36. Referring now to FIG. 4, an alternative embodiment of the present invention is shown wherein a transmission 50 is provided with a power take off (PTO) mounted auxiliary motor 52. The auxiliary motor 52 is secured to a PTO connection port 54. The PTO connection port 54 in the illustrated embodiment is disposed on the opposite end of the transmission from input shaft 56. Input shaft 56 is adapted to be operatively connected to an engine (not shown). The PTO mount auxiliary motor 52 is secured to the PTO connection port 54 by a PTO connector 58. The PTO mount auxiliary motor 52 is disposed in the same axial orientation as the input shaft 56. Referring to FIG. 5, the PTO mounted auxiliary motor 52 is shown with the PTO connector 58. The auxiliary motor 52 has an axially shifted gear 60 that is mounted on an extensible shaft 62 that is driven by the auxiliary motor 52. The extensible shaft 62 shifts the axially shifted gear 60 into engagement with a gear 66 that is located adjacent to the PTO. The gear 66 may be mounted on a counter shaft of the transmission or, alternatively, may be mounted on the input shaft of a transmission. It may also be any other gear of the transmission that is continuously and constantly meshed with the gear train connected to the input shaft. A plurality of gear teeth 68 are provided on the gear 60 that engage gear teeth 70 on the gear 66. In operation, the auxiliary motor 52 is actuated when the engine control system 22 determines that the gear train is locked up as a result of residual torque forces within the wet clutch. The control system 22 actuates the auxiliary motor 52 causing the motor to operate and also axially shift the gear 60 into engagement with the gear 66. Rotation of the gear 60 provides torque that is applied to the gear 66. The torque applied to the gear 66 is directed in the opposite direction relative to the residual torque in the wet clutch 14 to overcome the residual torque. This creates a torque reversal across the transmission and allows the transmission to shift into neutral. After the transmission is shifted into neutral, the control system may stop the application of torque to the gear 66. The control system 22 may then act through the X-Y shift motor 24 to shift the transmission into the next desired gear ratio. While embodiments of the invention have been illustrated and described, it is not intended that these embodiments illustrate and describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to transmissions having an automated shift system. 2. Background Art Transmissions for vehicles having an automated shift mechanism have been developed that automatically shift a shift lever mechanism similar to a manual transmission shift mechanism. One example of such a transmission has been developed for medium and heavy-duty trucks is known as the “AutoShift” transmission by Applicants' assignee primarily for medium and heavy-duty trucks. This system uses an electronic control that operates X-Y motors in a shift actuator to shift between a plurality of different gear trains to provide a range of gear ratios. Using this technique, operation of a vehicle is simplified and shifting performance may be optimized by reducing or minimizing human error. While the AutoShift system has proven effective in higher gear ratios, in lower gear ratios when the truck is operated at slow speeds, it would be desirable to provide quicker shift response when shifting from gear to gear. In some transmission applications, it may be preferred to provide a wet clutch to disengage the transmission from the vehicle engine or source of drive torque to provide superior clutch durability. The torque load to the transmission is relieved by disengaging the clutch. Disengaging the clutch theoretically permits the torque load to go to zero and allows the transmission system to shift into neutral and prior to changing gears. However, with a wet clutch, even a small amount of rotation between the transmission and engine may cause the wet clutch to remain sufficiently engaged to prevent the transmission from being shifted into neutral. A wet clutch resists pulling to neutral as a result of “torque lock” caused by viscous drag in the wet clutch which may be as little as seven foot pounds of torque. The viscous drag is caused by the shearing of fluid between members that have a speed differential in the clutch pack. If an X-Y shifter is provided, it may not be able to overcome the residual torque. If the X-Y shifter motors cannot overcome the residual torque, shifting will be delayed until the torque is reduced sufficiently to be overcome by the X-Y shifter motors. The time required to fully disengage the clutch may lead the operator to believe that the transmission is sticking or not properly shifting. A delay of a half a second or more may be noticeable to an operator. There is a need for a control system and method of operating a vehicle transmission system that breaks, or reverses, the torque load resulting from wet clutch viscous drag. By counteracting the torque load from the wet clutch, one gear set can be disengaged allowing the transmission to be shifted into neutral. These and other problems facing prior art vehicle transmission systems are addressed by Applicants' invention as summarized below.
<SOH> SUMMARY OF THE INVENTION <EOH>According to one aspect of the present invention, a vehicle transmission is provided that provides a plurality of selectable speed ratios. The transmission comprises an input shaft that receives torque in a first direction of rotation that is directed to a plurality of gear sets that each selectively provide one of the plurality of gear ratios. Each gear set comprises a plurality of gears that are arranged in a drivetrain. A wet master clutch is disengaged to facilitate sufficient disengagement of the engine from the transmission allowing the transmission to change from one gear set to another. Residual viscous drag torque may be created by the wet clutch that, in some circumstances, resists disengagement of the transmission. The transmission may also include at least one shift motor that shifts the transmission from one gear set to a neutral position between gear sets and then to another gear set. The control system determines whether shifting the transmission into neutral is delayed for more than a predetermined time period. If so, an auxiliary motor may apply torque in a second direction of rotation that is opposite to the first direction of rotation when the control system determines that shifting into a neutral position is delayed for more than the predetermined period of time. Applying torque in the second direction overcomes the residual clutch drag torque and thereby facilitates shifting the transmission into the neutral position by creating a torque reversal across the transmission. According to other aspects of the invention as they relate to the vehicle transmission embodiment of the invention, the auxiliary motor is provided with an axially shifted gear that engages a gear in the transmission. An example of such an auxiliary motor and an axially shifted gear combination is commonly referred to as a Bendix motor. The auxiliary motor may be a fluid driven motor such as a hydraulic or pneumatic motor. Alternatively, the auxiliary motor could be an electric motor, or the like. The auxiliary motor may engage a gear that is attached to the input shaft or, if the transmission is provided with a counter shaft, the auxiliary motor may engage a gear that is attached to the counter shaft or is meshed to the counter shaft. The auxiliary motor may be connected to the transmission through a power take off connection or may be connected in another location on the housing of the transmission. According to another aspect of the invention as it relates to the transmission, the control system may signal the auxiliary motor to disengage the gear after the transmission shifts to neutral. According to another aspect of the invention as it relates to the transmission, at least one shifter motor may further comprise a set of X-Y shifter motors. A position sensor may be disposed in the set of X-Y shifter motors when the position sensor provides a signal to the control system that is used to determine whether the transmission is in the neutral position. According to another aspect of the invention, a method of controlling an automated vehicle transmission system is provided. The transmission system receives torque in the first direction of rotation from an engine. A multiple speed transmission that has a wet clutch, disengages the wet clutch to permit shifting the transmission into a neutral position that is subject to a residual torque in the first direction of rotation. A control unit is provided for shifting the transmission. The method comprises the steps of determining if the residual torque is delaying movement of the transmission into the neutral position for more than the predetermined period of time. If so, a reverse output torque is applied to the transmission in a second direction of rotation to counteract the residual torque and allow the transmission to be placed into neutral. According to another aspect of the invention as it relates to the method of controlling the automated vehicle transmission, the method may further include the step of determining if a transmission neutral mode or gear change has been selected but not achieved within the predetermined time period. According to another aspect of the method, the step of applying a reverse output torque further comprises providing an auxiliary motor that engages a gear that is attached to the input shaft. Alternatively, reverse output torque may be applied by the auxiliary motor engaging a gear that is attached to a counter shaft. Another aspect of the method may comprise the step of stopping the application of reverse output torque when the control system determines that the transmission is in the neutral position. According to another aspect of the method, the step of determining whether the residual torque is delaying movement may further comprise monitoring the position sensor disposed in the set of X-Y shifter motors and by providing a signal to the control system to determine whether the transmission is in the neutral position. These and other aspects of the vehicle transmission and method of controlling the vehicle transmission of the present invention will be better understood in view of the attached drawings when taken in connection with the detailed description of the illustrated embodiments of the invention.
20040312
20060103
20050915
98973.0
0
LE, DAVID D
METHOD AND APPARATUS FOR PROVIDING MOMENTARY TORQUE REVERSAL FOR A TRANSMISSION HAVING AN AUTOMATED SHIFT SYSTEM
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,107
ACCEPTED
Information distribution for use in an elevator
A method of providing video information to a display monitor within an elevator located in a building, which includes receiving first data defining a category of video information, receiving second data, associated with the category of video information and defining at least one source of the video information; and retrieving from the source, over a data communications path and on the basis of the first data and the second data, the video information to be displayed on the monitor within the elevator.
1.-54. (canceled) 55. A method for displaying an image on a plurality of displays, each display being in one of a plurality of elevator cabs, the method comprising: inspecting a playlist having first data leading to first information to be displayed; on the basis of the first data, retrieving the first information; assembling second data, the second data being representative of the image that includes the first information; and distributing the image to each display. 56. The method of claim 55, wherein inspecting the playlist comprises determining, on the basis of the first data, an address from which the first information is to be retrieved. 57. The method of claim 55, wherein assembling second data comprises merging the first information with second information to be displayed concurrently with the first information. 58. The method of claim 57, further comprising selecting the first information to be an advertisement and the second information to be real time general information. 59. The method of claim 55, further comprising selecting a playlist on the basis of demographic information. 60. The method of claim 55, wherein the first data comprises a pointer to an internet address. 61. The method of claim 55, wherein the first data comprises a pointer to data stored in a local area network. 62. The method of claim 55, further comprising inspecting third data indicating when the first information is to be displayed, and wherein providing the image to each display comprises providing the image at a time consistent with the third data. 63. The method of claim 55, further comprising locally caching the first information. 64. The method of claim 63, wherein locally caching the information comprises caching the information in a building server. 65. The method of claim 55, wherein the first data comprises category information identifying a category to which the first information belongs. 66. The method of claim 55, further comprising selecting the playlist to include category information identifying a plurality of categories of information to be displayed. 67. The method of claim 66, further comprising selecting the playlist to include a first pointer leading to information classified in a first category and a second pointer leading to information classified in a second category that differs from the first category. 68. A method for displaying an image on a displays in an elevator cab, the method comprising: inspecting a playlist having first data leading to first information to be displayed; and on the basis of the first data, retrieving the first information for display in the elevator cab. 69. The method of claim 68, further comprising assembling second data, the second data being representative of an image that includes the first information. 70. The method of claim 69, further comprising sending the image to the display. 71. The method of claim 70, wherein sending the image to the display comprises sending the image from a building server to a plurality of elevator cabs. 72. The method of claim 68, wherein inspecting the playlist comprises determining, on the basis of the first data, an address from which the first information is to be retrieved. 73. The method of claim 69, wherein assembling second data comprises merging the first information with second information to be displayed concurrently with the first information. 74. The method of claim 73, further comprising selecting the first information to be an advertisement and the second information to be real time general information. 75. The method of claim 68, further comprising selecting a playlist on the basis of demographic information. 76. The method of claim 68, wherein the first data comprises a pointer to an internet address. 77. The method of claim 68, wherein the first data comprises a pointer to data stored in a local area network. 78. The method of claim 68, further comprising inspecting scheduling data indicating when the first information is to be displayed, and wherein providing the image to each display comprises providing the image at a time consistent with the scheduling data. 79. The method of claim 68, further comprising locally caching the first information. 80. The method of claim 79, wherein locally caching the information comprises caching the information in a building server. 81. The method of claim 68, wherein the first data comprises category information identifying a category to which the first information belongs. 82. The method of claim 68, further comprising selecting the playlist to include category information identifying a plurality of categories of information to be displayed. 83. The method of claim 82, further comprising selecting the playlist to include a first pointer leading to information classified in a first category and a second pointer leading to information classified in a second category that differs from the first category.
BACKGROUND OF THE INVENTION This invention relates to providing information in an elevator and other such personnel transport vehicles. The impetus for constructing skyscrapers and other high-rise structures lies in providing a more efficient use of real estate, particularly in urban areas where the value of real estate is at a premium. The primary mode of transportation in such structures is the elevator, particularly in buildings having many floors. Visual information provided in an elevator is generally limited to floor information and passenger instructions in the event of emergency or if assistance is required. An elevator may also include a static placard posting the day's present and their locations. SUMMARY OF THE INVENTION This invention features a system for displaying video information to passengers of an elevator in accordance with a play list defining a sequence of messages. The video information messages can include combinations of digital advertising, “real-time” general information, as well as, building-related information. In one aspect of the invention, the system includes an elevator display unit having a display monitor for displaying video information to the passengers, and a local server which, receives scheduling information associated with the video information over a data communication path and, in accordance with the scheduling information, generates a play list used to display at the elevator display unit. In another aspect of the invention, a method of providing general information and commercial information within an elevator includes the steps of: a) providing to a local server, scheduling information associated with video information to be displayed; b) generating, from the scheduling information, a play list associated with the video information; and c) generating a display for viewing at the elevator display unit within the elevator, the video information at predetermined times in accordance with the scheduling information. In yet another aspect, the invention is a method of providing video information to a display monitor within an elevator located in a building. The method includes receiving first data defining a category of video information, receiving second data, associated with the category of video information and defining at least one source of the video information; and retrieving from the source, over a data communications path and on the basis of the first data and the second data, the video information to be displayed on the monitor within the elevator. The invention also extends to a system for providing video information by this method. By “video information”, it is meant any combination of general, commercial, and building-related information. By “commercial information”, it is meant any information relating to commerce and trade including advertisements. “General information” is used here to mean information of general interest, including news (recent happenings, sports, entertainment, etc.) and weather. General information can also include information associated with the building within which the elevator is a part, for example, 1) events associated with the building; 2) traffic; 3) transportation schedules (e.g., train/shuttle services). By “building-related information”, it is meant that information specifically related to the particular building where the elevators transport residents, tenants, and visitors of the building. The building-related information may include certain types of commercial information, such as advertising for businesses within or local to the building (e.g., coffee, shop, parking, florist), as well as announcements by building management for available space within the building. The building-related information can also include forms of general information, particularly relevant to the building and its elevator passengers. For example, such information can include building activities (e.g., holiday events, fire alarm testing), public address/emergency messages, traffic information, and other information useful to the elevator's passengers. In general, the building-related information is less limited by the type of information, and more by its geography. With this system, advertisers, online content providers, and building management/owners can interact with a specific, well-defined, and targeted audience in an elevator, a setting where passengers often feel uncomfortable being confined with complete strangers. Elevator passengers often seek ways to avoid making eye contact with fellow passengers during what feels like an endless, unnerving duration of time. Passengers no longer need to stare aimlessly at the floor or ceiling, but have an informative media resource to watch. Occupants of high-rise office buildings are typically business people with understood interests and buying tendencies. These people are ideal recipients for targeted content and advertising. The system allows content providers (e.g., local and national news sources) and advertisers to selectively target audiences based on the demographics of a building, city, region, business segment, etc. Similarly, national, regional, and local online content providers are afforded an opportunity to provide elevator passengers with information of general interest. The system also provides building owners and managers the ability to provide video information particularly relevant and useful to tenants and visitors of their buildings. Embodiments of these aspects of the invention may include one or more of the following features. The local server receives the scheduling information from the production server over a data communication network (e.g., the Internet). The system also includes a production server which generates scheduling information associated with the general and commercial information. Thus, the production server serves as a central distribution site where, among other things, the scheduling information (e.g., building play lists or scripts) are generated. The production server includes a production server database for storing building-related data, general information-related data, and commercial information-related data. This database includes, for example, building characterization data, as well as the addresses from where the general and commercial information can be retrieved over the data communication path. The production server includes a scheduling module, which retrieves the data from the production server database and generates the scheduling information and a building loader interface through which data is passed between the production server and the local server. The building loader interface encrypts the data passed between the production server and the local server and authenticates that the local server is one associated with the system. The production server includes a billing module, which generates documentation relating to the duration of time the general information and commercial information is displayed at elevator display unit. A database maintenance module is also included within the production server to update the production center database with information relating to elevator occupancy as a function of time. The local server communicates with the elevator display unit via a local area network including local and general information databases and a scheduling information parser. General information and commercial information retrieved over the data communication path are cached in respective ones of the local and general information databases. The scheduling information parser generates a local building play list from the scheduling information retrieved from the production server. The local area network includes an Ethernet path for connection to the elevator display unit. The elevator display unit further includes an occupancy detector for determining, at predetermined intervals, the number of occupants riding within a particular elevator. Generating the elevator play list is performed with a graphical user interface. For the BOM interface, the video information includes a text message (e.g., in HTML format) and the play list includes a start date on which the text message is displayed on the display monitor; an end date on which the text message is displayed on the display monitor; and a day segment indicating a portion of a day the text message is displayed on the display monitor. The user interface is remote from said local server and communicates with said local server over a data communications path, such as the Internet, a dial-up modem, or a local area network. The play list is a building operations play list, with the video information and scheduling information for generating the building operations play list relating to building operations. The local server further receives a production server play list from a production server, remote from said local server, over a data communication network, said production server play list associated with general and commercial information for display on the display unit. The local server includes a parser, which generates a local building play list from the production server play list and the building operations play. Other features of the invention will be apparent from the following description and from the claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of the information distribution system of the invention. FIG. 2 illustrates the concept of micro-demographics. FIG. 3 is a block diagram of a building subsystem portion of the information distribution system of FIG. 1. FIG. 4 is an example of a display screen of the display monitor of FIG. 3. FIG. 5 is a block diagram of the production center of FIG. 1. FIG. 6 is a flow diagram for the operation of a scheduler module of the production center. FIG. 7 illustrates the format of a play list. FIG. 8 is a functional block diagram of a building server of the building subsystem portion of FIG. 3. FIG. 9 is a functional block diagram of the wide area interface between building servers and the distribution channel. FIG. 10 is a functional block diagram of the display generator LAN interface. FIG. 11 is a functional block diagram of the display server architecture. FIG. 12 is a block diagram illustrating the BOM interface of the information distribution system of the invention. FIG. 13 is an example of a message template used by the BOM interface to create messages. FIG. 14 illustrates the format of a BOM play list. FIG. 15 is a functional block diagram of a building server of the building subsystem portion of FIG. 12. FIG. 16 is a flow diagram illustrating the operation of the parsing function of the BOM interface. FIG. 17 illustrates the format of a local building play list. FIG. 18 is a functional block diagram of the display server architecture. FIG. 19 is is a block diagram of the information distribution system of the invention. FIG. 20 is a functional block diagram of the content retrieval procedure of the method of the present invention. FIG. 21 is a flow diagram illustrating the validation procedure in the method of the present invention. FIG. 22 is a flow diagram illustrating the file update procedure of the method of the present invention. FIG. 23 is a functional block diagram of the local play list development procedure of the method of the present invention. FIG. 24 is an illustration of the generic play list expansion procedure in the process of the present invention. FIG. 25 is a block diagram illustrating an alternative embodiment of a BOM interface of the information distribution system of the invention. DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring to FIG. 1, an information distribution system 1 provides a media outlet for distributing general information along with digital advertising to elevator display units 10 mounted in elevators 12 of high rise office buildings 14 (represented by dashed-line boxes). System 1 includes a production center 20 which—among other important tasks described below—creates and distributes elevator display data by merging advertising with the “real time” general information. The general information is considered “real time” because the information is relatively current (refreshed at defined periodic intervals) with system 1 collecting, formatting, and displaying the information without human intervention. The general information is provided by any number of sources 22 (e.g., websites) connected via a distribution channel, here the Internet 24. Each building 14 includes a building server 28 which interfaces with production center 20 via Internet 24 to develop presentations of merged advertising and general information to be exhibited on elevator display units. As is described in greater detail below, each building server provides the general and advertising information to each elevator display unit 10 of associated elevators 12 through a local area network (LAN) 30. Information distribution system 1 utilizes a concept called “micro-demographics” which allows advertisers and online providers to target a highly desirable demographic, business population. The desired audience targeted by a particular advertiser or on-line provider may vary greatly and depend on a number of factors. As will be discussed below, system 1 collects or otherwise determines the demographics associated with a particular building as well as the occupants of that building. Thus, the geographical location and elevator traffic patterns of the building, and the nature of the business of the building occupants are determined by and stored at production center 20 so that a building script or play list 68 (FIG. 5) of advertisements and general (“real time”) content can be matched to the building. Referring to FIG. 2, buildings 14 are shown encircled to represent that they belong to a particular geographical region. Smaller encircled groups 7a-7f represent, for example, buildings 14 within a city (e.g., Boston) are also shown encircled by larger geographical regions 8a-8b (e.g., New England). Geography is generally a very important demographic factor, however, as important may be the particular business segment which is targeted. Thus, several buildings 14a-14c which are from different geographical regions, but associated with the same business segment population (e.g., financial) may be grouped together (shown bounded by the cross hatched area). The ability to partition demographics by both geography and business segment provides tremendous value to content providers and advertisers. In an example of one application of the system, assume an advertiser wishes to distribute an advertisement targeted specifically at the financial community in the northeast region of the United States. The advertisement needs to appear over a two week period during morning prime time hours. Production center 20 provides the advertiser with an automated request entry process for capturing this pertinent information representative of the target demographic. Production center 20 creates, from the target demographic, building play list 68 of potential building candidates for the advertisement and defines possible run time slots for when the advertisement is to be displayed. Several factors affecting which of a number of buildings are candidates and which time slots are available include: the target demographic (e.g., financial community in northeast United States), the number of advertisement impressions (i.e., the number of times an advertisement is viewed) purchased, the advertisement start and end dates (e.g., start and end of a two week period), prime time requirements (i.e., prime time morning), the advertisement format (280×90 animated GIF file) and advertisement locator (where GIF file is located). Once the advertisement time slots are identified, production center 20 determines the general information (e.g., news article, weather update) provided by an online provider that is to be merged and displayed with the advertisement. Building play list 68 specifies the format and content of the elevator displays for every instant of the day. Thus, in the example, production center 20 schedules the advertisement to be played at 9:00 a.m. and 15 seconds simultaneously with a local news article in one building play list while running the same advertisement at 8:15 a.m. and 0 seconds with a weather update in another building play list. It is important to note that building play list 68 defines what gets displayed and when, but does not contain the actual display content. Instead, building play list 68 provides pointers for obtaining the information over Internet 24. With information relating to the advertisement imbedded in the building play list, production center 20 must then present the advertisement to elevator occupants. Building server 28 is responsible for downloading the building play list from production center 20, retrieving over Internet 24, the specified advertisement and general information, followed by assembling and distributing the advertisement and information within displays which are to be viewed in elevator display units 10. Building server 28 uses the pointers in play list 68 to retrieve the content and store it locally to a particular building 14. This allows building server 28 to create a very high performance broadcast channel within building 14. In the example, building server 28 uses an advertisement locator embedded in play list 68 to retrieve and store locally the animated GIF file for the advertisement. With the content stored locally, building server 28 reads play list 68, assembles displays at the times indicated by the list and distributes them to the individual elevators 12. Thus, in the example, at 9:00 a.m. and 15 seconds, building server 28 assembles the advertisement with the specified local news story and displays it in elevators 12. Details relating to the major components of information distribution system 1 follow. Referring to FIG. 3, elevator display unit (EDU) 10 receives and processes data provided by building server 28 to create display presentations. Elevator display unit 10 includes a display 13 controlled by a single-board computer 34 and a network interface card (NIC) 36. Display 13 includes an LCD controller, a back light assembly, a power converter, and a flat panel display (none shown). Computer 34 manages the operation of elevator display unit 10 including system setup and monitoring, network overhead, display data routing, and elevator occupancy. Network interface card 36 interacts with local area network 30 and is configured by computer 34 during system startup. Display data being broadcast downstream from building server 28 to elevator display units 10 represents the majority of the network traffic. In the downstream direction (from building server 28 to elevator display unit 10), network traffic is mostly comprised of display broadcast data. There is a limited amount of control information in the downstream direction, however this is negligible. Network interface card 36 routes display data directly to display 13. Control information will generate an interrupt to computer 34 to request service. In the upstream direction (from elevator display unit 10 to building server 28), network traffic includes occupancy information and system monitoring data. All upstream data is generated by computer 34 and passes to network interface card 36 for transmission. Data from building server 28 is transmitted to each elevator display unit 10 via local area network 30 (shown enclosed by dashed lines). In particular, data is transmitted through copper twisted pair lines 38 via an Ethernet network switch 40 for managing data flow. One important feature of system 5 not yet discussed, is its closed-loop nature. Advertising is measured based on impressions (i.e., the number of times an advertisement is viewed). To quantify the number of impressions delivered by system 1 requires system feedback which is generated using elevator occupancy measurements. To provide feedback to system 1, each elevator display unit 10 includes an occupancy detector 42 for determining the number of occupants in a particular elevator throughout the day at predetermined time intervals (e.g., every 5 seconds). This information is summarized on a per building basis and uploaded via building server 28 to production center 20 once a day, typically during downtime periods. Production center 20 uses the feedback for billing and maintenance of a production center database 60 (FIG. 5). In particular, this feedback is used to update the advertisement impressions which are still to be displayed and for creating statistical traffic information for each building. This data is critical to the scheduling and advertisement sales process. Occupancy detector 42 utilizes sensors (not shown) to generate a pair of pulses when a passenger enters or leaves the elevator. The sensors are, for example, imbedded in the elevator doors. The pulse characteristics of the sensors define whether the passenger is entering or departing the elevator. Occupancy detector 42 maintains an occupancy count based on these sensors. Computer 34 samples the occupancy count periodically. Each elevator display unit 10, therefore, generates a daily occupancy history which is used in the advertisement billing process. Referring to FIG. 4, under the control of building server 28, display 13 is segmented so that specific types of information are exhibited within particular regions of the display. Display 13 includes an advertising banner section 44 for displaying advertising and other commercial information and a “real time” content section 46 for viewing general information. “Real time” content section 48 may, in turn, be divided into other sections, for example, exhibit story excerpts 50, one or more pictures 52 related to the excerpt, and descriptions of the pictures 54. For example, as shown here, elevator passengers are provided, in banner section 44, the day's breakfast specials from a cafe located, for example, in the first level of building 14. Simultaneously, news text of general interest is displayed within a story excerpt 50 along with a related picture 54. As stated above, a primary function of production center 20 is to create and distribute the elevator display data. Creation of the elevator display data includes merging of news, information, and advertising to produce the building-specific play lists 68. Distribution of the play lists is accomplished using the connectivity provided via Internet 24. Another important function of production center 20 is management and maintenance of a website for system 1. The website provides management of building 14 and a central location where potential advertisers can request information relating to advertising on the system. Elevator occupants can also access the website for additional information relating to both the displayed “real time” information or advertising information viewed on display 13 in elevator 12. For example, an occupant may not remember details of a particular advertisement (e.g., today's specials at one of the building's dining facilities) or may want to learn more about breaking a news story displayed in “real time” content section 48. Production Center Referring to FIG. 5, production center 20 includes a production center database 60, scheduling module 62, building loader 64, and billing and database maintenance module 66. In general, production center database 60 stores data related to advertising, “real time” content, and building parameters. Scheduling module 62 uses the data to produce play lists 68 for each building 14. As discussed above, a building play list 68 (FIG. 5) serves as the recipe used by building server 28 to create display presentations exhibited throughout the day. Scheduling module 62 also provides advertising and content usage information to billing and database maintenance module 66 which generates billing summaries and invoices 70 for each advertiser and “real time” content supplier. Billing summaries and invoices 70 are also stored for later retrieval in the production center database 60. Production Center Database Production center database 60 includes three basic types of data: 1) building characterization; 2) “real time” content, and 3) advertising content. Building characterization data is generated to establish a particular building's micro-demographic profile. Creating a micro-demographic begins with a building characterization process. The building characterization process consists of three components: 1) building geography—where is the building (city, state, region(s), etc.); 2) business segments—the building population is categorized into business segments (banking, insurance, financial services, law, advertising, real estate, etc.); 3) self learned—the system is able to learn building characteristics once installed. Peak travel periods (used to establish prime time periods) and average elevator occupancy (important in scheduling) are examples of self-learned characteristics. The results of the characterization process are stored as building characterization data in production center database 60 for use in the scheduling process and includes the information listed in Table I below. TABLE I Building Designation <Building ID> Building Location <Building Name> <Street Address> <City, State ZIP> Management Organization <Name> <Street Address> <City, State ZIP> Management Contact <Name> <Phone> Building Population <number of occupants> Building Classification <primary classification> <secondary classification> Regional Designation <Region ID> Local Designation <Local ID> Number of elevator displays <number> Number of lobby displays <number> Building hours From: <time of day> EST To: <time of day> EST Prime time periods From: <time of day> EST To: <time of day> EST Average elevator occupancy <number> Network Address <IP Address> Authentication <Authentication ID> Subscription Fee <$/month> Real Time Content <List of Content> Preferences The results of the characterization process are stored in production center database 60. The format of this data is described in the building characterization data section. Online content providers and advertisers create associations between their target audience and the buildings by specifying audience micro-demographics. The micro-demographics choices for the advertisers map one-to-one with the characterization categories for the buildings, shown in Table I therefore ensuring an association. As will be described below, a scheduling module maps the advertisements to the buildings via these associations As stated above, “real time” information (general information) is the data which is merged with advertising data to create elevator display data. To accomplish this, the content of the “real time” information must adhere to specific formats which represent segment sections 44, 46 of display 13 and describe the content 50, 52, 54 contained within those segments (FIG. 4). For example, for each “real time” content source 22 (FIG. 1), production center database 60 contains an entry describing the format type and locations for each content segment within that format. The format determines the number of segments for each entry. Locations are described using Universal Resource Locators (URLs). The database parameters maintained for each “real time” content source are shown below in Table II below. TABLE II “real time” Content Designation <RT ID> Source <Provider Name> <Street Address> <City, State ZIP> Source Contact <Name> <Phone> Refresh Interval <time> Format Designation <format ID> Content Segment 1 <URL> Content Segment 2 <URL> Content Segment N <URL> Advertising content data consists of two components. The first component defines when the advertisement must be run, the locations it is run, and for how long it runs. The second component describes where the advertisement is retrieved from and how it is inserted into the display. Consider the run parameters first. Advertisers will purchase advertising time on the system in units of Cost Per Thousand Impressions (CPM). Advertisers may further target specific demographics by requesting the advertising be distributed nationally, regionally, locally, or at a specific business segment. In addition, an advertisement campaign is likely to have time parameters as well. For example, the campaign may run for only two weeks with exposure required to be made between 10:00 AM and 1:00 PM each day. These concerns constitute the advertising run parameters. Equally important is the actual advertising content and how it is integrated into the system and displayed. The parameters that describe this information are the content parameters which include the advertising locator and format type. The database parameters maintained for each Advertising content source are shown below in Table III. TABLE III Advertisement Content Designation <ADVERTISEMENT ID> Source <Provider Name> <Street Address> <City, State ZIP> Source Contact <Name> <Phone> Undelivered Impressions <number> CPM <$> Advertisement Start Date <date> Advertisement Finish Date <data> Demographic Selector <micro-demographic> Prime Time Requirement <% of advertisement run time> Delivery Time <start time □ end time> Advertisement Format <format ID> Advertisement Locator <URL> Scheduling Module Scheduling module 62 has the primary function of creating building play lists by generating both advertising and “real-time” content from production center database 60 and then merging the content. Referring to FIG. 6, scheduling module 62 performs a first parsing step (100) to determine which buildings are potential targets for each advertisement in production center database 60. Scheduling module 62 utilizes information provided by the advertiser in an automated request entry process to generate an initial list 72 of buildings and advertisements which can be paired together. The entry process is available to advertisers using the production center website which provides an electronic entry form for allowing the advertisers to enter the required information needed to schedule an advertisement for viewing by a targeted demographic, business population. Alternatively, advertisers may provide the pertinent information through a phone interview, an application form, or a third party representative. Initial list 72 is further pruned in a second parsing step (102) using secondary criteria, such as advertisement start/finish dates, prime time requirements, delivery times, and impression parameters. The result of these pairing steps is an advertisement building-specific list 68 indicating advertisements and time intervals for when those advertisements could potentially be displayed. Next, scheduler module 62 considers “real time” content preferences for each building as set forth by building characterization data (see Table I) associated with that building (104). Using this information, a “real time” building specific list 76 of “real time” content is generated. With both the advertising content and “real time” content specified for a particular building, scheduler module 62 merges lists 74 and 76 to provide a building play list 68 (106). In particular, when merging the advertising and “real time” content for each building 14, scheduler module 62 considers the content format, time intervals, and advertisement distribution. Time intervals and advertisement distribution are considered first because they determine when an advertisement will be displayed and what “real time” content will accompany it. “Real time” content is presented at fixed intervals (e.g., every 30 seconds). As a result, scheduler module 62 will place the “real time” content first. Advertising placement is also subject to distribution and occupancy considerations. The commuting patterns of the network audience is always an important distribution consideration in effectively distributing a particular advertisement. For example, most people arrive to work, take lunch, and leave work within 30 minutes of the same time each day. Scheduler module 62 ensures therefore, that the same advertisement does not run within 30 minutes of when it ran the previous day for any given building. The result is a more uniform advertisement distribution within a building demographic. Advertising occupancy is another important consideration. Advertisements can be rotated quickly (e.g., every 15 seconds). Without a fully populated advertisement schedule however, system 1 would constantly rotate the same advertisement or a limited set of advertisements. This could be a potentially unattractive annoyance for elevator passengers. To eliminate this possible annoyance, scheduler module 62 lengthens the display period for each advertisement to make the transitions less noticeable. Once advertising and “real time” content has been defined for each time slot, scheduler module 62 creates the display. The format of the advertising and “real time” content is critical because it determines which of a variety of templates is selected to create the overall display. As has been described, both the advertising and “real time” content must adhere to one of a set of predefined formats. When both are merged together they are placed into a frame. Frames represent the template from which the final display is generated. Since content formats can vary, scheduler module 62 selects the appropriate frame type in order to merge them. The number of content formats is intentionally limited to simplify the merging process. With the time slot and frame type information defined, scheduler module 62 is able to construct building play list 68. Referring to FIG. 7, the format of a building play list 68 used to manage the assembly of both “real time” content data and advertising content is shown. Play list 78 includes a “real time” content section 80 which is generated directly from “real time” data within production center database 60 and defines refresh periods for the “real time” content. Play list 78 also includes an advertising content section 82 which defines the time as well as frame type used for the advertising content. Referring again to FIG. 5, production center 20 also includes a building loader 64 which serves as the interface between production center 20 and buildings 14 within system 1. Because communication with the buildings occurs over Internet 24, an inexpensive, yet broad distribution mechanism is provided. Unfortunately, Internet 24 also represents a path for potential system corruption. In consideration of this risk, system 1 is designed to require that each building server 28 request information from production center 20, rather than having production center 20 broadcast data. Building loader 64 performs an authentication procedure to ensure that the request is being made from a server associated with and recognized by system 1 for each building requesting a play list. Before being distributed, building loader 64 encrypts the play list to further protect the information from potential corruption. Billing and Database Maintenance Module Billing and database maintenance are also critical to the closed loop nature of system 1. As discussed above, scheduling module 62 generates building play lists based on micro-demographic parameters and the statistical probability a number of advertisement impression are made at a given time within a specific building. To close the system loop, elevator occupancy information is accumulated for each 14 building on a daily basis. This allows system 1 to adapt to changes in building characteristics to better distribute the advertising and content. A billing and database maintenance module 66 is used to provide this feedback to system 1. The two operations, billing and database maintenance, leverage the same processes, but deliver different outputs. The feedback process involves overlaying building play lists 68 onto the building occupancy numbers. From this process, the actual number of impressions can be calculated for each advertisement. The billing operation will use the information to create reports and invoices 70 for the advertisers. The database maintenance operation uses this data to update production center database 60 with the impressions for each advertisement yet to be delivered. That is, the number of “Undelivered Impressions” (see Table III) is updated. In addition, billing and database maintenance module 66 will further alter the building occupancy numbers to update the building characterization data. For example, billing and database maintenance module 66 may update fields labeled “Building hours”, “Prime time periods” and “Average elevator occupancy” (see Table I). Important feedback here is defining dead zones (times when there are few elevator passengers), peak viewing periods, and average elevator occupancy. These are important parameters used by scheduling module 62 in the scheduling process. Building Server In general, building server 28 interfaces with production center 20, caches advertising and “real time” content, develops elevator displays, and manages local area network 30. With reference to FIG. 8, building server 28 includes a production center/WAN (PCWAN) interface 90 which is responsible for communicating with production center 20 and the Internet 24. As previously described, each building 14 receives from production center 20 a play list 68 which defines the display content and time interval the display content is to be presented. Internet 24 is used to capture the “real time” content and transport the advertising information. “Real time” output from interface 90 is deposited into a local “real time” database 92 while advertising output retrieved from Internet 24 is cached in an advertising database 94. These represent local copies of the information retrieved via the Internet. Local copies are maintained in order to avoid latency problems which would realistically prohibit creating high performance display presentations including, for example, animation, streaming video, and movie effects. Updates to the databases are performed as needed as defined by the building play list. Assembly and display of the content is performed by an Display Generator/LAN (DGLAN) Interface 96 which interprets building play list 68 and assembles the specified content. The result is an HTML file, served via local area network 30 to each elevator display unit 10. Building server 28 also includes an occupancy database 98 for storing information relating to occupancy of the individual elevators 12 in the building. Production Center/WAN Interface Referring to FIG. 9, PCWAN interface 90 manages the interaction with Internet 24. Interaction with the wide area network (WAN) is generally initiated from the buildings in order to increase security within the system. PCWAN interface 90 includes a play list parser 110, which performs a translation to create local references for the advertising and “real time” content. The translation is required because all content displayed within building 14 is cached locally within databases 92, 94. Thus, the WAN-based URLs contained in the original play list are invalid. Parser 110 also interacts with an advertising content accumulator 112. Since advertisements are stored locally to the building, an accumulation process must take place to create this local store. Parser 110 initiates advertisement accumulation when it determines the play list contains an advertisement not currently available in the advertisement content database. The accumulator function will interface with the WAN to retrieve the missing content and store it in the database. The local URL for the advertisement is returned, which the parser writes to the local building play list. A similar operation takes place for “real time” content. In this case however, updates are performed based on a refresh period. The refresh period for “real time” content is defined in the building play list. Play list parser 110 passes the refresh period, the WAN based URL, and the “real time” database address to the “real time” proxy module 116. Proxy module 116 schedules the refresh cycles and interfaces with the WAN interface control 109 to retrieve the “real time” content. The content is stored based on the locator provided by parser 110. Display Generator/LAN Interface Referring to FIG. 10, Display Generator/LAN (DGLAN) interface 96 performs two distinct operations: 1) assembly and transfer of the display, and 2) occupancy data collection. With respect to the second of these operations, occupancy calculations play a very important role in the system. Advertising is measured in cost per thousand (CPM) impression increments. An impression is defined as someone being exposed to the advertisement. In system 1, advertisement exposures occur in elevators 12. To quantify the number of advertisement impressions displayed using system 1, a method for measuring elevator occupancy is required. The DGLAN Interface 96 accumulates measured information from each elevator and creates occupancy database 98 for each of buildings 14. An occupancy accumulator 130 extracts the measured data from each elevator during system downtime (typically at the end of the day). This information provides the elevator occupancy at constant intervals throughout the day. Occupancy accumulator 130 summarizes this information into a single list, which is passed to production center 20 for billing. Display assembly and transfer is the primary function of DGLAN Interface 96. Display assembly is dictated by local building play list 114 which uses the same format as building play list 68 of FIG. 5, except that the “real time” control parameters are deleted and all content locators (e.g., URLs) have been replaced by local equivalents. DGLAN Interface 96 includes a display format parser 120 and a display assembler 122. Display format parser 120 uses Hyper Text Markup Language (HTML) to build the framework for the display. HTML is used extensively on Internet 24 to develop display information and is easily understood by modern browser technology. Display format parser 120 generates the HTML template that is used, once it is populated, to create the actual display. Local building play list 114 defines the frame type. Display parser 120 interprets the frame type and generates an HTML file, specifying the physical attributes of the display. These attributes include the absolute position, size, and definition of each content segment. Missing from the template are the pointers to these content segments. Content segment pointers are generated by display assembler 122. Display assembler 122 is used in the final step of the display generation cycle. Display assembly is initiated based on the time intervals defined in the play lists. Each display is assembled and passed to a display server 124 as defined by its time indicator. Display assembler 122 parses the HTML template generated by the display format parser 120 to find the content segment definitions. The template will match the content segment definitions specified in play list 114. As a result, display assembler 122 inserts the location pointer for each content segment. When each content segment pointer has been inserted, the HTML file is ready to be passed to elevator display units 10. Elevator display units 10 are connected to the building server 28 via local area network 30. Display server 124 manages local area network 30 by retrieving the HTML file from display assembler 122 along with the “real time” and advertising content specified by the HTML. Display server 124 then translates this data into a display format compliant with elevator display units 10, encapsulates the translated data with a file transfer protocol and passes the encapsulated data to network switch 40 (FIG. 3) for broadcast. The task of retrieving the data from display assembler 122 is made more difficult by the great distances (e.g., >1500 feet) that separate building server 28 from elevator display units 11. Referring to FIG. 11, display server 124 and elevator display units 10 form networked host/display pairs, where elevator display 13 is merely an extension of the server display. The HTML file is interpreted by a browser 136 (e.g., Internet Explorer 4.0, a product of Microsoft Corporation). Browser 136, within the operating system (e.g., Microsoft Windows NT a product of Microsoft Corporation) used by building server 28, interfaces with a display driver 138 to communicate with hardware associated with display 13. Display data is extracted by a translator 140, which re-targets the data to elevator display unit 10 and display 13. This data is cached local to server 28 to reduce the effects of browser refresh delay. A network protocol encapsulation software module 142 extracts the data from the cache and adds a TCP/IP communication layer. The encapsulated data is passed to the network interface and transmitted through network switch 30 (FIG. 3) to the LAN. Further embodiments are supported by the following claims. For example, the distribution channel used by information distribution system 1 described above is the Internet 24. The Internet, or “web” provides a growing and existing infrastructure for obtaining information and establishing communication between computers. However, information distribution system 1 can also be implemented using other communication channels including cable modem, satellite, XDSL. Twisted pair lines 38, discussed above in conjunction with FIG. 4, can be replaced with other forms of transport media including fiber optic, coaxial lines, RF transmission). Moreover, in certain applications an asymmetrical digital subscriber line (ADSL) can be substituted for the Ethernet connection in local area network 30 in FIG. 3. Building Owner Manager (BOM) Interface The information distribution system 1 shown in FIG. 1 was described above as including a production center 20 which interfaces with building servers 28 to develop presentations of merged advertising and general information for display on elevator display units 10. As also stated above, system 1 can provide building owners and managers the ability to communicate with tenants resident in their building. As will be described immediately below, this capability is provided to building managers through a Building Owner Manager (BOM) interface. Referring to FIG. 12, for example, a BOM interface 200 is shown to include BOM interfaces (BOMGUI) 202 which communicate with one or more building subsystems 204 via distribution channel 24. Building subsystem 204 is shown to include building server 28, building LAN 30, and building display units 206 including elevator display units 10 mounted in elevators 12. Distribution channel 24, as shown in FIG. 1 was represented, for example, by the Internet. In this case, distribution channel 24 is shown to include other interconnection approaches, such as, a direct or indirect connection via a public building LAN 208, a dial-up modem 210, as well as an Internet Service Provider 209. It is important to note the distinction between public building LAN 208 and building LAN 30 of building subsystem 204. In particular, public building LAN 208 represents building management's own local area network for inter-office communication. Building LAN 30, on the other hand, is a private local area network, used exclusively for information distribution system 1. In general BOM interface 200 allows building managers to deliver messages to building tenants who can view the messages on the display units 10 mounted in elevators 12 as well as other displays 206 positioned throughout the building. Messages generated using a BOMGUI 200 are merged at the building server without interaction from production center 20. Thus, building managers are able to control the creation of the messages and deploy and modify the messages quickly. Examples of the wide variety of message types deliverable using BOM interface 200 include: Time critical messages including fire alarm testing, parking garage closures, changes to building hours, building-specific traffic information; Special Events such as holiday events, building activities; New building features/services including health club, cafeteria facilities, parking, coffee shop, florist; Public Address/Emergency messages including instructions for stuck elevator passengers, storm warnings, fire information; and Advertising messages such as announcements for available space, description of the management organization and their capabilities. BOM User Interface (BOMGUI) BOMGUI 200 represents the user portion of BOM interface 200 for providing an environment to building management to create, modify, and send messages to display units from literally anywhere in the world via nearly any of a wide variety of interconnection means. Referring to FIG. 13, BOMGUI 202 uses a template 212 to define message structure and format. Template 212 is based on HTML, thus providing a flexible and rich environment for its development. In one embodiment, template 212 fits in a 640×480 pixel format and utilizes a comment field <!-message text--> inserted where the message information is to be placed. The message text that populates the selected template is entered using BOMGUI 202. Text entry fields are provided which allow for tabs, carriage returns, and spaces, along with plain text information. BOMGUI 202 is also able to import already completed html files. This enables building owners and managers the ability to create special announcements and display them on the information system without using the template structure discussed immediately above. 1.1.1 Message Creation The message creation process requires that each of the fields of the template be populated. Within BOMGUI 202 this is accomplished in one of two ways. The first way uses a message creation wizard, a user-friendly program that takes the user through each step of the message creation process by prompting them for the required input as they populate each field. The second way uses a message entry form which may have been previously generated by the wizard and pre-stored to serve as a pattern for creating messages. This form contains all the message fields the user must populate and is typically used to edit an existing message. Using either approach, the result of the entry process is a valid message which can be displayed on the system. BOMGUI 202 converts the information from template 212 into a file, capable of being read and displayed on the display units of the system. As will be described below, BOMGUI 202 includes parsers for parsing the selected template file. A first group of parsers searches for the comment field <!-message text-->. When this field is located, a second group of parsers operates on the message text to convert this information into an HTML format. The result is an HTML output file with the name <message name>.htm. This file is submitted to building server 28 for display on the system. BOMGUI 202 also allows managers the ability to preview messages prior to being displayed within the elevator or other displays in the building. This process is repeated for each message that is created by BOMGUI 202. 1.1.2 BOM Play List Creation BOMGUI 202 allows building managers to create multiple messages for display in the building. These messages may be programmed to appear simultaneously or distributed throughout the week/month/year. Referring to FIG. 14, a BOM play list 220 includes a series of building messages 221, each of which is comprised of several elements: start date, stop date, period of day, message template, and message text. The start and stop dates determine when the message is first displayed by the system and when it will be removed from the system. The period during the day a message can be displayed is also selectable within BOMGUI 202. In one embodiment, the day is divided into four segments: AM Segment, Lunch Time (LT) Segment, PM Segment, and Sleep (SLP) Segment. These represent time slots within the day, and are system programmable. For example, the AM Segment may be defined as the time from 6:00 AM to 11:00 AM each day. The building manager may select a specific time period for the message to run or they can choose to have the message run all day. Thus, BOM play list 220 defines time periods when each message is displayed and for how long (e.g., month, year). The format of BOM play list 220 is similar to the building play list 68 created by Production Center 20 described above in conjunction with FIGS. 5-9. However, BOM play list 210 includes additional start and stop fields. BOM Play List 220 is created using BOMGUI 220 and is generated by individually stepping through each HTML output file message to determine the period of day and start and stop dates. The period of day is used to define in which time segments the message will appear. The start and stop dates are transformed directly into the BOM play list format. For example, the sample BOM play list shown in FIG. 14 indicates that bom_message1.htm is programmed to run in only the AM Segment between Jun. 12, 1998 and Jun. 13, 1998 while bom_message2.htm is programmed to run all day between Jun. 12, 1998 and Jun. 14, 1998. As stated above, BOMGUI 202 allows building management to send messages to displays from literally anywhere in the world. This is accomplished using off-the-shelf LAN and WAN technology available in most computers today. BOMGUI 202 includes a connection setup menu. The connection setup menu allows the user to define the method(s) for interfacing with the building subsystem through the distribution channel 24. Using the setup menu, the user can create multiple paths to send messages to building subsystem 204. For example, when residing in the building, the building manager may send messages via public building LAN 208. This same building manager may also need to use BOM interface 200 to send messages to the system from a remote location via a dial-up modem 210 connection or Internet Service Provider (ISP) 209. In each case, the building manager would simply define the connection information within BOMGUI 202, save it, and then choose the appropriate connection setup each time a message is sent. BOMGUI 202 automatically attends to establishing the connection, sending the message information, and disabling the connection each time messages are submitted. 1.2 Building Subsystem BOM interface 200 utilizes a BOM play list parser to parse BOM play list 220 in a manner similar to the manner used by play list parser 110 to parse building play list 68, as described above in conjunction with FIG. 9. Specifically, play list parser translates the BOM play list 220 to create local references for advertising or “real time” content. BOM interface 200 is also configured to permit building owners and building managers to create and deliver messages through building server 28 and building LAN 30 to a specific one or more of elevator display units 10. This flexibility is particularly useful, for example, for providing instructions to elevator passengers in a stuck elevator. As a result, building management can maintain communication with the stuck elevator passengers without alarming passengers riding in other elevators. In some embodiments, BOM interface works in concert with the production center/WAN interface 90 described above in conjunction with FIG. 9. 1.2.1 Play List Parsing/Development Referring to FIG. 15, in this case, the local building play list parsing function of building server 28 must be modified to receive messages from both a play list assembled by production center 20 and BOM play list 220. As described above in conjunction with FIG. 9, the operation of the play list parser 110 in the absence of a BOM Interface was to remap the URLs to the building database. With the addition of the BOM Interface, a play list parser 222 must now perform both a remapping and an interleave operation. Referring to FIG. 16, play list parser 222 is initiated (230) by an update to either Production Center (PC) building play list 68 or the BOM play list (232). If an update has not been made to either play list, parser 222 will await a predetermined period of time and then poll to determine a change in the update status of the play lists. On the other hand, if either play list has been updated, parser 222 then queries whether PC play list 68 has been updated (234). PC building play list 68 represents the baseline version of the local building play list 114. That is, local building play list 114 is derived from the starting point created from PC building play list 68. If building PC play list has been updated, parser 222 performs the URL remapping (236) described above with reference to FIG. 9. Following the URL remapping, parser 222 performs a second pass to interleave information from the BOM play list 220 into the updated PC building play list 68 (238). In other applications, BOM interface 200 is used independently by building managers as a means for communicating with their tenants without any interaction with a production center. In these applications, there is no PC play list within which the BOM play list interleaved. Thus, with reference to FIG. 16, play list 222 simply determines whether the BOM play list has been updated 232 and derives a local building play list 114 solely from BOM play list 220. The goal of the interleave function is to insert a programmed number of building manager messages every minute during the designated time period using a round robin priority scheme. The number of messages inserted per minute can be programmed from 0 to all available slots. Of course, prior to inserting a message parser 222 will verify that the current date and time fall within the start/stop dates and time period parameters of the message. An example will help illustrate the manner in which parser 222 functions. Assume a building manager has created and downloaded the BOM Play List shown in FIG. 14, via BOMGUI (202). If the current date is Jun. 12, 1998, and the slots per minute is set to 1, the parsers would produce a local building play list 114 shown in FIG. 17. Note that during the AM Segment, both bom_message1.htm and bom_message2.htm are interleaved into the PC building play list 68. Also note that these messages alternate in “round-robin” fashion within the AM time segment. During the LT, PM, and SLP time periods only bom_message2.htm is displayed. In these time segments, this message will appear every minute. 1.2.2 Message Storage/Transmission Unlike the Production Center path for content assembly described above in conjunction with FIG. 10, the pages created by BOMGUI 202 do not require modification by the building subsystem. However, the advertising component of the page will be subject to automatic assembly within the building. Referring to FIG. 18, BOMGUI 202 will deposit message files into a BOM Message Store 240. As display assembler 122 interprets the local building play list 114 it will look in the BOM Message Store 240 for all building messages. The advertisement associated with the message is defined by the play list and is inserted by display assembler 122 before being passed to Display Server 124. In embodiments in which building subsystem 204 interfaces with production center 20, a dial-up modem connection is typically used to establish the connection. To add the functionality of BOM Interface 200, system 1 may need to be equipped with a network card to allow interaction with private building LAN 30. If the BOM Interface physical interconnect is via dial-up modem 210 or ISP 209, a single modem interface is sufficient. This is accomplished via software running on both the BOMGUI 202 and at the production center 20 which performs retries and allows data multiplexing. The result is a minimal hardware implementation. 1.3 BOM Interface Security BOM Interface 200 represents a direct path into information system 1. As such, security for this interface is important to insure that inappropriate or unauthorized use is not allowed. The security procedures for the system are performed at three levels: BOMGUI password protection, secure connections, and password/access protection at the building subsystem. BOMGUI 202 performs a username and password check procedure prior to invoking the user interface. The passwords and usernames are encrypted and stored in a protected file. Only individuals with root privileges are allowed to manipulate this information. At the physical interconnect level, the path names and dial up properties are encrypted and only accessible by authorized personnel. Lastly, building subsystem 204 provides two layers of protection. First, user name and password verification is performed on every message request to the system. This insures that the security monitor of system 1 is aware of all licensed users. Secondly, the BOM message information is kept in a separate partition on the building server 28. This insures that an unauthorized user of the system is precluded from accessing other functions not associated with the system. This three phased approach should make it very difficult for any unauthorized access to the system to occur. In the embodiment described above in conjunction with FIGS. 13-18, BOM interface 200 enabled building owners and managers to create and send messages to display units 10 mounted in elevators (or other displays) throughout a building. In particular, BOMGUI 202 represented the user portion of the interface for allowing owners and managers to create, modify, and send messages to display units from literally anywhere in the world. Referring to FIG. 25, in another embodiment of a BOM interface 600, referred to here as “Screen Center Interface,” allows a Screen Center user 602 to create messages using any of a number of different commercially available standard desktop publishing tools (e.g., Microsoft® Power Point, Adobe® Photoshop). In particular, to support the highly scalable and flexible nature of the system, the Screen Center Interface includes a printer driver 604, which translates a desktop image generated using the desktop publishing tool 605 into a file format consistent with information distribution system 1. Printer driver 604 then makes a web connection to a remote web server 606 via a secured socket layer (SSL) path 608. A web browser 610 allows the user to schedule messages and determine the buildings in which the messages will appear. In all cases the buildings available for a given user are strictly controlled through user id and password protection. Once the message has been scheduled, web server 606 places the message in an FTP site directory at FTP server 612 for each building targeted by the message and recreates the screen center play lists. During the next retrieval cycle, the buildings will collect the screen center play lists and messages and build them into a local play list. An important element of this architecture is the ability of the system to have multiple messaging sources for any given building. Because the product is web based, owners of multiple properties can allow a local building manager, a regional manager or a marketing group to each have access to the messaging capability within the buildings. The user id and password protection restricts access on an individual basis, and also provides that different groups could get a greater or lesser share of the available message inventory. The intelligent building server takes care of interleaving the multiple message sources and providing the proper access to inventory. Generic Play List and Content Selection In the embodiments of the invention described above, the local building play list specifies the content used for each slot in the building programming. The content is retrieved from known sources to a central location on the building server. This content information is provided to the elevator displays based on the local building play list. Another embodiment of the method and system of the invention may be used to provide a building owner with greater flexibility in choosing the content and the mix of information displayed in the building. In this approach, information is still retrieved from known sources by content mapping. However, when the retrieved files are delivered to a processor in the building, such as, for example, a building server, a virtual hierarchy is added. The reason for this hierarchy is two fold. First, information is managed by category, and multiple sources of information may be present in a source directory in the content mapping file for a single category. As a result, the building server compresses the multiple sources from the source directory in the content mapping file into a single category to create the local play list for its particular building. Second, the building server creates the local play list by inserting into the list in circular, repeating series (referred to herein as round-robin) information from the source directory in the content mapping file for a particular category. This embodiment provides another layer of protocol to accommodate the dynamics of communicating with an elevator in a high-rise building. Referring to FIG. 19, an information distribution system 301 is shown that provides a media outlet for distributing video information to elevator display units 310 in a building subsystem 314. As noted above, the video information transmitted may include any combination of general, commercial and building related information. The system 301 includes a production center 320 with a network operations center (NOC) 325 that creates a generic play list 321 for each building 314. The generic play list 321 defines categories of video information 323 to be displayed at the elevator display units 310, such as national news, local sports, events, weather, traffic, and the like. Although the generic play list 321 defines a category or type of information that is to be displayed, it does not specify a content source 322 of information in that category to be retrieved via the distribution channel (here the Internet 324). A processor in the building, in this embodiment a building server 328, uses a content mapping file 329 to define the actual sources of information 322 specified by the categories of information in the generic play list 321. The processor in the building that accesses the content mapping file is not limited to a building server, but may also include, for example, a sufficiently powerful computer system in the elevator or in the electronic display unit 310. Building owners may then optionally add building information from the Building Owner Manager (BOM) play list 331 so that the processor may generate the local building content play list 368 and distribute to the elevator display units 310, for example via a building LAN 330. Generic Play List The generic play list 321 defines the density of information to be displayed in the building elevators and provides a script used to develop the local building play list 368. As noted above, the elements in the generic play list 321 are categories of information. These categories define the type of information that will eventually fill each element of the local play list 368. Unlike the content play lists in the embodiments of the invention described above, the generic play list 321 does not provide any specific pointers to files specifying sources of information, but includes only categories of information. Thus, an elevator passenger will not see a screen that has the same name as a slot in the generic play list. An example of a generic play list is shown in Table IV below. TABLE IV AMS,world_news AMS,national_news AMS,local_news AMS,weather AMS,national_sports AMS,local_sports AMS,local_restaurant LTS,national_business LTS,traffic LTS,weather LTS,local_business PMS,local_news PMS,local_events PMS,local_places PMS,traffic PMS,weather SLP,world_news SLP,national_news SLP,national_sports Much like the content play list shown in FIG. 6 above, the format of the generic play list 321 matches the day parts, or segments (AMS, LTS, PMS, SLP) with the categories of information (local_news, national_news, traffic, weather, etc.) to provide maximum flexibility for the programming manager developing the network schedule. The generic play list format described in Table IV also allows the programming manager to develop generic play lists 323 that target specific viewers. For example, a generic play list targeting buildings in the financial community may have a greater density of financial and market information than a generic play list that targets buildings primarily populated by the medical or legal community. The advantage of the generic play list format is that these targeted play lists can be applied across multiple markets. This is accomplished by the using the content mapping file 329 to target the generic play list 323 to a specific market or building. Content Mapping File The content mapping file 329 defines the sources of information 322 specified in the generic play list 321. The content mapping file 329 allows the building owner/manager to select a specific source of information 322 within a category of information in the generic play list 321 to create a unique viewing environment within an individual building. For example, the content map enables a building A to choose CNN as the world news source within the world news category of the generic play list, while a building B may choose Reuters as the world news source within that category, and a building C may select CNN, New York Times, and Reuters as their world news sources. This approach allows maximum flexibility to the building owner/manager while requiring very little additional overhead at the production center 320. An example of a format for the content mapping file is shown below in Table V. TABLE V <category>,<information path>,<refresh cycle> world_news,ftp::/cnn.com/captivatenetwork/news,4320 world_news,ftp::/reuters.com/captivatenetwork/worldnews,4320 weather,ftp::/captivatenetwork.com/weather/boston,40 national_news,http::/boston.com/captivatenetwork/news,1440 The first element of the content mapping file 329 shown in Table V, <category>, identifies the category in the generic play list being mapped. For the example above, the first line indicates a single mapping to the world news category, world_news. However, any given category is not limited to a single mapping, and may include multiple mappings. The second element, <information path>, identifies the information path, which is the mapping performed by the content mapping file 329. During the content retrieval process described below, the building server 328 will use the information path designation to make an FTP or HTTP request to retrieve an actual file or files for the data source in the specified category. The last component of the content mapping file 329, <refresh cycle>, signifies the assignment of date information to a particular file or category. For example, a stale data time designation defines, in minutes, how often the data in a category needs to be refreshed before the server marks it as stale. In the example of Table V the content mapping file 329 is illustrated as a file, but the content mapping file may actually not be a file at all. If a Windows NT based server is used, the content mapping file could actually be a series of registry keys manipulated by the building server service. The content mapping file may also include information in a text or configuration file. In addition, the content mapping file concept may optionally be included in the generic play list. A sample file format for this case is as follows: Segment, category, information path, refresh cycle However, the separation of these data enhances flexibility and simplifies the content development process. In the present application, the content mapping file 329 will be assumed to be a file with the format described above. Content Retrieval With the content mapping file 329, the building server 328 has the information needed to retrieve the files necessary for building the local play list 368. The generic play list 321 sent from the production center 320 does not define any specific files referencing source information or where they are placed. Instead, a slot in the generic play list 321 defines only the category of information. The building server 328 chooses from a source directory 327 in the content mapping file 329 which file is played in that slot based on a continuously repeating series (round robin) pick of all the available files in the source directory 327 for that category. The round robin selection is based on category file lists built and maintained during the content retrieval process 400 illustrated in FIG. 20. This content retrieval process includes three principal steps: directory enumeration, qualification, and retrieval. In the directory enumeration step 400, the building server 328 (See FIG. 19) identifies what files are located in a source directory 327 in the content mapping file 329, and when the identified files were last modified. The building server 328 uses the path information specified in the content mapping file 329 to sample the contents of each source directory 327. The file names and modification dates for each file in the source directory are extracted and supplied to the qualification step 404. In the qualification step 404, the building server 328 determines whether a file identified in the enumeration step 402 is a candidate for retrieval. Qualification for retrieval requires that the identified file either: (1) does not currently exist on the local building server 328; or (2) if the identified file does exist on the local building server 328, the identified file has a modification date that is earlier than the file in the source directory 327. Another important aspect of the qualification step 404 is the determination whether the local play list needs to be re-generated. The local play list must be regenerated if the qualification process determines that the file being retrieved is new. Updates of an existing file do not require re-generation of the local play list. If the file qualifies for retrieval, the file is retrieved and downloaded in the file retrieval step 406, which is explained in detail below. File Download, File Validation, and List Update The content retrieval process 406 includes a file download step 408, a file validation step 410, and a list update cycle 412. The download step 408 brings the information files to the local building server 328 (See FIG. 19). The file validation step 410 insures the integrity of the data brought to the building server 328. The category file list update process 412 manipulates the category file lists 413 to reflect changes associated with the downloaded data. File Download Depending on the transfer protocol specified by the content mapping file 329, the file download is performed by either an FTP fetch or an HTTP get operation. The file is downloaded to a TEMP directory in an information file storage area 414 on the building server 328. Once the transfer is complete, the file validation process 410 can be performed. File Validation and Extraction Each file transferred during the file download step 408 is encapsulated within a protocol header. The protocol header represents a communication mechanism with multiple levels of functionality designed to enhance programming flexibility. The protocol header may be designed to, for example, ensure data integrity, provide network security, and activate or deactivate files at the server. An example of a file header format is shown below in Table VI. TABLE VI Security ID Number of Files File List Checksum The security identification (ID) in the protocol header of Table VI provides a level of network security for file transfers. Referring to FIG. 21, following an initiation step 420, the first step 422 in the validation cycle 410 is to verify the security ID. The security ID is calculated by performing an exclusive OR (XOR) function with the File Size, Checksum, and a key value. The key value is defined by a registry key on the building server 329 and is common with the program that develops the protocol header of Table VI. The inability to validate a security ID for any given file represents a potentially serious security risk. If the security ID cannot be validated, the building server 329 will send a level one error message in step 424, through logging, back to the network operations center (NOC) 325 (See FIG. 19) for immediate investigation. The next level of validation is performed at step 426 using the checksum. The program that develops the protocol header of Table 6 calculates the checksum. The building server 329 will calculate its own checksum based on the received file and verify the two values match. If they do not match, the building server will terminate the retrieval process and send a level 2 error message in step 428, through logging, back to the NOC 325 for investigation. If the file is validated, the file information is extracted (step 430) and placed in a FRAMES directory in the building server 329 (step 432). Once all files are extracted (step 434), the validation cycle ends (step 436). The protocol header of Table 6 may also allow multiple files to be placed within the protocol. This arrangement provides tremendous flexibility by allowing the building server 329 to capture multiple sources of information and develop the local play list 368 from the generic play list 321 (See FIG. 19). Unfortunately, the placement of the multiple retrieved files is random, meaning one file is not guaranteed to appear next to another. The multi-file protocol allows retrieved files to be placed next to each other in the play list. The protocol operates as shown in Table VII: TABLE VII If Number of Retrieved Files is greater than 1, then Extract each file individually and mark them as a bundle else If Number of Retrieved Files is equal to 1 Extract the file and mark it as a single entry End While not exemplified in the protocol header discussed above, the protocol header may be extended to include activation and deactivation times for each file. Once a file is transmitted to the server, the activation/deactivation elements in the header allow the building processor to control the start and end times for each file so that files in the same information category may run at different times during the day. This expansion of the role of the building processor provides great flexibility and simplified file management at the network operations center 325. Category File List Update Following the source check in step 410, the category file lists 413 are updated in step 412. The category file lists 413 hold pointers to the files that make up each content category. Instead of subdividing the directory structure in the building server 329 into separate content categories, it is far more efficient and useful to keep the file structure flat and use lists to manage the data. The structure of the category file lists is shown below in Table VIII. Category TABLE VIII File Modification Date File Present Flag Bundle flag Stale flag In the structure in Table VIII, the category maps to the category element in the content mapping file 329 (See FIG. 20 and Table V). The file field represents the file names extracted from the source directories. The last modification date and stale flag are important for the stale data recovery algorithm, which is described below. The file present flag indicates whether the file was still present in the source directory during the last content retrieval cycle. This is important for the cleanup process. Finally, the bundle flag is used to force files to be placed in succession within the local play list. The bundle flag is actually an alphanumeric value having the following possible states shown in Table IX: TABLE IX Off - The file is not a part of a bundle Start - This is the first file in a bundle Element - This is one of the middle files in the bundle End - This is the last file in the bundle As with the protocol header discussed above, the category file list definitions may also be expanded to include an activation or deactivation time to transfer file run time control fully or partially from the network operations center to the building processor. This enhances programming flexibility. The process 412 (See FIG. 20) for updating the category file lists 413 consists of category creation, file insertion, and file maintenance steps. Category Creation and Removal A category file list must exist for each category defined in the content mapping file 329. Therefore, referring to FIG. 22, the first element 440 in the update process 412 is the category creation and removal procedure. During the category creation and removal procedure 440, the building server 328 will interrogate the content mapping file 329 and add any category file lists 413 that are not present or delete any category file lists 413 that are present, but not defined in the content mapping file 329. File Insertion As the retrieval process 406 enumerates each source directory and qualifies the files, any file that is not present on the building server 328 must be retrieved and validated and then placed in a category file list 413. The retrieval and validation process considers two elements: (1) does the file exist in the FRAMES directory on the server 328; and, (2) is it in the category file list 413. If the file exists in the FRAMES directory on the server 328, it will not be retrieved. However, if the file is not in the category file list 413 it must be inserted. Specifically, if the file is not in the FRAMES directory on the server 328, the file will be retrieved, validated and then inserted into the category file list in step 442. The category file lists are ring buffers, therefore, the new file is added to the end of the list. The building server will then capture the modification date, set the present flag, and mark the bundle flag appropriately. File Maintenance During the retrieval and qualification steps 406, 410, if it is determined that a file has been modified or is unchanged, then a category file list maintenance event 444 must take place. The maintenance activity 444 considers the elements of the category file list: the modification date, the stale flag, and the file present flag. These flags are used by the cleanup and recovery functions at step 450, which is described below. Each time a file is modified, the building server 328 must update the modification date, clear the stale flag, and mark the file present flag to indicate the file is still valid. For unchanged files, the building server 328 will simply mark the file as present. Cleanup and Recovery Cleanup and recovery are important elements of the content management process. Referring again to FIG. 20, the cleanup and recovery process 450 insures that files, which are no longer active in the play list, are removed from the FRAMES directory in the building server 328. This keeps the FRAMES directory from growing out of control during the course of weeks and months of operation. The cleanup portion of the process 450 requires examination of the file present flag for every file in each category file list. If the file is not set, the file is deleted from the frames directory and the category file list, and the local play list is rebuilt at step 452. If the file present flag is set, the flag is removed in preparation for the next content retrieval cycle. The recovery portion of the step 450 is used to manage stale data. Each category of information has a refresh cycle (See Table 5 above). Stale data occurs when the modification date for a file exceeds the refresh rate for that category. Following the content retrieval and cleanup steps 406, 410, recovery is performed on each file in the category file lists. If a file is found to be stale, the building server 328 will set the stale flag for the given file, and rebuild the local play list at step 452. The stale flag is reviewed during the local play list development process to determine whether the file is included in the local play list. The building server 328 may also generate a level 2 error, through logging, to alert the NOC of the situation (not shown in FIG. 20). Once the file is updated and meets the refresh requirements for the category, it can again be placed in the local play list. The power of this stale data recovery algorithm is that it insures the local play list can self heal if the building server 328 loses communication with the Internet. Once the cleanup and recovery step 450 has concluded, the content retrieval process ends at step 452. Local Play List Development Referring to FIG. 23, local play list development 500 is the process in which the generic play list is made into the building specific local play list. Marrying the category file lists with the generic play list, and then incorporating screen center messages from the building play list performs the transformation. There are a number of triggering events 502 that can initiate the development of the local play list 368. Examples include addition of a content file, a new building play list for screen center messages, a new generic play list, content file removal, and stale file removal. Once the local play list development process 500 is triggered it performs a two step operation. First, the generic play list is converted to a content play list via the content slot assignment process 504. The content play list is then transformed into the local play list by the screen center slot assignment function 506. Content Slot Assignment Content slots are assigned in step 504 by expanding the generic play list 321 to fit the entire 24 hour day and then placing content by category in a round robin fashion. Referring to FIG. 24, this is done in two passes to create the first pass of the content play list. First, the generic play list 321 is expanded at step 505. This expansion rotates the category assignments in the category file lists 413 into a segmented 24-hour period with an AM segment, an LT segment, and a PM segment. Second, the category definitions within the generic play list 321 are simply repeated in step 507, on a per-segment basis, to fill each 10-second time slot within the content play list. Once the generic play list is expanded to the full day, the first pass of the content play list 510 is complete and the process of inserting the content files can be performed. Replacing the generic content assignments with real content file names is done using the category file lists 413. The fill process step is performed in a round robin fashion using the algorithm shown in Table X below. TABLE X Start at time 00:00:00 in content play list Step 1: Locate category file list for category specified in content play list IF category file list is empty Remove slot in content play list Else IF stale flag not set for current file in category file list Replace category name in content play list If bundle flag = start Continue to add the files from category file list to the content play list until the bundle flag = end is found Endif Else Find the next file entry in the list that is not marked as stale and insert this file name into content play list. If all files are marked stale in the category, then remove the category from content play list. Endif Endif If not end of content play list Goto to next entry in content play list and repeat step 1 Endif If activation and deactivation times are used, the algorithm in Table X above would be modified to include a test on each file to verify that the current time falls within the activation and deactivation times of the candidate files within the category file list. The algorithm described in Table X will create the content play list 510. This play list is then modified in the screen center slot assignment step 506 to include the building owner-manager (BOM) play list 512 messages to produce the local building play list 368. Using the local building play list, video information is distributed at step 514 by the building server via the building LAN 330 to the elevator display units 310. Still further embodiments are within the claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to providing information in an elevator and other such personnel transport vehicles. The impetus for constructing skyscrapers and other high-rise structures lies in providing a more efficient use of real estate, particularly in urban areas where the value of real estate is at a premium. The primary mode of transportation in such structures is the elevator, particularly in buildings having many floors. Visual information provided in an elevator is generally limited to floor information and passenger instructions in the event of emergency or if assistance is required. An elevator may also include a static placard posting the day's present and their locations.
<SOH> SUMMARY OF THE INVENTION <EOH>This invention features a system for displaying video information to passengers of an elevator in accordance with a play list defining a sequence of messages. The video information messages can include combinations of digital advertising, “real-time” general information, as well as, building-related information. In one aspect of the invention, the system includes an elevator display unit having a display monitor for displaying video information to the passengers, and a local server which, receives scheduling information associated with the video information over a data communication path and, in accordance with the scheduling information, generates a play list used to display at the elevator display unit. In another aspect of the invention, a method of providing general information and commercial information within an elevator includes the steps of: a) providing to a local server, scheduling information associated with video information to be displayed; b) generating, from the scheduling information, a play list associated with the video information; and c) generating a display for viewing at the elevator display unit within the elevator, the video information at predetermined times in accordance with the scheduling information. In yet another aspect, the invention is a method of providing video information to a display monitor within an elevator located in a building. The method includes receiving first data defining a category of video information, receiving second data, associated with the category of video information and defining at least one source of the video information; and retrieving from the source, over a data communications path and on the basis of the first data and the second data, the video information to be displayed on the monitor within the elevator. The invention also extends to a system for providing video information by this method. By “video information”, it is meant any combination of general, commercial, and building-related information. By “commercial information”, it is meant any information relating to commerce and trade including advertisements. “General information” is used here to mean information of general interest, including news (recent happenings, sports, entertainment, etc.) and weather. General information can also include information associated with the building within which the elevator is a part, for example, 1) events associated with the building; 2) traffic; 3) transportation schedules (e.g., train/shuttle services). By “building-related information”, it is meant that information specifically related to the particular building where the elevators transport residents, tenants, and visitors of the building. The building-related information may include certain types of commercial information, such as advertising for businesses within or local to the building (e.g., coffee, shop, parking, florist), as well as announcements by building management for available space within the building. The building-related information can also include forms of general information, particularly relevant to the building and its elevator passengers. For example, such information can include building activities (e.g., holiday events, fire alarm testing), public address/emergency messages, traffic information, and other information useful to the elevator's passengers. In general, the building-related information is less limited by the type of information, and more by its geography. With this system, advertisers, online content providers, and building management/owners can interact with a specific, well-defined, and targeted audience in an elevator, a setting where passengers often feel uncomfortable being confined with complete strangers. Elevator passengers often seek ways to avoid making eye contact with fellow passengers during what feels like an endless, unnerving duration of time. Passengers no longer need to stare aimlessly at the floor or ceiling, but have an informative media resource to watch. Occupants of high-rise office buildings are typically business people with understood interests and buying tendencies. These people are ideal recipients for targeted content and advertising. The system allows content providers (e.g., local and national news sources) and advertisers to selectively target audiences based on the demographics of a building, city, region, business segment, etc. Similarly, national, regional, and local online content providers are afforded an opportunity to provide elevator passengers with information of general interest. The system also provides building owners and managers the ability to provide video information particularly relevant and useful to tenants and visitors of their buildings. Embodiments of these aspects of the invention may include one or more of the following features. The local server receives the scheduling information from the production server over a data communication network (e.g., the Internet). The system also includes a production server which generates scheduling information associated with the general and commercial information. Thus, the production server serves as a central distribution site where, among other things, the scheduling information (e.g., building play lists or scripts) are generated. The production server includes a production server database for storing building-related data, general information-related data, and commercial information-related data. This database includes, for example, building characterization data, as well as the addresses from where the general and commercial information can be retrieved over the data communication path. The production server includes a scheduling module, which retrieves the data from the production server database and generates the scheduling information and a building loader interface through which data is passed between the production server and the local server. The building loader interface encrypts the data passed between the production server and the local server and authenticates that the local server is one associated with the system. The production server includes a billing module, which generates documentation relating to the duration of time the general information and commercial information is displayed at elevator display unit. A database maintenance module is also included within the production server to update the production center database with information relating to elevator occupancy as a function of time. The local server communicates with the elevator display unit via a local area network including local and general information databases and a scheduling information parser. General information and commercial information retrieved over the data communication path are cached in respective ones of the local and general information databases. The scheduling information parser generates a local building play list from the scheduling information retrieved from the production server. The local area network includes an Ethernet path for connection to the elevator display unit. The elevator display unit further includes an occupancy detector for determining, at predetermined intervals, the number of occupants riding within a particular elevator. Generating the elevator play list is performed with a graphical user interface. For the BOM interface, the video information includes a text message (e.g., in HTML format) and the play list includes a start date on which the text message is displayed on the display monitor; an end date on which the text message is displayed on the display monitor; and a day segment indicating a portion of a day the text message is displayed on the display monitor. The user interface is remote from said local server and communicates with said local server over a data communications path, such as the Internet, a dial-up modem, or a local area network. The play list is a building operations play list, with the video information and scheduling information for generating the building operations play list relating to building operations. The local server further receives a production server play list from a production server, remote from said local server, over a data communication network, said production server play list associated with general and commercial information for display on the display unit. The local server includes a parser, which generates a local building play list from the production server play list and the building operations play. Other features of the invention will be apparent from the following description and from the claims.
20040312
20071009
20060706
66186.0
B66B134
1
SALATA, ANTHONY J
INFORMATION DISTRIBUTION FOR USE IN AN ELEVATOR
UNDISCOUNTED
1
CONT-ACCEPTED
B66B
2,004
10,800,196
ACCEPTED
Semiconductor constructions, and methods of forming semiconductor structures
The invention includes semiconductor structures having buried silicide-containing bitlines. Vertical surround gate transistor structures can be formed over the bitlines. The surround gate transistor structures can be incorporated into memory devices, such as, for example, DRAM devices. The invention can be utilized for forming 4F2 DRAM devices.
1. A method of forming a semiconductor structure, comprising: providing a semiconductor substrate having a first doped semiconductor region and a second doped semiconductor region over the first doped semiconductor region, one of the first and second doped semiconductor regions being a p-type region and the other being an n-type region; forming a trench extending through the second doped semiconductor region and into the first doped semiconductor region, the trench having a sidewall comprising the first and second doped semiconductor regions; forming a silicide from the trench sidewall, the silicide being within the second doped semiconductor region and not within the first doped semiconductor region; and forming electrically insulative material within the trench to cover the silicide. 2. The method of claim 1 wherein the electrically insulative material is a second electrically insulative material, the method further comprising: forming a first electrically insulative material within the trench to partially fill the trench, the partially-filled trench being filled to above an elevational level of an uppermost portion of the first doped semiconductor region along the sidewall; forming a metal-containing layer within the partially-filled trench and along the second doped semiconductor region of the sidewall; and reacting at least some of the metal from the metal-containing layer with the second doped semiconductor region of the sidewall to form the silicide. 3. The method of claim 2 wherein the metal-containing layer comprises one or more of Co, Ni, Ta, W and Ti. 4. The method of claim 2 wherein the first and second electrically insulative materials are the same as one another in chemical composition. 5. The method of claim 4 wherein the first and second electrically insulative materials both comprise silicon dioxide. 6. The method of claim 4 wherein the first and second electrically insulative materials both consist of silicon dioxide. 7. The method of claim 1 wherein the first doped semiconductor region is the p-type region. 8. The method of claim 1 wherein the first doped semiconductor region is the n-type region. 9. The method of claim 1 wherein the first and second doped semiconductor regions comprise conductively-doped silicon. 10. The method of claim 1 wherein the first and second doped semiconductor regions comprise conductively-doped monocrystalline silicon. 11. The method of claim 1 wherein the first and second doped semiconductor regions consist essentially of conductively-doped monocrystalline silicon. 12. The method of claim 1 wherein the first and second doped semiconductor regions consist of conductively-doped monocrystalline silicon. 13. The method of claim 1 further comprising incorporating the silicide into a bitline. 14. A method of forming a semiconductor structure, comprising: providing a semiconductor material having a trench extending therein; forming a first electrically insulative material within a bottom portion of the trench to partially fill the trench, the partially-filled trench having a sidewall comprising the semiconductor material; incorporating the semiconductor material of the sidewall into a silicide, the silicide being a line extending along the trench; and filling the trench with a second electrically insulative material to cover the silicide. 15. The method of claim 14 further comprising incorporating the silicide line into a bitline. 16. The method of claim 14 further comprising: forming a metal-containing layer over the substrate, within the partially-filled trench and along the sidewall; and forming the silicide from metal of the metal-containing layer by reacting metal from the metal-containing layer with the semiconductor material of the sidewall. 17. The method of claim 14 further comprising: forming a metal-containing layer over the substrate, within the partially-filled trench and along the sidewall; forming the silicide from metal of the metal-containing layer by reacting some of the metal from the metal-containing layer with the semiconductor material of the sidewall, some of the metal of the metal-containing layer not reacting to form the silicide; and removing the unreacted metal of the metal-containing layer. 18. The method of claim 14 wherein: the semiconductor material comprises a first doped region and a second doped region over the first doped region; one of the first and second doped regions is a p-type region and the other is an n-type region; the trench extends entirely through the second doped region and has a portion extending within the first doped region; and the first electrically insulative material entirely fills the portion of the trench that is within the first doped region. 19. The method of claim 18 wherein the first doped region is the n-type region. 20. The method of claim 18 wherein the first doped region is the p-type region. 21. The method of claim 14 wherein the first and second electrically insulative materials are the same as one another in chemical composition. 22. The method of claim 14 wherein: said sidewall is one of a pair of opposing sidewalls within the partially-filled trench; the silicide line is a first silicide line; semiconductor material of the other of said pair of opposing sidewalls is incorporated into a silicide to form a second silicide line extending along the trench; and the second silicide line is spaced from the first silicide line. 23. A method of forming a semiconductor device, comprising: providing a semiconductor substrate, the semiconductor substrate having a semiconductive material surface; forming a trench extending into the substrate; forming a silicide line along a sidewall of the trench; depositing a first electrically insulative material within the trench to cover the silicide line; forming a patterned second electrically insulative material over the silicide line and the first electrically insulative material; the patterned second electrically insulative material having an opening extending therethrough to expose a portion of the semiconductive material surface of the semiconductor substrate; forming a pillar of conductively-doped semiconductor material within the opening; and replacing at least some of the second electrically insulative material with a conductive material. 24. The method of claim 23 wherein the semiconductor substrate comprises a monocrystalline semiconductor material along said surface, and wherein the pillar of conductively-doped semiconductor material is epitaxially grown from the monocrystalline semiconductor material of the substrate. 25. The method of claim 24 wherein the monocrystalline semiconductor material of the substrate comprises silicon. 26. The method of claim 24 wherein the monocrystalline semiconductor material of the substrate consists of silicon. 27. The method of claim 24 wherein the pillar of conductively-doped semiconductor material is doped to comprise a first type region between a pair of second type regions, with one of the first and second types being n-type and the other being p-type. 28. The method of claim 27 wherein the first type region is the n-type region. 29. The method of claim 27 wherein the first type region is the p-type region. 30. The method of claim 23 wherein: the substrate comprises a first doped region and a second doped region over the first doped region, one of the first and second doped regions being p-type and the other being n-type; the trench extends through the second doped region and into the first doped region; and the silicide is within the second doped region and not within the first doped region of the substrate. 31. The method of claim 30 wherein the first doped region is the p-type region. 32. The method of claim 30 wherein the first doped region is the n-type region. 33. The method of claim 23 wherein: the substrate comprises a first doped region and a second doped region over the first doped region, one of the first and second doped regions being p-type and the other being n-type; the trench extends through the second doped region and into the first doped region; a filler material is formed within the bottom of the trench prior to forming the silicide; the filler material completely fills a portion of the trench which extends into the second doped region; a metal-containing layer is formed within the trench and over the filler material; and metal from the metal-containing layer is reacted with substrate of the second doped region to form the silicide. 34. The method of claim 23 wherein: the pillar of conductively-doped semiconductor material comprises a channel region between a pair of source/drain regions; the conductive material which replaces at least some of the second electrically insulative material comprises a transistor gate which gatedly connects the source/drain regions to one another through the channel region and is incorporated into a wordline; and the silicide is electrically connected with one of the source/drain regions and is incorporated into a bitline. 35. The method of claim 34 wherein said one of the source/drain regions which is electrically connected with the silicide is a first source/drain region, wherein the other of the source/drain regions of the pair of source/drain regions is a second source/drain region and is electrically connected with a capacitor, and wherein the combination of the transistor gate, capacitor, source/drain regions and channel regions forms a DRAM unit cell. 36. The method of claim 35 wherein the DRAM unit cell is formed simultaneously with a plurality of other DRAM unit cells and incorporated with said other DRAM unit cells in a DRAM array. 37. The method of claim 36 further comprising incorporating the DRAM array within an electronic device. 38. A method of forming a semiconductor memory device, comprising: providing a semiconductor substrate, the semiconductor substrate having a semiconductive material upper surface; forming a trench extending through the upper surface and into the substrate; forming a silicide bitline along a sidewall of the trench; depositing a first electrically insulative material within the trench to cover the bitline; forming a patterned second electrically insulative material over the bitline and first electrically insulative material; the patterned second electrically insulative material having an opening extending therethrough to expose a portion of the semiconductive material upper surface; forming a vertically-extending pillar of conductively-doped semiconductor material within the opening, the pillar being doped to comprise a pair of first type source/drain regions on vertically opposed sides of a second type channel region, one of the first and second types being p-type and the other being n-type, the pair of source/drain regions being a first source/drain region and a second source/drain region, the first source/drain region being in electrical connection with the bitline; forming a gate dielectric around the pillar; replacing at least some of the second electrically insulative material with a conductive wordline material, the conductive wordline material laterally surrounding the pillar and being separated from the pillar by the gate dielectric; and forming a charge storage device in electrical connection with the second source/drain region. 39. The method of claim 38 wherein the charge storage device is a capacitor. 40. The method of claim 39 wherein the capacitor, source/drain regions and channel region are together incorporated within a DRAM unit cell. 41. The method of claim 40 wherein the DRAM unit cell is one of a plurality of DRAM unit cells which are formed utilizing the same processing as one another. 42. The method of claim 41 wherein the DRAM unit cell is one of a plurality of DRAM unit cells which are formed utilizing the same processing as one another. 43. The method of claim 42 further comprising incorporating the plurality of DRAM unit cells into an electronic system. 44. The method of claim 38 wherein the opening extending through the second electrically insulative material to the exposed portion of the semiconductive material surface is a second opening, the method further comprising: forming an etch stop material over the substrate; forming the second electrically insulative material over the etch stop material and patterning the second electrically insulative material to form the patterned second electrically insulative material having a first opening extending therethrough to the etch stop, the second electrically insulative material forming a periphery of the opening; forming an anistropically etched spacer along the periphery to narrow the first opening; and extending the narrowed first opening to the semiconductive material upper surface to form the second opening. 45. The method of claim 44 wherein the second electrically insulative material is formed directly against the etch stop. 46. The method of claim 44 further comprising forming a low-k dielectric material over the substrate and forming the etch stop over and directly against the low k dielectric material. 47. The method of claim 46 wherein the low-k dielectric material comprises silicon dioxide and wherein the etch stop comprises one or both of aluminum oxide and hafnium oxide. 48. The method of claim 44 further comprising, after forming the vertically-extending pillar: selectively removing the anistropically-etched spacer relative to the second electrically insulative material to form a space between the second electrically insulative material and the vertically-extending pillar; and forming the gate dielectric within the space. 49. The method of claim 48 the gate dielectric comprises silicon dioxide, wherein the vertically-extending pillar comprises silicon, and wherein the gate dielectric is formed by exposing a surface of the vertically-extending pillar to oxidizing conditions. 50. The method of claim 48 the gate dielectric consists of silicon dioxide and is formed by depositing silicon dioxide along a surface of the vertically-extending pillar. 51. The method of claim 48 the patterned second electrically insulative material comprises silicon dioxide and wherein the anisotropically-etched spacer comprises silicon nitride. 52. A semiconductor construction, comprising: a first doped semiconductor region; a second doped semiconductor region over the first doped semiconductor region, one of the first and second doped semiconductor regions being a p-type region and the other being an n-type region; an isolation region extending entirely through the second doped semiconductor region and partially into the first semiconductor region; and a silicide line extending along and directly against the isolation region, the silicide line being entirely contained between the isolation region and the second doped semiconductor region. 53. The construction of claim 52 wherein the first and second doped semiconductor regions are the n-type and p-type regions, respectively. 54. The construction of claim 52 wherein the first and second doped semiconductor regions are the p-type and n-type regions, respectively. 55. The construction of claim 52 wherein the first and second doped semiconductor regions both consist of doped silicon. 56. The construction of claim 52 wherein the first and second doped semiconductor regions both consist of doped monocrystalline silicon. 57. The construction of claim 52 wherein the isolation region comprises silicon dioxide. 58. The construction of claim 52 wherein the silicide is selected from the group consisting of cobalt silicide, nickel silicide, titanium silicide, tungsten silicide, tantalum silicide, and mixtures thereof. 59. A semiconductor construction, comprising: a first doped semiconductor region; a second doped semiconductor region over the first doped. semiconductor region, one of the first and second doped semiconductor regions being a p-type region and the other being an n-type region; an isolation region extending entirely through the second doped semiconductor region and partially into the first doped semiconductor region, the isolation region being a line having a pair of opposing sidewalls, one of the sidewalls being a first sidewall and the other being a second sidewall; a first silicide line extending along and directly against the first sidewall, the first silicide line being in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first doped semiconductor region; and a second silicide line extending along and directly against the second sidewall, the second silicide line being in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first doped semiconductor region. 60. The construction of claim 59 wherein the first and second silicide lines are entirely contained between the isolation region and the second doped semiconductor region. 61. The construction of claim 59 wherein the first and second doped semiconductor regions are n-type and p-type, respectively. 62. The construction of claim 59 wherein the first and second doped semiconductor regions are p-type and n-type, respectively. 63. The construction of claim 59 wherein the isolation region comprises silicon dioxide. 64. The construction of claim 59 wherein the isolation region is a single homogenous composition. 65. The construction of claim 59 wherein the isolation region has a lower portion and an upper portion which differ in chemical composition relative to one another. 66. The construction of claim 65 wherein the lower portion comprises an entirety of the isolation region within the first doped semiconductor region and part of the isolation region within the second doped semiconductor region. 67. A semiconductor construction, comprising: a semiconductor substrate comprising a conductively-doped semiconductive material; a trenched isolation region within the conductively-doped semiconductive material, the trenched isolation region having a sidewall; a silicide-containing bitline between the sidewall of the trenched isolation region and the conductively-doped semiconductive material; a dielectric material over the silicide-containing bitline and trenched isolation region; a wordline over the dielectric material; and a vertically-extending pillar proximate the wordline and comprising a channel region vertically between a pair of source/drain regions, the wordline comprising a transistor gate which gatedly connects the source/drain regions to one another through the channel region, one of the pair of source/drain regions being electrically connected to the bitline. 68. The construction of claim 67 wherein the conductively-doped semiconductive material of the substrate comprises silicon. 69. The construction of claim 67 wherein the vertically-extending pillar is not directly over the bitline. 70. The construction of claim 67 wherein the conductively-doped semiconductive material comprises monocrystalline semiconductive material, and wherein the vertically-extending pillar comprises a monocrystalline extension of said monocrystalline semiconductive material. 71. The construction of claim 67 wherein the source/drain regions of the vertically-extending pillar are n-type regions and the channel region of the vertically-extending pillar is a p-type region. 72. The construction of claim 67 wherein the source/drain regions of the vertically-extending pillar are p-type regions and the channel region of the vertically-extending pillar is an n-type region. 73. The construction of claim 67 wherein the dielectric material consists of silicon dioxide. 74. The construction of claim 67 wherein: the substrate comprises a first doped region and a second doped region over the first doped region, one of the first and second doped regions being p-type and the other being n-type, the conductively-doped semiconductive material being the second doped region; the trenched isolation region extends through the second doped region and into the first doped region; and the silicide-containing bitline is within the second doped region and not within the first doped region of the substrate. 75. The construction of claim 74 wherein the first doped region is the p-type region. 76. The construction of claim 74 wherein the first doped region is the n-type region. 77. The construction of claim 67 wherein said one of the source/drain regions which is electrically connected with the silicide-containing bitline is a first source/drain region, wherein the other of the source/drain regions of the pair of source/drain regions is a second source/drain region and is electrically connected with a capacitor, and wherein the combination of the transistor gate, capacitor, source/drain regions and channel regions forms a DRAM unit cell. 78. A DRAM array comprising the DRAM unit cell of claim 77 together with a plurality of other DRAM unit cells substantially identical to the DRAM unit cell of claim 76. 79. An electronic device comprising the DRAM array of claim 78. 80. A semiconductor construction, comprising: a semiconductor substrate, the semiconductor substrate having a semiconductive material upper surface; an isolation region extending into the substrate; a silicide-containing bitline between the isolation region and the substrate; a spaced pair of wordlines over the bitline and isolation region, one of the pair of wordlines being a first wordline and the other being a second wordline; an electrically insulative line between the spaced wordlines; a first vertically-extending pillar of conductively-doped semiconductor material extending upwardly from the semiconductive material upper surface, the first vertically-extending pillar extending upwardly through the first wordline, the first vertically-extending pillar comprising a pair of first type source/drain regions on vertically opposed sides of a second type channel region, one of the first and second types being p-type and the other being n-type, the pair of source/drain regions being a first source/drain region and a second source/drain region, the first source/drain region being in electrical connection with the bitline; a second vertically-extending pillar of conductively-doped semiconductor material extending upwardly from the semiconductive material upper surface, the second vertically-extending pillar extending upwardly through the second wordline, the second vertically-extending pillar comprising a pair of first type source/drain regions on vertically opposed sides of a second type channel region, the pair of source/drain regions of the second vertically-extending pillar being a third source/drain region and a fourth source/drain region, the third source/drain region being in electrical connection with the bitline; a first gate dielectric around the first vertically-extending pillar and separating the first vertically-extending pillar from the first wordline; a second gate dielectric around the second vertically-extending pillar and separating the second vertically-extending pillar from the second wordline; a first charge storage device in electrical connection with the second source/drain region; and a second charge storage device in electrical connection with the fourth source/drain region. 81. The construction of claim 80 wherein the first and second charge storage devices are capacitors. 82. The construction of claim 81 wherein the capacitors, source/drain regions and channel regions are incorporated within a pair of DRAM unit cells. 83. The DRAM unit cells of claim 82 wherein each of the unit cells, excluding the capacitors, is a 4F2 device. 84. A DRAM array comprising the DRAM unit cells of claim 82. 85. An electronic system comprising the DRAM array of claim 84. 86. The construction of claim 81 wherein the electrically insulative line comprises silicon dioxide. 87. The construction of claim 81 wherein the electrically insulative line comprises silicon dioxide over a high-k dielectric material. 88. The construction of claim 81 wherein the electrically insulative line consists of silicon dioxide over a high-k dielectric material. 89. The construction of claim 88 wherein the high-k dielectric material consists of one or both of aluminum oxide and hafnium oxide. 90. The construction of claim 81 further comprising a high-k dielectric material between the isolation region and the electrically insulative line. 91. The construction of claim 90 wherein the high-k dielectric material consists of one or both of aluminum oxide and hafnium oxide. 92. The construction of claim 90 further comprising a low-k dielectric material between the isolation region and the high-k dielectric material. 93. The construction of claim 92 wherein the low-k dielectric material is between the first and second wordlines and the semiconductive material upper surface of the substrate. 94. The construction of claim 93 wherein the high-k dielectric material is not between the first and second wordlines and the semiconductive material upper surface of the substrate. 95. The construction of claim 92 wherein the low-k dielectric material comprises silicon dioxide and wherein the high-k dielectric material comprises one or both of aluminum oxide and hafnium oxide. 96. The construction of claim 92 wherein the low-k dielectric material consists of silicon dioxide. 97. The construction of claim 81 wherein the first and second gate dielectrics comprise silicon dioxide. 98. The construction of claim 81 wherein the first and second gate dielectrics consist of silicon dioxide. 99. The construction of claim 81 wherein the first and second wordlines comprise conductively-doped silicon. 100. The construction of claim 81 wherein the first and second wordlines consist of conductively-doped silicon. 101. The construction of claim 81 wherein the silicide-containing bitline consists of the silicide.
TECHNICAL FIELD The invention pertains to semiconductor constructions and methods of forming semiconductor structures. In particular aspects, the invention pertains to semiconductor constructions comprising one or more buried bitlines and one or more vertical surround gate transistor (SGT) structures, and pertains to methods of forming such constructions. BACKGROUND OF THE INVENTION A continuing goal of semiconductor device application is to increase the level of device integration, or in other words to increase the density of devices across a supporting substrate. Methods for increasing the density can include decreasing the size of individual devices, and/or increasing the packing density of the devices (i.e., reducing the amount of space between adjacent devices). In order to develop higher levels of integration, it is desired to develop new device constructions which can be utilized in semiconductor applications, and to develop new methods for fabricating semiconductor device constructions. A relatively common semiconductor device is a memory device, with a dynamic random access memory (DRAM) cell being an exemplary memory device. A DRAM cell comprises a transistor and a memory storage device, with a typical memory storage device being a capacitor. Modern applications for semiconductor devices can utilize vast numbers of DRAM unit cells. It would therefore be desirable to develop new semiconductor device constructions applicable for utilization in DRAM structures, and it would also be desirable to develop new methods for fabricating DRAM structures. SUMMARY OF THE INVENTION In one aspect, the invention encompasses a method of forming a semiconductor structure. A semiconductor substrate is provided, with such substrate having a first doped semiconductor region and a second doped semiconductor region over the first doped region. One of the first and second doped semiconductor regions is a p-type region and the other is an n-type region. A trench is formed to extend through the second doped semiconductor region and into the first doped semiconductor. The trench has a sidewall comprising the first and second doped semiconductor regions. A silicide is formed from the trench sidewall. The silicide is within the second doped semiconductor region and not within the first doped semiconductor region. An electrically insulative material is formed within the trench to cover the silicide. The silicide can ultimately be utilized as a bitline in a DRAM array, with the transistor devices of such array being formed over the electrically insulative material which covers the silicide. In one aspect, the invention encompasses a method of forming a semiconductor memory device. A semiconductor substrate is provided, with such substrate having a semiconductive material upper surface. A trench is formed to extend through the upper surface and into the substrate. A silicide bitline is formed along a sidewall of the trench. A first electrically insulative material is deposited within the trench to cover the bitline. A patterned second electrically insulative material is formed over the bitline and over the first electrically insulative material. The patterned second electrically insulative material has an opening extending therethrough to expose a portion of the semiconductor material upper surface. A vertically-extending pillar of conductively-doped semiconductor material is formed within the opening. The pillar is doped to comprise a pair of first type source/drain regions on vertically opposed sides of a second type channel region. One of the first and second types is p-type and the other is n-type. The pair of source/drain regions is a first source/drain region and a second source/drain region, with the first source/drain region being in electrical connection with the bitline. A gate dielectric is formed around the pillar. At least some of the second electrically insulative material is replaced with a conductive wordline material. The conductive wordline material laterally surrounds the pillar and is separated from the pillar by the gate dielectric. A charge storage device is formed in electrical connection with the second source/drain region, with an exemplary charge storage device being a capacitor. The capacitor, source/drain regions and channel region can be together incorporated within a DRAM unit cell. In one aspect, the invention encompasses a semiconductor construction. The construction includes a first doped semiconductor region and a second doped semiconductor region over the first doped semiconductor region. One of the first and second doped semiconductor regions is a p-type region and the other is an n-type region. An isolation region extends entirely through the second doped semiconductor region and partially into the first doped semiconductor region. The isolation region is a line having a pair of opposing sidewalls. One of the sidewalls is a first sidewall and the other is a second sidewall. A first silicide line extends along and directly against the first sidewall, with the first silicide line being in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first doped semiconductor region. A second silicide line extends along and directly against the second sidewall. The second silicide line, like the first silicide line, is in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first semiconductor region. In particular aspects, the first and second silicide lines can be utilized as bitlines in a memory array. In one aspect, the invention encompasses a semiconductor construction having a semiconductor substrate, an isolation region extending into the substrate, and a silicide-containing bitline between the isolation region and the substrate. A pair of spaced wordlines are over the bitline and the isolation region, with one of the wordlines being a first wordline and the other being a second wordline. An electrically insulative line is between the spaced wordlines. A first vertically-extending pillar of conductively-doped semiconductor material extends upwardly from an upper surface of the substrate. The first vertically-extending pillar extends through the first wordline, and comprises a pair of first source/drain regions on vertically opposed sides of a second type channel region. One of the first and second types is p-type and the other is n-type. The pair of source/drain regions are a first source/drain region and a second source/drain region, with the first source/drain region being in electrical contact with the bitline. A second vertically-extending pillar of conductively-doped semiconductor material extends upwardly from the substrate upper surface and through the second wordline. The second vertically-extending pillar comprises a pair of source/drain regions on vertically opposed sides of a second type channel region. The pair of source/drain regions of the second vertically-extending pillar are referred to as a third source/drain region and a fourth source/drain region, with the third source/drain region being in electrical contact with the bitline. A first gate dielectric is around the first vertically extending pillar, and a second gate dielectric is around the second vertically extending pillar. The first and second gate dielectrics separate the first and second vertically-extending pillars, respectively, from the first and second wordlines, respectively. A first charge storage device is in electrical connection with the second source/drain region, and a second charge storage device is in electrical connection with the fourth source/drain region. In particular aspects, the first and second charge storage devices can be capacitors. BRIEF DESCRIPTION OF THE DRAWINGS Preferred embodiments of the invention are described below with reference to the following accompanying drawings. FIG. 1 is a diagrammatic, three-dimensional view of a fragment of a semiconductor wafer construction illustrating a plurality of vertical surround gate transistor structures formed over a plurality of bitlines in accordance with an exemplary aspect of the present invention. FIGS. 2-4 are a fragmentary top view and a pair of cross-sectional side views of a semiconductor construction at a preliminary processing stage of an exemplary aspect of the present invention. The cross-sectional side views of FIGS. 3 and 4 are along the lines 3-3 and 4-4, respectively, of FIG. 2; the side view of FIG. 4 is along the line 4-4 of FIG. 3, and the side view of FIG. 3 is along the line 3-3 of FIG. 4. FIGS. 5-7 are views of the FIG. 2-4 wafer fragments, respectively, shown at a processing stage subsequent to that of FIGS. 2-4. FIGS. 6 and 7 are views along the lines 6-6 and 7-7 of FIG. 5, respectively. FIG. 6 is a view along the line 6-6 of FIG. 7, and FIG. 7 is a view along the line 7-7 of FIG. 6. FIGS. 8-10 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 5-7. FIGS. 9 and 10 are views along the lines 9-9 and 10-10 of FIG. 8, respectively. FIG. 9 is a view along the line 9-9 of FIG. 10, and FIG. 10 is a view along the line 10-10 of FIG. 9. FIGS. 11-13 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 8-10. FIGS. 12 and 13 are views along the lines 12-12 and 13-13, respectively, of FIG. 11. FIG. 12 is a view along the line 12-12 of FIG. 13, and FIG. 13 is a view along the line 13-13 of FIG. 12. FIGS. 14-16 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 10-12. FIGS. 15 and 16 are views along the lines 15-15 and 16-16 of FIG. 14, respectively. FIG. 15 is a view along the line 15-15 of FIG. 16, and FIG. 16 is a view along the line 16-16 of FIG. 15. FIGS. 17-19 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 14-16. FIGS. 18 and 19 are views along the lines 18-18 and 19-19, respectively, of FIG. 17. FIG. 18 is a view along the line 18-18 of FIG. 19, and FIG. 19 is a view along the line 19-19 of FIG. 18. FIGS. 20-22 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 17-19. FIGS. 21 and 22 are views along the lines 21-21 and 22-22, respectively, of FIG. 20. FIG. 21 is a view along the line 21-21 of FIG. 22, and FIG. 22 is a view along the line 22-22 of FIG. 21. FIGS. 23-25 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 20-22. FIGS. 24 and 25 are along the lines 24-24 and 25-25 of FIG. 23, respectively. FIG. 24 is along the line 24-24 of FIG. 25, and FIG. 25 is along the line 25-25 of FIG. 24. FIGS. 26-28 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 23-25. FIGS. 27 and 28 are views along the lines 27-27 and 28-28 of FIGS. 26, respectively. FIG. 27 is a view along the line 27-27 of FIG. 28, and FIG. 28 is a view along the line 28-28 of FIG. 27. FIGS. 29-31 are views of the fragments of FIGS. 2-4, respectively, shown at a processing stage subsequent to that of FIGS. 26-28. FIGS. 30 and 31 are views along the lines 30-30 and 31-31 of FIG. 29. FIG. 30 is a view along the line 30-30 of FIG. 31, and FIG. 31 is a view along the line 31-31 of FIG. 30. FIG. 32 is a diagrammatic view of a computer illustrating an exemplary application of the present invention. FIG. 33 is a block diagram showing particular features of the motherboard of the FIG. 32 computer. FIG. 34 is a high-level block diagram of an electronic system according to an exemplary aspect of the present invention. FIG. 35 is a simplified block diagram of an exemplary memory device according to an aspect of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS This disclosure of the invention is submitted in furtherance of the constitutional purposes of the U.S. Patent Laws “to promote the progress of science and useful arts” (Article 1, Section 8). In particular aspects, the invention encompasses dynamic random access memory (DRAM) arrays comprising buried bitlines and vertical surround gate transistors (SGT) extending over the buried bitlines. An exemplary construction 10 is described with reference to FIG. 1. Construction 10 comprises a base 12 which includes a first doped semiconductor region 14 and a second doped semiconductor region 16 over the first doped semiconductor region. Regions 14 and 16 can comprise, consist essentially of, or consist of appropriately-doped monocrystalline silicon. In the shown aspect of the invention, region 16 comprises n-type doped semiconductor material and region 14 comprises p-type doped semiconductor material, but it is to be understood that the invention encompasses other aspects (not shown) in which the dopant types of regions 14 and 16 are reversed. One or both of regions 14 and 16 can be referred to as a semiconductor substrate in the discussion that follows. Alternatively, the term “substrate” can be utilized to refer to combinations of structures, such as, for example, the combination of regions 14 and 16 and/or combinations of other structures of construction 10 with one or both of regions 14 and 16. To aid in interpretation of the claims that follow, the terms “semiconductive substrate” and “semiconductor substrate” are defined to mean any construction comprising semiconductive material, including, but not limited to, bulk semiconductive materials such as a semiconductive wafer (either alone or in assemblies comprising other materials thereon), and semiconductive material layers (either alone or in assemblies comprising other materials). The term “substrate” refers to any supporting structure, including, but not limited to, the semiconductive substrates described above. A pair of isolation regions 18 and 20 are shown extending through the second doped semiconductor region 16 and into the first doped semiconductor region 14. The isolation regions 18 and 20 comprise one or more appropriate electrically insulative materials, and in particular aspects will comprise, consist essentially of, or consist of silicon dioxide. The isolation regions can be referred to as trenched isolation regions, as they extend along trenches within semiconductor materials 14 and 16. The isolation regions can comprise a single homogeneous composition 19 (as shown) or can comprise two or more layers of different insulative materials. Isolation regions 18 and 20 are typically substantially identical to one another, with the term “substantially identical” indicating that the isolation regions are identical within tolerances of a semiconductor fabrication process utilized to form the regions. Isolation region 20 comprises a pair of sidewalls 22 and 24. Isolation region 18 comprises similar sidewalls, but such are not labeled. Sidewalls 22 and 24 can be referred to as a first sidewall and a second sidewall, respectively, in the discussion that follows. The first and second sidewalls each have a portion along first doped region 14, and another portion along second doped region 16. A plurality of bitlines 26, 28, 30 and 32 extend within second doped region 16 and along the sidewalls of the isolation regions. For instance, bitlines 30 and 32 are shown extending along the first and second sidewalls 22 and 24, respectively. Bitlines 30 and 32 can be referred to as a first bitline and a second bitline, respectively, in the discussion that follows. In particular aspects, the bitlines 26, 28, 30 and 32 comprise, consist essentially of, or consist of metal silicide. Accordingly, the bitlines can be referred to as silicide-containing bitlines. The metal silicide of the bitlines can be selected from the group consisting of, for example, cobalt silicide, nickel silicide, tantalum silicide, tungsten silicide, titanium silicide, and mixtures thereof. The bitlines 26, 28, 30 and 32 extend along and directly against the sidewalls of the isolation regions, and also are in direct physical contact with the second doped semiconductor region 16. The terms “directly against” and “direct physical contact” are utilized to indicate that features touch one another. The bitlines 26, 28, 30 and 32 are not in direct physical contact with the first doped semiconductor region 14. An electrically insulative material 36 extends over the isolation regions 18 and 20, and also over bitlines 26, 28, 30 and 32. An exemplary elevational thickness for layer 36 is about 500 Å. Electrically insulative material 36 can comprise any suitable material, and in particular aspects will comprise, consist essentially of, or consist of silicon dioxide. Accordingly, insulative material 36 and the insulative material 19 within isolation regions 18 and 20 can have the same composition as one another. In some aspects, isolation regions 18 and 20 can be considered to comprise only the insulative material 19 trenched within semiconductor regions 14 and 16, and in other aspects the isolation regions can be considered to comprise materials 19 and 36 in combination. If the isolation regions are considered to comprise materials 19 and 36 in combination, the bitlines 26, 28 30 and 32 can be considered to be entirely contained between the isolation regions and the second doped semiconductor region 16 in the shown aspect of the invention. A spaced pair of wordlines 40 and 42 is over insulative material 36. An exemplary elevational thickness of wordlines 40 and 42 is from about 1000 Å to about 4000 Å. The wordlines extend over the bitlines 26, 28, 30 and 32, and also over the isolation regions 18 and 20. Wordlines 40 and 42 can be referred to as a first wordline and a second wordline, respectively. The wordlines can comprise, consist essentially of, or consist of conductively-doped silicon, and in particular aspects will comprise, consist essentially, or consist of conductively-doped polycrystalline and/or amorphous silicon. It is to be understood, however, that the wordlines can comprise any suitable conductive material. In some aspects, the wordlines will comprise metal and/or metal compounds, either alone, or in combination with conductively-doped silicon. If the wordlines comprise conductively-doped silicon, the silicon can be either p-type or n-type, with the conductivity type being chosen according to the suitability for particular applications of the invention. The wordlines are shown formed directly against insulative material 36. Accordingly, in the shown aspect of the invention the only material separating trenched material 19 from wordlines 40 and 42 is the dielectric material 36. An electrically insulative line 44 extends between wordlines 40 and 42, and electrically isolates the wordlines from one another. The line 44 extends over the isolation regions and bitlines. Line 44 comprises a thin lower portion 46 and a thick upper portion 48. An exemplary elevational thickness for layer 46 is about 100 Å, and an exemplary elevational thickness for portion 48 is from about 1,000 Å to about 4,000 Å, with about 2,500 Å being typical. In particular aspects of the invention, lower portion 46 can be a high-k dielectric material. The term high-k is used to refer to materials which have a dielectric constant greater than that of silicon dioxide. Exemplary high-k materials suitable for portion 46 are materials comprising one or both of aluminum oxide and hafnium oxide. Line 44 can be described as comprising both of materials 46 and 48. In other aspects, the line can be considered to consist of the material 48 and to not include the material 46. In aspects in which the line is considered to not comprise material 46, the line can be considered to be separated from the isolation region by the dielectric materials 36 and 46. Material 48 can be a material which is selectively etchable relative to material 46, with exemplary materials being doped or undoped silicon oxides in aspects in which material 46 consists essentially of or consists of one or both of aluminum oxide and hafnium oxide. Material 48 can, for instance, comprise, consist essentially of, or consist of silicon dioxide or borophosphosilicate glass (BPSG). An advantage of having material 48 selectively etchable relative to material 46 occurs during fabrication of construction 10, and such advantage will be discussed in more detail in discussing methodological aspects of the invention with reference to FIGS. 2-31 below. In some aspects of the invention, it can be advantageous for material 36 to be a low-k material (with the term “low-k” being used to refer to materials which have a dielectric constant less than or equal to that of silicon dioxide), since material 36 electrically isolates the wordlines 40 and 42 from the bitlines 26, 28, 30 and 32. Specifically, if high-k dielectric materials are utilized for material 36, there may be a problem of parasitic capacitance between the wordlines and the bitlines. Thus, in some aspects, the high-k material 46 will be directly against a low-k dielectric material (specifically, dielectric material 36). Vertically-extending pillars 50, 52, 54 and 56 extend upwardly through the first and second wordlines. Specifically, pillars 50 and 52 extend upwardly through first wordline 40, and pillars 54 and 56 extend upwardly through second wordline 42. The pillars comprise conductively-doped semiconductor material. For instance, pillar 52 is shown to comprise a p-type doped central region vertically sandwiched between a pair of n-type doped regions. The p-type doped region can correspond to a channel region of a transistor device, and the n-type doped regions can correspond to source/drain regions of the device. The middle channel region of pillar 52 is labeled as 58, and the source/drain regions are labeled as 62 and 60. Source/drain regions 60 and 62 can be referred to as first and second source/drain regions, respectively. Although the shown dopant types of the channel region and source/drain regions are p-type and n-type, respectively, it is to be understood that the dopant types can be reversed in other aspects of the invention (not shown). In some aspects, base 12 can be considered a semiconductor substrate having an upper surface corresponding to the surface of first doped region 16. In such aspects, vertically-extending pillars 50, 52, 54 and 56 can be considered to extend upwardly from the upper surface of the semiconductor substrate. For purposes of the discussion that follows, pillar 52 can be referred to as a first vertically-extending pillar associated with first wordline 40, and pillar 56 can be referred to as a second vertically-extending pillar associated with wordline 42. The vertically-extending pillar 56 would comprise the same dopant configuration as shown for pillar 52, although the dopant configuration of pillar 56 is not visible in the view of FIG. 1. The semiconductor material of the vertically-extending pillars 52 can comprise any suitable material, and in particular aspects will comprise monocrystalline silicon. In particular aspects, first doped region 16 can comprise monocrystalline silicon, and the vertically-extending pillars can be formed by epitaxial growth from first doped region 16. In such aspects, the vertically-extending pillars can be considered to comprise monocrystalline extensions of the monocrystalline semiconductor material of first doped region 16. A gate dielectric material 64 extends around the vertically-extending pillars, and electrically isolates the vertically-extending pillars from the wordlines. Gate dielectric 64 can comprise any suitable material, or combination of materials. In particular aspects, gate dielectric 64 will comprise, consist essentially of, or consist of silicon dioxide. The relative heights of lines 48, vertically-extending pillars 50, 52, 54, and 56, and wordlines 40 and 42 are shown approximately accurately in FIG. 1. Specifically, the vertically-extending pillars would be formed to about the same height as the line 44, and the wordlines 40 and 42 would extend across a lower region of the second source/drain region 62, but would not extend to the top of the vertically-extending pillars. Typically, a wordline (such as, for example, wordline 40) would overlap the upper source/drain region (such as source/drain region 62) from about 200 Å to about 300 Å, and an uppermost surface of the wordline will thus be from about 200 Å to about 500 Å below uppermost surfaces of the vertically-extending pillar. Each of the lower source/drain regions of the vertically-extending pillars (such as, for example, the source/drain region 60) is electrically connected with a pair of bitlines (for instance, the bitlines 28 and 30 connect with a bottom source/drain region of pillar 50; the second bitline connected with source/drain region 60 is not shown in the view of FIG. 1). The upper source/drain regions (such as, for example, the region 62) would be connected with appropriate charge-storage devices for forming a DRAM construction. In the shown embodiment, the upper source/drain regions are connected with capacitor constructions 70, 72, 74 and 76. The capacitor constructions are shown schematically, and can comprise any suitable construction. Although not shown in the diagram of FIG. 1, there would typically be one or more insulative materials formed over the wordlines 40 and 42, and over the uppermost surfaces of the vertically-extending pillars. Openings would then be formed through the insulative materials to form the capacitors and more insulative layers would be added for electrical isolation. A suitable electrically insulative structure for forming over wordlines 40 and 42, and over the exposed surfaces of the vertically-extended pillars, is a first layer of silicon dioxide formed from tetraethylorthosilicate (TEOS), and a second thicker layer comprising, for example, BPSG. The silicon dioxide formed from TEOS can prevent dopant migration between the source/drain regions and other materials formed over the silicon dioxide. The wordlines 40 and 42 can be considered to comprise transistor gate structures which gatedly connect the source/drain regions of the vertically-extending pillars through the channel regions. For instance, wordline 40 can be considered to comprise a gate which gatedly connects source/drain regions 60 and 62 to one another through channel region 58. In particular aspects, the transistor gate structures, capacitor structures, source/drain regions and channel regions can be considered to comprise DRAM unit cells. For instance, the capacitor 72 together with diffusion regions 58, 60 and 62, and a transistor gate comprised by wordline 40, can be considered to form a DRAM unit cell. The DRAM unit cells can be incorporated into a DRAM array, and such array can be incorporated into an electronic device. The DRAM unit cells can correspond to 4F2 constructions in some aspects of the invention. In particular aspects of the invention, at least the portion of a DRAM unit cell comprising a transistor gate from a wordline (such as, for example, the wordline 40), together with the source/drain and channel regions of the vertically-extending pillar surrounded by the wordline, will correspond to a 4F2 construction. In other words, at least the portion of the DRAM unit cell exclusive of the capacitor will correspond to a 4F2 construction. The capacitor may also be included within the 4F2 construction, or in other aspects the capacitor may comprise a configuration such that the capacitor does not fit within a 4F2 construction. Although the invention is described in FIG. 1 with reference to a DRAM construction, it is to be understood that the invention can have application to other constructions, including, for example, constructions associated with display applications, micro-electro-mechanical systems (MEMS) matrix applications, etc. Exemplary methodology for forming the construction of FIG. 1 is described with reference to FIGS. 2-31. Similar numbering will be used to describe FIGS. 2-31 as was used in describing FIG. 1, where appropriate. Referring first to FIGS. 2-4, such illustrate a semiconductor structure 200 in top view (FIG. 2), and a pair of cross-sectional views (FIGS. 3 and 4). The construction 200 comprises the first doped semiconductor region 14 and second doped semiconductor region 16 discussed above with reference to FIG. 1. Second doped semiconductor material 16 has an uppermost surface 17. A pair of patterned masking materials 202 and 204 are formed over the uppermost surface 17. Materials 202 and 204 can comprise, for example, silicon dioxide and silicon nitride, respectively. Patterned materials 202 and 204 have a pair of openings 206 and 208 extending therethrough, and construction 200 is shown after it has been subjected to appropriate processing to extend the openings 206 and 208 entirely through second doped semiconductor region 16 and partially into first doped semiconductor region 14. Openings 206 and 208 correspond to trenches. The trenches 206 and 208 have sidewalls 210 and 212, respectively, with such sidewalls comprising a portion of the first doped semiconductor region 14 and a portion of the second doped semiconductor region 16. An electrically insulative material 214 is formed within the bottom of trenches 206 and 208. Electrically insulative material 214 can be formed in the shown configuration by depositing a material to extend over layer 204 and within the trenches, and subsequently etching back the material to leave the remaining material 214 as shown. Insulative material 214 can comprise any suitable material or combination of materials. In particular aspects, material 214 will comprise, consist essentially of, or consist of silicon dioxide. Electrically insulative material 214 can be referred to as a first electrically insulative material, and the trenches having material 214 therein can be referred to as partially-filled trenches. In the shown aspect of the invention, the material 214 is within the partially-filled trenches to above an elevational level of an uppermost portion of the first doped semiconductor region 14. Referring next to FIGS. 5-7, a metal-containing layer 216 is formed over layer 204 and within trenches 206 and 208. The trenches 206 and 208 are shown in dashed view in FIG. 5 to indicate that the trenches are beneath the metal-containing layer 216. Metal-containing layer can comprise any suitable metal, and in particular aspects will comprise, consist essentially of, or consist of one or more of cobalt, nickel, tantalum, tungsten and titanium. Metal-containing material 216 is formed along the sidewalls 210 and 212, and specifically is formed directly against the second doped semiconductor material 16 of such sidewalls. Referring next to FIGS. 8-10, portions of the metal-containing layer 216 (FIGS. 5-7) adjacent second doped semiconductor region 16 are converted to silicide lines 26, 28, 30 and 32, and the remainder of the metal-containing layer is removed. The silicide lines are not shown in the top view of FIG. 8 to simplify the drawing. The metal of the metal-containing layer can be converted to the silicide lines by reacting the metal with semiconductor material from region 16 under appropriate conditions. For instance, if the metal-containing layer comprises cobalt, the cobalt can be reacted with silicon from region 16 at a temperature of about 800° C. or lower; and if the metal-containing layer comprises nickel, the nickel can be reacted with silicon from layer 16 at a temperature of about 700° C. or lower. It can be advantageous to utilize cobalt or nickel for forming the silicide, in that the formation of the silicide can occur at relatively low temperatures which can avoid detrimental effects on other circuitry (not shown) that may be associated with a wafer supporting regions 14 and 16. Even though it may be advantageous to use metals that can form silicides at relatively low temperatures, it is to be understood that other metals can also be utilized for forming silicide. For instance, the silicide can also be formed from tantalum or tungsten. In some aspects of the invention, it can be advantageous if the silicide lines comprise silicide which is resistant to high temperatures utilized in subsequent processing stages, such as, for example, temperatures utilized for epitaxial growth of silicon. In such aspects, it can be advantageous if the silicide comprises, consists essentially of, or consists of, for example, one or both of tungsten silicide and tantalum silicide. Silicide lines 26, 28, 30 and 32 can be referred to as salicide lines (self-aligned silicide) in that the lines are aligned relative to sidewalls of the trenches 206 and 208. Referring next to FIGS. 11-13, a second insulative material 230 is formed within trenches 206 and 208. The second insulative material 230 covers the first insulative material 214, and also covers the silicide lines 26, 28, 30 and 32. The first and second insulative materials 214 and 230 can be the same as one another, or can differ in composition from one another. In particular aspects of the invention, both materials 214 and 230 will be the same as one another, and will consist essentially of, or consist of silicon dioxide. Materials 214 and 230 can be considered to together form the trenched insulative material 19 described previously with reference to FIG. 1. Accordingly, regions 214 and 230 can together correspond to the trenched isolation regions 18 and 20 of FIG. 1. The trenched isolation regions 18 and 20 of FIG. 12 have a different cross-sectional shape than those of FIG. 1. Specifically, the sidewalls of the trenched isolation regions of FIG. 1 are less vertical than those of FIG. 12. The difference in the shapes of the isolation regions of FIGS. 1 and 12 illustrate minor variations that can occur in various aspects of the invention. It is to be understood that the isolation regions can have any suitable shape, including, the shape of FIG. 12, the shape of FIG. 1, or a different shape depending on the processing utilized to form the trenches within which the isolation regions are ultimately constructed. Referring next to FIGS. 14-16, the layers 202 and 204 (FIGS. 2-13) are removed, and subsequently layers 36 and 46 are formed over trenched regions 206 and 208, as well as over the upper surface 17 of second doped semiconductor material 16. As discussed previously, material 36 can comprise a low-k material, such as, for example, silicon dioxide, and in particular aspects material 36 will comprise, consist essentially of, or consist of silicon dioxide. As was also discussed above, layer 46 can comprise a high-k material, and in particular aspects will comprise, consist essentially of, or consist of one or both of aluminum oxide and hafnium oxide. In some aspects, the dielectric constant of material 46 is less pertinent than the etching characteristics of the material. Specifically, material 46 is preferably a material which can be selectively etched relative to material 36, and also preferably a material to which the overlying material 48 (FIG. 1) of the insulative line 44 (FIG. 1) can be selectively etched. In some aspects of the invention, material 46 can be referred to as an etch stop. The term “etch stop” is utilized to indicate that an etch performed over material 46 substantially ceases upon reaching material 46, which can include aspects in which the etch fully stops upon reaching 46, and also includes aspects in which the etch slows upon reaching material 46 without coming to a complete stop. In the shown configuration, material 46 is directly against material 36. Referring next to FIGS. 17-19, an electrically insulative material 48 is formed over layer 46 and patterned to have a plurality of openings 240, 242, 244, 246, 248 and 250 extending therethrough. Insulative material 48 can be referred to as a patterned insulative material in the discussion that follows. Insulative material 48 can comprise, consist essentially of, or consist of silicon dioxide or doped silicon dioxide. Material 48 can be formed into the shown pattern by initially forming a continuous layer of material 48 over layer 46, planarizing the layer of material 48, and then utilizing photolithographic processing to transfer the desired pattern into material 48 with, for example, a photoresist mask. The photoresist mask can subsequently be removed to leave the patterned material 48 remaining over layer 46. After formation of patterned material 48, spacers 252 are formed within the openings 240, 242, 244, 246, 248 and 250. Spacers 252 can comprise any suitable material. In exemplary processes, spacers 252 can comprise, consist essentially of, or consist of silicon nitride. The spacers 252 can be formed by forming a layer of silicon nitride uniformly over patterned material 48 and within the openings extending through the patterned material, and subsequently anisotropically etching the layer. Spacers 252 narrow the openings 240, 242, 244, 246, 248 and 250. Regions of layer 46 are exposed within the narrowed openings. Referring next to FIGS. 20-22, the narrowed openings 240, 242, 244, 246, 248 and 250 are extended through materials 36 and 46 to expose the upper surface 17 of the second doped semiconductor region 16. The etch through material 46 can comprising, for example, a selective wet etch or a sputter etch (punch). Referring next to FIGS. 23-25, conductively-doped semiconductor material is formed within openings 240, 242, 244, 246, 248 and 250 to form vertically-extending pillars 50, 52, 54, 56, 260 and 262. Each of the vertically-extending pillars comprises the channel region 58 and source/drain regions 60 and 62 described previously. The semiconductive material of the vertically-extending pillars can comprise, consist essentially of, or consist of monocrystalline silicon. The monocrystalline silicon can be formed by epitaxially growing the silicon from the upper surface 17 of second doped semiconductor region 16 in applications in which region 16 comprises a monocrystalline silicon material. Alternatively, monocrystalline material of the vertically-extending pedestals can be formed by initially depositing amorphous silicon within the openings 240, 242, 244, 246, 248 and 262, and subsequently crystallizing the amorphous silicon to form a monocrystalline material within the openings. It can be preferred to utilize the deposition of amorphous silicon and subsequent crystallization for forming the monocrystalline material in applications in which it is desired to maintain a relatively low temperature during formation of monocrystalline material of the vertically-extending pedestals. It is to be understood that although it can be preferred that the material within the pedestals be monocrystalline, the invention encompasses other aspects in which the material within the pedestals comprises semiconductor material which is not monocrystalline. The formation of doped regions 58, 60 and 62 preferably occurs during formation of the semiconductor material within the openings by in situ doping of the material. In other words, the lowest-most portions of the material are appropriately doped to be the source/drain region 60, the middle portions are then formed with appropriate doping to be channel regions 58, and finally the upper portions are formed with appropriate doping to be source/drain region 62. It is to be understood that other methods can be utilized for providing dopant within the vertically-extending pedestals in addition to, or alternatively to, the in situ provision of dopant within the semiconductor material of the pedestals. In the shown preferred aspect of the invention, the pedestals are laterally offset from the bitline regions 26, 28, 30 and 32, and the bitline regions are not exposed during formation of the pedestals. Such can avoid metal migration that may otherwise occur from the silicide to the semiconductor material of the pedestals. As discussed previously with reference to FIG. 1, the channel regions 58 will comprise a different dopant type than the source/drain regions 60 and 62. For instance, the channel regions 58 can comprise p-type dopant while the source/drain regions 60 and 62 comprise n-type dopant. Alternatively, the channel regions can comprise n-type dopant while the source/drain regions comprise p-type dopant. The vertically-extending pillars are shown having uppermost surfaces which are coextensive with the uppermost surfaces of insulative material 48 and spacers 252. Such can be accomplished by appropriate planarization, such as, for example, chemical-mechanical polishing. Referring next to FIGS. 26-28, spacers 252 (FIGS. 23-25) are removed, together with the portions of layer 46 beneath the spacers. Such removal leaves openings 270 surrounding the vertically-extending pedestals 50, 52, 54, 56, 260 and 262. The removal of the portion of material 46 to form openings 270 may recess the remaining material 46 under material 48 to form cavities at edges of material 48, depending on the processing conditions utilized. The cavities are not shown in the diagrams of FIGS. 27 and 28, as the cavities will typically be very small, to the extent, if any, that such cavities are formed. The gate dielectric material 64 is formed within the openings, and specifically is formed along exposed surfaces of the vertically-extending pedestals. Gate dielectric 64 can comprise any suitable material, and in particular applications can comprise, consist essentially of, or consist of silicon dioxide. If the gate dielectric is silicon dioxide, such can be formed by exposing surfaces of the vertically-extending pillars to oxidizing conditions. Alternatively, the silicon dioxide can be formed by deposition of the silicon along the exposed surfaces of the vertically-extending pillars utilizing, for example, chemical vapor deposition or atomic layer deposition. If the silicon dioxide is formed by deposition, the silicon dioxide layer may extend over exposed surfaces of layers 36, 46 and 48, as well as over exposed surfaces of the vertically-extending pillars. The silicon dioxide over the surfaces of materials 36, 46 and 48 can be removed by protecting the silicon dioxide around the pillars with a suitable mask, and then utilizing an appropriate etch to remove the silicon dioxide. Alternatively, the silicon dioxide can be left on the surfaces of materials 36, 46 and 48. Referring next to FIGS. 29-31, portions of material 48 (and optionally the underlying material 46, as shown) are removed to leave strips of material 48 extending across construction 200. The strips of material 48 are shown extending horizontally in the top view of FIG. 29. The removal of material 48 (and optionally material 46) leaves openings between the strips, with such openings extending around pedestals 50, 52, 54, 56, 260 and 262. Conductive material is formed within the openings to form spaced wordlines 40 and 42. As discussed previously, the conductive material can comprise, consist essentially of, or consist of conductively-doped silicon, and in particular aspects will comprise amorphous silicon and/or polycrystalline silicon. The removal of the strips of insulative material 48 (and optionally material 46) and replacement of such strips with the conductive material of wordlines 40 and 42 forms the FIG. 1 structure comprising spaced wordlines 40 and 42 separated by insulative line 44. In subsequent processing, insulative materials can be formed over the wordlines 40 and 42, and capacitor constructions can be formed in electrical connection with the conductive pedestals to form a DRAM array of the type shown in FIG. 1. The silicide lines 26, 28, 30 and 32 form bitlines extending into the DRAM array. In some aspects, the bitlines within the array can consist essentially of, or consist of silicide, and the only bitlines within the array will be of the type corresponding to bitline 26, 28, 30 and 32. The portions of the bitlines outside the array can comprise other materials in addition to, or alternatively to, silicide. If the conductive pedestals 50, 52, 54, 260 and 262 are incorporated into a DRAM array as DRAM unit cells, the DRAM unit cells can be substantially identical to one another in that the cells were formed simultaneously with one another and utilizing identical processes and conditions. Accordingly, the cells will be identical to one another within the tolerances of a semiconductor process utilized for forming the cells. The term “substantially identical” is utilized to indicate that the cells are identical to one another within the tolerances of a semiconductor fabrication process, rather than being identical within an absolute mathematical sense. The construction of FIGS. 29-31 is in a sense an idealized construction, in that each of the vertically-extending pedestals is surrounded on all four sides by wordline material, and the wordlines are symmetric relative to the pedestals extending therethrough so that an equal amount of wordline material is on each of the opposing sides of the conductive pedestals in the FIG. 31 view. It is to be understood, however, that mask misalignments can occur so that the opposing sides of the pedestals of FIG. 31 do not contain equal amounts of conductive material, and also that there may be applications in which it is purposeful to have the conductive material extend less than fully around all four sides of a pedestal (or more generally, less than fully around the periphery of a pedestal), as well as in which it may be desired to have asymmetry relative to the amount of conductive material on one side of a pedestal versus on an opposing side of the pedestal. FIG. 32 illustrates generally, by way of example, but not by way of limitation, an embodiment of a computer system 400 according to an aspect of the present invention. Computer system 400 includes a monitor 401 or other communication output device, a keyboard 402 or other communication input device, and a motherboard 404. Motherboard 404 can carry a microprocessor 406 or other data processing unit, and at least one memory device 408. Memory device 408 can comprise various aspects of the invention described above. Memory device 408 can comprise an array of memory cells, and such array can be coupled with addressing circuitry for accessing individual memory cells in the array. Further, the memory cell array can be coupled to a read circuit for reading data from the memory cells. The addressing and read circuitry can be utilized for conveying information between memory device 408 and processor 406. Such is illustrated in the block diagram of the motherboard 404 shown in FIG. 33. In such block diagram, the addressing circuitry is illustrated as 410 and the read circuitry is illustrated as 412. Various components of computer system 400, including processor 406, can comprise one or more of the memory constructions described previously in this disclosure. Processor device 406 can correspond to a processor module, and associated memory utilized with the module can comprise teachings of the present invention. Memory device 408 can correspond to a memory module. For example, single in-line memory modules (SIMMS) and dual in-line memory modules (DIMMs) may be used in the implementation which utilize the teachings of the present invention. The memory device can be incorporated into any of a variety of designs which provide different methods of reading from and writing to memory cells of the device. One such method is the page mode operation. Page mode operations in a DRAM are defined by the method of accessing a row of a memory cell arrays and randomly accessing different columns of the array. Data stored at the row and column intersection can be read and output while that column is accessed. An alternate type of device is the extended data output (EDO) memory which allows data stored at a memory array address to be available as output after the addressed column has been closed. This memory can increase some communication speeds by allowing shorter access signals without reducing the time in which memory output data is available on a memory bus. Other alternative types of devices include SDRAM, DDR SDRAM, SLDRAM, VRAM and Direct RDRAM, as well as others such as SRAM or Flash memories. Memory device 408 can comprise memory formed in accordance with one or more aspects of the present invention. FIG. 34 illustrates a simplified block diagram of a high-level organization of various embodiments of an exemplary electronic system 700 of the present invention. System 700 can correspond to, for example, a computer system, a process control system, or any other system that employs a processor and associated memory. Electronic system 700 has functional elements, including a processor or arithmetic/logic unit (ALU) 702, a control unit 704, a memory device unit 706 and an input/output (I/O) device 708. Generally, electronic system 700 will have a native set of instructions that specify operations to be performed on data by the processor 702 and other interactions between the processor 702, the memory device unit 706 and the I/O devices 708. The control unit 704 coordinates all operations of the processor 702, the memory device 706 and the I/O devices 708 by continuously cycling through a set of operations that cause instructions to be fetched from the memory device 706 and executed. In various embodiments, the memory device 706 includes, but is not limited to, random access memory (RAM) devices, read-only memory (ROM) devices, and peripheral devices such as a floppy disk drive and a compact disk CD-ROM drive. One of ordinary skill in the art will understand, upon reading and comprehending this disclosure, that any of the illustrated electrical components are capable of being fabricated to include memory constructions in accordance with various aspects of the present invention. FIG. 35 is a simplified block diagram of a high-level organization of various embodiments of an exemplary electronic system 800. The system 800 includes a memory device 802 that has an array of memory cells 804, address decoder 806, row access circuitry 808, column access circuitry 810, read/write control circuitry 812 for controlling operations, and input/output circuitry 814. The memory device 802 further includes power circuitry 816, and sensors 820, such as current sensors for determining whether a memory cell is in a low-threshold conducting state or in a high-threshold non-conducting state. The illustrated power circuitry 816 includes power supply circuitry 880, circuitry 882 for providing a reference voltage, circuitry 884 for providing the first wordline with pulses, circuitry 886 for providing the second wordline with pulses, and circuitry 888 for providing the bitline with pulses. The system 800 also includes a processor 822, or memory controller for memory accessing. The memory device 802 receives control signals 824 from the processor 822 over wiring or metallization lines. The memory device 802 is used to store data which is accessed via I/O lines. It will be appreciated by those skilled in the art that additional circuitry and control signals can be provided, and that the memory device 802 has been simplified to help focus on the invention. At least one of the processor 822 or memory device 802 can include a memory construction of the type described previously in this disclosure. The various illustrated systems of this disclosure are intended to provide a general understanding of various applications for the circuitry and structures of the present invention, and are not intended to serve as a complete description of all the elements and features of an electronic system using memory cells in accordance with aspects of the present invention. One of the ordinary skill in the art will understand that the various electronic systems can be fabricated in single-package processing units, or even on a single semiconductor chip, in order to reduce the communication time between the processor and the memory device(s). Applications for memory cells can include electronic systems for use in memory modules, device drivers, power modules, communication modems, processor modules, and application-specific modules, and may include multilayer, multichip modules. Such circuitry can further be a subcomponent of a variety of electronic systems, such as a clock, a television, a cell phone, a personal computer, an automobile, an industrial control system, an aircraft, and others. In compliance with the statute, the invention has been described in language more or less specific as to structural and methodical features. It is to be understood, however, that the invention is not limited to the specific features shown and described, since the means herein disclosed comprise preferred forms of putting the invention into effect. The invention is, therefore, claimed in any of its forms or modifications within the proper scope of the appended claims appropriately interpreted in accordance with the doctrine of equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>A continuing goal of semiconductor device application is to increase the level of device integration, or in other words to increase the density of devices across a supporting substrate. Methods for increasing the density can include decreasing the size of individual devices, and/or increasing the packing density of the devices (i.e., reducing the amount of space between adjacent devices). In order to develop higher levels of integration, it is desired to develop new device constructions which can be utilized in semiconductor applications, and to develop new methods for fabricating semiconductor device constructions. A relatively common semiconductor device is a memory device, with a dynamic random access memory (DRAM) cell being an exemplary memory device. A DRAM cell comprises a transistor and a memory storage device, with a typical memory storage device being a capacitor. Modern applications for semiconductor devices can utilize vast numbers of DRAM unit cells. It would therefore be desirable to develop new semiconductor device constructions applicable for utilization in DRAM structures, and it would also be desirable to develop new methods for fabricating DRAM structures.
<SOH> SUMMARY OF THE INVENTION <EOH>In one aspect, the invention encompasses a method of forming a semiconductor structure. A semiconductor substrate is provided, with such substrate having a first doped semiconductor region and a second doped semiconductor region over the first doped region. One of the first and second doped semiconductor regions is a p-type region and the other is an n-type region. A trench is formed to extend through the second doped semiconductor region and into the first doped semiconductor. The trench has a sidewall comprising the first and second doped semiconductor regions. A silicide is formed from the trench sidewall. The silicide is within the second doped semiconductor region and not within the first doped semiconductor region. An electrically insulative material is formed within the trench to cover the silicide. The silicide can ultimately be utilized as a bitline in a DRAM array, with the transistor devices of such array being formed over the electrically insulative material which covers the silicide. In one aspect, the invention encompasses a method of forming a semiconductor memory device. A semiconductor substrate is provided, with such substrate having a semiconductive material upper surface. A trench is formed to extend through the upper surface and into the substrate. A silicide bitline is formed along a sidewall of the trench. A first electrically insulative material is deposited within the trench to cover the bitline. A patterned second electrically insulative material is formed over the bitline and over the first electrically insulative material. The patterned second electrically insulative material has an opening extending therethrough to expose a portion of the semiconductor material upper surface. A vertically-extending pillar of conductively-doped semiconductor material is formed within the opening. The pillar is doped to comprise a pair of first type source/drain regions on vertically opposed sides of a second type channel region. One of the first and second types is p-type and the other is n-type. The pair of source/drain regions is a first source/drain region and a second source/drain region, with the first source/drain region being in electrical connection with the bitline. A gate dielectric is formed around the pillar. At least some of the second electrically insulative material is replaced with a conductive wordline material. The conductive wordline material laterally surrounds the pillar and is separated from the pillar by the gate dielectric. A charge storage device is formed in electrical connection with the second source/drain region, with an exemplary charge storage device being a capacitor. The capacitor, source/drain regions and channel region can be together incorporated within a DRAM unit cell. In one aspect, the invention encompasses a semiconductor construction. The construction includes a first doped semiconductor region and a second doped semiconductor region over the first doped semiconductor region. One of the first and second doped semiconductor regions is a p-type region and the other is an n-type region. An isolation region extends entirely through the second doped semiconductor region and partially into the first doped semiconductor region. The isolation region is a line having a pair of opposing sidewalls. One of the sidewalls is a first sidewall and the other is a second sidewall. A first silicide line extends along and directly against the first sidewall, with the first silicide line being in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first doped semiconductor region. A second silicide line extends along and directly against the second sidewall. The second silicide line, like the first silicide line, is in direct physical contact with the second doped semiconductor region but not in direct physical contact with the first semiconductor region. In particular aspects, the first and second silicide lines can be utilized as bitlines in a memory array. In one aspect, the invention encompasses a semiconductor construction having a semiconductor substrate, an isolation region extending into the substrate, and a silicide-containing bitline between the isolation region and the substrate. A pair of spaced wordlines are over the bitline and the isolation region, with one of the wordlines being a first wordline and the other being a second wordline. An electrically insulative line is between the spaced wordlines. A first vertically-extending pillar of conductively-doped semiconductor material extends upwardly from an upper surface of the substrate. The first vertically-extending pillar extends through the first wordline, and comprises a pair of first source/drain regions on vertically opposed sides of a second type channel region. One of the first and second types is p-type and the other is n-type. The pair of source/drain regions are a first source/drain region and a second source/drain region, with the first source/drain region being in electrical contact with the bitline. A second vertically-extending pillar of conductively-doped semiconductor material extends upwardly from the substrate upper surface and through the second wordline. The second vertically-extending pillar comprises a pair of source/drain regions on vertically opposed sides of a second type channel region. The pair of source/drain regions of the second vertically-extending pillar are referred to as a third source/drain region and a fourth source/drain region, with the third source/drain region being in electrical contact with the bitline. A first gate dielectric is around the first vertically extending pillar, and a second gate dielectric is around the second vertically extending pillar. The first and second gate dielectrics separate the first and second vertically-extending pillars, respectively, from the first and second wordlines, respectively. A first charge storage device is in electrical connection with the second source/drain region, and a second charge storage device is in electrical connection with the fourth source/drain region. In particular aspects, the first and second charge storage devices can be capacitors.
20040311
20070828
20050915
96668.0
0
DOTY, HEATHER ANNE
METHODS OF FORMING SEMICONDUCTOR STRUCTURES
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,223
ACCEPTED
Lockbox for hitch receiver
A lockbox is adapted for receipt within a main cavity defined by a conventional trailer hitch. Various embodiments of the lockbox include a pivotable opening front wall, and a removable top. The lockbox may have a rectangular, triangular or other polygonal configuration as well as having the configuration of an elongated tube.
1. A lock box for a trailer hitch receiver, comprising: a polygonal container having at least three sides and a base defining an interior compartment for holding small items, each of the at least three sides and the base being sized and positioned for selective receipt of the container substantially within a main cavity of a trailer hitch receiver wherein two of the three sides define opposed apertures for receipt of a pin having an engaged position with respect to corresponding holes in the receiver hitch to selectively retain the container within the main cavity of the trailer hitch receiver and a disengaged position to allow release of the container from the main cavity. 2. The lock box of claim 1 wherein the base has a triangular shape. 3. The lock box of claim 1 including a top engaged with the sides for enclosing the container. 4. The lock box of claim 3 wherein the base has a rectangular shape, and wherein the polygonal container consists of the three sides, the base, the top and a fourth side in a rectangular configuration. 5. The lock box of claim 1, including a first side of the at least three sides of the container having a selective open position to allow access to the interior compartment of the container and a selective closed, lockable position; and a lock coupled to the container to deter access to the interior compartment of the container. 6. The lock box of claim 5 wherein the lock is a combination lock. 7. The lock box of claim 5 wherein the lock is coupled to the first side of the container. 8. A lock box for a trailer hitch receiver, comprising: an elongated tube sized for selective receipt substantially within a main cavity of a trailer hitch receiver, the tube having an operable front wall, a back wall, and a side wall defining an openable interior compartment for holding small items, wherein the side wall defines opposed first and second apertures, the first and second apertures positioned so as to be each substantially alignable with a corresponding first and second side holes in the trailer hitch receiver when the tube is positioned substantially within the main cavity of the trailer hitch receiver for receipt of a retaining pin; and, a lock coupled to the operable front wall to deter access to the interior compartment of the tube. 9. The lock box of claim 8 including a retaining pin having a first position wherein the pin is received in the apertures and the holes to selectively retain the tube when the tube is positioned substantially within the main cavity, and a second position wherein the pin is not received in the apertures and the holes to allow removal of the tube from the main cavity of the trailer hitch receiver. 10. The lock box of claim 9 wherein the side wall includes parallel spaced apart first and second sides, including a first slot in the first side and a second slot in the second side, and further including a first and a second pin retaining member, the first and the second slot each configured to selectively receive the respective first and second pin retaining member. 11. The lock box of claim 10 wherein the retaining pin has first and second circumferential grooves and wherein the first pin retaining member has a distal end configured to selectively engage the first circumferential groove in the retaining pin and the second pin retaining member also has a distal end configured to selectively engage the second circumferential groove in the retaining pin. 12. The lock box of claim 10 wherein the side wall includes parallel top and bottom walls. 13. The lock box of claim 8 wherein the lock is positioned on the front wall of the tube, and a dust flap coupled to the lock has an open position to provide access to the lock and a closed position to cover the lock. 14. The lock box of claim 8 wherein the lock is a keyless lock. 15. A lock box for a trailer hitch receiver, comprising: tube means for defining an openable interior compartment for holding small items; coupling means for selectively retaining the interior compartment substantially within the trailer hitch receiver; and lock means, operably interactive with the coupling means, for deterring access to the interior compartment.
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention relates generally to security boxes for storing small objects. More specifically, the invention relates to methods and apparatus for storing small objects such as keys of a vehicle, such as an automobile. 2. Description of the Related Art Homeowners and vehicle owners frequently store a spare house or vehicle key adjacent to their home or car. In the home situation, the key may frequently be hidden behind a post or under a rock. It is well known in the prior art with respect to vehicle applications, that a small magnetized case may house an extra vehicle key and be hidden adjacent to a ferromagnetic portion of the vehicle, such as the inside of a bumper. This same magnetized case or box was also traditionally hidden in residential milk chutes, which were also manufactured of ferromagnetic material. With respect to this application, the case or box could hide a spare house key. For a variety of reasons, use of the small magnetized case has fallen into disfavor. A principal reason has been that the use of such magnetized boxes has become well known and thus is no longer secure. Furthermore, with respect to residential applications, modern homes are no longer provided with such milk chutes. With respect to vehicles, hollow bumpers are no longer manufactured of ferromagnetic materials to which a magnetic case can adhere. Homeowners have been provided with alternate key hiding means such as artificial rocks, etc. Nevertheless, homeowners have been provided with further alternate means for storing a spare key adjacent to a residence. One conventional example is shown in U.S. Pat. No. 5,737,947 to Ling, which discloses a mother-and-daughter combination lock having a secured interior compartment for storing a house key. The interior concealed key compartment or chamber resides within a metal case having a lockable shackle. The shackle, in a fashion similar to a conventional padlock, may be unlocked and placed around the knob of an entryway door. With the shackle secured, the device cannot be removed from the doorknob, yet entry to the interior chamber is secured by a combination lock. In the device disclosed by Ling, separate combinations for the shackle and concealed key compartment are actuated by the same set of tumbler wheels bearing a conventional lock combination. Nevertheless, a need exists for a modernized security container for use with a vehicle which can safely store a small object, such as a spare vehicle or residential key. BRIEF SUMMARY OF THE INVENTION It is therefore an object of the present invention to provide a security storage box, or lockbox, for close association with a vehicle which can store a small item such as a house or vehicle key. It is a further object of the invention to achieve the above object with a lockbox for a small item such as a vehicle or residential key, which advantageously utilizes and adopts and existing secure structure on the vehicle for security purposes. The invention achieves these objects and advantages, and other objects and advantages which will become apparent from the description which follows, by providing a lockbox for a trailer hitch receiver. The preferred embodiment of the lockbox comprises a polygonal container having at least three sides and a base defining an interior compartment for holding such items, such as a house key or a vehicle key. Each of the sides and the base are sized and positioned for selective receipt of the container substantially within a main cavity of a conventional trailer hitch receiver. In the preferred embodiment of the invention, two of the three sides define opposed apertures for receiving a pin having an engaged position with respect to corresponding holes in the receiver hitch. When the lock box is received in the trailer hitch, having opposed apertures aligned with the corresponding holes in the receiver hitch, a retaining pin can be inserted therethrough to selectively retain the container within the main cavity. The retaining pin is removed to permit the lockbox to be removed from the cavity. In one embodiment of the invention, a first side of the at least three sides has a selective open position with respect to the remaining sides to allow access to the interior compartment of the container while the container is received within the trailer hitch. The lock box may also be provided with retaining members which are cooperatively engaged with the openable first side to cooperatively engage and release the retaining pin. In an alternative embodiment of the invention, the lockbox is in the form of a simple container having a lid, all of which is entirely received within the main cavity of the trailer hitch receiver and wherein the lockbox is secured therein by the retaining pin. In the alternate embodiment, the retaining pin may be a relockable type, whereas in the preferred embodiment a locking mechanism may be provided on the movable first side of the at least three sides. Although the configuration of the container in the preferred embodiment is described as polygonal, a further alternate embodiment of the invention is provided wherein the main body of the lockbox is in the form of a tube, substantially circular in cross-section, having a single continuous sidewall rather than a polygon having a plurality of distinct sidewalls. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S) FIG. 1 is a perspective, environmental view of a lockbox for a trailer hitch of the present invention. FIG. 2 is an exploded, perspective view of the lockbox of FIG. 1. FIG. 3 is a cross-sectional view taken along line 3-3 of FIG. 1. FIG. 4A is an exploded, perspective view of an alternate embodiment of the invention. FIG. 4B is a second alternate embodiment of the invention shown in FIG. 4A. DETAILED DESCRIPTION OF THE INVENTION A lockbox in accordance with the principles of the invention is generally indicated at reference numeral 10 in the various figures of the attached drawings wherein numbered elements in the figures correspond to like-numbered elements herein. The lock box is sized and adapted for receipt in a vehicle hitch receiver 12 (also conventionally referred to as a: receiver; hitch box; and/or, coupling tube) connected to a vehicle (not shown) typically having a rear bumper 14. As best seen in FIG. 2, the hitch receiver comprises a square tube 16 defining an interior main cavity 18 having a height and width of approximately two inches. Parallel, vertical sidewalls 20, 22 define opposed corresponding holes 24, 26 for a conventional retaining pin 28 (see FIG. 4A) which is adapted to secure a conventional hitch adapter 30. The hitch adapter may or may not include a conventional drop tongue 32 which supports a conventional hitch ball 34 for the towing of a trailer or the like by the vehicle. Hitch receivers of this type are typically provided with an enlarged, peripheral flange 36 such that the centers of the holes 24, 26 are rearwardly displaced from the front of the peripheral flange 36 by a distance of approximately 2 1/2 inches. In addition, the holes 24, 26 have a standard vertical position which is midway between a top horizontal ceiling 38, and a bottom horizontal floor 39. The hitch receiver 12 (and hitch adapter 30) are conventionally manufactured of hardened steel so as to transmit the forces of acceleration and deceleration from the vehicle to the trailer or other object being towed. The invention advantageously utilizes the inherent strength of the hitch receiver 12 to provide a secured environment for the lockbox 10 which is substantially received within the interior main cavity 18. As best seen in FIGS. 2 and 3, the lockbox 10 has a main body 40 in the shape of an elongated tube. The main body can have any suitable cross-sectional shape (e.g., circular, oval, etc.) but a preferred embodiment is provided with parallel, vertical sidewalls 44, 46, each defining opposed, circular apertures 48, 50. The apertures preferably have a diameter of approximately 5/8 inch, to correspond to the standard diameter of the corresponding holes 24, 26 in the hitch receiver 12. The main body 40 has, integrally formed therewith, a peripheral flange 52 extending laterally from the vertical sidewalls 44, 46 and vertically from a top wall 54 and a bottom wall 56 of the main body. A bottom portion 58 of the flange 52 supports a pivotable door 60 including a lock mechanism having a wheeled combination lock 62 of a type well known by those of ordinary skill in the lock art. The door 60, therefore provides selective access to an interior cavity defined by the sidewalls 44, 46 and the top and bottom walls 54, 56. The interior cavity is closed by an end cap 64 having holes 66 therein for receipt of screws or the like (not shown) which secure the end cap to the main body 40. The peripheral flange 52 may also have protrusions 53 which support a pivotally connected dust cap 70 shown in phantom lines to prevent the ingress of dirt or other contaminants to the combination lock 62. In order to secure the lockbox 10 within the main cavity generally indicated at reference numeral 18 of the hitch receiver 12, a modified retaining pin 72 is provided. As with the conventional retaining pin 28, the modified retaining pin 72 has an elongated shaft 74 having a diameter slightly smaller than the holes 24, 26 and corresponding apertures 48, 50. In addition, the modified retaining pin 72 has an enlarged head 76 at one end of the retaining pin in a fashion similar to the conventional retaining pin 28. Nevertheless, the modified retaining pin 72 is provided with circumferential grooves 78, 80 which are alignable with tracks 82, 84 best seen in FIG. 3. The tracks are defined by ridges 86, 88, which in turn are defined by the vertical sidewalls 44, 46 so as to form channels adjacent to the top wall 54 and bottom wall 56 of the main body 40 for slidable receipt of pin retaining members 90, 92. The pin retaining members are in the form of forks having tines 94, 96 and 98, 100 which are spaced apart so as to not engage the circumferential grooves 78, 80 in their modified retaining pin 72 when the modified retaining pin is received in the holes 24, 26 and corresponding apertures 48, 50 of the hitch receiver 12 and the lockbox 10, respectively. That is, the pin retaining members 90, 92 are slidably received in the tracks 82, 84 such that when the pin retaining members are fully positioned with the tracks, the modified retaining pin cannot be removed as will be described further herein below. Hence, the lockbox 10 is firmly and securely retained with the strengthened hitch receiver 12. The pin retaining members 90, 92 are provided with rounded corners 110, 112, 114, 16 at distal ends thereof for engagement with the pivoting door 60. The end cap 64 is also provided with a mounting protuberance 120 for receipt of a leaf spring 122 having end tabs 124, 126 for resilient engagement with distal ends of the tines 96, 100. The length of the tines is appropriately selected such that upon closing the pivotable door 60, a lower portion of the door will engage the rounded corners 110, 116 forcing the pin retaining members 90, 92 rearwardly in the tracks 82, 84 against the urging of the spring end tabs 124, 126. When the pivotable door 60 is fully closed, the spring 122 will be fully compressed and the circumferential grooves 78, 80 fully engaged by termini 128, 130 of the tines of the pin retaining members. Conversely, when the pivotal door 60 is fully opened, the end tabs 124, 126 of the spring 122 will urge the pin retaining members 90 in the opposite direction such that termini 128, 130 of the pin retaining members 90, 92 will disengage the circumferential grooves 78, 80 of the retaining pin 72. Thereupon, the retaining pin may be removed from the hole 24, 26 and corresponding apertures 48, 50 such that the entire lockbox 10 may be removed from the main cavity 18 of the hitch receiver 12. As will be apparent from the above, when the lockbox 10 is received in the main cavity 18 and retained by the modified retaining pin 72, a vehicle or house key, or other small item may be safely and securely retained with the lockbox. The pivotal door 60 by way of the wheel combination 62 allows selective access to the aforementioned key or keys. In this manner, the driver of a vehicle having a conventional hitch receiver 12 may always have a spare key available in the vehicle, and unauthorized persons will not have access to that key. The invention advantageously incorporates the structural integrity of the hitch receiver 12 itself. Thus, the only portion of the lockbox 10 which is necessarily manufactured from strong material such as steel is the peripheral flange 52 and pivotable door 60. FIGS. 4A and 4B illustrate alternative embodiments of the invention which employ the general inventive principles described above, but at lower manufacturing costs. FIG. 4A shows a variation of the invention in which the lockbox 10′ has parallel sidewalls 44′ and 46′ and defining the apertures 48′, 50′. However, the top wall 54′ is pivotally connected to the sidewalls. The pivotal front door 60 of the preferred embodiment is replaced with a fixed forward wall 60′ and the end cap 64 of the preferred embodiment is replaced with a fixed end cap 64′. In this embodiment, lockbox 10′ is totally received within the main cavity 18 of the hitch receiver 12. The dimensions of the alternate embodiment lockbox 10′ in height and width can be sufficiently reduced such that the lockbox 10′ is also received within a cavity defined by the hitch adapter 30 such that the alternate embodiment lockbox 10′ is totally sealed and the hitch ball 34 is fully usable for trailering duties. Due to the effective concealment of the lockbox 10′, a conventional retaining pin 28 may be used. In the alternative, a retaining pin having its own lock (such as that disclosed in U.S. Pat. No. 6,412,315 B1 to Cheng et al., the disclosure which is incorporated herein by reference) may be used. Finally, FIG. 4B illustrates that the basic concepts of the invention can be employed in any polygonal shape having opposed sidewalls 44″ and 46″ with apertures 48″ and 50″. This second alternate embodiment 10″ has a triangular plan and a fully removable lid 54″. Those of ordinary skill in the art will conceive of other alternate embodiments of the invention upon reviewing this disclosure. Thus, the invention is not to be limited to the above description, but is to be determined in its scope by the claims which follow.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The invention relates generally to security boxes for storing small objects. More specifically, the invention relates to methods and apparatus for storing small objects such as keys of a vehicle, such as an automobile. 2. Description of the Related Art Homeowners and vehicle owners frequently store a spare house or vehicle key adjacent to their home or car. In the home situation, the key may frequently be hidden behind a post or under a rock. It is well known in the prior art with respect to vehicle applications, that a small magnetized case may house an extra vehicle key and be hidden adjacent to a ferromagnetic portion of the vehicle, such as the inside of a bumper. This same magnetized case or box was also traditionally hidden in residential milk chutes, which were also manufactured of ferromagnetic material. With respect to this application, the case or box could hide a spare house key. For a variety of reasons, use of the small magnetized case has fallen into disfavor. A principal reason has been that the use of such magnetized boxes has become well known and thus is no longer secure. Furthermore, with respect to residential applications, modern homes are no longer provided with such milk chutes. With respect to vehicles, hollow bumpers are no longer manufactured of ferromagnetic materials to which a magnetic case can adhere. Homeowners have been provided with alternate key hiding means such as artificial rocks, etc. Nevertheless, homeowners have been provided with further alternate means for storing a spare key adjacent to a residence. One conventional example is shown in U.S. Pat. No. 5,737,947 to Ling, which discloses a mother-and-daughter combination lock having a secured interior compartment for storing a house key. The interior concealed key compartment or chamber resides within a metal case having a lockable shackle. The shackle, in a fashion similar to a conventional padlock, may be unlocked and placed around the knob of an entryway door. With the shackle secured, the device cannot be removed from the doorknob, yet entry to the interior chamber is secured by a combination lock. In the device disclosed by Ling, separate combinations for the shackle and concealed key compartment are actuated by the same set of tumbler wheels bearing a conventional lock combination. Nevertheless, a need exists for a modernized security container for use with a vehicle which can safely store a small object, such as a spare vehicle or residential key.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>It is therefore an object of the present invention to provide a security storage box, or lockbox, for close association with a vehicle which can store a small item such as a house or vehicle key. It is a further object of the invention to achieve the above object with a lockbox for a small item such as a vehicle or residential key, which advantageously utilizes and adopts and existing secure structure on the vehicle for security purposes. The invention achieves these objects and advantages, and other objects and advantages which will become apparent from the description which follows, by providing a lockbox for a trailer hitch receiver. The preferred embodiment of the lockbox comprises a polygonal container having at least three sides and a base defining an interior compartment for holding such items, such as a house key or a vehicle key. Each of the sides and the base are sized and positioned for selective receipt of the container substantially within a main cavity of a conventional trailer hitch receiver. In the preferred embodiment of the invention, two of the three sides define opposed apertures for receiving a pin having an engaged position with respect to corresponding holes in the receiver hitch. When the lock box is received in the trailer hitch, having opposed apertures aligned with the corresponding holes in the receiver hitch, a retaining pin can be inserted therethrough to selectively retain the container within the main cavity. The retaining pin is removed to permit the lockbox to be removed from the cavity. In one embodiment of the invention, a first side of the at least three sides has a selective open position with respect to the remaining sides to allow access to the interior compartment of the container while the container is received within the trailer hitch. The lock box may also be provided with retaining members which are cooperatively engaged with the openable first side to cooperatively engage and release the retaining pin. In an alternative embodiment of the invention, the lockbox is in the form of a simple container having a lid, all of which is entirely received within the main cavity of the trailer hitch receiver and wherein the lockbox is secured therein by the retaining pin. In the alternate embodiment, the retaining pin may be a relockable type, whereas in the preferred embodiment a locking mechanism may be provided on the movable first side of the at least three sides. Although the configuration of the container in the preferred embodiment is described as polygonal, a further alternate embodiment of the invention is provided wherein the main body of the lockbox is in the form of a tube, substantially circular in cross-section, having a single continuous sidewall rather than a polygon having a plurality of distinct sidewalls.
20040312
20060613
20050915
59891.0
1
BARRETT, SUZANNE LALE DINO
LOCKBOX FOR HITCH RECEIVER
SMALL
0
ACCEPTED
2,004
10,800,293
ACCEPTED
Collapsible rolling support stand
A collapsible folding stand for use with a portable table saw or other object that is attached to the stand and is capable of being manipulated between open and closed positions. In the closed position, the stand is generally vertically oriented with the object attached to a top frame. To open the stand a locking mechanism is released which enables a folding mechanism supporting the top frame to unfold in a manner whereby the rear legs having wheels that separate from forward side struts which contact the ground, with the center of gravity of the object being positioned between the wheels and the front ground contact points so that the weight of the object tends to separate the same and bring the top frame into a generally horizontal position. To move the rolling stand to its closed position, the user needs only to lift the handle and the top frame will then move to its generally vertical closed position.
1. A collapsible rolling stand for use with an elongated normally horizontally oriented object attached thereto, said stand having a front end portion and a rear end portion, and being capable of being manipulated between open and closed positions, wherein the object is generally vertically oriented when the stand is closed and in a generally vertical orientation, and wherein the object is generally horizontally oriented when the stand is in its open position, said stand comprising: a top frame having a generally planar portion being configured to have the object secured thereto, said top frame planar portion being generally vertical when said stand is in its closed and generally vertical position; a folding mechanism supporting said top frame, including a handle operatively connected to one end portion of a pair of spaced apart first members that have opposite ends defining contact points with the ground and a pair of spaced apart second members each having wheels for enabling a user to roll said stand, said first and second members being pivotally connected to one another and configured so that the weight of the object provides a substantial portion of the necessary force needed to pivot said first and second pairs of members to further separate said forward contact point from said rear wheels and move said stand from said closed position to said open position wherein said top frame planar portion is substantially horizontal. 2. A stand as defined in claim 1 wherein said folding mechanism further comprises: said first members are located on each side of said stand and are operatively connected to and pivotable relative to a rear portion of said top frame planar portion; each of said second members having a pivot connection to one of said first members at a point intermediate the ends of said first member, each second member having one of said wheels connected to a rearward end portion thereof and an extension located forwardly of said pivot connection at a predetermined angle relative to the lengthwise direction of said second member; a link member pivotally attached to the distal end of said extension and to said top frame planar portion; a handle connected to one of said top frame planar portion or said first members; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said second member to pivot about said pivot connection causing the weight of the object to move said wheels a short distance away from said top frame planar portion, further movement of said stand in the rearward direction causing said second members and wheel to rotate toward the rear of said stand to the open position where the top frame planar portion is oriented in said substantially horizontal position. 3. A stand as defined in claim 2 wherein said handle comprises a cross member that extends between and is connected to both of said first members. 4. A stand as defined in claim 3 wherein said cross member is positioned at an elevation below said top frame planar portion and has curved shape upwardly from each of said first members. 5. A stand as defined in claim 4 wherein said first members have a generally transverse downward extension beyond said pivot connection to said top frame member, with said handle being connected to the ends of each downward extension. 6. A stand as defined in claim 4 wherein said first members and said handle are an integrally formed unitary structure. 7. A stand as defined in claim 2 wherein said predetermined angle is within the range of about 40 to about 90 degrees. 8. A stand as defined in claim 2 wherein said locking mechanism comprises a sliding pin having an operating knob operatively attached to one of said first and second members that is configured to operatively engage the other of said first and second members when said stand is in at least its closed position. 9. A stand as defined in claim 8 wherein said sliding pin is biased toward engagement. 10. A stand as defined in claim 2 wherein said first members have a generally transverse extensions at said ground engaging opposite ends and at least one front end bridge interconnecting said opposite ends. 11. A stand as defined in claim 10 wherein a cross brace interconnects said first members adjacent the junction of said first members and said transverse extensions, said transverse extensions, front end bridge and cross bridge defining a carrying shelf. 12. A stand as defined in claim 1 further including a sheet of support material substantially covering said shelf and a portion of said first members adjacent said transverse extensions. 13. A stand as defined in claim 1 wherein the object is a portable circular saw. 14. A stand as defined in claim 2 further comprising a spring for biasing said stand toward its closed position when in its open position, such that an operator is not required to exert more than a small force to move said stand to its closed position. 15. A stand as defined in claim 14 wherein said small force is a small fraction of the weight of the object. 16. A stand as defined in claim 14 wherein said spring is substantially unloaded when the stand is in its closed position. 17. A stand as defined in claim 14 wherein said spring is a tension spring having one end connected to said second member and its other end connected to said first member, said spring being loaded into tension as said stand moves toward its open position. 18. A stand as defined in claim 1 wherein said top frame planar portion comprises two side frame members and two end frame members interconnected in a generally planar rectangular configuration. 19. A stand as defined in claim 2 further comprising at least one stop member attached to each second member for contacting said first member limiting the pivoting movement there between during opening of said stand so that said top planar portion is held in said generally horizontal position. 20. A collapsible rolling stand for an elongated normally horizontally oriented object attached thereto, said stand having a front end portion and a rear end portion, and being capable of being manipulated between open and closed positions, wherein the object is generally vertically oriented when the stand is closed and in a generally vertical orientation, and wherein the object is generally horizontally oriented when the stand is in its open position, said stand comprising: a top frame portion generally defining a plane and being configured to have the object secured thereto; a main side strut on each side of said stand pivotally connected to a rear portion of said top frame portion and extending to a ground engaging front contact point; a rear leg having a pivotal connection for connecting to each said side strut at a point intermediate the ends of said main side strut, each rear leg having a wheel connected to a distal end portion of said rear leg and an extension located forwardly of said pivotal connection at a predetermined angle relative to the lengthwise direction of said rear leg; a link member pivotally attached to the distal end of said rear leg extension and to said frame portion; a handle connected to one of said top frame portion or said main side struts; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said rear leg to pivot about said pivotal connection causing the weight of the object to move said wheel a short distance away from said top frame portion, further movement of said stand in the rearward direction causing said rear leg and wheel to rotate toward the rear of said stand to the open position where the object is oriented in a horizontal position. 21. A stand as defined in claim 1 wherein said top frame includes an outwardly directed transverse extension at the front end thereof, said extension having a slot on each side thereof for receiving an end of a link member of said folding mechanism, said folding mechanism further comprising: said first members are located on each side of said stand and are operatively connected to and pivotable relative to a rear portion of said top frame portion; each of said second members having a pivot connection to one of said first members at a point intermediate the ends of said first member, each second member having one of said wheels connected to a lower end portion thereof, an upper end thereof extending upwardly beyond said pivot connection; a link member having one end pivotally attached to said upper end of said second member and an opposite end pivotally connected to and slidable in said top frame extension slot; an over center stop member attached to one of each link member and second member that are connected together for limiting the pivoting movement therebetween during opening of said stand so that said top planar portion is held in said generally horizontal position; a handle connected to one of said top frame planar portion or said first members; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said second member to pivot about said pivot connection causing the weight of the object to move said wheels a short distance away from said top frame portion, further movement of said stand in the rearward direction causing said second members and wheel to rotate toward the rear of said stand and said opposite end of said link member to slide outwardly in said slot as said stand moves to its open position where the top frame portion is oriented in said substantially horizontal position. 22. A stand as defined in claim 1 wherein said folding mechanism further comprises: said first members are located on each side of said stand and are operatively connected to and pivotable and slidable between two positions relative to a rear portion of said top frame planar portion; a locking mechanism for at least one first member for releasably holding said first member from slidably moving relative to said rear portion of said top frame planar portion; each of said second members having a pivot connection to one of said first members at a point intermediate the ends of said first member, each second member having one of said wheels connected to a lower end portion thereof and an upper end portion extending upwardly of said pivot connection; a link member having one end pivotally attached to said upper end portion of each said second member and an opposite end pivotally attached to said top frame planar portion; an over center stop member attached to one of each link member and second member that are connected together for limiting the pivoting movement therebetween during opening of said stand so that said top planar portion is held in said generally horizontal position; a handle connected to one of said top frame planar portion or said first members; wherein when said stand is in its closed position, actuating said locking mechanism enables said second member to pivot about said pivot connection causing the weight of the object to move said wheels a short distance away from said top frame planar portion, further movement of said stand in the rearward direction causing said second members and wheel to rotate toward the rear of said stand to the open position where the top frame planar portion is oriented in said substantially horizontal position. 23. A stand as defined in claim 22 wherein said first and second positions are the closed and open positions of said stand. 24. A stand as defined in claim 1 wherein said top frame includes an outwardly directed transverse extension at the front end thereof, said extension having a slot on each side thereof for receiving an end of a link member of said folding mechanism, said folding mechanism further comprising: said first members are located on each side of said stand and are operatively connected to and pivotable relative to a rear portion of said top frame portion; each of said second members having a pivot connection to one of said first members at a point intermediate the ends of said first member, each second member having one of said wheels connected to a lower end portion thereof, an upper end thereof extending upwardly beyond said pivot connection; a pair of first link members, each having a first end pivotally attached to said upper end of said second member and a second end pivotally connected to a first end of a second link member; a pair of second link members, each having a first end pivotally connected to said second end of said first link member and to the first end of a third link member and a second end pivotally connected to and slidable in said top frame extension slot; a pair of third link members, each having a first end pivotally connected to said first end of said second link member and pivotally connected to said second end of said first link member, said third link member having a second end pivotally connected to said ground contact end of said first member; a handle connected to one of said top frame planar portion or said first members; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said second members to pivot about said pivot connection causing the weight of the object to move said second members and wheels away from said top frame, said pivoting movement of second members in the rearward direction causing said upper end of said second members to move said first link members forwardly and move the first end of said second and third link members forwardly while simultaneously moving said second end of said second link members downwardly in said slots as said stand moves to its open position where the top frame planar portion is oriented in said substantially horizontal position. 25. A stand as defined in claim 1 wherein said folding mechanism further comprises: said first members are located on each side of said stand and are operatively connected to and pivotable relative to a rear portion of said top frame portion; each of said second members having a pivot connection to one of said first members at a point intermediate the ends of said first member, each second member having one of said wheels connected to a lower end portion thereof, an upper end thereof extending upwardly beyond said pivot connection; a pair of first link members, each having a first end pivotally connected to and slidable relative to said upper end of said second member and a second end pivotally connected to first end portion of a second link member; a pair of second link members, each having a first end pivotally connected to said second end of said first link member and to the first end of a third link member and a second end pivotally connected to said top frame; a pair of third link members, each having a first end pivotally connected to said first end of said second link member and pivotally connected to said second end of said first link member and to said second end of said first link member, said third link member having a second end pivotally connected to said ground contact end of said first member; a handle connected to one of said top frame planar portion or said first members; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said second members to pivot about said pivot connection causing the weight of the object to move said second members and wheels away from said top frame, said pivoting movement of said second member in the rearward direction causing said upper end of said second members to move said first link members forwardly and move the first end of said second and third link members forwardly while simultaneously sliding said upper end of said second members rearwardly along said first link member as said stand moves to its open position where the top frame planar portion is oriented in said substantially horizontal position. 26. A stand as defined in claim 1 wherein said top frame has a pair of horizontal slots located on opposite sides of the front thereof, said folding mechanism further comprises: said first members are located on each side of said stand and are operatively connected to and pivotable relative to a rear portion of said top frame planar portion, said first members having an enlarged portion at an intermediate point along their length; each of said second members having a pivot connection to one of said first members at or near said enlarged portion of said first member, each second member having one of said wheels connected to a rearward end portion thereof and a first toothed gear fixed thereto, said first gear having a center opening through which a first pivot pin is attached to said first member, thereby enabling said second member and first toothed gear to pivot around said pivot pin; a pair of link members, each having a first end pivotally attached to a second pin secured to said first member at or near said enlarged portion and a second end pivotally attached to said top frame, each link member having a second toothed gear fixed thereto, said second gear having a center opening through which a second pivot pin is attached to said first member, thereby enabling said second member and second gear to pivot around said second pivot pin, each of said link members having a second end pivotally connected to said top frame slot; said teeth of first and second gears engaging each other; a handle connected to one of said top frame planar portion or said first members; a locking mechanism for releasably holding said stand in at least the closed position; wherein when said stand is in its closed position, actuating said locking mechanism enables said second member to pivot about said pivot connection causing the weight of the object to move said wheels away from said top frame planar portion, the movement of said stand in the rearward direction causing said second members and wheels to rotate toward the rear of said stand toward the open position, said engaged gears causing said link members to rotate in a direction opposite the rotation of said second member to the open position where the top frame planar portion is oriented in said substantially horizontal position.
BACKGROUND OF THE INVENTION The present invention generally relates to rolling support stands. Rolling hand trucks or support stands for large and/or heavy objects have been known for decades and are useful for transporting such objects from one location to another. Some of such known support stands are collapsible to some degree and many different designs of the hand trucks or rolling support stands are particularly suited for specific uses. While such products may be used in many different industries and applications, one noteworthy use is that of transporting objects, such as portable table saws, miter saws and the like to and from construction sites. In the home building trade, carpenters generally have table saws as well as other types of saws that are brought to a jobsite every day in the tradesman's truck or are stored in a secure location at the jobsite and must be removed from the truck or stored location and be set up on the jobsite while work is being done. At the end of the work day, the tradesman must pack up the saw and return it to his truck or secure location for safe keeping. Because such tools are valuable, they cannot be left unattended overnight without a significant risk of theft. There is also an issue of setting up the saw at the worksite. Even though early prior art roll stands or hand trucks may help the tradesman to move the saw to the desired location, it was often necessary to have a table or other surface, such as wooden planks resting on saw horses or the like to bring the saw to a convenient working height during use. Although more recent designs have evolved which have a rolling stand that can be unfolded to support the saw at an appropriate working height, all known designs that double as a stand require the tradesman to lift a substantial portion of the weight of the saw which is typically relatively heavy. Most portable table saws are very similar in design to standard table saws except they do not have a stand with legs beneath them and must be supported by a separate structure. Such portable table saws are rugged commercial tools that are built for an extended useful life and are therefore relatively heavy. Typical table saws of this type may weigh 60 pounds or more. While most tradesmen can usually lift 40-60 pounds, such exertion is inconvenient and perhaps dangerous in certain circumstances. Other types of stands may unfold using a spring biasing mechanism that is released and which then supplies a major force tending to place the stand with the saw attached to it in its proper working generally horizontal position. However, stands of this type may be dangerous if the folded stand has the mechanism released when the weight of the saw is not over the stand mechanism. If there is no load on the mechanism, it can unfold very rapidly which can be quite dangerous if a tradesman or any other person is struck by the mechanism. SUMMARY OF THE INVENTION Several embodiments of the present invention comprise a collapsible folding stand for use with a horizontally oriented object such as a portable table saw that is attached to the stand wherein the stand has a front and a rear portion and is capable of being manipulated between open and closed positions. In the closed position, the stand is generally vertically oriented with the object attached to a top frame. The stand has a folding mechanism with a pair of wheels which enable a user to roll the stand with the attached object from one location to another. When the stand is in the desired location, a locking mechanism is released which enables a folding mechanism supporting the top frame to unfold in a manner whereby the rear legs having wheels that separate from forward side struts which contact the ground, with the center of gravity of the object being positioned between the wheels and the front ground contact points so that the weight of the object tends to separate the same and bring the top frame as well as the object into a generally horizontal position. To move the rolling stand to its closed position, the user needs only to lift the handle and the top frame will then move to its generally vertical closed position where the latching mechanism can then be engaged. Because of the mechanism advantage of the folding mechanism, moving between the open and closed positions in either direction requires very little effort by the user. Selected embodiments can have a tension spring attached to frame members which is placed in tension only when the stand is in its open position with the force of the spring further aiding movement of the stand to its closed position. A smaller almost zero force may only be required by the user to close the stand. DESCRIPTION OF THE DRAWINGS FIG. 1 is a side view of a first preferred embodiment shown with a portable table saw attached to its top frame with the rolling stand being in its locked closed position; FIG. 2 is a side view of the first preferred embodiment and table saw shown in a partially opened position, particularly the position that is achieved after the latching mechanism is released; FIG. 3 is a view of the first preferred embodiment and table saw with the stand being further opened; FIG. 4 is a side view of the first preferred embodiment and table saw fully opened; FIG. 5 is a rear and side perspective view of a second preferred embodiment of a collapsible stand which represents a more stylized and commercial version of the first preferred embodiment shown in FIGS. 1-4; FIG. 6 is a top view of the second preferred embodiment; FIG. 7 is a side view of the second preferred embodiment; FIG. 8 is a rear end view of the second preferred embodiment; FIG. 9 is a diagrammatic side view of a third preferred embodiment shown with an object attached to the top frame and shown in its closed position; FIG. 10 is another side view of the third preferred embodiment shown in its opened position; FIG. 11 is a diagrammatic side view of a fourth preferred embodiment shown with an object attached to the top frame and shown in its closed position; FIG. 12 is another side view of the fourth preferred embodiment shown in its opened position; FIG. 13 is a diagrammatic side view of a fifth preferred embodiment shown with an object attached to the top frame and shown in its closed position; FIG. 14 is a diagrammatic side view of a fifth preferred embodiment shown in its partially opened condition; FIG. 15 is another side view of the fifth preferred embodiment shown in its opened position; FIG. 16 is a diagrammatic side view of a sixth preferred embodiment shown with an object attached to the top frame and shown in its closed position; FIG. 17 is a diagrammatic side view of a sixth preferred embodiment shown in its partially opened condition; FIG. 18 is another side view of the sixth preferred embodiment shown in its opened position; FIG. 19 is a diagrammatic side view of a seventh preferred embodiment shown with an object attached to the top frame and shown in its closed position; FIG. 20 is another side view of the seventh preferred embodiment shown in its opened position; FIG. 21 is a side view of a portion of the seventh embodiment, particularly illustrating the gear mechanism that interacts with the first member, the second member and the link member; and FIG. 22 is a perspective view, particularly illustrating the shape of the first member and the interconnection with the second member and the link member. DETAILED DESCRIPTION The various embodiments of the collapsible rolling stand of the present invention have the common design feature that includes a top frame upon which an object such as a table saw or the like can be attached and a folding mechanism that includes at least first and second members that are pivotable relative to one another and which resemble a scissor movement, with the center of gravity of the object that is attached to the top frame being located between the ground contacting ends of each of the first and second members. This enables the weight of the object to assist the unfolding of the stand which causes the object to move from a generally vertically oriented position to a generally horizontal position. Because the center of gravity of the object is between the ground contacting ends of the first and second members, the stand can be easily folded back to the collapsed generally vertical position without significant exertion by a user performing either operation. Unlike many prior art rolling stands, the user does not have to provide any heavy lifting in order to set up or break down the stand with the object attached to it. In this regard, a user can completely set up or knock down the stand by holding the handle and gently urging it in one direction or the other to open or close it. It is only necessary to manipulate a locking mechanism to release it from a closed position and to lock it when it has been moved from an opened position to its closed position. Turning now to the drawings and particularly FIGS. 1-4, a first preferred embodiment of a collapsible rolling stand is shown at 10 and has a portable table saw 12 that is attached to the stand. The stand 10 has a top frame 14 which is comprised of two side members 16 and two end members 18. The table saw 12 is commonly referred to in the trade as a portable table saw in that it does not have legs or a particularly deep lower frame portion. The saw 12 is intended for commercial use and is often set up at a job site such as where a house is being constructed so that carpenters or other tradesman can cut lumber as needed during the construction. The saw 12 has bolt holes (not shown) at the outer corners of the base of the saw through which bolts are placed to both the saw onto the top frame 14 of the stand 10. The bolts may fit into openings in the side members 16 or the end members 14 or to cross struts that may be added to the top frame for providing additional strength and/or a suitable structure to which the saw 12 can be attached. The rolling stand 10 has a folding mechanism, indicated generally at 20, which supports the top frame 14 referring to FIGS. 1-4, the building mechanism has opposite sides that are substantially similar to one another and for that reason will be given the same reference numbers for the individual components of each side. Each side has a main side strut 22 that extends from a pivot connection 24 to the top frame 14 and also downwardly to an end 26 that contacts the ground. The lower portion of main side strut 22 has a transverse platform extension 28 that is connected to the other side by a front end bridge 30 and a cross brace 32. The platform extensions 28 and front end bridge 30 and cross brace 32 define a platform or shelf on which the user may place a tool box or other object. It should also be understood that a sheet material may be connected to the components 28, 30 and 32 so that objects that are smaller than these components may easily be carried on the platform. A second cross brace 34 interconnects the main side struts 22 to provide strength at the mid portion of the length of the side struts 22 and to provide a stop surface for at least partially limiting the opening movement no further than is shown in FIG. 4. Additional strength is also provided by an angled auxiliary side strut 36 that has a generally transverse extension 38,a locking handle 40 that has a pin extending in an opening 39 through the extension 38 that is spring biased so that the handle 40 is biased toward the extension 38. It should be understood that a handle 40 could be provided only on one side if desired. The stand has a rear leg 42, with an angled upper leg extension 44 and a lower transverse extension 46 to which a wheel 48 is attached. The wheel 48 is mounted on an axle that is either bolted or welded to the extension 46. A rear end bridge 50 interconnects the rear legs 42 and the rear legs are connected to the side strut 22 by a connection point 52 so that the rear leg can pivot relative to the side strut 22. A flat curved sheet 41 is attached to both the extension 44 and the adjacent portion of the rear leg 42, preferably by welding, although it can be attached in other ways that are well known to those of ordinary skill in the art. The sheet is preferably about 2 millimeter thick steel that is attached to be coplanar with the inside surface of the extension 44 and rear leg 42. The rod portion of the handle 40 is configured to engage an aperture 43 in the sheet 41 when the stand is fully open as shown in FIG. 4. This firmly locks the stand so that it can withstand forces that may be applied to it during use of the saw by a user. When the stand is in its closed position, the rod portion of the handle 40 aligned to extend past the right edge of the extension 44 as shown in FIG. 1, which prevents the rear leg 42 from rotating in the clockwise direction around pivot connection 52. In other words, the stand is locked in its closed position in this manner. A handle 54 extends from side arms 56 that are connected to the main side strut 22 as well as the auxiliary side strut 36 and it extends away from the side struts several inches so that the hands of the user are not interfered with by the end member 18. The handle 54 is positioned at the rear end of the stand so that when it is in its closed position, the user can roll the stand and the attached table saw easily in much the same manner as a hand truck is used. A link member 58 is pivotally connected to the leg extension 44 at connection 60 and to the top frame side member 16 by connection 62. To open a closed rolling stand 10 which is shown in FIG. 1, the operator pulls the handles 40 so that the main side strut 22 and rear leg 42 can pivot relative to one another around the pivot connection 52. When that happens, the wheels will normally separate a short distance as a result of the weight of the stand and saw causing the rear leg and wheel to move to the left as shown in the drawings. In this regard, when this embodiment of the stand is in the position shown in FIG. 1, the wheels 48 preferably extend slightly lower than the bottom of the extension 28, so that the contact point 26 is not touching the ground. When the handles 40 are released, the saw then will move to the position shown in FIG. 2 where the platform extension 28 is flat on the ground and the wheels are spaced away from the contact point 26. From the position shown in FIG. 2, a user merely needs to pull on the handle toward him and to the left as shown in FIG. 2 which will cause the rear leg 42 to rotate in a clockwise direction relative to the side strut 22 and as it is moved, the extension 44 of the rear leg will similarly rotate in a clockwise direction and cause the link member 58 to move the right end of the top frame upwardly as is shown by comparing the position of the stand in FIG. 3 relative to FIG. 2. As the handle is moved farther to the left and boundwardly, the top frame is brought into a horizontal position which is stopped by the contact between the leg extension 44 and the cross brace 34 and the pin portion of the handle 40 engages the opening 43 in the sheet 41 as is clearly shown in FIG. 4. In this position, the table saw is ready for use once a source of power is provided to it. A significant advantage of the rolling stand 10 is the fact that the center of gravity of the saw is located between the contact point 26 and the wheels very early in the process of opening the stand and because of that, the weight of the saw assists in the unfolding of the saw to its open position which minimizes the effort that is required by the user to open the stand. To close the stand, the operator merely needs pull the handle 40 and pull upwardly on the handle 54 and the rear legs 42 will rotate in a counterclockwise direction relative to the main side strut 22 and move in the reverse sequence from FIGS. 4 to 1 whereupon pin of the handle 40 engages the rear leg to lock the stand in its closed position. Because of the design of this embodiment, there is very little effort required to move the stand from its open to its closed position, but a modification can be made to this embodiment by placing a tension spring 64 between the main side strut 22 and the rear leg 42 which will provide an auxiliary biasing force tending to both the stand from its open to its closed position. An axial spring provided at the connected point 52 may also be used as an alternative to the tension spring 64. The spring 64 can be designed so that it provides sufficient biasing force tending to rotate the rear leg in a counterclockwise direction relative to the main side strut 22 so that only a very small force, i.e., one approaching zero, may be necessary to close the stand from its open position. It should also be understood that a spring may be provided on each side of the stand to provide a more balanced closing force. Unlike some prior art rolling stands, the configuration of the spring in this embodiment only loads the spring when it approaches the open position. Other prior art mechanisms include a spring opening mechanism that once released causes the stand to unfold, with the force of the mechanism being substantial. When the stand is in the proper position this usually does not create a problem, but if the stand is not properly positioned, release of the mechanism can cause it to rapidly unfold with sufficient speed and energy that it can easily injure the user if the user is in position to be struck. That condition is virtually impossible in the illustrated embodiment for the reason that the spring is never loaded until it approaches its open position. The handle 54 is also positioned at an angle relative to the link of the side strut 22. This provides a convenient contact point for the stand if a user wishes to load the stand and saw into the cargo area of a truck or van. The user can merely wheel the stand to the truck, turn it around so that the handle is near the cargo truck surface and it can be rotated toward the truck so that the handle provides a sliding surface and the user can then pick up the cart by the front end bridge 30 and load it into the cargo area. The first preferred embodiment 10 is shown to have been constructed of hollow steel extrusions that are welded together and with the pivot connections comprising bolts extending through the illustrated components. A more substantial connection with bearings or other friction reducing elements can be used as are known to those of ordinary skill in the art. The side arms 56 are shown to be firmly attached by screws or bolts. The nature of the attaching and pivoting connections can vary depending upon obvious engineering design that is well know to those of ordinary skill in the art. A second preferred embodiment which represents a sleeker, smoother design that may be less expensive to manufacturer is shown in FIGS. 5-8. In this embodiment, a rolling stand, indicated generally at 100, is shown without an object attached to it, but it has a top frame, indicated generally at 102, that comprises side members 104 as well as an end member 106 to which two flat mounting plates 108 and 110 are attached. In this embodiment, the stock frame 102 is made of a circular stock and the side members 104 and the end member 106 are a unitary structure that is bent to form the top frame. The plates are preferably made of 2 mm. thick sheet, but may be a thinner or thicker steel stock or can be made of other metal. An important criterion is that it should be sufficiently strong that a saw or other object can be bolted to either pre-made holes or holes that are drilled in the plates when the saw or other object is attached to it. The embodiment 100 also has a folding mechanism 112 that includes a main side strut 114 that is pivotally attached to the top frame by pivot connection 116 and extends downwardly to a ground contact 118. A platform extension 120 is also provided and it has a end bridge 122 that interconnects the platform extension of each side. A metal platform bed 124 is connected to the end bridge 122 and platform extensions 120. It also has a horizontal portion 126 and a rear portion 128 that is generally perpendicular to the plane of the platform 124. These sheet surfaces provide support for carrying other articles or equipment that a user may have, such as a tool box, lunch box, radio or the like. The main side strut 114 extends upwardly to the connections 116 beyond which they are formed into generally transverse handle extension 130 that merges with a curved handle 132. The handle has a general upward curve as shown in the drawings, this is not only ergonomically convenient, but also defines two lower contact points 134 that may facilitate the stand being loaded onto an elevated platform such as a cargo floor of a truck or van. This embodiment also has a rear leg 136 with a leg extension 138 that is angled approximately 70°, but which could be a greater or lesser angle depending upon other relationships that are made in the design. The rear legs 136 also have a downwardly generally perpendicular leg extension 140 to which a wheel 142 is attached to each side thereof. A rear end brace 144 is provided to interconnect the rear leg extensions 1140. The rear leg 136 has a curved auxiliary support member 146 that is attached to the rear leg 136 and the leg extension 138 by preferably being welded thereto and this support member has a inwardly directed stop member 148 that is positioned to engage the main side strut 114 when it reaches its open position as best shown in FIG. 5. The rear leg 136 is pivotally connected to the side strut 114 by pivot connection 150. A link member 152 is also provided in this embodiment and it has a pivot connection 154 to the end of the rear leg extension 138 and a pivot connection 156 for connecting to the side member 104 of the top frame. The operation of this embodiment is substantially similar to the first embodiment shown in FIGS. 1-4. When the rolling stand 100 shown in its open position in FIG. 5 is to be moved to its closed position, the handle 134 must be raised to move the side strut 114 upwardly. The rear leg 136 will then pivot in a clockwise direction around pivot point 150 so that the wheel 142 will begin to approach the lower contact point 118 during the closing operation. Also the rear leg extension 136 will move pivot point 154 in a clockwise direction relative to pivot point 150 and cause the front end of the stand to move downwardly so that end 106 will move in a counterclockwise direction pivoting around the opposite pivot connection 116, resulting in the end 106 approaching the lower end of the side strut 114. From a vertical closed position the opposite series of movements will occur as has been described with regard to FIGS. 1-4. A third preferred embodiment is shown in the FIGS. 9 and 10 in a simplified manner, with a rolling stand, indicated generally at 160, having an object 162 attached to it. As with the embodiment in FIG. 1, the object 162 may certainly be a circular saw, miter saw or other tool. The object 162 is attached to a top frame 164 that is not shown in detail, but which would be similar to the top frame 14 of FIG. 1. The rolling stand 160 has a side strut 166 which extends from a upper handle portion 168 to a bottom contact point 170 and the side strut has a transverse platform extension 172 which is fixed with regard to the side strut 166. A rear leg 174 having a wheel at its lower end is pivotally connected via a pivot connection 178 to the side strut 166. The upper end of the rear leg 174 has a pivot connection 180 to a first link member 182 that has a slot 184 and in which the pivot connection 180 also can slide along the length thereof. The opposite end of the first link member 182 has a pivot connection 186 to a second link member 188 as well as to a third link member 191. The second link member 188 has its opposite end pivotally connected to the top frame 164 by the pivot connection 190. Similarly, the opposite end of the third link 191 has a pivot connection 192 adjacent the lower contact point 170 of the side strut 166. The upper end of the side strut 166 is also connected to the top frame 164 and particularly to a transverse extension 194 wherein a pivot connection 196 permits the side strut 166 to rotate relative to the top frame 164. To open the rolling stand 160 from the closed position in FIG. 9 to open position in FIG. 10, the user simply pulls the handle 168 to the right as shown in FIG. 9 which will cause the side strut 166 to pivot relative to the lower portion of the rear leg 174 so that the wheel will move away from the contact point 170. Simultaneously, the top end of the rear leg will move in a counterclockwise direction or to the left as shown in FIG. 9 and the pivot connection 180 will slide down the slot 184 as the mechanism opens. The fist link member 182 will force the pivot connection 186 in a downward direction as shown in FIG. 9 which will tend to cause the second and third link members 188 and 191 to straighten out relative to one another and cause the top frame 164 to move to a horizontal position as shown in FIG. 10. In this open position, the pivot connection 180 of the rear leg portion will reach the lower end of the slot 184 which will prevent any further movement to the left and will thereby hold the top frame 164 and object 162 in the desired horizontal position. A fourth embodiment illustrates a rolling stand 200 with an attached object 202 that is illustrated in a closed position in FIG. 11 and an open position in FIG. 12. The rolling stand 200 has a top frame 204 with pivot connection 210 located at the bottom end as shown in FIG. 11. The rolling stand 200 has a main side strut 212 that is pivotally connected to a transverse extension 214 of the top frame 204 at pivot connection 216. The side strut 212 extends downwardly to a bottom contact point 218 and has a transverse platform extension 220 that is rigid with regard to the side strut 212. A rear leg 222 with an attached wheel 224 is pivotally connected by connection point 226 to the side strut. The upper end of the rear leg 222 has a connection point 228 for connecting to a first link member 230, the other end of which is pivotally connected to a second link 234 and a third link member 236 by pivot connection 238. The other end of the second link member 234 is connected to the top frame 204 by the connection 210 and other end of the third link 236 is connected to the bottom of the side strut 212 adjacent the contact point 218 by pivot connection 240. The upper portion of the side strut 212 terminates at a handle 242. To open the roller stand 200, user will pull the handle 242 to the right as shown in FIG. 11 which will cause the rear leg 222 below the pivot connection 226 to rotate in a counterclockwise direction so that the wheel 224 separates from the contact point 240 of the side strut 212. This causes the upper end of the rear leg 222 to move the connection 228 left and down thereby moving the first link member downwardly from the position shown in FIG. 11 and also causing the connection 238 to move both the second and third link members 234 and 236 to straighten them relative to one another while simultaneously moving the top frame 204 to its horizontal position. A fifth embodiment of the stand is indicated generally at 250, and is shown in FIGS. 13, 14 and 15 together with an object 252 that is attached to a top frame 254 of the stand 250. In this embodiment, a main side strut 256 is attached to an extension 258 of the top frame 254 with a pivot connection 260 that is also slidable in a slot 262. The upper end of the side strut merges with a handle 264. The side strut 256 also has a bottom contact point 266 and a transverse platform extension 268. A rear leg 270 has a wheel 272 attached to the bottom end thereof and is pivotally attached to the side strut by pivot connection 274. At the upper end of the rear leg 270 is a pivot connection 276 that connects to a link member 278 that is pivotally connected to the top frame 254 by pivot connection 280. The connection 276 also includes a stop portion 282 that prevents over center movement, i.e., movement beyond the orientation shown in FIG. 15 where the leg member 278 is in line with the longitudinal axis of the rear leg 270. To open the embodiment 250 from its closed position shown in FIG. 13 to its completely open position shown in FIG. 15, a user again pulls the handle 264 to the right which causes relative pivoting movement between the side strut 256 and the lower portion of the rear leg 270 so that the wheel 272 moves away from the contact point 266, which in turn causes the upper end of the rear leg 270 to rotate in a counterclockwise direction and move the link member 178 so that it pivots in a clockwise direction around pivot connection 280 until it is generally aligned with the lengthwise direction of the rear leg 270 and the stop 282 halts its further movement. While it is shown to be straight relative to the rear leg 270 in FIG. 15, depending upon the relative lengths of the rear leg and link member 278 and the position of the pivot connection 274 along the side strut 256, the movement of the link member 278 may rotate beyond what is shown in FIG. 15, and would be similar to that shown in FIG. 18 which has yet to be described. To close the rolling stand 250 from the open position shown in FIG. 15, it is only necessary to push the handle 264 to the left as shown in FIG. 15 while perhaps unlocking the stop 282 if necessary. Further movement of the handle 264 will cause the stand to move toward the closed position shown in FIG. 13. A sixth embodiment of the rolling stand is indicated generally at 300 and is shown in its closed position in FIG. 16, an intermediate position in FIG. 17 and an open position in FIG. 18 and is shown with an object 302 that is attached to the stand. In this embodiment, the stand 300 has a top frame 304 with a transverse extension 306 at the forward end thereof which has a slot 308 in which a pivot and sliding connection 310 is located. A main side strut 312 is pivotally connected to an extension 314 of the top frame 304 by pivot connection 316. The upper end of the side strut 312 merges with a handle 318 and the lower end thereof has a ground contact point 320 and a transverse platform extension 322. A rear leg 324 has a wheel 326 connected to the lower portion thereof and the leg is pivotally connected to the side strut at pivot connection 328. The upper end of the rear leg 324 is connected to a link member 330 by pivot connection 332. The other end of the link member 330 is connected to the extension 306 by the pivot connection 310 previously identified. The pivot connection 332 also has a over center stop member 334 that limits the pivoting movement of the rear leg 324 relative to the link member 330 essentially to that which is shown in FIG. 18. In this embodiment, when the stand is to be opened from the closed position shown in FIG. 16 to the open position shown in FIG. 18, the handle 318 is pulled to the right which causes the lower portion of the rear leg 324 to pivot around pivot connection 328 and the wheel 326 will be separated from the contact point 320. As this motion occurs, the pivot connection 332 at the upper end of the rear leg 324 will cause the link member 330 to open relative to the rear leg member 324 and simultaneously cause the pivot and sliding connection 310 to move from the right end of the slot 308 as shown in FIG. 16 toward the left or upper end thereof as shown in FIG. 17. When it is in its final open position, the sliding pivot connection 310 will be at the upper end of the slot 308 and the top frame 304 and object 302 will be substantially horizontal. A seventh embodiment of a rolling stand of the present invention is indicated generally at 350 in FIGS. 19-22 and is shown with an object 352 attached to it. In this embodiment, a top frame 354 has a forward transverse extension 356 with a slot 358 in which a pivot connection 360 is located. The stand 350 has a side strut 362 with a bottom contact point 364 and a transverse platform extension 366. The side strut 362 is pivotally connected to another extension 368 of the top frame 354 by a pivot connection 370 and the upper end of the side strut 362 emerges into a handle 372. A rear leg 374 has a wheel 376 mounted to the lower end thereof and a link member 378 is connected to the pivot connection 360 and to a gear mechanism indicated generally at 380. In this embodiment, the side strut 362 has an enlarged portion 381 in the area of the gear mechanism 380. In this embodiment, the upper end of the rear leg 374 has a round toothed gear 382 securely attached to it, which may be accomplished by having an irregular shaped hub 384 welded or otherwise attached to the leg 374, with the gear 382 having an internal configuration that is complementary to the shape of the hub 384 so that it cannot rotate relative to the hub. The gear and leg 374 can rotate relative to a pin 386 that is operatively connected the side strut 362. Thus, the gear 382 and leg 374 are capable of rotating relative to the side strut. A toothed gear 388 is fixed to the link member 378 by a hub 390 that is complementary configured to the interior of the gear 388, but which is rotatable around pin 392 which is also fixed to the enlarged portion 1381 of the side strut 362. The gears 388 and 382 have teeth that engage one another so that rotation of the rear leg 374 in one rotational connection will result in rotation of the link member 378 in the opposite direction. As shown in FIGS. 19 and 21, if the rear leg 374 is rotated in the counterclockwise direction, the link member 378 will then be rotated in the clockwise direction. If it is in the closed position shown in FIG. 19, rotating the rear leg 374 in a counterclockwise direction will cause the link member 378 to rotate in the clockwise direction and the stand will be moved from its closed position shown in FIG. 19 to its open position in FIG. 20. The slot 358 permits some necessary translating movement to occur when this unfolding operation. While various embodiments of the present invention have been shown and described, it should be understood that other modifications, substitutions and alternatives are apparent to one of ordinary skill in the art. Such modifications, substitutions and alternatives can be made without departing from the spirit and scope of the invention, which should be determined from the appended claims. Various features of the invention are set forth in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention generally relates to rolling support stands. Rolling hand trucks or support stands for large and/or heavy objects have been known for decades and are useful for transporting such objects from one location to another. Some of such known support stands are collapsible to some degree and many different designs of the hand trucks or rolling support stands are particularly suited for specific uses. While such products may be used in many different industries and applications, one noteworthy use is that of transporting objects, such as portable table saws, miter saws and the like to and from construction sites. In the home building trade, carpenters generally have table saws as well as other types of saws that are brought to a jobsite every day in the tradesman's truck or are stored in a secure location at the jobsite and must be removed from the truck or stored location and be set up on the jobsite while work is being done. At the end of the work day, the tradesman must pack up the saw and return it to his truck or secure location for safe keeping. Because such tools are valuable, they cannot be left unattended overnight without a significant risk of theft. There is also an issue of setting up the saw at the worksite. Even though early prior art roll stands or hand trucks may help the tradesman to move the saw to the desired location, it was often necessary to have a table or other surface, such as wooden planks resting on saw horses or the like to bring the saw to a convenient working height during use. Although more recent designs have evolved which have a rolling stand that can be unfolded to support the saw at an appropriate working height, all known designs that double as a stand require the tradesman to lift a substantial portion of the weight of the saw which is typically relatively heavy. Most portable table saws are very similar in design to standard table saws except they do not have a stand with legs beneath them and must be supported by a separate structure. Such portable table saws are rugged commercial tools that are built for an extended useful life and are therefore relatively heavy. Typical table saws of this type may weigh 60 pounds or more. While most tradesmen can usually lift 40-60 pounds, such exertion is inconvenient and perhaps dangerous in certain circumstances. Other types of stands may unfold using a spring biasing mechanism that is released and which then supplies a major force tending to place the stand with the saw attached to it in its proper working generally horizontal position. However, stands of this type may be dangerous if the folded stand has the mechanism released when the weight of the saw is not over the stand mechanism. If there is no load on the mechanism, it can unfold very rapidly which can be quite dangerous if a tradesman or any other person is struck by the mechanism.
<SOH> SUMMARY OF THE INVENTION <EOH>Several embodiments of the present invention comprise a collapsible folding stand for use with a horizontally oriented object such as a portable table saw that is attached to the stand wherein the stand has a front and a rear portion and is capable of being manipulated between open and closed positions. In the closed position, the stand is generally vertically oriented with the object attached to a top frame. The stand has a folding mechanism with a pair of wheels which enable a user to roll the stand with the attached object from one location to another. When the stand is in the desired location, a locking mechanism is released which enables a folding mechanism supporting the top frame to unfold in a manner whereby the rear legs having wheels that separate from forward side struts which contact the ground, with the center of gravity of the object being positioned between the wheels and the front ground contact points so that the weight of the object tends to separate the same and bring the top frame as well as the object into a generally horizontal position. To move the rolling stand to its closed position, the user needs only to lift the handle and the top frame will then move to its generally vertical closed position where the latching mechanism can then be engaged. Because of the mechanism advantage of the folding mechanism, moving between the open and closed positions in either direction requires very little effort by the user. Selected embodiments can have a tension spring attached to frame members which is placed in tension only when the stand is in its open position with the force of the spring further aiding movement of the stand to its closed position. A smaller almost zero force may only be required by the user to close the stand.
20040312
20120117
20050915
96288.0
1
MARSH, STEVEN M
COLLAPSIBLE ROLLING SUPPORT STAND
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,447
ACCEPTED
Methods and systems for gathering market research data within commercial establishments
Methods and systems for tracking movements of participants in a market research study, for example, within a commercial establishment, are provided. The methods and systems employ portable monitors carried on the persons of the participants to gather location data.
1. A method for monitoring the presence and/or movements of participants in a market research study, comprising: providing signal transmitters at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; providing a wireless receiver to each of a plurality of participants in the market research study, the wireless receiver being adapted to be carried on the person of one of the participants and operative to receive respective ones of the location signals when in a vicinity of each of the locations; associating time data with each of the respective ones of the location signals corresponding to a time of reception thereof; and storing the received respective ones of the location signals and the associated time data within the wireless receiver for use in the market research study. 2. The method of claim 1, further comprising comparing time data and location signals to produce data representing movement of particular participants in the commercial establishment over time. 3. A system for monitoring the presence and/or movements of participants in a market research study, comprising: a plurality of signal transmitters provided at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; and a plurality of monitors each adapted to be carried on the person of one of the participants in the market research study, wherein each of the monitors includes a wireless receiver operative to receive respective ones of the location signals when in a vicinity of each of the locations, a clock for producing time data associated with each of the respective ones of the location signals when received by the wireless receiver, and a memory coupled to the wireless receiver and to the clock for storing the received respective ones of the location signals and the associated time data within the wireless receiver for extraction and use in the market research study. 4. The system of claim 3, further comprising a processor provided with the time data and the location signals to compare the time data and the location signals to produce data representing movement of particular participants in the commercial establishment over time. 5. A method of gathering data representing customer behavior in a commercial establishment, comprising: providing a layout map representing a plurality of locations within a commercial establishment; providing a portable monitor to each of a plurality of panelists participating in a customer behavior study to be worn thereby; gathering panelist presence data in the portable monitors representing a presence of respective ones of the panelists at identified ones of the locations within the commercial establishment; and associating the panelist presence data with the plurality of locations represented by the layout map. 6. The method claim 5, wherein gathering data comprises receiving wirelessly transmitted location indicating data in the portable monitors representing ones of the locations within the commercial establishment. 7. The method of claim 5, comprising gathering data in the portable monitors representing exposure of respective ones of the panelists to media data. 8. The method of claim 5, comprising gathering outdoor advertising data in the portable monitors representing exposure of respective ones of the panelists to outdoor advertising. 9. The method of claim 5, comprising providing time data defining a time base within each of the portable monitors, and associating the time data with the panelist presence data received in the portable monitors. 10. The method of claim 9, comprising gathering media exposure data in the portable monitors representing exposure of respective ones of the panelists to media data, and associating the time data with the media exposure data. 11. The method of claim 9, comprising gathering outdoor advertising data in the portable monitors representing exposure of respective ones of the panelists to outdoor advertising, and associating the time data with the outdoor advertising data. 12. The method of claim 5, comprising associating data representing products offered for sale and/or displays of products offered for sale with selected ones of the plurality of locations represented by the layout map. 13. A relational database storing data representing consumer behavior in a commercial establishment, comprising: a first table storing a plurality of first records, each of the first records including a first field storing wireless transmitter data representing a respective one of a plurality of wireless transmitters positioned in the commercial establishment and operative to transmit corresponding transmitter data and a second field storing location data representing a location of the respective one of the plurality of wireless transmitters in the retail establishment; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing a respective one of the plurality of wireless transmitters from which the portable monitor received transmitted corresponding transmitter data. 14. A method of gathering market research data, comprising: providing a portable monitor to each of a plurality of panelists participating in a market research study to be worn thereby; producing presence data within the portable monitors of ones of the plurality of panelists indicating their presence at a plurality of locations within at least one commercial establishment; and producing media data exposure data within the portable monitors of ones of the plurality of panelists indicating exposure thereof to media data. 15. The method of claim 14, wherein producing presence data comprises receiving a wirelessly transmitted location signal. 16. The method of claim 15, wherein the wirelessly transmitted location signal is produced by a wireless transmitter within or proximal to the commercial establishment. 17. The method of claim 16, comprising wirelessly transmitting a plurality of location signals within the commercial establishment each from a transmitter positioned at a respective location within the commercial establishment. 18. The method of claim 17, wherein the portable monitor receives and stores a location signal from each of a plurality of the wireless transmitters representing a proximity of a panelist carrying the wireless monitor to the location of the respective transmitter within the commercial establishment. 19. The method of claim 15, comprising calibrating an inertial monitoring unit within each of the portable monitors of a plurality of panelists based on the wirelessly transmitted location signal and determining a presence of each of such plurality of panelists at a plurality of locations within the commercial establishment by means of the calibrated inertial monitoring unit. 20. The method of claim 15, comprising producing presence data based on the received wirelessly transmitted location signal by means of one of an angle of arrival technique, a time difference of arrival technique, and enhanced signal strength technique, a location fingerprinting technique and an ultra wide band location technique. 21. The method of claim 14, comprising producing the media data exposure data based on acoustic media data received by the portable monitors. 22. A relational database storing data representing consumer behavior in a commercial establishment, comprising: a first table storing a plurality of first records, each of the first records including a first field storing location data identifying a location within a commercial establishment and a second field storing coordinate data representing a position of the location in a predetermined coordinate system; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing coordinates of a position of the consumer in the predetermined coordinate system.
FIELD OF THE INVENTION The present invention relates to market research methods and systems which gather data concerning the presence of panelists in various locations within commercial establishments. BACKGROUND OF THE INVENTION Managers of commercial establishments, such as retail stores, shopping malls, transportation centers and the like, responsible for maximizing sales of products and services, are well aware that the layout of their facilities has a substantial impact on sales volume. To evaluate this impact, it is necessary to gather data characterizing the flow of customer traffic into and within the facility. This data will reveal the locations where customers are present more frequently (“hot spots”) and those where customer traffic is lighter (“cold spots”). With this information, it is possible for the manager to make changes in features that affect accessibility, lighting, fixture space, product placement, and the like that will improve product exposure and reduce the number and/or size of cold spots. After such changes have been made, the manager will often wish to conduct a further traffic flow study to assess the effectiveness of these changes. The tracking data, along with product placement data are also important to distributors of products sold in commercial establishments. This information enables them to evaluate whether their products are receiving sufficient attention in a retail store, so that the cost of shelf space is justified. It also enables them to assess whether they should request shelf space for their products in a different location in the store. Traditionally such traffic flow studies have been conducted manually. One or more of the manager's employees would record the movements of customers within the facility on a sheet representing its layout. The accumulated data would then be reviewed by the manager. Clearly, this is a labor-intensive way of gathering such data. It is also potentially annoying to customers if the employees tracking them are not very discrete. It is desired, therefore, to provide a less expensive and less potentially annoying way to gather such traffic flow data. In addition, both managers of commercial establishments as well as manufacturers and distributors would like to obtain reports from which they can evaluate the effectiveness of their advertising expenditures, based not only on such traffic flow data but also on media exposure data and the like. SUMMARY OF THE INVENTION For this application the following terms and definitions shall apply: The term “data” as used herein means any indicia, signals, marks, symbols, domains, symbol sets, representations, and any other physical form or forms representing information, whether permanent or temporary, whether visible, audible, acoustic, electric, magnetic, electromagnetic or otherwise manifested. The term “data” as used to represent predetermined information in one physical form shall be deemed to encompass any and all representations of the same predetermined information in a different physical form or forms. The term “media data” as used herein means data which is widely accessible, whether over-the-air, or via cable, satellite, network, internetwork (including the Internet), distributed on storage media, or otherwise, without regard to the form or content thereof, and including but not limited to audio, video, text, images, animations, web pages and streaming media data. The term “database” as used herein means an organized body of related data, regardless of the manner in which the data or the organized body thereof is represented. For example, the organized body of related data may be in the form of a table, a map, a grid, a list or in any other form. The term “location” as used herein refers to a position relative to a commercial establishment, a product display, a product, another object or facility, or relative to a coordinate system such as latitude and longitude. The term “layout map” as used herein means a database of data representing locations in a commercial establishment. The term “network” as used herein includes both networks and internetworks of all kinds, including the Internet, and is not limited to any particular network or inter-network. The terms “first” and “second” are used to distinguish one element, set, data, object or thing from another, and are not used to designate relative position or arrangement in time. The terms “coupled”, “coupled to”, and “coupled with” as used herein each mean a relationship between or among two or more devices, apparatus, files, programs, media, components, networks, systems, subsystems, and/or means, constituting any one or more of (a) a connection, whether direct or through one or more other devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means, (b) a communications relationship, whether direct or through one or more other devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means, and/or (c) a functional relationship in which the operation of any one or more devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means depends, in whole or in part, on the operation of any one or more others thereof. The terms “communicate” and “communication” as used herein include both conveying data from a source to a destination, and delivering data to a communications medium, system or link to be conveyed to a destination. The term “processor” as used herein means processing devices, apparatus, programs, circuits, systems and subsystems, whether implemented in hardware, software or both. The terms “storage” and “data storage” as used herein mean data storage devices, apparatus, programs, circuits, systems, subsystems and storage media serving to retain data, whether on a temporary or permanent basis, and to provide such retained data. In accordance with an aspect of the present invention, a method is provided for monitoring the presence and/or movements of participants in a market research study. The method comprises providing signal transmitters at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; providing a wireless receiver to each of a plurality of participants in the market research study, the wireless receiver being adapted to be carried on the person of one of the participants and operative to receive respective ones of the location signals when in a vicinity of each of the locations; associating time data with each of the respective ones of the location signals corresponding to a time of reception thereof; and storing the received respective ones of the location signals and the associated time data within the wireless receiver for use in the market research study. In accordance with a further aspect of the present invention, a system is provided for monitoring the presence and/or movements of participants in a market research study. The system comprises a plurality of signal transmitters provided at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; and a plurality of monitors each adapted to be carried on the person of one of the participants in the market research study, wherein each of the monitors includes a wireless receiver operative to receive respective ones of the location signals when in a vicinity of each of the locations, a clock for producing time data associated with each of the respective ones of the location signals when received by the wireless receiver, and a memory coupled to the wireless receiver and to the clock for storing the received respective ones of the location signals and the associated time data within the wireless receiver for extraction and use in the market research study. In accordance with another aspect of the present invention, a method is provided for gathering data representing customer behavior in a commercial establishment. The method comprises providing a layout map representing a plurality of locations within a commercial establishment; providing a portable monitor to each of a plurality of panelists participating in a customer behavior study to be worn thereby; gathering panelist presence data in the portable monitors representing a presence of respective ones of the panelists at identified ones of the locations within the commercial establishment; and associating the panelist presence data with the plurality of locations represented by the layout map. In accordance with still another aspect of the present invention, a relational database is provided for storing data representing consumer behavior in a commercial establishment. The relational database comprises a first table storing a plurality of first records, each of the first records including a first field storing wireless transmitter data representing a respective one of a plurality of wireless transmitters provided in the commercial establishment and operative to transmit corresponding transmitter data and a second field storing location data representing a location of the respective one of the plurality of wireless transmitters in the retail establishment; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing a respective one of the plurality of wireless transmitters from which the portable monitor received transmitted corresponding transmitter data. In accordance with a still further aspect of the present invention, a method is provided for gathering market research data. The method comprises providing a portable monitor to each of a plurality of panelists participating in a market research study to be worn thereby; producing presence data within the portable monitors of ones of the plurality of panelists indicating their presence at a plurality of locations within at least one commercial establishment; and producing media data exposure data within the portable monitors of ones of the plurality of panelists indicating exposure thereof to media data. In accordance with yet another aspect of the present invention, a relational database is provided for storing data representing consumer behavior in a commercial establishment. The relational database comprises a first table storing a plurality of first records, each of the first records including a first field storing location data identifying a location within a commercial establishment and a second field storing coordinate data representing a position of the location in a predetermined coordinate system; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing coordinates of a position of the consumer in the predetermined coordinate system BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of a floor of a retail store for use in illustrating certain embodiments of the present invention; FIG. 2 is a schematic diagram of an aisle of the retail store of FIG. 1; FIG. 3 illustrates a table of a relational database in accordance with certain embodiments of the present invention; FIG. 4 illustrates a method and system for measuring exposure of a panelist participating in a consumer behavior study to a promotional display in accordance with certain embodiments of the present invention; FIG. 5 provides block diagrams of certain embodiments of signal transmitters and a portable monitor arranged to be carried on the person of a panelist participating in a consumer behavior study, in accordance with certain embodiments of the present invention; FIG. 6 illustrates use of the portable monitor of FIG. 5 for measuring exposure of the panelist carrying the portable monitor to a media display in accordance with certain embodiments of the present invention; FIG. 7 is a block diagram of a system for downloading data gathered by the portable monitor of FIG. 5 to a centralized processor; FIG. 8 illustrates a further table of the relational database including the table of FIG. 3 in accordance with certain embodiments of the present invention; FIG. 9 provides block diagrams of certain embodiments of a location signal transmitter and portable monitor wherein the portable monitor tracks its location using an inertial monitoring device. DETAILED DESCRIPTION OF CERTAIN ADVANTAGEOUS EMBODIMENTS The present invention is useful for monitoring the presence and/or movements of customers in all manner of commercial establishments, but is particularly useful for gathering such data in retail stores for carrying out traffic flow studies and/or exposure to advertising and promotional activities. FIG. 1 schematically illustrates a floor of a retail store 10 having an entrance 20 and a plurality of fixtures 24 comprising shelving for products offered for sale. The fixtures 24 define aisles 28 therebetween. A portable monitor 32 is carried on the person of a panelist participating in a market research study to track the presence and movements of the panelist into and within the retail store, as well as other such retail stores and/or other commercial establishments participating in the study. As depicted in FIG. 1, when the panelist enters the retail store at the entrance 20, the portable monitor 32 carried by the panelist receives a location signal from a radio frequency (RF) transmitter 36 positioned in proximity to the entrance 20. The frequency or frequencies of the location signal can be selected from any permissible frequency range, up to and including microwave frequencies. The location signal contains data from which the presence of the panelist at the entrance can be determined. Such data in certain embodiments comprises a transmitter identification code that uniquely identifies the transmitter 36. In certain embodiments a commercial establishment identification code is transmitted by the transmitter, along with the transmitter identification code. This transmitter identification code, and commercial establishment identification code, if any, are stored in a database where this data is associated with data identifying the location of the transmitter at the entrance to the retail store. In other embodiments, the location signal contains data that either directly or indirectly identifies the location. In still other embodiments, as described hereinbelow, a commercial establishment identification code is supplied to the monitor 32 for storage therein from another source, such as a separate wireless transmitter. The strength of the transmitted location signal, along with the sensitivity of the monitor 32 are selected to ensure that monitor 32 will only detect the data contained in the location signal when it is sufficiently near the identified location for the purposes of the study. In certain advantageous embodiments, one or both of the strength of the location signal and the sensitivity of the monitor are selected to ensure that the monitor 32 will only detect the data in the location signal when the monitor is located within a predetermined area to be monitored, such as a predetermined area in which a particular product or product display can be perceived by the panelist. When the monitor 32 detects the data contained in the location signal, it stores either the data or data based thereon, together with a time stamp indicating the time at which the data was received. With reference also to FIG. 2, after the panelist has entered the store and then proceeds down an aisle flanked by shelves 38 holding various products offered for sale, the panelist comes into the range of a transmitter 40. The portable monitor 32 carried by the panelist then detects the data contained in a further location signal from the transmitter 40, and stores it along with a time stamp indicating the time of detection of the further location signal. With reference particularly to FIG. 2, it will be seen that the transmitter 40 has been placed in the vicinity of a particular product offered for sale, here indicated as a fictitious product, Champs Chomp dog food. If the panelist lingers in the vicinity of transmitter 40, this indicates that the panelist may be interested in purchasing the adjacent product. Accordingly, periodically or from time to time the monitor 32 checks for the detection of the data contained in the same or a different location signal. If the data of the further location signal has again been detected, the monitor 32 stores further data indicating a duration of the continuous presence of the panelist in the vicinity of transmitter 40. FIG. 3 illustrates an embodiment of a table storing the location data and commercial establishment identification data detected by the monitor 32 from various location signals, together with time stamps indicating a time of detection of the data and the duration of continuous detection of the same data. In the exemplary table of FIG. 3, each row represents a record of the detection of the data from a respective transmitter, here represented as a transmitter ID, along with a monitor ID (which corresponds to the panelist to whom the particular monitor has been assigned), the time at which the data from that transmitter was first detected and a duration of continuous detection of the data from such transmitter. In certain other embodiments the data detected by the monitor is stored without the monitor ID which is not associated with the other stored data until it has been downloaded from the monitor 32. A first record 44 of the FIG. 3 table is an example of the data stored by portable monitor 32 upon detection of the data contained in a location signal received from transmitter 36 when the panelist enters the retail store through entrance 20. In the embodiment of FIG. 3, each transmitter transmits a signal containing location data as well as commercial establishment data (here indicated as a fictitious retail store, Ed's Emporium). In other embodiments, separate transmitters transmit commercial establishment data. In certain embodiments, the commercial establishment data directly identifies the commercial establishment, while in others the commercial establishment data is used to access or derive such identity. In certain embodiments, the commercial establishment data relates to the commercial establishment, with or without identifying it directly or indirectly. In certain embodiments, the identity of the commercial establishment in which a location signal transmitter is located is determined based solely on previously stored data associating a transmitter ID with the store or other establishment in which it is located. Returning to record 44 of FIG. 3, the recorded duration of this detection is indicated to be less than 5 seconds. A second record 48 stores data detected by monitor 32 in the vicinity of transmitter 40. Here the record indicates that the panelist remained for 20 seconds indicating interest in Champs Chomp dog food in Ed's Emporium. A further record 52 of the FIG. 3 table represents data gathered by the monitor as the panelist pauses in the vicinity of a transmitter 56 shown in FIG. 1 near the end of a store fixture 24. FIG. 4 illustrates the transmitter 56 mounted on an in-store product display 60 for a fictitious soft drink product, Double Whammy cola. As shown in FIG. 4, the product display 60 serves to attract attention to the product 66 which it carries or contains. As the panelist stops by the product display 60, the monitor records data indicating the duration of the panelist's presence near the product display providing an indication of its effectiveness in attracting consumer attention. With reference again to FIG. 1, as the panelist proceeds down another aisle, the monitor 32 detects data contained in a location signal from a transmitter 70 placed above the aisle to estimate the amount of traffic therethrough to detect whether the aisle is a “cold spot” in the store. The detected data is stored by the monitor 32 in a record such as exemplary record 74 shown in FIG. 3. Still later the panelist pauses in the vicinity of another transmitter 78 to examine a product, as indicated by record 82 in FIG. 3. Shortly thereafter, the panelist proceeds to the stores' checkout counter (not shown for purposes of simplicity and clarity) to pay for the selected products, and then leaves the store as indicated by record 86 in FIG. 3. FIG. 5 provides a block diagram of certain embodiments of the portable monitor 32, along with a block diagram 86 of certain embodiments of the transmitters 36, 40, 56, 70 and 78. In the diagram 86, an RF transmitter 90, antenna 94, code modulator 98, proximity detector 102, power switch 106 and power source 110 are enclosed or carried within a container 104. The container 104 preferably is small and otherwise inconspicuous, so that it is unnoticed by panelists and thus does not influence their behavior. In certain embodiments, the transmitters are contained in a thin laminated package that can be affixed inconspicuously to the bottom of a store shelf. In others they are carried in a small housing or encapsulated in molded plastic. In the transmitter embodiment 86, power from the power source 110 is only applied to the RF transmitter 90 and code modulator 98 when the proximity detector 102 detects the presence of a person in proximity to the transmitter 86 and turns on the normally off power switch 106. The proximity detector 102 senses a selected form or forms of data indicating the presence or approach of a person, such as changes or levels of infrared, thermal, light, or electrical energy, and then provides a switching signal to power switch 106 to turn it on. In certain embodiments an external switch is employed to switch on power, such as a pressure sensitive switch activated by the panelist's footstep or a doorway switch actuated by opening a door or passing through a doorway. Preferably power switch 106 remains on only long enough to ensure that a detectable location signal is transmitted to any monitor 32 that may be carried by a panelist nearby, so that power from the source 110 is conserved to ensure the continuing ability of the transmitter 86 to function. As an example only, in certain embodiments the power switch applies power continuously for 30 seconds after receipt of the switching signal and then automatically resets to an off state, so that the location signal is transmitted continuously for such 30 second period. In certain embodiments, the transmitter has two operational states, a standby, low power mode in which it does not transmit and a transmit mode in which it does. In such embodiments, the switch 106 or other circuitry switches the transmitter from the standby mode to the transmit mode when a person's proximity is detected. The RF transmitter 90 drives antenna 94 to transmit an RF location signal within an appropriate band selected as any permissible RF band up to and including microwave frequencies. In certain embodiments the RF transmitter 90 produces the location signal in an unlicensed 900 MHz band and at a sufficiently low power level so that its data will be detectable by monitor 32 only within a relatively short range. The data contained by the location signal is produced by code modulator 98 and applied as a modulating signal by code modulator 98 to RF transmitter 90. In certain embodiments, the data represents an identification of the transmitter itself, while in others it directly represents the location of the transmitter 86 or store or other commercial establishment. The location signal can be modulated in any manner that is compatible with the detection capabilities of portable monitor 32, such as by amplitude, frequency, pulse or phase modulation or any combination thereof. In certain embodiments the data is simply represented by the frequency of the location signal, so that a separate code modulator is not required. In certain embodiments, the data modulates the location signal to produce a periodically repeating code. As an example, such a code could repeat every 10 seconds during the transmission of the location signal, although a different repetition rate could be selected depending on the amount of data that must be transmitted and the detection error rate of the personal monitor 32 within the desired detection area. The power source 110 is selected as one that is capable of supplying sufficient power for a desired duration, such as the duration of the marketing study. The power source 110 in certain embodiments is selected as a rechargeable battery, a non-rechargeable battery, an energy storage device, a photoelectric power source and/or a different energy receiving device such as an antenna receiving energy from the portable monitor 32 or other external source. In certain embodiments rather than transmit upon detection of a person in proximity to the transmitter 86, the RF transmitter 90 transmits the location signal periodically. In still other embodiments the RF transmitter 90 transmits the location signal in response to a query signal transmitted from a transmitter included in the portable monitor 32 (not shown for purposes of simplicity and clarity). In certain embodiments, the transmitter is an RFID tag that receives a read signal from the monitor 32, and uses the energy of the received read signal to encode its data and retransmit the encoded data as a location signal. In embodiments which employ such RFID tags, it is advantageous to selectively key the monitor on to transmit such read signal as infrequently as possible, due to the relatively large amount of energy that must be transmitted by the monitor 32 to energize the RFID tag to retransmit a detectable location signal. For this purpose, in certain embodiments a transmitter is provided in or near the commercial establishment to key the monitor to transmit the read signal. In certain embodiments, one or more RF energy emitters separate from the monitors 32 are placed in or near the store or other commercial establishment to emit RF energy to be received by one or more nearby RFID tags in order to energize them to transmit their codes. When a panelist carrying a monitor 32 comes within range of one of such RFID tags, the monitor detects its code and stores appropriate data. In certain embodiments, the RF energy emitters emit RF energy continuously. In others, the RF energy emitters emit RF energy periodically, from time to time, at certain times or during certain time periods. In still other embodiments, the RF energy emitters emit RF energy upon detecting either a presence of a person or of a monitor 32. In other embodiments in place of an RF transmitter 90, the transmitter 86 employs a different type of wireless transmitter, such as an infrared, visible light or acoustic transmitter. An appropriate acoustic location code emitter for this purpose is disclosed in U.S. published patent application 20030171833 A1 in the names of Jack C. Crystal and James M. Jensen, assigned to the assignee of the present application and hereby incorporated in its entirety herein by reference. FIG. 5 also provides a block diagram of an embodiment of the portable monitor 32 which includes an RF receiver 114, an antenna 118, a microphone 122, conditioning circuitry 126, a processor 130, a memory 134, a coupling device 136 and an enclosure 138 containing all of the foregoing elements of portable monitor 32. The enclosure preferably is sufficiently small to permit the portable monitor 32 to be carried in or on an article of clothing worn by the panelist, such as a belt, pocket, collar or lapel, or on the panelist's wrist or elsewhere. In certain embodiments the enclosure 138 is provided with a clip, loop, necklace, band, pin or other device (not shown for purposes of simplicity and clarity) to affix or hang the monitor 32 to or from such an article of clothing or to the panelist's wrist, neck or elsewhere. In certain embodiments, the enclosure 138 has a size and shape similar to a pager, or cellular telephone. In certain embodiments, enclosure 138 has a size and shape similar to a credit card or smart card, so that it can be carried in a panelist's pocket or wallet or attached to a keychain. In still other or related embodiments, the enclosure 138 takes the form of a wristwatch, wristlet, card case, key fob, change purse, article of jewelry or other decorative or useful article, or else is adapted to be carried by or attached to one or more of the foregoing. RF receiver 114 has an input coupled with antenna 118 to receive the location signal and is operative to detect the data therein and supply it at an output coupled with processor 130 in a form suitable for input to the processor 130. Preferably, the receiver 114 is operated only periodically, or from time to time, in order to conserve power in the portable monitor 32. For example, in certain embodiments the receiver 144 is turned on for a 10 second period during a repeating 30 second interval. Where the transmitter 86 transmits the location signal in a different form, such as infrared or visible light, wireless receiver 114 and antenna 118 are replaced in other embodiments of the portable monitor 32 by a suitable light sensor and conditioning circuitry coupled with the light sensor and operative to detect the data contained in the location signal and supply it in a suitable form to the processor 130. Where the transmitter 86 instead transmits an acoustic location signal, in certain embodiments of portable monitor 32 the microphone 122 and conditioning circuitry 126 serve to receive the location signal and supply it in suitable form to the processor 130. In certain ones of such embodiments the processor 130 serves to detect the data contained in the location signal transmitted in acoustic form. The processor 130 is also operative to store the detected location data with a time stamp produced by processor 130 or else by a separate clock (not shown for purposes of simplicity and clarity). Where the processor continues to receive the same location code, in certain embodiments it produces duration data indicating a duration of continuous receipt of the same location data and stores it in association with the location data and time stamp. In certain other embodiments, in place of duration data, the processor instead stores an ending time stamp representing a point in time when it no longer continues to receive the same location data. In still other embodiments, the processor simply stores each detection of the location data with a respective time stamp associated therewith. The embodiments of portable monitor 32 illustrated in FIG. 5 also serve to monitor exposure of the panelist to media data having an acoustic component, such as radio and television broadcasts, prerecorded content and streaming media. This is achieved in certain embodiments by processing acoustic data received by microphone 122 in processor 130. Processor 130 analyzes the acoustic data to detect the presence of an ancillary code therein or to extract a signature therefrom, which can be used to identify or otherwise characterize the media data. Suitable analysis techniques are disclosed in published U.S. patent application 20030005430 A1 in the name of Ronald S. Kolessar, assigned to the assignee of the present invention and hereby incorporated herein by reference in its entirety. The monitor 32 stores such media data exposure data in storage 134 together with time stamps representing timing of exposure thereto. Preferably, the time stamp is obtained from the same source as that stored with the data indicating detection of the location data so that the time stamps are all on the same predetermined time base. In certain embodiments, a commercial establishment signal is transmitted to the monitor 32 by a transmitter other than those employed as in FIG. 1 to represent particular locations within store 10 or other commercial establishment. Such a transmitter used to transmit a commercial establishment signal, containing data such as store identification data, store location data or other data representing a commercial establishment, comprises an RF transmitter in certain embodiments, and in others comprises a light signal transmitter which transmits infrared or visible light. In still other embodiments, an acoustic transmitter is employed to transmit the commercial establishment signal. An embodiment of such an acoustic transmitter is illustrated in FIG. 5 as acoustic transmitter 112. Acoustic transmitter 112 is positioned to emit acoustic energy such as broadcast, streaming or reproduced audio (for example, music) and/or public address audio (such as announcements to shoppers), within the commercial establishment, such as store 10. A source of such audio is represented by device 116 of transmitter 112. Acoustic transmitter 112 also comprises an encoder 120 which receives the audio from source 116 and encodes the commercial establishment data therein. Encoder 120 evaluates the ability of the received audio to mask the data when encoded in the audio and produces or adjusts the level, frequency, phase and/or other characteristic of the data to be encoded or as encoded, so that the code is inaudible when the audio is reproduced as sound. The encoded audio is output by the encoder 120 to a speaker 124 which emits the encoded audio as acoustic energy. The encoder 120 in certain embodiments comprises an encoder of the kind disclosed in U.S. patent application Ser. No. 10/302,309 in the names of James M. Jensen and Alan R. Neuhauser, assigned to the assignee of the present application and incorporated herein by reference in its entirety and/or of the kind disclosed in U.S. Pat. No. 5,764,763 in the names of James M. Jensen, et al, assigned to the assignee of the present application and incorporated herein by reference in its entirety. In certain embodiments the audio supplied from the source 116 is already encoded with the commercial establishment signal, for example, by encoding the audio and storing it for later reproduction. In still other embodiments, rather than encode an audio signal the acoustic transmitter samples the ambient acoustic energy to evaluate its ability to mask the commercial establishment signal and emits the commercial establishment signal having appropriate characteristics to ensure that the ambient acoustic energy will mask it. Embodiments of such acoustic transmitters are disclosed in U.S. published patent application 20030171833 A1, mentioned above. In certain embodiments of the present invention which employ acoustic transmitters to transmit location signals and/or commercial establishment signals, the personal monitor 32 employs the microphone 122 to receive such acoustic signals and detects the data therein by means of the processor 130. In certain ones of such embodiments, the processor 130 advantageously employs a detection technique disclosed in U.S. Pat. No. 5,764,763, mentioned above, to detect the data encoded in the various acoustic signals. In certain embodiments, acoustic transmitters are employed both to emit location signals at various locations throughout a commercial establishment, but also to transmit a commercial establishment signal. In such embodiments it is possible to dispense with the use of an RF receiver in monitor 32. In certain ones of such embodiments used to monitor a panelist's presence at or near a small commercial establishment, such as a kiosk in a shopping mall, an acoustic transmitter is employed to transmit an acoustic signal in the vicinity of the commercial establishment containing commercial establishment data identifying or otherwise relating to it. When a panelist carrying a monitor 32 approaches such a commercial establishment closely enough so that the panelist can perceive it or the products or services it offers, the monitor 32 detects and stores the commercial establishment data to record the panelist's presence. In certain embodiments wherein the location transmitters 36, 40, 56, 70 and 78 comprise acoustic transmitters, the acoustic transmitters transmit acoustic signals containing both location data and commercial establishment data to the monitor 32 which detects and stores both of these data from the received acoustic signal. In certain advantageous embodiments, both the location data and the commercial establishment data are encoded and detected according to techniques disclosed in U.S. patent application Ser. No. 10/302,309, mentioned above. In one such encoding technique, the location data and commercial establishment data are transmitted repeatedly, but each has a different duration. The monitor 32 employs two accumulators, one of which is a register having a length selected to accumulate the location data and the other of which is a different register having a length selected to accumulate the commercial establishment data. Although components of each of the data are accumulated in both registers, a register having a length selected to accumulate the location data, for example, will additively accumulate components of the location data, but will not accumulate corresponding components of the commercial establishment data, so that the commercial establishment data will appear as noise in this register. In certain embodiments portable monitor 32 serves to monitor exposure to media displays in outdoor settings, such as highways, railways, and walkways, and/or in indoor settings, such as malls, subways, railway stations, bus stations, airports and building lobbies. FIG. 6 illustrates a use of monitor 32 for this purpose, in particular, to monitor exposure of a panelist carrying portable monitor 32 to a billboard advertisement, in FIG. 6 shown as an advertisement 140 for a fictitious dog food product. In the embodiment of FIG. 6, an RF transmitter 144 drives an antenna 148 to transmit a billboard proximity signal at a power level chosen to ensure that billboard proximity data contained in the signal can only be detected by portable monitor 32 when it is positioned at a location from which the panelist can view the billboard advertisement. The billboard proximity data is stored by the monitor 32 along with a time stamp representing a time of exposure to the billboard advertisement 140. Preferably, the time stamp is obtained from the same source as that stored with the data indicating detection of the location data so that the time stamps are all on the same predetermined time base. In certain embodiments receiver 114 of portable monitor 32 is arranged to receive the billboard proximity signal and detect the billboard proximity data therein. In other embodiments, a different wireless receiver is included in monitor 32 for this purpose. Further embodiments of media display exposure monitoring means suitable for use in monitor 32 are disclosed in U.S. patent application Ser. No. 10/329,132 in the names of Jack K. Zhang, Jack C. Crystal and James M. Jensen, assigned to the assignee of the present application and hereby incorporated by reference herein in its entirety. Still further embodiments of media display exposure monitoring means suitable for use in monitor 32 are disclosed in U.S. patent application Ser. No. 10/640,104 in the names of Jack K. Zhang, Jack C. Crystal, James M. Jensen and Eugene L. Flanagan III, assigned to the assignee of the present application and hereby incorporated by reference herein in its entirety. FIG. 7 illustrates a system for communicating the data stored in the personal monitor 32, as well as other personal monitors 32 assigned to other members of the same household acting as panelists in the same study, to a centralized processor 166 for use in producing reports of interest to store managers, distributors, manufacturers, other advertisers, media organizations, etc. In certain embodiments, from time to time, or periodically, each panelist in the household docks his/her portable monitor 32 in a respective base station 150, 154 to download data stored in the portable monitors. The monitor 32 communicates with the base station by means of the coupling device 136 (see FIG. 5), which in certain embodiments is an optoelectronic coupling device. In certain embodiments, the monitor communicates with the base station by means of an RF transceiver or other wireless transceiver (not shown for purposes of simplicity and clarity) without docking the monitor in the base station. This communication is initiated either by the monitor 32 or the base station 150, 154, periodically, at a predetermined time or from time to time. In certain further embodiments, the portable monitor 32 comprises a wireless network transceiver (not shown for purposes of simplicity and clarity) to establish a wireless link 164 to the communications network 162 to download data, using a WiFi or other wireless networking protocol. In still further embodiments, the portable monitor 32 comprises a cellular telephone module (not shown for purposes of simplicity and clarity) to establish a wireless link with a telephone network to download data. Once the data has been downloaded, the memory 134 of the monitor 32 is reset to store further data. The base stations may be, for example, those disclosed in U.S. Pat. No. 5,483,276 to Brooks, et al., assigned to the assignee of the present invention and hereby incorporated herein by reference in its entirety. The base stations 150, 154 communicate with a communications hub 158 also located in the household for communication via a network 162 to the centralized processor 166 located remotely from the household. The centralized processor 166 likewise receives data from other panelists' households to produce reports as mentioned above. The centralized processor 166 stores the received data in one or more databases from which it is accessed to produce such reports. A relational database for use in storing the downloaded data gathered by monitors 32 in various commercial establishments, for use in producing reports concerning consumer behavior in such commercial establishments, is now described with reference to FIGS. 3 and 8. FIG. 8 illustrates a table 170 that stores records identifying the various transmitters 86 (FIG. 5) employed in the consumer behavior study by transmitter ID along with the commercial establishment (a store in this illustration) in which it is located and the specific location of the transmitter therein. For example, row 174 of table 170 provides an examplary record for a transmitter having ID “9562” installed in a fictitious retail store, Ed's Emporium, in the village of Bayville and located near the entrance of this store. Table 170 also provides data identifying a product or promotional display at the location of certain ones of the transmitters 86, as well as the distributor or manufacturer of such product or promotional display. For example, row 178 of FIG. 8 provides an examplary record for a transmitter having transmitter ID “8723” installed in the fictitious retail store mentioned above and at the location of a fictitious product, Champ's Chomp dog food, offered for sale in the store. The record of row 178 also identifies the manufacturer or distributor of the product, here indicated as a fictitious business entity, Dog's Best Friend. Similarly, table 170 includes many other such records, each for a respective transmitter identified by its transmitter ID, and indicating its location by store, in-store location and store owner or client, and as appropriate, either the product or promotional display at such location, and its distributor or manufacturer. It is noted that all of the clients or store owners, as well as the products and their respective manufacturers or distributors listed in table 170, are fictitious and serve only to illustrate exemplary records. In certain embodiments, the table of FIG. 8 is compiled from data supplied by personnel engaged to install the transmitters in the various commercial establishments participating in the study. In certain embodiments, the data is supplied in written form by such personnel to data entry personnel who populate the table 170 of FIG. 8. In certain embodiments, the personnel instead log the locations of previously installed wireless transmitters and distinctive data provided thereby. Such previously installed transmitters include wireless communication devices installed with intelligent shelves. The intelligent shelves serve to gather data concerning the products placed thereon for inventory control purposes and communicate such data as well as the identity of the intelligent shelf to a data gathering system of the commercial establishment. Certain embodiments of the present invention make use of the identity data where it is transmitted wirelessly from the intelligent shelf. Certain of these embodiments also gather data concerning the products placed on the intelligent shelves for populating the “product” field of the table of FIG. 8. Preferably the data is compiled in the table from records communicated from portable electronic devices in the possession of the personnel installing or logging the transmitters in the various participating establishments. Suitable electronic devices for this purpose are disclosed in U.S. patent application Ser. No. ______ filed concurrently herewith in the names of Jack K. Zhang and James M. Jensen (Attorney's Docket 03382-P0123A). As described above, FIG. 3 illustrates a table recording detections of various ones of the transmitters 86 by the monitor 32, along with the times at which each was detected and the duration of continuous detection of the same transmitter location signal. The table of FIG. 3, together with the table of FIG. 8 comprise a relational database providing the ability to map panelist exposures to various products and promotional displays within the participating commercial establishments as well as to assess traffic flow through the participating commercial establishments. It is thus possible to produce reports of various kinds useful to the managers of such commercial establishments as well as the distributors and manufacturers whose products are offered for sale therein. In certain ones of such reports, the presence/exposure data of FIG. 3 and the data of FIG. 8 is processed to estimate the frequency, duration and density of exposure of consumers to various locations, products and promotional displays within each of the participating establishments whether based on time of day or otherwise. By means of the table of FIG. 8, such data is readily presented by overlaying the same on a layout map of the establishment, and the identity of the products and promotional materials at the corresponding locations is likewise readily presented on the same map as an overlay in correspondence with the frequency, duration and density of exposure data described above to enable store managers, manufacturers and distributors to assess the exposure of various products and promotional materials in the store or other establishment. It is thus possible based on such reports to formulate placement recommendations for products and promotional materials in retail stores. It is likewise possible with the same data to produce traffic flow reports which enable the store managers to determine the locations of “hot spots” and “cold spots” within their commercial establishments. Store managers are thus enabled to evaluate whether changes should be made in the layouts of their establishments to improve customer traffic and increase exposure of product and service offerings. As noted above, in certain embodiments of the personal monitors 32, not only is such data gathered but also data indicating exposure to media data such as television and radio broadcast exposure, as well as exposure to media displays, both outdoor and indoor. The systems and methods of the present inventions thus provide integrated data measuring not only behavior of consumers within commercial establishments but also exposure of such consumers to media data and the advertisements conveyed thereby. It is thus possible to evaluate the effects of the exposure to advertising of predetermined individuals to their behavior in commercial establishments, especially in regard to interest in particular products that may be stimulated by such advertising. Further embodiments of a system and method for monitoring the presence and movements of a panelist within a commercial establishment in accordance with certain embodiments of the present invention are now described. In certain embodiments the receiver 114 of portable monitor 32 receives one or more signals from one or more wireless transmitters within or near the commercial establishment, but not associated with particular locations within the commercial establishment, and generates location data indicative of a location of the portable monitor 32 within the commercial establishment based upon the received signals. In other embodiments, the monitor 32 includes a GPS receiver (not shown for purposes of simplicity and clarity) to obtain such position data in the form of latitude and longitude. In certain advantageous embodiments, the monitor employs an assisted GPS location system. In certain other embodiments the portable monitor transmits a signal that is received by one or more receiving devices within or near the commercial establishment to determine the location of the portable monitor. In still other embodiments, the portable monitor includes a cellular telephone module (not shown for purposes of simplicity and clarity) that communicates with a cellular telephone system to obtain data therefrom representing the location of the portable monitor 32 based on signals received from the cellular telephone module. Such location data is provided as latitude and longitude or in another usable form. In still further embodiments, the portable monitor 32 employs at least one of the following techniques to generate the location data: an angle of arrival (AOA) technique, a time difference of arrival (TDOA) technique, an enhanced signal strength (ESS) technique, a location fingerprinting technique, and an ultra wideband location technique. Each of these techniques is now briefly described. The angle of arrival (AOA) technique determines the direction of a signal received from a radio frequency (RF) transmitter. This can be done by pointing a directional antenna along the line of maximum signal strength. Alternatively, signal direction can be determined from the difference in time of arrival of the incoming signals at different elements of the antenna. A two-element antenna is typically used to cover angles of ±60 degrees. To achieve 360-degree coverage, a six-element antenna can be used. However, a single mobile directional antenna can give only the bearing, not the position, of a transmitting object. With two directional antennas spaced well apart, however, the position of a transmitting device in a plane can be computed. In this method, also known as the angle of arrival (AOA) method, transmitter position is determined from the known (fixed) position of the receivers' antennas and the angle of arrival of the signals with respect to the antennas. In certain embodiments the portable monitor 32 includes a transmitter that enables its location to be determined in accordance with the angle of arrival method. The time difference of arrival (TDOA) technique is based upon the similar concept that the difference in time of arrival between signals received at antennas at different locations can be used to determine position. Given the speed of light and known transmit and receive times, the distance between a transmitter and the receiver antenna can be calculated. In certain embodiments the portable monitor 32 includes a transmitter that enables its location to be determined in accordance with the time difference of arrival technique. In an alternative time difference scheme, the monitor and the antennas reverse roles: the antennas are transmitters and the portable monitor 32 incorporates a receiver. This technique is known as forward link trilateration (FLT). This is relatively simple to implement in some code-division multiple access (CDMA) wireless systems, where the time difference of arrival can be determined from the phase difference between pseudo-random noise code sequences of 0s and 1s transmitted from two antennas. In certain embodiments the portable monitor 32 includes a receiver, such as a CDMA cellular telephone receiver, that enables its location to be determined in accordance with the forward link trilateration method. When the term “time difference of arrival technique” is used herein, the term is meant to encompass both the traditional time difference of arrival (TDOA) method and the forward link trilateration (FLT) method. The enhanced signal strength (ESS) method provides improvements over conventional signal strength methods by overcoming such impediments as multipath effects, attenuation, and antenna orientation. The method involves taking in three-dimensional information on the objects, walls, and other features and obstructions within the commercial establishment, and using such information to simulate the RF signal propagation characteristics of wireless transmitting antennas in the area. A location system center stores the results in an RF database. The position of the portable monitor is determined by getting it to measure the signal strength of preferably three to five base transmitters. From this input plus information from the database, the system can calculate the position of the portable monitor. Inside large commercial establishments, such as malls and department stores with appropriate base transmitters located therein, the position of a portable monitor can be determined by means of the ESS method. In certain embodiments the portable monitor 32 includes a receiver that enables its location to be determined in accordance with the ESS method. The location fingerprinting technique, instead of exploiting signal timing or signal strength, relies on signal structure characteristics. The technique turns the multipath phenomenon to good use by combining the multipath pattern with other signal characteristics, to create a signature unique to a given location. A location fingerprinting system includes a signal signature database of a location grid for a specific area. To generate this database, a device is walked through the area transmitting or receiving signals to or from a monitoring site. The system analyzes the incoming signals, compiles a unique signature for each square in the location grid, and stores it in the database. To determine the position of a mobile transmitter or receiver, the system matches the transmitter's or receiver's signal signature to an entry in the database. Multipoint signal reception is not required, although it is preferable. The system can use data from only a single point to determine location. In certain embodiments the portable monitor 32 includes a transmitter or a receiver that enables its location to be determined in accordance with the location fingerprinting technique. In certain ultra wideband location techniques a network of localizers determine relative locations in three-dimensional space by measuring propagation times of pseudorandom sequences of electromagnetic impulses. The propagation time is determined from a correlator which provides an analog pseudo-autocorrelation function sampled at discrete time bins. The correlator has a number of integrators, each integrator providing a signal proportional to the time integral of the product of the expected pulse sequence delayed by one of the discrete time bins, and the non-delayed received antenna signal. Using pattern recognition the arrival time of the received signal can be determined to within a time much smaller than the separation between bins. In certain ultra wideband techniques, wireless ultra wideband transceivers are positioned at known stationary locations within the area to be monitored, and the portable monitor 32 includes a wireless ultra wideband receiver/processor that receives one or more timed pulses from the various transceivers and resolves the location of the portable monitor within the monitored area based on the locations of the ultra wideband transceivers and time-of-flight measurements of the pulse or pulses. In certain embodiments, the portable monitor 32 includes an ultra wideband transmitter and a plurality of interacting receivers in stationary positions receive a pulse from the transmitter of the portable monitor 32 to determine its location. In certain of the embodiments, the stationary transceivers or receivers are coupled by cabling, while in others they are untethered. Referring now to FIG. 9, a system is illustrated in block form for measuring the exposure of a panelist to media data and media displays, as well as for monitoring the presence and movements of the panelist within a commercial establishment, in accordance with certain embodiments of the present invention. In FIG. 9, elements corresponding to those of FIG. 5 bear the same reference numerals. Similarly to the system shown in FIG. 5, the system of FIG. 9 includes a portable monitor 204 arranged to be carried on the person of a panelist. The portable monitor 204 receives one or more signals from one or more terrestrial sources and/or satellite sources, and generates data indicative of a location of the portable monitor 204. In certain embodiments, the signals used for this purpose are obtained from a cellular telephone system or from a GPS or assisted GPS receiver, as described above. However, in the system of FIG. 9, the location data is provided by an inertial monitoring device 200 which forms a part of portable monitor 204 and the received signals are used to provide location calibration data to the inertial monitoring device. Such calibration, which is described more fully below, may be performed periodically or from time to time, or whenever the signals from the terrestrial and/or satellite sources are received. In the embodiment of FIG. 9 the inertial monitoring device 200 of the portable monitor 204 is calibrated by means of a signal transmitted by a calibration transmitter or transmitters 86 located in or in proximity to a commercial establishment in which the movements of the panelist wearing the monitor are to be tracked. Advantageously, in certain embodiments the calibration transmitter or transmitters are located by an entrance or exit of the establishment through which the panelist must pass to enter or leave the commercial establishment. The calibration signal is transmitted at sufficiently low power to ensure that it will be received only when the portable monitor is close by. The inertial monitoring device preferably is small in size and lightweight. An advantageous embodiment of such an inertial monitoring device employs microelectromechanical sensors (MEMS) as either gyroscopic sensors and/or accelerometers to provide data from which the location of the monitor can be determined. In certain embodiments to calibrate the inertial monitoring device 200 the portable monitor 204 employs satellite-based techniques, such as global positioning system (GPS) and/or server assisted GPS technology, and/or terrestrial techniques, such as an angle of arrival (AOA) technique, a time difference of arrival (TDOA) technique, an enhanced signal strength (ESS) technique, a location fingerprinting technique, and/or an ultra wideband location technique. Although various embodiments of the present invention have been described with reference to a particular arrangement of parts, features and the like, these are not intended to exhaust all possible arrangements or features, and indeed many other embodiments, modifications and variations will be ascertainable to those of skill in the art.
<SOH> BACKGROUND OF THE INVENTION <EOH>Managers of commercial establishments, such as retail stores, shopping malls, transportation centers and the like, responsible for maximizing sales of products and services, are well aware that the layout of their facilities has a substantial impact on sales volume. To evaluate this impact, it is necessary to gather data characterizing the flow of customer traffic into and within the facility. This data will reveal the locations where customers are present more frequently (“hot spots”) and those where customer traffic is lighter (“cold spots”). With this information, it is possible for the manager to make changes in features that affect accessibility, lighting, fixture space, product placement, and the like that will improve product exposure and reduce the number and/or size of cold spots. After such changes have been made, the manager will often wish to conduct a further traffic flow study to assess the effectiveness of these changes. The tracking data, along with product placement data are also important to distributors of products sold in commercial establishments. This information enables them to evaluate whether their products are receiving sufficient attention in a retail store, so that the cost of shelf space is justified. It also enables them to assess whether they should request shelf space for their products in a different location in the store. Traditionally such traffic flow studies have been conducted manually. One or more of the manager's employees would record the movements of customers within the facility on a sheet representing its layout. The accumulated data would then be reviewed by the manager. Clearly, this is a labor-intensive way of gathering such data. It is also potentially annoying to customers if the employees tracking them are not very discrete. It is desired, therefore, to provide a less expensive and less potentially annoying way to gather such traffic flow data. In addition, both managers of commercial establishments as well as manufacturers and distributors would like to obtain reports from which they can evaluate the effectiveness of their advertising expenditures, based not only on such traffic flow data but also on media exposure data and the like.
<SOH> SUMMARY OF THE INVENTION <EOH>For this application the following terms and definitions shall apply: The term “data” as used herein means any indicia, signals, marks, symbols, domains, symbol sets, representations, and any other physical form or forms representing information, whether permanent or temporary, whether visible, audible, acoustic, electric, magnetic, electromagnetic or otherwise manifested. The term “data” as used to represent predetermined information in one physical form shall be deemed to encompass any and all representations of the same predetermined information in a different physical form or forms. The term “media data” as used herein means data which is widely accessible, whether over-the-air, or via cable, satellite, network, internetwork (including the Internet), distributed on storage media, or otherwise, without regard to the form or content thereof, and including but not limited to audio, video, text, images, animations, web pages and streaming media data. The term “database” as used herein means an organized body of related data, regardless of the manner in which the data or the organized body thereof is represented. For example, the organized body of related data may be in the form of a table, a map, a grid, a list or in any other form. The term “location” as used herein refers to a position relative to a commercial establishment, a product display, a product, another object or facility, or relative to a coordinate system such as latitude and longitude. The term “layout map” as used herein means a database of data representing locations in a commercial establishment. The term “network” as used herein includes both networks and internetworks of all kinds, including the Internet, and is not limited to any particular network or inter-network. The terms “first” and “second” are used to distinguish one element, set, data, object or thing from another, and are not used to designate relative position or arrangement in time. The terms “coupled”, “coupled to”, and “coupled with” as used herein each mean a relationship between or among two or more devices, apparatus, files, programs, media, components, networks, systems, subsystems, and/or means, constituting any one or more of (a) a connection, whether direct or through one or more other devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means, (b) a communications relationship, whether direct or through one or more other devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means, and/or (c) a functional relationship in which the operation of any one or more devices, apparatus, files, programs, media, components, networks, systems, subsystems, or means depends, in whole or in part, on the operation of any one or more others thereof. The terms “communicate” and “communication” as used herein include both conveying data from a source to a destination, and delivering data to a communications medium, system or link to be conveyed to a destination. The term “processor” as used herein means processing devices, apparatus, programs, circuits, systems and subsystems, whether implemented in hardware, software or both. The terms “storage” and “data storage” as used herein mean data storage devices, apparatus, programs, circuits, systems, subsystems and storage media serving to retain data, whether on a temporary or permanent basis, and to provide such retained data. In accordance with an aspect of the present invention, a method is provided for monitoring the presence and/or movements of participants in a market research study. The method comprises providing signal transmitters at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; providing a wireless receiver to each of a plurality of participants in the market research study, the wireless receiver being adapted to be carried on the person of one of the participants and operative to receive respective ones of the location signals when in a vicinity of each of the locations; associating time data with each of the respective ones of the location signals corresponding to a time of reception thereof; and storing the received respective ones of the location signals and the associated time data within the wireless receiver for use in the market research study. In accordance with a further aspect of the present invention, a system is provided for monitoring the presence and/or movements of participants in a market research study. The system comprises a plurality of signal transmitters provided at predetermined locations within a commercial establishment to wirelessly transmit location signals associated with the locations; and a plurality of monitors each adapted to be carried on the person of one of the participants in the market research study, wherein each of the monitors includes a wireless receiver operative to receive respective ones of the location signals when in a vicinity of each of the locations, a clock for producing time data associated with each of the respective ones of the location signals when received by the wireless receiver, and a memory coupled to the wireless receiver and to the clock for storing the received respective ones of the location signals and the associated time data within the wireless receiver for extraction and use in the market research study. In accordance with another aspect of the present invention, a method is provided for gathering data representing customer behavior in a commercial establishment. The method comprises providing a layout map representing a plurality of locations within a commercial establishment; providing a portable monitor to each of a plurality of panelists participating in a customer behavior study to be worn thereby; gathering panelist presence data in the portable monitors representing a presence of respective ones of the panelists at identified ones of the locations within the commercial establishment; and associating the panelist presence data with the plurality of locations represented by the layout map. In accordance with still another aspect of the present invention, a relational database is provided for storing data representing consumer behavior in a commercial establishment. The relational database comprises a first table storing a plurality of first records, each of the first records including a first field storing wireless transmitter data representing a respective one of a plurality of wireless transmitters provided in the commercial establishment and operative to transmit corresponding transmitter data and a second field storing location data representing a location of the respective one of the plurality of wireless transmitters in the retail establishment; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing a respective one of the plurality of wireless transmitters from which the portable monitor received transmitted corresponding transmitter data. In accordance with a still further aspect of the present invention, a method is provided for gathering market research data. The method comprises providing a portable monitor to each of a plurality of panelists participating in a market research study to be worn thereby; producing presence data within the portable monitors of ones of the plurality of panelists indicating their presence at a plurality of locations within at least one commercial establishment; and producing media data exposure data within the portable monitors of ones of the plurality of panelists indicating exposure thereof to media data. In accordance with yet another aspect of the present invention, a relational database is provided for storing data representing consumer behavior in a commercial establishment. The relational database comprises a first table storing a plurality of first records, each of the first records including a first field storing location data identifying a location within a commercial establishment and a second field storing coordinate data representing a position of the location in a predetermined coordinate system; and a second table storing a plurality of second records, each of the second records including a first field representing a consumer participating in a consumer behavior study by carrying a portable monitor and a second field representing coordinates of a position of the consumer in the predetermined coordinate system
20040315
20081209
20050915
71028.0
0
TANG, SON M
METHODS AND SYSTEMS FOR GATHERING MARKET RESEARCH DATA WITHIN COMMERCIAL ESTABLISHMENTS
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,560
ACCEPTED
Articulated lacrosse stick
An articulated lacrosse stick having a head portion, a handle portion and an articulation mechanism capable of moving a first portion of the stick from a first position to a second different position with respect to a second portion of the stick is disclosed. The head portion may be articulated with respect to the handle portion. A first handle portion of stick may be articulated with respect to a second handle portion.
1. A lacrosse stick comprising: a handle; and an articulated head connected to the handle. 2. The lacrosse stick of claim 1, wherein the articulated head is connected to the handle by an articulation mechanism. 3. The lacrosse stick of claim 2, wherein the articulation mechanism is located between an end of the handle and a base of the head. 4. The lacrosse stick of claim 2, wherein the handle comprises a first handle portion and a second handle portion and the articulation mechanism connects the first handle portion and the second handle portion. 5. The lacrosse stick of claim 1, wherein the articulation mechanism is contained within the head and handle. 6. The lacrosse stick of claim 1, wherein the head is moveable from a longitudinal axis of the handle to a displacement angle of up to about 60 degrees. 7. The lacrosse stick of claim 6, wherein the displacement angle is from about 1 degree to about 10 degrees. 8. The lacrosse stick of claim 6, wherein the displacement angle is from about 2 degrees to about 5 degrees. 9. The lacrosse stick of claim 1, wherein the head is moveable from a longitudinal axis of the handle to first and second displacement angles of up to about 60 degrees each. 10. The lacrosse stick of claim 9, wherein the first displacement angle and the second displacement angles are oriented in opposite directions from each other. 11. The lacrosse stick of claim 10, wherein the first and second displacement angles are the same. 12. The lacrosse stick of claim 10, wherein the first and second displacement angles are different. 13. The lacrosse stick of claim 1, wherein the head is articulated in a direction in which a lacrosse ball would exist the head. 14. The lacrosse stick of claim 2, wherein the articulation mechanism comprises: a first element having an extended portion; and a second element having an interior that is sized to allow the first element to at least partially engage the interior and move from a first position to a second position within the interior. 15. The lacrosse stick of claim 14, wherein the first element and the second element are connected by a fastener that allows the first element to pivot or hinge with respect to the second element. 16. The lacrosse stick of claim 14, wherein the extended portion comprises projections and the second element comprises at least two pieces structured and arranged to be fitted together over the projections. 17. The lacrosse stick of claim 14, wherein the second element comprises a resistive material in the interior. 18. The lacrosse stick of claim 17, wherein the resistive material is a polymeric foam, a polyurethane bushing, a coiled spring, a living hinge or a metal or polymeric composition having at least some elasticity. 19. The lacrosse stick of claim 2, wherein the articulation mechanism comprises: a first element; a second element; and a move bar comprising at least one pivotable fastening element connected to the first element and second element. 20. The lacrosse stick of claim 2, wherein the articulation mechanism comprises a ball and socket assembly. 21. The lacrosse stick of claim 2, wherein the articulation mechanism comprises a living hinge. 22. The lacrosse stick of claim 2, wherein the handle portion comprises a Y-shaped area having a yoke, the articulation mechanism comprises at least one first element which pivotally connects the head portion to the Y-shaped area and at least one second element disposed on the handle portion for restricting at least some flexure of the head portion with respect to the handle portion. 23. The lacrosse stick of claim 2, wherein the head portion comprises a first head portion and a second head portion, and the articulation mechanism articulates the first head portion with respect to the second head portion. 24. The lacrosse stick of claim 2, further comprising a radially-expandable system comprising a plurality of offset wedges and a fastener. 25. The lacrosse stick of claim 2, further comprising a locking mechanism for restricting the flexure of the head portion with respect to the handle portion. 26. An articulated lacrosse stick comprising: a handle; and a head; means for articulating the head with respect to the handle. 27. The lacrosse stick of claim 26, wherein the means for articulating the head comprises an articulation mechanism for displacing the head portion from a longitudinal axis of the handle portion by a displacement angle of up to about 60 degrees. 28. The lacrosse stick of claim 26, wherein the displacement angle is from about 1 degree to about 10 degrees. 29. The lacrosse stick of claim 26, wherein the displacement angle is from about 2 degrees to about 5 degrees. 30. An articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising: a first element; and a second element connected to the first element such that the first element can pivot, hinge or flex with respect to the other element. 31. The articulation mechanism of claim 30, wherein the first element is moveable from a longitudinal axis of the second element by a displacement angle of up to about 60 degrees. 32. The articulation mechanism of claim 31, wherein the displacement angle is from about 1 degree to about 10 degrees. 33. The articulation mechanism of claim 31, wherein the displacement angle is from about 2 degrees to about 5 degrees. 34. The articulation mechanism of claim 30, wherein the first element is moveable from a longitudinal axis of the second element to first and second displacement angles of up to about 60 degrees each. 35. An articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising: means for connecting the head to the handle; and means for displacing the head from the longitudinal axis of the handle. 36. The articulation mechanism of claim 35, wherein the means for displacing displaces the head from the longitudinal axis of the handle by a displacement angle of from about 1 degree to about 60 degrees. 37. The articulation mechanism of claim 35, wherein the means for displacing displaces the head from the longitudinal axis of the handle by a displacement angle of from about 2 degrees to about 10 degrees.
CROSS-REFERENCE TO RELATED APPLICATION This application claims the benefit of U.S. Provisional Patent Application Ser. No. 60/455,027 filed Mar. 14, 2003, which is incorporated herein by reference. FIELD OF THE INVENTION This invention relates to a lacrosse stick, and more particularly relates to an articulated lacrosse stick having an articulated or pivoting connection between the head portion and the handle portion. BACKGROUND INFORMATION The sport of lacrosse requires players to use a lacrosse stick to catch a ball, cradle and control the ball and pass the ball to another player or shoot the ball into a goal. The lacrosse stick typically comprises two portions: a head portion and a handle portion. The head is typically constructed to receive the ball and release the ball from a pocketed or basket area while the handle is typically constructed to allow the player to impart momentum to the ball by using upper body strength. Traditional lacrosse sticks are substantially rigid in that they do not flex during use. Some sticks have a one-piece design in which the head and stick handle are jointly formed from a single piece of wood, metal or plastic. Other sticks have a two-piece design in which the head and stick handle are independently fabricated and subsequently joined together in rigid fashion. Stick handles have typically been formed of wood, metal, such as aluminum, or plastic. Stick heads are typically formed of a tough thermoplastic material, however, some are also formed of wood or metal. Sticks having a two-piece design typically include a socket element to allow the stick handle to be rigidly attached to the head. The head of a lacrosse stick is typically attached to the stick in a coaxial orientation. Typically, the frame head comprises at least one sidewall element that extends away from the handle portion of the stick and forming an open mouth for receiving a lacrosse ball. Suspended from the open mouth is a netting, mesh or other material that defines a basket in which the lacrosse ball is received, and from which a lacrosse ball may be passed. Historically, lacrosse sticks were fabricated from a single piece of high-grade ash or hickory wood. However, with the decreasing availability of quality woodworking skills necessary to fabricate lacrosse sticks having integral one-piece wooden stick-head configuration, it has become commonplace to fabricate two-piece lacrosse sticks having a separate stick handle and head portion. Stick handles are typically made of straight-grained wood, wood laminate or a tough, lightweight metallic or reinforced plastic tubular material. Thin gauge metallic extrusion, such as aluminum, or tough polymeric materials, such as fiber reinforced composite plastics, are typically the most suitable materials for lacrosse stick handles. Head frames are typically formed from a tough synthetic thermoplastic material, such as high impact strength nylon. Atypically, the frame head and stick handle are fastened together at the socket by a fastener. A screw, rod or other equivalent fastener typically extends through the frame head and stick handle at the coaxial socket to rigidly join both pieces together. Traditional one-piece and two-piece design lacrosse sticks are substantially rigid, such that they do not exhibit much flex during use. In a two-piece design, both pieces are fastened together such that the frame head and stick handle remain in the same plane at all times. Accordingly, a need remains for an articulated lacrosse stick that allows the head to pivot with respect to the stick handle. Such pivoting action would increase the effectiveness of scooping the ball from the ground as well as improving the passing accuracy of the user. Other benefits of an articulated stick include easier throwing and catching, and improved shock absorption. The articulation mechanism would also allow the head portion of the stick to follow the contour of the ground when a user attempts to scoop a ball off the ground, thereby reducing the chance of injuries while scooping. The present invention has been developed in view of the foregoing. SUMMARY OF THE INVENTION The present invention includes a lacrosse stick having an articulation mechanism that allows a portion of the stick to move from a first position to a second different position with respect to another part of the stick. For example, the head portion of the stick can move with respect to the handle portion, a first handle portion can move with respect to a second handle portion, or a first head portion can move with respect to a second head portion. An aspect of the present invention is to provide a lacrosse stick comprising a handle, and an articulated head connected to the handle. Another aspect of the present invention is to provide an articulated lacrosse stick comprising a handle and a head, and means for articulating the head with respect to the handle. Another aspect of the present invention is to provide an articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising a first element and a second element connected to the first element such that the first element can pivot or hinge with respect to the second element. Yet another aspect of the present invention is to provide an articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising means for connecting the head to the handle, and means for displacing the head from the longitudinal axis of the handle. These and other aspects of the present invention will be more apparent from the following description. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a pictorial representation of a disassembled lacrosse stick having a cut-away region showing the first element and second element of the articulation mechanism in accordance with an embodiment of the present invention. FIG. 2 is a pictorial representation of a lacrosse stick having a cut-away region showing the articulation mechanism in the rest position in accordance with an embodiment of the present invention. FIG. 3 is an exploded view diagram of the first element and the second element of the articulation mechanism in accordance with an embodiment of the present invention. FIG. 4 is a diagram of the articulation mechanism of FIG. 3 is an assembled configuration in accordance with an embodiment of the present invention. FIG. 5 is top view of the second element of the articulation mechanism in accordance with an embodiment of the present invention. FIG. 6 is a top view of the first element of the articulation mechanism in accordance with an embodiment of the present invention. FIG. 7 is a top view of the articulation mechanism in an assembled configuration in accordance with an embodiment of the present invention. FIG. 8 is a partial side view of a lacrosse stick having a cut-away region showing the articulation mechanism in the rest position in accordance with an embodiment of the present invention. FIG. 9A is a partial side view of a lacrosse stick having a cut-away region showing the articulation mechanism in a flexed position in a first direction in accordance with an embodiment of the present invention. FIG. 9B is a partial side view of a lacrosse stick having a cut-away region showing the articulation mechanism in a flexed position in a second direction in accordance with an embodiment of the present invention. FIG. 10 is cut-away view diagram of the articulation mechanism having a foam dampening material in accordance with an embodiment of the present invention. FIG. 11 is a cut-away view diagram of the articulation mechanism having a spring dampening material in accordance with an embodiment of the present invention. FIG. 12 is a side view of an articulation mechanism having projections on the sides of the extended portion and showing one-half of the second element in accordance with an embodiment of the present invention. FIG. 13 is a side view of an articulation mechanism having projections on the sides of the extended portion and showing both halves of the second element in accordance with an embodiment of the present invention. FIG. 14 is a partial side view of an articulation mechanism having projections on the sides of the extended portion and showing one-half of the second element in accordance with an embodiment of the present invention. FIG. 15 is a side view of the second element in accordance with an embodiment of the present invention. FIG. 16 is a diagram of an articulation mechanism having a move bar in the rest position in accordance with an embodiment of the present invention. FIG. 17 is a diagram of an articulation mechanism having a move bar in the flexed position in accordance with an embodiment of the present invention. FIG. 18 is a diagram of an articulation mechanism having an extended area for contacting the first element in the flexed position in accordance with an embodiment of the present invention. FIG. 19 is a diagram of an articulation mechanism having a ball and socket configuration in accordance with an embodiment of the present invention. FIG. 20 is a diagram of an articulation mechanism having a living hinge configuration in accordance with an embodiment of the present invention. FIG. 21 is a diagram of a lacrosse stick having an articulation mechanism having a Y-shaped handle portion and a pivoting head portion in accordance with an embodiment of the present invention. FIG. 22 is a partial side view of a lacrosse stick having the articulation mechanism of FIG. 21 in the rest position in accordance with an embodiment of the present invention. FIG. 23 is a partial side view of a lacrosse stick having the articulation mechanism of FIG. 21 in the flexed position in accordance with an embodiment of the present invention. FIG. 24A is a partial side view of a lacrosse stick showing the articulation mechanism in a rest position in accordance with an embodiment of the present invention. FIG. 24B is a partial side view of a lacrosse stick having the articulation mechanism of FIG. 24A in the flexed position in accordance with an embodiment of the present invention. FIG. 25 is a diagram of a lacrosse stick having an articulation mechanism housed entirely within the handle portion in accordance with an embodiment of the present invention. FIG. 26 is a cut away side view diagram of an articulation mechanism having a fastener and offset wedges in the loose position in accordance with an embodiment of the present invention. FIG. 27 is a cut away side view diagram of the articulation mechanism of FIG. 26 having a fastener and offset wedges in the tightened position in accordance with an embodiment of the present invention. FIG. 28 is a cut-away view diagram of the handle portion housing an articulation mechanism having a locking feature in the rest position and unengaged position in accordance with an embodiment of the present invention. FIG. 29 is a cut-away view diagram of the handle portion housing the articulation mechanism of FIG. 28 having a locking feature in the flexed position and the engaged position in accordance with an embodiment of the present invention. DETAILED DESCRIPTION Lacrosse sticks typically comprise a head portion 60 and a handle portion 61. As shown in FIG. 1, an articulation mechanism 10 can be incorporated into the head portion 60 and the handle portion 61 in order to allow an otherwise rigid lacrosse to articulate in response to an applied force. Articulation mechanism 10 comprises a first element 11 and a second element 12. In one embodiment, the first element 11 is housed within the handle portion 61 of a lacrosse stick and the second element 12 is housed within the head portion 60. In another embodiment, the first element 11 is housed within the head portion 60 and the second element 12 is housed within the handle portion 61. An already existing lacrosse stick can be easily retrofit to include the articulation mechanism 10 of the present invention. Some lacrosse sticks are hollow, making it easy to simply slide the first element 11 and second element 12 into the respective head portion 60 and handle portion 61. Other lacrosse sticks are solid, requiring that the handle portion 61 and head portion 60 be drilled to accommodate the first element 11 and the second element 12. FIG. 1 shows a lacrosse stick in a disassembled configuration in which the second element 12 is housed within the base 29 of head portion 60 and the first element 11 is housed within the handle portion 61. In this embodiment, the first element 11 comprises a base portion 13 and an extended portion 14 that is sized to slidably engage the second element 12 in the assembled configuration as shown in FIG. 2. The articulation mechanism 10 may be contained inside the lacrosse stick, such that there are substantially no parts of articulation mechanism 10 external to the lacrosse stick head portion 60 and/or handle portion 61. FIGS. 3 and 4 schematically illustrate an articulation mechanism 10 of the present invention. Second element 12 having length LI comprises a top end 30, a bottom end 31 and an interior 16. First element 11 comprises a base portion 13 and an extended portion 14, having a reduced diameter as compared to the base portion 13. The extended portion 14 is sized to slidably enter the interior 16 of the second element 12. FIG. 5 shows the top view of second element 12 as shown from the top end 30 looking along a longitudinal axis toward the bottom end 31 (not shown). FIG. 6 shows the top view of first element 11 as shown from the extended portion 14 looking along a longitudinal axis toward the base portion 13. In one embodiment of the present invention, as shown in FIG. 4, the extended portion 14 of the first element 11 can be inserted into the interior 16 of the second element 12 to achieve an assembled configuration. In the assembled configuration, the top end 15 of the base portion 13 of the first element 11 can be flush with the bottom end 31 of the second element 12. FIG. 7 shows the top view of the first element 11 and the second element 12 in the assembled configuration looking from the extended portion 14 of the first element 11 along a longitudinal axis toward the base portion 13 of the first element 11. A user will typically play with the articulation mechanism 10 in the assembled configuration. In one embodiment, the base portion 13 and the extended portion 14 of the first element 11 are integrally formed. In another embodiment, the base portion 13 and the extended portion 14 are separately formed and subsequently fastened together by welding, bonding, gluing or other adhering means. Base portion 13 comprises a top end 15 and a bottom end 17. Extended portion 14 can be fixedly attached to the top end 15 of the base portion 13. In one embodiment, the top end 15 of the base portion 13 comprises a solid plate to which the extended portion 14 can be centered and attached. In another embodiment, the extended portion 14 can be offset with respect to the center of the base portion as shown in FIGS. 3 and 6. The first element 11 and the second element 12 are sized to have any dimensions such that they may be housed within the handle portion 61 and/or head portion 60 of a lacrosse stick. In one embodiment, as shown in FIGS. 3 and 4, the second element 12 typically has a length L1 of from about 1 inch to about 2.5 inches, a height H1 of from about 0.5 inch to about 1 inch, and a width W1 of from about 0.5 inch to about 1 inch. The first element 11 comprises a base portion 13 having a length L3 and an extended portion 14 having a length L2. In one embodiment, the combined length of L2 and L3 is from about 0.5 inch to about 3 inches. In another embodiment, the extended portion 14 has a width W2 and/or a height H2 that is smaller than width W3 and/or height H3 of the base portion 13. The height H3 of the base portion 13 can be from about 0.5 inch to about 1 inch and the width W3 of the base portion can be from about 0.5 inch to about 1 inch. The height H2 of the extended portion 14 can be from about 0.25 inch to about 1 inch and the width W2 of the extended portion 14 can be from about 0.25 inch to about 1 inch. The extended portion 14 can also have any width W2 and height H2 that is smaller than the width W1 and height H1 of interior 16 of the second element 12. As shown in FIG. 3, the extended portion 14 can be tapered from the extended portion base 18 to the extended portion top 19 in at least one dimension or in multiple dimensions. In this embodiment, the width and/or height of the extended portion top 19 is smaller than the width and/or height of both the extended portion base 18 and the interior 16 of the second element 12. In another embodiment, the extended portion 14 can comprise a rod having a diameter of from about ⅛ inch to about 1 inch. The rod can be located at the center of the base portion 13 or offset from the center of the base portion 13. In yet another embodiment, the extended portion 14 can comprise a square cross section configuration. First element 11 and second element 12 may be joined together by a fastener 19 that allows the first element 11 and/or the second element 12 to pivot or hinge with respect to the other element. Suitable fasteners include joining rods, pivot pins, screws, rivets, bolts or the like. In one embodiment, first element 11 comprises a fastener hole 72 and second element 12 comprises a fastener hole 71 that aligns with fastener hole 72 when the first element 11 and the second element 12 are in the engaged position. Fastener 19 can be provided through fastener hole 71 and fastener hole 72 and fastened by the appropriate means such as nuts, anchors, rivet backings and the like. In another embodiment, fastener hole 72 extends through the entire width of first element 11 and second element 12 comprises a pair of fastener holes 71, each of which align with fastener hole 72 to allow a fastener 19 to be positioned through the entire width of the first element 11 and the second element 12. In another embodiment, fastener hole 20 is located in the extended portion 14 of the first element 11. The articulation mechanism 10 is configured to move between a rest position and a flexed position. In one embodiment, the rest position is in a first plane and the flexed position is in a second plane that is different from the first plane. The second plane may be in a forward direction from the first plane. Alternatively, the second plane may be in an aft direction from the first plane. The articulation mechanism 10 may move from the rest position, e.g., both forward and aft of the rest position. In another embodiment, the second plane is in an aft direction from the first plane. In yet another embodiment, the second plane is in a sideward direction from the first plane. In another embodiment, the second plane is in an opposite sideward direction. Articulation mechanism 10 can move in a plurality of fore-and-aft directions as well as side-to-side directions. FIG. 8 shows a lacrosse stick in the rest position, where the extended portion 14 of first element 11 is positioned at a first location 50 in the interior 16 of the second element 12. FIGS. 9A and 9B show a lacrosse stick in the flexed position, where the extended portion 14 of the first element 11 is positioned at a second location 51 that is different from the first location 50 within the interior 16 of the second element 12. Extended portion 14 can pivot about fastener 19 from a rest position to a flexed position. In this embodiment, the extended portion 14 contacts a first wall 52 of the interior 16 of the second element 12 in the rest position, and the extended portion 14 contacts a second wall 53 of the interior 16 of the second element 12 in the flexed position. In another embodiment, the extended portion 14 is positioned within the interior 16 of the second element 12 without touching any interior wall (such as 52 or 53) of the second element 12 in the rest position, and the extended portion contacts a wall (such as 52 or 53) of the interior 16 of the second element 12 in the flexed position. When a force F is applied to the articulation mechanism 10 in a direction that is about perpendicular to the longitudinal axis LA corresponding to the length L1 of the second element 12, or the length L2 and L3 of the first element 11, the engaged articulation mechanism 10 will hinge or flex about fastener 72. For example, as shown in FIG. 9A and 9B, when a force F is applied to the head portion 60 of the lacrosse stick housing the second element 12 of the articulation mechanism 10, the head portion 60 will be offset with respect to the handle portion 61. In one embodiment, as shown in FIG. 9A, when a force F is applied to head portion 60, the head portion 60 is displaced from the longitudinal axis running along the length L4 of the handle portion 61 in a single direction by a displaced by a displacement angle A of from about 1 degree to about 60 degrees. The displacement angle A is measured between the longitudinal axis corresponding to the center of the center of the handle portion 61 and the tip 90 of the head portion 60. The displacement angle A determines the displacement of a ball with respect to the plane of the handle portion 61. As shown in FIG. 9B, when a force F is applied to head portion 60, the head portion 60 can be displaced from the longitudinal axis in two directions, i.e., a forward direction and a backwards direction, by first and second displacement angles A1 and A2 , respectively. Angles A1 and A2 may be the same or different. The displacement angle A, A1 or A2 is typically from about 1 degree to about 60 degrees. For example, the displacement angle may be from about 1 degree to about 30 degrees. In yet another embodiment, the displacement angle may be from about 1 degree to about 10 degrees, such as from about 2 degree to about 5 degrees. As shown in FIG. 9B, the head portion can be displaced from the longitudinal axis by a displacement angle in either a forwards or backwards direction (or side to side depending on configuration). Force F can also be applied to the head portion by either catching or throwing a ball. As shown in FIG. 10, a resistive material 75, such as a polymeric material having at least some elasticity, can be inserted into the interior 16 of the second element 12 to dampen the displacement of head portion 60 with respect to handle portion 61 when a force F is applied to the head portion 60 in a direction that is about perpendicular to the longitudinal axis of the second element 12 or the longitudinal axis of the first element 11. In this embodiment, extended portion 14 is inserted into second element 12 comprising the resistive material 75. Resistive material 75 can retard how rapidly the extended portion 14 moves from a rest position to a flexed position and can dampen the displacement angle. As shown in FIG. 11, a resistive material 75, can comprise a polymeric foam, a polyurethane bushing, a coiled spring, a living hinge or a metal or polymeric composition having at least some elasticity, that is inserted into second element 12 to retard how rapidly the extended portion 14 moves from a rest position to a flexed position and can also dampen the displacement angle. In another embodiment as shown in FIGS. 12-15, the articulation mechanism 110 comprises a first portion 111, having a base portion 113 and an extended portion 114. Extended portion 114 comprises projections 120 that extend perpendicularly from the longitudinal axis running along the length of the extended portion 114. Articulation mechanism 110 also comprises a second element 112, having at least two pieces 112a and 112b. Each half of second element 112 comprises a hole 130 that is sized to allow a projection 120 to extend through second element 112. The halves of the second element 112a and 112b can be fitted together to surround the extended portion 114 of the first element 111. Second element 112 has an interior 116 which is sized to allow extended portion 114 to move from a first position to a second position as is described herein. Accordingly, the extended portion 114 can be moved from a rest position to a flexed position as also described herein. Each half of the second element 112a and 112b can comprise a set hole 140. In another embodiment, each half of the second element 112a and 112b can comprise one half of a set hole 140. A fastener, such as a setscrew, bolt, rivet, pin or other fastening device, can be inserted into the set hole 140 so that each half of the second element 112a and 112b are connected together. In one embodiment, once the articulation mechanism 110 is assembled such that the second element 112 surrounds the extended portion 114, the first element end of articulation mechanism 110 can be inserted into the handle portion 61 and the second element end can be inserted into the head portion 60 and a fastener can be inserted through the head portion 60 and set hole 140 to fasten the second element end and the head portion 60 together. The action of tightening the fastener can expand the second element 112 within the head portion 60 such that second element 112 and head portion 60 are tightly fastened together. In another embodiment, the first element end can be inserted into the head portion 60 and the second element end can be inserted into the handle portion 61 and a fastener can be inserted through the handle portion 61 and set hole 140 to fasten the second element end and the handle portion 61 together. In another embodiment, as shown in FIGS. 16 and 17, the articulation mechanism 210 comprises a first element 211 and second element 212 which are moveably fastened together by a move bar 220 comprising a fastening element 230a connected to the first element 211 and a fastening element 230b connected to the second element 212. Fastening element 230 allows the first element 211 and the second element 212 to rotate around the fastening element 230. Fastening element 230 can comprise pivoting pins, bolts, rivets, screws, rods and the like. FIG. 16 shows the articulation mechanism 210 in a rest position and FIG. 17 shows the articulation mechanism 210 in a flexed position. In one embodiment, second element 212 is free to tilt with respect to first element 211 such that second element 212 can move from a rest position to a flexed position in which a portion of the second element 212 contacts the first element 211. In another embodiment, as shown in FIG. 18, second element 212 can comprise an extended area 240 which can contact the first element 211 in the flexed position. In another embodiment, the articulation mechanism 310 can comprise a ball and socket type assembly, thereby allowing articulation in multiple directions, including the fore-and-aft direction as well as side-to-side directions between a rest position and a flexed position. As shown in FIG. 19, first element 311 comprises a base portion 313 and an extended portion 314. The extended portion 314 comprises a domed structure or ball portion that engages the second portion 312. Second portion 312 comprises an interior 316 having a recessed socket area sized to receive the extended portion 314 of the first element 311. The extended portion 314 and the interior 316 of the second portion 312 can be combined by any conventional ball and socket means such as a knob connection 320 or a recessed groove connection extending along the periphery of the extended portion 314 with a protruding ridge extending along the interior 316 of the second element 312 wherein the groove and ridge are interlocking. As described above, the first element 311 can be housed within the handle portion 61 and the second element 312 can be housed within the head portion 60 of a lacrosse stick. In another embodiment, the first element 311 can be housed within the head portion 60 and the second element 312 can be housed within the handle portion 61. In another embodiment, the articulation mechanism 410 as shown in FIG. 20 can comprise a living hinge having a first element 411 and a second element 412 that are integrally connected. In this embodiment, the first element 411 and the second element 412 comprise a single elastomeric material. In one embodiment, the elastomeric material may be ridged or corrugated. The first element 411 can be housed within the handle portion 61 of a lacrosse stick and the second element 412 can be housed within the head portion 60. In another embodiment, the first element 411 can be housed within the head portion 60 of a lacrosse stick and the second element 412 can be housed within the handle portion 61. In yet another embodiment, the articulation mechanism 510 as shown in FIGS. 21-23, comprises a first element 511, a second element 512 and a handle portion 61 having a Y-shaped area 61a and 61b corresponding to the outer periphery of a head portion 60. As shown on the lacrosse stick of FIG. 21, second element 512 is a fastening element that can extend between the head portion 60 and the Y-shaped area 61a and/or 61b of the handle portion 61. Second element 512 can be any suitable fastener that allows the head portion 60 to pivot or rotate with respect to the handle portion 61. Second element 512 can comprise connector rods, pins, bolts, rivets, screws and the like. In another embodiment, a first second element 512a connects the head portion 60 to the Y-shaped area 61a of the handle portion 61 and a second second element 512b connects the head portion 60 to the Y-shaped area 61b of the handle portion 61. A first element 511 having a length greater than the distance from the yoke 520 of the Y-shaped area of the handle portion 61 to the base of the head portion 530 can also be disposed on the handle portion 61 to restrict the flexure of the head portion 60 with respect to the handle portion 61. In the flexed position, first element 511 can contact the head portion 60 to restrict the flexure. In one embodiment, the first element 511 is attached to the handle portion 61 at an angle B. Angle B can be from about 1 degree to about 60 degrees. In another embodiment, angle B is from about 1 degree to about 45 degrees. In yet another embodiment, as shown in FIG. 23, angle B is determined by the depth D of the head portion 60 such that displacement angle A is from about 1 degree to about 60 degrees, preferably from about 2 degrees to about 10 degrees. In another embodiment, the first element 511 can be disposed at any location along the handle portion 61 such that first element 511 can restrict the flexure of the head portion 60 by contacting the head portion 60 in the flexed position. As shown in FIGS. 24A and 24B, articulation mechanism 610 can also be housed within the side walls 620 of the head portion 60 of the lacrosse stick. FIG. 24A shows an embodiment of the lacrosse stick of the present invention in the rest position. FIG. 24B shows the same lacrosse stick in the flexed position. As shown in FIG. 24B, the articulation mechanism 610 provides an articulation of a head portion 60a with respect to head portion 60b along the line C. First element 611 can be housed in head portion 60a and second element 612 can be housed in head portion 60b. In another embodiment, first element 611 can be housed in head portion 60b and second element 612 can be housed in head portion 60a. Side walls 620 can integrally comprise an articulation mechanism 610 having greater flexibility than other sections of the side walls 620. In this embodiment, side walls 620 may comprise a rigid polymeric material and an articulation mechanism 610 comprising a flexible polymeric composition. In another embodiment as shown in FIG. 25, the articulation mechanism 710 can be housed entirely within the handle portion 61 of the lacrosse stick. In this embodiment, the handle portion 61 includes both the second element 712 and the first element 711 disposed within the respective handle portions 61a and 61b. As shown in FIG. 25, the articulation mechanism 710 provides an articulation of handle portion 61a with respect to handle portion 61b along the line C. Second element 712 can be housed in handle portion 61a and first element 711 can be housed in handle portion 61b. In another embodiment, second element 712 can be housed in handle portion 61b and first element 711 can be housed in handle portion 61a. The exterior surfaces of the first element 11, 111, 211,311, 411,511, 611 and/or 711 and the second element 12, 112, 212, 312, 412, 512, 612 and/or 712 can comprise any shape and surface characteristics that correspond to the interior of head portion 60 or handle portion 61 of a lacrosse stick. For example, the interior of some lacrosse sticks is an elongated octagonal shape, accordingly, the exterior surfaces of second element 12 and the first element 11 can comprise an elongated octagonal shape to allow for easy insertion within the head portion 60 and handle portion 61. First element 11, 111, 211,311, 411,511, 611 and/or 711 and second element 12, 112, 212, 312, 412,512,612 and/or 712 can be made of any suitable material such as lightweight metal, polymeric compositions, graphite or wood. In one embodiment, the first element 11 and second element 12 are made of thin gauge metal extrusion of aluminum, steel, stainless steel and/or titanium. In another embodiment, the first element 11 and the second element 12 are made of a tough polymeric material such as fiber-reinforced composite plastic, high impact PVC, polyolefin polymer or high impact nylon. In another embodiment, the first element 11 and the second element 12 are made of a ceramic or composite material. Weight reducing sections 70 can be cut into the material comprising the first element 11 and the second element 12 to decrease the weight of the articulation mechanism 10, allowing for easier playability. As described herein, the articulation mechanism 10 can be constructed to allow a rest position and a flexed position in a fore and/or aft direction. In another embodiment, the articulation mechanism 10, 110, 210, 310, 410,510, 610 and/or 710 can be constructed to allow a rest position and a flexed position in a leftward side and/or rightward side direction. In another embodiment, the articulation mechanism disclosed herein can be constructed to allow a rest position and a flexed position in multiple directions simultaneously. The articulation mechanism 10, 110, 210, 310, 410, 510, 610 and/or 710 of the present invention can be used to retrofit any existing lacrosse stick. Accordingly, a radially-expandable system can be used to tighten the fit between the articulation mechanism 10 and the interior of the handle portion 61 and the head portion 60. As shown in FIG. 26, a series of generally triangular wedges offset from center can be used to tighten the fit between the articulation mechanism and the interior of the handle portion 61. In this embodiment, a screw or other tightenable fastener 94 is thread through a plurality of wedges 95. Without substantially tightening the fastener, the articulation mechanism 10 and wedges 95 in the loose position as shown in FIG. 26 is disposed within the handle portion 61 of a lacrosse stick. When the fastener 94 is tightened, as shown in FIG. 27, the wedges 95 are pulled together. Due to the offset orientation of the wedges 95, the wedges 95 in the tightened position have a collective radial diameter that is greater than the diameter of any individual wedge 95 or the collective radial diameter in the loose position. As the fastener 94 is tightened, wedge 95b is drawn upwards to engage wedge 95a. Since wedge 95b is threaded off-center from wedge 95a, when wedges 95a and 95b are tightened, the diameter of the wedges 95 as measured from the outside edge 97 of wedge 95a to the outside edge 96 of wedge 95b is greater in the tightened position than in the loose position. This can also be true of wedge 95c in relation to wedge 95b. Wedges 95 can comprise any suitable material. In one embodiment, the wedges 95 are made from a lightweight polymeric material. In one embodiment, wedges 95 and fastener 94 are connected to the first element 11 and inserted into the handle portion 61 of a lacrosse stick, however, the reverse configuration is also contemplated herein. Other material such as foam, spring loaded pads or screw driven pads can also be used to tighten the fit between the articulation mechanism 10 and the interior of the handle portion 61. In another embodiment, the second element 12 is inserted into the head portion 60 and fastened together by a setscrew 99, plurality of setscrews 99a and 99b or other suitable fastener. As shown in FIGS. 28 and 29, articulation mechanism 10, 110, 210, 310,410, 510, 610 and/or 710 may optionally comprise a locking feature 85. Locking feature 85 can be operable from the exterior of the handle portion of a lacrosse stick by the user to lock the angle of the head portion 60 with respect to the handle portion 61 or a first handle portion 61a with respect to a second handle portion 61b. In one embodiment, locking feature 85 is a push button mechanism. FIG. 28 shows the locking feature 85 in an unengaged position such that the extended portion 14 of the first element 11 is free to move from a rest position to a flexed position within the second element 12. FIG. 29 shows the locking feature 85 in the engaged position such that the extended portion 14 of the first element 11 is held tightly against the locking feature 85 in a fixed position. In another embodiment, multiple locking features 85a and 85b can be deployed to hold the extended portion 14 at a fixed location. In another embodiment, the action of throwing and/or catching a ball may also engage or disengage the locking feature 85. In yet another embodiment, the action of throwing and/or catching a ball may alter the displacement angle A of the head portion 60 with respect to the handle portion 61. Locking feature 85 can also be altered via a tool to adjust the displacement angle A of the head portion 60 with respect to the handle portion 61 in the flexed position. A lacrosse stick of the present invention may also optionally include multiple articulation mechanisms 10, 110, 210, 310, 410, 510, 610 and/or 710 as disclosed herein. Whereas particular embodiments of this invention have been described above for purposes of illustration, it will be evident to those skilled in the art that numerous variations of the details of the present invention may be made without departing from the invention as defined in the appended claims.
<SOH> BACKGROUND INFORMATION <EOH>The sport of lacrosse requires players to use a lacrosse stick to catch a ball, cradle and control the ball and pass the ball to another player or shoot the ball into a goal. The lacrosse stick typically comprises two portions: a head portion and a handle portion. The head is typically constructed to receive the ball and release the ball from a pocketed or basket area while the handle is typically constructed to allow the player to impart momentum to the ball by using upper body strength. Traditional lacrosse sticks are substantially rigid in that they do not flex during use. Some sticks have a one-piece design in which the head and stick handle are jointly formed from a single piece of wood, metal or plastic. Other sticks have a two-piece design in which the head and stick handle are independently fabricated and subsequently joined together in rigid fashion. Stick handles have typically been formed of wood, metal, such as aluminum, or plastic. Stick heads are typically formed of a tough thermoplastic material, however, some are also formed of wood or metal. Sticks having a two-piece design typically include a socket element to allow the stick handle to be rigidly attached to the head. The head of a lacrosse stick is typically attached to the stick in a coaxial orientation. Typically, the frame head comprises at least one sidewall element that extends away from the handle portion of the stick and forming an open mouth for receiving a lacrosse ball. Suspended from the open mouth is a netting, mesh or other material that defines a basket in which the lacrosse ball is received, and from which a lacrosse ball may be passed. Historically, lacrosse sticks were fabricated from a single piece of high-grade ash or hickory wood. However, with the decreasing availability of quality woodworking skills necessary to fabricate lacrosse sticks having integral one-piece wooden stick-head configuration, it has become commonplace to fabricate two-piece lacrosse sticks having a separate stick handle and head portion. Stick handles are typically made of straight-grained wood, wood laminate or a tough, lightweight metallic or reinforced plastic tubular material. Thin gauge metallic extrusion, such as aluminum, or tough polymeric materials, such as fiber reinforced composite plastics, are typically the most suitable materials for lacrosse stick handles. Head frames are typically formed from a tough synthetic thermoplastic material, such as high impact strength nylon. Atypically, the frame head and stick handle are fastened together at the socket by a fastener. A screw, rod or other equivalent fastener typically extends through the frame head and stick handle at the coaxial socket to rigidly join both pieces together. Traditional one-piece and two-piece design lacrosse sticks are substantially rigid, such that they do not exhibit much flex during use. In a two-piece design, both pieces are fastened together such that the frame head and stick handle remain in the same plane at all times. Accordingly, a need remains for an articulated lacrosse stick that allows the head to pivot with respect to the stick handle. Such pivoting action would increase the effectiveness of scooping the ball from the ground as well as improving the passing accuracy of the user. Other benefits of an articulated stick include easier throwing and catching, and improved shock absorption. The articulation mechanism would also allow the head portion of the stick to follow the contour of the ground when a user attempts to scoop a ball off the ground, thereby reducing the chance of injuries while scooping. The present invention has been developed in view of the foregoing.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention includes a lacrosse stick having an articulation mechanism that allows a portion of the stick to move from a first position to a second different position with respect to another part of the stick. For example, the head portion of the stick can move with respect to the handle portion, a first handle portion can move with respect to a second handle portion, or a first head portion can move with respect to a second head portion. An aspect of the present invention is to provide a lacrosse stick comprising a handle, and an articulated head connected to the handle. Another aspect of the present invention is to provide an articulated lacrosse stick comprising a handle and a head, and means for articulating the head with respect to the handle. Another aspect of the present invention is to provide an articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising a first element and a second element connected to the first element such that the first element can pivot or hinge with respect to the second element. Yet another aspect of the present invention is to provide an articulation mechanism for use with a lacrosse stick having a head and a handle, the articulation mechanism comprising means for connecting the head to the handle, and means for displacing the head from the longitudinal axis of the handle. These and other aspects of the present invention will be more apparent from the following description.
20040315
20071016
20050407
97957.0
0
CHAMBERS, MICHAEL S
ARTICULATED LACROSSE STICK
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,635
ACCEPTED
Toner supplying method for image forming apparatus
When shortage of a toner residual quantity is detected during printing, toner redetection is performed immediately after completion of printing. This toner redetection is carried out by stopping supply of a high-voltage power to, e.g., a transfer charger and supply of a power to a motor such as a paper carriage motor in order to avoid generation of noise. As a result, a toner sensor can correctly detect the toner residual quantity, and the toner can be appropriately supplied.
1. An image forming apparatus comprising: a latent image formation portion which forms an electrostatic latent image on a photoreceptor based on an inputted image signal; a development portion which causes a toner to adhere on the electrostatic latent image formed on the photoreceptor, to develop a toner image; a transfer portion which transfers the toner image onto a paper sheet; a carriage portion which carries the paper sheet; a residual quantity detecting portion which detects a toner residual quantity of the development portion; a first detecting portion which detects the toner residual quantity by using the residual quantity detecting portion during printing; a second detecting portion which partially stops supply of power to each portion in the apparatus when shortage of the toner residual quantity is detected by the first detecting portion, and again detects the toner residual quantity by using the residual quantity detecting portion; and a supply portion which supplies the toner to the development portion when the shortage of the toner residual quantity is detected by the second detecting portion. 2. The image forming apparatus according to claim 1, wherein redetection of the toner residual quantity by the second detecting portion is performed by stopping supply of power to the transfer portion. 3. The image forming apparatus according to claim 1, wherein redetection of the toner residual quantity by the second detecting portion is performed by stopping a carriage operation of the carriage portion. 4. The image forming apparatus according to claim 1, further comprising a detachment portion which detaches from the photoreceptor the paper sheet on which the image is transferred, wherein redetection of the toner residual quantity by the second detecting portion is performed by stopping supply of power to the detachment portion. 5. The image forming apparatus according to claim 1, wherein the second detecting portion redetects the toner residual quantity at the time of warming-up of the apparatus. 6. The image forming apparatus according to claim 5, wherein the warming-up is carried out immediately after a power supply of the apparatus is turned on. 7. The image forming apparatus according to claim 5, wherein the warming-up is carried out when one of doors provided to the apparatus is opened and 8. The image forming apparatus according to claim 5, wherein the warming-up is performed when a power saving mode is canceled after the apparatus is set to the power saving mode. 9. The image forming apparatus according to claim 1, wherein the supply portion performs supply of the power in a next printing operation. 10. The image forming apparatus according to claim 1, wherein, if the shortage of the toner residual quantity is detected by the first detecting portion during continuous printing in which images are continuously printed on a plurality of paper sheets, the supply portion performs toner supply after a predetermined number of paper sheets are printed. 11. The image forming apparatus according to claim 1, further comprising an image reading portion which optically reads an original image and provides an image signal corresponding to the original image to the latent image formation portion. 12. An image forming apparatus comprising: a latent image formation portion which forms an electrostatic latent image on a photoreceptor based on an inputted image; a development portion which causes a toner to adhere on the electrostatic latent image formed on the photoreceptor, to develop a toner image; a transfer portion which transfers the toner image onto a paper sheet; a carriage portion which carries the paper sheet; a residual quantity detecting portion which detects a toner residual quantity of the development portion; a first detecting portion which detects the toner residual quantity by using the residual quantity detecting portion during printing; a second detecting portion which redetects the toner residual quantity by using the residual quantity detecting portion after completion of a current printing operation when shortage of the toner residual quantity is detected by the first detecting portion; and a supply portion which supplies the toner to the development portion when the shortage of the toner residual quantity is detected by the second detecting portion. 13. A toner supplying method for an image forming apparatus comprising: forming an electrostatic latent image on a photoreceptor based on an inputted image signal; causing a toner to adhere to the electrostatic latent image formed on the photoreceptor by using a developer and developing a toner image; transferring the toner image onto a paper sheet; detecting a toner residual quantity of the developer during printing; partially stopping supply of power to each portion in the apparatus when shortage of the toner residual quantity in the developer is detected, and again detecting the toner residual quantity; and supplying the toner to the development portion when the shortage of the toner residual quantity is detected as a result of redetection of the toner residual quantity. 14. The toner supplying method for an image forming apparatus according to claim 13, wherein redetection of the toner residual quantity is performed by stopping supply of power to the transfer portion. 15. The toner supplying method for an image forming apparatus according to claim 13, wherein redetection of the toner residual quantity is carried out by stopping a carriage operation of the carriage portion. 16. The toner supplying method for an image forming apparatus according to claim 13, further comprising a detachment portion which detaches from the photoreceptor the paper sheet on which the image is transferred, wherein redetection of the toner residual quantity is carried out by stopping supply of power to the detachment portion. 17. The toner supplying method for an image forming apparatus according to claim 13, wherein supply of the toner is performed in a next printing operation. 18. The toner supplying method for an image forming apparatus according to claim 13, wherein, when the shortage of the toner residual quantity is detected during continuous printing in which images are continuously printed on a plurality of paper sheets, the toner is supplied after printing a predetermined number of paper sheets.
BACKGROUND OF THE INVENTION The present invention relates to a toner residual quantity detection method in an image forming apparatus such as a printer or a digital copying machine. When copying an original document by using an image forming apparatus, an original image is first read by a scanner portion, and corresponding image data is provided. In a printer portion, an electrostatic latent image is formed on a photosensitive drum by using light beams emitted in accordance with the image data. A toner is caused to adhere to this electrostatic latent image by a developer, and a toner image is formed. The toner image is transferred onto a paper sheet by a transfer portion, and fixed on the paper by a fixing portion. In this manner, a copy image is printed on the paper. During printing an image as described above, a toner residual quantity is detected in the developer. When it is determined that the toner residual quantity is insufficient, the toner is supplied from a supply toner cartridge. If toner detection is carried out during printing, a toner sensor may erroneously operate due to affects of noise from, e.g., a development high-voltage power supply and a paper carriage motor drive system. When the toner sensor malfunctions, it may be determined that the toner residual quantity is insufficient even though the toner residual quantity is sufficient, and an unnecessary supply operation may be executed in some cases. For example, if there is a poor contact at a contact point of a high-voltage supply path used in a development process, an induction noise may occur due to electric discharge, and the toner sensor which operates with a small voltage and a small current may malfunction. Further, in order to reduce an influence of such noise, a special component is needed for the toner residual quantity detection circuit, and special attention must be paid to the sensor arrangement and wiring. BRIEF SUMMARY OF THE INVENTION It is an object of the present invention to correctly detect a toner residual quantity in a process unit of a toner sensor, and prevent the process unit from being over charged with the toner due to unnecessary toner supply. In order to achieve the above object, according to the present invention, there is provided an image forming apparatus comprising: a latent image formation portion which forms an electrostatic latent image on a photoreceptor based on an inputted image signal; a development portion which causes a toner to adhere on the electrostatic latent image formed on the photoreceptor, to develop a toner image; a transfer portion which transfers the toner image onto a paper sheet; a carriage portion which carries the paper sheet; a residual quantity detecting portion which detects a toner residual quantity of the development portion; a first detecting portion which detects the toner residual quantity by using the residual quantity detecting portion during printing; a second detecting portion which partially stops power supply to each portion in the apparatus when the first detecting portion detects shortage of the toner residual quantity, and again detects the toner residual quantity by using the residual quantity detecting portion; and a supply portion which supplies the toner to the development portion when the second detecting portion detects the shortage of the toner residual quantity. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING FIG. 1 is a front cross-sectional view schematically showing a structure of an image forming apparatus such as a digital copying machine to which the present invention is applied; FIG. 2 is a cross-sectional view of a process unit; FIG. 3 is a block diagram showing a schematic structure of a control system of the image forming apparatus; FIG. 4 is a flowchart showing a toner detection operation in regular printing; FIG. 5 is a flowchart showing a regular toner supply operation; FIG. 6 is a flowchart showing toner Low detection processing; FIG. 7 is a flowchart showing a toner redetection operation; and FIG. 8 is a flowchart showing a warming-up operation. DETAILED DESCRIPTION OF THE INVENTION An embodiment according to the present invention will now be described in detail hereinafter with reference to the accompanying drawings. FIG. 1 is a front cross-sectional view schematically showing a structure of an image forming apparatus 100 such as a digital copying machine to which the present invention is applied. The image forming apparatus 100 includes a scanner portion 200 which reads an original image and provides image data corresponding to the original image, and a printer portion 300 which forms an image on a paper sheet based on the image data supplied from the scanner portion 200. A control panel (not shown) which carries out a user interface is provided to the scanner portion 200. The image forming apparatus 100 is connected to a network such as a LAN. The digital copying machine 100 operates based on a user instruction inputted through the control panel or the network. The scanner portion 200 comprises a first carriage 3 having a light source 5 and a first mirror 6, a second carriage 4 having a second mirror 7 and a third mirror 8, a lens 9 and a CCD as a primary portion. When reading an original document, an original document placed on an original glass 2 is irradiated by the light source 5 of the first carriage 3 which moves in a sub-scanning direction. Reflected light beams from the original document are reflected on the first to third mirrors, condensed by the lens 9 and led to the CCD 10. At this time, the second carriage 4 moves in the same direction as the moving direction of the first carriage 3 at a speed which is ½ of that of the first carriage 3 in such a manner that a light path length (focal distance) of the reflected light beams from the original document to the CCD 10 becomes fixed. The CCD 10 scans the incoming reflected light beams in a main scanning direction. As a result, an image on the original document surface is converted into an electric signal. The printer portion 300 comprises a laser scanner unit 42, a process unit 25, a fixation unit 17 as a primary portion. The laser scanner unit 42 exposes and scans a photosensitive drum circumferential surface in the process unit 25 by using laser beams generated based on image data provided from the scanner portion 200. As a result, an electrostatic latent image corresponding to the image data is formed on the photosensitive drum circumferential surface. In the process unit 25, a toner is caused to adhere on the electrostatic latent image formed on the circumferential surface of the photosensitive drum, and this toner image is transferred onto a paper sheet carried from a paper feed cassette 40 by a transfer charger 26. The toner image on the paper sheet is fixed on the paper sheet by the fixation unit 17, and the paper sheet is supplied from the apparatus by paper ejector rollers 15 and 16. A toner residual quantity detection method according to the present invention will now be described. In the embodiment according to the present invention, when printing images, a toner residual quantity is detected during printing, toner is not immediately supplied when shortage of the toner residual quantity is detected, but the toner residual quantity is again detected after completion of printing (that is, when a high-voltage power supply and a motor drive circuit are not operated). When the toner residual quantity is still insufficient even though the toner residual quantity is again detected, the toner is supplied. As a result, it is possible to prevent erroneous detection of a toner residual quantity detecting portion due to noise mixed in the toner residual quantity detecting portion from a high-voltage power supply path and/or a motor drive circuit. In the case of continuous printing in which images are continuously printed on many sheets of paper, suspending printing in mid course in order to re-detect the toner residual quantity lowers the productivity of printing. Therefore, when the preset number of printing sheets is exceeded after detecting the shortage of the toner residual quantity, the toner is supplied. FIG. 2 is a cross-sectional view of a process unit 25. A toner cartridge 47 is provided at the inner part of the process unit 25 in the drawing. The toner cartridge 47 is coupled with the process unit 25 in a separable manner. Rotating a toner supply DC motor 39 rotates a toner cartridge auger 32, and the toner accommodated in the toner cartridge 47 falls on a substantially central part of the process unit 25. The toner which has fallen into the process unit 25 is supplied from the central part of the process unit 25 to the toner accommodation portion 37 by a toner supply auger 36 which likewise rotates. A mixer 34 which rotates by a carriage DC motor is provided at the toner accommodation portion 37, and a rotary blade 34a of the mixer 34 agitates the toner and evenly distributes it in the longitudinal direction (front inner direction in the drawing) of a photosensitive drum 38. In the toner accommodation portion 37 is arranged a toner empty sensor (which will be referred to as a toner sensor hereinafter) 35 which generates high-frequency vibrations by using a piezoelectric element and detects a toner residual quantity by detecting a change in a small current. When the toner sensor 35 detects the shortage of the toner residual quantity, the toner is supplied from the toner cartridge 47 to the process unit 25 by the above-described method. The present invention aims at stabilizing detection of this toner sensor 35 and preventing the process unit 25 from being over charged with the toner due to unnecessary toner supply. The toner sensor 35 vibrates a diaphragm at a high frequency by using the piezoelectric element as described above, and detects a micro signal which varies in accordance with a toner quantity on the diaphragm, thereby detecting the toner residual quantity. Since the toner sensor detects a small analog signal, it has a weak point that it readily malfunctions due to affects of electrical noise, physical vibrations and others. A voltage from a high-voltage power supply is supplied to an electrification charger which electrifies the photosensitive drum 38, a transfer charger which transfers the toner onto a paper sheet, a paper detachment charger which detaches the paper sheet from the photosensitive drum and smoothly performs fixation/paper ejection, and others. The state of these gap portions, in which a high voltage is generated, subtly varies due to the physical vibrations involved during paper carriage, and electric discharge occurs. The detection of the toner residual quantity is thus apt to be affected by such discharge induction noises or induction noise generated by a DC motor (paper carriage motor). Therefore, it is optimum to detect the toner in a non-printing mode in which the physical vibrations and the electrical noise are not generated. However, since the toner agitation mixer 34 is not rotated in the non-printing mode, a toner state in the toner accommodation portion 37 may not be stabilized in some cases, making stable and correct toner detection difficult. In this embodiment, the toner is detected during printing and, if the shortage of the toner residual quantity is detected, the carriage motor and supply of the high-voltage power are stopped, and the toner is re-detected in the non-printing mode immediately after this stop. As a result, the stable toner detection is executed without being affected by noise in the printing mode and unstableness of the toner state in the non-printing mode. FIG. 3 is a block diagram showing a schematic structure of a control system of the image forming apparatus. This image forming apparatus includes a flash ROM 102 which stores a control program including a program according to this embodiment, a CPU 101 which comprehensively controls this image forming apparatus in accordance with the control program, an SDRAM 103 which stores various kinds of system data, an SRAM 104 which stores various kinds of operation parameters, an RTC 105 which functions as a clock IC, an I/O port 106, and a system ASIC 107. Furthermore, the image forming apparatus includes an FET 108 for thinning processing, a CODEC 109 and an SRAM 110 for compression/expansion, and an ASIC 111 and an SDRAM 112 for image processing as an image processing portion. The CPU controls a toner motor driver 41, a high-voltage power supply 43, a toner sensor IC 44 and a carriage motor driver 45 through the I/O port 106. The toner motor driver 41 drives a toner supply DC motor 39, the high-voltage power supply 43 supplies a high-voltage power to an electrification charger 50, a paper detachment charger 48 and a transfer charger 49, and the carriage motor driver 45 drives the carriage DC motor 40. The toner sensor IC 44 detects a toner quantity in the process unit 25 by using the toner sensor 35, and notifies the CPU 101 of a detection result (toner residual quantity detection signal) through the I/O port 106. An operation concerning the embodiment of the toner residual quantity detection method according to the present invention will now be described with reference to flowcharts of FIGS. 4 to 8. Meanings of flags and counters used in the flowcharts will be first explained. 5sH flag F1: the CPU 101 turns on this flag when the toner continuously detects the shortage of the toner residual quantity in the process unit for five seconds during printing (here, “turning on the flag” means writing 1 in, e.g., a one-bit register). Toner supply flag F2: the CPU 101 turns on this flag when the high-voltage power supply and the motor power supply are turned off, the toner residual quantity in the process unit is detected, and the shortage of the toner residual quantity is thereby detected. Toner Low flag F3: the CPU 101 turns on this flag when it is determined that there is no toner (toner Low) in the toner cartridge during printing. Toner empty flag F4: the CPU 101 turns on this flag when toner Low (no toner in the toner cartridge) is judged and then the specified number of paper sheets are printed. Drum life flag F5: the CPU 101 turns on this flag when the life duration of the photosensitive drum is judged based on the number of printed paper sheets. 5sH counter C1: the number of printed paper sheets is indicated when the 5sH flag is on. Toner Low counter C2: a content of this counter is increased by one when the shortage of the toner residual quantity in the process unit is detected immediately after supply of the toner. It is to be noted that the values and numeric values of judgment conditions described in the following flowcharts and their explanation are not restricted, and they can be changed. (1) Regular Printing Operation FIG. 4 is a flowchart showing a toner detection operation in regular printing. For example, when a copy button in the control panel is pressed, reading of an original image by the scanner portion 200 and regular printing of an image by the printer portion 300 are started. When the regular printing is started, the CPU 101 performs the following operation concerning toner quantity detection and toner supply while controlling the image reading and the printing operation. The control operation is mainly carried out by the CPU 101 in the following respective steps. First, whether the toner Low flag F3 is ON is judged (S101). That is, a judgment is made upon whether there is no toner in the toner cartridge 47 in the previous printing operation. If the toner Low flag F3 is not ON, whether the toner supply flag F2 is ON is judged (S102). That is, for example, after the previous printing operation is terminated, the high-voltage power supply and the motor power supply are turned off in order to detect a toner residual quantity in the process unit, and whether the shortage of the toner residual quantity is detected is judged. If the toner supply flag F2 is ON (YES at S102), it is confirmed that the photosensitive drum 38 has not reached the end of its life (S103), and then regular toner supply is performed at a step S105. (2) Regular Toner Supply FIG. 5 is a flowchart showing a regular toner supply operation. The regular toner supply must be carried out while rotating the mixer 34, and hence it is performed in the printing operation. The toner supply motor 39 is set to ON for seven seconds (S201), the toner is supplied to the process unit from the toner cartridge, and the toner supply flag F2, the 5sH flag F1 and the 5sH counter C1 are reset (S202). Then, the toner supply motor is turned off (S203), the toner sensor 35 is turned on (vibrations by the piezoelectric element are started) (S204), and detection of a toner residual quantity immediately after toner supply is started (S205). Toner detection is performed for 15 seconds (S207). When an output from the toner sensor continuously indicates shortage of a residual quantity for five seconds (YES at S206), the 5sH flag F1 is turned on (S208), and toner detection is terminated (S209). Again referring to FIG. 4, toner Low detection at a step S106 is executed after the regular toner supply at the step S105. (3) Toner Low Detection Processing FIG. 6 is a flowchart showing toner Low detection processing. Like the step S208, when the 5sH flag F1 is ON by the toner residual quantity detection immediately after toner supply (YES at S301), the toner Low counter is incremented by 1 (S303) if the toner Low counter C2 is not 2 or above (NO at S302). If the toner Low counter is already 2 or above (YES at S302), the toner Low flag F3 is turned on (S304), and the toner Low counter is reset (S305). Setting the toner Low flag F3 to ON means that the shortage of the toner residual quantity in the process unit 25 is not resolved even though the toner is supplied for three times and there is no toner in the cartridge 47. Again referring to FIG. 4, when the 5sH flag F1 is ON like the step S107 (YES), the 5sH counter is incremented by 1 (S108), a judgment is made upon whether the current state is end of printing or it is in the continuous printing mode (S109). In case of end of printing, the control shifts to end processing. In case of the continuous printing mode, the control returns to the top step S101. When the toner Low flag F3 is ON (YES at S101), it can be determined that there is not toner in the toner cartridge 47 as described above. Therefore, printing can be regularly performed up to the specified number of paper sheets (e.g., 100 sheets). When the specified number of paper sheets is exceeded, however, the toner empty flag F4 is turned on in order to protect the process unit 25 (Sill), the toner Low flag F3 is reset, and printing is prohibited, i.e., stopped at the same time (S112). When the toner supply flag F2 is OFF (NO at S102), a judgment is made upon whether the 5sH counter C1 indicates a predetermined number of sheets (e.g., 50 sheets) or above (S113). The control shifts to toner supply processing if it indicates the predetermined number of sheets or above (YES at S113), and the control shifts to toner detection processing if it indicates less than 50 sheets. In the toner detection processing, a residual quantity detection signal of the toner sensor is observed during printing. When the shortage of the toner residual quantity is continuously detected for five seconds or more, the 5sH flag F1 is turned on (S114 to S118). The 5sH counter C1 is a counter indicative of the number of sheets continuously printed without performing toner redetection, which will be described later, when the 5sH flag F1 is ON. Like the step S113, when this counter indicates, e.g., 50 sheets or more, the toner residual quantity is in danger of being extremely lowered. Therefore, in order to protect the process unit 25, the toner supply operation is executed without performing the toner redetection. It is to be noted that although the productivity of printing is reduced if YES at the step S113, the continuous printing may be suspended and the control may shift to the toner redetection. When printing is terminated (YES at S109), toner detection during printing is completed (S119). Here, in this embodiment, a judgment is made upon whether the 5sH flag F1 is ON like the step S120. If it is ON, the toner redetection at the step S121 is executed. (4) Toner Redetection FIG. 7 is a flowchart showing a toner redetection operation. This toner redetection is performed when the 5sH flag F1 is ON at the end of printing and in a later-described warming-up mode. Vibrations by the piezoelectric element are first started by turning on the toner sensor (S401), the paper carriage motor 40 and the high-voltage power supply 43 are turned off (S402), and the detection of the toner residual quantity is started (S403). By turning off the carriage motor and the high-voltage power supply in this manner, the operation of a noise generation source is stopped, and the toner residual quantity is detected without mixing noises. If the shortage of the toner residual quantity is continuously detected for five seconds when the toner residual quantity is detected for 10 seconds, the toner supply flag F2 is turned on (S404 to S406). If the shortage of the toner residual quantity is not continuously detected for five seconds (NO at S404), it is determined that the shortage of the toner residual quantity detected during printing is erroneous detection due to an influence of, e.g., noise, like the step S208, and the 5sH flag F1 and the 5sH counter C1 are reset (S407). At the same time, if the toner Low counter C2 indicates 1 or above (YES at S408), the value of the toner Low counter C2 is decremented by 1 (S409), and toner redetection is terminated (S409). (5) Warming-Up Warming-up is performed in the initial setting after the power supply of the apparatus is turned on or the system reset is canceled. Moreover, warming-up is carried out when detecting “open→close” of a door provided to the apparatus, e.g., a jam release cover (side cover) or a front cover which is opened when replacing the toner cartridge 47 or the process unit 25, or when canceling a power saving mode. FIG. 8 is a flowchart showing a warming-up operation. When starting warming-up, if the toner Low flag F3 or the toner empty flag F4 is ON (YES at S501), it is confirmed that the drum has not reached end of life (NO at S502), and then toner supply is started. That is, the carriage motor and the high-voltage power supply are turned on (S503), the toner motor is turned on (S504), and the toner supply flag F2, the 5sH flag F1 and the 5sH counter C1 are reset (S505). After rotating the toner supply motor for seven seconds, the toner motor is turned off (S506), and the above-described toner redetection (see FIG. 7) is executed (S507). That is, the operations of the carriage motor and the high-voltage power supply are stopped, and a toner residual quantity is detected without generating noise. Here, if the shortage of the toner residual quantity is detected, the toner supply flag F2 is turned on. If the toner supply flag F2 is not ON (NO at S508), the toner Low flag F3 and the toner empty flag F4 are reset (S511), and the toner Low counter C2 is reset (S512). In cases where the toner supply flag F2 is ON (YES at S508), if the toner Low counter C2 is not 2 or above (NO at S509), the toner Low counter C2 is incremented by 1 (S510), the control returns to the step S503, and toner supply is executed. If the toner Low counter C2 is 2 or above (YES at S509), i.e., if the shortage of the toner is not resolved even though toner supply is performed for three times, like the steps S504 to S506, the toner Low counter C2 is reset (S512) (the toner Low flag F3 and the toner empty flag F4 are not released). In this case, when the regular printing is then performed, printing of a predetermined number of sheets (e.g., 100 sheets) is possible, like the step S111 in FIG. 4, but printing of more sheets is prohibited until the toner cartridge is replaced. When the toner Low flag or the toner empty flag is ON and an end of drum life is detected (YES at S502), which means that the photosensitive drum has reached the end of its life, printing may be prohibited in accordance with a specification of the photosensitive drum (S514), and toner supply may not be newly performed until the new process unit 25 (photosensitive drum) is set. It is to be noted that if the toner Low flag F3 is ON, printing may be allowed until toner empty is determined. As described above, according to the present invention, even if a malfunction is generated in the toner residual quantity detection sensor due to physical vibrations or induction noise from the motor 5 or the high-voltage power supply during printing, excessive supply of the toner in the process unit can be avoided by executing toner redetection in the non-printing mode, thereby realizing a stable toner supply operation. Additionally, since execution by software control is possible, special circuit components or wiring thereof for vibration and noise countermeasures are not required. The above has described the embodiment according to the present invention, but it does not restrict the apparatus and the method of the present invention, and various modifications can be carried out. Such modifications are included in the scope of the present invention. Further, an apparatus or a method configured by an appropriate combination of constituent elements, functions, features or method steps in each embodiment is also included in the scope of the present invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention relates to a toner residual quantity detection method in an image forming apparatus such as a printer or a digital copying machine. When copying an original document by using an image forming apparatus, an original image is first read by a scanner portion, and corresponding image data is provided. In a printer portion, an electrostatic latent image is formed on a photosensitive drum by using light beams emitted in accordance with the image data. A toner is caused to adhere to this electrostatic latent image by a developer, and a toner image is formed. The toner image is transferred onto a paper sheet by a transfer portion, and fixed on the paper by a fixing portion. In this manner, a copy image is printed on the paper. During printing an image as described above, a toner residual quantity is detected in the developer. When it is determined that the toner residual quantity is insufficient, the toner is supplied from a supply toner cartridge. If toner detection is carried out during printing, a toner sensor may erroneously operate due to affects of noise from, e.g., a development high-voltage power supply and a paper carriage motor drive system. When the toner sensor malfunctions, it may be determined that the toner residual quantity is insufficient even though the toner residual quantity is sufficient, and an unnecessary supply operation may be executed in some cases. For example, if there is a poor contact at a contact point of a high-voltage supply path used in a development process, an induction noise may occur due to electric discharge, and the toner sensor which operates with a small voltage and a small current may malfunction. Further, in order to reduce an influence of such noise, a special component is needed for the toner residual quantity detection circuit, and special attention must be paid to the sensor arrangement and wiring.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>It is an object of the present invention to correctly detect a toner residual quantity in a process unit of a toner sensor, and prevent the process unit from being over charged with the toner due to unnecessary toner supply. In order to achieve the above object, according to the present invention, there is provided an image forming apparatus comprising: a latent image formation portion which forms an electrostatic latent image on a photoreceptor based on an inputted image signal; a development portion which causes a toner to adhere on the electrostatic latent image formed on the photoreceptor, to develop a toner image; a transfer portion which transfers the toner image onto a paper sheet; a carriage portion which carries the paper sheet; a residual quantity detecting portion which detects a toner residual quantity of the development portion; a first detecting portion which detects the toner residual quantity by using the residual quantity detecting portion during printing; a second detecting portion which partially stops power supply to each portion in the apparatus when the first detecting portion detects shortage of the toner residual quantity, and again detects the toner residual quantity by using the residual quantity detecting portion; and a supply portion which supplies the toner to the development portion when the second detecting portion detects the shortage of the toner residual quantity.
20040316
20060620
20050922
60150.0
0
ARANA, LOUIS M
TONER SUPPLYING METHOD FOR IMAGE FORMING APPARATUS
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,929
ACCEPTED
Drive rollers for wire feeding mechanism
A wire feeding mechanism for advancing a continuous length of wire along a pathway includes a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway. The roller supports are on opposite sides of the pathway and are driveably engaged with each other. A drive roller is on each of the roller supports for rotation therewith. The drive roller includes an outer surface extending circumferentially about the corresponding axis. The outer surface defines a groove having an included angle of less than ninety degrees (90°). The drive roller on each of the roller supports compressively contacts a continuous length of wire between the roller supports such that the wire is advanced along the pathway in response to rotation of the drive rollers.
1. A wire feeding mechanism for advancing a continuous length of wire along a pathway, comprising: a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway, said roller supports being on opposite sides of said pathway and being driveably engaged with each other; a drive roller on each of said roller supports for rotation therewith, said drive roller including an outer surface extending circumferentially about said corresponding axis that defines a groove having an included angle between a pair of intersecting walls defining the groove that is about thirty degrees (30°) or greater and less than ninety degrees (90°), said drive roller on each of said roller supports compressively contacting a continuous length of wire between said roller supports such that said wire is advanced along said pathway in response to rotation of said drive rollers. 2. The wire feeding mechanism of claim 1 wherein said included angle is about thirty to about sixty degrees (30°-60°). 3. The wire feeding mechanism of claim 2 wherein said included angle is about sixty degrees (60°). 4. The wire feeding mechanism of claim 1 wherein a centerline of said continuous length of wire is above said outer surface of said drive roller. 5. The wire feeding mechanism of claim 4 wherein said included angle is about thirty to about sixty degrees (30°-60°). 6. A wire feeding mechanism for advancing a continuous length of wire along a pathway, comprising: a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway, said roller supports being on opposite sides of said pathway and being driveably engaged with each other; a first drive roller concentrically disposed with one of said two roller supports for rotation therewith, said first drive roller including a first drive roller groove extending circumferentially therearound and having a first drive roller included angle of at least about thirty degrees (30°) and less than ninety degrees (90°); a second drive roller concentrically disposed with the other of said two roller supports for rotation therewith, said second drive roller including a second drive roller groove extending circumferentially therearound and having a second drive roller included angle of at least about thirty degrees (30°) and less than ninety degrees (90°); and said first and second drive rollers positioned relative to one another such that a continuous length of wire received in said circumferential grooves between said first and second drive rollers is advanced along said passageway in response to rotation of said first and second drive rollers. 7. The wire feeding mechanism of claim 6 wherein said included angles are each about thirty to about sixty degrees (30°-60°). 8. The wire feeding mechanism of claim 6 wherein a centerline of said continuous length of wire is between a first drive roller outside surface and a second drive roller outside surface. 9. The wire feeding mechanism of claim 8 wherein said included angles are each about thirty to about sixty degrees (30°-60°). 10. The wire feeding mechanism of claim 6 wherein at least one of said first and second drive rollers compressively engages said continuous length of wire to advance said wire along said passageway in response to rotation of said at least one of said first and second drive rollers. 11. The wire feeding mechanism of claim 6 further including: a second set of roller supports each rotatable about a corresponding axis transverse to a wire pathway, said second set of roller supports spaced apart from said two roller supports along said pathway, each of said second set of roller supports being on opposite sides of said pathway and being driveably engaged with each other; a third drive roller concentrically disposed with one of said second set of roller supports for rotation therewith, said third drive roller including a third drive roller groove extending circumferentially therearound and having a third drive roller included angle of less than ninety degrees (90°); a fourth drive roller concentrically disposed with the other of said second set of roller supports for rotation therewith, said fourth drive roller including a fourth drive roller groove extending circumferentially therearound and having a fourth drive roller included angle of less than ninety degrees (90°), said fourth drive roller positioned opposite said third drive roller so that said wire is compressively received between said third and fourth drive rollers for advancement along said passageway in response to rotation of said third and fourth drive rollers. 12. The wire feeding mechanism of claim 6 wherein said first drive roller includes a second first drive roller groove extending circumferentially therearound and spaced from said first drive roller groove for use when said first drive roller groove is worn. 13. The wire feeding mechanism of claim 6 wherein at least one of said first and second drive rollers is radially adjustably positionable relative to said pathway. 14. A wire feeding mechanism for advancing a continuous length of wire along a pathway, comprising: a first drive roller rotatably supported in a housing for engaging and advancing a continuous length of wire along a pathway; a second drive roller rotatably supported in said housing on an opposite side of said pathway from said first drive roller for engaging and advancing said wire along said pathway; and said first and second drive rollers each including an outer surface extending circumferentially thereabout, said outer surface having a first side wall and a second side wall extending radially thereinto that together define a groove, said first side wall intersecting said second wall and oriented at an angle of less than ninety degrees (90°) relative to said second side wall. 15. The wire feeding mechanism of claim 14 wherein said first and second drive rollers positioned to compressively engage said wire to advance said wire along said pathway in response to rotation of said first and second drive rollers. 16. The wire feeding mechanism of claim 14 further including: a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway, said first and second drive rollers mounted on said roller supports for rotation therewith and said roller supports being driveably engaged with one another. 17. The wire feeding mechanism of claim 14 wherein the first side wall is oriented at an angle of between about thirty and about sixty degrees (30°-60°). 18. The wire feeding mechanism of claim 14 wherein a centerline of said continuous length of wire is above said outer surface of both of said drive rollers. 19. The wire feeding mechanism of claim 18 wherein said first side wall is oriented at an angle of between about thirty and about sixty degrees (30°-60°). 20. The wire feeding mechanism of claim 19 wherein said first side wall is oriented at an angle of about sixty degrees (60°).
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the art of wire feeding mechanisms and, more particularly, to drive rollers used in wire feeding mechanisms for driveably advancing a welding wire. The present invention finds particular application in conjunction with drive rollers used to advance a welding wire and will be described with particular reference thereto. It is to be appreciated, however, that the present invention may relate to other similar environments and applications. 2. Discussion of the Art U.S. Pat. No. 6,557,742 to Bobeczko et al., U.S. Pat. No. 5,816,466 to Seufer and U.S. Pat. No. 4,235,362 to Hubenko, all expressly incorporated herein by reference, disclose wire feeding mechanisms and provide general background information related thereto. Wire feeding mechanisms that move consumable electrode wire from a supply reel to a welding gun are generally well known. For example, Seufer discloses a wire feed mechanism having a wire pathway through which a continuous length of wire is advanced. Typically, wire feed mechanisms include motor-driven drive rolls that engage diametrically opposite sides of a wire to move the wire along a path through a housing of the feeding mechanism. Once through the housing, the wire is moved through a flexible tube or conduit leading to a welding gun. Often, the conduit also carries shielding gas and electrical current to the welding gun. Typically, each of the drive rollers is mounted on a roller support and all of the roller supports are driveably engaged with one another. Thus, powered rotation of a single roller support causes rotation of all the roller supports and the drive rollers supported thereon. Usually, the drive rolls are a single pair of opposed rollers or a double pair of opposed rollers spaced apart along the wire path. In either arrangement, the drive rollers have an upstream side at which the wire enters the drive rollers and a downstream side at which the wire exits the driver rollers. On the upstream side, the wire is guided through an upstream tube toward a bite created between the drive rollers adjacent the upstream side. Likewise, on the downstream side, the wire exits the drive rollers and is guided through a downstream tube adjacent the downstream side. If a double pair of opposed rollers are used, another tube can be provided between the pairs of drive rollers to further guide the wire. To impart an advancing force or motion to the wire, opposing drive rollers are positioned sufficiently close to one another so that the wire extending along the pathway is compressed between the opposing rollers. The compressive force in combination with friction between the material of the wire and the rollers advances the continuous length of wire along the wire path in a generally smooth and continuous manner. In some arrangements, one or more of the drive rollers are urged toward the wire by a biasing member to further impart an advancing force or motion on the wire. The wire passing through the drive rollers has a generally round cross-section and is engaged tangentially by opposing, flat-faced drive rollers mounted transversely to the wire. As a result of this arrangement, the compressive forces exerted on the wire by the driver rollers often cause the wire to undesirably deform. The material characteristics of the wire largely determine the magnitude or amount the wire is deformed as a result of the compressive forces. Accordingly, a wire made from a material having a relatively high compressive yield strength, such as steel, will be deformed less than a wire made from a material having a moderate compressive yield strength, such as aluminum. In some applications, one or both of each pair of drive rollers include U-shaped or V-shaped grooves extending circumferentially thereabout for reducing the deformation of the wire from the compressive forces of the drive rollers. When such grooves are employed, the wire is engaged by side walls of the drive roller forming the groove. As a result, the compressive force exerted by the drive roller with a groove tends to act and deform the wire along more of the wire's outer surface than if no groove was provided. More contact between the drive roller and the wire results in less deformation. When grooves are used, they are typically employed in one of two arrangements. In one arrangement, with reference to FIG. 4, a pair of relatively shallow angled grooves 100,102 are provided on opposed drive rollers 104,106. More particularly, the first groove 100 in the first drive roller 104 is defined by side walls 108,110 which are at an angle of ninety degrees (90°) relative to one another. Likewise, the second groove 102 in the second drive roller 106 is defined by side walls 112,114 which are at an angle of ninety degrees (90°) relative to one another. Since both grooves 100,102 are configured alike, the drive rollers 104,106 grip wire 116 with an equal amount of force. A centerline of the wire 116 is generally centered between the drive rollers 104,106. In the other arrangement, with reference to FIG. 5, a relatively sharp-angled groove 120 is provided in a first drive roller 122 and no groove is provided in a second, opposite drive roller 124. The groove 120 is defined by side walls 126,128 in the first drive roller 122 which are at an angle of between thirty and sixty degrees (30°-60°) and, preferably, an angle of sixty degrees (600). The second drive roller 124, also referred to as a flat idler roller, has a flat surface 130 for engaging wire 132. A centerline of the wire 132 often sits below flat surface 134 of the first drive roller 122 which is the surface in which the groove 120 is formed. More particularly, the flat idler roller 124 pushes the wire 132 into the groove 120 which in turn propels the wire 132. While these types of groove arrangements tend to lessen the amount a wire is deformed, the amount of compressive force required to input motion to the wire remains high. Reductions in the required compressive force are generally considered desirable and can decrease wear on the wire feed mechanism and/or reduce slippage of the wire relative to the drive rollers. Accordingly, any improvements to the drive rollers that decreases the required compressive force needed to drive the wire engaged by the drive rollers is deemed desirable. SUMMARY OF THE INVENTION The present invention provides new and improved drive rollers for use in wire feed mechanisms that overcome the foregoing difficulties and others and provide the aforementioned and other advantageous features. More particularly, in accordance with one aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. In accordance with this aspect of the invention, the wire feeding mechanism includes a housing having two roller supports each rotable about a corresponding axis transverse to a wire pathway. The roller supports are on opposite sides the pathway and are driveably engaged with each other. A drive roller is on each of the roller supports for rotation therewith. The drive roller includes an outer surface extending circumferentially about the corresponding axis. The outer surface defines a groove having an included angle of less than ninety degrees (90°). The drive roller on each of said roller supports compressively contacts a continuous length of wire between the roller supports such that the wire is advanced along the pathway in response to rotation of the drive rollers. In accordance with another aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. More particularly, in accordance with this aspect of the invention, the wire feeding mechanism includes a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway. The roller supports are on opposite sides of the pathway and are driveably engaged with each other. A first drive roller is concentrically disposed with one of the two roller supports for rotation therewith. The first drive roller includes a first drive roller groove extending circumferentially therearound and having a first drive roller included angle of less than ninety degrees (90°). A second drive roller is concentrically disposed with the other of the two roller supports for rotation therewith. The second drive roller includes a second drive roller groove extending circumferentially therearound and having a second drive roller included angle of less than ninety degrees (90°). The first and second drive rollers are positioned relative to one another such that a continuous length of wire received in the circumferential grooves between the first and second drive rollers is advanced along the passageway in response to rotation of the first and second drive rollers. In accordance with yet another aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. More particularly, in accordance with this aspect of the invention, the wire feeding mechanism includes a first drive roller rotably supported in a housing for engaging and advancing a continuous length of wire along a pathway. A second drive roller is rotably supported in the housing on an opposite side of the pathway from the first drive roller for engaging and advancing the wire along the pathway. The first and second drive rollers each include an outer surface extending circumferentially thereabout. The outer surface has a first side wall and a second side wall that together define a groove. The first side wall is oriented at an angle of less than ninety degrees (90°) relative to the second side wall. BRIEF DESCRIPTION OF THE DRAWINGS The invention may take form in various components and arrangements of components and in various steps and arrangements of steps. The drawings are only for purposes of illustrating preferred embodiments and are not to be construed as limiting the invention. FIG. 1 is a schematic view of a wire feeding mechanism having drive rollers in accordance with a preferred embodiment of the present invention. FIG. 2 is a partial elevational view of the wire feeding mechanism taken at the line 2-2 of FIG. 1 with a portion of a first set of drive rollers and a wire shown in cross-section. FIG. 3 is an enlarged partial cross-sectional view of the engagement between the drive rollers and the wire. FIG. 4 is an enlarged partial cross-sectional view of an engagement between drive rollers and a wire according to one drive roller arrangement of the prior art. FIG. 5 is an enlarged partial cross-sectional view of an engagement between drive rollers and a wire according to another drive roller arrangement of the prior art. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring now to the drawings wherein the showings are for purposes of illustrating one or more preferred embodiments of the invention only and not for purposes of limiting the same, FIG. 1 shows a wire feeding mechanism 10 having a wire pathway 12 defined in part by wire support guides 14,16. The wire feeding mechanism 10 is generally situated between a bulk supply of wire 18 and a workpiece 20. The wire 18 extends from the bulk supply, shown as roll 22 in FIG. 1, to the wire feeding mechanism 10, and further extends to the workpiece 20 where it is consumed in the process of welding. The wire 18 can be alternatively supplied in a wide variety of other bulk forms, including for example boxes, reels and the like. Generally, a flexible conduit 24 extends from the mechanism 10 on a downstream side 26 thereof such that the wire 18 will be advanced by the mechanism 10 through the conduit 24 to a welding gun 28 adjacent the workpiece 20. As the mechanism 10 axially advances the wire 18 along the pathway 12, the advancing wire is radially supported and guided by the flexible conduit 24 toward the workpiece 18 until the wire 16 reaches the gun 28 and is consumed during the welding process. As is known, the conduit 24 can optionally carry shielding gas and electrical current to the welding gun 28. Alternatively, the flexible conduit 24 can be replaced with a rigid conduit terminating at a welding head. In any arrangement, it is to be appreciated that both conduit and welding guns are commonly known and therefore need not be described in further detail herein. The wire feeding mechanism 10 includes a housing 30 through which the wire pathway 12 is defined. More particularly, the tubular wire support guides 14,16 are spaced along the wire pathway 12 and are oriented such that passages therethrough are axially aligned along and partially define the pathway 12. The wire feeding mechanism 10 further includes a first set of drive rollers 36,38 and a second set of drive rollers 40,42 disposed along the pathway 12 in spaced relation relative to one another. The drive rollers 3642 function to advance the continuous length of wire 18 as will be described in more detail below. More particularly, one drive roller from each pair of drive rollers, drive roller 36 and drive roller 40, is disposed on one side of the pathway 12 and the other drive roller from each pair, drive roller 38 and drive roller 42, is disposed on the other side of the pathway 12. Each of the rollers 36-42 is positioned radially adjacent the pathway and tangentially contacts the wire 18. As is known, one or more of the drive rollers 36-42 can be radially adjustably positionable relative to the wire pathway 12. On an upstream side of the driver rollers 36-42, the support guide 14 receives the wire 18 from the roll 22 and directs the wire 18 into a bite defined between the first set of drive rollers 36,38. On a downstream side of the drive rollers 36-42, the support guide 16 receives the wire 18 from the second set of drive rollers 42,44 and directs the wire 18 into the conduit 24. A third support guide (not shown) can be provided between the sets of drive rollers 36,38 and 40,42 to guide the wire 18 from the first set of drive rollers 36,38 into the second set of drive rollers 40,42. The tubular support guides optionally include tapered interior surfaces to further facilitate guiding of the wire 18. The first set of drive rollers 36,38 are carried on roller supports 44,46 for rotation therewith. The roller supports 44,46 are rotatably mounted in the housing 30 about respective roller support axes transverse to the wire pathway 12. The drive rollers 36,38 have respective drive roller axes coaxial with the respective roller support axes. Likewise, the second set of drive rollers 40,42 are carried on roller supports 48,50 for rotation therewith. The roller supports 48,50 are rotatably mounted in the housing 30 about respective axes transverse to the wire pathway spaced apart from the first set of drive rollers 36,38. The drive rollers 40,42 have respective drive roller axes coaxial with the respective roller support axes. The roller supports 44-50 are driveably engaged to one another. Thus, powered rotation of the roller supports 46,50 by a motor M causes rotation of the other roller supports 44,48. With additional reference to FIG. 2, each of the drive rollers 36-42 (only drive rollers 36,38 shown in FIG. 2) includes a hub 52 having an outer surface 54 extending circumferentially about the corresponding drive roller axis. To impart an advancing force or motion to the wire 18, opposing sets of the drive rollers 36,38 and 40,42 are positioned sufficiently close to one another so that the wire 18 extending along the pathway 12 is compressed between the rollers 36-42. The compressive force in combination with friction between the wire 12 and the rollers 36-42 advances the continuous length of wire 18 along the wire path 12 in a generally smooth and continuous manner. Optionally, one or more of the drive rollers 36-42 can be urged toward or into the wire 18 to further impart an advancing force or motion to the wire 18 when the rollers 36-42 are rotating. In one preferred embodiment, with reference to FIGS. 2 and 3, the drive rollers 36-42 include V-shaped grooves 58 defined by angled sidewalls 60,62. The grooves extend circumferentially about the drive rollers 36-42 and serve to reduce the deformation of the wire 18 caused by the compressive forces of the drive rollers 36-42. More particularly, the wire 18 is engaged by the sidewalls 60,62 of the drive rollers 36-42. As a result, the compressive forces exerted by each pair of drive rollers 36,38 and 40,42 contact and deform the wire 18 at four general contact locations. As a result of the four contact locations, the drive rollers 36-42 tend to deform the wire 18 to a lesser extent than those without V-shaped grooves. In the illustrated embodiment, the drive rollers 36-42 have a pair of V-shaped grooves 58. One of the V-shaped grooves 58 on each drive roller 36-42 can be used until its defining surfaces 60,62 have degraded to a sufficient extent. Then, the wire 18 can be moved to the second of the V-shaped grooves 58. Only after both V-shaped grooves are worn out might the drive roller need to be replaced or refurbished. Alternately, the grooves 58 on each drive roller may be configured for use with varying sizes of wire. In any arrangement, each of the V-shaped grooves 58 has an included angle of less than ninety degrees (90°). The included angle is the angle defined between the sidewalls 60 and 62. Thus, the grooves 58 are relatively sharp as compared to the two-groove arrangement of FIG. 4 which has grooves 100,102 with included angles of ninety degrees (90°). As will be described in more detail below, the sharp groove 58 provides a mechanical advantage so that the rollers 36,38 grip the wire 18 tighter than prior art rollers having grooves with relatively shallow grooves. Preferably, the included angles of the grooves 58 are about thirty to sixty degrees (300-600) and, more preferably, about sixty degrees (600). Because the grooves 58 are substantially similar on opposed rollers 36,38 and 40,42, a centerline of the wire 18 is between outer surfaces 59 of the rollers and is above the outer surface 54 of any particular roller 36-42. By maintaining relatively tight tolerances in the grooves 58, the wire 18 is assured of contacting the sidewalls 60,62 while maintaining a gap between opposed rollers 36,38 and 40,42. Prior art roller arrangements, such as that shown in FIG. 5, occasionally utilized a roller 122 with a sharp angled groove 120 but the opposing roller 124 was flat. This arrangement was used to ensure the sidewalls 126,128 appropriately contacted the wire 132 while maintaining a gap between the rollers 122,124. Two sharp angled, opposed grooves were not considered because, heretofore, tight tolerances of grooves 58 could not be ensured. However, modern machine has made it possible to ensure tight tolerances so that opposed grooves 58 are aligned and, when wire 18 is received therebetween, a gap is maintained between opposed drive rollers 36,38. One advantage of the sharp angled grooves 58 on opposing rollers 36,38 is that the rollers 36,38 exert more pulling power as compared to shallow angled grooves (FIG. 4). By way of example, where FD represents the normal force of a drive roll acting on the wire, the vertical component of FD is related to the normal (clamping) force FC by the following equation: F D = F C 2 ⁢ ⁢ sin ⁡ ( θ 2 ) where θ is the angle between the sidewalls defining a groove in the roller. The frictional force between the drive roller and the wire can be represented by: f=μf·FD where μf is the coefficient of friction. The drive force Fe generated by one of the drive rollers becomes: F e = μ f · F c 2 ⁢ ⁢ sin ⁡ ( θ 2 ) Using this equation, it can be readily observed that the drive force generated by sharp angled rollers, such as rollers 36,38, is greater than that generated by either of the prior art arrangements shown in FIGS. 4 and 5. The invention has been described with reference to the preferred embodiments. Obviously, modifications and alterations will occur to others upon reading and understanding the preceding description. It is intended that the invention be construed as including all such modifications and alterations insofar as they are within the scope of the appended claims or the equivalents thereof.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to the art of wire feeding mechanisms and, more particularly, to drive rollers used in wire feeding mechanisms for driveably advancing a welding wire. The present invention finds particular application in conjunction with drive rollers used to advance a welding wire and will be described with particular reference thereto. It is to be appreciated, however, that the present invention may relate to other similar environments and applications. 2. Discussion of the Art U.S. Pat. No. 6,557,742 to Bobeczko et al., U.S. Pat. No. 5,816,466 to Seufer and U.S. Pat. No. 4,235,362 to Hubenko, all expressly incorporated herein by reference, disclose wire feeding mechanisms and provide general background information related thereto. Wire feeding mechanisms that move consumable electrode wire from a supply reel to a welding gun are generally well known. For example, Seufer discloses a wire feed mechanism having a wire pathway through which a continuous length of wire is advanced. Typically, wire feed mechanisms include motor-driven drive rolls that engage diametrically opposite sides of a wire to move the wire along a path through a housing of the feeding mechanism. Once through the housing, the wire is moved through a flexible tube or conduit leading to a welding gun. Often, the conduit also carries shielding gas and electrical current to the welding gun. Typically, each of the drive rollers is mounted on a roller support and all of the roller supports are driveably engaged with one another. Thus, powered rotation of a single roller support causes rotation of all the roller supports and the drive rollers supported thereon. Usually, the drive rolls are a single pair of opposed rollers or a double pair of opposed rollers spaced apart along the wire path. In either arrangement, the drive rollers have an upstream side at which the wire enters the drive rollers and a downstream side at which the wire exits the driver rollers. On the upstream side, the wire is guided through an upstream tube toward a bite created between the drive rollers adjacent the upstream side. Likewise, on the downstream side, the wire exits the drive rollers and is guided through a downstream tube adjacent the downstream side. If a double pair of opposed rollers are used, another tube can be provided between the pairs of drive rollers to further guide the wire. To impart an advancing force or motion to the wire, opposing drive rollers are positioned sufficiently close to one another so that the wire extending along the pathway is compressed between the opposing rollers. The compressive force in combination with friction between the material of the wire and the rollers advances the continuous length of wire along the wire path in a generally smooth and continuous manner. In some arrangements, one or more of the drive rollers are urged toward the wire by a biasing member to further impart an advancing force or motion on the wire. The wire passing through the drive rollers has a generally round cross-section and is engaged tangentially by opposing, flat-faced drive rollers mounted transversely to the wire. As a result of this arrangement, the compressive forces exerted on the wire by the driver rollers often cause the wire to undesirably deform. The material characteristics of the wire largely determine the magnitude or amount the wire is deformed as a result of the compressive forces. Accordingly, a wire made from a material having a relatively high compressive yield strength, such as steel, will be deformed less than a wire made from a material having a moderate compressive yield strength, such as aluminum. In some applications, one or both of each pair of drive rollers include U-shaped or V-shaped grooves extending circumferentially thereabout for reducing the deformation of the wire from the compressive forces of the drive rollers. When such grooves are employed, the wire is engaged by side walls of the drive roller forming the groove. As a result, the compressive force exerted by the drive roller with a groove tends to act and deform the wire along more of the wire's outer surface than if no groove was provided. More contact between the drive roller and the wire results in less deformation. When grooves are used, they are typically employed in one of two arrangements. In one arrangement, with reference to FIG. 4 , a pair of relatively shallow angled grooves 100 , 102 are provided on opposed drive rollers 104 , 106 . More particularly, the first groove 100 in the first drive roller 104 is defined by side walls 108 , 110 which are at an angle of ninety degrees (90°) relative to one another. Likewise, the second groove 102 in the second drive roller 106 is defined by side walls 112 , 114 which are at an angle of ninety degrees (90°) relative to one another. Since both grooves 100 , 102 are configured alike, the drive rollers 104 , 106 grip wire 116 with an equal amount of force. A centerline of the wire 116 is generally centered between the drive rollers 104 , 106 . In the other arrangement, with reference to FIG. 5 , a relatively sharp-angled groove 120 is provided in a first drive roller 122 and no groove is provided in a second, opposite drive roller 124 . The groove 120 is defined by side walls 126 , 128 in the first drive roller 122 which are at an angle of between thirty and sixty degrees (30°-60°) and, preferably, an angle of sixty degrees (600). The second drive roller 124 , also referred to as a flat idler roller, has a flat surface 130 for engaging wire 132 . A centerline of the wire 132 often sits below flat surface 134 of the first drive roller 122 which is the surface in which the groove 120 is formed. More particularly, the flat idler roller 124 pushes the wire 132 into the groove 120 which in turn propels the wire 132 . While these types of groove arrangements tend to lessen the amount a wire is deformed, the amount of compressive force required to input motion to the wire remains high. Reductions in the required compressive force are generally considered desirable and can decrease wear on the wire feed mechanism and/or reduce slippage of the wire relative to the drive rollers. Accordingly, any improvements to the drive rollers that decreases the required compressive force needed to drive the wire engaged by the drive rollers is deemed desirable.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention provides new and improved drive rollers for use in wire feed mechanisms that overcome the foregoing difficulties and others and provide the aforementioned and other advantageous features. More particularly, in accordance with one aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. In accordance with this aspect of the invention, the wire feeding mechanism includes a housing having two roller supports each rotable about a corresponding axis transverse to a wire pathway. The roller supports are on opposite sides the pathway and are driveably engaged with each other. A drive roller is on each of the roller supports for rotation therewith. The drive roller includes an outer surface extending circumferentially about the corresponding axis. The outer surface defines a groove having an included angle of less than ninety degrees (90°). The drive roller on each of said roller supports compressively contacts a continuous length of wire between the roller supports such that the wire is advanced along the pathway in response to rotation of the drive rollers. In accordance with another aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. More particularly, in accordance with this aspect of the invention, the wire feeding mechanism includes a housing having two roller supports each rotatable about a corresponding axis transverse to a wire pathway. The roller supports are on opposite sides of the pathway and are driveably engaged with each other. A first drive roller is concentrically disposed with one of the two roller supports for rotation therewith. The first drive roller includes a first drive roller groove extending circumferentially therearound and having a first drive roller included angle of less than ninety degrees (90°). A second drive roller is concentrically disposed with the other of the two roller supports for rotation therewith. The second drive roller includes a second drive roller groove extending circumferentially therearound and having a second drive roller included angle of less than ninety degrees (90°). The first and second drive rollers are positioned relative to one another such that a continuous length of wire received in the circumferential grooves between the first and second drive rollers is advanced along the passageway in response to rotation of the first and second drive rollers. In accordance with yet another aspect of the present invention, a wire feeding mechanism is provided for advancing a continuous length of wire along a pathway. More particularly, in accordance with this aspect of the invention, the wire feeding mechanism includes a first drive roller rotably supported in a housing for engaging and advancing a continuous length of wire along a pathway. A second drive roller is rotably supported in the housing on an opposite side of the pathway from the first drive roller for engaging and advancing the wire along the pathway. The first and second drive rollers each include an outer surface extending circumferentially thereabout. The outer surface has a first side wall and a second side wall that together define a groove. The first side wall is oriented at an angle of less than ninety degrees (90°) relative to the second side wall.
20040315
20080610
20050915
95235.0
1
LANGDON, EVAN H
DRIVE ROLLERS FOR WIRE FEEDING MECHANISM
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,943
ACCEPTED
Reversibly color changing undercoat layer for electrophotographic photoreceptors
An imaging member includes an electroconductive support containing an electroconductive layer thereon; thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and a charge generating layer and a charge transport layer.
1. An imaging member comprising: an electroconductive support containing an electroconductive layer thereon; thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and a charge generating layer and a charge transport layer. 2. The imaging member of claim 1, wherein the metal alkyloxide is selected from the group consisting of metal methoxides, metal ethoxides, metal propoxides, metal isopropoxides, metal butoxides, titanium propoxide, titanium isopropoxide, titanium methoxide, titanium butoxide, titanium ethoxide, zirconium isopropoxide, zirconium propoxide, zirconium butoxide, zirconium ethoxide, zirconium methoxide, or a combination thereof. 3. The imaging member of claim 1, wherein the siloxane is selected from the group consisting of amino alkylalkoxysilanes, 3-aminopropyltrimethoxysilane, 3-aminopropyltriethoxysilane, 3-aminopropyldiisopropylethoxysilane, aminophenyltrimethoxysilane, 3-aminopropylmethyldiethoxysilane, 3-aminopropylpentamethyldisiloxane, or a combination thereof. 4. The imaging member of claim 1, wherein the color change material is selected from the group consisting of phenolphthalein, phenolsulfonephthalein, thymolphthalein, or a combination thereof. 5. The imaging member of claim 1, wherein the first layer is disposed at a thickness of about 0.1 microns to about 20 microns. 6. The imaging member of claim 1, wherein the support comprises a metal, metal alloy, aluminum, zirconium, niobium, tantalum, vanadium, hafnium, titanium, nickel, stainless steel, chromium, tungsten, molybdenum, or a combination thereof. 7. The imaging member of claim 1, wherein the charge generating layer comprises a material selected from the group consisting of inorganic photoconductive materials, amorphous selenium, trigonal selenium, selenium alloys, selenium-tellurium, selenium-tellurium-arsenic, selenium arsenide, organic photoconductive materials, phthalocyanine pigments, the X-form of metal free phthalocyanine, metal phthalocyanines, vanadyl phthalocyanine, copper phthalocyanine, quinacridones, dibromo anthanthrone pigments, benzimidazole perylene, substituted 2,4-diamino-triazines, polynuclear aromatic quinones, enzimidazole perylene, or a combination thereof. 8. The imaging member of claim 1, wherein the charge transport layer comprises a material selected from the group consisting of a charge transporting aromatic amine compound, triphenylmethane, bis(4-diethylamine-2-methylphenyl)phenylmethane; 4′-4″-bis(diethylamino)-2′,2″-dimethyltriphenylmethane, N,N′-bis(alkylphenyl)-[1,1′-biphenyl]-4,4′-diamine, N,N′-diphenyl-N,N′-bis(chlorophenyl)-[1,1′-biphenyl]-4,4′-diamine, N,N′-diphenyl-N,N′-bis(3″-methylphenyl)-(1,1′-biphenyl)-4,4′-diamine, or a combination thereof. 9. The imaging member of claim 1, wherein the metal alkyloxide is present in the first layer in an amount of from about 5% to about 95% or from about 20% to about 80%, based upon the total weight of the first layer. 10. The imaging member of claim 1, wherein the amino siloxane is present in the first layer in an amount of from about 95% to about 5% or from about 80% to about 20% based upon the total weight of the first layer. 11. The imaging member of claim 1, wherein the color change material is present in the first layer in an amount such as from about 0.001% to about 50%, or from about 0.1% to about 10%, weight basis, based upon the total weight of the first layer. 12. A process for preparing an imaging member comprising: providing an electroconductive support having an electroconductive layer thereon; forming thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and forming thereover a charge generating layer and a charge transport layer. 13. The process of claim 12, wherein the metal alkyloxide is selected from the group consisting of metal methoxides, metal ethoxides, metal propoxides, metal isopropoxides, metal butoxides, titanium propoxide, titanium isopropoxide, titanium methoxide, titanium butoxide, titanium ethoxide, zirconium isopropoxide, zirconium propoxide, zirconium butoxide, zirconium ethoxide, zirconium methoxide, or a combination thereof. 14. The process of claim 12, wherein the amino siloxane is selected from the group consisting of an amino alkylalkoxysilane, 3-aminopropyltrimethoxysilane, 3-aminopropyltriethoxysilane, 3-aminopropyldiisopropylethoxysilane, aminophenyltrimethoxysilane, 3-aminopropylmethyldiethoxysilane, 3-aminopropylpentamethyldisiloxane, or a combination thereof. 15. The process of claim 12, wherein the color change material is selected from the group consisting of phenolphthalein, phenolsulfonephthalein, thymolphthalein, or a combination thereof. 16. The process of claim 12, wherein the support comprises a metal, metal alloy, aluminum, zirconium, niobium, tantalum, vanadium, hafnium, titanium, nickel, stainless steel, chromium, tungsten, molybdenum, or a combination thereof. 17. The process of claim 12, wherein the charge generating layer comprises a material selected from the group consisting of inorganic photoconductive materials, amorphous selenium, trigonal selenium, selenium alloys, selenium-tellurium, selenium-tellurium-arsenic, selenium arsenide, organic photoconductive materials, phthalocyanine pigments, the X-form of metal free phthalocyanine, metal phthalocyanines, vanadyl phthalocyanine, copper phthalocyanine, quinacridones, dibromo anthanthrone pigments, benzimidazole perylene, substituted 2,4-diamino-triazines, polynuclear aromatic quinones, enzimidazole perylene, or a combination thereof. 18. The process of claim 12, wherein the charge transport layer comprises a material selected from the group consisting of a charge transporting aromatic amine compound, triphenylmethane, bis(4-diethylamine-2-methylphenyl)phenylmethane; 4′-4″-bis(diethylamino)-2′,2″-dimethyltriphenylmethane, N,N′-bis(alkylphenyl)-[1,1′-biphenyl]-4,4′-diamine, N,N′-diphenyl-N,N′-bis(chlorophenyl)-[1,1′-biphenyl]-4,4′-diamine, N,N′-diphenyl-N,N′-bis(3″-methylphenyl)-(1,1′-biphenyl)4,4′-diamine, or a combination thereof. 19. The process of claim 12, wherein forming a first layer comprises forming the first layer at a thickness of about 0.1 micron to about 20 microns. 20. The process of claim 12, wherein the metal alkyloxide is present in the first layer in an amount of from about 5% to about 95% or from about 20% to about 80%, based upon the total weight of the first layer. 21. The process of claim 12, wherein the amino siloxane is present in the first layer in an amount of from about 95% to about 5% or from about 80% to about 20%, based upon the total weight of the first layer. 22. The process of claim 12, wherein the color change material is present in the first layer in an amount such as from about 0.001% to about 50%, or from about 0.1% to about 10%, weight basis, based upon the total weight of the first layer.
TECHNICAL FIELD The present invention relates to electrophotographic imaging members and more particularly relates to layered electrophotographic photoreceptor members having a reversibly color changing undercoat layer. BACKGROUND OF THE INVENTION Electrophotographic imaging members, i.e., photoreceptors, typically include a photoconductive layer formed on an electrically conductive substrate. The photoconductive layer is an insulator in the dark so that electric charges are retained on its surface. Upon exposure to light, the charge is dissipated. A latent image is formed on the photoreceptor by first uniformly depositing electric charges over the surface of the photoconductive layer by one of any suitable means known in the art. The photoconductive layer functions as a charge storage capacitor with charge on its free surface and an equal charge of opposite polarity (the counter charge) on the conductive substrate. A light image is then projected onto the photoconductive layer. On those portions of the photoconductive layer that are exposed to light, the electric charge is conducted through the layer reducing the surface charge. The portions of the surface of the photoconductor not exposed to light retain their surface charge. The quantity of electric charge at any particular area of the photoconductive surface is inversely related to the illumination incident thereon, thus forming an electrostatic latent image. The photo-induced discharge of the photoconductive layer requires that the layer photogenerate conductive charge and transport this charge through the layer thereby neutralizing the charge on the surface. Two types of photoreceptor structures have been employed: multilayer structures wherein separate layers perform the functions of charge generation and charge transport, respectively, and single layer structures in which photoconductors perform both functions. These layers are formed on an electrically conductive substrate and may include an optional charge blocking layer and an adhesive layer between the conductive substrate and the photoconductive layer or layers. Additionally, the substrate may comprise a non-conducting mechanical support with a conductive surface. Other layers for providing special functions such as incoherent reflection of laser light, dot patterns for pictorial imaging, or subbing layers to provide chemical sealing and/or a smooth coating surface may also be employed. One common type of photoreceptor is a multi-layered photoreceptor having a structure comprising an electrically conductive substrate, an undercoat layer formed on the substrate, a charge generating layer applied on the undercoat layer, and a charge transport layer formed on the charge generating layer. The phrases “charge blocking layer” and “blocking layer” are generally used interchangeably with the phrase “undercoat layer.” U.S. Pat. No. 5,314,776 to Nomura, Fukuda, Nagasaki, and Suda entitled “Multi-layered Photoreceptor for Electrophotography” describes a process for manufacturing a photoreceptor comprising a substrate which comprises an electroconductive support or a support having an electroconductive film formed thereon; an undercoat layer including a material selected from the group consisting of silicon dioxide and other silicon oxides formed on the substrate; a carrier generation layer formed on the undercoat layer; and a carrier transport layer formed on the charge generation layer. U.S. Pat. No. 6,479,202 to Shida, Uchino, and Itami entitled “Electrophotographic Photoreceptor, Electrophotographic Image Forming Method, Electrophotograhic Image Forming Apparatus and Processing Cartridge” describes an electrophotographic photoreceptor having on a support a resin layer comprising a siloxane resin formed by hardening a compound represented by Formula 1, 2 or 3, or a hydrolyzed product which has a structural unit having a charge transportation ability, wherein a ratio M1/M2 of the sum of the amount of moles M1 of the compound represented by Formula 1 and that represented by Formula 2 to the amount in moles of the compound represented by Formula 3 is within the range of from 0.01 to 1; Si(OR1′)4 Formula 1 R1Si(OR2′)3 Formula 2 R1R2Si(OR3′)2 Formula 3 wherein the formulas R1 and R2 each represent an alkyl group having one to ten carbon atoms, a phenyl group, an aryl group, a vinyl group, an amino group, a γ-glycidoxypropyl group, a γ-methacryloxypropyl group, or a CnF2n+1C2H4— group, R1′, R2′, and R3′ each representing an alkyl group and the groups represented by R1′, R2′, and R3′ may be the same or different from each other. U.S. Pat. No. 6,361,913 to Pai and Yanus entitled “Long Life Photoreceptor” describes an electrophotographic imaging member comprising a substrate, a charge generating layer, a charge transport layer, and an overcoat layer comprising a hydroxytriphenyl methane having at least one hydroxy functional group and a polyamide film forming binder capable of forming hydrogen bonds with the hydroxy functional group of the hydroxy triphenyl methane molecule, the charge transport layer being substantially free of triphenyl methane molecules. An undercoat layer may be provided to cover up substrate defects, to improve print quality (such as to reduce or eliminate imagewise constructive interference effects known as “plywood effect”), to ensure environmental insensitivity, and/or to enable good electrical properties, e.g., block holes, transport electrons, enable cyclic stability, provide low surface potential residue of photo-induced discharge (Vr) and dark decay (Vdd), and improve coating uniformity. For electrophotographic imaging systems which utilize uniform negative polarity charging prior to imagewise exposure, it is important that the undercoat charge blocking layer bleeds off negative charge while preventing positive charge leakage. In this case, the undercoat layer which is thick enough to cover up the roughened surface of the substrate is desired. Further, undercoat layers that are too thin are more susceptible to the formation of pinholes which allow both negative and positive charges to leak through the charge blocking and result in print defects. Also, when charge blocking undercoat layers are too thin, small amounts of contaminants can adversely affect the performance of the charge blocking undercoat layer and cause print defects due to passage of both negative and positive charges through the layer. Defects in the hole blocking layer, which allow both negative and positive charges to leak through, lead to the development of charge deficient spots associated with copy print-out defects. Generally, undercoat layer formulations can be classified as dispersed undercoat layer solutions or homogeneous undercoat layer solutions. Dispersed undercoat layers comprise non-soluble particles in binders and solvents. Homogenous undercoat layers comprise charge conductive species soluble in binders and solvents. A known method for preparing dispersed undercoat layer solutions comprises mixing metal oxides with polymeric binders in an organic solvent. The metal oxides may comprise, for example, titanium oxide, zinc oxide, zirconium oxide, tin oxide and aluminum oxide, among others. A wide variety of polymeric resin binders have been employed for this purpose, such as, for example, polyimides, polyamides, polyacrylates, vinyl polymers and other specialty materials. The dispersion procedure is very time-consuming. In order to achieve good electrical properties, the metal oxide particles in the solution must be nanometer grade in size. Problematically, in the standing dispersed solution, the metal oxide tends to precipitate, causing macro-phase separation which results in non-uniform coatings. The process for preparing homogeneous undercoat layers is generally more convenient than that for preparing dispersed undercoat layers. Generally, the process for preparing homogeneous undercoat layers comprises mixing the forgoing materials in the suitable solvents and applying the mixture to an electrically conductive substrate using suitable coating methods as known in the art. As an example, a three-component undercoat layer is described in U.S. Pat. No. 5,789,127 to Yamaguchi and Sakaguchi entitled “Electrophotographic Photoreceptor” (Fuji-Xerox). The three-component undercoat layer described therein requires moisture during curing. For most dispersed undercoat layer formulations, such as, for example, that described in U.S. Pat. No. 5,612,157 to Yuh and Chambers entitled “Charge Blocking Layer for Electrophotographic Imaging Member,” the range of suitable materials is somewhat limited. Many polymeric materials have the particle size, density, and dispersion stability in the proper range, but they have refractive index values that are too close to the binder resin used in the charge blocking layer. Light scattering particles having a refractive index similar to the binder refractive index may produce light scattering insufficient to eliminate the plywood effect in the resulting prints. Selecting inorganic particles such as metal oxides, which typically have a higher refractive index than polymeric materials, to be the light scattering particles is problematic because inorganic particles such as metal oxides generally have higher densities than polymeric materials and thus can create a particle settling problem that adversely affects the uniformity of the blocking layer and the quality of the resulting prints. Also, since the electrical properties tend to deteriorate when the undercoat layer is provided at a thickness of greater than about 6 micrometers, there is a thickness limitation of about 6 micrometers. “Plywood effect” is a problem inherent in layered photoreceptors and so termed because when the spatial exposure variation in an image formed on a photoreceptor appears in the output print it looks like a pattern of light and dark interference fringes resembling the grains on a sheet of plywood. The issue of plywood effect has been addressed in the prior art by increasing the thickness of, and hence the absorption of light by, the charge generating layer. For most systems, this leads to unacceptable tradeoffs. For example, for a layered organic photoreceptor, an increase in dark decay characteristics and electrical instability may occur. U.S. Pat. No. 4,618,552 to Tanaka, Sumino, and Toma entitled “Light Receiving Member for Electrophotography Having Roughened Intermediate Layer” describes a method for compensating for plywood effect by using a photoconductive imaging member in which the ground plane, or an opaque conductive layer formed above or below the ground plane, is formed with a rough surface morphology to diffusively reflect the light. Another method for compensating for plywood effect is described in U.S. Pat. No. 5,052,328 to Andrews and Simpson entitled “Photosensitive Imaging Member with a Low-Reflection Ground Plane.” U.S. Pat. No. 5,052,328 describes a ground plane of low reflection material so as to reduce the reflections therefrom. U.S. Pat. No. 5,089,908 to Jodoin, Loce, Lama, Rees, Ibrahim, and Appel entitled “Plywood Suppression in ROS Systems” describes a multiple diode laser array used in a raster output scanning (ROS) system modified to reduce the effects of undesirable spatial exposure variation at the surface of certain types of layered, semi-transparent photoreceptors. The spatial absorption variation is later manifested as a plywood pattern formed on output prints derived from the exposed photoreceptor. The laser array is modified to form a merged scanning beam at the photoreceptor surface of two or more diode outputs, each output operating at a different wavelength than the other. In one embodiment, a plurality of diodes, each at a different wavelength, are sequentially addressed, and an image of each diode is scanned across the photoreceptor which results in an exposure distribution that would be similar to that formed by an incoherent beam. The disclosures of the foregoing are hereby incorporated by reference herein in their entireties. There is still a need in the art for improved photoreceptors that overcome or alleviate the above-mentioned and other problems and for an improved method for preparing such photoreceptors. SUMMARY OF THE INVENTION The invention comprises an imaging member comprising: an electroconductive support containing an electroconductive layer thereon; thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and a charge generating layer and a charge transport layer. A process for preparing an imaging member comprising: providing an electroconductive support having an electroconductive layer thereon; forming thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and forming thereover a charge generating layer and a charge transport layer. Important features of the present invention in embodiments include a first layer (also referred to herein as “undercoat layer”) that can be thick, has a pH and light sensitive color change characteristic, and uses an ammonium titanate complex formed from the combination in the undercoat layer of the metal alkyl oxide and the amino siloxane. The present thick undercoat layer for xerographic photoreceptors can be coated at a thickness of up to about 20 microns. This permits rough substrates to be coated and prevents penetration of carbon fibers through the active layers to the substrate. The undercoat layer also provides improved hole blocking. Another important feature is the employment of the color change material that reversibly changes color as a function of pH and which color change is reversible upon exposure to light. Exemplary color change materials suitable for use in the present invention, include, but are not limited to, for example, phenolphthalein, phenolsulfonephthalein, thymolphthalein, and the like. In operation, the color change material turns color (e.g., red for phenolphthalein, blue for thymolphthalein, orange for phenolsulfonephthalein) in the presence of a Lewis base. The color changed undercoat layer absorbs light exposure energy and prevents reflection from the substrate and thus prevents plywood defects. Imaging members prepared with the present undercoat layer provide good and stable electrical properties superior to those of previously available photoreceptors such as those prepared with dispersed titanium dioxide in a phenolic resin undercoat layer. Advantages of the invention include allowing use of a thick undercoat layer that does not employ dispersed nanoparticles and therefore is insensitive to substrate defects and can be coated on a rough surface of the photoreceptor drum. The invention provides an inexpensive solution for maintaining good electrical properties, effects plywood suppression, provides a stable coating solution, improves hole blocking, cyclic stability, low residual voltage and dark decay. The undercoat layer also provides a solution to the problem of carbon fiber penetration, which is a big problem in currently available thin undercoat layers. The process for preparing the imaging member is advantageously simple. Additionally, the imaging member prepared with the undercoat layer has a lifetime of more than 1.5 million cycles. These and other features and advantages of the invention will be more fully understood from the following description of certain specific embodiments of the invention taken together with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates exemplary structural formulae for phenolphthalein molecular conversions. FIG. 2 illustrates a structural formula for a titanium isopropoxide molecule. FIG. 3 illustrates a structural formula for a 3-aminopropyltrimethoxysilane molecule. FIG. 4 is a graph showing photo-induced discharge characteristics of a photoreceptor prepared in accordance with an embodiment of the present invention. DESCRIPTION OF THE PREFERRED EMBODIMENT An imaging member comprises in embodiments an electroconductive support containing an electroconductive layer thereon; a first layer comprising an undercoat layer (the undercoat layer is also frequently termed a “blocking layer” or “charge blocking layer”) disposed on the support, the undercoat layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the undercoat layer reversibly changes color in the presence of a Lewis base (generally defined as a species that can donate a pair of electrons and form a coordinate covalent bond) and further wherein the undercoat layer color change is reversible upon exposure to light, particularly light having a wavelength useful for xerography, such as, for example, light having a wavelength of about 4000 angstroms to about 9000 angstroms; and a charge generating layer and a charge transport layer. Examples of metal alkyloxides suitable for use in the undercoat layer include, but are not limited to, metal methoxides, metal ethoxides, metal propoxides, metal isopropoxides, metal butoxides, titanium propoxide, titanium isopropoxide, titanium methoxide, titanium butoxide, titanium ethoxide, zirconium isopropoxide, zirconium propoxide, zirconium butoxide, zirconium ethoxide, zirconium methoxide, or combinations thereof. The amino siloxane may comprise, for example, an amino siloxane such as an amino alkylalkoxysilane, including, but not limited to, 3-aminopropyltrimethoxysilane (APS), 3-aminopropyltriethoxysilane, 3-aminopropyldiisopropylethoxysilane, aminophenyltrimethoxysilane, 3-aminopropylmethyldiethoxysilane or 3-aminopropylpentamethyldisiloxane, and the like. The color change component may comprise any suitable material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light. Exemplary color change materials suitable for use in the invention, include, but are not limited to, for example, phenolphthalein, phenolsulfonephthalein, thymolphthalein, and the like. The color change material is present in the undercoat layer in an amount such as from about 0.001% to about 50%, preferably from about 0.1% to about 10%, weight basis, based upon the total weight of the undercoat layer. The undercoat layer is disposed in a polymer binder, such as polymethylmethacrylate (PMMA), polyvinyl butyral (PVB), polyvinyl alcohol, poly(hydroxyethyl methacrylate), poly(hydroxypropyl acrylate) or poly(vinylpyrrolidone); a copolymer, such as a vinyl halide, especially a vinyl chloride copolymer, such as poly(vinyl chloride-co-vinyl acetate), poly(vinyl chloride-co-vinyl acetate-co-vinyl alcohol), poly(vinylidene chloride-co-methyl acrylate) or poly(vinyl chloride-co-isobutyl vinyl ether) and the like. The solvent selected for the coating solution can be any suitable organic solvent, such as, for example, methyl ethyl ketone (MEK), tetrahydrofuran (THF), toluene, an alcohol, such as, for example, 1-propanol, 2-propanol, methanol, ethanol, 1-butanol; and acetone, among other solvents. The metal alkyloxide, such as titanium isopropoxide, is present in the undercoat layer in an amount such as from about 5% to about 95%, preferably from about 20% to about 80% based upon the total weight of the undercoat layer. The amino siloxane, such as 3-aminopropyltrimethoxysilane, is present in an amount of from about 95% to about 5%, preferably from about 80% to about 20% based upon the total weight of the undercoat layer. The binder polymer, such as PVB, is present in an amount of from about 1% to about 99%, preferably from about 5% to about 70% based upon the total weight of the undercoat layer. The solvent is provided in an amount suitable to control the viscosity of the coating solution, with total solution solvent concentrations typically being from about 5% to about 95%, preferably from about 15% to about 80% based upon the total weight of the undercoat layer. Materials suitable for use as charge generating layers include, but are not limited to, photogenerating layer materials such as, for example, inorganic photoconductive materials such as amorphous selenium, trigonal selenium, and selenium alloys selected from the group consisting of selenium-tellurium, selenium-tellurium-arsenic, selenium arsenide and mixtures thereof, and organic photoconductive materials including various phthalocyanine pigments such as the X-form of metal free phthalocyanine, metal phthalocyanines such as vanadyl phthalocyanine and copper phthalocyanine, quinacridones, dibromo anthanthrone pigments, benzimidazole perylene, substituted 2,4-diamino-triazines, polynuclear aromatic quinones, and the like, dispersed in a film forming polymeric binder. Selenium, selenium alloy, enzimidazole perylene, and the like, and mixtures thereof, may be formed as a continuous, homogeneous photogenerating layer. Benzimidazole perylene compositions are well known and described, for example in U.S. Pat. No. 4,587,189 to Hor and Loutfy entitled “Photoconducting Imaging Members With Perylene Pigment Compositions,” which is hereby incorporated by reference herein in its entirety. Multi-photogenerating layer compositions may be utilized where a photoconductive layer enhances or reduces the properties of the photogenerating layer. Other suitable photogenerating materials known in the art may also be utilized, if desired. Any suitable charge generating binder layer comprising photoconductive particles dispersed in a film forming binder may be utilized. Photoconductive particles for the charge generating binder layer, such as vanadyl phthalocyanine, metal-free phthalocyanine, benzimidazole perylene, amorphous selenium, trigonal selenium, selenium alloys such as selenium-tellurium, selenium-tellurium-arsenic, selenium arsenide, and the like, and mixtures thereof, are especially preferred because of their sensitivity to white light. Vanadyl phthalocyanine, metal free phthalocyanine and tellurium alloys are also preferred because these materials provide the additional benefit of being sensitive to infrared light. The photogenerating materials selected should be sensitive to activating radiation having a wavelength between about 600 nanometers (nm) and about 700 nm during the imagewise radiation exposure step in an electrophotographic imaging process to form an electrostatic latent image. Any suitable inactive resin material soluble in methylene chloride, chlorobenzene or other suitable solvent may be employed for the photogeneration layer binders including those described, for example, in U.S. Pat. No. 3,121,006, which is hereby incorporated by reference herein in its entirety. Typical organic resinous binders include thermoplastic and thermosetting resins such as polycarbonates, polyesters, polyamides, polyurethanes, polystyrenes, polyarylethers, polyarylsulfones, polybutadienes, polysulfones, polyethersulfones, polyethylenes, polypropylenes, polyimides, polymethylpentenes, polyphenylene sulfides, polyvinyl butyral, polyvinyl acetate, polysiloxanes, polyacrylates, polyvinyl acetals, polyamides, polyimides, amino resins, phenylene oxide resins, terephthalic acid resins, epoxy resins, phenolic resins, polystyrene and acrylonitrile copolymers, polyvinylchloride, vinylchloride and vinyl acetate copolymers, acrylate copolymers, alkyd resins, cellulosic film formers, poly(amideimide), styrene-butadiene copolymers, vinylidenechloride-vinylchloride copolymers, vinylacetate-vinylidenechloride copolymers, styrene-alkyd resins, and the like. The photogenerating composition or pigment can be present in the resinous binder composition in various amounts. Generally, from about 5 percent to about 90 percent by volume of the photogenerating pigment is dispersed in about 10 percent to about 95 percent by volume of the resinous binder, and preferably from about 20 percent to about 30 percent by volume of the photogenerating pigment is dispersed in about 70 percent to about 80 percent by volume of the resinous binder composition. The photogenerating layer containing photoconductive compositions and/or pigments and the resinous binder material generally are provided in a thickness of from about 0.1 micrometer to about 5 micrometers, and preferably have a thickness of from about 0.3 micrometer to about 3 micrometers. The thickness of the photogenerating layer is related to binder content, with higher binder content compositions generally requiring thicker layers for photogeneration. A thickness outside of these ranges can be selected providing the objectives of the present invention are achieved. Materials suitable for use as charge transport layers include, but are not limited to, any suitable transparent organic polymer or non-polymeric material capable of supporting the injection of photogenerated holes and electrons from the trigonal selenium binder layer and allowing the transport of these holes or electrons through the organic layer to selectively discharge the surface charge. The active charge transport layer not only serves to transport holes or electrons, but also protects the photoconductive layer from abrasion or chemical attack and therefore extends the operating life of the photoreceptor imaging member. The charge transport layer should exhibit negligible, if any, discharge when exposed to a wavelength of light useful in xerography, e.g. 4000 angstroms to 9000 angstroms. Therefore, the charge transport layer is substantially transparent to radiation in a region in which the photoconductor is to be used. Thus, the active charge transport layer is a substantially non-photoconductive material which supports the injection of photogenerated holes from the generation layer. The active transport layer is normally transparent when exposure is effected through the active layer to ensure that most of the incident radiation is utilized by the underlying charge carrier generator layer for efficient photogeneration. The charge transport layer in conjunction with the charge generation layer in the instant invention is a material which is an insulator to the extent that an electrostatic charge placed on the transport layer is not conducted in the absence of illumination. The active charge transport layer may comprise any suitable activating compound useful as an additive dispersed in electrically inactive polymeric materials making these materials electrically active. These compounds may be added to polymeric materials which are incapable of supporting the injection of photogenerated holes from the generation material and incapable of allowing the transport of these holes therethrough. This will convert the electrically inactive polymeric material to a material capable of supporting the injection of photogenerated holes from the generation material and capable of allowing the transport of these holes through the active layer in order to discharge the surface charge on the active layer. The charge transport layer forming mixture preferably comprises an aromatic amine compound. An especially preferred charge transport layer employed in one of the two electrically operative layers in the multi-layer imaging member of this invention comprises from about 35 percent to about 45 percent by weight of at least one charge transporting aromatic amine compound, and about 65 percent to about 55 percent by weight of a polymeric film forming resin in which the aromatic amine is soluble. The substituents should be free form electron withdrawing groups such as NO2 groups, CN groups, and the like. Typical aromatic amine compounds include, for example, triphenylmethane, bis(4-diethylamine-2-methylphenyl)phenylmethane; 4′-4″-bis(diethylamino)-2′,2″-dimethyltriphenylmethane, N,N′-bis(alkyl phenyl)-[1,1′-biphenyl]-4,4′-diamine wherein the alkyl is, for example, methyl, ethyl, propyl, n-butyl, etc., N,N′-diphenyl-N,N-bis(chlorophenyl)-[1,1′-biphenyl]-4,4′-diamine, N,N′-diphenyl-N,N′-bis(3″-methylphenyl)-(1,1′-biphenyl)-4,4′-diamine, and the like, dispersed in an inactive resin binder. Examples of electrophotographic imaging members having at least two electrically operative layers, including a charge generator layer and diamine containing transport layer, are disclosed in U.S. Pat. No. 4,265,990, U.S. Pat. No. 4,233,384, U.S. Pat. No. 4,306,008, U.S. Pat. No. 4,299,897 and U.S. Pat. No. 4,439,507, the disclosures of which are hereby incorporated by reference herein in their entireties. An embodiment of the present invention employing an undercoat layer comprising titanium isopropoxide as the metal alkyloxide, 3-aminopropylsilane as the amino siloxane, and phenolphthalein as the color change material, will now be described with reference to FIGS. 1-3 showing structural formulae for phenolphthalein molecular conversions (FIG. 1), a titanium isopropoxide molecule (FIG. 2), and an aminopropyltrimethoxysilane molecule (FIG. 3). The undercoat layer is provided in a solvent, preferably 2-propanol. In the present undercoat layers, the metal alkyloxide and the amino siloxane form an ammonium titanate complex. Ammonium titanate is a very stable, conductive hybrid organic-inorganic complex with good solubility in alcohol. Although titanium isopropoxide and 3-aminopropylsilane are both very moisture sensitive compounds, titanium isopropoxide and 3-aminopropylsilane react to form an ammonium titanate complex at room temperature. Phenolphthalein is colorless at a pH of less than about 8.0, but becomes red in a basic environment (i.e., an environment having a pH of more than about 8.0). This is because of the formation of a number of resonance hybrids, which are pink-red in color. Some of the molecular structure conversions of phenolphthalein are depicted in FIG. 1 wherein the phenolphthalein is first shown as colorless (such as phenolphthalein in an environment having a pH of less than 8) and is next shown as two resonance hybrids that are reversibly color changed from colorless to pink-red resonance hybrids (that is, showing formation of phenolphthalein resonance hybrids in a basic environment). The color change is reversible under light exposure encountered in xerographic applications, consuming the light passed through the charge generating layer and preventing the light reflection on the substrate surface which causes plywood effect. The amino group in the amino siloxane, such as 3-aminopropylsilane, is sufficiently basic to promote phenolphthalein color change in the inventive undercoat layer. The undercoat layer solution as prepared appears slightly yellow. The undercoat layer solution can be coated at a thickness of up to about 20 micrometers on a photoreceptor support such as an aluminum drum substrate, through, for example, Tsukiage-dip coating. If desired, the undercoat layer can be thin, such as about 0.1 micron to a thickness, as stated above, or thick, such as up to about 20 microns. The undercoat layer may also be applied by any suitable technique such as spraying, dip coating, draw bar coating, gravure coating, silk screening, air knife coating, reverse roll coating, vacuum deposition, chemical treatment and the like. Additional substrates suitable for use include, for example, metals and metal alloys including aluminum, zirconium, niobium, tantalum, vanadium, hafnium, titanium, nickel, stainless steel, chromium, tungsten, molybdenum, and the like. Where the entire substrate is an electrically conductive metal, the outer surface thereof can perform the function of an electrically conductive layer and a separate electrical conductive layer may be omitted. The present invention will be further explained with reference to the following examples and control, it being noted that these examples are intended to illustrate and not limit the scope of the present invention. EXAMPLE 1 4.0 grams of titanium isopropoxide 98+% (Fisher Scientific) were added directly into a brown bottle containing 4.0 grams of 3-aminopropyltrimethoxysilane 97% (Fisher Scientific) with slight stirring. The exothermic reaction occurred instantly to give a clear solution. The reaction was stoichiometric, generating an ammonium titanate complex. This solution was allowed to cool naturally until it reached room ambient temperature (i.e., about 24° C.). The cooled solution was added into a polymer solution containing 1.5 grams of polyvinyl butyral (Sekisui Specialty Chemicals Company) and 0.1 grams of phenolphthalein (Aldrich Chemical) in 20 grams of a 1-propanol solvent. The mixture was stirred slightly on a roll mill (U.S. Stoneware, Akron, Ohio) for about 15 hours to obtain a clear solution therefore indicating that the solution was ready to be coated as an undercoat layer. The solution appeared very stable with no obvious visual viscosity change after the solution stood at room temperature for about one month. EXAMPLE 2 The prepared undercoat layer solution of Example 1 was coated onto a 30 millimeter in diameter aluminous drum substrate to a thickness of about 8.8 microns by Tsukiage dip coating method at 350 millimeters/minute pull-rate. The coated undercoat layer was dried in a forced air oven at about 135° C. for about 45 minutes. After drying, a charge generating layer and a charge transport layer were coated sequentially onto the undercoat layer by dip coating. The charge generating layer solution comprised 2.5 weight percent of hydroxy-gallium phthalocyanine (Xerox Corporation) and 2.5 weight percent of poly(vinyl chloride) copolymer with molecular weight Mw=40,000 (VMCH from Dow Chemicals) in 95 weight percent of n-butyl acetate and was coated at a thickness of about 0.3 microns. The charge transport layer solution comprised 8.0 weight percent of N,N′-diphenyl-N,N′-bis(3-methylphenyl)-1,1′-biphenyl-4,4′-diamine, 12.0 weight percent of poly(4,4′-diphenyl-1,1′-cyclohexane carbonate (Mitsubishi Chemicals) in 80 weight percent of tetrahydrofuran and was coated at a thickness of about 25 microns. COMPARATIVE EXAMPLE 3 A comparative example (Control) comprising a titanium oxide/phenolic resin dispersion was prepared by ball milling 15 grams of titanium dioxide (STR60N™, Sakai Company), 20 grams of the phenolic resin VARCUM™ 29159 (OxyChem Company, Mw about 3,600, viscosity about 200 cps) in 7.5 grams of 1-butanol and 7.5 grams of xylene with 120 grams of 1 millimeter diameter sized ZrO2 beads for 5 days. Separately, a slurry of SiO2 and a phenolic resin was prepared by adding 10 grams of SiO2 (P100, Esprit) and 3 grams of the above phenolic resin into 19.5 grams of 1-butanol and 19.5 grams of xylene. The resulting titanium dioxide dispersion was filtered with a 20 micrometer pore size nylon cloth, the filtrate was measured with a Horiba Capa 700 Particle Size Analyzer and there was obtained a median TiO2 particle size of 50 nanometers in diameter and a TiO2 particle surface area of 30 m2/gram with reference to the above TiO2/VARCUM dispersion. Additional solvents comprising 5 grams of 1-butanol and 5 grams of xylene; 2.6 grams of bisphenol S (4,4′-sulfonyldiphenol) and 5.4 grams of the above prepared SiO3/VARCUM slurry were added to 50 grams of the above resulting titanium dioxide/VARCUM dispersion, referred to as the coating dispersion. The aluminum drum was cleaned with detergent, rinsed with deionized water, and dip coated with the coating dispersion at a pull rate of 160 millimeters/minute, and subsequently dried at 160° C. for 15 minutes, which resulted in an undercoat layer with a thickness of 3.5 microns. The charge generating layer and charge transport layer were prepared by the same method as described in Example 2 above. EXAMPLE 4 The electrical properties of the prepared photoreceptor device with the present undercoat layer (Example 1) and the Control were tested in accordance with standard drum photoreceptor test methods. The electrical properties of the photoreceptor samples prepared according to Example 2 and Comparative Example 3 were evaluated with a xerographic testing scanner. The drums were rotated at a constant surface speed of 15.7 cm per second. A direct current wire scorotron, narrow wavelength band exposure light, erase light, and four electrometer probes were mounted around the periphery of the mounted photoreceptor samples. The sample charging time was 177 milliseconds. The exposure light had an output wavelength of 680 nanometers (nm) and the erase light had an output wavelength of 550 nm. The test samples were first rested in the dark for at least 60 minutes to ensure achievement of equilibrium with the testing conditions at 50 percent relative humidity and 72° F. Each sample was then negatively charged in the dark to a potential of about 500 volts. The test procedure was repeated to determine the photo induced discharge characteristic (PIDC) of each sample by different light energies of up to 40 ergs/cm2. FIG. 4 provides a graph showing PIDC characteristics of a photoreceptor prepared in accordance with an embodiment of the present invention as described in the above example. The PIDC in FIG. 4 illustrate a very good photo-induced discharge performance. Other electrical properties are shown in Table 1. TABLE 1 Dark V(0) V(2.6) V(4.26) V(13) Dv/dx Verase decay Q/A PIDC (volt) (volt) (volt) (volt) (volt * cm2/erg.) (volt) (volt) (nC/cm{circumflex over ( )}2) Example 2 500 160 42 8 −164 5 9 65 Comparative 496 166 100 59 −184 46 13 56 Example 3 With reference to the abbreviations employed in Table 1: V(0) (PIDC) is the dark voltage after scorotron charging Q/A PIDC is the current density to charge the devices to the V(0) values Dark Decay is 0.2s Duration Decay voltage V(2.6) is average voltage after exposure to 2.6 erg/cm2 V(4.26) is average voltage after exposure to 4.26 erg/cm2 V(13) is average voltage after exposure to 13 erg/cm2 dV/dX is the initial slope of the PIDC Verase is average voltage after erase exposure The results achieved with the example prepared in accordance with the invention are superior to that of the Control as shown in the comparison in Table 1. The example in accordance with the invention exhibited excellent charging characteristics with low residual potential and low dark decay. While the invention has been described by reference to certain preferred embodiments, it should be understood that numerous changes could be made within the spirit and scope of the inventive concepts described. Accordingly, it is intended that the invention not be limited to the disclosed embodiments, but that it have the full scope permitted by the language of the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>Electrophotographic imaging members, i.e., photoreceptors, typically include a photoconductive layer formed on an electrically conductive substrate. The photoconductive layer is an insulator in the dark so that electric charges are retained on its surface. Upon exposure to light, the charge is dissipated. A latent image is formed on the photoreceptor by first uniformly depositing electric charges over the surface of the photoconductive layer by one of any suitable means known in the art. The photoconductive layer functions as a charge storage capacitor with charge on its free surface and an equal charge of opposite polarity (the counter charge) on the conductive substrate. A light image is then projected onto the photoconductive layer. On those portions of the photoconductive layer that are exposed to light, the electric charge is conducted through the layer reducing the surface charge. The portions of the surface of the photoconductor not exposed to light retain their surface charge. The quantity of electric charge at any particular area of the photoconductive surface is inversely related to the illumination incident thereon, thus forming an electrostatic latent image. The photo-induced discharge of the photoconductive layer requires that the layer photogenerate conductive charge and transport this charge through the layer thereby neutralizing the charge on the surface. Two types of photoreceptor structures have been employed: multilayer structures wherein separate layers perform the functions of charge generation and charge transport, respectively, and single layer structures in which photoconductors perform both functions. These layers are formed on an electrically conductive substrate and may include an optional charge blocking layer and an adhesive layer between the conductive substrate and the photoconductive layer or layers. Additionally, the substrate may comprise a non-conducting mechanical support with a conductive surface. Other layers for providing special functions such as incoherent reflection of laser light, dot patterns for pictorial imaging, or subbing layers to provide chemical sealing and/or a smooth coating surface may also be employed. One common type of photoreceptor is a multi-layered photoreceptor having a structure comprising an electrically conductive substrate, an undercoat layer formed on the substrate, a charge generating layer applied on the undercoat layer, and a charge transport layer formed on the charge generating layer. The phrases “charge blocking layer” and “blocking layer” are generally used interchangeably with the phrase “undercoat layer.” U.S. Pat. No. 5,314,776 to Nomura, Fukuda, Nagasaki, and Suda entitled “Multi-layered Photoreceptor for Electrophotography” describes a process for manufacturing a photoreceptor comprising a substrate which comprises an electroconductive support or a support having an electroconductive film formed thereon; an undercoat layer including a material selected from the group consisting of silicon dioxide and other silicon oxides formed on the substrate; a carrier generation layer formed on the undercoat layer; and a carrier transport layer formed on the charge generation layer. U.S. Pat. No. 6,479,202 to Shida, Uchino, and Itami entitled “Electrophotographic Photoreceptor, Electrophotographic Image Forming Method, Electrophotograhic Image Forming Apparatus and Processing Cartridge” describes an electrophotographic photoreceptor having on a support a resin layer comprising a siloxane resin formed by hardening a compound represented by Formula 1, 2 or 3, or a hydrolyzed product which has a structural unit having a charge transportation ability, wherein a ratio M1/M2 of the sum of the amount of moles M1 of the compound represented by Formula 1 and that represented by Formula 2 to the amount in moles of the compound represented by Formula 3 is within the range of from 0.01 to 1; in-line-formulae description="In-line Formulae" end="lead"? Si(OR 1′ ) 4 Formula 1 in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? R 1 Si(OR 2′ ) 3 Formula 2 in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? R 1 R 2 Si(OR 3′ ) 2 Formula 3 in-line-formulae description="In-line Formulae" end="tail"? wherein the formulas R 1 and R 2 each represent an alkyl group having one to ten carbon atoms, a phenyl group, an aryl group, a vinyl group, an amino group, a γ-glycidoxypropyl group, a γ-methacryloxypropyl group, or a C n F 2n+1 C 2 H 4 — group, R 1′ , R 2′ , and R 3′ each representing an alkyl group and the groups represented by R 1′ , R 2′ , and R 3′ may be the same or different from each other. U.S. Pat. No. 6,361,913 to Pai and Yanus entitled “Long Life Photoreceptor” describes an electrophotographic imaging member comprising a substrate, a charge generating layer, a charge transport layer, and an overcoat layer comprising a hydroxytriphenyl methane having at least one hydroxy functional group and a polyamide film forming binder capable of forming hydrogen bonds with the hydroxy functional group of the hydroxy triphenyl methane molecule, the charge transport layer being substantially free of triphenyl methane molecules. An undercoat layer may be provided to cover up substrate defects, to improve print quality (such as to reduce or eliminate imagewise constructive interference effects known as “plywood effect”), to ensure environmental insensitivity, and/or to enable good electrical properties, e.g., block holes, transport electrons, enable cyclic stability, provide low surface potential residue of photo-induced discharge (Vr) and dark decay (Vdd), and improve coating uniformity. For electrophotographic imaging systems which utilize uniform negative polarity charging prior to imagewise exposure, it is important that the undercoat charge blocking layer bleeds off negative charge while preventing positive charge leakage. In this case, the undercoat layer which is thick enough to cover up the roughened surface of the substrate is desired. Further, undercoat layers that are too thin are more susceptible to the formation of pinholes which allow both negative and positive charges to leak through the charge blocking and result in print defects. Also, when charge blocking undercoat layers are too thin, small amounts of contaminants can adversely affect the performance of the charge blocking undercoat layer and cause print defects due to passage of both negative and positive charges through the layer. Defects in the hole blocking layer, which allow both negative and positive charges to leak through, lead to the development of charge deficient spots associated with copy print-out defects. Generally, undercoat layer formulations can be classified as dispersed undercoat layer solutions or homogeneous undercoat layer solutions. Dispersed undercoat layers comprise non-soluble particles in binders and solvents. Homogenous undercoat layers comprise charge conductive species soluble in binders and solvents. A known method for preparing dispersed undercoat layer solutions comprises mixing metal oxides with polymeric binders in an organic solvent. The metal oxides may comprise, for example, titanium oxide, zinc oxide, zirconium oxide, tin oxide and aluminum oxide, among others. A wide variety of polymeric resin binders have been employed for this purpose, such as, for example, polyimides, polyamides, polyacrylates, vinyl polymers and other specialty materials. The dispersion procedure is very time-consuming. In order to achieve good electrical properties, the metal oxide particles in the solution must be nanometer grade in size. Problematically, in the standing dispersed solution, the metal oxide tends to precipitate, causing macro-phase separation which results in non-uniform coatings. The process for preparing homogeneous undercoat layers is generally more convenient than that for preparing dispersed undercoat layers. Generally, the process for preparing homogeneous undercoat layers comprises mixing the forgoing materials in the suitable solvents and applying the mixture to an electrically conductive substrate using suitable coating methods as known in the art. As an example, a three-component undercoat layer is described in U.S. Pat. No. 5,789,127 to Yamaguchi and Sakaguchi entitled “Electrophotographic Photoreceptor” (Fuji-Xerox). The three-component undercoat layer described therein requires moisture during curing. For most dispersed undercoat layer formulations, such as, for example, that described in U.S. Pat. No. 5,612,157 to Yuh and Chambers entitled “Charge Blocking Layer for Electrophotographic Imaging Member,” the range of suitable materials is somewhat limited. Many polymeric materials have the particle size, density, and dispersion stability in the proper range, but they have refractive index values that are too close to the binder resin used in the charge blocking layer. Light scattering particles having a refractive index similar to the binder refractive index may produce light scattering insufficient to eliminate the plywood effect in the resulting prints. Selecting inorganic particles such as metal oxides, which typically have a higher refractive index than polymeric materials, to be the light scattering particles is problematic because inorganic particles such as metal oxides generally have higher densities than polymeric materials and thus can create a particle settling problem that adversely affects the uniformity of the blocking layer and the quality of the resulting prints. Also, since the electrical properties tend to deteriorate when the undercoat layer is provided at a thickness of greater than about 6 micrometers, there is a thickness limitation of about 6 micrometers. “Plywood effect” is a problem inherent in layered photoreceptors and so termed because when the spatial exposure variation in an image formed on a photoreceptor appears in the output print it looks like a pattern of light and dark interference fringes resembling the grains on a sheet of plywood. The issue of plywood effect has been addressed in the prior art by increasing the thickness of, and hence the absorption of light by, the charge generating layer. For most systems, this leads to unacceptable tradeoffs. For example, for a layered organic photoreceptor, an increase in dark decay characteristics and electrical instability may occur. U.S. Pat. No. 4,618,552 to Tanaka, Sumino, and Toma entitled “Light Receiving Member for Electrophotography Having Roughened Intermediate Layer” describes a method for compensating for plywood effect by using a photoconductive imaging member in which the ground plane, or an opaque conductive layer formed above or below the ground plane, is formed with a rough surface morphology to diffusively reflect the light. Another method for compensating for plywood effect is described in U.S. Pat. No. 5,052,328 to Andrews and Simpson entitled “Photosensitive Imaging Member with a Low-Reflection Ground Plane.” U.S. Pat. No. 5,052,328 describes a ground plane of low reflection material so as to reduce the reflections therefrom. U.S. Pat. No. 5,089,908 to Jodoin, Loce, Lama, Rees, Ibrahim, and Appel entitled “Plywood Suppression in ROS Systems” describes a multiple diode laser array used in a raster output scanning (ROS) system modified to reduce the effects of undesirable spatial exposure variation at the surface of certain types of layered, semi-transparent photoreceptors. The spatial absorption variation is later manifested as a plywood pattern formed on output prints derived from the exposed photoreceptor. The laser array is modified to form a merged scanning beam at the photoreceptor surface of two or more diode outputs, each output operating at a different wavelength than the other. In one embodiment, a plurality of diodes, each at a different wavelength, are sequentially addressed, and an image of each diode is scanned across the photoreceptor which results in an exposure distribution that would be similar to that formed by an incoherent beam. The disclosures of the foregoing are hereby incorporated by reference herein in their entireties. There is still a need in the art for improved photoreceptors that overcome or alleviate the above-mentioned and other problems and for an improved method for preparing such photoreceptors.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention comprises an imaging member comprising: an electroconductive support containing an electroconductive layer thereon; thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and a charge generating layer and a charge transport layer. A process for preparing an imaging member comprising: providing an electroconductive support having an electroconductive layer thereon; forming thereover a first layer comprising a metal alkyloxide, an amino siloxane, and a color change material dispersed in a binder; wherein the color change material is a material that reversibly changes color in the presence of a Lewis base and which color change is reversible upon exposure to light; and forming thereover a charge generating layer and a charge transport layer. Important features of the present invention in embodiments include a first layer (also referred to herein as “undercoat layer”) that can be thick, has a pH and light sensitive color change characteristic, and uses an ammonium titanate complex formed from the combination in the undercoat layer of the metal alkyl oxide and the amino siloxane. The present thick undercoat layer for xerographic photoreceptors can be coated at a thickness of up to about 20 microns. This permits rough substrates to be coated and prevents penetration of carbon fibers through the active layers to the substrate. The undercoat layer also provides improved hole blocking. Another important feature is the employment of the color change material that reversibly changes color as a function of pH and which color change is reversible upon exposure to light. Exemplary color change materials suitable for use in the present invention, include, but are not limited to, for example, phenolphthalein, phenolsulfonephthalein, thymolphthalein, and the like. In operation, the color change material turns color (e.g., red for phenolphthalein, blue for thymolphthalein, orange for phenolsulfonephthalein) in the presence of a Lewis base. The color changed undercoat layer absorbs light exposure energy and prevents reflection from the substrate and thus prevents plywood defects. Imaging members prepared with the present undercoat layer provide good and stable electrical properties superior to those of previously available photoreceptors such as those prepared with dispersed titanium dioxide in a phenolic resin undercoat layer. Advantages of the invention include allowing use of a thick undercoat layer that does not employ dispersed nanoparticles and therefore is insensitive to substrate defects and can be coated on a rough surface of the photoreceptor drum. The invention provides an inexpensive solution for maintaining good electrical properties, effects plywood suppression, provides a stable coating solution, improves hole blocking, cyclic stability, low residual voltage and dark decay. The undercoat layer also provides a solution to the problem of carbon fiber penetration, which is a big problem in currently available thin undercoat layers. The process for preparing the imaging member is advantageously simple. Additionally, the imaging member prepared with the undercoat layer has a lifetime of more than 1.5 million cycles. These and other features and advantages of the invention will be more fully understood from the following description of certain specific embodiments of the invention taken together with the accompanying drawings.
20040315
20061024
20050915
75028.0
0
GOODROW, JOHN L
REVERSIBLY COLOR CHANGING UNDERCOAT LAYER FOR ELECTROPHOTOGRAPHIC PHOTORECEPTORS
UNDISCOUNTED
0
ACCEPTED
2,004
10,800,959
ACCEPTED
Method of manufacturing a sealed electronic module
A sealed electronic module is manufactured by forming a housing that is open at one end, dispensing a first quantity of potting material into the housing via the open end, inserting a circuit board and electrical connector assembly into the housing so that the inboard end of the circuit board is immersed in the potting material, and dispensing a second quantity of potting material into an area bridging the connector assembly and the housing. When cured, the first quantity of potting material attaches the inboard end of the circuit board to the housing, and the second quantity of potting material attaches the connector to the housing and environmentally seals the module.
1. A method of manufacturing a sealed module that houses a circuit board supporting one more electronic components, the method comprising the steps of: mechanically and electrically attaching an electrical connector to a first end of the circuit board; providing a housing open at only one end, said housing having an inner periphery shaped to accommodate said circuit board and said electrical connector; orienting said housing with said one end facing upward, and dispensing a first quantity of potting material into said housing through said one end; inserting said circuit board and attached electrical connector into the one end of said housing such that only a marginal portion of said circuit board including a second end of said circuit board opposite said first end is immersed into said first quantity of potting material; sealing said electrical connector to the inner periphery of said housing; and curing said first quantity of potting material to secure said circuit board to the inner periphery of said housing. 2. The method of claim 1, where said marginal portion of said circuit board is free of said electronic components so that said first quantity of potting material does not come into contact with said components. 3. The method of claim 1, including the steps of: dispensing a second quantity of potting material onto an outboard surface of said connector; and curing said second quantity of potting material to seal said electrical connector to the inner periphery of said housing. 4. The method of claim 3, including the steps of: providing a base plate on said electrical connector that conforms to the inner periphery of said housing so as to create a pocket defined by said base plate and the inner periphery of said housing when said circuit board and attached electrical connector are inserted into the one end of said housing; and dispensing said second quantity of potting material into said pocket.
TECHNICAL FIELD The present invention relates to the manufacture of a sealed electronic module including a circuit board/connector assembly and a housing open at one end. BACKGROUND OF THE INVENTION In the manufacture of electronic modules, various electronic components are mounted on a printed circuit board, connector terminals are soldered to a marginal portion of the circuit board, and the assembly is packaged in a plastic or metal housing. Usually, some provision is made for affixing the circuit board to the inner periphery of the housing, and the housing closes around the circuit board, with the connector pins protruding through the housing to enable electrical signal transmission to and from the module. In applications where the module has to be environmentally sealed, it is desirable to minimize the length and number of sealing surfaces. Theoretically, the sealing surfaces can be minimized by forming the housing as a single part with one opening through which the circuit board/connector assembly is inserted, but such an approach makes it difficult to attach the circuit board to the inner periphery of the housing since the interior of the housing is inaccessible after insertion of the circuit board/connector assembly. Alternatively, the entire housing may be filled with a potting material such as epoxy, but that is undesirable for several reasons, including cost, weight and the inadvisability of coating certain electronic components with potting material. Accordingly, what is needed is an improved method of manufacturing a sealed electronic module where the enclosed circuit board is securely attached to the inner periphery of the housing. SUMMARY OF THE INVENTION The present invention is directed to the manufacture of an electronic module including a circuit board/connector assembly and a housing that is open at one end, where potting material is used to mechanically secure the circuit board to the housing and to provide an environmental seal at the open end of the housing. The empty housing is positioned so that its open end is facing upward, and a first quantity of potting material is dispensed into the housing. The circuit board/connector assembly is then inserted into the housing, immersing the inboard end of the circuit board into the potting material. The connector includes a cover that conforms to the inner periphery of the housing, forming an annular pocket at the open end of the housing, and a second quantity of potting material is then dispensed into the annular pocket. When cured, the first quantity of potting material attaches the inboard end of the circuit board to the inner periphery of the housing, and the second quantity of potting material attaches the connector to the housing and environmentally seals the module. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will now be described, by way of example, with reference to the accompanying drawings, in which:— FIGS. 1A-1D illustrate the manufacturing method of this invention. FIG. 1A depicts a circuit board/connector assembly, FIG. 1B depicts a step of dispensing a first quantity of potting material into the open end of a housing; FIG. 1C depicts insertion of the circuit board/connector assembly of FIG. 1A into the housing of FIG. 1B; and FIG. 1D depicts a step of dispensing a second quantity of potting material into a pocket formed at the open end of the housing. FIG. 2 is a cross-sectional view of an electronic module manufactured according to this invention. DESCRIPTION OF THE PREFERRED EMBODIMENT The manufacturing method of the present invention is disclosed in the context of an automotive electronic module such as a Sensing and Diagnostic Module (SDM) for deploying supplemental restraints in a severe crash event. In such an application, the enclosed circuit components 14 include acceleration-responsive sensors, and the circuit board 12 has to be securely attached to the inner periphery of the housing 18 to ensure that the sensors operate correctly. Of course, similar requirements occur in other applications as well, and the manufacturing method applies to sealed electronic modules per se, whether automotive or non-automotive. Referring to FIG. 1A, the reference numeral 10 generally designates a circuit board/connector assembly, including a printed circuit board 12 supporting a number of electronic components 14, and a connector assembly 16. The connector assembly 16 is attached to the outboard end of the circuit board 12, and the components 14 may be distributed on the circuit board 12 in any convenient manner, except for a marginal portion 12a that includes the inboard end 12b of circuit board 12. The connector assembly 16 includes a plastic base plate 16a, a plastic header box 16b, and a number of metal connector pins 16c passing through the base plate 16a. The connector assembly 16 is preferably manufactured by an insert molding process so that the material of base plate 16a seals around the connector pins 16c. The leftward extending (outboard) ends of the pins 16c are disposed within the header box 16b (as seen in the cross-sectional view of FIG. 2) for attachment to a complementary electrical connector (not shown); and the rightward extending (inboard) ends of the pins 16c are bent toward the circuit board 12 for attachment thereto. Typically, the pins 16c extend through plated openings formed in the circuit board 12, and are soldered in place to both electrically and mechanically connect the circuit board 12 to the connector assembly 16. In FIGS. 1B, 1C and 1D, the reference numeral 18 generally designates a housing for enclosing the circuit board/connector assembly 10. The housing 18 is preferably formed of plastic, and includes integral mounting tabs 18a for securing the completed electronic module to a support structure such as a vehicle frame element. The housing 18 is closed on all sides and one end, and is oriented so that the open end 18b is pointed upward as shown. The housing 18 is dimensioned so as to freely receive the circuit board/connector assembly 10 of FIG. 1A, with the inner periphery of the housing generally conforming to the circumferential periphery of the connector assembly base plate 16a. As shown in FIG. 1B, a dispensing nozzle 22 is positioned over the open end 18b of housing 18, and first quantity of potting material 20 is dispensed into bottom of housing 18. The potting material 20 fills the interior volume of housing 18 to a level such as shown by the broken line 24. The circuit board/connector assembly 10 is then inserted into the housing 18 as illustrated in FIG. 1C before the potting material 20 cures and hardens, immersing the marginal portion 12a of circuit board 12 into the potting material 20. This may be best seen in FIG. 2, which depicts a completed electronic module 26. As also shown in FIG. 2, the portion of the circuit board 12 on which the components 14 are mounted is not immersed in the potting material 20; this is important as it is inadvisable to coat certain electronic components with potting material. When the circuit board/connector assembly 10 has been fully inserted into the housing 18, there is an annular pocket or cavity 28 through which the connector assembly header box 16b extends. Referring to FIGS. 1D and 2, the cavity 28 is defined by the connector assembly base plate 16a and header box 16b and the inner periphery of the housing 18 above the base plate 16a. At this point, the dispensing nozzle 22 is positioned over the cavity 28 as illustrated in FIG. 1D, and a second quantity of potting material 30 is dispensed into the cavity 28, preferably filling the cavity volume as depicted in FIG. 2. The last step of the process is to allow undisturbed curing of the first and second quantities of potting material 20, 30 so that the potting material hardens substantially where dispensed. Referring to FIG. 2, the first quantity of potting material 20 then effectively attaches the marginal portion 12a of the circuit board 12 to the inner periphery 18c of the housing 18, and the second quantity of potting material 30 forms a seal between the connector assembly 16 and the inner periphery 18c of the housing 18, environmentally sealing the module 26. The potting material 20 may be of the same formulation as the potting material 30, or a different formulation if desired. In any case, the potting material 20, 30 may be any commercially available potting (epoxy, for example) that has an initial free-flowing state, and that chemically cures to a hardened state. In summary, the manufacturing method of the present invention results in a reliably sealed electronic module 26 where potting material is used both to seal the housing 18 and to secure an enclosed circuit board 12 to the inner periphery 18c of housing 18. Only a small overall amount of potting material is required, which contributes to low cost and low weight of the module 26. Also, the potting material 20 only comes into contact with the marginal portion 12a of the circuit board 12, and does not come into contact with the electrical components 14 mounted elsewhere on the circuit board 12. While the method of the present invention has been described in reference to the illustrated embodiment, it will be recognized that various modifications will occur to those skilled in the art. For example, the housing 18 may have a shape other than rectangular, and so on. Accordingly, it will be understood that manufacturing methods incorporating these and other modifications may fall within the scope of this invention, which is defined by the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>In the manufacture of electronic modules, various electronic components are mounted on a printed circuit board, connector terminals are soldered to a marginal portion of the circuit board, and the assembly is packaged in a plastic or metal housing. Usually, some provision is made for affixing the circuit board to the inner periphery of the housing, and the housing closes around the circuit board, with the connector pins protruding through the housing to enable electrical signal transmission to and from the module. In applications where the module has to be environmentally sealed, it is desirable to minimize the length and number of sealing surfaces. Theoretically, the sealing surfaces can be minimized by forming the housing as a single part with one opening through which the circuit board/connector assembly is inserted, but such an approach makes it difficult to attach the circuit board to the inner periphery of the housing since the interior of the housing is inaccessible after insertion of the circuit board/connector assembly. Alternatively, the entire housing may be filled with a potting material such as epoxy, but that is undesirable for several reasons, including cost, weight and the inadvisability of coating certain electronic components with potting material. Accordingly, what is needed is an improved method of manufacturing a sealed electronic module where the enclosed circuit board is securely attached to the inner periphery of the housing.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention is directed to the manufacture of an electronic module including a circuit board/connector assembly and a housing that is open at one end, where potting material is used to mechanically secure the circuit board to the housing and to provide an environmental seal at the open end of the housing. The empty housing is positioned so that its open end is facing upward, and a first quantity of potting material is dispensed into the housing. The circuit board/connector assembly is then inserted into the housing, immersing the inboard end of the circuit board into the potting material. The connector includes a cover that conforms to the inner periphery of the housing, forming an annular pocket at the open end of the housing, and a second quantity of potting material is then dispensed into the annular pocket. When cured, the first quantity of potting material attaches the inboard end of the circuit board to the inner periphery of the housing, and the second quantity of potting material attaches the connector to the housing and environmentally seals the module.
20040315
20061010
20050915
60643.0
1
FISCHER, JUSTIN R
METHOD OF MANUFACTURING A SEALED ELECTRONIC MODULE
UNDISCOUNTED
0
ACCEPTED
2,004
10,801,292
ACCEPTED
Methods for identification, assessment, prevention, and therapy of cancer
The present invention relates to the newly identified cancer therapeutic targets and biomarkers. These targets/biomarkers are overexpressed in carcinomas generally, and more specifically to adenocarcinoma and squamous cell carcinoma. The invention provides methods of diagnosis, characterization, and therapy of carcinoma based on the degree of overexpression of the targets/biomarkers.
1. A method of assessing whether a patient is afflicted with carcinoma, the method comprising a) determining the amount of a marker in a patient sample, wherein the marker is selected from Table 1; b) determining the normal amount of the marker in a control non-cancerous sample; and c) comparing the amounts of the marker between the patient sample and the control non cancerous sample, wherein a significant increase in the amount of the marker in the patient sample from the normal level is an indication that the patient is afflicted with carcinoma. 2. The method of claim 1, wherein the carcinoma is selected from the group consisting of colon cancer, breast cancer, lung cancer, ovarian cancer, cervical cancer and prostate cancer. 3. The method of claim 2, wherein the carcinoma is ovarian cancer. 4. The method of claim 1 wherein the amount of the marker is determined in the patient sample and the non cancerous sample by hybridizing a polynucleotide expressed by the marker with an oligonucleotide or polynucleotide that is complementary to the polynucleotide expressed by the marker. 5. The method of claim 1 wherein the determination of the amount of the marker comprises performing a polymerase chain reaction. 6. The method of claim 1 wherein the determination of the amount of the marker comprises performing quantitative real-time reverse transcription-polymerase chain reaction. 7. The method of claim 1 wherein the determination of the amount of the marker comprises the use of a microarray. 8. The method of claim 1 wherein the amount of the marker is determined by binding a polypeptide expressed by the marker with an antibody. 9. The method of claim 8 wherein the antibody is derived from one of full length protein of Table 1 and protein fragment of the protein of Table 1. 10. The method of claim 1 wherein the comparison of the amount of the marker in the patient sample and the control non cancerous sample is used to assess the efficacy of a therapy for inhibiting carcinoma in the patient. 11. The method of claim 10 wherein the carcinoma is ovarian cancer. 12. The method of claim 1 wherein the comparison of the amount of the marker in the patient sample and the control non-cancerous sample is used to assess the progression of carcinoma in the patient. 13. The method of claim 12 wherein the carcinoma is ovarian cancer. 14. The method of claim 1 wherein the comparison of the amount of the marker in the patient sample and the control non-cancerous sample is used to assess whether the carcinoma has metastasized. 15. The method of claim 14 wherein the carcinoma is ovarian cancer. 16. A method for determining, in vitro, the effectiveness of a therapeutic agent for treatment of carcinoma, the method comprising the steps of: (a) providing viable malignant cells from a tissue biopsy; (b) determining the amount in the malignant cells of the marker selected from Table 1; (c) introducing the malignant cells to the therapeutic agent; and (d) determining the amount of the marker in the malignant cells after step (c); and (e) comparing the amount of the marker in the malignant cells with the amount of the marker in the malignant cells after step (c), wherein a significant decrease in the level of expression by the treated malignant cells is an indication of the effectiveness of the therapeutic agent for treating the carcinoma. 17. The method of claim 16 wherein the carcinoma is ovarian cancer. 18. The method of claim 16, wherein the therapeutic agent is selected from the group consisting of a chemical compound, antisense DNA, siRNA, protein, peptide, and antibody. 19. A method for determining, in vitro and in vivo, the carcinogenic potential of a product, comprising: (a) determining the amount of the marker selected from Table 1 in non-cancerous cells; (b) introducing non-cancerous cells to the product; (c) determining the amount of the marker in the cells after step (b); and (c) comparing the amount of the marker in the cells before and after introducing the cells to the product, wherein a significant increase in the level of expression by the cells in the presence of the product is an indication of the carcinogenic potential of the product. 20. The method of claim 19 wherein the carcinoma is ovarian cancer.
FIELD OF THE INVENTION The field of the invention is cancer, including diagnosis, characterization, and therapy of carcinoma. BACKGROUND OF THE INVENTION The increased number of cancer cases reported in the United States, and, indeed, around the world, is a major concern. Currently there are only a handful of treatments available for specific types of cancer, and these provide no absolute guarantee of success. Among them, ovarian cancer is the fifth most common cancer (other than skin cancer) in women. It ranks fifth as the cause of cancer death in women. The American Cancer Society estimates that there will be about 25,580 new cases of ovarian cancer in this country in 2004. About 16,090 women will die of the disease. Despite advances in the chemotherapy, surgery and supportive care, death rates for this disease have remained constant for nearly two decades (National Cancer Institute. SEER Cancer. Statistics Review 1973-1997, 2001). New diagnostic methods and therapies are thus needed. SUMMARY OF THE INVENTION The invention relates to the newly identified cancer therapeutic targets (hereinafter “targets” or “targets of the invention”), which are listed in Table 1. These targets are overexpressed in carcinomas generally, and more specifically to adenocarcinoma and squamous cell carcinoma, including colon, breast, lung, ovary, cervix, and prostate cancers. Table 1 provides the sequence identifiers of the sequences of such marker nucleic acids and proteins listed in the accompanying Sequence Listing. The invention also relates to the cancer markers (hereinafter “markers” or “markers of the invention”), which are listed in Tables 1. These markers are overexpressed in carcinomas generally, and more specifically to adenocarcinoma and squamous cell carcinoma, including colon, breast, lung, ovary, cervix, and prostate cancers. The invention provides nucleic acids and proteins that are encoded by or correspond to the markers (hereinafter “marker nucleic acids” and “marker proteins”, respectively). Tables 1 provide the sequence identifiers of the sequences of such marker nucleic acids and proteins listed in the accompanying Sequence Listing. The invention also relates to various methods, reagents and kits for diagnosing, staging, prognosing, monitoring and treating carcinoma, including ovarian cancer. In one embodiment, the invention provides a diagnostic method of assessing whether a patient has carcinoma or has higher than normal risk for developing carcinoma, comprising the steps of comparing the level of expression of a marker of the invention in a patient sample and the normal level of expression of the marker in a control, e.g., a sample from a patient without carcinoma. A significantly higher level of expression of the marker in the patient sample as compared to the normal level is an indication that the patient is afflicted with carcinoma or has higher than normal risk for developing carcinoma. In a preferred diagnostic method of assessing whether a patient is afflicted with carcinoma (e.g., new detection (“screening”), detection of recurrence, reflex testing), the method comprises comparing: a) the level of expression of a marker of the invention in a patient sample, and b) the normal level of expression of the marker in a control non-cancerous sample. A significantly higher level of expression of the marker in the patient sample as compared to the normal level is an indication that the patient is afflicted with carcinoma. The invention also provides diagnostic methods for assessing the efficacy of a therapy for inhibiting carcinoma in a patient. Such methods comprise comparing: a) expression of a marker of the invention in a first sample obtained from the patient prior to providing at least a portion of the therapy to the patient, and b) expression of the marker in a second sample obtained from the patient following provision of the portion of the therapy. A significantly lower level of expression of the marker in the second sample relative to that in the first sample is an indication that the therapy is efficacious for inhibiting carcinoma in the patient. It will be appreciated that in these methods the “therapy” may be any therapy for treating carcinoma including, but not limited to, chemotherapy, radiation therapy, surgical removal of tumor tissue, gene therapy and biologic therapy such as the administering of antibodies and chemokines. Thus, the methods of the invention may be used to evaluate a patient before, during and after therapy, for example, to evaluate the reduction in tumor burden. In a preferred embodiment, the diagnostic methods are directed to therapy using a chemical or biologic agent. These methods comprise comparing: a) expression of a marker of the invention in a first sample obtained from the patient and maintained in the presence of the chemical or biologic agent, and b) expression of the marker in a second sample obtained from the patient and maintained in the absence of the agent. A significantly lower level of expression of the marker in the second sample relative to that in the first sample is an indication that the agent is efficacious for inhibiting carcinoma, in the patient. In one embodiment, the first and second samples can be portions of a single sample obtained from the patient or portions of pooled samples obtained from the patient. The invention additionally provides a monitoring method for assessing the progression of carcinoma in a patient, the method comprising: a) detecting in a patient sample at a first time point, the expression of a marker of the invention; b) repeating step a) at a subsequent time point in time; and c) comparing the level of expression detected in steps a) and b), and therefrom monitoring the progression of the carcinoma in the patient. A significantly higher level of expression of the marker in the sample at the subsequent time point from that of the sample at the first time point is an indication that the carcinoma has progressed, whereas a significantly lower level of expression is an indication that the carcinoma has regressed. The invention further provides a diagnostic method for determining whether carcinoma has metastasized or is likely to metastasize in the future, the method comprising comparing: a) the level of expression of a marker of the invention in a patient sample, and b) the normal level (or non-metastatic level) of expression of the marker in a control sample. A significantly higher level of expression in the patient sample as compared to the normal level (or non-metastatic level) is an indication that the carcinoma has metastasized or is likely to metastasize in the future. The invention moreover provides a test method for selecting a composition for inhibiting carcinoma in a patient. This method comprises the steps of: a) obtaining a sample comprising cancer cells from the patient; b) separately maintaining aliquots of the sample in the presence of a plurality of test compositions; c) comparing expression of a marker of the invention in each of the aliquots; and d) selecting one of the test compositions which significantly reduces the level of expression of the marker in the aliquot containing that test composition, relative to the levels of expression of the marker in the presence of the other test compositions. The invention additionally provides a test method of assessing the carcinogenic potential of a product. This method comprises the steps of: a) maintaining separate aliquots of cells in the presence and absence of the product; and b) comparing expression of a marker of the invention in each of the aliquots. A significantly higher level of expression of the marker in the aliquot maintained in the presence of the product, relative to that of the aliquot maintained in the absence of the product, is an indication that the product possesses carcinogenic potential. An example of a known carcinogenic product that increases the risk of ovarian cancer is lysophosphatidic acid. In addition, the invention further provides a method of inhibiting carcinoma in a patient. This method comprises the steps of: a) obtaining a sample comprising cancer cells from the patient; b) separately maintaining aliquots of the sample in the presence of a plurality of compositions; c) comparing expression of a marker of the invention in each of the aliquots; and d) administering to the patient at least one of the compositions which significantly lowers the level of expression of the marker in the aliquot containing that composition, relative to the levels of expression of the marker in the presence of the other compositions. In the aforementioned methods, the samples or patient samples comprise cells obtained from the patient. The cells may be found in tumor biopsies. Definitions A “marker” is a gene whose altered level of expression in a tissue or cell from its expression level in normal or healthy tissue or cell is associated with a disease state, such as cancer. A “marker nucleic acid” is a nucleic acid (e.g.,—mRNA, siRNA, cDNA, oligonucleotides) encoded by or corresponding to a marker of the invention. Such marker nucleic acids include DNA (e.g., cDNA, oligonucleotides) comprising the entire or a partial sequence of any of the nucleic acid sequences set forth in the Sequence Listing or the complement of such a sequence. The marker nucleic acids also include RNA comprising the entire or a partial sequence of any of the nucleic acid sequences set forth in the Sequence Listing or the complement of such a sequence, wherein all thymidine residues are replaced with uridine residues. A “marker protein” is a protein encoded by or corresponding to a marker of the invention. A marker protein comprises the entire or a partial sequence of any of the sequences set forth in the Sequence Listing. The terms “protein” and “polypeptide” are used interchangeably. The “normal” level of expression or amount of a marker is the level of expression or amount of the marker in el cells of a human subject or patient not afflicted with carcinoma. An “over-expression” or “significantly higher level of expression” of a marker refers to an expression level in a test sample that is greater than the standard error of the assay employed to assess expression, and is preferably at least twice, and more preferably three, four, five or ten times the expression level of the marker in a control sample (e.g., sample from a healthy subjects not having the marker associated disease) and preferably, the average expression level of the marker in several control samples. A “significantly lower level of expression” of a marker refers to an expression level in a test sample that is at least twice, and more preferably three, four, five or ten times lower than the expression level of the marker in a control sample (e.g., sample from a healthy subject not having the marker associated disease) and preferably, the average expression level of the marker in several control samples. According to the invention, the level of expression or amount of a marker of the invention in a sample can be assessed, for example, by detecting the presence in the sample of: the corresponding marker protein (e.g., a protein having one of the sequences set forth as “SEQ ID NO (2, 4, 6 and 8)” in Table 1, or a fragment of the protein (e.g. by using a reagent, such as an antibody, an antibody derivative, an antibody fragment or single-chain antibody, which binds specifically with the protein or protein fragment). The corresponding marker nucleic acid (e.g. a nucleotide transcript having one of the nucleic acid sequences set forth as “SEQ ID NO 1, 3, 5 and 7” in Table 1, or a complement thereof, or a fragment of the nucleic acid, e.g. by contacting transcribed polynucleotides obtained from the sample with a substrate having affixed thereto one or more nucleic acids having the entire or a segment of the nucleic acid sequence of any of the SEQ ID NO 1, 3, 5 and 7, or a complement thereof, a metabolite which is produced directly (i.e., catalyzed) or indirectly by the corresponding marker protein. According to the invention, any of the aforementioned methods may be performed using a plurality (e.g. 2, 3, or more) of cancer markers, including epithelial or other cancer markers known in the art. In such methods, the level of expression in the sample of each of a plurality of markers, at least one of which is a marker of the invention, is compared with the normal level of expression of each of the plurality of markers in samples of the same type obtained from control humans not afflicted with carcinoma. A significantly altered (i.e., increased or decreased as specified in the above-described methods using a single marker) level of expression in the sample of one or more markers of the invention, or some combination thereof, relative to that marker's corresponding normal or control level, is an indication that the patient is afflicted with carcinoma. For all of the aforementioned methods, the marker(s) are preferably selected such that the positive predictive value of the method is at least about 10%. The methods of the invention have the following uses: (1) assessing whether a patient is afflicted with carcinoma; (2) assessing the presence of cancer cells; (3) making antibodies, antibody fragments or antibody derivatives that are useful for treating cancer and/or assessing whether a patient is afflicted with cancer; (4) making the DNA fragment including but not restricting the primers, antisense nucleotides, siRNA that are useful for treating cancer and/or assessing whether a patient is afflicted with cancer; (5) assessing the efficacy of one or more test compounds for inhibiting cancer in a patient; (6) assessing the efficacy of a therapy for inhibiting cancer in a patient; (7) monitoring the progression of cancer in a patient; (8) selecting a composition or therapy for inhibiting cancer in a patient; (9) treating a patient afflicted with cancer; (10) inhibiting cancer in a patient; (11) assessing the carcinogenic potential of a test compound; and (12) preventing the onset of cancer in a patient at risk for developing cancer. DETAILED DESCRIPTION OF THE INVENTION The invention relates to cancer markers associated with the cancerous state of ovarian cells. It has been discovered that the higher than normal level of expression of any of these markers or combination of these markers correlates with the presence of ovarian cancer. Methods are provided for detecting the presence of ovarian cancer in a sample, the absence of ovarian cancer in a sample, the stage of ovarian cancer, and other characteristics of ovarian cancer that are relevant to prevention, diagnosis, characterization, and therapy of ovarian cancer in a patient. The methods of the present invention may similarly apply to detecting the presence of other cancer in a sample, the absence of cancer in a sample, the stage of cancer, and other characteristics of cancer that are relevant to prevention, diagnosis, characterization, and therapy of cancer in a patient. It is a simple matter for the skilled artisan to determine whether a marker is overexpressed in ovarian cancer cells. For example, expression of a marker of the invention may be assessed by any of a wide variety of well known methods for detecting expression of a transcribed nucleic acid or protein. In a preferred embodiment, expression of marker is assessed using the Real-Time Quantitative RT-PCR. By preparing the ovary RNA from the patients with or without ovarian cancer, the Real-Time Quantitative RT-PCR will be performed through the following protocol using the marker specific primer pairs as listed in Table2 and the Sequence Listing. In brief, first-strand cDNA was synthesized at 50° C. for 60 min, followed by a 10-min denaturation at 95° C. using the proper RT-PCR enzyme kit. PCR reactions were then perfomed in the same tubes using the following conditions for 40 cycles: 95° C. for 30 s, 60° C. for 30 s, and 68° C. for 60 s. In another preferred embodiment, immunological methods also could be used to determine the overexpression of a marker of the invention. Using the antibody which specifically recognize the protein of the markers, the skilled artisan could detect the expression of the marker in tissue sample or protein extraction from the patients with or without ovarian cancer. The antibody is derived from the full length protein or short peptide. The level of expression of a marker in normal (i.e. non-cancerous) human ovarian tissue can be assessed in a variety of ways. In one embodiment, this normal level of expression is assessed by assessing the level of expression of the marker in a portion of ovarian cells which appears to be non-cancerous and by comparing this normal level of expression with the level of expression in a portion of the ovarian cells which is suspected of being cancerous. Alternately, and particularly as further information becomes available as a result of routine performance of the methods described herein, population-average values for normal expression of the markers of the invention may be used. In other embodiments, the ‘normal’ level of expression of a marker may be determined by assessing expression of the marker in a patient sample obtained from a non-cancer-afflicted patient, from a patient sample obtained from a patient before the suspected onset of ovarian cancer in the patient, from archived patient samples, and the like. To determine whether a target of the invention is a therapeutic target for ovarian cancer, the skilled artisan could inhibit the RNA expression of the targets then detect the survival rate of the ovarian cancer cells. The methods are described as follow. In brief, about 0.75˜2×104/cm2 ovarian cancer cells (such as TOV-112D cells) are incubated at 37° C. in wells containing growth medium (such as TOV-112D cells; 1:1 mixed medium of MCDB 105 {Sigma-Aldrich, MO, USA} and Medium 199 {Life Technologies, Inc., MD, USA} supplemented with 15% calf serum {Life Technologies, Inc., MD, USA}) under a 5% (v/v) CO2, 95% air atmosphere. The cells are then transfected using a standard transfection mixture comprising 200 nM of target specific siRNA (such as SEQ ID 17, SEQ ID 18) and 2 microliters of Oligofectamine™ (Invitrogen Corporation, CA, USA) per well. The cells are incubated in the transfection mixture for about 5 hours, and then replaced with fresh growth medium. After 48 hr, the cell survival rate was determined by adding MTT (Sigma-Aldrich, MO, USA) to the cell cultures at a final concentration of 1 mg/ml. And after 5 hr incubation at 37° C., the dark crystals formed were dissolved in DMSO and the cell viability was indicated by the amount of crystals which was obtained by measuring the absorbance of the solution at 570/630 nm. The lower survival rate in the target specific siRNA treated cells will be revealed by comparing the survival rate in the cells which treated with negative control siRNA. Materials and Methods: Cell Lines and Tissue Samples. The human ovarian papillary serous cystoadenocarcinoma cell line, OC 314, was obtained from the ICLC Animal Cell Lines Database (Servizio Biotecnologie IST, Centro di Biotecnologie, Avanzate L.go R. Benzi, 10, 16132 Genova, Italia). The cells were propagated in RPMI 1640 medium (Life Technologies, Inc., -MD, USA) supplemented with 5% calf serum (Life Technologies, Inc., MD, USA) and 2 mM L-glutamine (Sigma-Aldrich, MO, USA). The other human cell lines including TOV-112D (derived from ovarian endometrioid carcinoma), TOV-21G (derived from ovarian clear cell carcinoma), CC7T/VGH (derived from cervical carcinoma), H184B5H5/M10 (human mammary epithelial cell), T/G HA-VSMC (normal aorta smooth muscle cell) and HFL 1 (lung fibroblast) were obtained from Food Industry Research and Development Institute (331 Shih-Pin Road, Hsinchu, 300 Taiwan R.O.C.). TOV-112D and TOV-21G cells were propagated in the 1:1 mixed medium of MCDB 105 (Sigma-Aldrich, MO, USA) and Medium 199 (Life Technologies, Inc., MD, USA) supplemented with 15% calf serum (Life Technologies, Inc., MD, USA). CC7T/VGH cells were propagated in DMEM (Life Technologies, Inc., MD, USA) supplemented with 10% calf serum (Life Technologies, Inc., MD, USA). H184B5H5/M10 cells were propagated in GIBCO 11900 medium (Life Technologies, Inc., MD, USA) supplemented with 10% calf serum (Life Technologies, Inc.). T/G HA-VSMC cells were propagated in the Ham's F12K medium (HyClone Inc., Logan, Utah, USA) supplemented with 10% calf serum (Life Technologies, Inc., MD, USA), 0.05 mg/ml ascorbic acid (Life Technologies, Inc., MD, USA), 0.01 mg/ml insulin (Sigma-Aldrich, MO, USA), 0.01 mg/ml transferring (Sigma-Aldrich, MO, USA), 10 ng/ml sodium selentine (Sigma-Aldrich, MO, USA), and 0.03 mg/ml endothelial cell growth supplement (Sigma-Aldrich, MO, USA). HFL 1 cells were propagated in Ham's F12K medium (HyClone Inc., UT, USA) supplemented with 10% calf serum (Life Technologies, Inc., MD, USA). The total RNA of human normal ovary (Catalog number: CR0856) and human ovary tumor (Catalog number: 64011-1) were purchased from Clontech (CA, USA). Microarray: Two human oligo microarray chips (H04 and H05) were constructed from the oligolibrary of Human Release 1.0 (Compugen Inc., Tel Aviv, Israel) A total of 18861 oligo-probes were presented on these two arrays. 0.25 μg of total RNA of each sample is reversed transcribed into cDNA and further in vitro transcribed into cRNA and labeled with CyDye using Amino Allyl MessageAmp aRNA Kit (Ambion, Texas, USA) according to the manufacturer protocol. cRNA of sample normal ovary was labeled with Cy3 and acts as the reference sample. cRNA of sample ovary tumor was labeled with Cy5 and acts as the experimental sample. 1.5 μg of each labeled aRNA of reference and experimental sample was purified, combined, and mixed 2× hybridization buffer according to the manufacturer protocol before applied on the microarray. Hybridization was done in dark at 38.5° C. for 16 hours. Hybridization and washing conditions were followed according to the manufacturer protocol of CyScribe First-Strand cDNA Labeling Kit (Amersham Biosciences, England). Microarray image was scanned using GenePix® 4000B microarray scanner (Axon Instruments, Inc, CA, USA). Image was acquired and analyzed using GenePix® Pro 4.1 software (Axon Instruments, Inc, CA, USA). Image was quality checked and lowess normalized using GeneData Expressionist Refiner v3.0 software (GeneData AG, Basel, Switzerland). Quantitative real-time reverse transcription-polymerase chain reaction (RT-PCR) assays: Total RNA was extracted from each cell sample using TRI REAGENT (Molecular Research Center, Inc., Ohio, USA) according to the manufacturer protocol. Purified RNA was treated with RNase-free DNase I (Ambion, Texas, USA) to remove residual genomic DNA contamination following the manufacturer's protocol. cDNA synthesis and quantitative real-time RT-PCR was performed using the TITANIUM One-Step RT-PCR kit (Clontech, Palo Alto, Calif., USA) containing SYBR Green I (BioWhittaker Molecular Applications; BMA, Rockland, Me., USA). In brief, first-strand cDNA was synthesized at 50° C. for 60 min, followed by a 10-min denaturation at 95° C. PCR reactions were then perfomed in the same tubes using the following conditions for 40 cycles: 95° C. for 30 s, 60° C. for 30 s, and 68° C. for 60 s. The sequences of primers are listed in Table 2 and Sequence Listing. RT-PCRs were performed in triplicate for each RNA sample for both the gene of interest (target gene) and the reference gene (beta-actin). Real-time fluorescence monitoring and melting curve analysis were performed using Rotor-Gene 3000 (Corbett Research, Sydney, Australia). Negative controls containing no DNA template were included in each experiment. A melting curve was created at the end of PCR cycle to confirm that a single product was amplified. Data were analyzed by Rotor-Gene 3000 operating software version 4.6.94 (Corbett Research) to determine the threshold cycle (CT) above the background for each reaction. The relative transcript amount of the target gene, calculated using standard curves of serial RNA dilutions, was normalized to that of beta-actin of the same RNA. RNA interfering: siRNA oligonucleotides were designed for targeting the sequence of IRTKS (5′-AAGCACUGUGGCUUUGCAAAC-3′) and Solt (5′-AACACUCACCGAUUCAAAUGC-3′). The target sequence (AATTCTCCGAACGTGTCACGT) which has 16 base overlap with Thermotoga maritimia section 21 of 136 of the complete genome was used as a negative control siRNA. siRNAs were synthesized by the silencer™ siRNA Construction Kit (Ambion, Texas, USA) following the manufacturer's protocol. siRNA transfection were performed in 24-well plates using the Oligofectamine™ (Invitrogen Corporation, CA, USA), LipoFectamine™ 2000 (Invitrogen Corporation, CA, USA), or siPORT™ Amine (Ambion, Texas, USA), depending on the cell types. Cell viability assay: The cell viability was determined by adding MTT (Sigma-Aldrich, MO, USA) to the cell cultures at a final concentration of 1 mg/ml. After 5 hr incubation at 37° C., the dark crystals formed were dissolved in DMSO and the amount was obtained by measuring the absorbance of the solution at 570/630 nm. We found that the selected 4 genes were up-regulated in ovarian cancer tissue and cell lines (normal ovary and ovarian cancer RNA were purchased from BD Biosciences Clontech) using microarray and Quantitative real-time RT-PCR methods. These genes are listed in Table 1 and Sequence Listing. Moreover, using the ovarian cell lines as the cell model, we found that inhibiting the expression of IRTKS or Solt could decrease the growth of ovarian cancer cells based on our RNAi experiment. Since IRTKS is one of the insulin receptor tyrosine kinase substrate and Solt is transcription factor related protein, both of them should be involved in the signal transduction pathway of cell growth or development. Based on our finding, IRTKS and Solt are potential therapeutic targets for ovarian cancer. Thus, while there have shown and described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto. TABLE 1 SEQ ID NO SEQ ID NO (nucleotide (amino acid Gene Name sequence) sequence) CDS IRTKS: Insulin receptor 1 2 217 . . . 1752 tyrosine kinase substrate Solt: SoxLZ/Sox6-binding 3 4 265 . . . 1074 protein Solt Shax3: Snf7 homologue 5 6 179 . . . 880 associated with Alix 3 WBSCR21: Williams 7 8 63 . . . 368 Beuren syndrome chromosome region 21 TABLE 2 SEQ ID NO SEQ ID NO (nucleotide (nucleotide sequence) sequence) Gene Name Forward Primer Reverse Primer IRTKS: Insulin receptor tyrosine kinase 9 10 substrate Solt: SoxLZ/Sox6-binding protein Solt 11 12 Shax3: Snf7 homologue associated with 13 14 Alix 3 WBSCR21: Williams Beuren syndrome 15 16 chromosome region 21
<SOH> BACKGROUND OF THE INVENTION <EOH>The increased number of cancer cases reported in the United States, and, indeed, around the world, is a major concern. Currently there are only a handful of treatments available for specific types of cancer, and these provide no absolute guarantee of success. Among them, ovarian cancer is the fifth most common cancer (other than skin cancer) in women. It ranks fifth as the cause of cancer death in women. The American Cancer Society estimates that there will be about 25,580 new cases of ovarian cancer in this country in 2004. About 16,090 women will die of the disease. Despite advances in the chemotherapy, surgery and supportive care, death rates for this disease have remained constant for nearly two decades (National Cancer Institute. SEER Cancer. Statistics Review 1973-1997, 2001). New diagnostic methods and therapies are thus needed.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention relates to the newly identified cancer therapeutic targets (hereinafter “targets” or “targets of the invention”), which are listed in Table 1. These targets are overexpressed in carcinomas generally, and more specifically to adenocarcinoma and squamous cell carcinoma, including colon, breast, lung, ovary, cervix, and prostate cancers. Table 1 provides the sequence identifiers of the sequences of such marker nucleic acids and proteins listed in the accompanying Sequence Listing. The invention also relates to the cancer markers (hereinafter “markers” or “markers of the invention”), which are listed in Tables 1. These markers are overexpressed in carcinomas generally, and more specifically to adenocarcinoma and squamous cell carcinoma, including colon, breast, lung, ovary, cervix, and prostate cancers. The invention provides nucleic acids and proteins that are encoded by or correspond to the markers (hereinafter “marker nucleic acids” and “marker proteins”, respectively). Tables 1 provide the sequence identifiers of the sequences of such marker nucleic acids and proteins listed in the accompanying Sequence Listing. The invention also relates to various methods, reagents and kits for diagnosing, staging, prognosing, monitoring and treating carcinoma, including ovarian cancer. In one embodiment, the invention provides a diagnostic method of assessing whether a patient has carcinoma or has higher than normal risk for developing carcinoma, comprising the steps of comparing the level of expression of a marker of the invention in a patient sample and the normal level of expression of the marker in a control, e.g., a sample from a patient without carcinoma. A significantly higher level of expression of the marker in the patient sample as compared to the normal level is an indication that the patient is afflicted with carcinoma or has higher than normal risk for developing carcinoma. In a preferred diagnostic method of assessing whether a patient is afflicted with carcinoma (e.g., new detection (“screening”), detection of recurrence, reflex testing), the method comprises comparing: a) the level of expression of a marker of the invention in a patient sample, and b) the normal level of expression of the marker in a control non-cancerous sample. A significantly higher level of expression of the marker in the patient sample as compared to the normal level is an indication that the patient is afflicted with carcinoma. The invention also provides diagnostic methods for assessing the efficacy of a therapy for inhibiting carcinoma in a patient. Such methods comprise comparing: a) expression of a marker of the invention in a first sample obtained from the patient prior to providing at least a portion of the therapy to the patient, and b) expression of the marker in a second sample obtained from the patient following provision of the portion of the therapy. A significantly lower level of expression of the marker in the second sample relative to that in the first sample is an indication that the therapy is efficacious for inhibiting carcinoma in the patient. It will be appreciated that in these methods the “therapy” may be any therapy for treating carcinoma including, but not limited to, chemotherapy, radiation therapy, surgical removal of tumor tissue, gene therapy and biologic therapy such as the administering of antibodies and chemokines. Thus, the methods of the invention may be used to evaluate a patient before, during and after therapy, for example, to evaluate the reduction in tumor burden. In a preferred embodiment, the diagnostic methods are directed to therapy using a chemical or biologic agent. These methods comprise comparing: a) expression of a marker of the invention in a first sample obtained from the patient and maintained in the presence of the chemical or biologic agent, and b) expression of the marker in a second sample obtained from the patient and maintained in the absence of the agent. A significantly lower level of expression of the marker in the second sample relative to that in the first sample is an indication that the agent is efficacious for inhibiting carcinoma, in the patient. In one embodiment, the first and second samples can be portions of a single sample obtained from the patient or portions of pooled samples obtained from the patient. The invention additionally provides a monitoring method for assessing the progression of carcinoma in a patient, the method comprising: a) detecting in a patient sample at a first time point, the expression of a marker of the invention; b) repeating step a) at a subsequent time point in time; and c) comparing the level of expression detected in steps a) and b), and therefrom monitoring the progression of the carcinoma in the patient. A significantly higher level of expression of the marker in the sample at the subsequent time point from that of the sample at the first time point is an indication that the carcinoma has progressed, whereas a significantly lower level of expression is an indication that the carcinoma has regressed. The invention further provides a diagnostic method for determining whether carcinoma has metastasized or is likely to metastasize in the future, the method comprising comparing: a) the level of expression of a marker of the invention in a patient sample, and b) the normal level (or non-metastatic level) of expression of the marker in a control sample. A significantly higher level of expression in the patient sample as compared to the normal level (or non-metastatic level) is an indication that the carcinoma has metastasized or is likely to metastasize in the future. The invention moreover provides a test method for selecting a composition for inhibiting carcinoma in a patient. This method comprises the steps of: a) obtaining a sample comprising cancer cells from the patient; b) separately maintaining aliquots of the sample in the presence of a plurality of test compositions; c) comparing expression of a marker of the invention in each of the aliquots; and d) selecting one of the test compositions which significantly reduces the level of expression of the marker in the aliquot containing that test composition, relative to the levels of expression of the marker in the presence of the other test compositions. The invention additionally provides a test method of assessing the carcinogenic potential of a product. This method comprises the steps of: a) maintaining separate aliquots of cells in the presence and absence of the product; and b) comparing expression of a marker of the invention in each of the aliquots. A significantly higher level of expression of the marker in the aliquot maintained in the presence of the product, relative to that of the aliquot maintained in the absence of the product, is an indication that the product possesses carcinogenic potential. An example of a known carcinogenic product that increases the risk of ovarian cancer is lysophosphatidic acid. In addition, the invention further provides a method of inhibiting carcinoma in a patient. This method comprises the steps of: a) obtaining a sample comprising cancer cells from the patient; b) separately maintaining aliquots of the sample in the presence of a plurality of compositions; c) comparing expression of a marker of the invention in each of the aliquots; and d) administering to the patient at least one of the compositions which significantly lowers the level of expression of the marker in the aliquot containing that composition, relative to the levels of expression of the marker in the presence of the other compositions. In the aforementioned methods, the samples or patient samples comprise cells obtained from the patient. The cells may be found in tumor biopsies. Definitions A “marker” is a gene whose altered level of expression in a tissue or cell from its expression level in normal or healthy tissue or cell is associated with a disease state, such as cancer. A “marker nucleic acid” is a nucleic acid (e.g.,—mRNA, siRNA, cDNA, oligonucleotides) encoded by or corresponding to a marker of the invention. Such marker nucleic acids include DNA (e.g., cDNA, oligonucleotides) comprising the entire or a partial sequence of any of the nucleic acid sequences set forth in the Sequence Listing or the complement of such a sequence. The marker nucleic acids also include RNA comprising the entire or a partial sequence of any of the nucleic acid sequences set forth in the Sequence Listing or the complement of such a sequence, wherein all thymidine residues are replaced with uridine residues. A “marker protein” is a protein encoded by or corresponding to a marker of the invention. A marker protein comprises the entire or a partial sequence of any of the sequences set forth in the Sequence Listing. The terms “protein” and “polypeptide” are used interchangeably. The “normal” level of expression or amount of a marker is the level of expression or amount of the marker in el cells of a human subject or patient not afflicted with carcinoma. An “over-expression” or “significantly higher level of expression” of a marker refers to an expression level in a test sample that is greater than the standard error of the assay employed to assess expression, and is preferably at least twice, and more preferably three, four, five or ten times the expression level of the marker in a control sample (e.g., sample from a healthy subjects not having the marker associated disease) and preferably, the average expression level of the marker in several control samples. A “significantly lower level of expression” of a marker refers to an expression level in a test sample that is at least twice, and more preferably three, four, five or ten times lower than the expression level of the marker in a control sample (e.g., sample from a healthy subject not having the marker associated disease) and preferably, the average expression level of the marker in several control samples. According to the invention, the level of expression or amount of a marker of the invention in a sample can be assessed, for example, by detecting the presence in the sample of: the corresponding marker protein (e.g., a protein having one of the sequences set forth as “SEQ ID NO (2, 4, 6 and 8)” in Table 1, or a fragment of the protein (e.g. by using a reagent, such as an antibody, an antibody derivative, an antibody fragment or single-chain antibody, which binds specifically with the protein or protein fragment). The corresponding marker nucleic acid (e.g. a nucleotide transcript having one of the nucleic acid sequences set forth as “SEQ ID NO 1, 3, 5 and 7” in Table 1, or a complement thereof, or a fragment of the nucleic acid, e.g. by contacting transcribed polynucleotides obtained from the sample with a substrate having affixed thereto one or more nucleic acids having the entire or a segment of the nucleic acid sequence of any of the SEQ ID NO 1, 3, 5 and 7, or a complement thereof, a metabolite which is produced directly (i.e., catalyzed) or indirectly by the corresponding marker protein. According to the invention, any of the aforementioned methods may be performed using a plurality (e.g. 2, 3, or more) of cancer markers, including epithelial or other cancer markers known in the art. In such methods, the level of expression in the sample of each of a plurality of markers, at least one of which is a marker of the invention, is compared with the normal level of expression of each of the plurality of markers in samples of the same type obtained from control humans not afflicted with carcinoma. A significantly altered (i.e., increased or decreased as specified in the above-described methods using a single marker) level of expression in the sample of one or more markers of the invention, or some combination thereof, relative to that marker's corresponding normal or control level, is an indication that the patient is afflicted with carcinoma. For all of the aforementioned methods, the marker(s) are preferably selected such that the positive predictive value of the method is at least about 10%. The methods of the invention have the following uses: (1) assessing whether a patient is afflicted with carcinoma; (2) assessing the presence of cancer cells; (3) making antibodies, antibody fragments or antibody derivatives that are useful for treating cancer and/or assessing whether a patient is afflicted with cancer; (4) making the DNA fragment including but not restricting the primers, antisense nucleotides, siRNA that are useful for treating cancer and/or assessing whether a patient is afflicted with cancer; (5) assessing the efficacy of one or more test compounds for inhibiting cancer in a patient; (6) assessing the efficacy of a therapy for inhibiting cancer in a patient; (7) monitoring the progression of cancer in a patient; (8) selecting a composition or therapy for inhibiting cancer in a patient; (9) treating a patient afflicted with cancer; (10) inhibiting cancer in a patient; (11) assessing the carcinogenic potential of a test compound; and (12) preventing the onset of cancer in a patient at risk for developing cancer. detailed-description description="Detailed Description" end="lead"?
20040315
20070320
20050915
95633.0
0
GODDARD, LAURA B
METHODS FOR IDENTIFICATION, ASSESSMENT, PREVENTION, AND THERAPY OF CANCER
SMALL
0
ACCEPTED
2,004
10,802,044
ACCEPTED
System and method for identifying concerns
A system (and method) for identifying concerns includes a specifying device for specifying at least one initial concern, and an identifying device for identifying at least one related concern having a relationship with at least one initial concern.
1. A system for identifying concerns, comprising: a specifying device for specifying at least one initial concern; and an identifying device for identifying at least one related concern having a relationship with said at least one initial concern. 2. The system according to claim 1, wherein said at least one initial concern comprises a plurality of entities. 3. The system according to claim 1, wherein said relationship comprises a call to said at least one initial concern. 4. The system according to claim 1, wherein said relationship comprises a call from said at least one initial concern. 5. The system according to claim 1, wherein said relationship comprises a same class that can be created by the concern, a same class that can be created from the concern, a reference to same data as the initial concern, and a union or intersection of two concerns. 6. The system according to claim 1, wherein said specifying device comprises a query tool for inputting a query, such that said initial concern is returned as a result of said query. 7. The system according to claim 1, wherein said at least one initial concern and said at least one related concern comprise source code in a software system. 8. The system according to claim 1, wherein said at least one initial concern and said at least one related concern comprise other than source code in a software system. 9. The system according to claim 6, further comprising: a navigating device for navigating said software system in an integrated development environment (IDE). 10. The system according to claim 6, wherein said system is part of an integrated development environment (IDE) for displaying said at least one initial and at least one related concern, and navigating said software system. 11. The system according to claim 9, wherein said navigating device comprises a graphical user interface (GUI) for using said at least one initial concern and said at least one related concern to explore said software system and construct a new software system. 12. The system according to claim 9, wherein said navigating said software system comprises navigating said software system using both virtual and actual structuring of different artifacts within said software system. 13. The system according to claim 9, wherein said navigating said software system comprises using said navigating device to explore concerns and the relationships between said concerns based on a visual representation of query results. 14. The system according to claim 9, wherein said navigating device comprises a visual diagram which gives call relations between different parts of a program selected by query operators expressed as regular expressions. 15. The system according to claim 1, wherein said identifying said at least one related concern comprises automatically generating said at least one related concern. 16. The system according to claim 1, wherein said specifying device comprises at least one of a keyboard and a mouse for specifying said at least one initial concern. 17. The system according to claim 1, wherein said specifying said at least one initial concern comprises defining a query language comprising a set of operators and evaluation properties that together work to identify concerns within different artifacts that make up a software system. 18. A concern manipulation environment (CME) comprising the system of claim 1, 19. The concern manipulation environment of claim 18, wherein a data structure is maintained for keeping concerns in synch with changes in a software system. 20. A system for identifying concerns, comprising: a specifying device for specifying a query against artifacts related to software development, including software, generated code, or models and information about software; means of displaying the results of the query; and means of updating the query when at least one of new artifacts are introduced, artifacts are deleted, and artifacts are changed. 21. The system of claim 20, wherein said results of said query comprise a concern. 22. A method of identifying concerns, comprising: specifying at least one initial concern; and identifying at least one related concern having a relationship with said at least one initial concern. 23. The method according to claim 22, wherein said relationship comprises at least one of a call to said at least one initial concern and a call from said at least one initial concern. 24. The method according to claim 22, wherein said specifying said at least one initial concern comprises using a query tool for inputting a query, such that said initial concern is returned as a result of said query. 25. The method according to claim 22, further comprising: displaying said at least one initial concern and said at least one related concern; and navigating said software system in an integrated development environment (IDE). 26. The method according to claim 22, wherein said identifying said at least one related concern comprises automatically generating said at least one related concern. 27. The method according to claim 22, wherein said at least one initial concern comprises at least one of an extensional concern and an intensional concern. 28. A method of generating concerns, comprising: identifying a first concern; examining a program using said first concern; identifying a second concern using said first concern and text of said program; and displaying and navigating concerns in an integrated development environment (IDE). 29. A programmable storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform a method of identifying concerns, said method comprising: specifying at least one initial concern; and identifying at least one related concern having a relationship with said at least one initial concern. 30. A method for deploying computing infrastructure in which computer-readable code is integrated into a computing system, such that said code and said computing system combine to perform a method of identifying concerns, said method of identifying concerns comprising: specifying at least one initial concern; and identifying at least one related concern having a relationship with said at least one initial concern.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a system and method for identifying concerns and, more particularly, a system and method for identifying concerns in which at least one concern having a relationship with at least one initial concern is identified. 2. Description of the Related Art Concerns include areas of interest within a system. The ability to identify and explore concerns and their relationships within a system is a powerful tool for understanding and restructuring a system. Developers working on existing programs repeatedly have to address concerns (e.g., features, aspects, areas of interest, etc.) that are not well modularized in the source code comprising a system. In such cases, a developer has to first locate the implementation of the concern in the source code comprising the system, and then document the concern sufficiently to be able to understand it and perform the actual change task. Conventional approaches available to help software developers locate and manage scattered concerns use a representation based on lines of source code. Such a line-of-code representation makes it difficult to understand the concern and limits the analysis possibilities. FIG. 1 illustrates a view 100 of a concern representation in one conventional tool (e.g., the Feature Exploration and Analysis Tool (FEAT)) which allows a programmer to locate, describe, and analyze the code implementing a concern in a Java system. Using FEAT, a programmer can locate and analyze concerns scattered in an existing code base. While tools such as the FEAT tool may allow programmers to find concerns using searches, such tools do not provide a user (e.g., programmer) with an ability to use one concern as a source or information to allow them to identify (e.g., generate) other concerns. Therefore, such conventional tools make it difficult and time-consuming to explore concerns in a program. SUMMARY OF THE INVENTION In view of the foregoing and other problems, disadvantages, and drawbacks of the aforementioned assemblies and methods, it is a purpose of the exemplary aspects of the present invention to provide an effective and efficient system and method for identifying concerns. Specifically, the invention may provide an efficient manner of structuring and exploring a system (e.g., software system) using concerns and, therefore, helps to solve the problem of understanding software systems (e.g., large, complex systems). An important aspect of the present invention is the ability to take an initial concern and identify (e.g., automatically generate) other concerns based on the initial concern. That is, the present invention may use a concern as a point (e.g., starting point) for analysis of a program to automatically generate other concerns. The present invention may also include query and navigation tools to specify and explore concerns within a system using both virtual and actual structuring of different artifacts within the system. The exemplary aspects of the present invention include a system (and method) for identifying concerns includes a specifying device for specifying at least one initial concern, and an identifying device for identifying (e.g., automatically generating) at least one related concern having a relationship with at least one initial concern. For example, the relationship may include at least one of a call to the at least one initial concern and a call from the at least one initial concern. Further, the initial concern may include a plurality of entities (e.g., a plurality of methods, etc.). The at least one initial concern and the at least one related concern may include source code in a software system. However, the at least one initial concern and the at least one related concern may also include other than source code (e.g., UML) in a software system. That is, the concern may include any software artifact. Further, the specifying device may be used to input an initial concern. The specifying device may also include a query tool for inputting a query, such that the initial concern is returned as a result of the query. The system may also include a navigating device for navigating the software system (e.g., in an integrated development environment (IDE)). For example, the system may be included as part of an integrated development environment (IDE) for displaying the at least one initial and at least one related concern, and navigating the software system. Specifically, the navigating device may include a graphical user interface (GUI) for using the at least one initial concern and the at least one related concern to explore the software system and construct a new software system. Specifically, the navigating device may include a visual diagram which gives call relations between different parts of a program selected by query operators expressed as regular expressions. Further, navigating the software system may include, for example, navigating the software system using both virtual and actual structuring of different artifacts within the software system. Navigating the software system may also include using the navigating device to explore concerns and the relationships between the concerns based on a visual representation of query results. Further, the specifying device may include at least one of a keyboard and a mouse for specifying the at least one initial concern. In addition, specifying the at least one initial concern may include defining a query language comprising a set of operators and evaluation properties that together work to identify concerns within different artifacts that make up a software system. The present invention also includes a concern manipulation environment (CME) including the system of the present invention. The CME may also include a data structure for keeping concerns in synch with changes in a software system (e.g., by updating a query for defining concerns). The present invention also includes an integrated development environment (IDE) including the system of the present invention. For example, an exemplary aspect of the present invention includes a system for identifying concerns which includes a specifying device for inputting a query against artifacts related to software development (e.g., software, generated code, or models and information about software), means of displaying the results of the query (e.g., named results which define a concern) and means of updating the query under a condition (e.g., when at least one of new artifacts are introduced, artifacts are deleted, and artifacts are changed). Another aspect of the present invention is directed to a method of identifying concerns. The method includes specifying at least one initial concern, and identifying (e.g., automatically generating) at least one related concern having a relationship with the at least one initial concern. The method may also include displaying the at least one initial and at least one related concern, and navigating the software system in an integrated development environment (IDE). Further the at least one initial concern may be an extensional concern, an intensional concern, or some combination of extensional and intensional concerns and may also be defined by a relation to another concern. Another aspect of the present invention is directed to a method of generating concerns which includes identifying a first concern, examining a program using the first concern, identifying a second concern using the first concern and to text of the program or any representation of an artifact, and displaying and navigating concerns in an integrated development environment (IDE). The present invention also includes a programmable storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform a method of identifying concerns, the method of the present invention. The present invention also includes a method for deploying computing infrastructure in which computer-readable code is integrated into a computing system, such that the code and the computing system combine to perform the method according the present invention. In another exemplary aspect, the present invention includes a programmable storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform the inventive method. In another exemplary aspect, the present invention includes a method for deploying computing infrastructure in which computer-readable code is integrated into a computing system, such that the code and the computing system combine to perform the inventive method. With its unique and novel features, the exemplary aspects of the present invention provides an effective and efficient system and method for identifying concerns. The invention provides an efficient manner of structuring and exploring a system (e.g., software system), using concerns and, therefore, helps to solve the problem of understanding software systems (e.g., large, complex systems). BRIEF DESCRIPTION OF THE DRAWINGS The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of the exemplary embodiments of the invention with reference to the drawings, in which: FIG. 1 illustrates a view 100 of a concern representation in one conventional tool (e.g., the Feature Exploration and Analysis Tool (FEAT)) for programming in a Java system; FIG. 2 illustrates a system 200 for identifying concerns according to the exemplary aspects of the present invention; FIGS. 3A-3E illustrate an exemplary method 300 by which the present invention may be used on existing software, according to the exemplary aspects of the present invention; FIG. 4 illustrates an integrated development environment (IDE) 400 for developing software according to the exemplary aspects of the present invention; FIG. 5A illustrates a system 500 for identifying concerns which keeps track of what a concern is as the software changes, according to the exemplary aspects of the present invention; FIG. 5B illustrates an exemplary algorithm which may be executed by the computing device 530 in the system 500, according to the exemplary aspects of the present invention; FIG. 6 illustrates a method 600 of identifying concerns, according to the exemplary aspects of the present invention; FIG. 7 illustrates a system 700 which is a typical hardware configuration which may be used for implementing the inventive system and method; and FIG. 8 illustrates a programmable storage medium 900 (e.g., floppy disk) tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform the inventive method. DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS OF THE INVENTION Referring now to the drawings, FIG. 2 illustrates a system 200 for identifying concerns in accordance with the exemplary aspects of the present invention. The system 200 includes a specifying device 210 for specifying at least one initial concern (e.g., a plurality of initial concerns). It should be noted that a “specifying device” should be construed herein to mean anything that can be used to specify (e.g., provide, identify, etc.) a concern. For example, the specifying device may include an input device (e.g., keyboard, mouse) or a query tool (e.g., a tool for inputting a query which returns at least one concern as a query result), or analysis tool, etc. The system 200 also includes an identifying device 220 (e.g., at least one microprocessor) for identifying at least one related concern (e.g., a plurality of related concerns) having a relationship with the at least one initial concern. The system 200 may include, for example, a graphical user interface (GUI) (e.g., personal computer) which may include a display device, keyboard, mouse, memory device, microprocessor, printer, etc. The system 200 may be used to develop a software system (e.g., program), and in particular, a program using aspect-oriented programming techniques. The software program will typically be in the form of byte code compiled from one or more software entities defining primary program functionality, as well as one or more aspects defining cross-cutting issues. The present invention allows a user (e.g., programmer) to locate, describe, and analyze the code implementing a concern (e.g., in a Java system). Specifically, the present invention allows a user to identify (e.g., locate and analyze) concerns included in a program code (e.g., scattered in an existing code base). Further, the present invention (e.g., including a graphical user interface) may allow the user to visually navigate structural program dependencies. Thus, the user can locate the code implementing a concern, and store the result as an abstract representation consisting of building blocks that are easy to manipulate and query. The representation of a concern supported by the present invention can be used to investigate the relationships between the captured concern and the base code, and between the different parts of the concern itself. The representation can also be used to keep track of the actual source code implementing the concern. The present invention allows a user to capture concerns using an abstract representation that can be mapped back to source code, instead of working directly at the level of program text. Thus, the abstract representation can help the user manage the code in a concern. Moreover, unlike conventional tools, such as the FEAT tool, the present invention provides a user with an ability easily generate (e.g., automatically generate) other concerns. Specifically, unlike conventional systems, the present invention allows the user to identify at least one related concern having a relationship (e.g., a link) with the at least one initial concern. The relationship may be predetermined by the user, or the relationship may be a relationship that is identified (e.g., determined) by the system 200, such as through data mining, pattern matching, etc. The particular type of relationship is not necessarily limited. Indeed, there may be only one concern with “any identifiable or computable” relationship to something else. Some examples of the relationship may include, for example, the related concern includes a call to the initial concern, and/or a call from the initial concern, and/or classes that can be created (e.g., using the “new” verb) by the concern or from the concern, and/or the related concern may reference the same data as the initial concern, and/or the relationship may include a union or intersection of two concerns, etc. The present invention helps to allow the user to “pull apart” a software system by “extracting” related concerns. Thus, the present invention makes it easy and efficient to identify (e.g., explore, analyze, generate, etc.) concerns in a program. In one exemplary embodiment, the at least one initial concern is directly input using the specifying device 210 (e.g., by specifying one or more elements of the concern). The initial concern may also be generated by some form of analysis. In another exemplary embodiment of the present invention the specifying device 210 may be used to input a query (e.g., keyword-based query) for identifying an initial concern. The present invention may search a software system for areas of interest (e.g., concerns) which match the input query (e.g., include the input keyword, etc.). That is, the results of the input query may include the initial concern. More specifically, the present invention may work by defining a query language composed of a set of operators and evaluation properties that together work to select specific concerns within the different artifacts that make up a system. These initial concerns may be used to generate (e.g., automatically generate) a set of additional, new concerns. A navigation tool (e.g., graphical user interface (GUI)) may be used, based on a visual representation of the query results, to explore both the concerns (e.g., initial and related concerns) and the relationships between them. For example, the navigation tool may include a visual diagram (e.g., display screen, view, etc.) which displays call relations between different parts of a system selected by query operators expressed as regular expressions. The present invention may include, for example, a concern manipulation environment (CME). The CME may include an open, extensible suite of tools that support programming (e.g., aspect-oriented development (AOSD)) across the full software lifecycle. Further, the present invention may include an integrated development environment (IDE) for users (e.g., commercial and research-oriented developers) who want to use technologies (e.g., aspect-related technologies) to simplify and improve their existing or new software. The present invention may support the full software lifecycle. Software may include requirements, use cases, design, specification, architecture, test, analysis, etc. Further, there are more artifacts than just code that comprise any software system. Today's software also includes artifacts written in UML, BPEL, WSDL, XML, XMI, HTML and other documentation formats, Ant,. Thus, concerns and aspects are heterogeneous, including pieces of many different artifacts. The system 200 may operate on any such artifact. The present invention may include a gentle adoption curve and a low entry barrier. The invention may work with new or existing software, whether or not the software is/was originally developed using AOSD technologies. The invention can be applied to all or part of any given piece of software, allowing it to be adopted incrementally in a given project. It may be non-invasive and work with existing programming languages, artifacts, and processes. Developers do not have to rewrite existing software, change languages, or adopt different processes to use the invention. Developers can derive significant benefit from the invention, even if they do not buy into AOSD. The invention may be implemented in standard Java, and work on any platform that supports Java. Further, the present invention allows users (e.g., developers) to leverage a variety of powerful AOSD tools, technologies, and paradigms (e.g., simultaneously). Different tools, technologies, and paradigms can help developers accomplish different development, integration, and evolution tasks. Initially, the invention provides integrated support for at least two important AOSD paradigms: AspectJ and multidimensional separation of concerns using Hyper/J2. The invention may incorporate and integrate other new or existing aspect-oriented paradigms, tools, and technologies. The present invention includes a framework for building and integrating AOSD tools, technologies, and paradigms for researchers and technology providers. The invention offers a flexible, powerful, open set of components, frameworks, and GUIs on which to build tools more easily and rapidly. The components are based on a common meta-model for AOSD tools. The invention framework allows technology providers and researchers to focus on the “value-added” part of their work, instead of having to implement fundamental capabilities from scratch. This facilitates tool building, experimentation with different aspect-oriented approaches, and further research. In addition, the invention includes an extensible, reusable, open, customizable, integrating base on which users (e.g., AOSD tool developers) can build and integrate tools. The invention may include an open, customizable set of underlying abstractions that are common to a wide range of aspect-oriented tools, technologies, and paradigms. The invention may also offer a large set of open points and integration points. The invention may also offer a common platform on which different tools (e.g., aspect-related tools), technologies, and paradigms can interoperate and be integrated. For example, the invention may ultimately provide a wide range of integrated tools that promote different software development, integration, evolution, and deployment activities. The invention may, for example, include the use of AOSD-related technologies to reduce and manage the complexity of existing software, and create new software, or to extend existing software. An exemplary aspect of the present invention works by improving separation of concerns in software. A concern may include part of a software system that relates to some concept, goal, purpose, or requirement. Some common examples of concerns are features, components, variants, user interfaces, instrumentation, first-failure data capture (FFDC), quality of service (QoS), security, policies, etc. Separation of concerns is an important part of all software engineering, and all software engineers think in terms of concerns. However, conventional development paradigms—including object oriented—do not allow developers to encapsulate all of their concerns explicitly. For example, the code that implements instrumentation is typically scattered all throughout the implementation of software, even though “instrumentation” is a coherent concern that a developer would like to work with as a single, encapsulated entity. The present invention allows a user (e.g., a software engineer) to make any desired concerns explicit in their software, eliminating the problems of scattering and tangling. The present invention may accomplish this by recognizing “concerns” as real entities in software. Specifically, the present invention allows developers to identify, encapsulate, and manipulate concerns in software, thus enabling software to be structured into understandable, manageable, evolvable parts. FIG. 3A illustrates an exemplary method 300 by which the present invention may be used on existing software. When used to understand, enhance, and evolve existing software, the activities of identifying concerns (310), encapsulating concerns (320), extracting (e.g., manipulating) concerns (330), and composing software (340) are very common. Further, the method 300 may be implemented using the system 400, system 500 or hardware configuration 700, which are illustrated in FIGS. 4, 5A and 7, respectively. As illustrated in FIG. 3A, identifying concerns (310) in the exemplary method 300 includes specifying 311 at least one initial concern, and identifying 312 at least one related concern. Further, with respect to identifying concerns (310), software may address a variety of concerns, many of which, like logging, were not encapsulated into modules. The concern identification activity attempts to answer questions such as, “which parts of this software system pertain to this feature, function, or other concern?” For example, FIG. 3B illustrates a simple software system 350 having parts (encircled) which have been identified as pertaining to an area of interest. In the present invention, concern identification may involve exploring software artifacts using a combination of navigation and queries (e.g., pattern-matching), analysis and mining (e.g., data mining), views that are provided for creating and navigating concern models, which contain concerns, relationships, and constraints, and for issuing queries over concern models, and viewing and refining results. For example, in the present invention, it may be possible to use concern identification to find latent concerns, like logging, that are scattered across existing software. FIG. 3C illustrates the exemplary method 300, and also illustrates a simple software system 360 in which concerns (e.g., shaded page portions) have been encapsulated (320). That is, once concerns have been identified in existing software, they can be encapsulated as first-class concerns in the concern model, as shown in FIG. 3C. Artifacts can be encapsulated in concerns in several manners. For example, artifacts can be encapsulated extensionally, by explicitly selecting all of the pieces of software that a concern includes (e.g., all of the classes and methods that implement or use logging). Artifacts can also be encapsulated intensionally, by query. For example, a concern might be defined to contain all of the classes with “Log” in their names, and all methods containing calls to methods defined by classes named Log*. When new artifacts are added that match the query that defines such a concern, those new artifacts may be added to the concern. It should be noted that intensional concerns are not the same as the old database notion of “views,” because a view is not a first-class thing. Since the present invention can extract concerns, the concerns are, in fact, first-class entities and can be manipulated sensibly as such, which views can not be. Moreover, a database view operates over tables. Here, the present invention may operate on among other things, such as software entities, and using relationships appropriate to the kind of artifact the concern is a part of. That is, the present invention supports concerns as first-class entities and can make them understandable in isolation via extraction. The present invention also supports concerns that have both extensional and intensional parts. Database views, on the other hand, are not first-class entities in this sense—traditionally, but instead are considered projections from the database. Concerns are not restricted to being projections, and in fact, when extracted, they are not projections at all. The present invention treats concerns as first-class entities which is unique and is not standard in AOSD, because it requires a symmetric view. Concerns, their interrelationships, and their constraints may be represented in the concern model. For example, FIG. 3C shows that the dark-shaded concern 361 depends on the light-shaded concern 362. The present invention may include a “concern explorer” which allows a user to view, navigate, and query concern models. Once concerns have been encapsulated, the concerns can be treated as though the software had been written with them separated explicitly, even though the concerns are still physically entangled with other concerns. That is, the separation may be logical, not physical at this point Additional (e.g., subsequent) queries can be issued using these concerns (for example, to understand the interrelationships among concerns), and relationships (e.g., dependencies) and constraints (e.g., mutual exclusion) among concerns can be represented, analyzed, and enforced. It should be noted that the present invention in not necessarily invasive. Thus, a user can use the present invention (e.g., concern identification and encapsulation) to gain benefit with respect to organizing and understanding his software, whether or not he actually uses AOSD. FIG. 3D illustrates the exemplary method 300, and also illustrates a simple software system 370 in which concerns (e.g., white (e.g., non-shaded) page portions) have been extracted (330). As noted above, the encapsulation (320) may result in a logical separation of concerns. For many purposes, this degree of separation is sufficient. For some kinds of concerns, however, a user (e.g., developer) may want to go a step further, and physically separate the concerns, extracting (330) the concerns into separate artifacts. As an example, if the dark shaded concern 361 above represents logging and the lightly-shaded concern 362 represents a server application, a user might decide to extract the logging concern from the server, so that the code that implements the server no longer is tangled with the logging capability. This would enable the server to be shipped without logging, and allow the development of the server and the logging concerns to proceed independently. The present invention supports concern extraction at least into Java and/or AspectJ, as well as into other types of artifacts. To ensure that the extracted artifacts are consistent, correct, and separately compilable, the extractor may insert stubs where needed to ensure declarative completeness. The extracted artifacts can be subsequently reintegrated (e.g., via composition). FIG. 3E illustrates the exemplary method 300, and also illustrates a possible simple software systems 380 in which concerns (e.g., shaded page portions) have been composed (e.g., reintegrated). Specifically, concerns that have been separated can be integrated, or composed (e.g., woven), together to produce software that contains the functionality of all the concerns: As illustrated in FIG. 3E, the separated shaded and non-shaded concerns (logging and server capabilities) can be composed together optionally to produce a version 380a of the software that integrates both capabilities (server with logging). Note that it is also possible to compose the server with some other capability encapsulated by a concern, such as first-failure data capture to produce another version 380b of the software. The present invention supports at least two composition capabilities: AspectJ, which is suited to homogeneous crosscutting concerns, and Hyper/J2, which emphasizes heterogeneous crosscutting concerns. The invention is open to integration with other compositors as well. It may be noted that the choice of compositor is not necessarily relevant with respect to concern modeling, identification, or encapsulation, but may be somewhat relevant during extraction (e.g., for knowing into which language the artifacts should be extracted). FIG. 4 illustrates another exemplary aspect of the present invention. As illustrated in FIG. 4, the present invention may include an integrated development environment (IDE) 400 for developing software. Specifically, the system 200 may be included as part of an integrated development environment (IDE) 400 which allows a user to quickly and easily create and debug programs (e.g., aspect-oriented programs). An integrated development environment (IDE) typically refers to a set of integrated tools for developing software. The tools may be generally run from a graphical user interface (GUI) (e.g., a single user interface), but each tool may also be implemented with its own user interface. For example, as illustrated in FIG. 4, the IDE may include a module 410 for identifying concerns (e.g., identifying at least one related concern having a relationship with at least one initial concern. For example, the module 410 may include a processor for executing a software program for identifying concerns. The IDE 400 may also include a display device 420 for displaying information (e.g., query, query results, etc.), and a navigational device (e.g., keyboard, mouse, etc.) 430 for navigating concerns in a software system. Specifically, the navigational device 430 may be used to edit the underlying software artifacts. FIGS. 5A-5B illustrate another exemplary aspect of the present invention. Specifically, the present invention may include a system 500 for identifying concerns which may keep track of what a concern is as the software changes. For example, the system 500 may be included as part of an Integrated Development Environment (IDE). As illustrated in FIG. 5A, the system 500 includes a specifying device 510 for inputting a query against artifacts related to software development a specifying. Such artifacts may include, for example, software, generated code, models and information about software, etc. The system 500 may also include a display device 520 for displaying information such as the query, the results of the query, etc. The system 500 may also include a computing device (e.g., processor) 530 which updates (e.g., renews, reprocesses, recomputes, reevaluates, reconfigures, reconstitutes, etc.) the query under certain conditions, such as when at least one of new artifacts are introduced, artifacts are deleted, and artifacts are changed. Another query may include, for example, when a user requests an update, or after a certain duration. This allows the invention to keep the concerns in synch with the program as the program changes. For example, the query was “all methods starting with AD” may be processed to generate results which include “method ADD” and “method ADE”. If the user then adds “method ADF” to the program and then requests that the query be updated (e.g., a condition for updating the query), the system 500 will update the query such that “method ADF” will be added to the query results. For example, the system 500 may be self-refining (e.g., having a learning capability) which allows it to keep track of what a concern is (e.g., how a concern is defined) as the software at issue changes. For example, the definition of concern may be changed (automatically changed) by the system, as a result of a change in the software is changed. FIG. 5B illustrates an exemplary algorithm which may be executed by the computing device 530 in the system 500. As illustrated in FIG. 5B, the algorithm executed by the computing device (e.g., processor) 530 may include processing (531) a query to generate query results. The query results may be displayed by a display device, and may also be used to identify related concerns, as explained above with respect to system 200. The computing device 530 may also detect (532) a condition for updating the query (e.g., when at least one of new artifacts are introduced, artifacts are deleted, artifacts are changed, after a duration of time, etc.). Further, if a condition for updating the query has been detected, the query may be updated (533) to generate updated query results which may be displayed, etc. In another exemplary aspect, the present invention includes a method 600 of identifying concerns. The method 600 includes specifying (650) at least one initial concern, and identifying (660) at least one related concern having a relationship with the at least one initial concern. Specifically, in the method, a second concern may be identified using the first concern and the program text (e.g., software system text). The method 600 may also include displaying and navigating the concerns in an integrated development environment (IDE). Further, the first concern may include at least one of an intensional concern and an extensional concern. Referring now to FIG. 7, system 700 illustrates a typical hardware configuration which may be used for implementing the inventive system and method for identifying a word correspondence. The configuration has preferably at least one processor or central processing unit (CPU) 711. The CPUs 711 are interconnected via a system bus 712 to a random access memory (RAM) 714, read-only memory (ROM) 716, input/output (I/O) adapter 718 (for connecting peripheral devices such as disk units 721 and tape drives 740 to the bus 712), user interface adapter 722 (for connecting a keyboard 724, mouse 726, speaker 728, microphone 732, and/or other user interface device to the bus 712), a communication adapter 734 for connecting an information handling system to a data processing network, the Internet, and Intranet, a personal area network (PAN), etc., and a display adapter 736 for connecting the bus 712 to a display device 738 and/or printer 739. Further, an automated reader/scanner 741 may be included. Such readers/scanners are commercially available from many sources. In addition to the system described above, a different aspect of the invention includes a computer-implemented method for performing the above method. As an example, this method may be implemented in the particular environment discussed above. Such a method may be implemented, for example, by operating a computer, as embodied by a digital data processing apparatus, to execute a sequence of machine-readable instructions. These instructions may reside in various types of signal-bearing media. Thus, this aspect of the present invention is directed to a programmed product, including signal-bearing media tangibly embodying a program of machine-readable instructions executable by a digital data processor to perform the above method. Such a method may be implemented, for example, by operating the CPU 711 to execute a sequence of machine-readable instructions. These instructions may reside in various types of signal bearing media. Thus, this aspect of the present invention is directed to a programmed product, comprising signal-bearing media tangibly embodying a program of machine-readable instructions executable by a digital data processor incorporating the CPU 711 and hardware above, to perform the method of the invention. This signal-bearing media may include, for example, a RAM contained within the CPU 711, as represented by the fast-access storage for example. Alternatively, the instructions may be contained in another signal-bearing media, such as a magnetic data storage diskette 800 (FIG. 8), directly or indirectly accessible by the CPU 711. Whether contained in the computer server/CPU 711, or elsewhere, the instructions may be stored on a variety of machine-readable data storage media, such as DASD storage (e.g., a conventional “hard drive” or a RAID array), magnetic tape, electronic read-only memory (e.g., ROM, EPROM, or EEPROM), an optical storage device (e.g., CD-ROM, WORM, DVD, digital optical tape, etc.), paper “punch” cards, or other suitable signal-bearing media including transmission media such as digital and analog and communication links and wireless. In an illustrative embodiment of the invention, the machine-readable instructions may comprise software object code, complied from a language such as C, C++, etc. With its unique and novel features, the present invention provides an efficient manner of structuring and exploring a system (e.g., software system) using concerns and, therefore, helps to solve the problem of understanding software systems (e.g., large, complex systems). While the invention has been described in terms of one or more embodiments, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims. Specifically, one of ordinary skill in the art will understand that the drawings herein are meant to be illustrative, and the design of the inventive assembly is not limited to that disclosed herein but may be modified within the spirit and scope of the present invention. Further, Applicant's intent is to encompass the equivalents of all claim elements, and no amendment to any claim in the present application should be construed as a disclaimer of any interest in or right to an equivalent of any element or feature of the amended claim.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a system and method for identifying concerns and, more particularly, a system and method for identifying concerns in which at least one concern having a relationship with at least one initial concern is identified. 2. Description of the Related Art Concerns include areas of interest within a system. The ability to identify and explore concerns and their relationships within a system is a powerful tool for understanding and restructuring a system. Developers working on existing programs repeatedly have to address concerns (e.g., features, aspects, areas of interest, etc.) that are not well modularized in the source code comprising a system. In such cases, a developer has to first locate the implementation of the concern in the source code comprising the system, and then document the concern sufficiently to be able to understand it and perform the actual change task. Conventional approaches available to help software developers locate and manage scattered concerns use a representation based on lines of source code. Such a line-of-code representation makes it difficult to understand the concern and limits the analysis possibilities. FIG. 1 illustrates a view 100 of a concern representation in one conventional tool (e.g., the Feature Exploration and Analysis Tool (FEAT)) which allows a programmer to locate, describe, and analyze the code implementing a concern in a Java system. Using FEAT, a programmer can locate and analyze concerns scattered in an existing code base. While tools such as the FEAT tool may allow programmers to find concerns using searches, such tools do not provide a user (e.g., programmer) with an ability to use one concern as a source or information to allow them to identify (e.g., generate) other concerns. Therefore, such conventional tools make it difficult and time-consuming to explore concerns in a program.
<SOH> SUMMARY OF THE INVENTION <EOH>In view of the foregoing and other problems, disadvantages, and drawbacks of the aforementioned assemblies and methods, it is a purpose of the exemplary aspects of the present invention to provide an effective and efficient system and method for identifying concerns. Specifically, the invention may provide an efficient manner of structuring and exploring a system (e.g., software system) using concerns and, therefore, helps to solve the problem of understanding software systems (e.g., large, complex systems). An important aspect of the present invention is the ability to take an initial concern and identify (e.g., automatically generate) other concerns based on the initial concern. That is, the present invention may use a concern as a point (e.g., starting point) for analysis of a program to automatically generate other concerns. The present invention may also include query and navigation tools to specify and explore concerns within a system using both virtual and actual structuring of different artifacts within the system. The exemplary aspects of the present invention include a system (and method) for identifying concerns includes a specifying device for specifying at least one initial concern, and an identifying device for identifying (e.g., automatically generating) at least one related concern having a relationship with at least one initial concern. For example, the relationship may include at least one of a call to the at least one initial concern and a call from the at least one initial concern. Further, the initial concern may include a plurality of entities (e.g., a plurality of methods, etc.). The at least one initial concern and the at least one related concern may include source code in a software system. However, the at least one initial concern and the at least one related concern may also include other than source code (e.g., UML) in a software system. That is, the concern may include any software artifact. Further, the specifying device may be used to input an initial concern. The specifying device may also include a query tool for inputting a query, such that the initial concern is returned as a result of the query. The system may also include a navigating device for navigating the software system (e.g., in an integrated development environment (IDE)). For example, the system may be included as part of an integrated development environment (IDE) for displaying the at least one initial and at least one related concern, and navigating the software system. Specifically, the navigating device may include a graphical user interface (GUI) for using the at least one initial concern and the at least one related concern to explore the software system and construct a new software system. Specifically, the navigating device may include a visual diagram which gives call relations between different parts of a program selected by query operators expressed as regular expressions. Further, navigating the software system may include, for example, navigating the software system using both virtual and actual structuring of different artifacts within the software system. Navigating the software system may also include using the navigating device to explore concerns and the relationships between the concerns based on a visual representation of query results. Further, the specifying device may include at least one of a keyboard and a mouse for specifying the at least one initial concern. In addition, specifying the at least one initial concern may include defining a query language comprising a set of operators and evaluation properties that together work to identify concerns within different artifacts that make up a software system. The present invention also includes a concern manipulation environment (CME) including the system of the present invention. The CME may also include a data structure for keeping concerns in synch with changes in a software system (e.g., by updating a query for defining concerns). The present invention also includes an integrated development environment (IDE) including the system of the present invention. For example, an exemplary aspect of the present invention includes a system for identifying concerns which includes a specifying device for inputting a query against artifacts related to software development (e.g., software, generated code, or models and information about software), means of displaying the results of the query (e.g., named results which define a concern) and means of updating the query under a condition (e.g., when at least one of new artifacts are introduced, artifacts are deleted, and artifacts are changed). Another aspect of the present invention is directed to a method of identifying concerns. The method includes specifying at least one initial concern, and identifying (e.g., automatically generating) at least one related concern having a relationship with the at least one initial concern. The method may also include displaying the at least one initial and at least one related concern, and navigating the software system in an integrated development environment (IDE). Further the at least one initial concern may be an extensional concern, an intensional concern, or some combination of extensional and intensional concerns and may also be defined by a relation to another concern. Another aspect of the present invention is directed to a method of generating concerns which includes identifying a first concern, examining a program using the first concern, identifying a second concern using the first concern and to text of the program or any representation of an artifact, and displaying and navigating concerns in an integrated development environment (IDE). The present invention also includes a programmable storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform a method of identifying concerns, the method of the present invention. The present invention also includes a method for deploying computing infrastructure in which computer-readable code is integrated into a computing system, such that the code and the computing system combine to perform the method according the present invention. In another exemplary aspect, the present invention includes a programmable storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform the inventive method. In another exemplary aspect, the present invention includes a method for deploying computing infrastructure in which computer-readable code is integrated into a computing system, such that the code and the computing system combine to perform the inventive method. With its unique and novel features, the exemplary aspects of the present invention provides an effective and efficient system and method for identifying concerns. The invention provides an efficient manner of structuring and exploring a system (e.g., software system), using concerns and, therefore, helps to solve the problem of understanding software systems (e.g., large, complex systems).
20040317
20100831
20050922
58496.0
0
DAO, THUY CHAN
SYSTEM AND METHOD FOR IDENTIFYING CONCERNS
UNDISCOUNTED
0
ACCEPTED
2,004
10,802,289
ACCEPTED
Patient care equipment management system
An equipment management system provides an equipment support for supporting patient care equipment. The equipment support may be mountable on an arm that extends from a wall, on a column depending from the arm, on a wall mount, on a stand, or on a patient support. Various methods may be used to vertically move the equipment support up and down to engage and disengage the equipment support from supporting devices.
1. An apparatus for supporting patient care equipment relative to a patient support, the apparatus comprising an engager coupled to the patient support, an equipment support to be coupled to the engager, and a stand to be removably coupled to the equipment support, the stand comprising a set of legs movable between a storage position and a use position. 2. The apparatus of claim 1, wherein the set of legs is configured to be suspended above the floor in the storage position when the stand is supported in a first position, and the set of legs is configured to engage the floor and move from the storage position to the use position as the stand moves from the first position to a second, floor-engaging position. 3. The apparatus of claim 1, wherein the engager comprises a support arm and a coupler positioned on a distal end of the support arm. 4. The apparatus of claim 1, wherein the support arm is pivotably mounted on the patient support. 5. The apparatus of claim 4, wherein the support arm comprises a post receiver and the equipment support comprises a post, and the post is receivable in the post receiver to couple the equipment support to the support arm. 6. A system for supporting patient care equipment, the system comprising a patient support having a base frame and an intermediate frame movable between a raised and lowered position relative to the base frame, the patient support having a head end and sides, a support arm coupled to the intermediate frame, and an equipment support configured to be mounted on the support arm, the equipment support carrying medical equipment for monitoring the patient, wherein the equipment support can be moved between a use position at the head end of the patient support and a transport position along a selected one of the sides of the patient support. 7. The system of claim 6, wherein the support arm is pivotably coupled to the intermediate frame. 8. The system of claim 7, wherein the patient support has a longitudinal axis, and the support arm is pivotable between a substantially longitudinally extending position and a substantially laterally extending position relative to the patient support. 9. The system of claim 8, wherein the equipment support is configured to be supported at least partially over the patient support when the equipment support is mounted on the support arm and the support arm is in the laterally extending position. 10. The system of claim 8, wherein the support arm has a distal end that is vertically below the intermediate frame when the arm is in the laterally extending position. 11. The system of claim 6, wherein the equipment support includes a post and the support arm includes a post receiver for receiving the post. 12. The system of claim 11, wherein the post is conical frustum shaped. 13. The system of claim 6, further comprising a stand for supporting the equipment support, the stand having collapsible legs that extend when the equipment support is lowered into its resting position on the floor and collapse into a transport position when the stand is raised off of the floor. 14. The system of claim 13, wherein each collapsible leg has a castor wheel mounted thereon. 15. The system of claim 13, wherein each collapsible leg has a slide pad mounted thereon. 16. The system of claim 13, wherein each collapsible leg has a joint, the joint connecting two upper leg members with a single lower leg member. 17. The system of claim 6, wherein the equipment support is rotatably mounted on the support arm. 18. An equipment support system comprising a telescoping arm configured to be mounted relative to a hospital wall to extend therefrom, the arm comprising a proximal portion having a mount end pivotably mounted relative to the wall and a second end extending away from the wall, and a distal portion coupled to the second end of the proximal portion and configured to telescope relative to the proximal portion, and an equipment support coupled to the distal portion and configured to support patient care equipment thereon. 19. The system of claim 18, wherein the proximal portion of the telescoping arm does not pivot relative to the distal portion. 20. The system of claim 18, further comprising a console configured to house the telescoping arm and the equipment support when the system is not in use. 21. A patient care equipment stand to be positioned relative to a patient in a patient support, the stand comprising a hub, a plurality of legs attached to the hub, the legs have a deployed, use position and a transport position, a spring for biasing the hub and legs toward the transport position, and an actuator for moving the hub and legs to the deployed, use position when the actuator contacts a support surface. 22. The stand of claim 21, further comprising a central post, wherein the hub comprises a ring circumscribing the post. 23. The stand of claim 21, further comprising a link extending between the hub and the plurality of legs. 24. The stand of claim 21, wherein the actuator is a hollow tube configured to sleeve over the central post, the tube having a first, floor-engaging end and a second, hub-engaging end. 25. An apparatus for supporting a patient and medical equipment relative to a floor of a hospital room, the apparatus comprising a patient support having a base on the floor and a patient-support portion that is supported above the base, a motorized lift coupled to the patient-support portion, the motorized lift having a distal end movable between a raised and lowered position, and an equipment support coupled to the distal end of the support arm. 26. The apparatus of claim 25, wherein the motorized lift comprises a top frame member and a bottom frame member movable relative to the top frame member. 27. The apparatus of claim 25, wherein the motorized lift includes actuator buttons for controlling movement of the motorized lift between the raised and lowered positions. 28. The apparatus of claim 25, wherein the motorized lift comprises a linear actuator. 29. An apparatus for supporting medical equipment in a patient care environment, the apparatus comprising an equipment support having a frame for supporting medical equipment and a post extending downwardly therefrom, wherein the post is configured to be received by any one of the group comprising a patient support post receiver, a stand post receiver, a support arm post receiver, and a wall-mounted post receiver.
RELATED APPLICATIONS This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Application Ser. No. 60/455,621, filed Mar. 18, 2003 and U.S. Provisional Application Ser. No. 60/510,756, filed Oct. 13, 2003, which are expressly incorporated by reference herein. BACKGROUND OF THE INVENTION The present disclosure relates to a system for supporting patient care equipment adjacent a patient support. Hospitalized patients often require patient care equipment to be in close proximity during care. Such patient care equipment may include heart monitoring equipment, medical gas delivery equipment, infusion pumps, intra-venous bags, equipment monitors, defibrillators, and other patient care equipment, many of which directly connect to the patient via lines or tubes. SUMMARY OF THE INVENTION The present invention comprises one or more of the following features or elements in the appended claims or combinations thereof. A patient care equipment management system comprises an equipment support. The equipment support may be mountable on an arm that extends from a wall, on a column depending from the arm, on a wall mount, on a stand, or on a patient support. Various methods may be used to move the equipment support upwardly and downwardly to engage and disengage the equipment support from supporting devices. A patient support typically has a base on the floor and a patient-support portion that is supported above the base and movable relative to the base between a first position and a second position that is lower than the first position. A support arm can be coupled to the patient-support portion, and the equipment support can be coupled to the other end of the support arm. The equipment support can be coupled to a stand. The stand may comprise a set of legs movable between a storage position and a use position, the legs being automatically deployed to the use position when the stand is lowered onto the floor. The support arm may be a motorized lift. The support arm may have actuator buttons that operate a linear actuator. The equipment support may have a post. A post receiver may be mounted on a distal end of the support arm. A post receiver may also be mounted on a patient support frame member, on a column supported by a wall-mounted arm, on a wall mount, or on a stand. It should be understood that while the illustrated method of coupling the equipment support to either the patient support frame member, column, wall mount, or stand shows a post mating with a post receiver, other coupling methods are within the scope of the disclosure. Therefore, it should be understood that when references to a post and a post receiver are used throughout the disclosure, such references are merely the illustrated embodiment, and in general, a first coupler may couple with a second coupler to form a support or engagement between the equipment support and the patient support frame member, the column of an arm, the wall mount, or the stand. Additional features will become apparent to those skilled in the art upon consideration of the following detailed description of illustrative embodiments exemplifying the best mode of carrying out various systems for transporting and supporting patient care equipment as presently perceived. BRIEF DESCRIPTION OF THE DRAWINGS The detailed description particularly refers to the accompanying figures, in which: FIG. 1 is a perspective view of an equipment management system having an equipment support and patient care equipment configured to be mounted in a plurality of locations; FIG. 2 is a perspective view of the equipment support positioned on a stand adjacent to a patient support; FIG. 3 is a perspective view similar to that of FIG. 2 showing the equipment support carried by an arm extending from the patient support; FIG. 4 is another perspective view of the equipment support positioned on a vertically telescoping stand; FIG. 5 is a perspective view of another equipment support having two posts for mounting on post receivers; FIG. 6 is a perspective view of an equipment support that is supportable by a motorized lift configured to engage a post of the equipment support; FIG. 7 is a perspective view similar to that of FIG. 6 showing the motorized lift engaged with the equipment support post; FIG. 8 is a cross-sectional view of the motorized lift of FIGS. 6-7 showing a linear actuator housed therein; FIG. 9 is a cross-sectional view similar to that of FIG. 8 showing the linear actuator extended such that the motorized lift is in a raised position; FIG. 10 is a perspective view of a self-deploying stand for carrying an equipment support; FIG. 11 is a perspective view similar to that of FIG. 10, showing the stand deployed; FIG. 12 is a perspective view of a stand having a plurality of two-member upper legs connected to single-member lower legs; FIG. 13 is a perspective view of the stand of FIG. 12 in the collapsed state; FIG. 14 is a top view of an equipment support mounted on a patient support so as to permit passage through an elevator door; and FIG. 15 is another embodiment of a telescoping stand. DETAILED DESCRIPTION OF THE DRAWINGS A patient care equipment management system 10, shown in FIG. 1, comprises an equipment support 16 that can be carried or supported by at least one of a patient support 12, a stand 18, a support arm 20, and a wall mount 22. Illustratively, equipment support 16 can be supported interchangeably by patient support 12, stand 18, support arm 20, and wall mount 22. It should be understood that although patient support 12 is illustratively shown in FIG. 1 as a transportable hospital bed for supporting patient 14, other patient supports are within the scope of the disclosure and can be substituted for the illustrated embodiment. For example, patient support 12 could be a stretcher, a surgical table, a wheel chair, or any other medical device on which a patient may be supported. Illustratively, equipment support 16 carries a display and a plurality of monitors for monitoring the status of patient 14. However, it should be understood that other medical devices may be carried by or incorporated into equipment support 16 as desired for the care of patient 14. An additional equipment support 24 may be provided, as can be seen in FIG. 1, and may or may not have the features described herein. Patient support 12 illustratively includes a base 26 (typically including a base frame hidden in whole or in part by a shroud), a patient-support deck 28 supporting a mattress 30, and an intermediate frame 32. Linkage 34 connects intermediate frame 32 to base 26; the linkage 34 is power driven thereby permitting movement of patient-support deck 28 and intermediate frame 32 relative to base 26. Intermediate frame 32 illustratively includes head-end frame member 36, which is configured to extend horizontally beyond the periphery of patient-support deck 28 such that certain items can be mounted thereon, including, for example, push handles 38 and corner bumpers 40, as shown in FIG. 1. Patient support 12 has a longitudinal axis. It will be appreciated that such patient supports or hospital beds are well known and need not be discussed in detail herein. For example, U.S. Pat. No. 5,790,997 to Weismiller discloses such a patient support and is incorporated herein by reference. Push handles 38 are illustratively configured to respond to urges from a caregiver, including pushing or pulling forces exerted on handles 38. Such pushing or pulling of handles 38 causes handles 38 to act upon respective force sensors interposed between handles 38 and frame member 36. The force sensors may comprise, for example, load cells (not shown) that are housed in patient support 12 and that sense the force applied to handles 38. The load cells send signals to a motorized traction device (not shown) for propelling the patient support 12, as is disclosed further in U.S. Publication Number 2002/0088055 A1, incorporated herein by reference. However, it should be understood that push handles 38 may alternatively comprise standard-mount handles, or push handles 38 may be omitted from patient support 12. An engager, such as illustrative support arm 42, can be mounted to frame member 36, as shown in FIGS. 1-3. Support arm 42 is illustratively pivotably mounted to frame member 36 such that support arm 42 pivots about axis 44. It should be understood, however, that other constructions for pivotably mounting support arm 42 to frame member 36 are within the scope of the disclosure. The illustrative manner in which support arm 42 engages and supports equipment support 16 is shown in FIG. 2. Support arm 42 illustratively includes a proximal end 46 that is coupled to frame member 36 and a distal end 48 that is spaced apart from proximal end 46. A post receiver 50 is illustratively mounted to distal end 48 of support arm 42. Post receiver 50 is configured to engage a downwardly pointing post 52 located on equipment support 16. Illustratively, post 52 is conical frustum shaped at lower end 54, facilitating engagement between post receiver 50 and post 52 even when alignment between the two is slightly off. It should be understood, however, that other approaches by which support arm 42 engages and supports equipment support 16 are within the scope of the disclosure. For example, support arm 42 could have a post mounted on distal end 48, while equipment support 16 could have a post receiver. Or as discussed above, support arm 42 could have a first coupler and equipment support could have a second, corresponding coupler. FIG. 3 shows the illustrated embodiment of the support arm 42 engaging and supporting equipment support 16. Post receiver 50 on distal end 48 of support arm 42 is brought into engagement with lower end 54 of post 52 by raising patient-support deck 28 and intermediate frame 32 relative to base 26. As intermediate frame 32 raises relative to base 26, support arm 42 raises with frame member 36 and intermediate frame 32, thereby moving post receiver 50 toward engagement with post 52. Once post 52 and post receiver 50 are mated together, as shown in FIG. 3, support arm 42 can fully support equipment support 16, and collapsible legs 56 of stand 18 need not balance nor support the weight of equipment support 16. Therefore, as support arm 42 continues to raise with intermediate frame 32, legs 56 begin to draw in closer toward each other as a result of the force of gravity pulling the legs downwardly, as can be seen in FIG. 3. As discussed above, support arm 42 is pivotably mounted to frame member 36, and is pivotable between a substantially longitudinally extending position relative to the patient support, shown in FIGS. 2-3, and a substantially laterally extending position, as shown in FIG. 14. Furthermore, as can be seen in FIGS. 2-3, support arm 42 has a stepped configuration and is formed such that distal end 48 of support arm 42 is lower in elevation than proximal end 46 of support arm 42. Such pivotable mounting permits distal end 48 of support arm 42 to pivot to a position below patient support deck 28, allowing equipment support 16 to be brought in sufficiently close to a side of patient support 12 such that equipment support 16 and patient support 12 having a width A can fit into an elevator door having a width B (commonly a standard of 48″ wide) as shown in FIG. 14. During transport, legs 56 are illustratively lifted a sufficient height off of the floor such that elevator and door thresholds can be cleared during transport without contacting legs 56. When it is desirable to again return equipment support 16 to a position supported on the floor, for example when patient support 12 has reached the anticipated destination, patient-support deck 28 is lowered in relation to base 26, and likewise intermediate frame 32 and frame member 36 lower with patient-support deck 28. Support arm 42 lowers as frame member 36 lowers, and foot pads 58 on legs 56 contact the floor. In one illustrative embodiment, when foot pads 58 contact the floor, an outer edge of each foot pad 58 contacts first, urging foot pads 58 and their respective legs 56 outwardly toward the deployed position, shown in FIG. 2. Eventually, post receiver 50 disengages from post 52 after frame 32 is lowered by a sufficient amount, leaving equipment support 16 free-standing, as can be seen in FIG. 2. In the disclosed embodiment, foot pads 58 each include a castor wheel (not shown) housed in the foot pad 58. The castor wheel is disclosed to be near the outer edge of the foot pad 58 such that it is the first to contact the floor when equipment support 16 is lowered from its transport position, thereby facilitating deployment of the legs 56. However, it is within the scope of the disclosure to utilize synthetic footpads comprised of a material that glides over the floor, rather than having footpads with castor wheels. Alternatively, castors 60 may be substituted for the foot pads, as can be seen in FIG. 1. Legs 56 may or may not be collapsible. FIGS. 4-13 and 15 show alternative embodiments of various elements of an equipment management system. FIG. 4 shows a mount post 64 that extends below equipment support 16 to engage a post receiver 66 on stand 62. Illustratively, patient support device 12 also includes a post receiver 68 configured to receive end 70 of mount post 64. When it is desired to position equipment support 16 on patient support device 12 and disconnect support 16 from stand 62, end 70 is positioned over post receiver 68 and release pedal 72 is depressed on the base of stand 62. End 70 of mount post 64 is illustratively conical frustum shaped. Release pedal 72 illustratively releases a pneumatic piston inside telescoping column 74 of stand 62, thereby allowing for column 74 to retract under its own weight so that end 70 of mount post 64 can engage an aperture formed in post receiver 68. Another embodiment of a telescoping stand 162 is illustrated in FIG. 15. Illustratively, stand 162 comprises a telescoping column 164 that telescopes relative to base 166. A bearing system having bearings 168 facilitates telescoping movement in the direction of arrow 170. A control pendant (not shown) can be attached with a cord, the control pendant actuating telescoping movement of the stand 162. An emergency stop button 172 is disclosed for overriding or halting the telescoping movement. In the disclosed embodiment, a Linak LA 31 linear actuator is housed internally in the telescoping column 164, and a Linak “Jumbo” battery pack and Linak “Jumbo” control box are positioned inside housing 174, mounted on the exterior of telescoping column 164. Illustratively, telescoping stand 162 may have between 30.48 and 45.72 cm of telescoping movement. A handle 176 is also provided for horizontal movement of stand 162. Post receiver 66, as seen in FIGS. 4 and 15, illustratively comprises a substantially C-shaped cross-section that permits the passage of end 70 (shown in FIG. 4) therethrough, while being capable of engaging a collar 76 on mount post 64. Therefore, once end 70 is in place, post receiver 66 of stand 62 can be lowered below collar 76 and disengaged from mount post 64, permitting stand 62 to be moved away from patient support device 12. It should be understood that other embodiments and coupling mechanisms are within the scope of the disclosure, including the use of a protrusion instead of a collar. Post receiver 68 may be fixedly mounted on a patient support 12, or it may be horizontally movable relative to the patient support 12. Post receiver 68 may be located at any number of positions, including at the side, head end, center, or corner of patient support 12. When it is desired to again position equipment support 16 on stand 62, post receiver 66 can engage end 70 below collar 76, and lift pedal 78 can be actuated (illustratively pumped up and down) to extend telescoping column 74 upwardly to engage collar 76, lifting equipment support 16 off of patient support device 12. FIG. 5 shows an equipment support 80 having two posts 82 configured to mate with post receivers 84 coupled to frame member 36. Illustratively, a selected one of posts 82 is inserted into a selected post receiver 84, and is pivotable about an axis coaxial with the selected post 82. It should be understood that while the illustrative embodiments show post receivers on a head end of a patient support, it is within the scope of the disclosure to mount post receivers on other portions of the bed for equipment support placement at a side or foot end of a bed. It is also within the scope of the disclosure to utilize a plurality of post receivers simultaneously—for either multiple equipment supports or for an equipment support that comprises spaced apart posts that simultaneously are supported by equally spaced apart post receivers. In still another embodiment, a support arm can have an elbow or pivot joint (not shown) for further range of motion of a supported equipment support 16 about a second parallel axis. FIGS. 10-13 show additional embodiments of a stand. FIGS. 10-11 show a stand 86 having a plurality of legs 88 linked via linkage 90 to a central hub 92. Central hub 92 is configured to slide vertically on a centrally located post 94, and is biased toward the transport position by spring 96. A deployment-assist tube 98 is sleeved over post 94, such that post 94 and tube 98 are coaxial. Deployment of legs 88 occurs in the following fashion. As a result of the bias of spring 96, legs 88 remain in their transport position, shown in FIG. 10, unless outside forces act upon stand 86. When it is desired to deploy legs 88, stand 86 is pushed toward the floor such that deployment-assist tube 98 contacts the floor and begins to move axially relative to post 94. Such axial movement of tube 98 relative to post 94 causes tube 98 to urge hub 92 vertically upwardly on post 94, thereby moving linkage 90, as can be seen in FIG. 11. Each linkage 90 is pivotably mounted on one end to hub 92, and on the other end to a central portion of a leg 88. In the deployed position, shown in FIG. 11, stand 86 is maintained in the deployed position by the weight of the equipment support that would be mounted on stand 86. Once equipment support is lifted, legs 88 withdraw to the transport position as a result of the bias of spring 96. Foot pads 100 may be castors, rubber feet, slidable polymeric pads, or any other foot pad known in the art. FIGS. 12-13 show another embodiment for a stand 102. Stand 102 comprises a plurality of legs 104, each leg 104 having a four-bar linkage including a knee joint 106. Each leg 104 has a two-member upper portion 108 connected at knee joint 96 to a single-member lower portion 110. By spacing apart the connection of the two members to the single member, legs 104 of stand 102 extend farther out when deployed, covering a larger footprint with comparatively shorter legs. Illustratively, foot pads 112 coupled to distal ends of legs 104 have a polymeric composition, and are configured to slide relative to the floor and thereby facilitate the deployment of legs 104 when foot pads 112 come into contact with the floor. Another embodiment for a support arm 114 extending from a patient support 12 is shown in FIGS. 6-9. Such an embodiment can be used on any patient support, but is particularly useful on patient supports 12 having fixed intermediate frames that do not move relative to the base of the patient support 12 and that may carry headboards (not shown). In such an embodiment, a 4-bar motorized lift 116 is provided, the lift 116 illustratively having actuator buttons 118 located thereon which can be depressed by a caregiver desiring to either lower or raise equipment support 16 relative to patient support 12. As shown in the cutaway views of FIGS. 8-9, motorized lift 116 comprises a top frame member 120 and a bottom frame member 122, each frame member illustratively being a U-shaped metal beam. A patient-support mount 124 illustratively includes a post 126 for insertion into a post receiver 128 (visible in FIGS. 6-7). However, it should be understood that other configurations for a patient-support mount are within the scope of the disclosure, and motorized lift 116 could alternatively be directly mounted on a frame member of patient support 12. Frame members 120, 122 are each illustratively pivotably attached to patient-support mount 124 at one end via pins 130, 132. At the other end, frame members 120, 122 are pivotably attached to a post receiver 134 via pins 136, 138. A linear actuator 140 is illustratively coupled at one end to bottom frame member 122 via pin 132, and at the other end to top frame member 120 via pin 136. Linear actuator 140 is illustratively an electrically powered linear motor, however, it is within the scope of the disclosure to utilize any electric, pneumatic, gas powered, or other type of motor that is capable of lifting one end of a motorized lift relative to the other end. Such an illustrative linear actuator may be commercially available from Linak® as model number LA28. Linak is headquartered in Nordborg, Denmark. Illustratively, as linear actuator 140 extends, pin 136 (and consequently post receiver 134) is moved away from pin 132 (which is connected to patient-support mount 124), therefore motorized lift 116 is moved from a lowered position, such as the phone shown in phantom in FIG. 9, to a raised position, as shown in dark lines in FIG. 9. Furthermore, because top frame member 120 and bottom frame member 122 slidably move relative to each other when linear actuator 140 is actuated, post receiver 134 is caused to remain oriented so as to provide a substantially vertical support for a post 142, as seen in FIG. 9. As can be seen in FIG. 1, equipment support 16 can be mounted on a telescoping arm 20 that extends from a wall. Telescoping arm 20 may comprise a mount end 144 that is pivotable about a vertical axis 146, and a equipment-support end 148. Arm 120 may include a first segment 150 and a second segment 152 that telescopes horizontally into and out of segment 150. In addition to pivoting about axis 146 and telescoping horizontally, arm 20 may be configured so that equipment support 16 is rotatable relative to telescoping arm 20. Thus, arm 20 is configured such that equipment support 16 can be positioned at any location alongside patient support 12. Equipment support 16 is illustratively mounted on a column 154 which extends downwardly from the distal end of arm 20. Lower portion 156 of column 154 is illustratively vertically movable relative to arm 20 such that equipment support 16 can be vertically raised and lowered and selectively docked on either post receiver 50, stand 18, or wall mount 22. Posts 52 and 160 of equipment support 16 can be manufactured in various sizes as required by the application. In some applications, only a single post may be required. Illustratively, wall mount 22 is C-shaped and is attached to an inner wall of cabinet 158. The structural details of such radial arm arrangements are shown in a companion patent application entitled “Radial Arm System for Patient Care Equipment”, Attorney Docket No. 7175-74606, being filed simultaneously with this application and based on U.S. Provisional Application Ser. No. 60/455,621, filed Mar. 18, 2003 (entitled “Patient Equipment Support System”) and U.S. Provisional Application Ser. No. 60/510,756, filed Oct. 13, 2003 (entitled “Patient Equipment Support System”), the co-filed application being incorporated herein by reference. It will be appreciated that linear actuators or the like may be used to extend and retract the radial arm 20 to move column 154. Although the invention has been described in detail with reference to certain illustrative embodiments, variations and modifications exist with the scope and spirit of this disclosure as described and defined in the following claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present disclosure relates to a system for supporting patient care equipment adjacent a patient support. Hospitalized patients often require patient care equipment to be in close proximity during care. Such patient care equipment may include heart monitoring equipment, medical gas delivery equipment, infusion pumps, intra-venous bags, equipment monitors, defibrillators, and other patient care equipment, many of which directly connect to the patient via lines or tubes.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention comprises one or more of the following features or elements in the appended claims or combinations thereof. A patient care equipment management system comprises an equipment support. The equipment support may be mountable on an arm that extends from a wall, on a column depending from the arm, on a wall mount, on a stand, or on a patient support. Various methods may be used to move the equipment support upwardly and downwardly to engage and disengage the equipment support from supporting devices. A patient support typically has a base on the floor and a patient-support portion that is supported above the base and movable relative to the base between a first position and a second position that is lower than the first position. A support arm can be coupled to the patient-support portion, and the equipment support can be coupled to the other end of the support arm. The equipment support can be coupled to a stand. The stand may comprise a set of legs movable between a storage position and a use position, the legs being automatically deployed to the use position when the stand is lowered onto the floor. The support arm may be a motorized lift. The support arm may have actuator buttons that operate a linear actuator. The equipment support may have a post. A post receiver may be mounted on a distal end of the support arm. A post receiver may also be mounted on a patient support frame member, on a column supported by a wall-mounted arm, on a wall mount, or on a stand. It should be understood that while the illustrated method of coupling the equipment support to either the patient support frame member, column, wall mount, or stand shows a post mating with a post receiver, other coupling methods are within the scope of the disclosure. Therefore, it should be understood that when references to a post and a post receiver are used throughout the disclosure, such references are merely the illustrated embodiment, and in general, a first coupler may couple with a second coupler to form a support or engagement between the equipment support and the patient support frame member, the column of an arm, the wall mount, or the stand. Additional features will become apparent to those skilled in the art upon consideration of the following detailed description of illustrative embodiments exemplifying the best mode of carrying out various systems for transporting and supporting patient care equipment as presently perceived.
20040317
20060627
20050106
59549.0
0
SANTOS, ROBERT G
PATIENT CARE EQUIPMENT MANAGEMENT SYSTEM
UNDISCOUNTED
0
ACCEPTED
2,004
10,802,385
ACCEPTED
Low-clearance shutter slat
A rolling shutter and a slat for use in a rolling shutter are provided. The slat comprises an engaging track located at a first horizontal edge and a receptacle track located at a second horizontal edge. Illustratively, the engaging track has a hook-shaped profile and is disposed at an acute angle, and the receptacle track comprises a lip and a guard defining a space adapted to receive therein an engaging track of an adjacent slat.
1. A slat for use in a rolling shutter, comprising: a body portion; a first face and a second face; a first end and a second end; an upper edge and a lower edge (a first and a second horizontal edge); an engaging track wherein said engaging track is locatable at said upper edge (first horizontal edge) and runs the length of said slat; a receptacle track, wherein said receptacle track is locatable at said lower edge (second horizontal edge) and runs the length of said slat; wherein said engaging track comprises a track having a hook shaped profile and is disposed at an acute angle to the vertical axis of said slat; wherein said receptacle track comprises a lip and a guard and is adapted to receive said engaging track; whereby said slat may be articulated to a second, identical slat by slidably engaging the receptacle track of one slat with the engaging track of the second slat. 2. A slat as in claim 1 wherein said engaging track is disposed at an angle of between XX and XX to the vertical axis of said slat. 3. A slat as in claim 5, wherein said lip and said guard define an aperture similar in shape and size to said engaging track, whereby clearance between said engaging track and said receptacle track is minimized. 4. A slat as in claim 1, wherein said receptacle track further comprises a boss. 5. A slat as in claim 5, wherein said lip and said guard define an aperture running the length of said slat; and wherein said boss is locatable within said receptacle track, between said body portion and said aperture. 6. A slat as in claim 6, wherein said boss is adapted to receive a retention screw. 7. A shutter slat according to claim 1, wherein a plurality of said slats are articulated to form a roller shutter, wherein said roller shutter further comprises one or more guides, and a shutter casing.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to shutters and in particular to shutters of the roller type having improved resistance to storms and break-ins. It furthermore relates to a shutter having improved retraction capability. 2. Description of the Related Art Conventional roller shutters are designed to provide security from break-ins or protection from storms. Because such protection and security may not always be necessary or desired, such as during the day when a retail store is open for business, or during fine weather when a homeowner wishes to open windows or enjoy an ocean view, roller shutters are designed to be retractable into a casing in which they are stored. To facilitate compact storage, rigid shutter slats designed to resist hurricane winds and burglars must be capable of conforming to a roll. One conventional shutter slat is made to conform to a roll by providing a loose articulation between slats. Slats are slidably engaged at the upper edge of one slat and the lower edge of another slat. The upper edge comprises a vertical projection terminating in a hook-shaped profile. The lower edge comprises a first portion and a second portion, which define a vertical pocket. The hook-shaped profile of the upper edge allows the upper edge to engage the first portion of the lower edge, also having a hook-shaped profile. The upper edge is prevented from undesirably disengaging by the second portion of the lower edge, which comprises a guard extending downward to slightly below the hook-shaped profile of the lower edge, defining a horizontal aperture between the first and second portions of the lower edge. The vertical pocket defined by the first and second portions of the lower edge is similar in depth to the height of the vertical projection of the upper edge. This shutter configuration's flexibility arises from the pivoting of the vertical portion of the upper edge within the horizontal aperture. One result of this configuration is that the upper edge has significant vertical clearance within the vertical pocket. For a shutter according to this configuration, a clearance of one-quarter inch per slat would be expected. A shutter having 48 slats would then have a total clearance of twelve inches. To raise such a shutter, a user must lift the bottom slat either by hand or mechanically to correct for the full amount of clearance before the shutter will begin to retract. In the case of a conventional shutter having 48 slats with one-quarter inch of clearance per slat, a user would have to lift approximately 150 pounds by twelve inches in order to engage the shutter's retraction mechanism. A further result of this configuration is that the loosely articulated slats are known to be noisy. The slats rattle against each other during extension and retraction. In addition, when the roller shutter is deployed, the normal forces of the wind are sufficient to cause the slats to rattle audibly. A second conventional solution to the problem of compact storage includes integration of a boss concentric with the articulation between adjoining slats, as described in U.S. Pat. No. 6,095,225 to Miller, titled “Shutter Slat with Integrated Boss.” Slats in this configuration are also slidably engaged at the upper edge of one slat and the lower edge of another slat. The upper edge comprises a short vertical projection terminating in a c-shaped screw boss, and the lower edge comprises a c-shaped channel having a diameter sufficient to accommodate the upper edge. This shutter configuration's flexibility arises from the cooperation of the rounded internal surface of the c-shaped channel and the rounded external surface of the c-shaped screw boss. The diameter of the upper edge is smaller than the diameter of the c-shaped channel, but greater than the width of the aperture defined by the c-shaped channel, preventing the upper edge from simply falling out of the c-shaped channel provided by the lower edge. One result of this configuration is that if the exposed portion of the c-shaped channel of the lower edge gives way upon exertion of pressure on the articulation, the slats may separate undesirably. Because the retention of the upper edge by the c-shaped channel is based on a relatively small difference in size, damage to either edge may result in a breach of the curtain. For example, if a putative intruder uses a sledgehammer to dent or bend a shutter, the c-shaped channel may be forced open. Even if the channel is bent only slightly, once a gap is formed between an upper edge and a lower edge, the two slats may be pried apart with undesirably slight effort. A further result of this configuration is that in use of a concentric retention screw, the normal collection of dirt and grime around the screw may impede the flexibility of the articulation between slats. OBJECTS OF THE INVENTION It is an object of the present invention to improve the ease and smoothness of extension and retraction of the roller shutter. It is another object of the invention to provide a stable, secure connection between slats of the roller shutter and between the roller shutter and the guides, thereby improving the security and protection provided by the roller shutter. It is a further object of the invention to reduce the noise associated with extension and retraction of the roller shutter, as well as the noise associated with a deployed roller shutter. SUMMARY OF THE INVENTION According to the present invention, smooth extension and retraction of the roller shutter may be achieved with significantly less effort than required by prior art devices by minimizing the clearance between the engaging track of one shutter slat and the receptacle track of the adjacent shutter slat. There is thus provided a shutter for a building aperture comprising a plurality of shutter slats each having a first face and a second face, and a first end and a second end, and an upper and a lower horizontal edge, which are articulated to form a roller shutter having a first face and a second face, and a first end and a second end. Each shutter slat further has an engaging track and a receptacle track, which run along opposing horizontal edges of each shutter slat. The shutter further comprises two guides, with one guide locatable at either end of the roller shutter. Advantageously, clearance between engaging and receptacle tracks may be decreased by the alteration of the angle of the engaging track relative to the vertical axis of the shutter curtain. The present invention provides for the engaging track to be disposed at an acute angle to the vertical axis of an upright shutter slat. In contrast to prior art shutter slats, the angled engaging track of the present invention allows shutter slats to pivot freely while remaining securely disposed within the receptacle track. According to another aspect of the invention, the stability of the connection between engaging track and receptacle track is further improved by providing a guard along the receptacle track. Use of the guard provides protection for the lip and engaging track against damage inflicted on the first face of the roller shutter, such as by a storm or an intruder. Additionally, the security of the roller shutter within the guides is improved by the provision of a boss for a retention screw above the main pocket of the receptacle track rather than concentrically with the articulation. The retention screw, which is used to slidably mount each shutter slat on the first and second guides, is therefore shielded from external forces, including attempts to compromise the integrity of an articulation by forcing two shutter slats apart. The combination of the boss and the guard as provided in the present invention improves stability and security over the use of a concentric boss by increasing the force needed to separate an articulation between slats or separate the roller shutter from a guide. In yet another aspect of the present invention, the complementary curved profiles of the engaging and receptacle tracks combined with the reduced clearance between shutter slats will minimize the noise associated with operation and use of the roller shutter. If, as the engaging track pivots within the receptacle track, the convex interior of the engaging track contacts the concave interior of the receptacle track, the former will slide against the latter. In contrast to a loosely articulated shutter slat, the engaging track of the present invention has no flat (vertical) surfaces to rattle or clank between the first and second portions of the receptacle track. Furthermore, by configuring the receptacle track to receive a retention screw that is not concentric with the engaging track, the ordinary collection of dirt and grime around the retention screw will not cause squeaking between slats or impede the flexibility of the articulation between slats. BRIEF DESCRIPTION OF THE DRAWINGS Embodiments of the invention will now be explained in further detail by way of example only with reference to the accompanying figures, in which: FIG. 1 is a side view of a low-clearance shutter slat according to the present invention; FIG. 2 is a detailed side view of a receptacle track according to the present invention; FIG. 3 is a detailed side view of an engaging track according to the present invention; FIG. 4 is an elevation of a window aperture including a shutter according to the present invention; FIG. 5 is an elevation of a shutter slat according to the present invention; FIG. 6 is a side view of the cooperation of two shutter slats according to the present invention; FIG. 7 is a partial horizontal sectional view according to the present invention. DETAILED DESCRIPTION FIG. 5 depicts an elevation of a low-clearance shutter slat according to the present invention. Shutter slat 1 is an elongated body of single-ply extruded aluminum having a first end 15 and a second end 16, a body portion 30 bounded by an upper edge 23 and a lower edge 24, and an engaging track 4 and a receptacle track 5. FIG. 1 is a side view of a low-clearance shutter slat according to the present invention. FIG. 1 depicts a first side 2 of shutter slat 1 and a second side 3, the body portion 30, and the profile of engaging track 4 and receptacle track 5. A detail of engaging track 4 is shown in FIG. 2. Engaging track 4, located at upper edge 23 of shutter slat 1, comprises a track running the length of shutter slat 1 having a hook-shaped profile. Engaging track 4 further comprises an inner surface 6 and an outer surface 7. Engaging track 4 is disposed at an acute angle to the vertical axis of an upright shutter slat. It is to be understood that engaging track 4 could, in the alternate, be located at lower edge 24. FIG. 3 depicts a detail of receptacle track 5, located at lower edge 24. Receptacle track 5 comprises a track running the length of shutter slat 1. Receptacle track 5 further comprises a lip 8, a guard 9, and a boss 10. When the slat 1 is in a vertical position, boss 10 is located above the aperture defined by lip 8 and guard 9. Boss 10 is adapted to receive retention screw 22 (not shown). It is to be understood that receptacle track 5 could, in the alternate, be located at upper edge 23 but in any case the boss 10 would be located between the body portion of the shutter slat 1 and the aperture defined by lip 8 and guard 9. FIG. 4 shows an elevation of a plurality of shutter slats 1 according to the present invention, articulated into a roller shutter 20 which may be installed on a building aperture 25 such as a window or door. Details of building aperture 25 are not illustrated for the sake of clarity. Building aperture 25 is further equipped with a shutter casing 17 and a pair of guides 18 and 19, located on opposite lateral edges of building aperture 25. Roller shutter 20 may be rolled up for storage within shutter casing 17. FIG. 6 is a side view of the articulation of two shutter slats 1 according to the present invention. Engaging track 4 is slidably engaged within receptacle track 5 of the adjacent shutter slat 1. Inner surface 6 rests against lip 8. Guard 9 shields the connection of engaging track 4 with lip 10, preventing engaging track 4 from undesirably disengaging from receptacle track 5. Guard 9 also protects the engaging track 4 and lip 10 from exposure to forces applied to the first side 2 of shutter slat 1. Because engaging track 4 does not bear directly upon guard 9, damage to first side 2 including to guard 9 is less likely to disengage the articulation between shutter slats 1 than in prior art shutters in which an exposed portion of a lower track was weight-bearing. FIG. 7 is a partial sectional view according to the present invention. A shutter slat 1 is shown in combination with a guard 18 and a retention screw 22. A retention screw 22 is preferably inserted in boss 11 (not shown) of shutter slat 1 for use with a guide 18, 19. The head of the retention screw 22 protrudes from boss 11 and slides within a vertical guide 18, 19 provided at each end of the roller shutter 20. In this invention, the retention screw 22 does not restrict the rotation or pivoting of engaging track 4 within receptacle track 5. It is also preferred, for minimization of the rolled shutter, that the diameter of the head of the retention screw 22 is not larger than the external profile of the receptacle track 5. In contrast to prior art systems that require significant clearance at the articulation in order to allow pivoting, the angled engaging track 4 of the present invention allows shutter slat 1 to pivot freely within receptacle track 5. The resulting flexibility of the roller shutter 20 allows the roller shutter 20 to be rolled up at a favorably compact size into shutter casing 17. Modifications in addition to those described above may be made to the structures and techniques described herein without departing from the spirit and scope of the invention. Accordingly, although specific embodiments have been described, these are examples only and are not limiting on the scope of the invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to shutters and in particular to shutters of the roller type having improved resistance to storms and break-ins. It furthermore relates to a shutter having improved retraction capability. 2. Description of the Related Art Conventional roller shutters are designed to provide security from break-ins or protection from storms. Because such protection and security may not always be necessary or desired, such as during the day when a retail store is open for business, or during fine weather when a homeowner wishes to open windows or enjoy an ocean view, roller shutters are designed to be retractable into a casing in which they are stored. To facilitate compact storage, rigid shutter slats designed to resist hurricane winds and burglars must be capable of conforming to a roll. One conventional shutter slat is made to conform to a roll by providing a loose articulation between slats. Slats are slidably engaged at the upper edge of one slat and the lower edge of another slat. The upper edge comprises a vertical projection terminating in a hook-shaped profile. The lower edge comprises a first portion and a second portion, which define a vertical pocket. The hook-shaped profile of the upper edge allows the upper edge to engage the first portion of the lower edge, also having a hook-shaped profile. The upper edge is prevented from undesirably disengaging by the second portion of the lower edge, which comprises a guard extending downward to slightly below the hook-shaped profile of the lower edge, defining a horizontal aperture between the first and second portions of the lower edge. The vertical pocket defined by the first and second portions of the lower edge is similar in depth to the height of the vertical projection of the upper edge. This shutter configuration's flexibility arises from the pivoting of the vertical portion of the upper edge within the horizontal aperture. One result of this configuration is that the upper edge has significant vertical clearance within the vertical pocket. For a shutter according to this configuration, a clearance of one-quarter inch per slat would be expected. A shutter having 48 slats would then have a total clearance of twelve inches. To raise such a shutter, a user must lift the bottom slat either by hand or mechanically to correct for the full amount of clearance before the shutter will begin to retract. In the case of a conventional shutter having 48 slats with one-quarter inch of clearance per slat, a user would have to lift approximately 150 pounds by twelve inches in order to engage the shutter's retraction mechanism. A further result of this configuration is that the loosely articulated slats are known to be noisy. The slats rattle against each other during extension and retraction. In addition, when the roller shutter is deployed, the normal forces of the wind are sufficient to cause the slats to rattle audibly. A second conventional solution to the problem of compact storage includes integration of a boss concentric with the articulation between adjoining slats, as described in U.S. Pat. No. 6,095,225 to Miller, titled “Shutter Slat with Integrated Boss.” Slats in this configuration are also slidably engaged at the upper edge of one slat and the lower edge of another slat. The upper edge comprises a short vertical projection terminating in a c-shaped screw boss, and the lower edge comprises a c-shaped channel having a diameter sufficient to accommodate the upper edge. This shutter configuration's flexibility arises from the cooperation of the rounded internal surface of the c-shaped channel and the rounded external surface of the c-shaped screw boss. The diameter of the upper edge is smaller than the diameter of the c-shaped channel, but greater than the width of the aperture defined by the c-shaped channel, preventing the upper edge from simply falling out of the c-shaped channel provided by the lower edge. One result of this configuration is that if the exposed portion of the c-shaped channel of the lower edge gives way upon exertion of pressure on the articulation, the slats may separate undesirably. Because the retention of the upper edge by the c-shaped channel is based on a relatively small difference in size, damage to either edge may result in a breach of the curtain. For example, if a putative intruder uses a sledgehammer to dent or bend a shutter, the c-shaped channel may be forced open. Even if the channel is bent only slightly, once a gap is formed between an upper edge and a lower edge, the two slats may be pried apart with undesirably slight effort. A further result of this configuration is that in use of a concentric retention screw, the normal collection of dirt and grime around the screw may impede the flexibility of the articulation between slats.
<SOH> SUMMARY OF THE INVENTION <EOH>According to the present invention, smooth extension and retraction of the roller shutter may be achieved with significantly less effort than required by prior art devices by minimizing the clearance between the engaging track of one shutter slat and the receptacle track of the adjacent shutter slat. There is thus provided a shutter for a building aperture comprising a plurality of shutter slats each having a first face and a second face, and a first end and a second end, and an upper and a lower horizontal edge, which are articulated to form a roller shutter having a first face and a second face, and a first end and a second end. Each shutter slat further has an engaging track and a receptacle track, which run along opposing horizontal edges of each shutter slat. The shutter further comprises two guides, with one guide locatable at either end of the roller shutter. Advantageously, clearance between engaging and receptacle tracks may be decreased by the alteration of the angle of the engaging track relative to the vertical axis of the shutter curtain. The present invention provides for the engaging track to be disposed at an acute angle to the vertical axis of an upright shutter slat. In contrast to prior art shutter slats, the angled engaging track of the present invention allows shutter slats to pivot freely while remaining securely disposed within the receptacle track. According to another aspect of the invention, the stability of the connection between engaging track and receptacle track is further improved by providing a guard along the receptacle track. Use of the guard provides protection for the lip and engaging track against damage inflicted on the first face of the roller shutter, such as by a storm or an intruder. Additionally, the security of the roller shutter within the guides is improved by the provision of a boss for a retention screw above the main pocket of the receptacle track rather than concentrically with the articulation. The retention screw, which is used to slidably mount each shutter slat on the first and second guides, is therefore shielded from external forces, including attempts to compromise the integrity of an articulation by forcing two shutter slats apart. The combination of the boss and the guard as provided in the present invention improves stability and security over the use of a concentric boss by increasing the force needed to separate an articulation between slats or separate the roller shutter from a guide. In yet another aspect of the present invention, the complementary curved profiles of the engaging and receptacle tracks combined with the reduced clearance between shutter slats will minimize the noise associated with operation and use of the roller shutter. If, as the engaging track pivots within the receptacle track, the convex interior of the engaging track contacts the concave interior of the receptacle track, the former will slide against the latter. In contrast to a loosely articulated shutter slat, the engaging track of the present invention has no flat (vertical) surfaces to rattle or clank between the first and second portions of the receptacle track. Furthermore, by configuring the receptacle track to receive a retention screw that is not concentric with the engaging track, the ordinary collection of dirt and grime around the retention screw will not cause squeaking between slats or impede the flexibility of the articulation between slats.
20040317
20080415
20050922
77348.0
2
JOHNSON, BLAIR M
LOW-CLEARANCE SHUTTER SLAT
SMALL
0
ACCEPTED
2,004
10,802,391
ACCEPTED
Enhanced uplink dedicated channel - application protocol over lub/lur
Parameters are defined for use on an interface (lub/lur) between network elements to enable configuration setup of an enhanced radio uplink (UL E-DCH). The basic Information Elements (IEs) are defined to support UL E-DCH functionality in the network on lub/lur. Particular parameters are shown for communication over the lub/lur interface between the RNCs and the Node Bs in order to be able to setup and re-configure the UL E-DCH channel. Flexibility is provided so as not to be restricted to any particular message or information element, but to be applicable to any selected message or messages in a given protocol.
1. Method for configuring a radio uplink (136) from user equipment (160) to a network element (132), comprising the steps of: sending an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface (133, 134) between the network element and a radio network controller (130) for said configuring the radio uplink, configuring the radio uplink at the network element after signalling between the network element and the user equipment, and sending a payload packet from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. 2. The method of claim 1, further comprising the steps of: acknowledging correct reception of the payload packet at the network element on a radio downlink from the network element to the user equipment, and sending the payload packet from the network element to the radio network controller following said correct reception from the user equipment. 3. The method of claim 1, further comprising the step of sending the information element on an interface (140, 150) between the radio network controller (130) and another radio network controller (100) for relay to another network element (110) for configuring an uplink between the other network element and the user equipment. 4. A mobile telecommunications system, comprising: a network element (132) and a radio network controller (130) connected by a signalling interface (133, 134) for configuring a radio uplink (136) from a user equipment (160) to the network element (132), the interface for conveying messages having information elements containing parameters characterized in that an information element having a cell specific parameter, a radio link specific parameter, or both is conveyed in one or more messages on the interface (133,134) between the network element (132) and the radio network controller (130) for said configuring the radio uplink at the network element after signalling between the network element and the user equipment, and that a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. 5. The system of claim 4, further characterized in that reception of the payload packet is acknowledged by the network element on a radio downlink (135) from the network element to the user equipment, and that the payload packet is sent from the network element to the radio network controller following reception from the user equipment. 6. The system of claim 5, further characterized in that the information element is sent on an interface (140, 150) between the radio network controller (130) and another radio network controller (100) for relay to another network element 110. 7. A data structure for at least temporary storage in a computer readable medium, the data structure comprising an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface (133, 134; 120, 122) between a network element (132; 110) and a radio network controller (130; 100) for configuring a radio uplink from a user equipment (160) to the network element (132; 110) wherein said configuring is carried out at the network element for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. 8. The data structure of claim 7, characterized in that transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller. 9. Radio network controller (130) for configuring a radio uplink (136) from user equipment (160) to a network element (132), comprising: a first interface (133,134) for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on the first interface (133, 134) between the network element (132) and the radio network controller (130) for said configuring the radio uplink; and a second interface (140,150) for communicating the information element having a cell specific parameter, a radio link specific parameter, or both in the one or more messages on the second interface (140,150) between the radio network controller (130) and a second radio network controller (100) connected (120,122) to a second network element (110), wherein the information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages is for configuring a second radio uplink (180) between the second network element (110) and the user equipment (160), the first radio network controller (130) for receiving a payload packet from the network element (132) over the first interface (133,134), the second radio network controller (100) for receiving the payload packet from the second network element (110) after receipt by the second network element (110) from the user equipment over the second radio uplink (180), the second network element (100) for sending the payload packet received from the second network element (110) to the radio network controller (130) following the reception by the second network element from the user equipment (160) for transfer from the second network controller (100) to the first network controller (130). 10. Network element (132; 110) for receiving an uplink channel on a radio link (136; 180) from user equipment (160) to the network element, comprising: a non-radio interface (133, 134; 120,122) for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages between the network element and a radio network controller (130; 100) for configuring the uplink channel on the radio link; and a radio interface for communicating signalling relating to said configuring the uplink channel between the network element and the user equipment and for receiving a payload packet from the user equipment to the network element over the radio uplink after the configuring the uplink channel on the radio link is carried out by the network element, wherein the non-radio interface (133, 134; 120, 122) is for conveying the payload packet from the network element to the radio network controller (130; 100) following the reception by the network element (132; 110) from the user equipment (160). 11. User equipment (160) for communicating packets on an enhanced uplink from (136,180) from the user equipment to a network element (132, 110), the user equipment having a transmitter (192) and a receiver (190) together connected to an antenna for transmitting and receiving signals over a radio interface between the user equipment and the network element wherein the user equipment also includes a control (194) for processing signalling between the network element and the user equipment for configuring a radio uplink (136) from user equipment (160) to a network element (132), wherein an information element is sent having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface (133, 134) between the network element and a radio network controller (130) for the configuring the radio uplink, wherein the radio uplink is configured at the network element, the user equipment, or both, after signalling between the network element and the user equipment, and wherein a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured and then sent from the network element to the radio network controller. 12. A data structure for at least temporary storage in a computer readable medium, the data structure comprising an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface (136,138; 170,180) between a network element (132; 110) and a user equipment (160) for configuring a radio uplink from the user equipment to the network element (132; 110) wherein said configuring is carried out at the network element, the user equipment, or both, for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. 13. The data structure of claim 12, characterized in that transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller.
BACKGROUND OF THE INVENTION 1. Field the Invention The present invention relates to an enhanced mobile communications uplink (the direction of the radio link from the user equipment to the network) and, more particularly, to the content of messages needed between a third generation a radio network controller (RNC) and base station (Node B) to carry out the enhancement within a mobile communications network. 2. Discussion of Related Art To enhance the DCH (Dedicated Channel) performance, the Third Generation Partnership Project (3GPP) agreed on a Release 6 Study Item, ‘Uplink Enhancements for Dedicated Transport Channels’ in October 2002. The justification of the study item was that since the use of IP (Internet Protocol) based services is becoming more important there is an increasing demand to improve the coverage and throughput as well as to reduce delay in the uplink. Applications that could benefit from an enhanced uplink (UL E-DCH) may include services like video-clips, multimedia, e-mail, telematics, gaming, video-streaming, etc. This study item investigates enhancements that can be applied to UMTS (Universal Mobile Telecommunications System) Terrestrial Radio Access (UTRA) in order to improve the performance on uplink dedicated transport channels. The study includes the following topics related to enhanced uplink for UTRA FDD (Frequency Division Duplex) to enhance uplink performance in general or to enhance the uplink performance for background, interactive and streaming based traffic: Adaptive modulation and coding schemes Hybrid ARQ (Automatic Repeat Request) protocols Node B controlled scheduling Physical layer or higher layer signaling mechanisms to support the enhancements Fast DCH setup Shorter frame size and improved QoS (Quality of Service) This UL E-DCH can be compared to HSDPA (High Speed Downlink Packet Access) since HSDPA was for a similar enhancement in the downlink (DL). SUMMARY OF THE INVENTION In this invention disclosure, signalling over the interfaces (lub/lur) between the 3GPP radio network controller (RNC) and Node B and between RNCs, including parameters, is shown to support the air interface enhancement on UL DCHs. Currently no description can be found from 3GPP specifications or technical reports as to what kind of parameters should be added in which messages in the lub/lur application protocol to support UL E-DCH. The present invention defines the basic Information Elements (IEs), which should be provided to set up and to support E-DCH functionality in the network on lub/lur. Thus the goal of this invention is to provide general signalling methods for the lub/lur interface between the RNCs and the Node Bs in order to be able to setup and re-configure the UL E-DCH channel. It is another object to do so with maximum flexibility so as not to be restricted to any particular message, but to be later applicable to any selected message or messages in the yet undefined protocol. According to a first aspect of the present invention, a method for configuring a radio uplink from a user equipment to a network element, comprises the steps of sending an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface between the network element and a radio network controller for said configuring the radio uplink, configuring the radio uplink at the network element after signalling between the network element and the user equipment, and sending a payload packet from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. In further accord with the first aspect of the present invention, the method further comprises the steps of acknowledging correct reception of the payload packet at the network element on a radio downlink from the network element to the user equipment, and sending the payload packet from the network element to the radio network controller following the correct reception from the user equipment. In still further accord with the first aspect of the present invention, the method further comprises the step of sending the information element on an interface between the radio network controller and another radio network controller for relay to another network element for configuring an uplink between the other network element and the user equipment. According to a second aspect of the present invention, a mobile telecommunications system comprises a network element and a radio network controller connected by a signalling interface for configuring a radio uplink from a user equipment to the network element, the interface for conveying messages having information elements containing parameters, characterized in that an information element having a cell specific parameter, a radio link specific parameter, or both, is conveyed in one or more messages on the interface between the network element and the radio network controller for said configuring the radio uplink at the network element after signalling between the network element and the user equipment, and that a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. In further accord with the second aspect of the present invention, the system is further characterized in that reception of the payload packet is acknowledged by the network element on a radio downlink from the network element to the user equipment, and that the payload packet is sent from the network element to the radio network controller following the reception from the user equipment. In still further accord with the second aspect of the present invention, the system is further characterized in that the information element is sent on an interface between the radio network controller and another radio network controller for relay to another network element. According to a third aspect of the present invention, a data structure is provided for at least temporary storage in a computer readable medium, the data structure comprising an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface between a network element and a radio network controller for configuring a radio uplink from a user equipment to the network element wherein the configuring is carried out at the network element for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. In further accord with the third aspect of the present invention, the data structure is characterized in that the transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller. According to a fourth aspect of the present invention, a radio network controller for configuring a radio uplink from user equipment to a network element, comprises a first interface for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on the first interface between the network element and the radio network controller for said configuring the radio uplink; and a second interface for communicating the information element having a cell specific parameter, a radio link specific parameter, or both in the one or more messages on the second interface between the radio network controller and a second radio network controller connected to a second network element, wherein the information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages is for configuring a second radio uplink between the second network element and the user equipment, the first radio network controller for receiving a payload packet from the network element over the first interface, the second radio network controller for receiving the payload packet from the second network element after receipt by the second network element from the user equipment over the second radio uplink, the second network element for sending the payload packet received from the second network element to the radio network controller following the reception by the second network element from the user equipment for transfer from the second network controller to the first network controller. According to a fifth aspect of the present invention, a network element for receiving an uplink channel on a radio link from user equipment to the network element, comprises a non-radio interface for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages between the network element and a radio network controller for configuring the uplink channel on the radio link; and a radio interface for communicating signalling relating to the configuring the uplink channel between the network element and the user equipment and for receiving a payload packet from the user equipment to the network element over the radio uplink after the configuring the uplink channel on the radio link is carried out by the network element, wherein the non-radio interface is for conveying the payload packet from the network element to the radio network controller following the reception by the network element from the user equipment. According to a sixth aspect of the present invention, a user equipment for communicating packets on an enhanced uplink from the user equipment to a network element, the user equipment having a transmitter (192) and a receiver (190) together connected to an antenna for transmitting and receiving signals over a radio interface between the user equipment and the network element is characterized in that the user equipment also includes a control for processing signalling between the network element and the user equipment for configuring a radio uplink from the user equipment to a network element, wherein an information element is sent having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface between the network element and a radio network controller for the configuring the radio uplink, wherein the radio uplink is configured at the network element, the user equipment, or both, after signalling between the network element and the user equipment, and wherein a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured and then sent from the network element to the radio network controller. According to a seventh aspect of the present invention, a data structure for at least temporary storage in a computer readable medium, the data structure is characterized by an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface between a network element and a user equipment for configuring a radio uplink from the user equipment to the network element wherein the configuring is carried out at the network element, the user equipment, or both for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. In further accord with the seventh aspect of the present invention, the data structure is characterized in that the transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller. These and other objects, features and advantages of the present invention will become more apparent in light of a detailed description of a best mode embodiment thereof which follows, as illustrated in the accompanying drawing. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows signalling between the interfaces (lub/lur) between the 3 GPP network element called “Node B” (or “base station”) and radio network controller (RNC) and between RNCs, including parameters, according to the present invention, to support the air interface uplink enhancement. FIG. 2 shows a prior art packet transmission on a radio uplink from a User Equipment (UE) to a Radio Network Controller (RNC) via a Node B which is comparable to a base station of a second generation system and a retransmission of the packet upon receiving a negative acknowledgement from the RNC to the UE. FIG. 3 shows a proposal, according to an enhanced uplink dedicated channel (E-DCH) concept to enhance the uplink by moving the scheduler and retransmission control from the RNC to the Node B but which proposal has not yet explained the information elements and parameters needed for exchange between an RNC and a Node B and between RNCs. FIG. 4 shows a User Equipment (UE) such as the user equipment of FIGS. 1 and 3, according to the present invention. DETAILED DESCRIPTION OF INVENTION An enhanced uplink dedicated channel is currently proposed in 3GPP standardization committees in order to provide uplink enhancements for Dedicated Transport Channels. In relation to enhanced uplink for UTRA FDD (Frequency Division Duplex) uplink performance may be enhanced by improved Hybrid ARQ (Automatic Repeat Request) protocols and Node B controlled scheduling. Physical layer or higher layer signaling mechanisms may also be provided to support the enhancements. An UL E-DCH can be compared to HSDPA (High Speed Downlink Packet Access) since HSDPA was for a similar enhancement in the downlink (DL). FIG. 2 shows a payload packet sent from a User Equipment (UE) over an uplink radio interface to a base station (Node B) and from there to a Radio Network Controller (RNC) connected to the Node B by means other than a radio link. The RNC replies with a radio link control (RLC) acknowledgment, indicating either success (ACK) or failure (NACK) in receipt of the payload packet. By “payload” is meant information distinct from configuration information such as setup, scheduling or retransmission control signalling, i.e., for use by the user of the user equipment after setup or reconfiguration in an application such as a web page, video, text, etc. Thus, preceding any exchange of payload information there will be a distinct configuration setup, scheduling, or retransmission control signalling procedure. Examples of third generation signalling procedures are shown in detail in 3GPP TR 25.931 v5.1.0 (2002-06). FIG. 3 shows a proposal, according to an enhanced uplink dedicated channel (E-DCH) concept. One aspect of the improvement is to enhance the uplink by moving the acknowledgement function from the RNC to the Node B. The acknowledgement function is a known retransmission control function that is normally controlled at the RNC and need not be described here. What is important here is the network entity selected to perform this function. The E-DCH concept helps reduce delays by making the Node B take on control of this important function closer to the UE. The E-DCH proposal has not yet explained the information elements and parameters needed to be exchanged in the above-mentioned distinct signalling procedures between an RNC and a Node B, between the Node B and the user equipment, and also between RNCs in order to carry out such a change. Another aspect of the E-DCH concept is “fast” Node B configuration control for uplink scheduling/loading. In other words, instead of the RNC, the Node B would be in configuration control of scheduling and/or congestion. Again, this reduces delays. The RNC sends information about the user equipment capabilities, cell specific parametrization and user equipment specific parametrization information related to E-DCH to the Node B. The configuration capabilities signalled might for instance include the number of HARQ processes, the modulation supported, the maximum data rate, etc. The cell specific parametrization could include setting up shared control channels, allocation of hardware and power resources for E-DCH, etc. The user equipment specific parametrization could include maximum data rate RNC allows the Node B to allocate to the UE, the power offsets and signalling repetition factors to be used for signalling to that UE and by that UE etc. Generally, the user equipment may send signalling to the Node B to assist the Node B scheduler and the Node B may send signalling back to the user equipment that informs the user equipment of its data rates or limits them. Thus, the user equipment may (or may not) signal the Node B information to help the Node B scheduler. As examples, the user equipment could request a data rate from the Node B or it could just send information on how much data it has and how much transmit power it is able to use. The Node B may (or may not) signal the scheduling commands to the UE. For instance, the Node B could signal the user equipment with a (maximum) data rate. This maximum data rate might then be valid until a new one is signalled by the Node B, or for a specific time period; or, it may change according to some specific rules, e.g., related to the usage of data rates. FIG. 1 shows an exchange of information elements and parameters in such a distinct configuration signalling procedure such as a setup procedure. Configuration messages are exchanged between a Radio Network Controller (RNC) which in this case is shown as a “serving” RNC 130 and a so-called “Node B” 132, according to the present invention, for configuring an enhanced uplink dedicated channel (E-DCH) for a User Equipment 160. The Node B 132 is a third generation base station. Between the SRNC 130 and the Node B 132 is a so-called lub interface (non-radio). According to the present invention, configuration messages for E-DCH are defined for exchange over the lub interface, for example, on a signalling line 133 from the SRNC 130 to the Node B 132 and on a signalling line 134 in the reverse direction from the Node B 132 to the SRNC 130. As known in the art, when the UE moves into the range of another Node B 110 which may be connected to another RNC 100, there may be a need for communication of signalling similar to that exchanged over the lub interface lines 133,134 over a so-called lur interface between the SRNC 130 and another RNC 100 which may be designated a “drift” RNC (DRNC) connected to the other Node B 110. Between the SRNC 130 and the DRNC 100, a configuration setup message signal is shown on a line 150 from the SRNC 130 to the DRNC 100 and a configuration setup message signal in the reverse direction is shown on a line 140 between the DRNC 100 and the SRNC 130. These signals are provided over a so-called lur interface which is a non-radio interface. A message signal is shown on a line 120 from the DRNC 100 to the other Node B and a message signal in the reverse direction is shown on a line 122 from the Node B 110 to the DRNC 100. Together, these signals form another lub interface which is also a non-radio interface. For a given situation, the information elements and parameters of the present invention may be carried over one or all of these lur and lub interfaces. It should be understood that the example given is not exhaustive as will be made clear by reference to 3GPP TS 25.931. The other Node B 110 is shown in communication with the UE 160 via a radio downlink 170 and a radio uplink 180. Similarly, the Node B 132 is shown in communication with the UE 160 via a radio downlink 135 and a radio uplink 136. For background information, in third generation systems, it will thus be understood, the RNC 130 may be in communication with another RNC 100 which may, with respect to a given UE, be a Drift RNC (DRNC) or a Serving RNC (SRNC) over the so-called lur interface. The SRNC 130 of FIG. 1 is the “serving” RNC for UE 160. It is connected to other Node Bs (not shown) in other cells. The UE 160 is currently located in the cell of one of the Node Bs connected to the SRNC 130 and is in radio communication with that Node B as well as the Node B 110 because it may be in proximity to the other Node B 110. The UE 160 is currently being “served” by the SRNC 130. The UE 160 may however be travelling toward the cell of Node B 110 connected to RNC 100 (called the “drift” RNC) and could be handed over to that cell. The UE would then either be “served” by RNC 100 and RNC 100 would become the SRNC for the UE or the RNC 130 may still continue “serving” the UE i.e. functioning as SRNC and the RNC 100 would still remain as “drift” RNC. By establishing the lur interface, the third generation improves over the “hard-handover” situation of the second generation by providing the UE the ability to communicate with multiple Node Bs at the same time. A “soft-handover” is thereby enabled that does not require re-synchronization and, unlike second generation systems, makes the handover imperceptible to the user. For purposes of the present invention, however, the details of the soft handover process is secondary. The important thing here is the nature of the parameters disclosed below and transmitted in information elements contained in messages transmitted over the lur/lub interface. The message signal on the line 122 from the Node B 110 may therefore be forwarded on a line 140 to the SRNC 130. Likewise, the message signal on the line 120 from the RNC 100 most likely would have originated as a signal on a line 150 from the SRNC 130 to the RNC 100 and forwarded from there on the line 120 to the Node B 110. FIG. 4 shows the UE of FIG. 1 or FIG. 3 at a level of detail sufficient to show the elements needed to carry out the present invention. The UE 160 includes a receiver 190 responsive to the downlink 170 from the Node B 110 and the downlink 138 from the Node B 132. The UE 160 also includes a transmitter 192 for providing the uplink 180 from the UE to the Node B 110 and the uplink 136 from the UE 162 the Node B 132. A retransmission control 194 provides a signal on a line 196 to the transmitter 192 and receives a signal 198 from the receiver 190. Referring both to FIGS. 3 and 4, an acknowledge/negative acknowledge signal may be received on one or both of the downlinks 138,170 by the receiver 190 which in turn provides the received signal on the line 198 to the retransmission control 194. The retransmission control in turn evaluates the acknowledgement or negative acknowledgement signal and decides whether a retransmission is required or not. If a retransmission is required, the retransmission control sees to it that the retransmission is provided on the signal line 196 to the transmitter 192 which in turn transmits a retransmission on one or both of the uplinks 136,180. The retransmission control 194 can be viewed as a transmission control or a transmission/retransmission control. In other words, a packet is transmitted, retransmitted or both by the control 194. It should be realized that although a majority of the configuration parameters disclosed herein are disclosed in a way that is more related to how the Node B is to control the data rate of the UE, it is quite possible for the UE to control or have a role in the control of its own data rate. It can be possible for the UE control 194 to take care of not only transmission/retransmission but also data rate adjustments and timing of the transmissions based on the control information received in the downlink. The present invention discloses various information elements and parameters in general terms without necessarily specifying exactly which existing or new message signal is to be used to communicate the information elements and parameters. There are of course numerous existing messages that may be used for conveying the disclosed information elements (IEs) and parameters and some of them are mentioned hereafter as candidates but it is foreseen that others may be used as well some of which may not yet be defined. One of the more important decisions yet to be made involves which network entity, node, or element will decide the values of parameters. A radio network controller, according to the present invention, has an E-DCH configuration signalling interface comprising the information elements and parameters described in further detail below and exchanged over the lub lines 133, 134 or over the lur lines 140, 150, or both. A Node B, according to the present invention, has an E-DCH configuration signalling interface comprising the information elements and parameters described in further detail below and exchanged over the lub lines 133, 134 or 120, 122. A system, according to the present invention, has one or more radio network controllers and at least one Node B each with an E-DCH configuration signalling interface as described above and comprising the information elements and parameters described in further detail below. Depending on which network node will decide the values of the parameters, the following cases can be considered: 1) The RNC decides the value and informs Node B. Node B follows the decision. Even though the Node B may now be taking on functions that were previously the RNC's responsibility, it does not work completely independently. The RNC provides the Node B with a set of parameters according to which it should then perform these functions. One could think of the RNC as a manager and Node B as the worker working according to the guidelines and on the UEs the RNC has commanded the Node B to work on. But the manager is always right and in overall control. 2) The RNC gives the boundaries within which choices may be made by Node B. Node B can decide the value according to its present condition within the boundaries given. The RNC could signal the UE capabilities, such as its maximum supported data rate capability, to the Node B, but as well it should signal some parametrization like how Node B resources are to be allocated for E-DCH, what are the repetition factors and power offsets etc. to be used for that UE, what is the maximum data rate currently allowed by the RNC to be given to the UE, etc. 3) Node B proposes a value to RNC and RNC confirms or decides the value. (In this case RNC has freedom not to accept Node B's proposal.) 4) Node B decides the value dynamically and RNC doesn't need to know it. 5) Others can certainly be contemplated as well and these are just examples. It should be also considered whether both the UE and the network have to have the same value for a certain parameter. In this case the SRNC has to know the value of the parameter to inform it to UE via an RRC (Radio Resource Control) message. Case(1) and Case(3) can be used for this case. Case(2) is a typical procedure for a Cell specific parameter. That means RNC configures the E-DCH resource pool and Node B decides the exact value according to the air interface situation. Case(3) is valid in case that Node B knows the resource situation, the air interface condition, other E-DCH parameter usage but SRNC has to manage the overall resource situation. Since the Layer 1 concept of E-DCH is still under discussion in 3GPP and UTRAN signalling hasn't been discussed, this invention covers all the possibilities. The parameters which are proposed in this invention can be delivered to another network node (Node B or RNC) in any of the procedures listed above and the message used to carry out a given procedure can already exist in the existing lub/lur Application protocol (i.e., reuse the existing procedures) or new procedures (i.e., define new procedures and messages for E-DCH parameter delivery). According to the present invention, parameters are provided on the lub interface, the lur interface, or both, that define either cell-specific parameters, RL-specific parameters, or both, for E-DCH. Such may include but are not limited to the following parameters: (1)Prx_nrt_Node B, (2)Prx_Target, (3)Node B TFCI Threshold, (4)UE TFCI Threshold, (5)ACK-NACK Power Offset, (6)ACK-NACK Repetition Factor, (7)Rate Grant Power Offset, (8)Rate Grant Repetition Factor, (9)UE Threshold Dtx, (10)UE Threshold Dtx Delay, (11)UE Capability Information, (12)HARQ Memory Partitioning, (13)Guideline Information for Node B Scheduling, (14) QoS, (15) delay due to UE Ptx Power and (16) TrCH under Node B control. The nature of each of these parameters is explained in more detail below. To support the E-DCH in a cell, new semi-static IEs (cell related parameters) which configure E-DCH resources in a cell can be added in Cell Setup/Cell Reconfiguration procedure or Common Transport Channel Setup/Common Transport Channel Reconfiguration procedure or Physical Shared Channel Reconfiguration procedure or a new procedure. Prx_nrt_Node B Prx_Target These parameters are given to Node B by the CRNC (Controlling Radio Network Controller) to limit the Node B scheduling freedom. The meaning of each parameter will be explained below. Radio Link (RL) related IEs, to setup and re-configure E-DCH channels are listed below. The parameters conveyed on the line 130 from the SRNC to the Node B 132 can be added into a Radio Link Setup Request message, in a Radio Link Reconfiguration Prepare message, in a Radio Link Reconfiguration Request message or in some new message yet to be defined. The parameters conveyed on the line 134 from Node B 132 to SRNC 130 can be added into a Radio Link Setup Response message, a Radio Link Reconfiguration Ready message, a Radio Link Reconfiguration Response message or can be conveyed in a new message that has not yet been defined or standardized. As in the Case (3), if Node B 132 has to propose a value for a parameter, it can reuse the Radio Link Parameter Update Indication message or define a new message for delivery on the line 134 to the RNC 130. After the SRNC 130 receives the proposal from Node B 132, it can reuse the Synchronised/Unsynchronised Radio Link Reconfiguration procedure or define a new procedure. The same parameters to setup and re-configure may be exchanged between the SRNC 130 and the other Node B 110 via the DRNC 100 using the lur interface 140,150 between the SRNC 130 and the DRNC 100 and the lub interface 120,122 between the DRNC 100 and the other Node B 110. E-DCH Information Payload CRC Presence Indicator UL FP Mode ToAWS ToAWE DCH ID UL Transport Format Set DL Transport Format Set Allocation/Retention Priority Frame Handling Priority QE-Selector Unidirectional DCH Indicator Node B TFCI Threshold UE TFCI Threshold ACK PO NACK PO ACK Repetition Factor NACK Repetition Factor Rate Grant PO Rate Grant Repetition Factor Rate Request PO Rate Request Repetition Factor Guideline Information for Node B Scheduling QoS Parameters (like Traffic Handling Priority, GBR, discard timer etc.) UE Threshold Dtx UE Threshold Dtx Delay Delay due to UE Ptx Power TrCH under Node B control UE Capability Information HARQ Capacity NumOfChannel MaxAttempt RedundancyVer E-DCH Information Response DCH ID Binding ID Transport Layer Address HARQ Memory Partitioning E-DCH Information to modify: Same with E-DCH Information The meanings of IEs, which are defined in the DCH FDD Information IE group and DCH Information Response IE group, are same with the definitions in 3GPP specification. The additional IEs will be explained further below. Furthermore, the IE structure shows only one example. Thus it could be vary without contradicting the main concept of invention. Cell Specific Parameters These IEs can be included in CELL SETUP REQUEST message or/and CELL RECONFIGURATION REQUEST message or Common Transport Channel Setup message or/and Common Transport Channel Reconfiguration Request message or Physical Shared Channel Reconfiguration Request message or a new message from CRNC to Node B. IE type and Semantics Assigned IE/Group Name Presence Range Reference description Criticality Criticality E-DCH Information 0 . . . 1 YES reject >Prx_nrt_NodeB >Prx Target Prx_nrt_NodeB The Prx_nrt_NodeB IE defines the total allowable interference due to E-DCH users. Node B scheduler has to take this into account when it grants bit rates to UEs. The scheduler may not let the sum of E-DCH users' noise rise exceed this value. In principle this is the part of load reserved for E-DCH users. IE type and Semantics IE/Group Name Presence Range reference description Prx_nrt_NodeB In case the throughput based RRM is used, some other parameter than Prx_nrt_NodeB IE can be used like allowed bitrate. Which RRM algorithm will be used should be decided later. In addition to Prx nrt_NodeB, Node B needs to have knowledge to link between the data rate it will assign to UE and the consumption of Prx_nrt_NodeB as well. How Node B will obtain this information has to be decided later. Prx_Target The Prx Target IE defines the target of the total uplink load of the cell to help Node B scheduling. Thus Node B can optimize the capacity in a cell even if there are not so many E-DCH users in a cell. IE type IE/Group and Semantics Name Presence Range reference description Prx Target RL Specific Parameters The following explains RL specific parameters. Parameters from SRNC to Node B can be included in a Radio Link Setup Request message, a Radio Link Reconfiguration Prepare message, or a Radio Link Reconfiguration Request message. Otherwise a new message can be defined for E-DCH parameter delivery. Parameters from Node B to SRNC can be added in a Radio Link Setup Response message, a Radio Link Reconfiguration Ready message, or a Radio Link Reconfiguration Response message. Otherwise a new message can be defined for this purpose. Parameters which have to have the same values in both the network and the UE have to have the same values (e.g., Power Offsets, Repetition Factors, etc. . . . ) and on which Node B has better idea than SRNC, can be included in the Radio Link Parameter Update Indication message or a new message to allow Node B to be able to indicated its willingness of changing the parameter to SRNC. Since the E-DCH users are basically DCH user, basic parameters (i.e., not E-DCH specific) are already defined in the earlier release. (e.g., TFCI) Therefore in this section, only new E-DCH parameters are explained. Node B TFCI Threshold (SRNC→Node B) The Node B TFCI Threshold IE sets the maximum data rate TFC the Node B scheduler is allowed to grant to the UE. IE type and Semantics IE/Group Name Presence Range reference description Node B TFC INTEGER Threshold UE TFCI Threshold (SRNC→Node B) The UE TFCI Threshold IE sets the maximum data rate TFC the UE is allowed to use. After receiving this value from the RNC, the Node B scheduler can adjust this parameter independently and signal it to the UE in the limits of Node B TFCI Threshold. IE type and Semantics IE/Group Name Presence Range reference description UE TFC Threshold INTEGER ACK/NACK Power Offset (SRNC→Node B) The ACKNACK PO IE is assigned by SRNC as similar way than HSDPA. With this PO Node B can set the power of Hybrid ARQ ACK/NACK information transmission to the UE. Note that ACK and NACK could be signalled with different power offsets thus having a dedicated IE for ACK power offset and NACK power offset. Further this or these could be cell specific parameters applicable to all the E-DCH users or radio link specific, i.e. defined separately for each UE. IE type and Semantics IE/Group Name Presence Range reference description ACKNACK PO INTEGER ACK/NACK Repetition Factor (SRNC→Node B) The ACKNACK Repetition Factor IE is assigned by SRNC as similar way than HSDPA. It defines, how many times the Hybrid ARQ ACK/NACK is repeated. Since ACK/NACK repetition Factor for HSDPA is defined in HSDPA IE group, it is not supposed to be reused. IE type and Semantics IE/Group Name Presence Range reference description ACKNACK Repetition INTEGER Factor Rate Grant Power Offset (SRNC→Node B) The Rate Grant PO IE is assigned by SRNC as similar way than ACK/NACK PO. With this PO Node B can set the power of the scheduling related downlink signalling. This could be cell specific parameter applicable to all the E-DCH users or radio link specific, i.e. defined separately for each UE. IE type and Semantics IE/Group Name Presence Range reference description Rate Grant PO INTEGER Rate Grant Repetition Factor (SRNC→Node B) The Rate Grant Repetition Factor IE is assigned by SRNC. It defines, how many times the scheduling related downlink signalling is repeated. IE type and Semantics IE/Group Name Presence Range reference description Rate Grant Repetition INTEGER Factor Rate Request Power Offset (SRNC→Node B) The Rate Request PO IE is assigned by SRNC as similar way than ACK/NACK PO. With this PO Node B knows the power offset applied by the UE to the uplink related scheduling signalling. This parameter makes Node B receiver simpler when it acquires the uplink scheduling signalling information from UE. IE type and Semantics IE/Group Name Presence Range reference description Rate Request PO INTEGER Rate Request Repetition Factor (SRNC→Node B) The Rate Request Repetition Factor IE is assigned by SRNC. Node B will use this value when it receives Rate Request Information from UE. It defines, how many times the scheduling related uplink signalling is repeated. IE type and Semantics IE/Group Name Presence Range reference description Rate Grant Repetition INTEGER Factor UE Threshold Dtx (SRNC→Node B) The UE Threshold Dtx IE is assigned by SRNC. Node B scheduler will lower the UE TFCI Threshold to this value after the UE has been inactive for a period set by UE Threshold Dtx Delay IE type and Semantics IE/Group Name Presence Range reference description UE Threshold Dtx INTEGER UE Threshold Dtx Delay (SRNC→Node B) The UE Threshold Dtx Delay IE defines the inactivity period after which the UE should set the UE TFCI Threshold=UE Threshold Dtx after getting into DTX mode. I.e. If the UE has been inactive (not transmitting any data on E-DCH) for the duration of this delay, the Node B assumes that the UE has no data to transmit or it cannot transmit that data and can perform accordingly. IE type and Semantics IE/Group Name Presence Range reference description UE Threshold Dtx INTEGER Delay Delay Due to UE Ptx Power (SRNC→Node B) The Delay due to UE Ptx Power IE defines the period in which UE is not using the maximum bit rate due to the UE Ptx Power limitation. If the UE has not been using the maximum allowed data rate for the duration of the delay but has not been completely inactive (i.e. has transmitted some data on E-DCH during the delay but has not been using the maximum allowed data rate), for the duration of this delay, the Node B assumes that the UE is not capable of transmitting with that high a data rate due to power limitation or the UE produces data to transmit in a lower rate than would be the maximum allowed, and can perform accordingly. A proposed functionality would be to drop the maximum allowed data rate to what is indicated by ‘UE Threshold DTX’ IE. IE type and Semantics IE/Group Name Presence Range reference description Delay due to UE Ptx INTEGER Power TrCH Under Node B Control (SRNC→Node B) The TrCH under Node B control IE indicates which transport channels are under Node B scheduling control. Thus Node B can use this information for scheduling. (One Coded Composite Transport Channel (CCTrCH) may have a number of transport channels (TrCH) combined to it and it is possible that some of the TrCHs may be controllable to the Node B and some not.) IE type and Semantics IE/Group Name Presence Range reference description TrCH under Node B control UE Capabilities Information or UE Category Information (SRNC→Node B) The UE Capabilities Information IE provides information related to UE capabilities for E-DCH or alternatively the UE capabilities may be categorized and the UE category parameter can be signalled to the Node B. IE type and Semantics Assigned IE/Group Name Presence Range reference descriptions Criticality Criticality UE Capabilities — Information >Num of HARQ M Process Number of HARQ process could be one example in this IE group. And further UE Capability parameters will be defined. HARQ Memory Partitioning (Node B →SRNC) The HARQ Memory Partitioning IE provides information for HARQ memory usage. IE type and Semantics Assigned IE/Group Name Presence Range reference descriptions Criticality Criticality Num of Process M INTEGER HARQ Memory 1 . . . <max Partitioning noofHA RQproc esses> >Process Memory M INTEGER — Size Range bound Explanation Maxnoof HARQprocesses Maximum number of HARQ processes. One possible operation mode of this parameter can be that Node B, depending on the scheduler processing speed etc, decides how many ARQ processes are needed. If the TTI is 10 ms then the number of ARQ processes should be less than with the 2 ms HSDPA TTI. (There were 8 processes with HSDPA, impact of the timing of downlink signaling to be taken into account as well). Node B informs UE (via SRNC) the number of processes to be used and the memory per ARQ process. One possible way is that UE would be assuming even memory partitioning for all ARQ processes to avoid UE having to determine separately every TTI how much data with what coding can be transmitted in a given TTI. Further information to give a guideline to Node B scheduling might need. For example Transmission Delay that the UE has to expect before it is allowed to ask for a higher data rate or RLC Buffer size (or RLC Window Size) might need to be signaled to Node B. Some QoS Parameter (SRNC→Node B) To help Node B scheduling, information on which UEs have priority when scheduling the data rates, e.g. some QoS parameter (like traffic class, SPI, GBR parameter, discard timer etc. . . . ) might be needed. Referring back to FIG. 1, each of the network elements including the RNCs 100, 130, the Node Bs 110, 132 and the UE 160 will typically include a signal processor that may be a special or general-purpose signal processor. A central processing unit (CPU) may be provided along with memory devices including both permanent memory and memory for storing information temporarily. Input/output ports are provided and all of these various devices are interconnected by data, address, and control signal lines. The permanent memory may be used to store instructions coded according to a selected computer programming language for carrying out the formation of the messages described above with information elements for conveying the above-described parameters. Therefore, it should be understood that these various components within a given network element or device constitute means for implementing the interfaces disclosed above. Although the invention has been shown and described with respect to a best mode embodiment thereof, it should be understood by those skilled in the art that various changes, omissions and deletions in the form and detail of the foregoing may be made therein without departing from the spirit and scope of the invention. ABBREVIATIONS CCTrCH Coded Composite Transport Channel CRNC Control RNC (network element) E-DCH Enhanced Dedicated Channel (transport channel) FDD Frequency Division Duplex (operation mode) GBR Guaranteed Bit Rate (parameter) HARQ Hybrid Automatic Repeat Request (function) HSDPA High Speed Downlink Packet Access (concept) IE Information Element (protocol) RNC Radio Resource Controller (network element) RG Rate Grant (L1 message) RR Rate Request (L1 message) SPI Scheduling Priority Indicator (parameter) SRNC Serving RNC (network element) TrCH Transport Channel UE User Equipment (user device)
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field the Invention The present invention relates to an enhanced mobile communications uplink (the direction of the radio link from the user equipment to the network) and, more particularly, to the content of messages needed between a third generation a radio network controller (RNC) and base station (Node B) to carry out the enhancement within a mobile communications network. 2. Discussion of Related Art To enhance the DCH (Dedicated Channel) performance, the Third Generation Partnership Project (3GPP) agreed on a Release 6 Study Item, ‘Uplink Enhancements for Dedicated Transport Channels’ in October 2002. The justification of the study item was that since the use of IP (Internet Protocol) based services is becoming more important there is an increasing demand to improve the coverage and throughput as well as to reduce delay in the uplink. Applications that could benefit from an enhanced uplink (UL E-DCH) may include services like video-clips, multimedia, e-mail, telematics, gaming, video-streaming, etc. This study item investigates enhancements that can be applied to UMTS (Universal Mobile Telecommunications System) Terrestrial Radio Access (UTRA) in order to improve the performance on uplink dedicated transport channels. The study includes the following topics related to enhanced uplink for UTRA FDD (Frequency Division Duplex) to enhance uplink performance in general or to enhance the uplink performance for background, interactive and streaming based traffic: Adaptive modulation and coding schemes Hybrid ARQ (Automatic Repeat Request) protocols Node B controlled scheduling Physical layer or higher layer signaling mechanisms to support the enhancements Fast DCH setup Shorter frame size and improved QoS (Quality of Service) This UL E-DCH can be compared to HSDPA (High Speed Downlink Packet Access) since HSDPA was for a similar enhancement in the downlink (DL).
<SOH> SUMMARY OF THE INVENTION <EOH>In this invention disclosure, signalling over the interfaces (lub/lur) between the 3GPP radio network controller (RNC) and Node B and between RNCs, including parameters, is shown to support the air interface enhancement on UL DCHs. Currently no description can be found from 3GPP specifications or technical reports as to what kind of parameters should be added in which messages in the lub/lur application protocol to support UL E-DCH. The present invention defines the basic Information Elements (IEs), which should be provided to set up and to support E-DCH functionality in the network on lub/lur. Thus the goal of this invention is to provide general signalling methods for the lub/lur interface between the RNCs and the Node Bs in order to be able to setup and re-configure the UL E-DCH channel. It is another object to do so with maximum flexibility so as not to be restricted to any particular message, but to be later applicable to any selected message or messages in the yet undefined protocol. According to a first aspect of the present invention, a method for configuring a radio uplink from a user equipment to a network element, comprises the steps of sending an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface between the network element and a radio network controller for said configuring the radio uplink, configuring the radio uplink at the network element after signalling between the network element and the user equipment, and sending a payload packet from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. In further accord with the first aspect of the present invention, the method further comprises the steps of acknowledging correct reception of the payload packet at the network element on a radio downlink from the network element to the user equipment, and sending the payload packet from the network element to the radio network controller following the correct reception from the user equipment. In still further accord with the first aspect of the present invention, the method further comprises the step of sending the information element on an interface between the radio network controller and another radio network controller for relay to another network element for configuring an uplink between the other network element and the user equipment. According to a second aspect of the present invention, a mobile telecommunications system comprises a network element and a radio network controller connected by a signalling interface for configuring a radio uplink from a user equipment to the network element, the interface for conveying messages having information elements containing parameters, characterized in that an information element having a cell specific parameter, a radio link specific parameter, or both, is conveyed in one or more messages on the interface between the network element and the radio network controller for said configuring the radio uplink at the network element after signalling between the network element and the user equipment, and that a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured at the network element for sending the payload packet to the radio network controller. In further accord with the second aspect of the present invention, the system is further characterized in that reception of the payload packet is acknowledged by the network element on a radio downlink from the network element to the user equipment, and that the payload packet is sent from the network element to the radio network controller following the reception from the user equipment. In still further accord with the second aspect of the present invention, the system is further characterized in that the information element is sent on an interface between the radio network controller and another radio network controller for relay to another network element. According to a third aspect of the present invention, a data structure is provided for at least temporary storage in a computer readable medium, the data structure comprising an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface between a network element and a radio network controller for configuring a radio uplink from a user equipment to the network element wherein the configuring is carried out at the network element for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. In further accord with the third aspect of the present invention, the data structure is characterized in that the transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller. According to a fourth aspect of the present invention, a radio network controller for configuring a radio uplink from user equipment to a network element, comprises a first interface for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages on the first interface between the network element and the radio network controller for said configuring the radio uplink; and a second interface for communicating the information element having a cell specific parameter, a radio link specific parameter, or both in the one or more messages on the second interface between the radio network controller and a second radio network controller connected to a second network element, wherein the information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages is for configuring a second radio uplink between the second network element and the user equipment, the first radio network controller for receiving a payload packet from the network element over the first interface, the second radio network controller for receiving the payload packet from the second network element after receipt by the second network element from the user equipment over the second radio uplink, the second network element for sending the payload packet received from the second network element to the radio network controller following the reception by the second network element from the user equipment for transfer from the second network controller to the first network controller. According to a fifth aspect of the present invention, a network element for receiving an uplink channel on a radio link from user equipment to the network element, comprises a non-radio interface for communicating an information element having a cell specific parameter, a radio link specific parameter, or both in one or more messages between the network element and a radio network controller for configuring the uplink channel on the radio link; and a radio interface for communicating signalling relating to the configuring the uplink channel between the network element and the user equipment and for receiving a payload packet from the user equipment to the network element over the radio uplink after the configuring the uplink channel on the radio link is carried out by the network element, wherein the non-radio interface is for conveying the payload packet from the network element to the radio network controller following the reception by the network element from the user equipment. According to a sixth aspect of the present invention, a user equipment for communicating packets on an enhanced uplink from the user equipment to a network element, the user equipment having a transmitter ( 192 ) and a receiver ( 190 ) together connected to an antenna for transmitting and receiving signals over a radio interface between the user equipment and the network element is characterized in that the user equipment also includes a control for processing signalling between the network element and the user equipment for configuring a radio uplink from the user equipment to a network element, wherein an information element is sent having a cell specific parameter, a radio link specific parameter, or both in one or more messages on an interface between the network element and a radio network controller for the configuring the radio uplink, wherein the radio uplink is configured at the network element, the user equipment, or both, after signalling between the network element and the user equipment, and wherein a payload packet is sent from the user equipment to the network element over the radio uplink after the uplink is configured and then sent from the network element to the radio network controller. According to a seventh aspect of the present invention, a data structure for at least temporary storage in a computer readable medium, the data structure is characterized by an information element having a cell specific parameter, a radio link specific parameter, or both for transfer in one or more messages on an interface between a network element and a user equipment for configuring a radio uplink from the user equipment to the network element wherein the configuring is carried out at the network element, the user equipment, or both for enabling transmission of a payload packet from the user equipment to the network element over the radio uplink and from there to the radio network controller. In further accord with the seventh aspect of the present invention, the data structure is characterized in that the transmission of the payload packet from the user equipment to the network element is followed by acknowledgement of correct reception of the payload packet by the network element on a radio downlink from the network element to the user equipment and transmission of the payload packet from the network element to the radio network controller. These and other objects, features and advantages of the present invention will become more apparent in light of a detailed description of a best mode embodiment thereof which follows, as illustrated in the accompanying drawing.
20040316
20120814
20050922
63485.0
0
VU, MICHAEL T
ENHANCED UPLINK DEDICATED CHANNEL - APPLICATION PROTOCOL OVER LUB/LUR
UNDISCOUNTED
0
ACCEPTED
2,004
10,802,449
ACCEPTED
Handheld portable automatic emergency alert system and method
In one embodiment, an automated emergency alert system includes a handheld portable communication device operable to initiate communication over a wireless telecommunications network, a dynamic sensor operable to generate an acceleration profile for the device, and a memory operable to store one or more predefined acceleration profiles each associated with an emergency event. The system also includes one or more processors collectively operable to (1) receive from the dynamic sensor an acceleration profile for the device; (2) access one or more of the stored predefined acceleration profiles; (3) compare the received acceleration profile to the one or more stored predefined acceleration profiles to determine if the acceleration profile substantially matches a predefined acceleration profile; and (4) if it is determined that the acceleration profile substantially matches a stored predefined acceleration profile, initiate a communication using the network to one or more emergency call centers to notify the call center that the emergency event has occurred.
1. An automated emergency alert system, comprising: a handheld portable communication device operable to initiate communication over a wireless telecommunications network; a dynamic sensor operable to generate an acceleration profile for the handheld portable communication device; a memory operable to store one or more predefined acceleration profiles, each predefined acceleration profile associated with an emergency event; one or more processors collectively operable to: receive from the dynamic sensor an acceleration profile for the handheld portable communication device; access one or more predefined acceleration profiles stored in the memory; compare the acceleration profile received from the dynamic sensor to the one or more predefined acceleration profiles stored in the memory to determine if the acceleration profile substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles; and if it is determined that the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles stored in the memory, initiate a communication using the wireless telecommunications network to one or more emergency call centers to notify the emergency call center that the emergency event has occurred. 2. The system of claim 1, wherein the dynamic sensor comprises an on-chip accelerometer. 3. The system of claim 1, wherein the handheld portable communication device further comprises a location receiver operable to determine a location of the handheld portable communication device. 4. The system of claim 3, wherein the location receiver comprises a global positioning system (GPS) receiver. 5. The system of claim 3, wherein the one or more processors are operable to: determine a velocity of the handheld portable communication device using the location receiver; and in addition to determining whether the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile stored in the memory, use the determined velocity to determine whether an emergency event has occurred. 6. The system of claim 3, wherein the one or more processors are further operable to communicate location information identifying the location of the handheld portable communication device to the one or more emergency call centers if it is determined that the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile stored in the memory. 7. The system of claim 1, wherein one or more components in the wireless communication network are operable to determine a location of the handheld portable communication device in compliance with an enhanced 911 (E911) mandate and to communicate this location to the emergency call center. 8. The system of claim 1, wherein: the memory is further operable to store one or more prerecorded emergency event messages, each event message associated with one or more emergency events; and the one or more processors are further operable to communicate a prerecorded event message to the emergency call center when a substantial match is determined. 9. The system of claim 1, wherein: the memory is further operable to store prerecorded user information regarding a user associated with the handheld portable communication device; and the one or more processors are further operable to communicate the prerecorded user information regarding the user to the emergency call center when a substantial match is determined. 10. The system of claim 1, further comprising a temperature sensor operable to monitor a temperature near the handheld portable communication device, the one or more processors further operable to: receive from the temperature sensor temperature information regarding the temperature near the handheld portable communication device; and if the information received indicates that the temperature near the handheld portable communication device exceeds a predefined threshold temperature, communicate a message regarding the temperature to the one or more emergency call centers. 11. The system of claim 1, further comprising a water sensor operable to monitor whether the handheld portable communication device is under water, the one or more processors further operable to: receive from the water sensor information regarding whether the handheld portable communication device is under water; and if the information received indicates that the handheld portable communication device is under water, communicate a message indicating that the handheld portable communication device is under water to one or more emergency call centers. 12. A method for automated emergency alert using a handheld portable communications device operable to initiate communication over a wireless telecommunications network, comprising: storing one or more predefined acceleration profiles, each predefined acceleration profile associated with an emergency event; receiving an acceleration profile for the handheld portable communication device; accessing one or more of the stored predefined acceleration profiles; comparing the acceleration profile to the one or more stored predefined acceleration profiles to determine if the acceleration profile substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles; and if it is determined that the acceleration profile substantially matches a stored predefined acceleration profile in the one or more predefined acceleration profiles, initiating a communication using the wireless telecommunications network to one or more emergency call centers to notify the emergency call center that the emergency event has occurred. 13. The method of claim 12, comprising receiving the acceleration profile for the handheld portable communication device from an on-chip accelerometer associated with the handheld portable communication device. 14. The method of claim 12, comprising determining a location of the handheld portable communication device using a global positioning system (GPS) receiver associated with the handheld portable communication device. 15. The method of claim 14, further comprising: determining a velocity of the handheld portable communication device using a location receiver; and in addition to determining whether the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile stored in the memory, using the determined velocity to determine whether an emergency event has occurred. 16. The method of claim 14, further comprising communicating location information identifying the location of the handheld portable communication device to the one or more emergency call centers if it is determined that the acceleration profile substantially matches a predefined acceleration profile. 17. The method of claim 12, comprising: determining a location of the handheld portable communications device using one or more components in the wireless communication network operable to determine a location of the handheld portable communication device in compliance with an enhanced 911 (E911) mandate; and communicating the determined location to the emergency call center. 18. The method of claim 12, comprising: storing one or more prerecorded emergency event messages, each event message associated with one or more emergency events; and communicating a prerecorded event message to the emergency call center when a substantial match is determined. 19. The method of claim 12, further comprising: receiving information regarding the temperature near the handheld portable communication device; and if the information received indicates that the temperature near the handheld portable communication device exceeds a predefined threshold temperature, communicating a message regarding the temperature to the one or more emergency call centers. 20. The method of claim 12, further comprising: receiving information regarding whether the handheld portable communication device is under water; and if the information received indicates that the handheld portable communication device is under water, communicating a message indicating that the handheld portable communication device is under water to one or more emergency call centers.
TECHNICAL FIELD OF THE INVENTION This invention relates generally to emergency alert communication and more particularly to a handheld portable automatic emergency alert system and method. BACKGROUND Persons involved in automobile accidents, medical emergencies, or other sorts of incidents requiring an emergency response are often incapacitated or otherwise unable to place a telephone call to appropriate emergency personnel, using the emergency “911” service for example. As an illustration, a person involved in a car accident may be knocked unconscious when his or her head collides with the steering wheel as a result of the impact. In the event that an emergency occurs in an automobile, current solutions for notifying emergency personnel include the ONSTAR™ system, which may be used to summons emergency personnel if the driver or another person presses an appropriate button. Of course, if the driver is incapacitated or otherwise cannot press the button, the authorities may not be notified of the accident as quickly as desired. A related solution includes using ONSTAR™ or a similar system to automatically call an emergency dispatcher in response to the airbag in an automobile being deployed. However, these solutions are limited to automobile-based implementations and are only able to summons help in response to certain emergency events. SUMMARY OF THE INVENTION According to the present invention, certain disadvantages and problems associated with previous techniques for emergency alert communication. In one embodiment, an automated emergency alert system includes a handheld portable communication device operable to initiate communication over a wireless telecommunications network, a dynamic sensor operable to generate an acceleration profile for the handheld portable communication device, and a memory operable to store one or more predefined acceleration profiles, each predefined acceleration profile associated with an emergency event. The system also includes one or more processors collectively operable to (1) receive from the dynamic sensor an acceleration profile for the handheld portable communication device; (2) access one or more predefined acceleration profiles stored in the memory; (3) compare the acceleration profile received from the dynamic sensor to the one or more predefined acceleration profiles stored in the memory to determine if the acceleration profile substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles; and (4) if it is determined that the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles stored in the memory, initiate a communication using the wireless telecommunications network to one or more emergency call centers to notify the emergency call center that the emergency event has occurred. Particular embodiments of the present invention may provide one or more technical advantages. In certain embodiments, the handheld portable communication device comprises all the needed equipment for use in providing automated emergency alert services. In addition, the handheld portable communication device may accompany an associated user at all times and thus is not limited to emergencies occurring in a particular automobile. In addition, particular embodiments may provide alerts for types of emergencies unrelated to automobile accidents. In certain embodiments, the handheld portable communication device may identify itself and/or its associated user associated, along with location information and the information from the one or more sensors, to the emergency call center, possibly shaving precious minutes from the time it takes for emergency medical or other personnel to arrive at the scene. In certain embodiments, the handheld portable communication device may include one or more sensors for monitoring the environment of the user associated with the handheld portable communication device. For example, the handheld portable communication device may include a temperature sensor for possible detection of a fire. As another example, the handheld portable communication device may include a water sensor, which may detect whether the handheld portable communication device (and possibly the user associated with the device) is under water (e.g., because the car is under water). Therefore, particular embodiments may be able to detect many different types of emergency events. Certain embodiments of the present invention may provide some, all, or none of the above technical advantages. Certain embodiments may provide one or more other technical advantages, one or more of which may be readily apparent to those skilled in the art from the figures, descriptions, and claims included herein. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and features and advantages thereof, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which: FIG. 1 illustrates an automated cellular alert system for automatically notifying emergency personnel of an emergency; and FIG. 2 illustrates an example method for automated emergency alert using a handheld portable communications device operable to initiate communication over a wireless telecommunications network. DESCRIPTION OF EXAMPLE EMBODIMENTS FIG. 1 illustrates an automated cellular alert system 10 for automatically notifying emergency personnel of an emergency. In certain embodiments, system 10 includes a handheld portable communication device 12, a cellular or other wireless network 14, a telephone or other wireline network 16, and an emergency call center 18. Other embodiments of system 10 may be used without departing from the scope of this description. In general, handheld portable communication device 12 is operable to monitor the acceleration of device 12, to automatically detect the occurrence of an emergency event based at least on one or more acceleration profiles, and to automatically contact an emergency dispatcher associated with emergency call center 18 by making a wireless communication via wireless network 14. The term “automatically,” as used herein, generally means that the appropriate processing is substantially performed by device 12 or other suitable components of system 10. It should be understood that automatically further contemplates any suitable user interaction with system 10, if appropriate. Handheld portable communication device 12 may include any suitable device capable of engaging in wireless communication. For example, handheld portable communication device 12 may include a mobile phone, a personal digital assistant (PDA), a pager, or any other suitable handheld portable communication device capable of engaging in wireless communication. Typically, handheld portable communication device 12 is a device that a user would likely keep near his or her person when the user is mobile, or that the user could reasonably keep on his or her person under most circumstances if desired. The use of the term “handheld” to describe handheld portable communication device 12 is not meant in a literal sense and is not meant to limit handheld portable communication device 12 to those devices that can be held in a user's hand. Handheld portable communication device 12 may include one or more suitable input devices, output devices, storage media, processors, memory, or other components for receiving, processing, storing, and communicating information according to the operation of system 10. Furthermore, although the present invention focuses primarily on an embodiment in which wireless calls are automatically made by handheld portable communication device 12, the present invention contemplates handheld portable communication device 12 automatically communicating wireless emails, text messages, or any other suitable type of wireless communication according to particular needs. Wireless network 14 includes any suitable communications network operable to facilitate wireless communication. Additionally, wireless network 14 represents any suitable collection and arrangement of equipment and infrastructure for supporting and providing wireless services to subscribers. Wireless network 14 may be associated with one or more wireless service providers. Although a single wireless network 14 is illustrated, wireless network 14 may encompass any number of wireless networks supporting any number of suitable protocols. For example, wireless network 14 may encompass both digital and cellular wireless telephone networks. In general, wireless network is operable to facilitate wireless communication between handheld portable communication device 12 and one or more emergency dispatchers associated with emergency call center 18 in any suitable manner (or with any automated dispatch devices associated with emergency call center 18). In certain embodiments, wireless network 14 facilitates communication between handheld portable communication device 12 and one or more emergency dispatchers associated with emergency call center 18 that is wireless from end to end. For example, one or more emergency dispatchers associated with emergency call center 18 may be able to receive wireless communications from wireless network 14 or another suitable wireless network. In other embodiments, wireless network 14 may facilitate wireless communication and complete a connection to one or more emergency dispatchers associated with emergency call center 18 using wireline network 16. For example, one or more emergency dispatchers associated with emergency call center 18 may use communications equipment coupled to wireline network 16. Wireline network 16 may include any suitable communications network operable to facilitate wireline communication. Additionally, wireline network 16 represents any suitable collection and arrangement of equipment and infrastructure for supporting and providing wireline services to subscribers. Wireline network 16 may be associated with one or more wireline service providers. Although a single wireline network 16 is illustrated, wireline network 16 may encompass any number of wireline networks supporting any number of suitable protocols or types of wireline communication (e.g., optical). In certain embodiments, wireline network 16 includes a public switched telephone network (PSTN). Emergency call center 18 may include one or more emergency dispatchers. Although referred to as a “call center,” emergency call center 18 may include any suitable individuals, entities, or machines for receiving communications for reporting emergencies. In certain embodiments, emergency call center 18 includes an emergency 911 emergency call center. For example, emergency call center may include what is typically referred to as a Public Safety Answering Point (PSAP), which may include a dispatch office that receives 911 calls from the public. A PSAP may include a local fire or police department, an ambulance service, a regional office covering numerous services, or any other suitable office or department. In certain embodiments, emergency call center 18 may be a local dispatch call center processing emergency communications in a localized area, a regional call center processing emergency communications in a regional area, or a central call center processing calls for any number of areas having any suitable size. Additionally, although emergency dispatchers are typically humans, the present invention contemplates emergency dispatchers being automated. Emergency call center may be operable to engage in communication with wireless network 14, wireline network 16, both, or any other suitable communications network operable to facilitate wireless communication. Handheld portable communication device 12 includes a dynamic sensor 20 operable to measure acceleration, deceleration, or other suitable movement of handheld portable communication device 12. In certain embodiments, dynamic sensor 20 includes an accelerometer operable to generate an acceleration profile for handheld portable communication device 12. In certain embodiments, dynamic sensor 20 includes a silicon-based accelerometer such as an “on-chip” accelerometer. As just one example, dynamic sensor 20 may include an accelerometer such as those manufactured by ANALOG DEVICES, INC. In certain embodiments, it is desirable for dynamic sensor 20 to be a multi-axis accelerometer such that it is capable of detecting acceleration in multiple directions. Dynamic sensor 20 may be mounted on a printed circuit board within handheld portable communication device 12, although the present invention contemplates incorporating dynamic sensor 20 in handheld portable communication device 12 in any suitable manner. Dynamic sensor 20 may output data representing the measured acceleration, deceleration, or lack thereof. An acceleration profile generated by dynamic sensor 20 may represent acceleration (or deceleration) as measured over time. In certain embodiments, the acceleration profile includes one or more discretely sampled acceleration values taken at predetermined time intervals. For example, dynamic sensor 20 may only output those acceleration values that exceed a predefined threshold. As another example, dynamic sensor 20 may output acceleration values every millisecond. Another suitable component of device 10 (e.g., a processor 30 described below) may package the reported acceleration values in any suitable manner to form an acceleration profile. Although described as an acceleration profile, the acceleration profile may represent both acceleration and deceleration of handheld portable communication device 12. Dynamic sensor 20 may generate an acceleration profile for handheld portable communication device 12 substantially continuously, at regular intervals, randomly, at the request of another component of handheld portable communication device 12, when acceleration or deceleration exceeds a threshold, or in any other suitable manner according to particular needs. Suppose, for example, that handheld portable communication device 12 including dynamic sensor 20 is inside an automobile. As the car speeds up, the acceleration profile generated by dynamic sensor 20 may reflect a relatively smooth acceleration. Likewise, when the automobile slows in a normal fashion, the acceleration profile generated by dynamic sensor 20 may reflect a relatively smooth deceleration. As the car cruises at a substantially constant speed, the acceleration profile generated by dynamic sensor 20 may reflect that there is substantially no acceleration or deceleration. Suppose that the automobile is involved in an accident. The acceleration profile generated by dynamic sensor 20 may demonstrate that the automobile was involved in an accident (for example, due to rapid acceleration or deceleration, depending on whether the phone is sitting on a part such as a seat of the car or whether it is fixed on a passenger or otherwise fixed to the car). Different types of emergency events (including those other than car accidents) may result in a unique type of acceleration profile being generated by dynamic sensor 20. These different acceleration profiles may thus be used to identify that an emergency event has occurred. Handheld portable communication device 12 may include a memory 22. Memory 22 may include any type of memory suitable for use in a handheld portable communication device 12. Furthermore, the present invention contemplates memory 14 located somewhere other than in handheld portable communication device 12 but accessible to handheld portable communication device 12, such as at a cellular base station or switching center of wireless network 14 for example. Memory 22 may include any memory or database module and may take the form of volatile or non-volatile memory including, without limitation, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), removable media, flash memory, or any other suitable local or remote memory component. Memory 22 is operable to store one or more predefined acceleration profiles 24. Although a particular number of predefined acceleration profiles 24 are illustrated, the present invention contemplates memory 22 storing any suitable number of predefined acceleration profiles 24. One or more of predefined acceleration profiles 24 are each associated with a different emergency event. Although a particular number of emergency events are illustrated, the present invention contemplates memory 22 storing any suitable number of emergency events. Additionally, although predefined acceleration profiles 24 are shown as having a one-to-one relationship with corresponding emergency events, more than one predefined acceleration profile 24 may be associated with a single emergency event and more than one emergency event may be associated with a single predefined acceleration profile 24. An emergency event may include a definition of an emergency, including an identification of the emergency. For example, an identification of an emergency event may broadly identify an emergency, such as “car accident,” “fall,” or any other suitable identification of an emergency event. An identification of an emergency event may specifically identify an emergency, such as “head-on collision,” “side-impact collision,” “fall of x feet,” or any other suitable identification of an emergency event. The definition of an emergency event may include any other suitable information regarding the identified emergency. Each emergency event may be associated with one or more of the predefined acceleration profiles 24 as briefly described above. For example, a car accident may be associated with multiple predefined acceleration profiles 24. A particular type of car accident (head-on collision) may be associated with a subset of the acceleration profiles for automobile accidents, the subset including one or more predefined acceleration profiles 24. As another example, a person falling while wearing or holding handheld portable communication device 12 may be defined as an emergency event and may be associated with one or more predefined acceleration profiles 24. These acceleration profiles may be used to distinguish between normal dropping or other use of handheld portable communication device 12 and what is likely a genuine accident or emergency (as defined by emergency events). In certain embodiments, a peak absolute value of the acceleration output by dynamic sensor 20 may be used to identify the type of collision. Returning to memory 22, memory 22 may be operable to store one or more prerecorded event messages 26. In certain embodiments, each prerecorded event message 26 is associated with one or more emergency events. For example, a prerecorded event message 26 may include a prerecorded message indicating that a car accident occurred or possibly occurred. The prerecorded event message 26 may provide any suitable information at any suitable level of detail, according to particular needs. In certain embodiments, memory 22 may include a generic event message 28 that does not indicated a type of emergency event, but merely indicates that an emergency of some sort occurred or possibly occurred. As described in more detail below, one or more event messages 26 or 28 may be communicated to emergency call center 18 in the event that an emergency event is determined to have occurred. In certain embodiments, memory 22 is operable to store prerecorded user information 29 regarding a user associated with handheld portable communication device 12. For example, user information 29 may include the user's name, the user's telephone number, the user's home address, one or more contact numbers of persons associated with the user (e.g., an emergency contact person), insurance information for the user (e.g., carrier, subscriber number, coverage details, etc.), medical history information (e.g., medicines or other substances to which the user is allergic, an identification of one or more doctors of the user, existing medical conditions, current medications, etc.), the user's preferred hospital, or any other suitable information according to particular needs. As described in more detail below, user information 29 may be communicated to emergency call center 18 in the event that an emergency event is determined to have occurred. In certain embodiments, handheld portable communication device 12 includes one or more processors 30. Although a single processor 30 is illustrated, the present invention contemplates handheld portable communication device 12 including any suitable number of processors 30 collectively operable to perform the functions described herein with reference to processor 30. Processor 30 may perform these functions in conjunction with any suitable software, firmware, hardware, or combination thereof, such as software code stored in memory 22 for example. Processor 30 may be operable to receive one or more acceleration profiles for handheld portable communication device 12 from dynamic sensor 20. In certain embodiments, dynamic sensor 20 communicates an acceleration profile for handheld portable communication device 12 to processor 30 at a predetermined interval (e.g., every three seconds). In certain embodiments, dynamic sensor 20 communicates a substantially continuous acceleration profile for handheld portable communication device 12 to processor 30. In response, processor 30 may subdivide the received signal into one or more blocks of time, of a fixed length for example. In certain embodiments, dynamic sensor 20 communicates an acceleration profile to processor 30 in response to the acceleration profile reflecting that the acceleration of dynamic sensor 30 (and handheld portable communication device 12) exceeds a predetermined threshold acceleration or deceleration. For example, the predetermined threshold acceleration may help distinguish between normal dropping of the phone and more significant events (which may ultimately be determined to be an emergency event). In each of these embodiments, communication by dynamic sensor 20 may be automatic, in response to a request from processor 30, continuous or otherwise. Processor 30 may be operable to access the predefined acceleration profiles 24 stored in memory 22 in any suitable manner, according to particular needs. In certain embodiments, processor 30 accesses predefined acceleration profiles 24 in response to receiving an acceleration profile for handheld portable communication device 12 from dynamic sensor 20. Processor 30 may be operable to determine whether an emergency event has occurred. For example, processor 30 may use information such as the acceleration profiles generated by dynamic sensor 20 to determine whether an emergency event has occurred. This determination helps processor 30 determine whether a real emergency event, such as an accident of some sort, has occurred, as opposed to someone merely dropping or throwing handheld portable communication device 12 for example. In certain embodiments, processor 30 compares an acceleration profile received from dynamic sensor 20 to one or more of predefined acceleration profiles 24 stored in memory 22 to determine if the acceleration profile substantially matches a predefined acceleration profile 24. The term “substantially” is used to indicate that in certain embodiments, an exact match between the acceleration profile and a predefined acceleration profile 24 may not be required. For example, certain margins of error may be predefined and if the acceleration profile is determined to match a predefined acceleration profile 24 within those predefined margins of error, a match may still be determined to exist. In certain embodiments, processor 30 continuously monitors an acceleration profile being generated by dynamic sensor 20 and performs the comparison of the acceleration profile to the one or more prerecorded acceleration profiles when a certain triggering event occurs (e.g., the acceleration profile received from dynamic sensor 20 indicates an acceleration or deceleration exceeding a predetermined threshold). In certain embodiments, dynamic sensor 20 determines whether the acceleration profile indicates an acceleration or deceleration that exceeds a predetermined threshold before communicating an acceleration profile to processor 30, prompting processor 30 to perform the comparison. Dynamic sensor 20 may simply prompt processor 30 to retrieve an acceleration profile, from memory 22 for example. In other embodiments, processor 30 continuously processes one or more acceleration profiles generated by dynamic sensor 20. In certain embodiments, if processor 30 determines that an acceleration profile received from dynamic sensor 20 substantially matches a predefined acceleration profile 24 stored in memory 22, processor 30 may initiate a communication using wireless network 14 to an emergency call center 18. In certain embodiments, the match may be to an initial event and then within a predetermined time window, to a second event. For example, in a front-end collision in a car, device 10 may experience a first acceleration when the car experiences an impact and a secondary deceleration when the phone impacts the floor or the dashboard. These two impacts (and acceleration/deceleration) would likely be separated in time by only a few milliseconds. In certain embodiments, processor 30 initiates a wireless telephone call to emergency call center 18. For example, via the wireless telephone call to emergency call center 18, processor 30 may initiate playback of a generic prerecorded event message 28 indicating that a generic emergency event occurred, a prerecorded event message 26 specific to the determined emergency event, a prerecorded message including user information 29 regarding the user associate with handheld portable communication device 12, a combination of the above, or any other suitable messages or information according to particular needs. In certain embodiments, some or all of this prerecorded information may be communicated using a cellular baseband including the prerecorded information. In certain embodiments, processor 30 initiates a wireless email communication to dispatch call center 18. For example, processor 30 may facilitate inclusion in the wireless email to emergency call center 18 a generic event message 28 indicating that a generic emergency event occurred, an event message 26 specific to the determined emergency event, a message including user information 29 regarding the user associate with handheld portable communication device 12, a combination of the above, or any other suitable messages according to particular needs. It should be noted that although particular methods of notifying dispatch call center 18 that an accident (e.g., an emergency event) has occurred, the present invention contemplates device 12 notifying dispatch call center 18 of the accident (e.g., the emergency event) in any suitable manner. In certain embodiments, system 10 includes an ability to determine a location of handheld portable communication device 12. The location information of handheld portable communication device 12 may be reported by processor 30 or another suitable component of system 10 (e.g., a component within wireless network 14) to emergency call center 18. In certain embodiments, it is desirable for the determined location of handheld portable communication device 12 to be relatively precise. Although particular examples for providing this location capability of system 10 are described below, the location capability of system 10 may be implemented in any suitable manner, according to particular needs. In certain embodiments, one or more components within wireless network 14 include the ability to determine the location of handheld portable communication device 12. Handheld portable communication device 12, wireless network 14, emergency call center 18, and any other suitable component of system 10 may include any suitable software, hardware, or firmware components for implementing this location capability. In certain embodiments, this location capability is implemented using cellular-network-triangulation or angle-of-arrival techniques. In certain embodiments, this location capability may be implemented in a substantially similar or equivalent manner to the location capabilities required by or being implemented in response to the current Enhanced 911 (“E911”) mandate promulgated by the U.S. Federal Communication Commission (FCC). In general, the E911 mandate sets out in two phases various deadlines for wireless service providers to implement required technology and services for providing 911 dispatchers with additional information for wireless 911 calls. For example, Phase I requires reporting of the telephone number of a 911 wireless caller and the location of the antenna that received the 911 call. Phase II requires more precise location information of the 911 wireless caller, within fifty meters for sixty-seven percent of calls and within one hundred fifty meters for ninty-five percent of calls. In certain embodiments, handheld portable communication device 12 includes a location receiver 40 operable to facilitate a determination of a location of handheld portable communication device 12. For example, in certain embodiments, location receiver 40 includes a global positioning system (GPS) receiver. Although an embodiment in which location receiver 40 includes a GPS receiver is primarily described, the present invention contemplates location receiver 40 including any suitable type of receiver operable to facilitate a determination of a relatively precise location of handheld portable communication device 12 (e.g., a receiver operable to function in a global navigation satellite system (GLONASS) or other suitable navigation system. In an example in which location receiver 40 includes a GPS receiver or other relatively precise location-determining receiver, location receiver 40 may receive signals from one or more satellites 42 to determine a relatively precise location of handheld portable communication device 12. The determined relatively precise location information may be communicated by processor 30 or another suitable component of handheld portable communication device 12 to emergency call center 18, if appropriate. In certain embodiments, location receiver 40 continuously or at another suitable interval receives and processes signals from one or more satellites 42 to determine the location of handheld portable communication device 12. In certain embodiments, processor 30, in response to determining that an emergency event has occurred, may invoke location receiver 40 to perform steps for determining the location of handheld portable communications device 12 (e.g., by receiving the signal from one or more satellites 42). In certain embodiments, processor 30 may use the location information obtained by location receiver 40 (e.g., in an embodiment in which location receiver 40 is a GPS receiver) to help determine whether an emergency event has occurred. For example, processor 30 may determine a velocity of handheld portable communication device 12 using the location information. To determine the average velocity over a time interval, location receiver 40 may communicate location information to processor 30 at a regular interval (i.e., either automatically or in response to requests from processor 30), and processor 30 may use the location information to calculate the velocity as the quotient of the change in distance (a second reported location minus a first reported location) and the change in time (the time when the second reported location was generated or received minus the time when the first reported location was generated or received). In certain embodiments, the change in time variable of the equation may be assumed to be the regular interval (e.g., every five seconds) at which location information is received. In certain embodiments, determined velocity information may be included as part of an acceleration profile. Processor 30 may use this information, in addition to acceleration information, to determine whether or what type of an emergency event has occurred. For example, if handheld communication device 12 is traveling at sixty miles per hour just prior to the time when a rapid acceleration or deceleration is indicated by the acceleration profile, it very likely that handheld portable communication device 12 was in some sort of automated transportation. Similarly, if the velocity of handheld portable communication device 12 resumes to a substantially similar rate just after a rapid acceleration or deceleration is indicated by dynamic sensor 20, it is less likely that handheld portable communication device 12 was involved in an collision (e.g., perhaps it was just thrown by someone in the automobile). Using the location information in addition to the acceleration information may help reduce or eliminate false alarms (i.e. determinations that an emergency event occurred, when in fact it did not). In certain embodiments, handheld portable communication device 12 includes a temperature sensor 50 operable to monitor the temperature at or near handheld portable communication device 12. Processor 30 may receive from temperature sensor 50 information regarding the temperature at or near handheld portable communication device 12. In certain embodiments, if the temperature information indicates that the temperature at or near handheld portable communication device 12 exceeds a predefined threshold temperature, processor 30 may communicate a message regarding the temperature to emergency call center 18. The predefined threshold temperature may include a minimum temperature, a maximum temperature, or both, and may be stored in memory 22. For example, the predefined threshold temperature may be two hundred degrees Fahrenheit, although the present invention contemplates any suitable predefined threshold temperature. Thus, in certain embodiments, temperature sensor 50 may be useful for monitoring the environment after an emergency event, such as a car accident, is determined to have occurred, possibly for detecting a fire. In certain embodiments, handheld portable communication device 12 includes a water sensor 60 operable to monitor whether handheld portable communication device 12 is under water. Processor 30 may receive from water sensor 60 information regarding whether handheld portable communication device 12 is under water. In certain embodiments, if the information received from water sensor 60 indicates that handheld portable communication device 12 is under water, processor 30 may communicate a message regarding the underwater status to emergency call center 18. Thus, in certain embodiments, water sensor 60 may be useful for monitoring the environment after an emergency event, such as a car accident, is determined to have occurred, possibly for detecting that a user of handheld portable communication device 12 is now under water. In certain embodiments, it may be desirable for handheld portable communication device to be somewhat water resistant to increase the chances that processor 30 can communicate a message regarding the underwater status to emergency call center 18. In certain embodiments, all of these notification functions are performed without user intervention. In certain embodiments, device 10 emits a warning signal that a notification is about to be communicated to an emergency call center 18. A CANCEL or other suitable button may be included on device 10, which may be used in the event that a notification should not be communicated or to abort a communication that is currently being sent. As an example, a time limit (e.g., five seconds) may be predefined such that a user must cancel initiation of the call within the predefined time limit after the warning signal is emitted or the notification will be communicated. In certain embodiments, device 10 includes a microphone, which may be operable to “listen” to the environment around device 10. Information to which the microphone “listens” may be recorded, if appropriate. The microphone may also help determine whether an emergency event occurred. For example, if the microphone “hears” the air bag deploy, this may provide confirmation that an emergency event occurred. In certain embodiments, a connection between device 10 and emergency call center 18 may be maintained after an emergency notification call is placed, such that a dispatcher can hear what is happening around device 10. Particular embodiments of the present invention may provide one or more technical advantages. In certain embodiments, handheld portable communication device 12 comprises all the needed equipment for use in providing automated emergency alert services. In addition, handheld portable communication device 12 may accompany an associated user at all times and thus is not limited to emergencies occurring in a particular automobile. In addition, particular embodiments may provide alerts for types of emergencies unrelated to automobile accidents. In certain embodiments, handheld portable communication device 12 may identify itself and/or its associated user, along with location information and the information from the one or more sensors, to emergency call center 18, possibly shaving precious minutes from the time it takes for emergency medical or other personnel to arrive at the scene. In certain embodiments, handheld portable communication device 12 may include one or more sensors for monitoring the environment of the user associated with the handheld portable communication device. For example, handheld portable communication device 12 may include temperature sensor 50 for possible detection of a fire. As another example, handheld portable communication device 12 may include water sensor 60, which may detect whether handheld portable communication device 12 (and possibly the user associated with device 12) is under water (e.g., because the car is under water). Therefore, particular embodiments may be able to detect many different types of emergency events. FIG. 2 illustrates an example method for automated emergency alert using a handheld portable communications device 10 operable to initiate communication over a wireless telecommunications network 14. At step 100, dynamic sensor 20 generates an acceleration profile for handheld portable communication device 12. Dynamic sensor 20 may generate an acceleration profile for handheld portable communication device 12 substantially continuously, at regular intervals, randomly, at the request of another component of handheld portable communication device 12, or in any other suitable manner according to particular needs. At step 102, processor 30 may receive from dynamic sensor 20 an acceleration profile for handheld portable communication device 12. As described in more detail above with reference to FIG. 1, processor 30 may receive an acceleration profile from dynamic sensor 20 at a predetermined interval (e.g., every three seconds), substantially continuously, or at any other suitable interval. At step 104, processor 30 may access predefined acceleration profiles 24 stored in memory 22. At step 106, processor 30 may compare the acceleration profile received for handheld portable communication device 12 from dynamic sensor 20 to one or more predefined acceleration profiles 24 stored in memory 22 to determine whether the acceleration profile substantially matches a predefined acceleration profile 24. In certain embodiments, processor 30 continuously monitors an acceleration profile being generated by dynamic sensor 20 and performs the comparison of the acceleration profile to the one or more prerecorded acceleration profiles when a certain triggering event occurs (e.g., the acceleration profile received from dynamic sensor 20 indicates an acceleration or deceleration exceeding a predetermined threshold). In certain embodiments, dynamic sensor 20 determines whether the acceleration profile indicates an acceleration or deceleration that exceeds a predetermined threshold before communicating an acceleration profile to processor 30, prompting processor 30 to perform the comparison. Dynamic sensor 20 may simply prompt processor 30 to retrieve an acceleration profile, from memory 22 for example. In other embodiments, processor 30 substantially continuously monitors one or more acceleration profiles generated by dynamic sensor 20. In yet another embodiment, the acceleration or deceleration of device 10 may trigger a call to a wireless link associated with the automobile in order to report the status of the automobile. For example, if device 10 has just accelerated or decelerated, then information that the engine has stopped or that the airbags have been deployed could be conveyed to device 10 by the automobile for emergency notification. At step 108, if a substantial match is determined, then at step 110, processor 30 may initiate a communication using wireless communication network 14 to one or more emergency call centers 18 to notify the one or more emergency call centers that the emergency event has occurred. This communication may be performed in any suitable manner and may include any suitable information, as described above with reference to FIG. 1. If no match is determined at step 108, then the method may end. This method may be repeated continually or each time an acceleration profile is generated. Although a particular method for automated emergency alert using a handheld portable communications device 12 has been described with reference to FIG. 2, the present invention contemplates any suitable method for automated emergency alert using a handheld portable communications device 12 in accordance with the present invention. Thus, certain of the steps described with reference to FIG. 2 may take place simultaneously and/or in different orders than as shown. Moreover, handheld portable communication device 12 may use methods with additional steps, fewer steps, and/or different steps, so long as the methods remain appropriate. For example, processor 30 may determine a location of handheld portable communication device 12, using one or more components of wireless communication network 14 or a location sensor 40 for example. Processor 30 may use this determined location information, or other information determined using this location information (e.g., velocity), to help determine whether an emergency event has occurred. As another example, processor 30 may, using temperature sensor 50 or water sensor 60, substantially continuously monitor the environment around handheld portable communication device 12. As another example, the processor 30 may use information from the automobile provided via a wireless connection, using BLUETOOTH™, for example, to fuse with information generated by one or more of dynamic sensor 20, temperature sensor 50, and water sensor 60. Although the present invention has been described with several embodiments, diverse changes, substitutions, variations, alterations, and modifications may be suggested to one skilled in the art, and it is intended that the invention encompass all such changes, substitutions, variations, alterations, and modifications as fall within the spirit and scope of the appended claims.
<SOH> BACKGROUND <EOH>Persons involved in automobile accidents, medical emergencies, or other sorts of incidents requiring an emergency response are often incapacitated or otherwise unable to place a telephone call to appropriate emergency personnel, using the emergency “911” service for example. As an illustration, a person involved in a car accident may be knocked unconscious when his or her head collides with the steering wheel as a result of the impact. In the event that an emergency occurs in an automobile, current solutions for notifying emergency personnel include the ONSTAR™ system, which may be used to summons emergency personnel if the driver or another person presses an appropriate button. Of course, if the driver is incapacitated or otherwise cannot press the button, the authorities may not be notified of the accident as quickly as desired. A related solution includes using ONSTAR™ or a similar system to automatically call an emergency dispatcher in response to the airbag in an automobile being deployed. However, these solutions are limited to automobile-based implementations and are only able to summons help in response to certain emergency events.
<SOH> SUMMARY OF THE INVENTION <EOH>According to the present invention, certain disadvantages and problems associated with previous techniques for emergency alert communication. In one embodiment, an automated emergency alert system includes a handheld portable communication device operable to initiate communication over a wireless telecommunications network, a dynamic sensor operable to generate an acceleration profile for the handheld portable communication device, and a memory operable to store one or more predefined acceleration profiles, each predefined acceleration profile associated with an emergency event. The system also includes one or more processors collectively operable to (1) receive from the dynamic sensor an acceleration profile for the handheld portable communication device; (2) access one or more predefined acceleration profiles stored in the memory; (3) compare the acceleration profile received from the dynamic sensor to the one or more predefined acceleration profiles stored in the memory to determine if the acceleration profile substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles; and (4) if it is determined that the acceleration profile received from the dynamic sensor substantially matches a predefined acceleration profile in the one or more predefined acceleration profiles stored in the memory, initiate a communication using the wireless telecommunications network to one or more emergency call centers to notify the emergency call center that the emergency event has occurred. Particular embodiments of the present invention may provide one or more technical advantages. In certain embodiments, the handheld portable communication device comprises all the needed equipment for use in providing automated emergency alert services. In addition, the handheld portable communication device may accompany an associated user at all times and thus is not limited to emergencies occurring in a particular automobile. In addition, particular embodiments may provide alerts for types of emergencies unrelated to automobile accidents. In certain embodiments, the handheld portable communication device may identify itself and/or its associated user associated, along with location information and the information from the one or more sensors, to the emergency call center, possibly shaving precious minutes from the time it takes for emergency medical or other personnel to arrive at the scene. In certain embodiments, the handheld portable communication device may include one or more sensors for monitoring the environment of the user associated with the handheld portable communication device. For example, the handheld portable communication device may include a temperature sensor for possible detection of a fire. As another example, the handheld portable communication device may include a water sensor, which may detect whether the handheld portable communication device (and possibly the user associated with the device) is under water (e.g., because the car is under water). Therefore, particular embodiments may be able to detect many different types of emergency events. Certain embodiments of the present invention may provide some, all, or none of the above technical advantages. Certain embodiments may provide one or more other technical advantages, one or more of which may be readily apparent to those skilled in the art from the figures, descriptions, and claims included herein.
20040316
20070220
20050922
58820.0
0
D AGOSTA, STEPHEN M
HANDHELD PORTABLE AUTOMATIC EMERGENCY ALERT SYSTEM AND METHOD
UNDISCOUNTED
0
ACCEPTED
2,004
10,802,527
ACCEPTED
Method and system for path change root-cause identification in packet networks
A method and system for identifying the root-cause event that affected a path change in a multi-area Internet protocol (IP) autonomous system (AS) operated according to a link state routing protocol such as the Open Shortest Path First (OSPF) protocol is disclosed. The method and system may enable a user, such as a network administrator, to explicitly identify which routing protocol events are responsible for changes to paths that are being monitored.
1. A method for determining whether a network event changes a monitored path within an area of a multi-area routing domain, comprising: receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain, wherein the path is associated with a destination address; maintaining a set of current candidate exit points out of a first area in the domain, wherein the candidate exit points are associated with the destination address; determining whether the first network event caused the path to change; and if the first network event caused the path to change, identifying the network event as a cause for the path to change. 2. The method of claim 1, wherein the determining step comprises: identifying a set of taken exit points within the set of current candidate exit points; and determining whether the set of taken exit points changed after the occurrence of the network event. 3. The method of claim 1, wherein the determining step comprises: maintaining a set of shortest paths associated with the current candidate exit points; determining whether the set of shortest paths changed after the occurrence of the network event. 4. The method of claim 1, wherein if the first network event did not cause the path to change, receiving one or more second network events and repeating the determining and generating steps for the one or more second network events. 5. The method of claim 2 wherein a node in the first area is identified as a candidate exit point for a path in the area and towards a destination address if the node advertises in the area a longest matching route for the address. 6. The method of claim 2 wherein a node in the first area is identified as a taken exit point for a path in the area and towards a destination address if the node is a candidate exit point and is the actual exit point from the area used to reach the destination address. 7. The method of claim 1 further comprising determining whether the network event comprises shortest path events and exit point events. 8. The method of claim 1, wherein: network events classified as shortest path events are used to determine if the shortest paths of exit points in the set of candidate exit points have been affected; and network events classified as either shortest path events or exit point events are used to determine if the set of taken exit points or their shortest paths have been affected. 9. A method for identifying a root-cause event responsible for a change to a path within a multi-area routing domain, comprising: receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain; maintaining a set of current candidate exit points for the path out of a first area; determining whether the first network event is a shortest path event or an exit point event; if the first network event is an exit point event, determining whether a set of taken exit points associated with the path has changed in response to the event; and if the first network event is a shortest path event, determining whether the network event has changed either the set of taken exit points or a shortest path associated with at least one of the taken exit points. 10. The method of claim 9 wherein a node in the first area is identified as a candidate exit point for a path in the area and towards a destination address if the node advertises a longest matching route for the address in the area. 11. The method of claim 9 wherein a node in the first area is identified as a taken exit point for a path in the area and towards a destination address if the node is a candidate exit point and is the actual exit point from the area on a minimum total cost path used to reach the destination address. 12. The method of claim 9 wherein the network event is identified as the root-cause for a path change if either of the determining steps identifies the network event as having affected the set of taken exit points or their shortest paths. 13. The method of claim 9 wherein the step of determining whether the network event is a shortest path event or an exit point event comprises: establishing if the first network event may affect any shortest path of any exit point in the set of current candidate exit points; recomputing the shortest paths that may have been affected by the network event; comparing the recomputed shortest paths to the original shortest paths to determine whether any shortest paths have changed; and determining if the set of exit points taken by the path to exit the area has changed. 13. The method of claim 9 further comprising identifying the first network event as a root-cause for a path change if method identifies the network event as having affected either the set of taken exit points or their shortest paths. 14. The method of claim 12 wherein the establishing step comprises: classifying the shortest path event in one of at least four categories; if the network event is classified in a first category, further checking if the network event affected a link of a shortest path to a candidate exit point, and recomputing the shortest path if it did; if the network event is classified in a second category, further checking if the network event affected a link of a shortest path to a candidate exit point, and recomputing the shortest path if it did not; if the network event is classified in a third category, recomputing the shortest paths of all candidate exit points in the set of candidate exit points and; if the network event is classified in a fourth category, further checking if the shortest path event affected a link or a node of a shortest path to a candidate exit point, and recomputing the shortest path if it did. 15. The method of claim 14 wherein a network event is classified in the first category if it corresponds to an increase in the cost of a link in the area. 16. The method of claim 13 wherein a network event is classified in the second category if it corresponds to a decrease in the cost of a link in the area. 17. The method of claim 14 wherein a network event is classified in the third category if it corresponds to a link coming up in the area. 18. The method of claim 14 wherein a network event is classified in the fourth category if it corresponds to a link going down in the area. 19. The method of claim 12 wherein the determining step comprises: extracting a set of chosen exit points from the set of candidate exit points; determining if the set of chosen exit points has changed; if the set of chosen exit points has not changed, identifying if the shortest paths of the chosen exit points have changed; if either the set of chosen exit points or their shortest paths have changed, identifying the set of taken exit points used by the path to exit the area; if the set of taken exit points used by the path to exit the area or their shortest paths have changed identifying the shortest path event as the root-cause for a path change. 20. The method of claim 19 wherein the step of extracting the set of chosen exit points from the set of candidate exit points comprises: computing for each candidate exit point a total cost to the destination by adding the cost of the shortest path to the candidate exit point to the cost from the candidate exit point to the destination; identifying the candidate exit points that correspond to the minimum total cost to the destination; selecting as chosen exit points candidate exit points that have a minimum total cost to the destination. 21. The method of claim 12 wherein the determining step comprises: determining if the exit point event is a change of cost for reaching the destination through one of the candidate exit points that affects the selection of taken exit points for the area; identifying if the exit point event corresponds to the advertisement of a best matching route that affects the selection of taken exit points from the area. 22. The method of claim 21 wherein the determining step comprises: determining if the exit point event is a cost decrease on a chosen exit point or a cost increase on a non-chosen exit point; if the exit point event is neither a cost decrease on a chosen exit point nor a cost increase on a non-chosen exit point, updating the total cost of the paths to the destination through the candidate exit points affected by the exit point event; identifying the set of chosen exit points; if the set of chosen exit points have changed, identifying the set of taken exit points and their shortest paths; examining if the set of taken exit points or their shortest paths have changed. 23. The method of claim 21 wherein the identifying step comprises: deciding if the exit point event is a best matching route for the destination address; updating the set of candidate exit points based on the best matching route for the destination address; determining if the set of candidate exit points have changed; if the set of candidate exit points has changed, computing shortest paths to the new candidate exit points and selecting chosen exit points; determining if the set of chosen exit points has changed or if new candidate exit points belong to the shortest paths of chosen exit points; identifying taking exit points and their shortest paths; examining if the set of taken exit points or their shortest paths have changed.
TECHNICAL FIELD The invention described herein generally relates to methods and systems for determining the underlying root cause behind a path change in a packet communication network, such as an Internet Protocol (IP) routing domain or Autonomous System. More particularly, the invention relates to methods and systems for determining an event that triggered the change of a path (set of links and nodes) in a communication network, such as when forwarding of packets in the communication network is determined according to an IP routing protocol. BACKGROUND An Internet Protocol (IP) network is a large distributed system in which individual routers automatically adjust their decisions on how to forward packets based on information they learn from their neighbors about the state of the network. This design permits rapid recovery in case of link or router failures by allowing affected routers to re-route packets around the failure as soon as they discover it. The Routing Information Protocol (RIP), the Open Shortest Path First (OSPF) or the Intermediate System to Intermediate System (IS-IS) routing protocols are commonly used embodiments of this design. However, the distributed mode of operation of such routing protocols makes it difficult for a network administrator to have a global view of the network at any given time, and in particular of how traffic is traversing the network. Because of this, many of the network management functions that are available for networks based on more traditional technologies, e.g., connection-oriented networks, such as frame relay or asynchronous transfer mode (ATM), are difficult if not impossible to replicate in IP networks. For example, in a connection-oriented network, the state associated with each connection/user provides the network administrator with a ready handle for identifying which changes affect its path. In contrast, in IP networks, because packet forwarding decisions are local to each router, there is no state associated with the path taken by the packets belonging to a given user flow. As a result, it is difficult to precisely identify which network events are responsible for a change in the paths actually taken by those packets. This difficulty is further compounded by the distributed routing decisions used by IP networks, which often result in network events influencing the choice of paths used by flows that are far remote from the network location where the event originated. For example, a link failure in one area may affect a path originating in a remote area by shifting its exit point out of that remote area from one router to another router, even though there were no events that directly impacted the path inside that remote area. Similarly, a new route advertised by a router in one area may shift the flow of traffic in another area on the other side of the network, simply because this new route becomes the more attractive exit point to reach a given set of destinations. As a consequence, it is difficult in IP networks to easily identify what network event is responsible for a given path change and determine which paths may be affected by a given network event. Accordingly, it is desirable to provide an improved method and system for monitoring and tracking the set of interfaces or links through which traffic from specific customer flows as it traverses an IP network. The following is provided as additional background information about the Internet and Internet routing protocols to help the reader understand the context of the present invention: The Internet is a global network that includes multiple interconnected smaller networks or Autonomous Systems (AS), also called routing domains. The delivery of packets across this Interconnection of Networks is carried out under the responsibility of the IP protocol suite. In particular, routing protocols are responsible for allowing routers to determine how best to forward packets toward their destination. Internet routing protocols can be divided into intra-domain and inter-domain routing protocols, with inter-domain routing protocols communicating information between ASs, while intra-domain routing protocols are responsible for determining the forwarding of packets within each AS. The Routing Internet Protocol (RIP), Open Shortest Paths First (OSPF) and Intermediate System to Intermediate System (IS-IS) protocols are examples of intra-domain routing protocols, while the Border Gateway Protocol (BGP) is an example of an inter-domain routing protocol. This general architecture and the associated suite of protocols are rapidly becoming the de facto technology on which modern communication networks are built. This dominance extends from simple local area networks to large-scale, international carrier networks, and is largely due to the robustness and efficiency of networks built using it. In particular, IP networks are often referred to as “connectionless”, as packet forwarding decisions are made individually by each router based solely on address information carried in the packet and on the router's local routing table. The routing table of a router is built independently of packet forwarding and is based on information it receives from its neighboring routers regarding the set of destinations they can reach. In other words, a router's routing table contains enough information to enable it to determine where to forward any packet it may receive so that the packet is ultimately delivered to its intended destination. This information is present without the need for the establishment of a connection ahead of time, hence the connectionless characterization of IP networks. The content of a router's routing table commonly consists of route entries together with a next hop that identifies the link or node towards which packets associated with the route should be forwarded. A route entry is itself usually made-up of a subnet number and a subnet mask that together identify the set of addresses for which the route is a match. The route 16.2.25.0/24 is an example of a route with subnet number 16.2.25.0 and an associated subnet mask of 24 bits that have the following binary representations: 00010000.00000010.00011001.00000000 and 11111111.11111111.11111111.00000000, respectively, where the last 8 trailing 0's indicate “don't care” bits that are ignored when determining if a route matches a given address. A route is deemed a match for an address if, after eliminating the address bits that fall outside of the subnet mask, the remaining address bits match the corresponding subnet number bits. For example, the route 16.2.25.0/24 is a match for address 16.2.25.7, as the subnet mask of 24 of the route specifies that only the first 24 bits of the address need to be considered (the last 8 bits are ignored) when comparing address bits and subnet bits to determine if there is a match. Upon receipt of a packet, a router uses the destination address carried in the packet itself to perform a longest prefix match against entries contained in its routing table. The longest matching prefix identifies the route that has the largest number of matching bits, when matching is done as described above. For example, considering again the address 16.2.25.7 and the two route entries 16.2.25.0/24 and 16.2.0.0/16 that are both matches for this address, the longest prefix match is found to be the route 16.2.25.0/24 as it shares its first 24 bits with the address instead of only the first 16 bits as is the case for route 16.2.0.0/16. SUMMARY The present application describes an improved method and/or system for identifying an event or events responsible for a change affecting a path in a packet network, such as a packet network that is operated according to the Internet Protocol (IP). In accordance with one embodiment, a method for determining whether a network event changes a monitored path within an area of a multi-area routing domain includes the step of receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain. The path is associated with a destination address. The method also includes maintaining a set of current candidate exit points out of a first area in the domain. The candidate exit points are associated with the destination address. The method also includes determining whether the first network event caused the path to change and, if the first network event caused the path to change, identifying the network event as a cause for the path to change. In accordance with an alternate embodiment, a method for identifying a root-cause event responsible for a change to a path within a multi-area routing domain includes the steps of: (i) receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain; (ii) maintaining a set of current candidate exit points for the path out of a first area; (iii) determining whether the first network event is a shortest path event or an exit point event; and (iv) (a) if the first network event is an exit point event, determining whether a set of taken exit points associated with the path has changed in response to the event; or (b) if the first network event is a shortest path event, determining whether the network event has changed either the set of taken exit points or a shortest path associated with at least one of the taken exit points. There have thus been outlined the more important features of the invention in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are, of course, additional features of the invention that will be described below and which will form the subject matter of the claims appended hereto. In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein, as well as the abstract, are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for the designing of other structures, methods, and systems for carrying out the several purposes of the present invention. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates an exemplary AS, or routing domain, where an embodiment of the present invention may be applied. FIG. 2 identifies an exemplary path 200 between a source 201 in area 1 and a destination identified as 202 in area 2. FIG. 3 illustrates a simple instance of a change to path 200 of FIG. 2 between a source 201 in area 1 and the longest prefix matching route 202 in area 2 for packets originated by source 201. FIG. 4 identifies another instance of a modification to path 200 between source 201 in area 1 and the longest prefix matching route 202 in area 2 for packets originated by source 201. FIG. 5 presents yet another instance of a change to path 200 between source 201 in area 1 and the longest prefix matching route 202 in area 2 for packets originated by source 201. FIG. 6 is a process flow diagram that illustrates an exemplary sequence of steps performed by a path change root-cause identification module in order to determine if a routing protocol event is the root cause of a path change in accordance with the present invention. FIG. 7 is a process flow diagram that illustrates an exemplary sequence of steps performed by a path change root-cause identification module in order to determine if a routing protocol event within a routing area affected a path. FIG. 8 is a process flow diagram that illustrates an exemplary sequence of steps performed by a path change root-cause identification module in order to determine if a routing protocol event within a routing area affected the set of exit points out of the area that are taken by a path or how those exit points are reached. FIG. 9 is a process flow diagram that illustrates an exemplary sequence of steps performed by a path change root-cause identification module in order to determine if a routing protocol event outside a routing area affected the set of exit points out of the area that are taken by a path or how those exit points are reached. FIG. 10 illustrates an exemplary computing device and carrier. FIG. 11 is a block diagram of exemplary internal hardware of the computer of FIG. 10. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS OF THE INVENTION An embodiment of the present invention provides an improved method and/or system for identifying, in real-time, the event or events that are responsible for a change in the path followed by packets as they traverse an IP routing domain. The present invention may allow a network administrator, network monitoring system, or other human or automated user to quickly and/or immediately identify the root-cause of any change that is affecting the flow of traffic through the network. In other words, an embodiment pinpoints in real-time the reason why packets between a given source and destination suddenly shift from using one set of links and nodes to using a different set of links and nodes. Because of the distributed process on which IP routing relies, changes that occur in one part of the network can affect routing decisions in areas that are remote from where the initial event took place. Thus, the ability to quickly and/or immediately identify the specific network event that resulted in a change in how packets are forwarded through the network can help rapidly resolve potential performance detracting problems. For example, consider the exemplary routing domain illustrated in FIG. 1, which consists of two areas, area 1 and area 2, that certain links and routers are connected through two ABRs, router 40 and router 41. Each area summarizes its internal routing information before communicating to the other area. Exchange of summarized routing information between the two areas is performed by Area Border Routers (ABRs) 40 and 41. The two ABRs process the routing information they receive from their respective neighbors in each area, namely, router 18 in area 1 and routers 42 and 43 in area 2 for router 40; and router 17 in area 1 and routers 42 and 46 in area 2 for router 41. Each ABR may then summarize the result of their processing of routing information in one area, and advertising this summary into the other area. For example, based on the information it receives from routers 42 and 46 in area 2, router 41 may first determine how to forward packets addressed to destinations advertised by routers in area 2, and then summarize the results of those route computations and advertises them to router 17 over link 35 in area 1. A symmetric process may be followed by router 41 to advertise routing information from area 1 into area 2. Based on the advertisement of summary routing information in area 1 by the two ABRs, routers 40 and 41, other routers in area 1 may make routing decisions on how to reach remote destinations reachable in area 2. Conversely, routers in area 2 may make routing decisions on how to reach remote destinations reachable in area 1 using the summary routing information advertised in area 2 by the two ABRs, routers 40 and 41. FIG. 2 provides an example of a traffic flow originating at source 201 in area 1 and addressed to a destination address for which the longest prefix matching route is route 202 in area 2, so that the path for packets belonging to this traffic flow will be determined based on both routing information local to each area, and summary routing information for area 2 that is advertised into area 1 by the two ABRs, routers 40 and 41. Path 200 crosses both area 1 and area 2 and includes a set of routers (11, 16, 17, 41, 46, and 47 connected by links (28, 33, 35, 58 and 63) across which the packets originating at source 201 and delivered by router 47 that advertised reachability to route 202 that corresponds to the longest prefix match for the destination address of packets originated by source 201. Router 11 may receive packets from source 201 over access link 110 and use the destination address carried in the packets to identify, typically through a longest prefix match, the best matching destination (route 202 in this case), and determine where to forward the packets next. The determination of where to forward packets with address for which route 202 is the longest prefix match may result from the route computation process performed at router 11. Since route 202 is a remote route that is located outside of area 1 where router 11 resides, the computation of how to forward packets destined to route 202 may involve the use of the summary routing information about area 2 advertised by the two ABRs 40 and 41 into area 1. Specifically, router 11 may consider the summary information advertised by the two ABRs, routers 40 and 41, regarding their ability to reach destination 202 in area 2 together with routing information local to area 1 on how to reach both router 40 and router 41. Using the compounding of those sources of information, router 11 may compute the shortest path to reach route 202, and determine that it, therefore, needs to forward the packets onto link 28 towards router 16. The full path 200 taken by packets sent from source 201 in this example is shown in FIG. 2, and it includes the following set of links and nodes: 201-110-<11>-28-<16>-33-<17>-35-<41>-58-<46>-63-<47>-111-202. The path 200 represents the concatenation of the individual routing decisions made by each router along the way, as they match the destination address carried in the packets with the longest matching prefix route entry in their routing table, and accordingly decide where to forward the packets next. In an embodiment, the invention may provide an improved method and/or system for allowing a user or network administrator to readily identify the event that was responsible for a change in a path that is currently monitored. In an embodiment, the identification of the underlying root-cause event can be performed in real-time, quickly and/or immediately after being notified of the path change. This functionality is provided in conjunction with the ability to identify and track paths through an IP network based on the monitoring of routing information exchanged by routers in the network. An example of an operational system offering such an ability to track paths described in the co-pending patent application Ser. No. 09/997,420 entitled “Method and System for Path Identification in Packet Networks,” which is incorporated herein by reference in its entirety. As a result, it is desirable although not necessary to combine the path monitoring and root-cause identification capabilities. Consider the example of FIG. 2 with path 200 originating at source 201 and headed towards route 202 attached to router 47 in area 2, which represents the current longest prefix matching route for the destination address carried in the packets originated by source 201. FIG. 3 describes a simple example of a change to the path 200 of FIG. 2. The change is triggered by the failure of link 33 between routers 16 and 17 in area 1. The failure of the link triggers the generation of a number of routing updates in area 1 that are used by the routers in area 1 to re-compute shortest paths to routes and routers known in area 1. In particular, routers 11 and 16 both determine that the shortest path to route 202 is still through router 41, but path 200 now gets around the failed link 33 by using link 29 to router 15 and then link 30 to get back to router 17 as shown in FIG. 3. Path 200 then continues as before from router 17 until it reaches route 202 in area 2. In this simple example, the root-cause event for the change of path 200 is the failure of link 33, as it is identified in the associated routing advertisements received by routers in area 1. FIG. 4 illustrates another example scenario, where this time a link failure in area 2 changes the path 200 of FIG. 2 in both area 1 and area 2. Specifically, link 58 between routers 41 and 46 fails or otherwise becomes unavailable, which results in an increase of the distance for reaching route 202 from router 41. This change is in turn advertised by router 41 into area 1 as part of its summary routing information about area 2. Because router 40 did not use link 58 to reach route 202, in this example it does not affect the summary routing information it advertises into area 1 regarding its ability to reach route 202. Because of the updates in summary routing information advertised in area 1 that the failure of link 58 generated, routers in area 1 use those updates as triggers to reconsider how they forward packets addressed to destinations in area 2. This failure affects not only how path 200 traverses area 2 but also how it traverses area 1. Specifically, the failure of link 58 in area 2 results in the selection of a different exit point from area 1 which therefore affects the set of links and routers used by path 200 in both area 1 and area 2. In particular, router 11 determines that router 40 is the new exit point from area 1 as it is the exit router that now offers the shortest path towards route 202. Note that in the case of router 11, the selection of router 40 instead of router 41 as the new exit point from area 1 does not affect its forwarding decisions for packets addressed to destinations in area 2, since it still forwards them on link 28 to router 16. A similar determination is also made by routers 16, 17, and 18 that are also on the path between router 11 and router 40. As a result, the path 200 taken by packets originating from source 201 and addressed to a destination for which route 202 advertised in area 2 by router 47 represents the longest prefix matching route, now exits area 1 through router 40 instead of router 41, and consists of the following set of links and nodes: 201-110-<11>-28-<16>-33-<17>-32-<18>-34-<40>-52-<42>-57-<45>-60-<47>-111-202. The root-cause event for the change of path 200 in area 1 is the updated summary routing information advertised by router 41 that reflects the new larger distance for reaching route 202 from router 41 because of the failure of link 58. In area 2, the root-cause for the change of path 200 is the failure of link 58 itself as it gets reported in area 2 by routing protocol events that are typically in the form of advertisements that originate from the routers connected to the failed link, namely, routers 41 and 46 in the case of the failure of link 58. FIG. 5 illustrates yet another example of a change that affects the path 200 of FIG. 2. In this instance, the change is the advertisement of a more specific route, route 203, by router 43 for the destination address of the packets generated by source 201. In other words, route 203 is now the longest prefix matching route for the destination address and replaces route 202 advertised by router 47. Because route 203 is advertised by a different router, router 43, than router 47 that advertised the previous longest prefix matching route, route 202, this new route advertisement results in a path change for the packets originating from source 201 and carrying a destination address for which the new route 203 is now the longest prefix match. As a result of this advertisement the sets of links and routers used by path 200 in both area 1 and area 2 are again affected. Specifically, the new route 203 gets advertised in both area 1 and area 2, so that routers in each area are able to compute their shortest path to route 203 or rather to router 43 that advertises it. In the case of routers 11, 16, 17, and 18, they all identify router 40 as the exit point from area 1 that results in a shortest path to route 203. Similarly, router 40 determines that its shortest path to route 203 and its advertising router 43 is over its direct link 50 connecting it to router 43. The new set of links and nodes used by path 200 from source 201 to the new longest prefix matching route 203 after all routers have updated their routing tables upon receiving the routing advertisements notifying them of the presence of route 203 is as follows: 201-110-<11>-28-<16>-33-<17>-32-<18>-34-<40>-52-<42>-50-<43>-112-203. In this particular instance, the root-cause for the change to path 200 is the advertisement of the new, more specific route 203 by router 43. As the various examples of path changes described in FIG. 3, FIG. 4, and FIG. 5 have demonstrated, there are many possible causes for path changes in IP networks that can each affect different portions of a path and propagate across areas. To pinpointing the root-cause event that triggered a path change, therefore, we have determined that it is useful to track and analyze the routing protocol updates received in different areas of the network and to assess their impact on paths that are being monitored. In order to identify the root-cause of a path change, in an embodiment the method and/or system will evaluate how a routing protocol event affects a monitored path. This may involve determining whether or not a routing protocol event impacts key characteristics of the monitored path. A path that is being monitored may be identified by a source node, a destination address, and a set of links and routers through which packets travel from the source node towards the destination address. A path may span multiple areas, and within each area that it traverses it may be characterized using a number of key elements that provide a handle on determining if the path is affected by a given routing protocol event, and therefore identify root-cause events. Within a given area, a path or a segment of a path located in the area may be associated with several key elements that together determine how it traverses the area. The source node or entry point in the area and the destination address are two such elements. The source node identifies the entry point of the path segment into the area, while the destination address is used to select the best matching route for the address in the area. The best matching route in turn identifies another set of key elements, namely, a list of exit points from the area. An exit point corresponds to a router in the area that either provides direct access to the best matching route, or that connects to another area or routing domain through which the best matching route can be reached. The initial set of exit points may be referred to as the set of candidate exit points, where the term candidate reflects the fact that not all exit points in the list will ultimately be part of the path segment. In an embodiment, the candidate exit points are associated with all routers that advertise a best matching route for a destination. For example, as shown in FIG. 2, both routers 40 and 41 are candidate exit points for the segment of path 200 that lies in area 1, as both can be used to exit area 1 and reach route 202 in area 2. However, only router 41 is actually on path 200 that is followed by packets. The determination of which exit points are ultimately taken by a path is a function of the total cost for reaching the best matching route when using a given exit point. In particular, the routing decisions made by routers may amount to selecting the exit points that yield the smallest overall cost from themselves to the destination. Those decisions typically involve computing the shortest or minimum cost path between the router and the exit points, and selecting the one(s) that yield the smallest total overall cost obtained by adding the cost of the shortest path to the exit point to the cost reaching the best matching route from the exit point. The outcome of this process identifies a set of chosen exit points from the initial set of candidate exit points. In other words, the chosen exit points are those exit points in the set of candidate exit points that are associated with a least cost path. Because the selection criteria used by the routing protocol for choosing exit points relies on minimizing the total cost to the destination, in an embodiment routers generally make consistent decisions and forward packets towards the same exit points. This is why in the example of path 200 in FIG. 2, routers 11, 16, and 17 forward packets on the their shortest path to router 41 that they have all identified as the exit point from area 1 that yields the smallest total cost for reaching the best matching route 202. However, it is occasionally possible for a path to exit an area through a candidate exit point that was actually not one of the chosen exit points. This typically occurs when, for example, the candidate exit point is itself on the shortest path to the chosen exit point, and local decisions at the candidate exit point supercede the initial selection of the chosen exit point. Further, since there may be multiple least cost paths, there may be multiple chosen exit points. As a result, correct emulation of the forwarding decisions made by routers in an area, and therefore the accurate identification of the path followed by packets through the area, in an embodiment the method and/or system may specify the set of taken exit points in addition to the sets of candidate exit points and chosen exit points. Each packet will travel across at least one of the taken exit points. However, since there may be many packets traveling through a network at any one time, different packets may travel across different taken exit points. Path segments within an area can, therefore, be characterized by their source node and their sets of exit points (candidate, chosen, and taken exit points). The nodes and links used by the path segment in the area between the source node and the taken exit points may be identified through Shortest Path Graphs (SPGs) that may be constructed during the shortest path computations performed to determine the path of minimum total cost for reaching the destination. Based on this characterization of path segments in an area, in an embodiment routing protocol events can be seen to affect a path segment in an area if and only if they either impact SPGs to candidate exit points (SPG events), or modify the characteristics of the sets of exit points (exit point events). More specifically, SPG events are events that are internal to an area and affect edges or nodes in the graph representing the set of routers and links connecting them in the area. Those events have the ability to impact the shortest path between any two points within the area, and can, therefore, affect the path currently followed by the traffic flow through the area. Examples of SPG events may include links or nodes going down or coming up as well as cost changes on links. Exit point events are events that can affect the selection of exit points from the current area. Examples of exit point events include all events that affect the best matching route for the destination address, be they in the form of the advertisement of a new better matching route, the withdrawal of the current best matching route or a change of its cost or the cost for reaching it from one of the candidate exit points. For example, the routing protocol events of FIG. 3 that advertise the failure of link 33 affect the SPG to exit point 41. Hence, it corresponds to an SPG event. Conversely, as illustrated in FIG. 4, the failure of link 58 in area 2 changes the cost advertised by exit point 41 to reach the best matching route 202 in area 2, which in turn changes the selection of chosen exit points in area 1 from router 41 to router 40 and results in a path change. The failure of link 58 in area 2, therefore, triggers the generation of an exit point even in area 1, namely, the change of the cost advertised by exit point 41 to reach the best matching route 202 in area 2. Similarly, the advertisement of a new best matching route 203 attached to router 43 in area 2 also triggers exit point events in area 1, because it changes both the identity and the costs advertised by the candidate exit points in area 1, routers 40 and 41, of the best matching route for the destination address of the packets generated by source 201. This in turns changes the selection of the chosen exit point from router 41 to router 40, and therefore affects the path segment in area 1. The process of identifying the root cause event for a path change can, therefore, be performed by classifying routing protocol events as either SPG events or exit point events and subsequently flagging them as the root cause if it is determined that the path has indeed changed. One possible embodiment of this process and of the steps that it may include are illustrated in FIG. 6, where we use the notation EXIT(TRUE) and EXIT(FALSE) to identify the termination (EXIT) of the root-cause identification process and whether (TRUE) or not (FALSE) the trigger event is the root cause event of a path change within a given area. Referring to FIG. 6, the exemplary process starts in step 120 upon receipt of a routing protocol event and proceeds with a first check on the type of event in step 121. The determination of the event type can be readily performed by examining the routing protocol event and classifying into either an SPG event or an exit point event according to the above criteria describing the two types of events. If the event is identified to be an exit point event, the Y branch is followed to decision box 130 that further determines if the set of taken exit points has changed. If the set of taken exit points has changed, the Y branch of decision box 130 is followed into the termination box 132 that identifies the original routing protocol event as the root-cause of the path change. Conversely, if the set of taken exit points did not change, the N branch of decision box 132 is followed into termination box 131 that identifies that no path change is associated with the routing protocol event. If the routing protocol event was determined not to be an exit point event, in this embodiment the N branch is followed out of decision box 121 into decision box 122 that further determines if the event affected the SPG of any of the candidate exit points. If the event did not affect any of the SPGs, the process terminates by exiting decision box 122 through its N branch into termination box 123 that identifies that no path change is associated with the routing protocol event. Otherwise, the Y branch is followed out of decision box 122 into box 124 that recomputes the SPGs that were identified as having been possibly affected by the routing protocol event. The outcome of that computation is fed to decision box 125 that determines if any of the SPGs to candidate exit points were actually changed. Such a determination may be performed by using a simple signature for each SPG that may, for example, be computed using a standard hash function on the set of nodes and links that belong to the SPG. If none of the SPGs has changed, the process terminates by exiting decision box 125 through its N branch into termination box 126 that identifies that no path change is associated with the routing protocol event. Otherwise, the Y branch is followed out of decision box 125 into decision box 127 that further checks to determine if the SPG changes actually affected either the set of taken exit points or were changes to SPGs associated with current taken exit points. If the answer to the check performed by decision box 127 is no, it is exited through its N exit branch and enters termination box 126 that identifies that no path change is associated with the routing protocol event. Otherwise, the Y branch of decision box 127 is followed into the termination box 132 that identifies the original routing protocol event as the root-cause of the path change. Several of the intermediate steps of FIG. 6, in particular decision boxes 122, 127, and 130, may involve checking whether or not an SPG event affects any of the SPGs to exit points, as well as checking whether or not the set of taken exit points changed, and we detail next possible approaches for performing those steps. We consider first the case of SPG events that can be classified or categorized into four different types of categories: (1) a cost increase on an existing link; (2) a cost decrease on an existing link; (3) an up event (i.e., a new link becoming available); and (4) a down event (i.e., a loss of a link due to a failure or other reason). Up and down events are associated with links or nodes coming up or down, respectively, within an area. In some embodiments, a down event may be considered the same as the cost of a link increasing to a predetermined level or to an infinite level. The impact of SPG events varies according to their type, and we describe next one possible simple procedure that can be used to determine if an SPG event affects a given SPG. An SPG is said to be affected by an SPG event if the event results in a change in the set of nodes or links that comprise the SPG. Optionally, an SPG can be considered affected even if none of its nodes and links change and its cost changes. An example of such a procedure is shown in FIG. 7, and it may be used to perform the function of decision box 122 (see FIG. 6), simply by applying it multiple times to the SPGs of all the candidate exit points. Referring to FIG. 7, the exemplary procedure starts in start box 140 and proceeds to check if the SPG event is of type 1 (link cost increase) in decision box 141. If the SPG event is of type 1, decision box 142 is entered through the Y branch of decision box 141, and further checks if the link associated to the SPG event belongs to the SPG. In case it does not, the procedure terminates in termination box 143. Otherwise, the Y branch of decision box 142 is followed into box 149 that proceeds to recompute the SPG and the procedure then terminates in termination box 150. Note that in this embodiment, the function of box 149 is functionally comparable to that of box 124 in FIG. 6, except for the fact that it applies to only one SPG, while box 124 in FIG. 6 contemplates performing multiple SPG computations. Either approach may be used based on performance considerations. Returning to the procedure of FIG. 7, if the SPG event is determined not to be of type 1 in decision box 141, the procedure enters decision box 144 through the N branch of decision box 141, where it checks whether the SPG event is of type 2 (link cost decrease). If the SPG event is of type 2, decision box 145 is entered through the Y branch of decision box 144, and further checks if the link associated to the SPG event belongs to the SPG. In case it does, the procedure terminates in termination box 146. Otherwise, the N branch of decision box 145 is followed into box 149 that proceeds to recompute the SPG and the procedure then terminates in termination box 150. If the SPG event is determined not to be of type 2 in decision box 144, the procedure enters decision box 147 through the N branch of decision box 144, where it is checked whether the SPG event is of type 3. If the SPG event is of type 3, the N branch of decision box 147 is followed into box 149 that proceeds to recompute the SPG and the procedure then terminates in termination box 150. If the SPG event is determined not to be of type 3 in decision box 147, the procedure enters decision box 148 through the N branch of decision box 147, where it is checked if the link or node associated with the SPG event is on the SPG. If the link or node associated with the SPG event is on the SPG, the Y branch of decision box 148 is followed into box 149 that proceeds to recompute the SPG and the procedure then terminates in termination box 150. Otherwise, the procedure directly terminates in termination box 151. Cases where the procedure of FIG. 7 terminates in termination box 151 may essentially correspond to cases that proceed to decision box 125 in FIG. 6. In the presence of changes to any of the SPGs, the Y branch of decision box 125 is used to enter decision box 127, and we now describe a possible procedure for performing the decision process of decision box 127. The procedure assumes that SPGs that may have been affected by the SPG event have been recomputed either in step 124 of FIG. 6 or in step 149 of FIG. 7, and that some of the SPGs have actually experienced some change (Y branch of decision box 125). However, because not all candidate exit points are part of the path that was used prior to receiving the SPG event, a change in the SPG of one of the candidate exit points need not translate into an actual change to the current path. A goal of the procedure of decision box 127 may, therefore, be to determine whether or not that is the case, and examples of its different steps are shown in FIG. 8. Referring to FIG. 8, the exemplary procedure starts in box 160 and proceeds to decision box 161 that determines if the set of chosen exit points has been affected by the SPG changes. This can be readily obtained by computing the total path cost for all candidate exit points, and selecting the exit points that yield the minimum total cost. As discussed earlier, the total path cost for a given candidate exit point is the sum of its SPG cost and the cost through it for reaching the best matching route to the destination address. If the set of chosen exit points has not changed, decision box 162 is entered through the N branch out of decision box 161, and it is checked whether the SPGs of the chosen exit points have themselves changed. When either decision box 161 or decision box 162 is exited through their Y branch, box 163 is entered and the new set of taken exit points is identified. This identification can be readily performed by traversing the set of links and nodes on the SPGs of the chosen exit points, specifically those that have changed or whose SPG has changed, and determine the actual taken exit points and their SPGs. Once the identification step 163 has been performed, decision box 164 is entered to determine if the set of taken exit points or their SPGs have changed. This can be readily determined from the results of step 163 as it identifies both the new taken exit points and their SPGs that may, therefore, be compared to the previous ones. The handling of exit point events as carried out in decision box 130 of FIG. 6 is somewhat different from that of SPG events, and we now proceed with the description of a possible procedure for handling exit point events. The impact of exit point events varies based on both the type of entities they describe and the type of change they are reporting. In the context of a specific protocol such as the OSPF protocol, exit points for a given address can be broadly categorized as “local,” “remote” and “external.” A “local” exit point corresponds to a best matching route that is in the same area as the current area of the path, and is associated with the router to which the route is attached. In reference to FIG. 1, router 14 in area 1 advertises reachability to local route 71, so that router 14 represents a local exit point for paths in area 1 that are associated with destination addresses for which route 71 is a best matching route. A “remote” exit point corresponds to a best matching route located in another area and is associated with the local router that advertises reachability to that remote route. In reference to FIG. 1, router 45 in area 2 advertises reachability to local route 72, so that routers 40 and 41 that both advertise in area 1 reachability to route 72 represent remote exit points for paths in area 1 that are associated with destination addresses for which route 72 is a best matching route. For the purpose of path computation and root-cause identification, local and remote exit points can usually be handled similarly. Finally, an “external” exit point can either correspond to a best matching external route located in another routing domain and is associated with a local (in the current area of the path) router that advertises reachability to this external route, or correspond to a remote router (in another area) that advertises reachability to a best matching external route located in another routing domain and is associated with a local router that advertises reachability to this remote router. In reference to FIG. 1, router 11 in area 1 advertises reachability to external route 73 that is located in a different routing domain, so that router 11 represents an external exit point for paths in area 1 that are associated with destination addresses for which external route 73 is a best matching route. Similarly, router 46 in area 2 advertises reachability to external route 74 that is located in a different routing domain, so that routers 40 and 41 that both advertise in area 1 their ability to reach router 46 represent external exit points for paths in area 1 that are associated with destination addresses for which external route 74 advertised by router 46 is a best matching route. Exit point events may identify new exit points, the deletion of an existing exit point, and/or a change in the cost associated with an exit point. A new exit point may itself be associated with a route that is an equal match or a better match for the destination address of the path than the routes associated with the current exit points. A new exit point that is associated with a new, better matching route may essentially remove all previous exit points that were associated with routes that were not as good a match as the new route. Similarly, the deletion of an exit point may, if it is the last one, trigger the selection of several new exit points that are associated with the next best matching route for the destination address. A change in cost for an existing exit point may result in its inclusion or removal from the lists of chosen and taken exit points, depending on how it affects its total cost to the destination. FIG. 9 describes a possible procedure for assessing the impact of exit point events and identifying those that are root-cause events for path changes. Referring to FIG. 9, the exemplary procedure starts upon exiting decision box 121 in FIG. 6 through its Y branch that identifies the new routing protocol event as an exit point event, and embodies the steps involved in performing the function of decision box 130 in FIG. 6. This starting point of this procedure is identified as box 170 in FIG. 9. The procedure first proceeds to classify the exit point events in either one of three categories using decision boxes 171, 172, and 173. The Y exit branches of those three decision boxes respectively identify exit point events as either a cost change on an existing candidate exit point, an event announcing a new better matching route that can, therefore, modify the set of candidate exit points, and an event announcing a new route that is an equal match as the current best matching route and that can, therefore, augment the set of candidate exit points. We describe next exemplary processing associated with each one of those types of exit point events. When the exit point event is a cost change on an existing candidate exit point that affects the cost to reach the current best matching route from that exit point, decision box 174 may be entered to determine if the cost change corresponds to a cost decrease for a chosen exit point. If it is, termination box 192 may be entered through the Y branch out of decision box 174, and the event may be identified as not being a root-cause event for a path change. Else, decision box 179 may be entered through the N branch out of decision box 174 where it may then be checked if the cost change was a cost increase for a candidate exit point that was not a chosen exit point. If it was, termination box 192 may be entered through the Y branch out of decision box 179, and the event may be identified as not being a root-cause event for a path change. Else, box 184 may be entered through the N branch out of decision box 179 and the total path cost of the candidate exit points affected by the cost change may be updated. This may be done by adding the cost of the SPG to a candidate exit point and the updated cost from the candidate exit point to the current best matching route. Once the total path cost of affected candidate exit points has been updated, box 185 may be entered and the set of chosen exit points is updated. This may again be done by selecting candidate exit points that yield the smallest total cost according to the routing protocol rules. Next, decision box 187 may be entered and it is checked whether the set of chosen exit points has been modified. If the set of chosen exit points has not been modified, termination box 192 may be entered through the N branch out of decision box 187, and the event is identified as not being a root-cause event for a path change. Else, box 189 may be entered through the Y branch out of decision box 187, and the set of taken exit points and their SPGs are identified. This may be performed simply by following the SPGs of the chosen exit points until they leave the current area. As an optimization, this step may focus on the set of new chosen exit points that were identified in step 185. Once the set of taken exit points and their SPGs have been identified, decision box 188 may be entered to determine if there have been changes to the set of taken exit points or their SPGs. If the answer is negative, termination box 192 may be entered through the N branch out of decision box 188, and the event may be identified as not being a root-cause event for a path change. Else, termination box 191 may be entered through the Y branch out of decision box 188, and the event is identified as being a root-cause event for a path change. When the exit point event is associated with the announcement of a better matching route for the destination address, decision box 172 may be exited through its Y branch into box 175 that proceeds to identify the new set of candidate exit points associated with this new best matching route. Decision box 177 may be then entered to determine if the set of candidate exit points has actually changed. If the set of candidate exit points is unchanged, step 185 may be directly entered through the N branch exiting decision box 177. Else, SPGs should then be computed in box 180 for the new candidate exit points that were identified in step 175. Once this operation completes, box 185 may again be entered in order to identify the chosen exit points. As before, the steps of box 185 can be readily accomplished by selecting candidate exit points that yield the smallest total cost according to the routing protocol rules. The remainder of the processing for this second category of exit point events may then proceed as that of the first category of cost change events. In this embodiment, the last category of exit point events corresponds to events that announce the availability of a new route that is an equal match for the destination address as the current best matching route. This may be determined in decision box 173, and if the event is not recognized as being of that type, decision box 173 may be exited through its N branch and the process may terminate in termination box 190 that identifies that the event is not the root-cause of any path change. Alternatively, if the event is determined to announce the availability of a new route that is an equal match for the destination address as the current best matching route in decision box 173, box 176 may be entered to possibly update the set of candidate exit points, as the announcement of the new route has the potential to expand the set of candidate exit points. Once the set of candidate exit points has been updated, decision box 178 may be entered to determine if it has changed. In case the set of candidate exit points has not changed, box 182 is directly entered through the N branch of decision box 178. Else, box 181 may be entered and the SPGs of the new candidate exit points are computed before entering box 182, where the set of chosen exit points is determined. Again, the steps of box 182, as those of box 185, may be accomplished by selecting candidate exit points that yield the smallest total cost according to the routing protocol rules. Next, decision box 183 may be entered to determine if any of the new candidate exit points have either become chosen exit points or are on the path (SPG) to a chosen exit point. If this is not the case, termination box 192 may be directly entered through the N branch out of decision box 183, and the event may be identified as not being a root-cause event for a path change. Else, decision box 183 may be exited through its Y branch and box 186 is entered that identifies the set of taken exit points and their SPGs. As for step 189, this can be performed by following the SPGs of chosen exit points until they leave the current area. Once the set of taken exit points and their SPGs have been identified, decision box 188 may be entered to determine if there have been changes to the set of taken exit points or their SPGs. If the answer is negative, termination box 192 may be entered through the N branch out of decision box 188, and the event may be identified as not being a root-cause event for a path change. Else, termination box 191 may be entered through the Y branch out of decision box 188, and the event may be identified as being a root-cause event for a path change. Certain portions of the invention may be performed by an automated processing system. Viewed externally in FIG. 10, an exemplary computer system designated by reference numeral 1001 has a central processing unit located within a housing 1008 and disk drives 1003 and 1004. Disk drives 1003 and 1004 are merely symbolic of a number of disk drives which might be accommodated by the computer system. Typically these would include a hard disk drive and optionally one or more floppy disk drives such as 1003 and/or one or more CD-ROMs, CD-Rs, CD-RWs or digital video disk (DVD) devices indicated by slot 1004. The number and types of drives typically varies with different computer configurations. Disk drives 1003 and 1004 are in fact options, and they may be omitted from the computer system used in connection with the processes described herein. An exemplary storage medium 1009, which is one type of carrier that may contain program instructions and/or data, is also illustrated. Additionally, the computer system utilized for implementing the present invention may be a stand-alone computer having communications capability, a computer connected to a network or able to communicate via a network, a handheld computing device, or any other form of computing device capable of carrying out equivalent operations. The computer also has or is connected to or delivers signals to a display 1005 upon which graphical, video and/or alphanumeric information is displayed. The display may be any device capable of presenting visual images, such as a television screen, a computer monitor, a projection device, a handheld or other microelectronic device having video display capabilities, or even a device such as a headset or helmet worn by the user to present visual images to the user's eyes. The computer may also have or be connected to other means of obtaining signals to be processed. Such means of obtaining these signals may include any device capable of receiving images and image streams, such as video input and graphics cards, digital signal processing units, appropriately configured network connections, or any other microelectronic device having such input capabilities. An optional keyboard 1006 and a directing device 1007 such as a remote control, mouse, joystick, touch pad, track ball, steering wheel, remote control or any other type of pointing or directing device may be provided as input devices to interface with the central processing unit. FIG. 11 illustrates a block diagram of exemplary internal hardware of a computer such as that of FIG. 10. A bus 1156 serves as the main information highway interconnecting the other components of the computer. CPU 1158 is the central processing unit of the system, performing calculations and logic operations required to execute a program. Read only memory (ROM) 1160 and random access memory (RAM) 1162 constitute the main memory of the computer. A disk controller 1164 interfaces one or more disk drives to the system bus 1156. These disk drives may be external or internal floppy disk drives such as 1170, external or internal CD-ROM, CD-R, CD-RW, DVD or other drives such as 1166, or external or internal hard drives 1168 or other many devices. As indicated previously, these various disk drives and disk controllers are optional devices. Program instructions may be stored in the ROM 1160 and/or the RAM 1162. Optionally, program instructions may be stored on a computer readable carrier such as a floppy disk or a digital disk or other recording medium, flash memory, a communications signal, and/or a carrier wave. A display interface 1172 permits information from the bus 1156 to be displayed on the display 1148 in audio, graphic or alphanumeric format. Communication with external devices may optionally occur using various communication ports such as 1174. In addition to the standard components of the computer, the computer also includes an interface 1154 which allows for data input through the keyboard 1150 or other input device and/or the directional or pointing device 1152 such as a remote control, pointer, mouse or joystick. The many features and advantages of the invention are apparent from the detailed specification. Thus, the appended claims are intended to cover all such features and advantages of the invention which fall within the true spirits and scope of the invention. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described. Accordingly, all appropriate modifications and equivalents may be included within the scope of the invention.
<SOH> BACKGROUND <EOH>An Internet Protocol (IP) network is a large distributed system in which individual routers automatically adjust their decisions on how to forward packets based on information they learn from their neighbors about the state of the network. This design permits rapid recovery in case of link or router failures by allowing affected routers to re-route packets around the failure as soon as they discover it. The Routing Information Protocol (RIP), the Open Shortest Path First (OSPF) or the Intermediate System to Intermediate System (IS-IS) routing protocols are commonly used embodiments of this design. However, the distributed mode of operation of such routing protocols makes it difficult for a network administrator to have a global view of the network at any given time, and in particular of how traffic is traversing the network. Because of this, many of the network management functions that are available for networks based on more traditional technologies, e.g., connection-oriented networks, such as frame relay or asynchronous transfer mode (ATM), are difficult if not impossible to replicate in IP networks. For example, in a connection-oriented network, the state associated with each connection/user provides the network administrator with a ready handle for identifying which changes affect its path. In contrast, in IP networks, because packet forwarding decisions are local to each router, there is no state associated with the path taken by the packets belonging to a given user flow. As a result, it is difficult to precisely identify which network events are responsible for a change in the paths actually taken by those packets. This difficulty is further compounded by the distributed routing decisions used by IP networks, which often result in network events influencing the choice of paths used by flows that are far remote from the network location where the event originated. For example, a link failure in one area may affect a path originating in a remote area by shifting its exit point out of that remote area from one router to another router, even though there were no events that directly impacted the path inside that remote area. Similarly, a new route advertised by a router in one area may shift the flow of traffic in another area on the other side of the network, simply because this new route becomes the more attractive exit point to reach a given set of destinations. As a consequence, it is difficult in IP networks to easily identify what network event is responsible for a given path change and determine which paths may be affected by a given network event. Accordingly, it is desirable to provide an improved method and system for monitoring and tracking the set of interfaces or links through which traffic from specific customer flows as it traverses an IP network. The following is provided as additional background information about the Internet and Internet routing protocols to help the reader understand the context of the present invention: The Internet is a global network that includes multiple interconnected smaller networks or Autonomous Systems (AS), also called routing domains. The delivery of packets across this Interconnection of Networks is carried out under the responsibility of the IP protocol suite. In particular, routing protocols are responsible for allowing routers to determine how best to forward packets toward their destination. Internet routing protocols can be divided into intra-domain and inter-domain routing protocols, with inter-domain routing protocols communicating information between ASs, while intra-domain routing protocols are responsible for determining the forwarding of packets within each AS. The Routing Internet Protocol (RIP), Open Shortest Paths First (OSPF) and Intermediate System to Intermediate System (IS-IS) protocols are examples of intra-domain routing protocols, while the Border Gateway Protocol (BGP) is an example of an inter-domain routing protocol. This general architecture and the associated suite of protocols are rapidly becoming the de facto technology on which modern communication networks are built. This dominance extends from simple local area networks to large-scale, international carrier networks, and is largely due to the robustness and efficiency of networks built using it. In particular, IP networks are often referred to as “connectionless”, as packet forwarding decisions are made individually by each router based solely on address information carried in the packet and on the router's local routing table. The routing table of a router is built independently of packet forwarding and is based on information it receives from its neighboring routers regarding the set of destinations they can reach. In other words, a router's routing table contains enough information to enable it to determine where to forward any packet it may receive so that the packet is ultimately delivered to its intended destination. This information is present without the need for the establishment of a connection ahead of time, hence the connectionless characterization of IP networks. The content of a router's routing table commonly consists of route entries together with a next hop that identifies the link or node towards which packets associated with the route should be forwarded. A route entry is itself usually made-up of a subnet number and a subnet mask that together identify the set of addresses for which the route is a match. The route 16.2.25.0/24 is an example of a route with subnet number 16.2.25.0 and an associated subnet mask of 24 bits that have the following binary representations: 00010000.00000010.00011001.00000000 and 11111111.11111111.11111111.00000000, respectively, where the last 8 trailing 0 's indicate “don't care” bits that are ignored when determining if a route matches a given address. A route is deemed a match for an address if, after eliminating the address bits that fall outside of the subnet mask, the remaining address bits match the corresponding subnet number bits. For example, the route 16.2.25.0/24 is a match for address 16.2.25.7, as the subnet mask of 24 of the route specifies that only the first 24 bits of the address need to be considered (the last 8 bits are ignored) when comparing address bits and subnet bits to determine if there is a match. Upon receipt of a packet, a router uses the destination address carried in the packet itself to perform a longest prefix match against entries contained in its routing table. The longest matching prefix identifies the route that has the largest number of matching bits, when matching is done as described above. For example, considering again the address 16.2.25.7 and the two route entries 16.2.25.0/24 and 16.2.0.0/16 that are both matches for this address, the longest prefix match is found to be the route 16.2.25.0/24 as it shares its first 24 bits with the address instead of only the first 16 bits as is the case for route 16.2.0.0/16.
<SOH> SUMMARY <EOH>The present application describes an improved method and/or system for identifying an event or events responsible for a change affecting a path in a packet network, such as a packet network that is operated according to the Internet Protocol (IP). In accordance with one embodiment, a method for determining whether a network event changes a monitored path within an area of a multi-area routing domain includes the step of receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain. The path is associated with a destination address. The method also includes maintaining a set of current candidate exit points out of a first area in the domain. The candidate exit points are associated with the destination address. The method also includes determining whether the first network event caused the path to change and, if the first network event caused the path to change, identifying the network event as a cause for the path to change. In accordance with an alternate embodiment, a method for identifying a root-cause event responsible for a change to a path within a multi-area routing domain includes the steps of: (i) receiving information corresponding to a first network event that may affect a path for one or more packets traveling in a multi-area routing domain; (ii) maintaining a set of current candidate exit points for the path out of a first area; (iii) determining whether the first network event is a shortest path event or an exit point event; and (iv) (a) if the first network event is an exit point event, determining whether a set of taken exit points associated with the path has changed in response to the event; or (b) if the first network event is a shortest path event, determining whether the network event has changed either the set of taken exit points or a shortest path associated with at least one of the taken exit points. There have thus been outlined the more important features of the invention in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are, of course, additional features of the invention that will be described below and which will form the subject matter of the claims appended hereto. In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein, as well as the abstract, are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for the designing of other structures, methods, and systems for carrying out the several purposes of the present invention. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the present invention.
20040315
20081111
20050915
72917.0
1
YUEN, KAN
METHOD AND SYSTEM FOR PATH CHANGE ROOT-CAUSE IDENTIFICATION IN PACKET NETWORKS
SMALL
0
ACCEPTED
2,004
10,802,796
ACCEPTED
Method for isolating a polynucleotide of interest from the genome of a mycobacterium using a bac-based DNA library. application to the detection of mycobacteria
The present invention is directed to a method for isolating a polynucleotide of interest that is present or is expressed in a genome of a first mycobacterium strain and that is absent or altered in a genome of a second mycobacterium strain which is different from the first mycobacterium strain using a bacterial artificial chromosome (BAC) vector. The invention further relates to a polynucleotide isolated by this method and recombinant BAC vector used in this method. In addition the present invention comprises method and kit for detecting the presence of a mycobacteria in a biological sample.
1-50. (canceled) 51. A purified polypeptide, encoded by a polynucleotide comprising an Open Reading Frame contained within SEQ ID NO:1, wherein the polynucleotide is selected from: (a) nucleotide 1,696,019 through nucleotide 1,697,420 of the Mycobacterium tuberculosis chromosome; (b) nucleotide 1,696,019 through nucleotide 1,699,892 of the Mycobacterium tuberculosis chromosome; (c) nucleotide 1,696,019 through nucleotide 1,701,088 of the Mycobacterium tuberculosis chromosome; (d) nucleotide 1,696,019 through nucleotide 1,702,588 of the Mycobacterium tuberculosis chromosome; (e) nucleotide 1,696,019 through nucleotide 1,704,091 of the Mycobacterium tuberculosis chromosome; (f) nucleotide 1,696,019 through nucleotide 1,705,056 of the Mycobacterium tuberculosis chromosome; (g) nucleotide 1,696,019 through nucleotide 1,705,784 of the Mycobacterium tuberculosis chromosome; (h) nucleotide 1,696,019 through nucleotide 1,706,593 of the Mycobacterium tuberculosis chromosome; (i) nucleotide 1,696,019 through nucleotide 1,707,524 of the Mycobacterium tuberculosis chromosome; or (j) nucleotide 1,696,019 through nucleotide 1,708,648 of the Mycobacterium tuberculosis chromosome. 52. A purified polypeptide, encoded by a polynucleotide, comprising an Open Reading Frame contained within SEQ ID NO:1, wherein the polynucleotide is selected from: (a) nucleotide 1,696,728 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (b) nucleotide 1,698,096 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (c) nucleotide 1,700,210 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (d) nucleotide 1,701,293 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (e) nucleotide 1,703,072 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (f) nucleotide 1,704,091 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (g) nucleotide 1,705,056 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (h) nucleotide 1,705,808 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome (i) nucleotide 1,706,631 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; or (j) nucleotide 1,707,530 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome. 53. A purified polypeptide, encoded by a polynucleotide, comprising an Open Reading Frame contained within SEQ ID NO:1, wherein the polynucleotide is selected from: (a) nucleotide 1,696,019 through nucleotide 1,698,096 of the Mycobacterium tuberculosis chromosome; (b) nucleotide 1,696,019 through nucleotide 1,700,210 of the Mycobacterium tuberculosis chromosome; (c) nucleotide 1,696,019 through nucleotide 1,701,293 of the Mycobacterium tuberculosis chromosome; (d) nucleotide 1,696,019 through nucleotide 1,703,072 of the Mycobacterium tuberculosis chromosome; (e) nucleotide 1,696,019 through nucleotide 1,704,091 of the Mycobacterium tuberculosis chromosome; (f) nucleotide 1,696,019 through nucleotide 1,705,056 of the Mycobacterium tuberculosis chromosome; (g) nucleotide 1,696,019 through nucleotide 1,705,808 of the Mycobacterium tuberculosis chromosome (h) nucleotide 1,696,019 through nucleotide 1,706,631 of the Mycobacterium tuberculosis chromosome; or (i) nucleotide 1,696,019 through nucleotide 1,707,530 of the Mycobacterium tuberculosis chromosome. 54. A purified polypeptide, encoded by a polynucleotide, comprising an Open Reading Frame contained within SEQ ID NO:1, wherein the polynucleotide is selected from: (a) nucleotide 1,696,441 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (b) nucleotide 1,697,420 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (c) nucleotide 1,699,892 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (d) nucleotide 1,701,088 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (e) nucleotide 1,702,588 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (f) nucleotide 1,704,091 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (g) nucleotide 1,705,056 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (h) nucleotide 1,705,784 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; (i) nucleotide 1,707,524 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome; or (j) nucleotide 1,706,593 through nucleotide 1,708,746 of the Mycobacterium tuberculosis chromosome. 55. A purified polypeptide, encoded by a polynucleotide that hybridizes under stringent hybridization conditions with the purified polynucleotide of any one of claims 1-4. 56. The purified polypeptide of claim 55, wherein the stringent hybridization conditions comprise a hybridization step at 65° C. in 6×SSC buffer, 5× Denhardt's solution, 0.5% SDS, and 100 μg/ml of salmon sperm DNA, two five minute washing steps at 65° C. in 2×SSC and 0.1 % SDS buffer, a 30 minute washing step at 65° C. in 2×SSC and 0.1% SDS buffer, and a ten minute washing step at 65° C. in 0.1×SSC and 0.1% SDS buffer.
I. BACKGROUND OF THE INVENTION The present invention pertains to a method for isolating a polynucleotide of interest that is present in the genome of a mycobacterium strain and/or is expressed by said mycobacterium strain and that is absent or altered in the genome of a different mycobacterium strain and/or is not expressed in said different mycobacterium strain, said method comprising the use of at least one clone belonging to a genomic DNA library of a given mycobacterium strain, said DNA library being cloned in a bacterial artificial chromosome (BAC). The invention concerns also polynucleotides identified by the above method, as well as detection methods for mycobacteria, particularly Mycobacterium tuberculosis, and kits using said polynucleotides as primers or probes. Finally, the invention deals with BAC-based mycobacterium DNA libraries used in the method according to the invention and particularly BAC-based Mycobacterium tuberculosis and Mycobacterium bovis BCG DNA libraries. Radical measures are required to prevent the grim predictions of the World Health Organisation for the evolution of the global tuberculosis epidemic in the next century becoming a tragic reality. The powerful combination of genomics and bioinformatics is providing a wealth of information about the etiologic agent, Mycobacterium tuberculosis, that will facilitate the conception and development of new therapies. The start point for genome sequencing was the integrated map of the 4.4 Mb circular chromosome of the widely-used, virulent reference strain, M. tuberculosis H37Rv and appropriate cosmids were subjected to systematic shotgun sequence analysis at the Sanger Centre. Cosmid clones (Balasubramanian et al., 1996; Pavelka et al., 1996) have played a crucial role in the M. tuberculosis H37Rv genome sequencing project. However, problems such as under-representation of certain regions of the chromosome, unstable inserts and the relatively small insert size complicated the production of a comprehensive set of canonical cosmids representing the entire genome. II. SUMMARY OF THE INVENTION In order to avoid the numerous technical constraints encountered in the state of the art, as described hereabove, when using genomic mycobacterial DNA libraries constructed in cosmid clones, the inventors have attempted to realize genomic mycobacterial DNA libraries in an alternative type of vectors, namely Bacterial Artificial Chromosome (SAC) vectors. The success of this approach depended on whether the resulting BAC clones could maintain large mycobacterial DNA inserts. There are various reports describing the successful construction of a BAC library for eucaryotic organisms (Cai et al., 1995; Kim et al., 1996; Misumi et al., 1997; Woo et al., 1994; Zimmer et al., 1997) where inserts up to 725 kb (Zimmer et al., 1997) were cloned and stably maintained in the E. coli host strain. Here, it is shown that, surprisingly, the BAC system can also be used for mycobacterial DNA, as 70% of the clones contained inserts in the size of 25 to 104 kb. This is the first time that bacterial, and specifically mycobacterial, DNA is cloned in such BAC vectors. In an attempt to obtain complete coverage of the genome with a minimal overlapping set of clones, a Bacterial Artificial Chromosome (SAC) library of M. tuberculosis was constructed, using the vector pBeloBAC11 (Kim et al., 1996) which combines a simple phenotypic screen for recombinant clones with the stable propagation of large inserts (Shizuya et al., 1992). The BAC cloning system is based on the E. coli F-factor, whose replication is strictly controlled and thus ensures stable maintenance of large constructs (Willets et al., 1987). BACs have been widely used for cloning of DNA from various eucaryotic species (Cai et al., 1995; Kim et al., 1996; Misumi et al., 1997; Woo et al., 1994; Zimmer et al., 1997). In contrast, to our knowledge this report describes the first attempt to use the BAC system for cloning bacterial DNA. A central advantage of the BAC cloning system over cosmid vectors used in prior art is that the F-plasmid is present in only one or a maximum of two copies per cell, reducing the potential for recombination between DNA fragments and, more importantly, avoiding the lethal overexpression of cloned bacterial genes. However, the presence of the BAC as just a single copy means that plasmid DNA has to be extracted from a large volume of culture to obtain sufficient DNA for sequencing and it is described here in the examples a simplified protocol to achieve this. Further, the stability and fidelity of maintenance of the clones in the BAC library represent ideal characteristics for the identification of genomic differences possibly responsible for phenotypic variations in different mycobacterial species. As it will be shown herein, BACs can be allied with conventional hybridization techniques for refined analyses of genomes and transcriptional activity from different mycobacterial species. Having established a reliable procedure to screen for genomic polymorphisms, it is now possible to conduct these comparisons on a more systematic basis than in prior art using representative BACs throughout the chromosome and genomic DNA from a variety of mycobacterial species. As another approach to display genomic polymorphisms, the inventors have also started to use selected H37Rv BACs for “molecular combing” experiments in combination with fluorescent in situ hybridization (Bensimon et al., 1994; Michalet et al., 1997). With such techniques the one skilled in the art is enabled to explore the genome of mycobacteria in general and of M. tuberculosis in particular for further polymorphic regions. The availability of BAC-based genomic mycobacterial DNA libraries constructed by the inventors have allowed them to design methods and means both useful to identify genomic regions of interest of pathogenic mycobacteria, such as Mycobacterium tuberculosis, that have no counterpart in the corresponding non-pathogenic strains, such as Mycobacterium bovis BCG, and useful to detect the presence of polynucleotides belonging to a specific mycobacterium strain in a biological sample. By a biological sample according to the present invention, it is notably intended a biological fluid, such as plasma, blood, urine or saliva, or a tissue, such as a biopsy. Thus, a first object of the invention consists of a method for isolating a polynucleotide of interest that is present in the genome of a mycobacterium strain and/or is expressed by said mycobacterium strain and that is absent or altered in the genome of a different mycobacterium strain and/or is not expressed in said different mycobacterium strain, said method comprising the use of at least one clone belonging to a genomic DNA library of a given mycobacterium strain, said DNA library being cloned in a bacterial artificial chromosome (BAC). The invention is also directed to a polynucleotide of interest that has been isolated according to the above method and in particular a polynucleotide containing one or several Open Reading Frames (ORFs), for example ORFs encoding either a polypeptide involved in the pathogenicity of a mycobacterium strain or ORFs encoding Polymorphic Glycine Rich Sequences (PGRS). Such polynucleotides of interest may serve as probes or primers in order to detect the presence of a specific mycobacterium strain in a biological sample or to detect the expression of specific genes in a particular mycobacterial strain of interest. The BAC-based genomic mycobacterial DNA libraries generated by the present inventors are also part of the invention, as well as each of the recombinant BAC clones and the DNA insert contained in each of said recombinant BAC clones. The invention also pertains to methods and kits for detecting a specific mycobacterium in a biological sample using either at least one recombinant BAC clone or at least one polynucleotide according to the invention, as well as to methods and kits to detect the expression of one or several specific genes of a given mycobacterial strain present in a biological sample. III. BRIEF DESCRIPTION OF THE FIGURES In order to better understand the present invention, reference will be made to the appended figures which depicted specific embodiments to which the present invention is in no case limited in scope with. FIGS. 1A and 1B: PCR-screening for unique BAC clones with specific primers for 2 selected genomic regions of the H37Rv chromosome, using 21 pools representing 2016 BACs (FIG. 1A) and sets of 20 subpools from selected positive pools (FIG. 1B). FIG. 2: Pulsed-field gel electrophoresis gel of DraI-cleaved BAC clones used for estimating the insert sizes of BACs. FIG. 3: Minimal overlapping BAC map of M. tuberculosis H37Rv superimposed on the integrated physical and genetic map established by Philipp et al. (18). Y- and I-numbers show pYUB328 (2) and pYUB412 (16) cosmids which were shotgun sequenced during the H37Rv genome sequencing project. Y-cosmids marked with * were shown in the integrated physical and genetic map (18). Rv numbers show the position of representative BAC clones relative to sequenced Y- and I-clones. Squared Rv numbers show BACs which were shotgun sequenced at the Sanger Centre. FIGS. 4A and 4B: Ethidium bromide stained gel (FIG. 4A) and corresponding Southern blot (FIG. 4B) of EcoRI and PvuII digested Rv58 DNA hybridized with 32P labeled genomic DNA preparations from M. tuberculosis H37Rv, M. bovis ATCC 19210 and M. bovis BCG Pasteur. FIG. 5: Organisation of the ORFs in the 12.7 kb genomic region present in M. tuberculosis H37Rv but not present in M. bovis ATCC 19210 and M. bovis BCG Pasteur. Arrows show the direction of transcription of the putative genes. Positions of EcoRI and PvuII restriction sites are shown. Vertical dashes represent stop codons. The 11 ORFs correspond to the ORFs MTCY277.28 to MTCY277.38/accession number Z79701 -EMBL Nucleotide Sequence Data Library. The junction sequences flanking the polymorphic region are shown. FIG. 6: Variation in the C-terminal part of a PE-PGRS open reading frame in M. tuberculosis strain H37Rv relative to M. bovis BCG strain Pasteur. The numbers on the right side of the Figure denote the position of the end nucleotides, taking as the reference the M. tuberculosis genome. FIG. 7: Polynucleotide sequence next to the HindIII cloning site in the BAC vector pBeloBAC11 (Kim et al., 1996) used to clone the inserts of the BAC-based mycobacterial genomic DNA library according to the invention. NotI: location of the NotI restriction sites. Primer T7-BAC1: nucleotide region recognized by the T7-BAC1 primer shown in Table 1. T7 promoter: location of the T7 promoter region on the pBeloBac11 vector. Primer T7-Belo2: nucleotide region recognized by the T7-Belo2 primer shown in Table 1. HindIII: the HindIII cloning site used to clone the genomic inserts in the pBeloBAC11 vector. SP6-Mid primer: nucleotide region recognized by the SP6 Mid primer shown in Table 1. SP6-BAC1 primer:nucleotide region recognized by the SP6 BAC1 primer shown in Table 1. SP6 promoter: location of the SP6 promoter region on the pBeloBac11 vector. IV. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS As already mentioned hereinbefore, the present invention is directed to a method for isolating a polynucleotide of interest that is present in the genome of a mycobacterium strain and/or is expressed by said mycobacterium strain and that is absent or altered in the genome of a different mycobacterium strain and/or is not expressed in said different mycobacterium strain, said method comprising the use of at least one clone belonging to a genomic DNA library of a given mycobacterium strain, said DNA library being cloned in a bacterial artificial chromosome (BAC) type vector. For this purpose, the inventors have constructed several BAC-based mycobacterial genomic DNA libraries that may be used in order to perform the above described method. Because it is the first time that mycobacterial genomic, DNA has been successfully cloned in BAC type vectors, and because these DNA libraries are then novel and nonobvious, an object of the present invention consists in a mycobacterial genomic DNA library cloned in such a BAC type vector. As an illustrative example, a BAC-based DNA library of Mycobacterium tuberculosis has been realized. Forty-seven cosmids chosen from the integrated map of the 4.4 Mb circular chromosome (Philipp et al., 1996a) were shotgun-sequenced during the initial phase of the H37Rv genome sequence project. The sequences of these clones were used as landmarks in the construction of a minimally overlapping BAC map. Comparison of the sequence data from the termini of 420 BAC clones allowed us to establish a minimal overlapping BAC map and to fill in the existing gaps between the sequence of cosmids. As well as using the BAC library for genomic mapping and sequencing, we also tested the system in comparative genomic experiments in order to uncover differences between two closely related mycobacterial species. As shown in a previous study (Philipp et al., 1996b), M. tuberculosis, M. bovis and M. bovis BCG, specifically BCG Pasteur strain, exhibit a high level of global genomic conservation, but certain polymorphic regions were also detected. Therefore, it was of great interest to find a reliable, easy and rapid way to exactly localize polymorphic regions in mycobacterial genomes using selected BAC clones. This approach was validated by determining the exact size and location of the polymorphisms in the genomic region of DraI fragment Z4 (Philipp et al., 1996b), taking advantage of the availability of an appropriate BAC clone covering the polymorphic region and the H37Rv genome sequence data. This region is located approximately 1.7 Mb from the origin of replication. The Bacterial Artificial Chromosome (BAC) cloning system is capable of stably propagating large, complex DNA inserts in Escherichia coli. As part of the Mycobacterium tuberculosis H37Rv genome sequencing project, a BAC library was constructed in the pBeloBAC11 vector and used for genome mapping, confirmation of sequence assembly, and sequencing. The library contains about 5000 BAC clones, with inserts ranging in size from 25 to 104 kb, representing theoretically a 70 fold coverage of the M. tuberculosis genome (4.4 Mb). A total of 840 sequences from the T7 and SP6 termini of 420 BACs were determined and compared to those of a partial genomic database. These sequences showed excellent correlation between the estimated sizes and positions of the BAC clones and the sizes and positions of previously sequenced cosmids and the resulting contigs. Many BAC clones represent linking clones between sequenced cosmids, allowing full coverage of the H37Rv chromosome, and they are now being shotgun-sequenced in the framework of the H37Rv sequencing project. Also, no chimeric, deleted or rearranged BAC clones were detected, which was of major importance for the correct mapping and assembly of the H37Rv sequence. The minimal overlapping set contains 68 unique BAC clones and spans the whole H37Rv chromosome with the exception of a single gap of ˜150 kb. As a post-genomic application, the canonical BAC set was used in a comparative study to reveal chromosomal polymorphisms between M. tuberculosis, M. bovis and M. bovis BCG Pasteur, and a novel 12.7 kb segment present M. tuberculosis but absent from M. bovis and M. bovis BCG was characterized. This region contains a set of genes whose products show low similarity to proteins involved in polysaccharide biosynthesis. The H37Rv BAC library therefore provides the one skilled in the art with a powerful tool both for the generation and confirmation of sequence data as well as for comparative genomics and a plurality of post-genomic applications. The above described BAC-based Mycobacterium tuberculosis genomic DNA library is part of the present invention and has been deposited in the Collection Nationale de Cultures de Microorganismes (CNCM) on Nov. 19, 1997 under the accession number 1-1945. Another BAC-based DNA library has been constructed with the genomic DNA of Mycobacterium bovis BCG, Pasteur strain, and said DNA library has been deposited in the Collection Nationale de Cultures de Microorganismes (CNCM) on Jun. 30, 1998 under the accession number I-2049. Thus, as a specific embodiment of the above described method for isolating a polynucleotide of interest said method makes use of at least one BAC-based DNA library that has been constructed from the genomic DNA of Mycobacterium tuberculosis, more specifically of the H37Rv strain and particularly of the DNA library deposited in the accession number 1-1945. In another specific embodiment of the above described method for isolating a polynucleotide of interest said method makes use of at least one BAC-based DNA library has been constructed from the genomic DNA of Mycobacterium bovis BCG, more specifically of the Pasteur strain and particularly of the DNA library deposited in the accession number I-2049. In more details, the method according to the invention for isolating a polynucleotide of interest may comprise the following steps: a) isolating at least one polynucleotide contained in a clone of a BAC-based DNA library of mycobacterial origin; b) isolating: at least one genomic or cDNA polynucleotide from a mycobacterium, said mycobacterium belonging to a strain different from the strain used to construct the BAC-based DNA library of step a); or alternatively at least one polynucleotide contained in a clone of a BAC-based DNA library prepared from the genome of a mycobacterium that is different from the mycobacterium used to construct the BAC-based DNA library of step a); c) hybridizing the at least one polynucleotide of step a) to the at least one polynucleotide of step b); d) selecting the at least one polynucleotide of step a) that has not formed a hybrid complex with the at least one polynucleotide of step b); e) characterizing the selected polynucleotide. Following the above procedure, the at least one polynucleotide of step a) may be prepared as follows: 1) digesting at least one recombinant BAC clone by an appropriate restriction endonuclease in order to isolate the polynucleotide insert of interest from the vector genetic material; 2) optionally amplifying the resulting polynucleotide insert; 3) optionally digesting the polynucleotide insert of step 1) or step 2) with at least one restriction endonuclease. The above method of the invention allows the one skilled in the art to perform comparative genomics between different strains or species of mycobacteria cells, for example between pathogenic strains or species and their non pathogenic strains or species counterparts, as it is the illustrative case for the genomic comparison between Mycobacterium tuberculosis and Mycobacterium bovis BCG that is described herein in the examples. Restriction digests of a given clone of a BAC library according to the invention may be blotted to membranes, and then probed with radiolabeled DNA form another strain or another species of mycobacteria, allowing the one skilled in the art to identify, characterize and isolate a polynucleotide of interest that may be involved in important metabolical and/or physiological pathways of the mycobacterium under testing, such as a polynucleotide functionally involved in the pathogenicity of said given mycobacteria for its host organism. More specifically, the inventors have shown in Example 6 that when restriction digests of a given clone of the BAC library identified by the CNCM accession number 1-1945 are blotted to membranes and then probed with radiolabeled total genomic DNA from, for example, Mycobacterium bovis BCG Pasteur, it is observed that restriction fragments that fail to hybridize with the M. bovis BCG Pasteur DNA are absent from its genome, hence identifying polymorphic regions between M. bovis BCG Pasteur and M. tuberculosis H37Rv. Thus, a further object of the present invention consists in a polynucleotide of interest that has been isolated according to the method described herein before. In Example 6, a polynucleotide of approximately 12.7 kilobases has been isolated that is present in the genome of M. tuberculosis but is absent of the genome of M. bovis BCG. This polynucleotide of interest contains 11 ORFs that may be involved in polysaccharide biosynthesis. In particular, two of said ORFs are of particular interest namely ORF6 (MTCY277.33; Rv1511) that encodes a protein that shares significant homology with bacterial GDP-D-mannose dehydratases, whereas the protein encoded by ORF7 (MTCY277.34; Rv1512) shares significant homology with a nucleotide sugar epimerase. As polysaccharide is a major constituent of the mycobacterial cell wall, these deleted genes may cause the cell wall of M. bovis BCG to differ from that of M. tuberculosis, a fact that may have important consequences for both the immune response to M. bovis BCG and virulence. Detection of such a polysaccharide is of diagnostic interest and possibly useful in the design of tuberculosis vaccines. Consequently, the polynucleotide of interest obtained following the method according to the invention may contain at least one ORF, said ORF preferably encoding all or part of a polypeptide involved in an important metabolical and/or physiological pathway of the mycobacteria under testing, and more specifically all or part of a polypeptide that is involved in the pathogenicity of the mycobacteria under testing, such as for example Mycobacterium tuberculosis, and more generally mycobacteria belonging to the Mycobacterium tuberculosis complex. The Mycobacterium tuberculosis complex has its usual meaning, i.e. the complex of mycobacteria causing tuberculosis which are Mycobacterium tuberculosis, Mycobacterium bovis, Mycobacterium africanum, Mycobacterium microti and the vaccine strain Mycobacterium bovis BCG. An illustrative polynucleotide of interest according to the present invention comprises all or part of the polynucleotide of approximately 12.7 kilobases that is present in the genome of M. tuberculosis but is absent from the genome of M. bovis BCG disclosed hereinbefore. This polynucleotide is contained in clone Rv58 of the BAC DNA library I-1945. Generally, the invention also pertains to a purified polynucleotide comprising the DNA insert contained in a recombinant BAC vector belonging to a BAC-based mycobacterial genomic DNA library, such as for example the I-1945 BAC DNA library. Advantageously, such a polynucleotide has been identified according to the method of the invention. Such a polynucleotide of interest may be used as a probe or a primer useful for specifically detecting a given mycobacterium of interest, such as Mycobacterium tuberculosis or Mycobacterium bovis BCG. More specifically, the invention then deals with a purified polynucleotide useful as probe or a primer comprising all or part of the nucleotide sequence SEQ ID No 1. The location, on the Mycobacterium tuberculosis chromosome, of the above polynucleotide of sequence SEQ ID No 1 has now been ascribed to begin, at its 5′ end at nucleotide at position nt 1696015 and to end, at its 3′ end, at nucleotide at position nt 1708746. For diagnostic purposes, this 12.7 kb deletion should allow a rapid PCR screening of tubercle isolates to identify whether they are bovine or human strains. The primers listed in Table I are flanking the deleted region and give a 722 bp amplicon in M. bovis or M. bovis BCG strains, but a fragment of 13,453 bp in M. tuberculosis that is practically impossible to amplify under the same PCR conditions. More importantly, assuming that some of the gene products from this region represent proteins with antigenic properties, it could be possible to develop a test that can reliably distinguish between the immune response induced by vaccination with M. bovis BCG vaccine strains and infection with M. tuberculosis or that the products (e.g. polysaccharides) are specific immunogens. The invention also provides for a purified polynucleotide useful as a probe or as a primer, said polynucleotide being chosen in the following group of polynucleotides: a) a polynucleotide comprising at least 8 consecutive nucleotides of the sequence SEQ ID No 1; b) a polynucleotide whose sequence is fully complementary to the sequence of the polynucleotide defined in a); c) a polynucleotide that hybridizes under stringent hybridization conditions with the polynucleotide defined in a) or with the polynucleotide defined in b). For the purpose of defining a polynucleotide or oligonucleotide hybridizing under stringent hybridization conditions, such as above, it is intended a polynucleotide that hybridizes with a reference polynucleotide under the following hybridization conditions. The hybridization step is realized at 65° C. in the presence of 6×SSC buffer, 5× Denhardt's solution, 0.5% SDS and 100 μg/ml of salmon sperm DNA. For technical information, 1×SSC corresponds to 0.15 M NaCl and 0.05M sodium citrate; 1× Denhardt's solution corresponds to 0.02% Ficoll, 0.02% polyvinylpyrrolidone and 0.02% bovine serum albumin. The hybridization step is followed by four washing steps two washings during 5 min, preferably at 65° C. in a 2×SSC and 0.1% SDS buffer, one washing during 30 min, preferably at 65° C. in a 2×SSC and 0.1% SDS buffer, one washing during 10 min, preferably at 65° C. in a 0.1×SSC and 0.1% SDS buffer. A first illustrative useful polynucleotide that is included in the polynucleotide of sequence SEQ ID No 1 is the polynucleotide of sequence SEQ ID No 2 that corresponds to the Sp6 end-sequence of SEQ ID No 1. A second illustrative useful polynucleotide that is included in the polynucleotide of sequence SEQ ID No 1 is the polynucleotide of sequence SEQ ID No 3 that corresponds to the T7 end-sequence of SEQ ID No1, located on the opposite strand. The polynucleotide of sequence SEQ ID No1 contains 11 ORFs, the respective locations of which, taking into account the orientation of each ORF on the chromosome, on the sequence of the Mycobacterium tuberculosis chromosome, is given hereafter: The location of ORF1 is comprised between nucleotide at position nt 1695944 and nucleotide at position nt 1696441. The location of ORF2 is comprised between nucleotide at position nt 1696728 and nucleotide at position nt1697420. The location of ORF3 is comprised between nucleotide at position nt 1698096 and nucleotide at position nt1699892. ORF3 probably encodes a protein having the characteristics of a membrane protein. The location of ORF4 is comprised between nucleotide at position nt 1700210 and nucleotide at position nt1701088. The location of ORF5 is comprised between nucleotide at position nt 1701293 and nucleotide at position nd1702588. ORF5 encodes a protein having the characteristics of a membrane protein. The location of ORF6 is comprised between nucleotide at position nt 1703072 and nucleotide at position nt1704091. ORF6 encodes a protein having the characteristics of a GDP-D-mannose dehydratase. The location of ORF7 is comprised between nucleotide at position nt 1704091 and nucleotide at position nt1705056. ORF7 encodes a protein having the characteristics of a nucleotide sugar epimerase involved in colanic acid biosynthesis. The location of ORF8 is comprised between nucleotide at position nt 1705056 and nucleotide at position nt1705784. The location of ORF9 is comprised between nucleotide at position nt 1705808 and nucleotide at position nt1706593. ORF9 encodes a protein having the characteristics of colanic acid biosynthesis glycosyl transferase. The location of ORF10 is comprised between nucleotide at position nt 1706631 and nucleotide at position nt 1707524. The location of ORF11is comprised between nucleotide at position nt 1707530 and nucleotide at position nt1708648. ORF11 encodes a protein similar to a spore coat polysaccharide biosynthesis. A polynucleotide of interest obtained by the above-disclosed method according to the invention may also contain at least one ORF that encodes all or part of acidic, glycine-rich proteins, belonging to the PE and PPE families, whose genes are often clustered and based on multiple copies of the polymorphic repetitive sequences. The names PE and PPE derive from the fact that the motifs ProGlu (PE, positions 8, 9) and ProProGlu (PPE, positions 7 to 9) are found near the N-terminus in almost all cases. The PE protein family all have a highly conserved N-terminal domain of ˜110 amino acid residues, that is predicted to have a globular structure, followed by a C-terminal segment which varies in size, sequence and repeat copy number. Phylogenetic analysis separated the PE family into several groups, the larger of which is the highly repetitive PGRS class containing 55 members whereas the other groups share very limited sequence similarity in their C-terminal domains. The predicted molecular weights of the PE proteins vary considerably as a few members only contain the ˜110 amino acid N-terminal domain while the majority have C-terminal extensions ranging in size from 100 up to >1400 residues. A striking feature of the PGRS proteins is their exceptional glycine content (up to 50%) due to the presence of multiple tandem repetitions of GlyGlyAla or GlyGlyAsn motifs or variations thereof. Like the PE family, the PPE protein family also has a conserved N-terminal domain that comprises ˜180 amino acid residues followed by C-terminal segments that vary considerably in sequence and length. These proteins fall into at least three groups, one of which constitutes the MPTR class characterised by the presence of multiple, tandem copies of the motif AsnXGlyXGlyAsnXGly (SEQ ID NO. 730). The second subgroup contains a characteristic, well-conserved motif around position 350 (GlyXXSerValProXXTrp)(SEQ ID NO. 731), whereas the other group contains proteins that are unrelated except for the presence of the common 180-residue PPE domain. C-terminal extensions may range in size from 00 up to 3500 residues. One member of the PGRS sub-family, the WHO antigen 22T (Abou-Zeid et al., 1991), a 55 kD protein capable of binding fibronectin, is produced during disease and elicits a variable antibody response suggesting either that individuals mount different immune responses or that this PGRS-protein may not be produced in this form by all strains of M. tuberculosis. In other words, at least some PE_PGRS coding sequences encode for proteins that are involved in the recognition of M. tuberculosis by the immune system of the infected host. Therefore, differences in the PGRS sequences could represent the principal source of antigenic variation in the otherwise genetically and antigenically homogeneous bacterium. By performing the method of the invention using the M. tuberculosis BAC based DNA library I-1945, the inventors have discovered the occurrence of sequence differences between a given PGRS encoding ORF (ORF reference on the genomic sequence of M. tuberculosis Rv0746) of M. tuberculosis and its counterpart sequence in the genome of M. bovis BCG. More precisely, the inventors have determined that one ORF contained in BAC vector No Rv418 of the M. tuberculosis BCG I-1945 DNA library carries both base additions and base deletions when compared with the corresponding ORF in the genome of M. bovis BCG that is contained in the BAC vector No X0175 of the M. bovis BCG I-2049 DNA library. The variations observed in the base sequences correspond to variations in the C-terminal part of the amino acid sequence of the PGRS ORF translation product. As shown in FIG. 6, an amino acid stretch of 9 residues in length is present in this M. tuberculosis PGRS (ORf reference Rv0746) and is absent from the ORF counterpart of M. bovis BCG, namely the following amino acid sequence: NH2- (SEQ ID NO. 732) GGAGGAGGSSAGGGGAGGAGGAGGWLLGD- COOH. Furthermore, FIG. 6 shows also that an amino acid stretch of 45 residues in length is absent from this M. tuberculosis PGRS and is present in the ORF counterpart of M. bovis BCG, namely following amino acid sequence: (SEQ ID NO. 733) NH2-GAGGIGGIGGNANGGAGGNGGTGGQLWGSGGAGVEGGAAL SVGDT-COOH. Similar observations were made with PPE ORF Rv0442, which showed a 5 codon deletion relative to a M. bovis amino acid sequence. Given that the polymorphism associated with the PE-PGRS or PEE ORFS resulted in extensive antigenic variability or reduced antigen presentation, this would be of immense significance for vaccine design, for understanding protective immunity in tuberculosis and, possibly, explain the varied responses seen in different BCG vaccination programmes. There are several striking parallels between the PGRS proteins and the Epstein-Barr virus-encoded nuclear antigens (EBNA). Both polypeptide families are glycine-rich, contain Gly-Ala repeats that represent more than one third of the molecule, and display variation in the length of the repeat region between different isolates. The Gly-Ala repeat region of EBNA1 has been shown to function as a cis-acting inhibitor of antigen processing and MHC class I-restricted antigen presentation. (Levitskaya et al., 1995). The fact that MHC class I knock-out mice are extremely susceptible to M. tuberculosis underlines the importance of MHC class I antigen presentation in protection against tuberculosis. Therefore, it is possible that the PE/PPE protein family also play some role in inhibiting antigen presentation, allowing the bacillus to hide from the host's immune system. As such the novel and nonobvious PGRS polynucleotide from M. bovis which is homolog to the M. tuberculosis ORF Rv0746, and which is contained in the BAC clone No X0175 (See Table 4 for SP6 and T7 end-sequences of clone no X0175) of the I-2049 M. bovis BCG BAC DNA library is part of the present invention, as it represents a starting material in order to define specific probes or primers useful for detection of antigenic variability in mycobacterial strains, possible inhibition of antigen processing as well as to differentiate M. tuberculosis from M. bovis BCG. Thus, a further object of the invention consists in a polynucleotide comprising the sequence SEQ ID No 4. Polynucleotides of interest have been defined by the inventors as useful detection tools in order to differentiate M. tuberculosis from M. bovis BCG. Such polynucleotides are contained in the 45 amino acid length coding sequence that is present in M. bovis BCG but absent from M. tuberculosis. This polynucleotide has a sequence beginning (5′ end) at the nucleotide at position nt 729 of the sequence SEQ ID No 4 and ending (3′ end) at the nucleotide in position nt 863 of the sequence SEQ ID No 4. Thus, part of the present invention is also a polynucleotide which is chosen among the following group of polynucleotides: a) a polynucleotide comprising at least 8 consecutive nucleotides of the nucleotide sequence SEQ ID No 5; b) a polynucleotide which sequence is fully complementary to the sequence of the polynucleotide defined in a); c) a polynucleotide that hybridizes under stringent hybridization conditions with the polynucleotide defined in a) or with the polynucleotide defined in b). The stringent hybridization conditions for the purpose of defining the above disclosed polynucleotide are defined herein before in the specification. The invention also provides for a BAC-based Mycobacterium tuberculosis strain H37Rv genomic DNA library that has been deposited in the Collection Nationale de Cultures de Microorganismes on Nov. 19, 1997 under the accession number I-1945. A further object of the invention consists in a recombinant BAC vector which is chosen among the group consisting of the recombinant BAC vectors belonging to the BAC-based DNA library I-1945. Generally, a recombinant BAC vector of interest may be chosen among the following set or group of BAC vectors contained in the BAC-based DNA library I-1945: Rv101; Rv102; Rv103; Rv104; Rv105; Rv106; Rv107; Rv108; Rv109; Rv10; Rv110; Rv111; Rv112; Rv113; Rv114; Rv115; Rv116; Rv117; Rv118; Rv119; Rv11; Rv120; Rv121; Rv122; Rv123; Rv124; Rv126; Rv127; Rv128; Rv129; Rv130; Rv132; Rv134; Rv135; Rv136; Rv137; Rv138; Rv139; Rv13; Rv140; Rv141; Rv142; Rv143; Rv144; Rv145; Rv146; Rv147; Rv148; Rv149; Rv14; Rv150; Rv151; Rv152; Rv153; Rv154; Rv155; Rv156; Rv157; Rv159; Rv15; Rv160; Rv161; Rv162; Rv163; Rv164; Rv165; Rv166; Rv167; Rv169; Rv16; Rv170; Rv171; Rv172; Rv173; Rv174; Rv175; Rv176; Rv177; Rv178; Rv179; Rv17; Rv180; Rv181; Rv182; Rv183; Rv184; Rv185; Rv186; Rv187; Rv188; Rv18; Rv190; Rv191; Rv192; Rv193; Rv194; Rv195; Rv196; Rv19; Rv1; Rv201; Rv204; Rv205; Rv207; Rv209; Rv20; Rv214; Rv215; Rv217; Rv218; Rv219; Rv21; Rv220; Rv221; Rv222; Rv223; Rv224; Rv225; Rv226; Rv227; Rv228; Rv229; Rv22; Rv230; Rv231; Rv232; Rv233; Rv234; Rv235; Rv237; Rv240; Rv241; Rv243; Rv244; Rv245; Rv246; Rv247; Rv249; Rv24; Rv251; Rv252; Rv253; Rv254; Rv255; Rv257; Rv258; Rv259; Rv25; Rv260; Rv261; Rv262; Rv263; Rv264; Rv265; Rv266; Rv267; Rv268; Rv269; Rv26; Rv270; Rv271; Rv272; Rv273; Rv274; Rv275; Rv276; Rv277; Rv278; Rv279; Rv27; Rv280; Rv281; Rv282; Rv283; Rv284; Rv285; Rv286; Rv287; Rv288; Rv289; Rv28; Rv290; Rv291; Rv292; Rv293; Rv294; Rv295; Rv296; Rv29; Rv2; Rv301; Rv302; Rv303; Rv304; Rv306; Rv307; Rv308; Rv309; Rv30; Rv310; Rv31; Rv312; Rv313; Rv314; Rv315; Rv316; Rv317; Rv318; Rv319; Rv31; Rv32; Rv322; Rv327; Rv328; Rv329; Rv32; Rv330; Rv331; Rv333; Rv334; Rv335; Rv336; Rv337; Rv338; Rv339; Rv33; Rv340; Rv341; Rv343; Rv344; Rv346; Rv347; Rv348; Rv349; Rv34; Rv350; Rv351; Rv352; Rv353; Rv354; Rv355; Rv356; Rv357; Rv358; Rv359; Rv35; Rv360; Rv361; Rv363; Rv364; Rv365; Rv366; Rv367; Rv368; Rv369; Rv36; Rv370; Rv371; Rv373; Rv374; Rv375; Rv376; Rv377; Rv378; Rv379; Rv37; Rv381; Rv382; Rv383; Rv384; Rv385; Rv386; Rv387; Rv388; Rv389; Rv38; Rv390; Rv391; Rv392; Rv393; Rv396; Rv39; Rv3; Rv40; Rv412; Rv413; Rv414; Rv415; Rv416; Rv417; Rv418; Rv419; Rv41; Rv42; Rv43; Rv44; Rv45; Rv46; Rv47; Rv48; Rv49; Rv4; Rv50; Rv51; Rv52; Rv53; Rv54; Rv55; Rv56; Rv57; Rv58; Rv59; Rv5; Rv60; Rv61; Rv62; Rv63; Rv64; Rv65; Rv66; Rv67; Rv68; Rv69; Rv6; Rv70; Rv71; Rv72; Rv73; Rv74; Rv75; Rv76; Rv77; Rv78; Rv79; Rv7; Rv80; Rv81; Rv82; Rv83; Rv84; Rv85; Rv86; Rv87; Rv88; Rv89; Rv8; Rv90; Rv91; Rv92; Rv94; Rv95; Rv96; Rv9. The end sequences of the polynucleotide inserts of each of the above clones corresponding respectively to the sequences adjacent to the T7 promoter and to the Sp6 promoter on the BAC vector are shown in Table 3. It has been shown by the inventors that the minimal overlapping set of BAC vectors of the BAC-based DNA library I-1945 contains 68 unique BAC clones and practically spans almost the whole H37Rv chromosome with the exception of a single gap of approximately 150 kb. More specifically, a recombinant BAC vector of interest is chosen among the following set or group of BAC vectors from the BAC-based DNA library I-1945, the location of which vector DNA inserts on the chromosome of M. tuberculosis is shown in FIG. 3: Rv234; Rv351; Rv166; Rv35; Rv415; Rv404; Rv209; Rv272; Rv30; Rv228; Rv233; Rv38; Rv280; Rv177; Rv48; Rv374; Rv151; Rv238; Rv156; Rv92; Rv3; Rv403; Rv322; Rv243; Rv330; Rv285; Rv233; Rv219; Rv416; Rv67; Rv222; Rv149; Rv279; Rv87; Rv273; Rv266; Rv25; Rv136; Rv414; Rv13; Rv289; Rv60; Rv104; Rv5; Rv165; Rv215; Rv329; Rv240; Rv19; Rv74; Rv411; Rv167; Rv56; Rv80; Rv164; Rv59; Rv313; Rv265; Rv308; Rv220; Rv258; Rv339; Rv121; Rv419; Rv418; Rv45; Rv217; Rv134; Rv17; Rv103; Rv21; Rv22; Rv2; Rv270; Rv267; Rv174; Rv257; Rv44; Rv71; Rv7; Rv27; Rv191; Rv230; Rv128; Rv407; Rv106; Rv39; Rv255; Rv74; Rv355; Rv268; Rv58; Rv173; Rv264; Rv417; Rv401; Rv144; Rv302; Rv81; Rv163; Rv281; Rv221; Rv420; Rv175; Rv86; Rv412; Rv73; Rv269; Rv214; Rv287; Rv42; Rv143. The polynucleotides disclosed in Table 3 may be used as probes in order to select a given clone of the BAC DNA library I-1945 for further use. The invention also provides for a BAC-based Mycobacterium bovis strain Pasteur genomic DNA library that has been deposited in the Collection Nationale de Cultures de Microorganismes on Jun. 30, 1998 under the accession number I-2049. A further object of the invention consists in a recombinant BAC vector which is chosen among the group consisting of the recombinant BAC vectors belonging to the BAC-based DNA library I-2049. This DNA library contains approximately 1600 clones. The average insert size is estimated to be ˜80 kb. Generally, a recombinant BAC vector of interest may be chosen among the following set or group of BAC vectors contained in the BAC-based DNA library I-2049: X000; X0002; X0003; X0004; X0006; X0007; X0008; X0009; X0010; X0012; X0013; X0014; X0015; X0016; X0017; X0018; X0019; X0020; X0021; X0175. The end sequences of the polynucleotide inserts of each of the above clones corresponding respectively to the sequences adjacent to the T7 promoter and to the Sp6 promoter on the BAC vector are shown in Table 4. The polynucleotides disclosed in Table 4 may be used as probes in order to select a given clone of the BAC DNA library I-2049 for further use. Are also part of the invention the polynucleotide inserts that are contained in the above described BAC vectors, that are useful as primers or probes. These polynucleotides and nucleic acid fragments may be used as primers for use in amplification reactions, or as nucleic probes. PCR is described in the U.S. Pat. No 4,683,202. The amplified fragments may be identified by an agarose or a polyacrylamide gel electrophoresis, or by a capillary electrophoresis or alternatively by a chromatography technique (gel filtration, hydrophobic chromatography or ion exchange chromatography). The specificity of the amplification may be ensured by a molecular hybridization using, for example, one of the initial primers as nucleic probes. Amplified nucleotide fragments are used as probes in hybridization reactions in order to detect the presence of one polynucleotide according to the present invention or in order to detect mutations in the genome of the given mycobacterium of interest, specifically a mycobacterium belonging to the Mycobacterium tuberculosis complex and more specifically Mycobacterium tuberculosis and Mycobacterium bovis BCG. Are also part of the present invention the amplified nucleic fragments (<<amplicons>>) defined herein above. These probes and amplicons may be radioactively or non-radioactively labeled, using for example enzymes or fluorescent compounds. Other techniques related to nucleic acid amplification may also be used and are generally preferred to the PCR technique. The Strand Displacement Amplification (SDA) technique (Walker et al., 1992) is an isothermal amplification technique based on the ability of a restriction enzyme to cleave one of the strands at his recognition site (which is under a hemiphosphorothioate form) and on the property of a DNA polymerase to initiate the synthesis of a new strand from the 3′OH end generated by the restriction enzyme and on the property of this DNA polymerase to displace the previously synthesized strand being localized downstream. The SDA method comprises two main steps: a) The synthesis, in the presence of dCTP-alpha-S, of DNA molecules that are flanked by the restriction sites that may be cleaved by an appropriate enzyme. b) The exponential amplification of these DNA molecules modified as such, by enzyme cleavage, strand displacement and copying of the displaced strands. The steps of cleavage, strand displacement and copy are repeated a sufficient number of times in order to obtain an accurate sensitivity of the assay. The SDA technique was initially realized using the restriction endonuclease HindIII but is now generally practised with an endonuclease from Bacillus stearothermophilus (BSOBI) and a fragment of a DNA polymerase which is devoid of any 5′→3′exonuclease activity isolated from Bacillus cladotenax (exo−Bca)[=exo−minus−Bca]. Both enzymes are able to operate at 60° C. and the system is now optimized in order to allow the use of dUTP and the decontamination by UDG. When using this technique, as described by Spargo et al. in 1996, the doubling time of the target DNA is of 26 seconds and the amplification rate is of 1010 after an incubation time of 15 min at 60° C. The SDA amplification technique is more easy to perform than PCR (a single thermostated waterbath device is necessary) and is faster than the other amplification methods. Thus, another object of the present invention consists in using the nucleic acid fragments according to the invention (primers) in a method of DNA or RNA amplification according to the SDA technique. For performing SDA, two pairs of primers are used: a pair of external primers (B1, B2) consisting of a sequence specific for the target polynucleotide of interest and a pair of internal primers (S1, S2) consisting of a fusion oligonucleotide carrying a site that is recognized by a restriction endonuclease, for example the enzyme BSOBI. The operating conditions to perform SDA with such primers are described in Spargo et al, 1996. The polynucleotides of the invention and their above described fragments, especially the primers according to the invention, are useful as technical means for performing different target nucleic acid amplification methods such as: TAS (Transcription-based Amplification System), described by Kwoh et al. in 1989. SR (Self-Sustained Sequence Replication), described by Guatelli et al. in 1990. NASBA (Nucleic acid Sequence Based Amplification), described by Kievitis et al. in 1991. TMA (Transcription Mediated Amplification). The polynucleotides according to the invention are also useful as technical means for performing methods for amplification or modification of a nucleic acid used as a probe, such as: LCR (Ligase Chain Reaction), described by Landegren et al. in 1988 and improved by Barany et al. in 1991 who employ a thermostable ligase. RCR (Repair Chain Reaction) described by Segev et al. in 1992. CPR ( Cycling Probe Reaction), described by Duck et al. in 1990. Q-beta replicase reaction, described by Miele et al. in 1983 and improved by Chu et al. in 1986, Lizardi et al. in 1988 and by Burg et al. and Stone et al. in 1996. When the target polynucleotide to be-detected is a RNA, for example a MRNA, a reverse transcriptase enzyme will be used before the amplification reaction in order to obtain a cDNA from the RNA contained in the biological sample. The generated cDNA is subsequently used as the nucleic acid target for the primers or the probes used in an amplification process or a detection process according to the present invention. The non-labeled polynucleotides or oligonucleotides of the invention may be directly used as probes. Nevertheless, the polynucleotides or oligonucleotides are generally labeled with a radioactive element 32P, 35S, 3H, 125I) or by a nonisotopic molecule (for example, biotin, acetylaminofluorene, digoxigenin, 5bromodesoxyuridin, fluorescein) in order to generate probes that are useful for numerous applications. Examples of non-radioactive labeling, of nucleic acid-fragments are described in the french patent No FR-7810975 or by Urdea et al. or Sanchez-Pescador et al., 1988. In the latter case, other labeling techniques may be also used such as those described in the french patents FR-2 422 956 and 2 518 755. The hybridization step may be performed in different ways (Matthews et al., 1988). The more general method consists of immobilizing the nucleic acid that has been extracted from the biological sample onto a substrate (nitrocellulose, nylon, polystyrene) and then to incubate, in defined conditions, the target nucleic acid with the probe. Subsequently to the hybridization step, the excess amount of the specific probe is discarded and the hybrid molecules formed are detected by an appropriate method (radioactivity, fluorescence or enzyme activity measurement). Advantageously, the probes according to the present invention may have structural characteristics such that they allow the signal amplification, such structural characteristics being, for example, branched DNA probes as those described by Urdea et al. in 1991 or in the European patent No EP-0 225 807 (Chiron). In another advantageous embodiment of the probes according to the present invention, the latters may be used as <<capture probes>>, and are for this purpose immobilized on a substrate in order to capture the target nucleic acid contained in a biological sample. The captured target nucleic acid is subsequently detected with a second probe which recognizes a sequence of the target nucleic acid which is different from the sequence recognized by the capture probe. The oligonucleotide probes according to the present invention may also be used in a detection device comprising a matrix library of probes immobilized on a substrate, the sequence of each probe of a given length being localized in a shift of one or several bases, one from the other, each probe of the matrix library thus being complementary to a distinct sequence of the target nucleic acid. Optionally, the substrate of the matrix may be a material able to act as an electron donor, the detection of the matrix positions in which an hybridization has occurred being subsequently determined by an electronic device. Such matrix libraries of probes and methods of specific detection of a target nucleic acid is described in the European patent application No EP-0 713 016 (Affymax technologies) and also in the U.S. Pat. No. 5,202,231 (Drmanac). Since almost the whole length of a mycobacterial chromosome is covered by a BAC-based genomic DNA libraries according to the present invention (i.e. 97% of the M. tuberculosis chromosome is covered by the BAC library I-1945), these DNA libraries will play an important role in a plurality of post-genomic applications, such as in mycobacterial gene expression studies where the canonical set of BACs could be used as a matrix for hybridization studies. Probing such matrices with cDNA probes prepared from total mRNA will uncover genetic loci induced or repressed under different physiological conditions (Chuang et al., 1993; Trieselmann et al., 1992). As such, the H37Rv BAC library represents a fundamental resource for present and future genomics investigations. The BAC vectors or the polynucleotide inserts contained therein may be directly used as probes, for example when immobilized on a substrate such as described herein before. The BAC vectors or their polynucleotide inserts may be directly absorbed on a nitrocellulose membrane, at predetermined locations on which one or several polynucleotides to be tested are then put to hybridize therewith. Preferably, a collection of BAC vectors that spans the whole genome of the mycobacterium under testing will be immobilized, such as, for example, the set of 68 BAC vectors of the I-1945 DNA library that is described elsewhere in the specification and shown in FIG. 3. The immobilization and hybridization steps may be performed as described in the present Materials and Methods Section. As another illustrative embodiment of the use of the BAC vectors of the invention as polynucleotide probes, these vectors may be useful to perform a transcriptional activity analysis of mycobacteria growing in different environmental conditions, for example under conditions in which a stress response is expected, as it is the case at an elevated temperature, for example 40° C. In this specific embodiment of the invention, Genescreen membranes may be used to immobilize the restriction endonuclease digests (HindIII digests for the BAC DNA library I-1945) of the BAC vectors by transfer from a gel (Trieselmann et al., 1992). Alternatively, the BAC vectors may be immobilized for dot blot experiments as follows. First, the DNA concentration of each BAC clone is determined by hybridization of blots of clone DNAs and of a BAC vector concentration standard with a BAC vector specific DNA probe. Hybridization is quantified by the Betascope 603 blot analyzer (Betagen Corp.), which collects beta particles directly from the blot with high efficiency. Then, 0.5 μg of each clone DNA is incubated in 0.25 M NaOH and 10 mM EDTA at 65° C. for 60 min to denature the DNA and degrade residual RNA contaminants. By using a manifold filtration system (21 by 21 wells), each clone DNA is blotted onto a GeneScreen Plus nylon membrane in the alkaline solution. After neutralization, the blots are baked at 85° C. for 2 h under vacuum. Positive and negative controls are added when necessary. In order to perform this procedure, it may be refer-red to the article of Chuang et al. (1993). For RNA extractions, cells grown in a suitable volume of culture medium may, for example, be immediately mixed with an equal volume of crushed ice at −70° C. and spun at 4° C. in a 50 ml centrifugation tube. The cell pellet is then suspended in 0.6 ml of ice-cold buffer (10 mM KCl, 5 mM MgCl, 10 mM Tris; pH 7.4) and then immediately added to 0.6 ml of hot lysis buffer (0.4 M NaCl, 40 mM EDTA, 1% beta-mercaptoethanol, 1% SDS, 20 mM Tris; pH 7.4) containing 100 μl of water saturated phenol. This mixture is incubated in a boiling water bath for 40 s. The debris are removed by centrifugation. The supernatant is extracted with phenol-chloroform five times, ethanol precipitated, and dried. The dried RNA pellet is dissolved in water before use. Then labeled total cDNA may be prepared by the following method. The reaction mixture contains 15 μg of the previously prepared total RNA, 5 μg of pd(N6) (random hexamers from Pharmacia Inc.), 0.5 mM dATP, 0.5 mM dGTP and 0.5 mM DTTP, 5 μM dCTP, 100 μCi of [α-32P]dCTP (3,000 Ci/mmol), 50 mM Tris-HCl (pH 8.3), 6 mM MgCl2, 40 mM Kcl, 0.5 U of avian myeloblastosis virus reverse transcriptase (Life Science Inc.) in a total volume of 50 μl. The reaction is allowed to continue overnight at room temperature. EDTA and NaOH are then added to final concentrations of 50 mM and 0.25 M, respectively, and the mixture is incubated at 65° C. for 30 min to degrade the RNA templates. The cDNA is then ready to use after neutralization by adding Hcl and Tris buffer. The hybridization step may be performed as described by Chuang et al. (1993) and briefly disclosed hereinafter. The DNA dot blot is hybridized to 32P-labeled total cDNA in a solution containing 0.1% polyvinylpyrrolidone, 0.1% Ficoll 0.1% sodium Ppi, 0.1% bovine serum albumin, 0.5% SDS, 100 mM NaCl, and 0.1 mM sodium citrate, pH 7.2, at 65° C. for 2 days and then washed with a solution containing 0.1% SDS, 100 mM NaCl, and 10 mM Na-citrate, pH 7.2. The same dot blot is used for hybridization with both control and experimental cDNAs, with an alkaline probe stripping procedure (soaked twice in 0.25M NaOH-0.75 M NaCl at room temperature, 30 min each, neutralized, and completely dried at 65° C. for at least 30 min) between the two hybridizations. Quantification may be done with the Betascope 603 blot analyzer (Betagen Corp.). As it flows from the above technical teachings, another object of the invention consists in a method for detecting the presence of mycobacteria in a biological sample comprising the steps of: a) bringing into contact the recombinant BAC vector or a purified polynucleotide according to the invention with a biological sample; b) detecting the hybrid nucleic acid molecule formed between said purified polynucleotide and the nucleic acid molecules contained within the biological sample. The invention further deals with a method for detecting the presence of mycobacteria in a biological sample comprising the steps of: a) bringing into contact the recombinant BAC vector or a purified polynucleotide according to the invention that has been immobilized onto a substrate with a biological sample; b) bringing into contact the hybrid nucleic acid molecule formed between said purified polynucleotide and the nucleic acid contained in the biological sample with a labeled recombinant BAC vector or a polynucleotide according to the invention, provided that said polynucleotide and polynucleotide of step a) have non-overlapping sequences. Another object of the invention consists in a method for detecting the presence of mycobacteria in a biological sample comprising the steps of: a) bringing into contact the nucleic acid molecules contained in the biological sample with a pair of primers according to the invention; b) amplifying said nucleic acid molecules; c) detecting the nucleic acid fragments that have been amplified, for example by gel electrophoresis or with a labeled polynucleotide according to the invention. In one specific embodiment of the above detection and/or amplification methods, said methods comprise an additional step wherein before step a), the nucleic acid molecules of the biological sample have been made available to a hybridization reaction. In another specific embodiment of the above detection methods, said methods comprise an additional step, wherein, before the detection step, the nucleic acid molecules that are not hybridized with the immobilized purified polynucleotide are removed. Also part of the invention is a kit for detecting mycobacteria in a biological sample comprising: a) a recombinant BAC vector or a purified polynucleotide according to the invention; b) reagents necessary to perform a nucleic acid hybridization reaction. The invention also pertains to a kit for detecting a mycobacteria in a biological sample comprising: a) a recombinant BAC vector or a purified polynucleotide according to the invention that is immobilized onto a substrate; b) reagents necessary to perform a-nucleic acid hybridization reaction; c) a purified polynucleotide according to the invention which is radioactively or non-radioactively labeled, provided that said polynucleotide and the polynucleotide of step a) have non-overlapping sequences. Moreover, the invention provides for a kit for detecting mycobacteria in a biological sample comprising: a) a pair of purified primers according to the invention; b) reagents necessary to perform a nucleic acid amplification reaction; c) optionally, a purified polynucleotide according to the invention useful as a probe. The invention embraces also a method for detecting the presence of a genomic DNA, a cDNA or a MRNA of mycobacteria in a biological sample, comprising the steps of: a) bringing into contact the biological sample with a plurality of BAC vectors according to the invention or purified polynucleotides according to the invention, that are immobilized on a substrate; b) detecting the hybrid complexes formed. The invention also provides a kit for detecting the presence of genomic DNA, cDNA or MRNA of a mycobacterium in a biological sample, comprising: a) a substrate on which a plurality of BAC vectors according to the invention or purified polynucleotides according to the invention have been immobilized; b) optionally, the reagents necessary to perform the hybridization reaction. Additionally, the recombinant BAC vectors according to the invention and the polynucleotide inserts contained therein may be used for performing detection methods based on <<molecular combing>>. Said methods consist in methods for aligning macromolecules, especially DNA and are applied to processes for detecting, for measuring intramolecular distance, for separating and/or for assaying a macromolecule, especially DNA in a sample. These <<molecular combing>> methods are simple methods, where the triple line S/A/B (meniscus) resulting form the contact between a solvent A and the surface S and a medium B is caused to move on the said surface S, the said macromolecules (i.e. DNA) having a part, especially an end, anchored on the surface S, the other part, especially the other end, being in solution in the solvent A. These methods are particularly fully described in the PCT Application no PCT/FR 95/00165 files on Feb. 11, 1994 (Bensimon et al.). When performing the <<molecular combing>> method with the recombinant BAC vectors according to the inventions or their polynucleotide inserts, the latters may be immobilized (<<anchored>>) on a suitable substrate and aligned as described in the PCT Application no PCT/FR 95/00165, the whole teachings of this PCT Application being herein incorporated by reference. Then, polynucleotides to be tested, preferably under the form of radioactively or non radioactively labeled polynucleotides, that may consist of fragments of genomic DNA, cDNA etc. are brought into contact with the previously aligned polynucleotides according to the present invention and then their hybridization position on the aligned DNA molecules is determined using any suitable means including a microscope or a suitable camera device. Thus, the present invention is also directed to a method for the detection of the presence of a polynucleotide of mycobacterial origin in a biological sample and/or for physical mapping of a polynucleotide on a genomic DNA, said method comprising: a) aligning at least one polynucleotide contained in a recombinant BAC vector according to the invention on the surface of a substrate; b) bringing into contact at least one polynucleotide to be tested with the substrate on which the at least one polynucleotide of step a) has been aligned; c) detecting the presence and/or the location of the tested polynucleotide on the at least one aligned polynucleotide of step a). The invention finally provides for a kit for performing the above method, comprising: a) a substrate whose surface has at least one polynucleotide contained in a recombinant BAC vector according to the invention; b) optionally, reagents necessary for labeling DNA; c) optionally, reagents necessary for performing a hybridization reaction. In conclusion, it may be underlined that the alliance of such BAC-based approaches such as described in the present specification to the advances in comparative genomics by the availability of an increased number of complete genomes, and the rapid increase of well-characterized gene products in the public databases, will allow the one skilled in the art an exhaustive analysis of the mycobacterial genome. MATERIALS AND METHODS 1. DNA-preparation. Preparation of M tuberculosis H37Rv DNA in agarose plugs was conducted as previously described (Canard et al., 1989; Philipp et al., 1996b). Plugs were stored in 0.2 M EDTA at 4° C. and washed 3 times in 0.1% Triton X-100 buffer prior to use. 2. BAC vector preparation. pBeloBAC11 was kindly provided by Dr. Shizuya, Department of Biology, California Institute of Technology (Pasadena, Calif.). The preparation followed the description of Woo et al., 1994 (Woo et al., 1994). 3. Partial digestion with HindIII. Partial digestion was carried out on plugs, each containing approximately 10 μg of high molecular weight DNA, after three one hour equilibration steps in 50 ml of HindIII 1 X digestion buffer (Boehringer Mannheim, Mannheim, Germany) plus 0.1% Triton X-100. The buffer was then removed and replaced by 1 ml/plug of ice-cold HindIII enzyme buffer containing 20 units of HindIII (Boehringer). After two hours incubation on ice, the plugs were transferred to a 37° C. water bath for 30 minutes. Digestions were stopped by adding 500 μl of 50 mM EDTA (pH 8.0). 4. Size selection. The partially digested DNA was subjected to contour-clamped homogenous electric field (CHEF) electrophoresis on a 1% agarose gel using a BioRad DR III apparatus (BioRad, Hercules, Calif.) in IX TAE buffer at 13° C., with a ramp from 3 to 15 seconds at 6 V/cm for 16 hours. Agarose slices from 25 to 75 kb, 75 to 120 kb and 120 to 180 kb were excised from the gel and stored in TE at 4° C. 5. Ligation and transformation. Agarose-slices containing fractions from 25 to 75 kb, 75 to 120 kb and 120 to 180 kb were melted at 65° C. for 10 minutes and digested with Gelase (Epicentre Technologies, Madison, Wis.), using 1 unit per 100 μl gel-slice. 25-100 ng of the size-selected DNA was then ligated to 10 ng of HindIII digested, dephosphorylated pBeloBAC11 in a 1:10 molar ratio using 10 units of T4 DNA ligase (New England Biolabs, Beverly, Mass.) at 16° C. for 20 hours. Ligation mixtures were heated at 65° C. for 15 minutes, then drop-dialysed against TE using Millipore VS 0.025 mM membranes (Millipore, Bedford, Mass.). Fresh electrocompetent E. coli DH10B cells (Sheng et al., 1995) were harvested from 200 ml of a mid-log (OD550=0.5) culture grown in SOB medium. Cells were washed three times in ice-cold water, and finally resuspended in ice-cold water to a cell density of 1011 cells/ml(OD550=150). 1 μl of the ligation-mix was used for electroporation of 30 μl of electrocompetent DH1OB E. coli using a Eurogentec Easyject Plus electroporator (Eurogentec, Seraing, Belgium), with settings of 2.5 kV, 25 μF, and 99 Ω, in 2 mm wide electroporation cuvettes. After electroporation, cells were resuspended in 600 μi of SOC medium, allowed to recover for 45 minutes at 37° C. with gentle shaking, and then plated on LB agar containing 12.5 μg/ml chloramphenicol (CM), 50 μg/ml-X-gal, and 25 μg/ml IPTG. The plates were incubated overnight and recombinants (white colonies) were picked manually to 96 well plates. Each clone was inoculated 3 times (2×200 μl and 1×100 μl of 2YT/12.5 μg/ml CM per clone) and incubated overnight. One of the microtiter plates, containing 100 μl culture per well, was maintained as a master plate at −80° C. after 100 ml of 80% glycerol were added to each well, while minipreps (Sambrook et al., 1989) were prepared from the remaining two plates to check for the presence of inserts. Clones containing inserts were then designated “Rv” clones, repicked from the master plate to a second set of plates for storage of the library at −80° C. 6. Preparation of DNA for sizing, direct sequencing and comparative genomics. A modified Birnboim and Doly protocol (Birnboim et al., 1979) was used for extraction of plasmid DNA for sequencing purposes. Each Rv clone was inoculated into a 50 ml Falcon polypropylene tube containing 40 ml of 2YT medium with 12.5 μg/ml of CM and grown overnight at 37° C. with shaking. Cells were harvested by centrifugation and stored at −20° C. The frozen pellet was resuspended in 4 ml of Solution A (50 mM glucose, 10 mM EDTA, 25 mM Tris, pH 8.0) and 4 ml of freshly prepared solution B (0.2 M NaOH 0.2% SDS) was then added. The solution was gently mixed and kept at room temperature for 5 minutes before adding 4 ml of ice-cold solution C (3M Sodium Acetate, pH 4.7). Tubes were kept on ice for 15 min, and centrifuged at 10,000 rpm for 15 min. After isopropanol precipitation, the DNA pellet was dissolved in 600 μl RNase solution (15 mM Tris HCl pH 8.0, 10 μg/ml RNase A). After 30 minutes at 37° C. the DNA solution was extracted with chloroform:isoamylalcohol (24:1) and precipitated from the aqueous phase using isopropanol. The DNA pellet was then rinsed with 70% ethanol, air-dried and dissolved in 30 μl distilled water. In general, DNA prepared by this method was clean and concentrated enough to give good quality results by automatic sequencing (at least 300 bp of sequence). For a few DNA preparations, an additional polyethylene glycol (PEG) precipitation step was necessary, which was performed as follows. The 30 μl of DNA solution were diluted to 64 μl, mixed gently and precipitated using 16 μl 4M NaCl and 80 μl of 13% PEG 8000. After 30 min on ice the tubes were centrifuged at 4° C., the pellet carefully rinsed with 70% ethanol, air-dried and diluted in 20 μl of distilled water. 7. Sizing of inserts. Insert sizes were determined by pulsed-field gel electrophoresis (PFGE) after cleavage with DraI (Promega). 100-200 ng of DNA was DraI-cleaved in 20 μl total reaction volume, following the manufacturer's recommendations, then loaded onto a 1% agarose gel and migrated using a pulse of 4 s for 15 h at 6.25 V/cm at 10° C. on an LKB-Pharmacia CHEF apparatus. Mid-range and low-range PFGE markers (New England Biolabs) were used as size standards. Insert sizes were estimated after ethidium bromide staining of gels. 8. Direct sequencing. For each sequencing reaction 7 μl BAC DNA (300-500 ng), 2 μl primer (2 μM), 8 μl reaction mix of the Taq DyeDeoxy Terminator cycle sequencing kit (Applied Biosystems) and 3 μl distilled water were used. After 26 cycles (96° C. for 30 sec; 56° C. for 15 sec; 60° C. for 4 min) in a thermocycler (MJ-research Inc., Watertown, Mass.) DNA was precipitated using 70 μl of 70% ethanol/0.5 mM MgCl2, centrifuged, rinsed with 70% ethanol, dried and dissolved in 2 μl of formamide/EDTA buffer. SP6 and T7 samples of 32 BAC clones were loaded onto 64 lane, 6% polyacrylamide gels and electrophoresis was performed on a Model 373A automatic DNA sequencer (Applied Biosystems) for 12 to 16 hours. The sequences of oligonucleotides used as primers are shown in Table 1. 9. DOP-PCR. As an alternate procedure we used partially degenerate oligonucleotides in combination with vector-specific (SP6 or T7) primers to amplify insert ends of BAC clones, following a previously published protocol for P1 clones (Liu et al., 1995). The degenerate primers Deg2, Deg3, Deg4, Deg6 (Table 1) gave the best results for selected amplification of insert termini. Table 1: Primers Used for PCRs and Sequencing Vector Specific Primers for DOP PCR-First Amplification Step: SP6-BAC1: AGT TAG CTC ACT CAT TAG GCA (SEQ ID NO. 734) T7-BAC1: GGA TGT GCT GCA AGG CGA TTA (SEQ ID NO. 735) Vector Specific Primers (Direct Sequencing Nested Primer for Second PCR Step) SP6 Mid: AAA CAG CTA TGA CCA TGA TTA CGC (SEQ ID NO. 736) CAA T7-Belo2: TCC TCT AGA GTC GAC CTG CAG GCA (SEQ ID NO. 737) Degenerate Primers: Deg2: TCT AGA NNN NNN TCC GGC (SEQ ID NO. 738) Deg3: TCT AGA NNN NNN GGG CCC (SEQ ID NO. 739) Deg4: CGT TTA AAN NNN NWA GGC CG (SEQ ID NO. 740) Deg6: GGT ACT AGT NNN NNW TCC GGC (SEQ ID NO. 741) Primers Used for the Amplification of M. bovis DNA in Polymorphic Chromosomal Region of Rv58: Primer 1: AGG ACC TCA TAT TCC GAA TCC C (SEQ ID NO. 742) Primer 2: GCA TCT GTT GAG TAC GCA CTT CC (SEQ ID NO. 743) 10. Screening by pooled PCR. To identify particular clones in the library which could not be detected by random end-sequencing of the 400 BAC clones, PCR-screening of DNA pools was performed. Primers were designed for regions of the chromosome where no BAC coverage was apparent using cosmid—or H37Rv whole genome shotgun sequences. Primers were designed to amplify approximately 400-500 bp. Ninety-six-well plates containing 200 μl 2YT/12.5 μg/ml CM per well were inoculated with 5 μl of −80° C. glycerol stock cultures each from the master plates and incubated overnight. The 96 clones of each plate were pooled by taking 20 μl of culture from each well and this procedure was repeated for 31 plates. Pooled cultures were centrifuged, the pellets were resuspended in sterile water, boiled for 5 minutes, centrifuged and the supernatants kept for PCRs. As an initial screening step, the 31 pools of a total of 2976 BACs, representing about two thirds of the library were tested for the presence of a specific clone using appropriate PCR primers. PCR was performed using 10 μl of supernatant, 5 μl of assay buffer (100 mM b-mercaptoethanol, 600 mM Tris HCl (pH 8.8), 20 mM MgCl2, 170 mM (NH4)2SO4), 5 μl of Dimethylsulfoxide (DMSO), 5 μl of dNTPs (20 mM), 5 μl of water, 10 μl primer (2 μM), 10 μl inverse primer (2 μM) and 0.2 units of Taq DNA polymerase (Boehringer). 32 cycles of PCR (95° C. for 30 s, 55° C. for 1 min 30 s, 72° C. for 2 min) were performed after an initial denaturation at 95° C. for 1 min. An extension step at 72° C. for 5 min finished the PCR. If a pool of 96 clones yielded an appropriate PCR product (FIG. 1A), subpools were made to identify the specific clone. Subpools representative for lane A of a 96 well plate were made by pooling clones 1 to 12 from lane A into a separate tube. Subpools for lanes B to H were made in the same way. In addition, subpools of each of the 12 rows (containing 8 clones each) were made, so that for one 96 well plate, 20 subpools were obtained. PCR with these 20 subpools identified the specific clone (FIG. 1B, lower gel portion). If more than one specific clone was present among the 96 clones of one plate (FIG. 1B, upper gel portion), additional PCR reactions had to be performed with the possible candidates (data not shown). 11. Genomic comparisons. DNA from the BAC clone Rv58 was digested with the restriction endonucleases EcoR1 and PvuII, and resolved by agarose gel electrophoresis at low voltage overnight (1.5 V/cm). DNA was transferred via the method of Southern to nitrocellulose membranes (Hybond C extra, Amersham) following standard protocols (Sambrook et al., 1989), then fixed to the membranes at 80° C. for 2 hours. The blot was hybridized with 32P labelled total genomic DNA from M. tuberculosis H37Rv, M. bovis type strain (ATCC 19210) or M. bovis BCG Pasteur. Hybridization was performed at 37° C. overnight in 50% formamide hybridization buffer as previously described (Philipp et al., 1996b). Results were interpreted from the autoradiogramis. 12. Computer analysis. Sequence data from the automated sequencer ABI373A were transferred as binary data to a Digital Alpha 200 station or Sun SparcII station and analysed using TED, a sequence analysis program from the Staden software package (Dear et al., 1991). Proof-read sequences were compared using the BLAST programs (Altschul et al., 1990) to the M. tuberculosis H37Rv sequence databases of the Sanger Centre, containing the collected cosmid sequences (TB.dbs) and whole-genome shotgun reads (TB_shotgun_all.dbs) (htto://www.sanger.ac.uk/). In addition, local databases containing 1520 cosmid end-sequences and the accumulating BAC end-sequences were used to determine the exact location of end-sequenced BACs on the physical and genetic map. MycDB (Bergh et al., 1994) and public databases (EMBL, Genbank) were also used to compare new sequences, but to a lesser extent. The organization of the open reading frames (ORFs) in the polymorphic region of clone Rv58 was determined using the DIANA software established at the Sanger Centre. EXAMPLES Example 1 Construction of a pBeloBAC11 Library of M. tuberculosis H37Rv Partial HindIII fragments of H37Rv DNA in the size range of 25 to 180 kb were ligated into pBeloBAC11 and electroplated into strain E. coli DH10B. While cloning of fractions I (25 to 75 kb) and II (75 to 120 kb) gave approximately 4×104 transformants (white colonies), cloning of fraction III (120 to 180 kb) repeatedly resulted in empty clones. Parallel cloning experiments using partial HindIII digests of human DNA resulted in stable inserts for all three fractions (data not shown), suggesting that the maximum size of large inserts in BAC clones is strongly dependent on the source of the DNA. Analysis of the clones for the presence of inserts revealed that 70% of the clones had an insert of the appropriate size while the remaining 30% of white colonies represented empty or lacZ′-mutated clones. Size determination of randomly selected, DraI cleaved BACs via PFGE showed that the insert sizes ranged for the majority of the clones between 40 kb and 100 kb with an average size of 70 kb. Clones with inserts of appropriate size were designated with “Rv” numbers, recultured and stored at −80° C. for further use. Example 2 Direct DNA Sequence Analysis of BACs To characterize the BAC clones, they were systematically subjected to insert termini sequencing. Two approaches, direct sequencing of BAC DNA and PCR with degenerate oligonucleotide primers (DOP), adapted to the high G+C content of mycobacterial DNA, were used. In a first screening phase, 50 BAC clones designated Rv1 to Rv50 were analysed using both methods in parallel. Except for two clones, where the sequences diverged significantly, the sequences obtained by the two methods only differed in length. Sequences obtained directly were on average about 350 bp long and for 95% of the clones both the SP6 and T7 end-sequences were obtained at the first attempt. Sequences obtained by DOP-PCR were mostly shorter than 300 bp. For 40% of the BACs we obtained only very short amplicons of 50 to 100 base pairs from one end. In two cases the sequence obtained with the DOP-PCR differed from the sequences obtained by direct sequencing, and in these cases E. coli or vector sequences were amplified (data not shown). Taking the advantages and disadvantages of both methods into account, we decided to use direct termini sequencing for the systematic determination of the SP6 and T7 end-sequences. Example 3 Representativity of the Library After having determined the end-sequences of 400 BACs a certain redundancy was seen. The majority of clones were represented at least 3 to 4 times. Maximum redundancy was seen in the vicinity of the unique rrn operon, as 2.5% of the clones carried identical fragments that bridge the cosmids Y50 and Y130 (FIG. 3, approximate position at 1440 kb). The majority of clones with identical inserts appeared as two variants, corresponding to both possible orientations of the HindIII fragment in pBeloBACII. This suggests that the redundancy was not the result of amplification during library construction, but due to the limited number of possible combinations of partial HindIII fragments in the given size-range of 25 to 120 kb. To detect rare BAC clones, a pooled PCR protocol was used. Primers were designed on the basis of the existing cosmid sequences and used to screen 31 pools of 96 BAC clones. When positive PCR products of the correct size were obtained, smaller subpools (of 8 or 12 clones each) of the corresponding pool were subsequently used to identify the corresponding clone (FIGS. 1A and 1B). With this approach 20 additional BACs (Rv401-Rv420) were found for the regions where no BACs were found with the initial systematic sequencing approach. The end-sequences of these BACs (Rv401-420) were determined by direct sequencing, which confirmed the predicted location of the clones on the chromosome. A 97% coverage of the genome of H37Rv with BAC clones was obtained. Only one region of ˜150 kb was apparently not represented in the BAC library as screening of all pools with several sets of specific primers did not reveal the corresponding clone. This was probably due to the fact that HindIII fragments of mycobacterial DNA larger than 110 kb are very difficult to establish in E. coli and that a HindIII fragment of ˜120 kb is present in this region of the chromosome (data not shown). Example 4 Establishing a BAC Map Using all end-sequence and shotgun-sequence data from the H37Rv genome sequencing project, most of the BAC clones could then be localized by sequence comparison on the integrated map of the chromosome of M. tuberculosis strain H37Rv (Philipp et al., 1996b) and an ordered physical map of the BAC-clones was established. PCR with primers from the termini sequences of selected BACs were used for chromosomal walking and confirmation of overlapping BACs (data not shown). The correct order of BACs on the map was also confirmed more recently, using 40,000 whole genome shotgun reads established at the Sanger Centre. In addition, pulsed-field gel electrophoresis of DraI digests of selected BACs was performed (FIG. 2) in order to see if the approximate fragment size and the presence or absence of DraI cleavage sites in the insert were consistent with the location of the BACs on the physical map (FIG. 3). Comparison of the sequence-based BAC-map with the physical and genetic map, established by PFGE and hybridization experiments (Philipp et al., 1996b), showed that the two maps were in good agreement. The positions of 8 genetic markers previously shown on the physical and genetic map were directly confirmed by BAC-end-sequence data (Table 2, FIG. 3). The position of 43 from 47 Y-clones (91%) shown on the physical and genetic map, which were later shotgun sequenced, was confirmed by the BAC end-sequences and shotgun sequence data. Four clones (Y63, Y180, Y251, and Y253) were located to different positions than previously thought and this was found to be due to book keeping errors or to chimeric inserts. Their present approximate location relative to the oriC is shown in FIG. 3: Y63 at 380 kb, Y63A at 2300 kb, Y180 at 2160 kb, Y251 at 100 kb, and Y253 at 2700 kb. A total of 48 BACs, covering regions of the chromosome, not represented by cosmids were then shotgun sequenced (Cole et al., 1997), and these are squared in FIG. 3. No chimeric BACs were found, which is consistent with the observations of other research groups for other BAC libraries (Cai et al., 1995; Zimmer et al., 1997). The absence of chimeric BACs was of particular importance for the correct assembly of the M. tuberculosis H37Rv sequence. The exact position of the BAC termini sequences on the chromosome will be available via the world wide web (http://www.pasteur.fr/MycDB). TABLE 2 Identities of genetic markers previously shown on the integrated and genetic map of H37Rv. (Phlipp et al., 1996b) which showed perfect sequence homology with BAC end sequences. GenBank BAC end Description of Accession Locus sequence genetic marker Organism n° apa Rv163SP6 Secreted M. tuberculosis X80268 alanine-proline-rich dnaJ, Rv164T7 antigen M. leprae M95576 dnaK fop-A Rv136T7 DnaJ hsp M. tuberculosis M27016 polA Rv401T7 Fibronectin binding M. tuberculosis L11920 ponA Rv273T7 protein M. leprae S82044 pstC Rv103T7 DNA polymerase I M. tuberculosis Z48057 Penicillin binding recA Rv415SP6 protein M. tuberculosis X58485 wag9 Rv35SP6 Putative phosphate M. tuberculosis M69187 transport receptor Homologous recombination 35-kDa antigen Example 5 Repetitive End-Sequences Repetitive sequences can seriously confound mapping and sequence assembly. In the case of the BAC end-sequences, no particular problems with repetitive sequences were observed. Although nine clones with one end in an IS1081 (Collins et al., 1991) sequence were identified, it was possible to correctly locate their position on the map using the sequence of the second terminus. Moreover, these BACs were used to determine the exact locations of IS1081 sequences on the map. Five copies of this insertion sequence, which harbors a HindIII cleavage site, were mapped on the previous physical and genetic map. In contrast, BAC end-sequence data revealed an additional copy of IS1081 on the M. tuberculosis H37Rv chromosome. The additional copy was identified by six clones (Rv27, Rv118, Rv142, Rv160, Rv190, Rv371) which harbored an identical fragment linking Y50 to I364 (FIG. 3, at ˜1380 kb). This copy of IS1081 was not found by previous hybridization experiments probably because it is located near another copy of IS1081, localized on the same DraI fragment Z7 and AsnI fragment U (FIG. 3, at ˜1140 kb). Furthermore, the position of a copy of IS1081 previously shown in DraI fragment Y1 (FIG. 3, at ˜1840 kb) had to be changed to the region of Y349 (FIG. 3, at ˜3340 kb) according to the end-sequences of BAC Rv223. The positions of the four other IS1081 copies were confirmed by the sequence data and therefore remained unchanged. In total 6 copies of IS1081 were identified in the H37Rv genome in agreement with the findings of others (Collins et al., 1991). In addition, a sequence of 1165 bp in length containing a HindIII site was found in two copies in the genome of H37Rv in different regions. The end-sequences of BAC clones Rv48 and Rv374, covering cosmid Y164, as well as Rv419 and Rv45, that cover cosmid Y92, had perfect identity with the corresponding parts of this 1165 bp sequence (FIG. 3, at ˜3480 kb and ˜900 kb). Analysis of the sequence did not reveal any homology with insertion sequences or other repetitive elements. However, as each of the two locations showed appropriate BAC coverage, chimerism of the sequenced cosmids Y164 and Y92 can be ruled out as the probable cause. Example 6 Using BAC Clones in Comparative Genomics The minimal overlapping set of BAC clones represents a powerful tool for comparative genomics. For example, with each BAC clone containing on average an insert of 70 kb, it should be possible to cover a 1 Mb section of the chromosome with 15 BAC clones. Restriction digests of overlapping clones can then be blotted to membranes, and probed with radiolabelled total genomic DNA from, for example, M. bovis BCG Pasteur. Restriction fragments that fail to hybridize with the M. bovis BCG Pasteur DNA must be absent from its genome, hence identifying polymorphic regions between M. bovis BCG Pasteur and M. tuberculosis H37Rv. The results of such an analysis with clone Rv58 (FIG. 3, at ˜1680 kb) are shown here. This clone covers a previously described polymorphic genomic region between M. tuberculosis and M. bovis BCG strains (Philipp et al., 1996a). EcoR1 and PvuII digests from clone Rv58, fixed on nitrocellulose membranes, were hybridized with 32P-labelled total genomic DNA from M. tuberculosis H37Rv, M. bovis (ATCC 19120), and M. bovis BCG Pasteur. FIGS. 4A and 4B present the results of this analysis, where it is clear that several restriction fragments from clone Rv58 failed to hybridize with genomic DNA from either M. bovis or M. bovis BCG Pasteur. On the basis of the various missing restriction fragments, a restriction map of the polymorphic region was established and compared to the H37Rv sequence data. The localization of the polymorphism could therefore be estimated, and appropriate oligonucleotide primers (Table 1) were selected for the amplification and sequencing of the corresponding region in M. bovis. The alignment of M. bovis and M. tuberculosis H37Rv sequences showed that 12,732 bp were absent from the chromosomal region of the M. bovis type strain and M. bovis BCG Pasteur strain. The G+C content of the polymorphic region is 62.3 mol %, which is the same as the average genome G+C content of the M. tuberculosis genome, hence indicating that this region is not a prophage or other such insertion. Subsequent PCR studies revealed that this segment was also absent from the Danish, Russian, and Glaxo substrain's of M. bovis BCG, suggesting that this polymorphism can be used to distinguish M. bovis from M. tuberculosis. Analysis of this sequence showed that 11 putative open reading frames (ORFs) are present in M. tuberculosis, corresponding to ORFs MTCY277.28 to MTCY277.38/accession number Z79701 -EMBL Nucleotide Sequence Data Library (FIG. 5). FASTA searches against the protein and nucleic acid databases revealed that the genes of this region may be involved in polysaccharide biosynthesis. Among these putative genes, the highest score was seen with ORF 6 (MTCY277.33), whose putative product shows a 51.9% identity with GDP-D-Mannose dehydratase from Pseudomonas aeruginosa (accession number U18320—EMBL Nucleotide Sequence Data Library) in a 320 amino acid overlap. The novel M. bovis sequence of the polymorphic region was deposited under accession number AJ003103 in the EMBL Nucleotide Sequence Data Library. As it appears from the teachings of the specification, the invention is not limited in scope to one or several of the above detailed embodiments; the present invention also embraces all the alternatives that can be performed by one skilled in the same technical field, without deviating from the subject or from the scope of the instant invention. TABLE 3 End-sequences of the polynucleotide inserts cloned in the named recombinant BAC vectors contained in the I-1945 M. tuberculosis H37Rv genomic DNA library. RvXXXSP6 corresponds to the SP6 end-sequence of the clone RvXXX. RvXXXT7 corresponds to the T7 end-sequence of the clone RvXXX. RvXXXIS 1081 corresponds to a region located close to a copy of the IS1081 repetitive sequence (Insertion element). The character << - >> denotes an uncertain base residue. Clone Rv101 :::::::::::::Rv101SP6.seq::::::::::::: AATACTCAAGCTTGCCCAGCCGTCGATGACAAGAAATATGTCCGCAAAAGACTCAGCGGCCGACTTTGCTCGCAGCTG (SEQ ID NO. 6) GCGGTACCGCGCCACCGATTCTATGCCGTGGTCGCGGAAAAATGCCTCCCGAAATCGCACGGCCGACTCCAGTTCGGC GAGCATCCGCGATGCCAGCTGCGGCTGCGCCCTGCCGGCCACGGCACCCACATGCGGCAGTTCGTCCACCTGGGCCAG CGCCCCGCCGCCGAATTCCAAACAATAGAACTGCACCCGGCCCGCATCGTGGGTAACAGCCAACGCCATGATCAGCGT CCGCAGCGCGGTTGACTTGCCCGTTTGCGGTGCACCTACGAACGCGACATTGCCTGCGGCCCCGGACAAGTCGATCGT GCGCGGCACCCGTGACTGCTCTAACGGGCGATTGAAATTCCGAT :::::::::::::Rv101T7.seq::::::::::::: CCACCCGTGTAATTTGGGATGGGCAAAAAGGCGAAGCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCGG (SEQ ID NO. 7) TTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGCCGTTTCAACACCTCGCGTCGCCCTCCGACCGCGAACATTCGGGG ATGGCAGCAACCTGCTGGCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCTAC ACTCTGAAACGCGATGACCATCGATGTGTGGATGCAGCATCCCGACGCAACGGTTCCTACACCGCGATATGTTCGCCT CGCTGCCCCGGTGGACCGGT Clone Rv102 :::::::::::::Rv102SP6.seq::::::::::::: AATACTCAAGCTTTCCGCCGATACCCGCCATGTCGCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCGGG (SEQ ID NO. 8) ATCCCAAAGTGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGACTC GGTCCACGCGGTGCGGCACATGGTGGACACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCAGC ACTCAATGCCGACCAGGCCGAGGGCGGAGACAAAAGTATCGCTAAGGTCACCGCGATCACCAACATGGTGATCGCAGC AATGTTGCTAGTGATCTATCGCTCCGTAATTACCGCGGTTCT :::::::::::::Rv102T7.seq::::::::::::: GTGCCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTCAACGACGACGTCGTCCGC (SEQ ID NO. 9) GGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGC TTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCG ACGGCCAAGGCGGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCAGAC GACATCGTGGCGAGATTCGCCGGGTACGCCGATGAGGTGGT Clone Rv103 :::::::::::::Rv103SP6.seq::::::::::::: AATACTCAAGCTTTCGGCGGAAACGGACACATTGCGAATATTGATGACAAAATAAAAATCATTGATGGTTTGAGTCAC (SEQ ID NO. 10) CAGGCCGATCAAGCCTTCGCCGAGCCAAATTCCAATCAAGAGGCCCAAGCCCGTACCAATCAGCCCGGCAACGAGGGA TTCCGTCATTATCAGCCAAAATAACTGCTCTCGGGTTACACCCAAACAGCGCAATATGGCGAAAAACGGTCGCCGTTG CACGACATTAAATGTCACGGTATTGTAGATTAAAAAGATACCCAC :::::::::::::Rv103T7.seq::::::::::::: TGCTCCCGAAACCTGGGGGTGTGCCTGCTCTGTATGCACGGCATACGGACATCCTTCCCCTGAGACCCGCCGTCGAAC (SEQ ID NO. 11) CAGCCACGTGTCCATCATAGNGGGTCAACCCCGGCCAAGGGCGACGGCACGCCAAGTTCGCCGACCGTTAACCTAGTG CTGTTAGCTTCATTTGCTGCGATCAAAACAGCTGGTCGGCCGTTAGGAACTGAATTGAAACTCAACCGATTTGGTGCC GCCGTAGGTGTCCTGGCTGCGGGTGCGCTGGTGTTGTCCGCGTGTGGTAACGACGACAATGTGACCGGGGGAGGTGCA ACCACTGGCCAGGCGTCGGCAAAGGTCGATTGCGGGGGGAAGAAGACACTCAAAGCCAGTGGGT Clone Rv104 :::::::::::::Rv104SP6.seq::::::::::::: ATACTCAAGCTTTGCCGACGAGCGGGCGATGTTGATGACGGGAAACCCCAGCGCACAACCGACGATTTTGGCGTAGCC (SEQ ID NO. 12) GGCGGACGTCTGCTCGATTCCGATCACGTCGGCGCTCGCATCGAGCATGGCGCCGGCGACGGCTAGCAGCGATCCCCC GTCGTCGAGGAGCACGACACGAGCCGTACGCCCGGCCGTAAGCCGCGCCCAGGATTCGGCGAAAAACCGTTCTACGTG GCGGGTGTACTGGGTGTCGAATGATTCGTGGGGTGCGTAGGCGTCGCTGCAATCGTCGACATAGATGCCGTCGGGCCG CATCGCGTCGACAACTCCGGGTGAGTGGAATAGCACTTGCCGATCACCGCGACGTTGCGCGGATGAGGCGGAACCCGA ATA :::::::::::::Rv104T7.seq::::::::::::: TCCTATGTCCCTGCCGAGCANGTGATCGAACGCGGTGACAGATTTGTCTATCCTGGACCTGACGGTGAGGTCGAAGTT (SEQ ID NO. 13) TTCCAGGAATTCGGCAAAATCGGTAAGAGCCTGAAGAATTCGGTATCGCCGGACGAAATCTGCGACGCATACGGGGGC ATATACGCTTCGGGTTTACGAGATGTCGATGGGGCCGCTGGAGGCTTCACGTCCATGGGCCACAAAGGATGTTGTCGG CGCGTACCGTTTTCTGCAGCGGGTGTGGCGCTTGGTCG Clone Rv105 :::::::::::::Rv105SP6.seq::::::::::::: ATACTCAAGCTTGATTCCGCCGAAACCGACCGTGAGCACCCCGCCAGCCACCACGCTCGGGTCGGGCGCCGGGCCCGG (SEQ ID NO. 14) GCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACGTCTAACCATTCCAGGCG GAGCTACATCAGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCCAGGTCGAAGTCTATACCGATATGCGCATCCGCAGC CGCCACCCTGGAGAACAGAACGATGCCCTACTAATGCTTGTCTGGCGGGGCC :::::::::::::Rv105T7.seq::::::::::::: GGTACGCTTCGGTCGCAGTCTGCGAGTGATGCATGACGACCGGGACCTCGTCGGCATCTTCCATAGCCCGCCACACCT (SEQ ID NO. 15) TCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTCGGCATTGGTCATCGGGATATGCCGCTCGGGAC GGTCAGAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACGCGCATGGGCCACCATCGCAT TCACCAGGTCTGCGCGAATCACCAGCACGTAGACGGTTCCTTTCCTAAGCAACACCGAAGTTTCAGGACCCGAATGCT CCGGGAAACATGTCACGGTAGGTCGGTATTCCGGCTACCGGCTGA Clone Rv106 :::::::::::::Rv106SP6.seq::::::::::::: GGCGTCAACGGTGTCGGAACCCGCGTCAAGCAATTGGTAGGCCTGCAGTCTGTGAATCAGGCCGACGCTGTGGCCGCC (SEQ ID NO. 16) GCGGC :::::::::::::Rv106T7.seq::::::::::::: GGCTNGCGTACCCGGTACCGGCCGCGGGCCTACCACGTGCCGGAACTGGAAGCGCAGTAAGCCCTCAACGCGCCACCG (SEQ ID NO. 17) CTTTGGCCCGCGCGCCCGGCGTAGGCGCATCGGCGGTGGCCGTGGGGCGGCGCACTGCGACCTCACCAGCGGCTTTCG AGCTTTGTTCGATCAACCGGCCAGCATGGTCGANGATGCATTCGAGACCATATTCGAAATTGGTTTCATCGGGGGCCC CGATCCGATGCCCCCTCCCAGTTGCGTGAGCAANCAGCGGAGTCNTCGCGGGATCGATGGCCACGGGGTGTTCAATGG CGGATGGTCCGCTGCCCGCCGACTGGCTCTTGCGGGAGAACCGATCTAGCACCACCGATCCGCGCACGTNG Clone Rv107 :::::::::::::Rv107T7D4.seq::::::::::::: CGTAATNTCGCGCACANCCANGACTTCTGGGGGGATCNGCTGACAGTGGTNGGATCCCAAATTGCGGATGATCGGGCC (SEQ ID NO. 18) GCCNACGTCGTTGTGTACCTCNTCNGTCACAACNAANCCGAANCGTATGACTCGGTCCACGCGGTGCGGCACATGGTG GACACCACACCGCCACCGCGCGGGGTGAAGGCCTATGTCACCGGTCCGGCAACACTCAATGCCGACCAGGCCGANGCC GGACACNANAGTATCNCTAACGTCACCGCGATCACGAGCATGGTGATCGNNCAATGTTNCTANTGATCTATCGCTCCG TAATTACCGCGGTTCTCGTCTTGATCATGGTCGCANCGAACTCCGGCGCAATCCGCGGATTCATCGNCTTGCTGCCCG ATCACATATTTTCAGCCTTTCACATTGCAACNAACCTGCTCGTCTCATGGNGATGCGGCGACACGGACTACCGATATC ATGCTCGCCGTTACACAATCNCGCCACGCCGCGAAGACNGGAAACGCTTCTACACAATNTTCNCGGGACGCCACTNAA CTTGGTTCNGGTTTGACATTGCCGCGCATGTNTGCCCAGCTTTGCCGGCTCCCCTTA Clone Rv108 :::::::::::::Rv108T7D4.seq::::::::::::: TGAATTTCCCGATCCCACAATCTCGGTTCAGATACAGGTCGCCATACCCCTTACTTCGGCAACGCTGGGCGGATTGGC (SEQ ID NO. 19) CCTGCNGCTGCAGCANACCATCGACGCCATCGAATTGCCGGCAATCTCGTTCAGCCAATCCATACCCATCGACATTCC GCCGATCGACATCCCGGCCTTCNCCCTTTAACGG Clone Rv109 :::::::::::::Rv109SP6.seq::::::::::::: AACAGCTATGACCATGNTTACGCCAAGCTATTTAGGTAACACTATANAATACTCAAGCTTTTACGGTGATCGCGCATC (SEQ ID NO. 20) ACCTGGTTCATGAACTGGAAGCAGCGCANCGCTTCCTTTTCGGCCGCAACATGAGCCAGCCTCTCGTCCGCGGTCNGG TGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCCGCGACNAACNACNCC AGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGCCCGGGTGTGGGGTGT TTCGGCGACCGGCAGCCAGGTGGTCCACACTGCCGACGGGCGCCGCGAGCCGTTCACCGACCAAGCCGCCGAACAAGT CCGCCCGATCGCATACTCCAACCGGTTGCGGTACTGCAGGTCAGCTGGCGTACCTCCTCNTCNCGCTCGGCGAAGTCT TGCTCCANCACGTCGCAGAACGGCAAGGAACACGTTCA :::::::::::::Rv109T7.seq::::::::::::: GACCGNNCCATGTTTCCACAATGTGGTGCCAGTNCGGNGGCTACGTGCCATCNANACACTGGCGCAGGCTATCGCACC (SEQ ID NO. 21) CGTTATCNGCTACGAACAAATCNCGGTATGCGTTCTTTANCATGAGTCGGCGACCGNCGATCATGGTCGACACCCACG ACNGAAATACGCAGATCGCCNTCNAGCNTGTGTGCCGCGGATTATCANGACTGACCTCCTGGCTGACCGGNNTGTNTG GTCGCGATGCCTGGCGCCCGGCCGGCGTGNTCGTGGTCGGCTCGGATAGCGAAGTCAGCTAATTCTCGTGGCAGCTCG AAAGGGTCCTGCCGGTGCCGGTCTTTGCGCAAACCATGCNCATGTTACGGTCCCTCGGGTGCGGCCTGGCGGCGGC Clone Rv10 :::::::::::::Rv10SP6D2.seq::::::::::::: GGGATGGGCGGGCCCGCTAAACTCTTCGTGTTCCACTAACTCCGGGAGGGNCAATCTCGGGCCGTTATGGCTCACGTC (SEQ ID NO. 22) GCGTCGCCCTCCGACCGCGAACATTCGGAGTTGGCAGCAACCTGGTAGCACCCTGGCCGG :::::::::::::Rv10T7D4.seq::::::::::::: NCCGTCGTTGACAAGTAAATATGTCCGCAAAAGTCTCAGCGGCCGACTTTGCTCGCAGGTGGCGGTACCGCGCCACCG (SEQ ID NO. 23) AGTCGATGCCGTGGTCGCGGAAGAATGCCTCCCGAAATCGCACGGCCTTCCCNNTTTAAACGGA Clone Rv110 :::::::::::::Rv110SP6.seq::::::::::::: TTTAGGTGACACTATAGAATACTCAAGCTTTTGGTCTAGCCGGCCGAGCACGATACGGGTGTCATTGGCCACCGGCGG (SEQ ID NO. 24) CGGCTGTCCGGGAAATGGCGGGTCCCCGGTGGTTTTGCTGATGAGTGCTGAACCGTANTCGAAGTGGGCGGCGTCAGA CTCCACCCANCCAGCAGGCAGCGCGAAGCTGAATCCTCCAACCGGGTTGTCNATCCGGACAAGTTGGGGTGCGTTTGG GGCAATGACAGGTGGCNGCGGTGCGTTCGGGTCCGCCGGCGGAAGTGCTGCGTTGGGATCNCCCGCTGGGCATTCGGC NTTTTTGCGGCGGCCGGTGGTNGGGGGGCAACAGGTNTCCCNGTGCGGGTGGCGCTCAACGGTCNACGGCGCAAGCCG CCGTTGTTGGTACCNGGGGCGCTGGCTCCGGATCGCGTTGGCGGTCNCCGG :::::::::::::Rv110T7.seq::::::::::::: CTACACCATCGAATACGACGGCGTCGCCNACTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGC (SEQ ID NO. 25) CGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATAC GGTCGGTCCCACGATGACCCAGTACTACATCATTCGCACGGANAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCC GATCGTGGGGAACCCACTGGCGAACCTGGTTCAACCAAACTTGAANGTGATTGTTAACCTGGGCTACNGCGACCCGGC CTATGGTTATTCNACCTCNCCGCCCAATGTTGCGACTCCGTTCGGGTTGTTCCCANAAGTCNNCCCGGTCGTCATCGC CGAANCTCTCNTCCCGGGACCCACAGGGAATCNGCNATTTCNCCTACAAATCANCCACCTCCA Clone Rv111 :::::::::::::Rv111T7.seq::::::::::::: GCATGATCGGCCACCTTTCGGGCCGCCCGGCATACGGCGGCGTACCGATCTCCGCGTCATACACCCGCGGGTAATCGC (SEQ ID NO. 26) CGACGGTGCCGGTTCGCGAGCCGAAGGTGACGACTCTGATTGAATCGAGTTCCAGGTCCAGCGGGTGGCGCACCAACG GCGCGAGCTCAACGACGTCAATCNCGTTGTCGCTTTCTACGGTCACCGACCCTGGTCACCGTAGTTCNCCCG Clone Rv112 :::::::::::::Rv112SP6.seq::::::::::::: GACACTATAGAATACTCAAGCTTGCCAACCGCCAGCCTGCATCCGGCGGCGANCACTGCTCCGCCGACCAGTACGAAC (SEQ ID NO. 27) CAACCTGCGGTGCCCAGGCCATTGACGATGTGCTGGTCGGCGCCCGCGAGTCCGCGCACCATCAACGCCGCGGGCACC ACCANGGCGGCCCCACCCTGCACGGCGACGATCATTCCGGCGCCGCTCACGGCGGGCGGGGCTCGAACANGCACAGCA TCAACGTNGTCACCCGGCCGTGACCGGCCCGCATCGTCACACCACCCAAGCCCATTGCCGTCCTCCTCAACNGGGCGA CCCGGCCCGCATCGTCACACGGNCTAAGGCCATTGCCGTCCTCCT :::::::::::::Rv112T7.seq::::::::::::: TCGGCGCCATCGGCACCTTCGAGGACCTGTATTTCGACGCCGTGGCCNACCTGAGGTTGGCGGTGGACNAAGTGTGCA (SEQ ID NO. 28) CCCGGTTGATTCGCTCGGCCTTGCCGGATGCCACCCNGCGCCTGGTGGTCGATCCGCNAANAGACAANTTGTGGTGGA NGCTTCTGCTGCCTGCGACACCCACNACGTGGTGGCACCGGGCAGCTTTAGCTGGCATGTCCTGACCGCGCTGGCCGA CNACTCCAGACNTTCCACNAANGGTCGCCNNCCCAATGTNCCGNANTGTCTCCGGNTCCCTTTACCNCCCAATGGGCN GNTTCCACNGGTTACGGGCCCCNTNCCGGCGGGTCTNCCTCCCAANCTACCAAATACGCCCGACNTTCCGGA Clone Rv113 :::::::::::::Rv113SP6.seq::::::::::::: ATACTCAAGCTTTTATGGTGATCGCGCATCACCTGGTTCATGAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCA (SEQ ID NO. 29) ACATGAGCCAGCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGAACAGCCCGGCTTGAACCCTG AAAACCNGCTTTCCATATCCCGCGACGAAAGAACGCCAGTTCCGCTACTTAACCCCTCCGCGAACCGTCCATGGACAA CAGCGCGTTCTCCACCAACCGGGCCCGGGTGT :::::::::::::Rv113T7.seq::::::::::::: TCGGCTCAGGCCGCGCTGCTGGTAGAGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTCGGCGGCTACGT (SEQ ID NO. 30) GCCATCGAGACACTGGCGCAGGCTATCGCACCCGTTATCGGCTACGAAGCAAATCGCGGTATGCGTTCTTGAGCATGA GTCGGCGACCGTCGTCATGGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGCCGCGGATTATC AGGACTGACCTCCTGGCTGACCGGCATGTTTGGTCGCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGGTCGGCTCGGA TAGCGAGGTCAGCGAATTCTCGTGGCAGCTCGAAAGGGTCCTGCCGGTGCCGGTCTTTGCGCAAACAATAGCGCAGGT TACGGTCGCGCGGGGTGCGGCCTGGCGGCGGCC Clone Rv114 :::::::::::::RV114SP6.seq::::::::::::: CAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTCGCGTCTACGCCGGCCCGGAGCATCCGCACAGCGCTCAGCA (SEQ ID NO. 31) GCCGGTTCCGTACGANCTCAAGCAGGTGGCGCAATGACCGAAACCACCCCAGCCCCGCAAACCCCGGCGGCCCCGGCC GGGCCCGCACAATCGTTCGTGTTGGAGCGGCCCATCCANACCGTTGGGCGCCGTAAGGANGCCGTGGTACGAATGCGC CTGGTGCCCGGCACCGGCAAGTTCGACCTCAACGGCCGCAGCTTGGANGACTACTTCCCAAACAAGGTGCACCAGCAG TTGATCAAGGCACCCCTGGTCACCGTGGATCGGGTGGAAAGTTTCGACATCTTTGCCCACCTGGGCGGCGGCGGCCGT CCGGTCAGGCCGGGCCTGCCCTGGGTATCGCCCGGGCATTGATTCTGGTATCCCCNGAAGAACCG :::::::::::::Rv114T7.seq::::::::::::: CGGTTGGCCACCGCTTCTGCGGTGCCGCCGCCGTCGACAATGACCGTGTCGTCCTTGCTGACCACCACGCGTCGGGCC (SEQ ID NO. 32) GAGCCCAGCACCTCCAAGCCCACCTCGCGCAGCACCATGCCGGCGTCGGGGTTGACCACCTGGCCACCCGTCACCACC GCCAGGTCCTCAAGGAAACGCCTTACGGCGGTCACCGAAGTACGGCCCCTTGACCGCGACCGCTTTCAACGTCTTGCG AATCGCGTTGACGACCAGCGTCGCCAACGCTTCGCCCTCCACGTCTTCAGCCACGATCAGTAGTGGCTTACCCGTTCC TGCAACCTTTTCCAGCAATGGCAACAGATCGGGAAGCGANCTGATCTTGTCTTGGTGCN Clone Rv115 :::::::::::::Rv115SP6.seq::::::::::::: CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTTTGGCTGGGTCGCCTTCGAATTCNGCGTGCACCGCTATGG (SEQ ID NO. 33) GTTGCANCAGCGGCTGGCGCCGCACACCCCACTGGCCCGGGTGTTTTCGCCCCGAACCCGGATCATGGTGAGCGAAAA GGANATTCNCCTGTTCGATGCTGGGATTCGCCACGCCAAGGCATCTANCGATTACTCTCCNCGGGGTGGGAAAAGTGC CCAATCCCCCTCCCTCCAACTTTCCNAACAATCATTCCGGTTCCNCCNTCCGGTTGGNGGTAACCNNCCAATAAAACC CCTGCCCG :::::::::::::Rv115T7.seq::::::::::::: GCCCGCNCATGGCCAATCCCCGAAGACATCATTGGCCAGTGGCCGGGCGCTAACAGGTTCCAGCCCCCCACCANTGCC (SEQ ID NO. 34) GCTCGAACATGCGGTGCAACCCATTCGCAGGCCGGCAGGGAAAGCACCGCGGAAGCCGCAAAGGGCTGCAGTTCCGCG CCCAATAATGTCGTCCGCAACCAGATGCGCTCNAAAACCNCNCCGGCAGTCAGCGCACCCGACGCGANGTCGAAAGAC GTCNTCAGCGCGCCCACATGGGGTGCCAATCGGCACGGCAGGTATGCCGCGCGCAACCCGAGCGCGTGGTGCATGCCC ACGGTCCGCANGANGCGCANCACCCGCCAATGCCGAANCCCACGAAACATCGGGCGCATCCACCTTCAACC Clone Rv116 :::::::::::::Rv116SP6.seq::::::::::::: ATACTCAAGCTTGCCCAGCCGTCGATGACAAGAAATATGTCCGCAAAAGACTCAGCGGCCGACTTTGCTCGCAGCTGG (SEQ ID NO. 35) CGGTACCGCGCCACCGAGTCGATGCCGTGGTCGCGGAAGAATGCCTCCCGAATTCGCACGGCCAATTCCATTCCGGGA AGCATCCGCAATGCCAGCTGCGGTTGCCCCCTGCCGGCCACGGCACCCACTTGCGGCATTGCGTCCACCTGGGCCAGC GCCCCGCCGCCAAATTCCAAACAATAAAAATTGCACCCGGC :::::::::::::Rv116T7.seq::::::::::::: CCACCCGTGTATTTTGGGATGGGCAAAAAGGCGAAGCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCCG (SEQ ID NO. 36) CTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCGAACATTCGGGG ATGGCAGCAACCTGGTAGCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCTAC AGTCTGAAACGCGATGACCATCGATGTGTGGATGCAGCATCCGACGCAACGGTTCCTACACGGCGATATGTTCGCCTC CCTGCCCCGT Clone Rv117 :::::::::::::Rv117SP6D2.seq::::::::::::: CTGCCCATGTTTGGGGACGCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGCGACCGA (SEQ ID NO. 37) GCGGCTGCAACTGGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCNGACCCCTNTCNCAANAGGATNTTGTTCGCC GGACCCCNCTC :::::::::::::Rv117T7D4.seq::::::::::::: CCGACTTTCCGCGGTACCCGCTCAACTTTCTCTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACT (SEQ ID NO. 38) ACTTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACT ACATCATTCGCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACC TGGTTCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGCGACCGCCTTT Clone Rv118 :::::::::::::Rv118SP6.seq::::::::::::: ATACTCAAGCTTTGTCACACCAAGTGTTTCGACCAGGCGCTCCATCCGGCGAGTGGATACTCCCAGCAGGTAGCAGGT (SEQ ID NO. 39) CGCCACCACGCTGGTCAGTGCGCGTTCAGCTCGCTTGCGGCGCTGCAGCAGCCATTCGGGGAAATACCTGCCCTGGCG CAGCTGGGGGATCCCAACTTCAATGGTTGCGGCACGGGTGTCAAATTCACGGTGGCGGTAGCCGTTGCCCTAATTGGA CCGCTCATCGCTGCTTTCGCGGTACCCCGCCCCGCACAGGGCTTCGGCTTCAGCCCCCATCAGGGCGGCAATAAACTT CAAGAGCACC :::::::::::::Rv118T7.seq::::::::::::: GAGGCAGCTTCGCCGGCAATTCTACTAGCGAGAAGTCTGGCCCGATACGGATCTGACCGAAGTCGCTGCGGTGCAGCC (SEQ ID NO. 40) CACCCTCATTGGCGATGGCGCCGACGATGGCGCCTGGACCGATCTTGTGCCGCTTGCCGACGGCGACGCGGTAGGTGG TCAAGTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTCGCGGTTGCGCCGCGAAAGCGGCGGGTCGG GTGCCATCAGGAATGCCTCACCGCCGCGGCACTGCACGGCCAGTGCCGCGGCGATGTCAGCCATCGGGACATCATGCT CGCGTTCATACTCCTCGACCAGTCGGCGGAACAGCTCGATTCCCGGACCGCCCAGCGCATTGGTGATGGAATCGGCGA ACTTGGCCACCCGCTGGGTGTTGACATCCTCGACGGTGGGCAATTGCGCCTCGGTAAGCTTTGCCGCGTAGCCTTTTC ATC Clone Rv119 :::::::::::::Rv119SP6.seq::::::::::::: ATACTCAAGCTTCACTGACAAGGGACGAATTCGTCGGCCGCCTGTTCGACTGGGTGGTGGCCGAGCTGGTCGCCACCA (SEQ ID NO. 41) CTCAGGCCGCGGTCACGGCGGTACCGGCGCGGGAGCAAACTCGCGCGGGCATGGCCAACTTCTTGCGGACCATCACCG CAGACGCCCGCTTCGGACCCCTGCTGTCCACCACACAGTTGGCCAACGCATTAATCACCCGCAAGCTTGCGGAATCCA CCGCCCTGTTCGC :::::::::::::Rv119T7.seq::::::::::::: TCCATCACCCGATGTGGCNGGAGCACTGCCATGTCGATCTCAACTACCACCTCCGGCCGTGGCGGTTGCGCGCCCCGG (SEQ ID NO. 42) GGGGTCCGCGCGAACTCGACGAGGCGGTCGGAGAAATCGCCANCACCCCGCTGAACCGCGACCACCCGCTGTGGGAGA TGTACTTCGTTGAGGGGCTTGCCAACCACCGGATCGCGGTGGTTGCCAAAATTCACCATGCGTTGGCTGACGGTGTTG CCTCGGCAAACATGATGGCACGGGGGATGGATCTGCCGCCGGGACCGGAGGTCGGCCGCTATCTGCCTGACCCCGCTC CTACCAAGCGGCA Clone Rv11 :::::::::::::Rv11SP6.seq::::::::::::: AGCTTTGCAGTTGCTGAGTAATGTCGGCCAACGTCACCACAACCGCGATGAATTCAATCATGCCGCCCAGGGCGGCCA (SEQ ID NO. 43) ACCCAATGGTGGCCGCGAGCGGCAGCTCGATCGCAGCGCGGAGGTTGCCGGCCGCCAGTTGATTCACGAACAGGGTGA GGTCATAGGCGGGCAGGATAGTGACGAAGGCAAGACCTCCATCTGCCGTCGGAAGAAGTATCGAG :::::::::::::Rv11T7.seq::::::::::::: AGCTTCAGAACAGGCCTGTTGTGGGCCCACCCGGCTCGCCGAGTTCTGCACGCACCGCCTCAAGTGCGGCCCGCACCC (SEQ ID NO. 44) CCGGCATCTCCCGGTCACGCAGGGCCGCGGCCCGCGCCGCAGCGACGGCGTGTTCGCCCAGTTCGCCGTCAATGATGC TGACCTGATCGGCCACCCGGGCGTTCTCGGCGTCGTCGCGTTCACTAATCGCGGTGCTCAGCAGCGTCTCGACAGCCA CCACCCGAGTGGCGACCAGCTGCTCCACCACGGACCGCAGCGATGCCCGTC Clone Rv120 :::::::::::::Rv120SP6.seq::::::::::::: ATACTCAAGCTTCAGTTCCTCCACGACGCGTTCCCAAATGAATTTCCCGATCCCACAATCTCGGTTCAGATACAGGTC (SEQ ID NO. 45) GCCATACCCCTTACTTCGGCAACGCTGGGCGGATTGGCCCTGCCGCTGCACCAAACCATCAACGCCTTCAAATTGCCG GCAATCTCGTTCAGCCAATCCAT :::::::::::::Rv120T7.seq::::::::::::: GCTCTACGCCGCCTACGGGTCGAACATGCATCCCGAGCAGATGCTCGAGCGCGCACCCCACTCGCCGATGGCCGGAAC (SEQ ID NO. 46) CGGCTGGTTACCCGGGTGGCGGCTGACGTTCGGCGGCGAGGACATCNGCTGGGAAGGGGCGCTTGCCACCGTCGTCNA AGACCCAAATTCGAAGGTGTTCGTCGTGCTCTACGACATGACCCCGGCGGACGAGAAGAACCTTGACCGGTGGGAAGG CTCCGAGTTCGGTATCCACCAGAAGATCCGATGCCGCGTGGAGCGCATTTCCTCGGACACCACAACGGGATCCCGTCC TCG Clone Rv121 :::::::::::::Rv121SP6.seq::::::::::::: ATACTCAAGCTTGCCAAAGAGACCTCGTCCACCAAGCAGGACGCGACCGTCGAGGTGGCGATCCGGCTTGGCGTCGAC (SEQ ID NO. 47) CCGCGTAAGGCAAACCAGATGGTTCGCGGCACGGTCAACCTGCCCACACCGGCACTGGTTAAGAACTGCCCGCGTCGC GGTTTTCGCGGTTGGTGAAAAGGCCAATGCCTGCGTTTGCCGTGGGGGCGGATGTTGTCGGGAGTGACAATCTGATCA AAAGGATTCAGGGCGGTTGGCTGGAATTCAATGCCGCAATCGCGACACCGG :::::::::::::Rv121T7.seq::::::::::::: CCACGGCGTGGATCAAGGTACCGGCCGGGATGTTGCGCAATGGCAGGTTGTTGCCCGGCTTGATGTCGGCGTTAGCGC (SEQ ID NO. 48) CGGATTCCACCACATCCCCTTGCGAAAGTCCGTTGGGTGCAATGATGTAGCGCTTCTCCCCATCGAGATAGTGGAGCA ACGCAATCCGTGCGGTACGGTTCGGGTCGTACTCGATGTGCGCGACCTTGGCGTTGACACCATCTTTGTCATTGCGGC GAAAGTCGATCATCCGGTAAGCGCGCTTATGACCGCCGCCTTTGTGCCGGGTGGTAATCCGGCCATGCGCGTTGCGTC CACCGCGACCTGCAGCGGGCGCACCAGCGACTTCTCCGGGGTTGACCGGGTNATCTC Clone Rv122 :::::::::::::Rv122SP6D2.seq::::::::::::: GCAGCATGACGGCGGTAGCGAACACCGCCGGATGCAGCGCAAGTAGCGTCGATGTGCTCACGGAATCGCCCCGGCACC (SEQ ID NO. 49) GCGATCTCGANGATCACCAGTGCCACCCCCTGCAGCGCNACACCGACGATTCCGTACACCGCCACGCCGATCAGGCCC TGGGCCATCTGATTGGAGCTGGCGTANATGGCGGCGATGGTGACGATGGCCAGCGCCACATACATTGTGGCGGCCAGA ACCACGGCGTTGGGGCGGCGGTCGATGAACACTAGGCGACGCAGATCGCCCGGGGTCAACAGGTTGACCATCAGAAAG CCTGCGACTAGCACGGCGGCGCCACTAGGAAGTACAAGAANGTGGCCACCACCCCATCCAGGATCGGGGTAAGGCTGA TGGTCCCGAAATCGACTCCGGCCTAATACATGACTCTCTCCTTTGCGTCATCGCCTTACTTGTGCGCGGAA Clone Rv :::::::::::::Rv123SP6D2.seq::::::::::::: GGGACACACCTCGATGCTGCCGCNATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGC (SEQ ID NO. 50) TTCCGCCGCGGGCGTGACGCATCCCGTTGACCGGCCGGANCNCTCTCTA :::::::::::::Rv123T7D4.seq::::::::::::: TGGGCGCCTCTTTCGGCCTTCCCNNTTTAAACGNAGCANGACATTCTGGGTATCGAGTTGTACTGGATGGTGTTGGCG (SEQ ID NO. 51) ATGTCGGTGATCCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAGAGGAAATTGGG GCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTGACGGCTGCCGGCATGGTGTTCGCC GTTACCATGTCGTTGTTTGTGTTCAGCGATTTGCGAATTATTGGTCAGATCGGTACCACCATCGCCTTCCC Clone Rv124 :::::::::::::Rv124SP6D2.seq::::::::::::: CCGATCGGCGCCGCANCTGGTTGGTGTTNCGGATGAATCCGCAGCGAAAATGTAGCTGCGGTGGCGTGTCGTGACTCG (SEQ ID NO. 52) TNGGCGTCGACGCTCGTGGCAGCCACCGANCGGTTGGTCCAGGATCTGGATGGGCAAAGTTGTGCGGCCCGGCCGGTG ACGGCCGATGAGCTGACCGAGGTCGACAGCGCCGTGTTGGCTGACTTGGAACCGACATGGAGTCGCCCCGGTTGGCGT CACCTCAAGCATTTCAATGGTTATGCGACCAGTTTTTGGGTTACGCCGTCAGACATCACGTCGGAGACTTGGATGAGC TGTGTCTGCCAGATAGCCCCGAATCGGGACGACCGTGGTCACGGTGCGTCTGACCACTCGGGTCGGGTCGCCCGCGCT ATCGGCATGGGTGCGTNATCACAGCGACACGCGCCTGCCCAAGGANGTNCGGNCGGACC :::::::::::::Rv124T7D4.seq::::::::::::: CGGGTTGCGGATCCACGCGTGCGGGTTGTCAGCAGCTACGGCACTGAACCGCGCCCACAGCTCGCCGATCCGCTTTCG (SEQ ID NO. 53) GTGGTTCTCGATCGACTCGCCGTAGGCGATGCGCAGCGCCTGCTCGAATATCGGGTACACGTAGGCCGGCCTTCCCNC TTTA Clone Rv126 :::::::::::::Rv126SP6.seq::::::::::::: CTTGATTTTGATCATCATGACGATCATCACCCTAATTTTGCTACCCGCACTGGTTATCGTGGGTACCGTCGTGCTTTC (SEQ ID NO. 54) CATGGGCGCCTCTTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGGGTATCGATTTGTACTGGATGGTGTTGGC GATGTCGGTGATCCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAAAGGAAATTGG GGCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTGACGGCTGCCGGCATGGTGT :::::::::::::Rv126T7.seq::::::::::::: GGGGATCCCTAGATCGACCTGCAGGCATGCAAGCTTGGCGTGTCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGT (SEQ ID NO. 55) GAGGCGGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGG AACGCTTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCG GAGCNACTGTCAAGGCGGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCC CAGACGACATCGTGGCGAGATTCGNCGGGTACGCCGATGAGGTGGTGTGTTTGGCGACGCCGGCGTNGTTCTTCGCCG NCGGGCANGGTTACCGCAACTTCACCCAGACCTCCGACGACGAGGTGGTGGCGTCTCCTGGATCGTGCTC Clone Rv127 :::::::::::::Rv127SP6.seq::::::::::::: AAGGCTGCAGGTCGAAGCGGNTGGTTACGACTCCCTGTGTGTGATGGACCAGTTCTACTATCTGCGTCTACACGGCCC (SEQ ID NO. 56) TTGGTGCGCTGGCCACGGCGACCGAGCGGCTGCAACTGGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCCCGACC CTGCTGGCAAAGATNATCACCACGCTCGACGTGGTTAGCGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGCGGGTTT GAACTGGAACACCGCCAGCTCGGCTTCGAGTCCGGCACTTCCAGTGACCGGTTCAACCGGCTCGA :::::::::::::Rv127T7.seq::::::::::::: CTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTT (SEQ ID NO. 57) CATCCTGACGCCGGAACAAATTGACGCNGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACTACAT CATTCGCACGGAGAACCTGCCGCTGCTACAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGT TCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGGCGACCCGGCCTATGGTTATTCGACCTCGCCGNCCAATGT TGCGACTCCGTTCGGGTTGTTCCAGANGTCAGCCCGGTCGTCATCGCCGACGCTCTCGTCN Clone Rv128 :::::::::::::Rv128SP6.seq::::::::::::: CGGTCATAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACGCGCATGGGCCACCATCGCA (SEQ ID NO. 58) TTCACCAGGTCTGCGCGAATCACCAGCACGTAGACGGTTCCTTTCCTAAGCAACACCGAAGTTTCACGACCCGAATGC TCCGGGAAACATGTCACGGTAGGTCGGTATTCCGGCTACCGGCTGAGCATTGAGCACGCCGGCCAGCACCGCACGAGC CAGGCAATCAGCCGCCGCCGCACCGATCGCGGTGACCAGCTGAGTCTCCGGAGACAATGCGGCCGGCACGCCGGNCTC CGGCGGCACCGCTACNGCGCCCGTGG :::::::::::::Rv128T7.seq::::::::::::: GTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACNTCGAGCCATACCGGGCGGAGCTACATCGGCTCGGCCGC (SEQ ID NO. 59) CCAGTGTTCGGGCCCTCTTTCGAGGTCGAGGTCGATACCGATTTGCGCATCCGCANCCGCNCCCTGGACGACAGAACC GTGCCCTACGAGTGCTTGTCGGGCGGGGCCAAAGAACAGCTTGGCATCCTGGCGCGATTGGCCGGCGCGGCGCTGGTC GCCAAGGACGACGCCGTTCCGGTGCTGATCGACGACGCGCTGGGGTTCACCGATCCGGAGCGACTATCAAGATGGGGG AGGTCTCTGACACCATCGGCCCCNACGGACATGTGATCGTGCCGACGTGCAGTCCCACCCCG Clone Rv129 :::::::::::::Rv129SP6.seq::::::::::::: GCGAAAGTCCGTTGGGTGCAATGATGTAGCGCTTCTCCCCATCGAGATAGTCGAGCAACGCAATCCGTGCGGTACGGT (SEQ ID NO. 60) TCGGGTCGTACTCGATGTCCGCGACCTTGGCCTTGACACCATCTTTGTCATTGCGGCGAAAGTCGATCATCCGGTNNG CGCGCTTATGACCGCCGCCTTTGTGCCGGGTGGTAATCCGGCCATGCGCGTTGCGTCCACCGCGACCGTGCAGCGGGC GCACCAGCGACTTCTCCGGGGTTGACCGGGTGATCTCGGCGAAATCAGATACGCTGGCGCCGCGACGACCAGGCGTCG TGGGCTTGTNCTTGCGAATTGNCATGTCTAATCANGTCTTTCTCTCACGCTCTCGTCGCCGGGCTAGGCCGCATTGCC CTGCTCCTCCTCATCGCTTCGCTCTGCATCGTCCCCGGGCTAAGCCCGTGCCCCGAAA :::::::::::::Rv129T7.seq::::::::::::: GATGGTTCGCGGCACGGTCAACCTGCCACACGGCACTGGTAAGACTGCCCGCGTCGCGGTATTCGCGGTTGGTGAAAA (SEQ ID NO. 61) GGCCGATGCTGCCGTTGCCGCGGGGGCGGATGTTGTCGGGAGTGACGATCTGATCGAGAGGATTCAGGGCGGCTGGCT GGAATTCGATGCCGCGATCGCGAACACCGGATCAGAATGGCCAAAGTCGGTCGCATCGCTCGGGTGCTGGGTCCGCGC GGCCTGATGCCCAACCCGAAAACCGGCACCGTCACCGCCGACTCCCCATGGCGTCCCGGATATCAAGGGCCGGCAAAT CAACTTCCCGGTTGATCAGCAAGGCAACCTGCCTCCNCCTCCGG Clone Rv130 :::::::::::::Rv130SP6.seq::::::::::::: ATACTCAAGCTTCGTCATAAGACCATGGTGCGCTTTCTTTCACCCGTCCAGAGTCGGGGGCATCCGCACCGGCTCGCA (SEQ ID NO. 62) TCGCATCATCCTCCCACGACGGGCCGCTCATCAGCTTGGGCCATTTCAATGTACTTGATACCCCGCGCTGCGGGTAGG CCACTGCGACAATTCAAACACGGTGTCACACGGTGAATAGTGTCGAGATGGGCTCTGATCAACCGTCGCAAACCCGGT TTCGCATCAATAGCGGAATCCCACCGGGTTGCATGGAGGCTGCTGACCTTGGAAAACAAAATTTTTTCATTACAACAA AACAACCGCCNCGGAAACTTTGCA :::::::::::::Rv130T7.seq::::::::::::: CGAATTCGGCGTGCACCGCTATGGGTTGCAGCAGCGGCTGGCGCCGCACACCCCACTGGCCCGGGTGTTTTCGCCCCG (SEQ ID NO. 63) AACCCGGATCATGGTGAGCGAAAAGGAGATTCGCCTGTTCGATGCTGGGATTCGCCACCGCGAGGCCATCGACCGATT ACTCGCCACCGGGGTGCGAGAGGTGCCGCAGTCCCGCTCCGTCGACGTCTCCGACGATCCATCCGGCTTCCGCCGTCG GGTGGCGGTAGCCGTCGATGAAATCGCTGCCGGCCGCTACCTGCAAGGTGATTCTGTCCCGTTGTGTCGAAGTGCCTT TCGCGATCGACTTTCCGTTGACCTACCGGCTGGGGCGTCGGCACAACACCCCGGTGAGGTCGTTTTTGTTGCAGTTGG GCGGAATCCGTGCTCTGGGTTACAGCCCCGAACTCGTCACGGCGGTGCGCGCCGACGGAGTTGTTATCACCGATCCGT TGGCCGTACCGCGCCTTGGGC Clone Rv132 :::::::::::::Rv132SP6.seq::::::::::::: TCAGACTCCACCCAGCCAGCAGGCAGCGCGAAGCTGAATCCTCCAACCGGGTTGTCGATCCGGACAGGTTGGGGTGCG (SEQ ID NO. 64) TTTGGGGCAATGACAGGTGGCGGCGGTGCGTTCGGGTCGGCCGGCGGAGGTGCTGCGTTGGGATCGCCCGGCTGGGCA TTCNGCGTGTTGGCGGCGGCCGGTGGTGGGGGGGCAACAGGTGTCGCCGGTGCGGGTGGCGCTGCAGCGGTCGACGGC GGCGAAGCGGCCGTTGTGGGTACCGGGGGCGCTGGCTCCGGATCGGCGTTGGCGGTCGCGGGCACCGCAACGGTCACC AAGCTGGCGCTGGCCATCGCCGCGATAGCCAGTGCCGCCAATCGTCCCTTGCGACGTGTCAAGTNGGGGTCCACCTGA TGCATGGCCAAAGAACCTACCGTGTTAACGGCNCAACNCAAGGACCGCGCCGGTCGCN :::::::::::::Rv132T7.seq::::::::::::: TTTCCGCGGTACCCGCTCAACTTTGTGTCNACCCTCAACGCCATTGCCGGCACCTACTACGTNCACTCCAACTACTTC (SEQ ID NO. 65) ATCCTGACGCCGGAACAAATTGACGCAGCGGGTCCGCTGAACAATTCGGTCCGTCCCACGAAAGAACCAGTTTTNCNT CTTTCNCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGTG TTTCAACCAACACTTAGAGTGTAATTGTAAACCTGGGCTAGGGGAAACCGGCTCTAGTTTTTCCACCNTCTCCGCCCC NTGTTTCGAATACTCCGTTCGGGTTGTCCCCAAA Clone Rv134 :::::::::::::Rv134SP6.seq::::::::::::: GCTTCCGGCTCGTATGTTGTGTGGAATTGTGACCGGATACCAATTTCACACAGGAAACAGCTATGACCATGATTACGC (SEQ ID NO. 66) CAAGCTAGTTAGGTGACACTATACAATACTCAAGCTTGCCGGCTGGTGGGCCGACCACTTCGATGGCACGACCCGTGA ACTGCTGCCCGGCCAATTCTTCTTGGTCGCCCGGACCGATGGACCGCGGCTGGGATTCCAGAAGGTGCCCGATCCCCC CCCTGGGAAAAACCGCGTGCACCTCTACTTCACGACCAACGAC :::::::::::::Rv134T7.seq::::::::::::: CCGATCGACTGATGCGCCGACAACCACGCCCCAACAACTGGAATGAACCGTCGTGACCATCATCAGCACGCGGTTGTA (SEQ ID NO. 67) GGCGACTTGCGACATGTTCAACCCGCCGTACTCGGACGGAATCTTCAAACCGAAACAGCCCAGCTCGGCCAGGCCTTT CACGTACTCGTCGGGGATCTGGGCACCACGCTCGAGGACGCTGCCGTCCACGGTGTCTAGGAATTCCCGCAGTTTGAC CAGAAACGCCTCGGTTCGGGCCTCCTCGGCGTCCGACGGCTTGGGAAATGGGTGTATGAGCCCTACGGGAAACCGGCC CACAAAGAGTTCTTTGGCGAAGGACGGTTTATCCCAACCACTTTCGCGAGATTCCTCGGCAAGGGCCCGCGCTTGCTC CTCGGTGACCTGAGTTTGCTGTGCCATCGCCGCCTCCTCCCTGA Clone Rv135 :::::::::::::Rv135SP6.seq::::::::::::: TGCATCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACG (SEQ ID NO. 68) CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTTTACGGTGATCGCGCATCACCTGGTTCATGAACTGGAAGC AGCGCAGCGCTTCCTTTTCGGCCGCAACATGAGCCAGCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGG CCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCCGCGACGAACGACGCCAGTCCGCTACGTAACCCCTCCG CGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGCCCGGGTGTGGGGTGTTTCGGCGACCGGCAGCCAGGTG GTCCACACTGCCGACGGGCGCCGCGAGCCGTTCACCGACCAGGCCGCCGAGCAAGTCCGCCCGATCGCATACTCC :::::::::::::Rv135T7.seq::::::::::::: GGGGGCGCTGCTGGTATAGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTCGGCGGCTACGTGCCATCGA (SEQ ID NO. 69) GACACTGGCGCAGGCTATCGCACCCGTTATCGGCTACGAGCAAATCGCGGTATGCGTTCTTGAGCATGAGTCGGCGAC CGTCGTCATGGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGCCGCCGATTATCAGGACTGAC CTCCTGGCTGACCGGCATGTTTGGTCGCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGGTCGGCTCGGATAGCGAGGT CAGCGAATTCTCGTGGCAGCTCGAAAGGGTCCTGCCGGTGCCGGTCTTTGCGCAAACGATGGCGCAGGTTACGGTCGC GCGGGGTGCGGCCTGGCGGCGGCCAGAGCACGAGTTCACCGATGCGCAGCTAGTGGCGACAGCGTCAGCCAAC Clone Rv136 :::::::::::::Rv136SP6.seq::::::::::::: TGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACG (SEQ ID NO. 70) CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTCCGTACAGGTCGCCTCCAACACGGCGGGGAAGCGACACCA GCCTACCGAGCTTGGAGTCCAGGACGCCAGCGGCGGCGTCGGTCTGCGTCGTGGTGCCGCCGGGGTGGCGTTGGCTGG CAACGATCTCCACCCAGCCGGTCGGGTTACCCACGATCTCGGCATAGACGCGGGCCGAGGCCGGTGCGATACCGTATT GCGTCAATTGGGACGCGGTTGTGCATTCGGCTAGCTCGGTTGCCACACCCGTCAGGGGTTCGACGTTGGCGGGTTCGG CGGGCCCCAGCACCGCTGTCACCATGCCCGCCAAGCCGACCTGCGGCGCCACCAACT :::::::::::::Rv136T7.seq::::::::::::: CGGCATGACCACCGACAGGCCCGACTGGTCGTACCACTCGAACGCCGGGGTGTTGATGTCCCAGCCGCTGAAGTCGTC (SEQ ID NO. 71) CTGCGCGCGCAGGCCGTCGAGCAGGTACAGGGCGGGCGAGTTGGCACCACCACTTTGGAATTGGACCTTGATGTCACG GCCCATCGACGGCGACGGCACCTGCAGGTACTCCACCGGCAAGCCCGGCCGGGAAAATGCCCCCGCGGTCGCCGTGCC ACCGACGGCGCCGACCAGACCCGACACTAGGGCCGCGCCGACGGCCCCGACCACGAGTCGACGCGACATACCCGTGAC GGCGCCACGAACCCTGTCAACAAGCTGCATTCTTGCTTCCCTCATCCTCATCTCAACGCATCCATGCATGTTTGGGCG CATCCTGAATTANGTCAGACTGCAGGCGCTGGGCCGGCAGTGCTCGTGTATCAACCACAACTTCGGGCGT Clone Rv137 :::::::::::::Rv137SP6.seq::::::::::::: TTCCAACCCTAATTGGCTTTCGGCCCCATCCGTGAGGACGGGGTGCGGGTGCTCAACAACAACGTCGTCCGCGGGACA (SEQ ID NO. 72) CACCTCTATGCTGCCGCCATGGACGCGGTCCAACGCAAGCAGCTGATCGAGCTACAACCCCGCGCGGAACGCTTCCGC CGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCGACGGCC AAGGCGGCGTGCCACGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCAAACGACATC GTGGCGAGATTCGCCGGGTACGCCGATGAGGTGGTGTGTCTGGCGACGCCGGCGTTGTTCTTCGCCCTCGGGCAGGGT TACCGCAACTTCAC :::::::::::::Rv137T7.seq::::::::::::: CAGGCATGCAAGCTTTCCGCCGATACCCGCCATGTCGCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCG (SEQ ID NO. 73) GGATCCCAAAGTGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGAC TCGGTCCACGCGGTGCGGCACATGGTGGACACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCA GCACTCAATGCCGACCAGGCCGAGGCCGGAGACAAAAGTATCGCTAAGGTCACCGCCGATCACNAGCATGGTGATCGC AGCAATGTTGCTAGTGATCTATCGCTCCGTAATTACCGCGGTTCTCGTCTTGATCATGGTCGGCATCGACTCGGCCAA TCCGCGGATTCATCGCCTTGCTCGCCGAACACAACATTTTCACCTTTCACATTTGCACCAACCTGCTCTTCTCAT Clone Rv138 :::::::::::::Rv138SP6.seq::::::::::::: CACTACTCAAGCTCTCTCNTCATTACCACCCCTGTAATTTGGGATGGGCAAAAAGGCGAAGCACCGCTTGGCCACNAA (SEQ ID NO. 74) CGCCGGGAGGGACAATCTCGGGCGGCTATGGCTTCTCCCGGGAAGGCCCCAACGTACGGCGTTTCAACACGTCGCGTC GCCCTCCGACCGCGAACATTCGGGGATTGGCACCAACCTGNTACCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCG CGGGTAGTCCCCGCCCGGGCGGCTACAGTCTGAAACCCCGATGACCATCGATGTGTGGATGCAGCATCCGACGCAACG GTTCCTACACGGCGGATATGTTCTCCTCGCTGCGCCGGTGGACCGGTGGGTCTATCCCCTGAAACCGACATCCCN :::::::::::::Rv138T7.seq::::::::::::: CAGGCATGCAAGCTTTCGTCAGTTCATTGCGCCAGCAGACCAACAAGAGCATCGGGACATACGGAGTCAACTACCCGG (SEQ ID NO. 75) CCAACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACGACGCCAGCGACCACATTCAGCAGATGGCCAGCGCGTGCC GGGCCACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCGTGATCGACATCGTCACCGCCGCACCACTGCCCG GCCTCGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGACGATCACATCGCCGCGATCGCCCTGTTCGGGAATCCCTCGG GCCGCGCTGGCGGGCTGATGAGCGCCCTGACCCCTCAATTCGGGTCCAAGAACATCAACCTCTGCAACAACGGCGACC CATTTGTTCGGACGGCAACCGGTGGCAACGCACCTAAGCTACTTGCCCGGGATGA Clone Rv139 :::::::::::::Rv139SP6.seq::::::::::::: GTTTATGCACTGGTTAGGTGTTTCCATGAGTTTCATTCTGAACATCCTTTAATCATTGCTTTGCGTTTTTTTATTAAA (SEQ ID NO. 76) TCTTGCAATTTACTGCAAAGCAACAACAAAATCGCAAAGTCATCAAAAAACCGCAAAGTTGTTTAAAATAAGAGCAAC ACGTACACAAGGAGATAAGAAGAGCACATACCTCAGTCACTTATTATCACTAGCGCCCGCCGCAGCCGTGTAACCGAG CATAGCGAGCGAACTGGCGAGGAAGCAAAGAAGAACTGTTCTGTCAGATAGCTCTTACGCTCAGCGCAAGAAGAAATA TCCACCGTGGGGAAAAACTCCAGGTAGAGGTAC Clone Rv13 :::::::::::::Rv13SP6.seq::::::::::::: ATACTCAAGCTTGGGTGTAGCCGATCACCGGAAGTCNCATGATCAGCCACGTTCCGCGCCGCCCGGCATACGGTGGTG (SEQ ID NO. 77) TACCGATCTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAA :::::::::::::Rv13T7.seq::::::::::::: AGCTTTATCGAAAGCGCGAACAGCTCGCGGCGGCCCACGACGTGCTGCGTCGGATTGCCGGCGGCGAGATCAATTCCA (SEQ ID NO. 78) GGCAGCTCCCGGACAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCGGTGCCCGGGGTCGTGGTGC ACCTGCCGATCGCACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCCGGCAGTTGCCAAACCCATC GTGATCAGGCTCGGCTCGCGAGTTCGGCGAAGAAATGGTTCGCCTGATCACCTACCATCGGCCA Clone Rv140 :::::::::::::Rv140SP6.seq::::::::::::: TCAACACGCCGCCAGCCACCACGCGCGGGTCGGGCGCCGGGCCCGGGCCTCCAGGCTNCTCCGCTCGGTGATGGCACC (SEQ ID NO. 79) CCACCGCGACACCACCCGGCTGCGCTACGTCGAGCCATACCGGGCGGAGCTACATCGGCCCGGCCGCCCAGTGTTCGG GCCCTCTCGCCCAGGTCGAGGTCGACACCGATTTGCGCATCCGCAGCCGCACCCTGCGACGACAGAACCGCGGCCCTA CCCACTGCTTGTCGGGCGGGGGCCAAAGAACCAGCTTGNCATCCTGCCACAATTGGCCGGCGCCCG :::::::::::::Rv140T7.seq::::::::::::: CAGGCATGCAAGCTTCACGTCCGTACGGCTCGGGTACGCTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGAC (SEQ ID NO. 80) CTCGTCGGCATCTTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCCAGCGCTC GGCATTGGTCATCGGGATATGCCGCTCGGGACGGTCAGAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGG GTGGTCGCGACGCGCATGGGCCACCATCGCATTCACCAGGTCTGCGCGAATCACCAGCACGTAGACGGTTCCTTTCCT AAGCAACAC Clone Rv141 :::::::::::::Rv141SP6.seq::::::::::::: AATATTCAAGCTTTCGGCGGAAACGGACNCCTTGCGAACATTGATAACAAAATAGAAATCATTGATGGTTTGAGTCAC (SEQ ID NO. 81) CAGGCCGATCAAGCCTTCGCCGAGCCAAATTCCAATCAAGAGGCCCAAGCCCGTACCAATCAGCCCGGCAACGAGGGA TTCCGTCNTTATCAGCCNAAATAACTGCTCTCGGGTACCACCCAAACAGCGCAATATGGCGAAAAACGGTCGCCGTTG CACAACATTAAATGTCTCGGTATTGTTGATTAAAAAGATACCCACCACCAGGGCAATCCAACTGAGAGCGGTTAAATT GACCGTAAAAACCTCCCGTCATCTGTTT :::::::::::::Rv141T7.seq::::::::::::: CAGGCATGCAAGCTTGCTGCATCTTCCTGTGACTGCTCCCGAAACCTGGGGGTGTGCCTGCTGTGTATGCACGGCATA (SEQ ID NO. 82) CGGACATCCTTCCCCTGATACCCGCGGTCGAACCAGCCACGTGTCCATCATCAGGGGTCAACCCCGGCCAAGGGCGAC GGCACGCCAAGTTCGCCGACCGTTAACCTAGTGCTGTTAGCTTCATTTGCTGCGAGCAAAACAGCTGGTCGGCCGTTA GGAACTGAATTGAAACTCAACCGATTTGGTGCCGCCGTAAGTGTCCTGTCTGCGGGTGCGCTGGTGTTGTCCGCGTGT GGTAACGACGACAATGTGACCGGGGGAGGTGCAACCACTGGCCAGGCGTCCGCGAAAGTCCATTGCNGGGGGAAGAAG ACAC Clone Rv142 :::::::::::::Rv142IS1081.seq::::::::::::: GAAAGTGCCCCAAGGTGTTGGTGAAACTCGCTGGACGGTCCCCAGGATGTTGGCAGCACATTCACCGGACATGACCGG (SEQ ID NO. 83) AGCAAGACCGGACATCCTCCCATACCGTCGTCGCCGTGTACATCCGTAGCCCGTCCTGGCAGGTGCTGGGTTGAACAA AATCAGCCCAACACCTGCCACGACGAAGAAGCGGGTTGCGCTGGCATGTCTTGTCGGCTCGGCGATCGAATTCTACGA ATTCCTTATCTACGGGACCGCTGCGGCGCTGGTGTTTCCCACCGTGTTCTTCCCACACCTGGATCCCACGGTGGCCGC CGTGGCCTCCAAGGGGACATTTGCTGTGGCGTTCCTATCCCGGCCGTTCGGCGCGGCCGTCTTTGGATACTTTGGAGA CCGCCTCGGCCGCCAGAAGACCCTGGTCGCCACACTGTTGATCATGGGCCTGGCAACCGTGACTGTTGGGCTGGTTCC ACGACAGTGGCCATCGCGC :::::::::::::Rv142SP6.seq::::::::::::: ATATTCAAGCTTTGTCACACCAAGTGTTCCGACCAANCGCTCCATCCGGCGAGTGGATACTCCCAGCAGGTAGCAGGT (SEQ ID NO. 84) CGCCACCACGCTGGTCAGTGCGCGTTCATCTCGCTTGCGGCGCTGCAGCAGCCAGTCCGGGAAATAGCTGCCCTGGCG CAGCTTGGGGATCGCGACGTCGATGGTTGCGGCACGGGTGTCGAAATCACGGTGGCGGTAGCCGTTGCGCTGATTGGA CCGCTCATCGCTGCGTTCGCGGTAGCCCNCCCCGCACAGGGCGTCGGCTTCAGCCCCCATCCAAGGCGGCGATGAACG TCGAGAGCAGCCCGCGCAGCAAATCCGGGCTCGCCTGTGCGAGTTGGTCAGCCAGAAGCTGCTCGGTGTCATAAGATG AGAAGAGGTCAGTGCGTCCTTTCCTTCG :::::::::::::Rv142T7.seq::::::::::::: CAGGCATGCAAGCTTTTTGAGCGTCTCGCGGGGCAGCTTCGCCGGCAATTCTACTAGCGAGAAGTCTGGCCCGATACG (SEQ ID NO. 85) GATCTGACCGAAGTCGCTGCGGTGCAGCCCACCCTCATTGGCGATGGCGCCGACGATGGCGCCTGGACCGATCTTGTG CCGCTTGCCGACGGCGACGCGGTAGGTGGTCAAGTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTC GCGGTTGCGCCGCCAAAGCGGCGGGTCGGGTGCCATCATGAATGCCTCACCGCCGCCGCACTGCACGGCCAGTGCCCC GGCGATGTCAGCCATCGGGACATCATGCTCGCGTTCATACTCCTCGACCAGTCCGCGGAACAGCTCCATTCCCGGACC GCCCAACGC Clone Rv143 :::::::::::::Rv143SP6.seq::::::::::::: ATACTCAAGCTTTTGGCTGGGTCGCCTTCCAATTCAGCGTGCACCGCTATGGGTTGCAGCAGCGGCTGGCNCCGCACA (SEQ ID NO. 86) CCCCACTGGCCCGGGTGTTTTCGCCCCGAACCCGGATCATGGTGAGCGAAAAGGAGATTCNCCTGTTCGATGCTGGGA TTCGCCACCGCGAGGCCATCGACCGATTACTCGCCACCGGGGTGCGAGAGGTGCCGCAGTCCCGCTCCGTCGACGTCT CCGACGATCCATCCGGCTTCCGCCGTCGGGTGGCGGTAGCCGTCGATGAAATCGCTGCCGGCCGCTACCACAAGGTGA TTCTGTCCCGTTGTGTCCAAGTGCCTTTCGCGATCGACTTTCCGTTGACCTACCGGCTGGGGCGTCGGCACAACACCC CGGTGAGGTCGTTTTTGTTGCAGTTGGGCGGAATCCGTGCTCTGGGTTACAGCCCCGAACTCGTCACGGCGGTGCGCC GCCGAC :::::::::::::Rv143T7.seq::::::::::::: CAGGCATGCAAGCTTCAACCTATTGACGCATTGTGCGAACTGACGGCGCCCGCGCATGGCCAATCCGGAAGACCATCA (SEQ ID NO. 87) TTGGCCAGTGGCCGGGCGCTAACAGGTTCCAGCCCCCCACCAGTGCCGCTCGAACATGCGGTGCAACCCATTCGCAGG CCGGCAGGGAAAGCACCGCGGAAGCCGCAAAGGGCTGCAGTTCCGCGCCCAATAGTGTCGTCCGCAACCAGATGCGCT CGAAAACCGCCGCCGGCAGTCAGCGCACCCGACGCGAGGTCGAGAGACGTCGTCAGCGCGCCCACATGGGGTGCCAAT CGGCACGGCAGGTAGGCCGCGCGCAACCCCAACGCGTGGTGCATGCCACGGTCCGCAGGAGGCCACCACCC Clone Rv144 :::::::::::::Rv144SP6.seq::::::::::::: ATACTCAAGCTTCCCGGCCGCAGGTGACGGCGCGGCCTAGCGCCACTTGATGCCGCACCCGATCGACGGNCGTTGGTC (SEQ ID NO. 88) GGGGTTGACTGGCCGCCCGGCGAGCAGGGCGTCAACCGCGGCCCGGACGTCGGCGGCCGTCACCGGTCGGCCATTGCC CGGGCGGGAGTCGTCGAGCTGACCACGGTAGACAAGTCGGCGCTGGCCGTCGAAGACAAACGTGTCGGGTGTGCAGGC CGCGGAGAAGGCGCNGGCGACGTCTCGGGTTTCGTCGTAGAGATACGGGAACGTCCAGCCGTGGCGGCGGGCCTCGGC GACCATCTGATCGGGCCCGTCCTGCGGGTAGGTGACCACGTCCTTACTGGAGATACCGACCATCGGGACCCTTTGATC GGCGAGGTCCCGGCCGACCGTGGCCAATCCGGCGGCGACGTGTCGCCCGTACCGGCCAGTGGTTC :::::::::::::Rv144T7.seq::::::::::::: CAGGCATGCAAGCTTTANCANCATCAACCCCGCCCCGCACCAGCACCGACACGATGTCGATGCCATCGAGGTGAATGT (SEQ ID NO. 89) CGAACTGGCNCAAACCATCTGGCGACCGCGACCACCGGCAACATGGGTACCGGCGATTTCCGGTGCCAATGCCGACCC GACGGGCCGCTCTCACCGCAGGTGACCTCGATCACCGAGACCAGCCGGCCGTTATACTCACGCACCCCTACCGTGTCA CGCCCAAAACGGCGCTGGTGGTCGATTGCCGGAGTGCACCCCGCACCCAGTGTCGTGCCCGGATCCGCCGACCAATCC CGCACCCACGTCGCCAAACCCGAAATCACCGTGATGCCGTGGTAACTGACCACCGACAGTAACGTCACTACGGCCGCC ACGCCGACGCCGAACCACCACGCACATGATGATCGGCTG Clone Rv145 :::::::::::::Rv145SP6.seq::::::::::::: ATATTCAACCTTGCACACATTGACGATACCTTGGTCACGAGACCCCAAAAGCTGGCCTCCACCGCGCGCCGGGGACCA (SEQ ID NO. 90) CGGTCATACCTTGANNCNGCTTTCGATCGTTGATGCTGCGTCTTGGTCCGCGGAAACCGCAGGCTGGCATATGCACGT GGGCGCACTGGCGATCTGCGATCCCCACCGATTCGCCCGAATACAGCTTTCAGCGGCTCCCCAAGTTGATCATCGACC GGCTGCCGGATATCCCGCACTTGCGGTGGCGGGTCACCGGCGCCCCGCTCGGACTGGACCGGCCGTGGTTCGTCGAGG ACCACGAAC :::::::::::::Rv145T7.seq::::::::::::: CAGGCATGCAAGCTTCATGCCCGCGGCATGATAGCCACATGCACGCAATCGAACTCAGCGAAACCGGCGGGCCAGGCG (SEQ ID NO. 91) TCTTACGCCACCTCACCAGCGCGCAACCTCAACCCGGCCACGGAGACCTCCTGATC Clone Rv146 :::::::::::::Rv146SP6.seq::::::::::::: ATACTCAAGCTTGATTTTGATCATCATGATGATCATCACCCGAATTGTGGTAGCCGCAGTGGTTATCGTGGGTACCGT (SEQ ID NO. 92) CGTGCTTTCCATGGGCGCCTCTTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGGGTATCGAGTTGTACTGGAT GGTGTTGGCGATGTCGGTGATCCTGCTCNTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAGA GGAAATTGGGGCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTGACGGCTGCCGGCAT GGTGTTCGCCGTTACCATGTCGTTGTTTGTGTTCAGCGATTTGCGAATTATTGGTCAGATCGGTACCACCATCGGCCT GGGCTTGCTGTTCGACACCCTCGTCGTGCCTCGTTCATGAAACCGTCCATTGCTGCCCTGCTGGGACCTGGTTCTGGT GGCCGCTACGGGTGCGCCCGCGCCCGGCAGTCAAATCTTCCGCCG :::::::::::::Rv146T7.seq::::::::::::: CAGGCATGCAAGCTTGGCGTGCCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTC (SEQ ID NO. 93) AACGACGACGTCGTCCGCGGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTA CAACGCCGCGCGGAACGCTTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGAC GGCATCGCCACCGGAGCGACGGCCAAGGCGGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAACGTGGTGCTGGCG GTCCCCATCGGCCCAGACGACATCGTGGCGAGA Clone Rv147 :::::::::::::Rv147SP6.seq::::::::::::: ATACTCAAGCTTTTACGGTGATCGCGCATCACCTGGTTCATGAACTGGAAGCAGCGCAGCCCTTCCTTTTCGGCCGCA (SEQ ID NO. 94) ACATGAGCCAGCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAAC CAGCTTCCATATCCCGCGACGAACGACGCCAGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTT CTCCACCGACCGGGCCCGGGTGTGGGGTGTTTCGGCGACCGGCAGCCANGTGGTCCACACTGCCGAAG :::::::::::::Rv147T7.seq::::::::::::: TAGTCGCTGACCGGTGCAGGTTTCGACNATGTGGTGCCGGTTCGGCGGCTACGTGCCATCGAGACACTGGCGCAGGCT (SEQ ID NO. 95) ATCGCACCCGTTATCGGCTACGAGCAAATCGCGGTATGCGTTCTTGAGCATGAGTCGGCGACCGTCGTCATGGTCGAC ACCCACGACGGAAAGACGCAGATCGCCGTCTANCNTGTGTGCCGCGGATTATCAGGACTGACCTCCTGGCTGACCGGC ATGTTTGGTCGCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGGTCGGCTCGG Clone Rv148 :::::::::::::Rv148SP6.seq::::::::::::: ATACTCAAGCTTTCCGCCGATACCCGCCATGTCGCGCACATCCAGAACTTCTGGGGGGATCCGCTGACAGCGGCGGGA (SEQ ID NO. 96) TCCCAAAGTGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGACTCG GTCCACGCGGTGCGGCACATGGTGGACACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCAGCA CTCAATGCCGACCAGGCCGAGGCCGGAGACAAAAGTATCGCTAAGGTCACCGCGATCACGAGCATGGTGATCGCAGCA ATGTTGCTAGTGATCTATCGCCCCGTAATTACCGCGGTTCTCGTCTTGATCATGGTCGGCATCGACCTCGGCGCAATC CGCGGATTCNTCGCCTTGCTCGCCGACCACAACATTTTCAGCCTTTCAACATTTGCGACAACCTGCTCGTTCTCATGG CGATTGCNGCGAAC :::::::::::::Rv148T7.seq::::::::::::: CAGGCATGCAAGCTTGGCGTGCCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTC (SEQ ID NO. 97) AACGACGACGTCGTCCGCTGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTA CAACGCCGCGCGGAACGCTTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGAC GGCATCGCCACCGGAGCGACGGCCAAGGCGGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCG GTCCCGATCGGCCCAGACGACATCGTGGCGAGATTCGCCGGGTACGCCGATGAAGTGGTGTTGTTTGGCGACCCGGCG TTGTT Clone Rv149 :::::::::::::Rv149SP6.seq::::::::::::: ATACTCAAGCTTTGGCATTGTGCACATTTTCCACCCGTGCTCTATTAATGCTGAGCCGCTAATTGTGACCCCAGTCGG (SEQ ID NO. 98) GAAACACGCGGAGCACCAAATTCACCGCAGCGGCCGGGGCGGTTCAACTCACCATGGATCGCTCTCGTCGTCTGGTGC TGGACAATCGTCGCTGTAGCGCGTCGCGAACACCTCAGCTTCTGCTGCCGCGGCTTCTTCCGGCGATGGTAACCCCCA GGTTTCGCCCACGGTCTTACGTAGCAGTGCGACGCGGTGTTCATCTGCATCGACCTGTTGACTCATCCTGTCAAGGAT GAAGGCGTACTGGGCCGACTGCGCCTTCTGCCGCGCCAGGTCGGCAATCACCAGGATCTCAGAAACGAGCTGCGACTC ACTCTTCCAGGCCACCCTGGCCGAAAGCTCGACATGGTCAATCCGGCCG :::::::::::::Rv149T7.seq::::::::::::: CAGGCATGCAAGCTTGCGGGCCGGAGTGGTTTCGACGGCCGCTCGCTTCTCGGCATCGGTTTGGGCTGTCACCAGCAG (SEQ ID NO. 99) TTGGTAGTTCTTCACGTACTGTTGTTCGAGCGTCGAGCCGCCGCGCGTGTCGAGGTCGCCGGACGCGTATCCCGCCAG GCCGGTCAGGGTGCCCTTCCAGTCCACGCCGCTGTGGTCGGCGAACCGCTTATCTTCAATCGAGACGATCGCCAGCTT CATCGTGTTGGCGATCTTGTCCGAGGGCACCTCGAACCGGCGCTGCGAGTACAGCCACGCGATCGTGTTGCCCTTCGC GTCGACCATCGTCGATACCGCAGGCACTTGCCCCTC Clone Rv14 :::::::::::::Rv14SP6.seq::::::::::::: ATACTCAAGCTTCCCGGCGGCCAGTACCGAAAGCGCGAACAGCTCGCGGCAGCCCACGACGTGCTGCGTCGGATTGCC (SEQ ID NO. 100) GGCGGCGAAATCAATTCCAGGCAGCTCCCGGACAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCG GTGCCCGGGGTCGTGGTGCACCTGCCGATCGCACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCC GGCAGTTGCCAAACCCAGCGTGATCAGGCTCGGCTCGCGAGTTCGGCGAAGAAGTGGCTCGCCTGATCACCTACCATC GGCCAGGATCTGCGTGTCATCACAACGCTCGCCAAGGAGGTTGTTGTGGTGCTATCGACGGCCTTTAGCCAGATGTTC GGAATCGACTATCCGATAGTGTCCGCGCCAATGGACTTGATCGCCG :::::::::::::Rv14T7.seq::::::::::::: AGCTTCGGTGTAGCCGATCACCGGAAGCCGCATGATCAGCCACGTTTCGCGCCGCCCGGCATACGGCGGCGTACCGAT (SEQ ID NO. 101) CTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAAGGTGACGACGCTGATTGAATCGAG TTCCAGGTCCAGCGGGTGGCGCAGCAACGGCGCGAGCTCAACGACGTCAATCACGTTGTCGCTTTCTACGGTCACCGA CCCGGTGACCGTAGTCGCCCGGTGCGCTCGGCCGAGAAGTTGCACCGCCACCACCGCGACACCGTCTTGCACGCGGAC GCCACCCCCGGATCGGTTGTTGGCCAAGGTAATTGGGTCATTCCATTTGACGGGACGCCGACCCCGCAGCCCCAGTAC CGCCCACGACCACGCCGGCTGACCCACCACTGTACGAACACCAAGGCGACGCCGA Clone Rv15 :::::::::::::Rv150SP6.seq::::::::::::: ATACTCAAGCTTCGGTGGCTTCGCCCGCCCTGCCGGGTGGACTTCATGACAACGCGGGGGCGATTACCCCCGCTACCG (SEQ ID NO. 102) CCAGCAGCATGACGGCGGTACCTAACACCGCCCGGATGCCTCGCACGTGCCTCGATGTGCTCACGGAATCGCCCCGGC ACCGCGATCTCGAGGATCACCAGCGTTACCCCCGGCAGCGCGACACCGACAATTCCGTACACCGCCACGCCGATCCGG CCCTGGGCCAGCTGATTGGAGCTGGCG :::::::::::::Rv150T7.seq::::::::::::: CAGGCATGCAAGCTTCCACATGTACGGATCCACGAACATCCCGTTGAACTGACAGGTGCGGCCCGGCTCGATCAGGCC (SEQ ID NO. 103) GGCCACTTGTTCTACGCGGTTACCGAAGATCTCTTCGGTGACCTGCCCGCCGCCGGCCAGCTCGGCCCAGTGCCCGGC GTTGGCCGCCGCGGCGACGATCTTGGCGTCCACGGTGGTCCGGGTCTTGCCCGCTAGCACGATCCGCGAGTCGGCCGG TCACCCGGGT Clone Rv151 :::::::::::::Rv151SP6.seq::::::::::::: ATACTCAAGCTTTCCAAGTCCCAAGTGTCGATCATGGCCAAAGAGCTCGACAAAGCCGTAGAGGCGTTTCGGACCCGC (SEQ ID NO. 104) CCGCTCGATGCCGGCCCGTATACCTTCCTCGCCGCCGACGCCCTGGTGCTCAAGGTGCGCGAGGCAGGCCGCGTCGTC GGGGTGCACACCTTGATCGCCACCGGCGTCAACGCCGAGGGCTACCGAAAGATCCTGGGCATCCAGGTCACCTCCGCC GAAGACGGGGCCGGCTGGCTGGCGTTCTTCCGCGACCTGGTCGCCCGCGGCCTGTCCGGGGTCGCGCTGGTCACCAGC GACGCCCACGCCGGCCTGGTGGCCGCGATCGGGGCCACCCTGCCCGCAGCGGCCTGGCAGCGCT :::::::::::::Rv151T7.seq::::::::::::: CAGGCATGCAAGCTTCACACGTAGGCGCCGTCGATAAATGACTCCGCCGCGCTTCGCACATCCTCGTAGCGATCCTTG (SEQ ID NO. 105) GCGAGCAGGTCAACCGGGCGCTGCCCGTCGAGGAGCCGGTTTTTGGCGTGCAGCCACTGGCCGACACCTCGGGGGGTA AGCGAATCCGAGAGCAGGAGGACGAGGTCACGAAGCTGCGCCAGCCGGTCGTACCGCTCAGGGCGGATGTCGCCGGTC CGCCACCCGCGTACCGCCCGATCGGACACCTGTATGACCGCGGCGACGTC Clone Rv152 :::::::::::::Rv152SP6.seq::::::::::::: CGCGGCGGCGCATTACCCCCGCTACCGTCAGCAGCTTGACGGCGGTAGCGAACACCGCCGGATGCAGCGCAGGTGCGT (SEQ ID NO. 106) CTATGTGCACACGGAATCGCCCCGGCACCGCGATCTCGAGGATCACCAGTGCCCGCCCCCTG :::::::::::::Rv152T7.seq::::::::::::: GGGATCGAGGAACAGCGCGTTGAACTGATAGGTGCGGCCCGGCTCGAGCAGGCCGGCCATTTGTTCGATGCCGTTACC (SEQ ID NO. 107) GAAGATCTCTTCGGTGACCTGCCCGCCGCCGGCCAGCTCGGCCCAGTGCCCGGCGTTGGCCGCCGGCGCGACGATCTT GGCGTCCACGGTGGTCGGGGTCATGCCCGCGAGCAGGATCGGCGAGCGGCCGGTCAGCCGGGTGAACTTCGTCGAGAG CTTGACCCTGCCGTCGGGGAGGCGAACCACGGTCGGTGCGTATCTCGACCAGGCCCGGGCAACCTCGGGGGTGGCGCC GACGGTGAACAGGTTGCGCTGGCCACCGCGGGTAGCCGCCGGCACTATGCCGATGCCCAGGCCGCGGATCACCGGTGC GGTCAGTCGGGTCAGGATGTCGCCCGGCCCCAGGTCGAAGATCCAGCGGGCGCCGGCCGCGTGGACACNGGTGATCTC GTCCACCATCGACTTTCTGATCA Clone Rv153 :::::::::::::Rv153SP6.seq::::::::::::: TAACTCAAGGCTTGCGTTGAGGCCCCAGGCCCATCGACGGTTTGGCGGCCTTAAATGCACTGAGGTCGTCAATTGACC (SEQ ID NO. 108) CCACAGCGGAAATGCCGACTATTCGCAGGCCTCCTTCGCCTTGGCTGCCGGAGAGGGGCTCCGCGGGAACCGCATGCA GGTATATGACCTCGGTTTCTCGGGTGCTACCGCGTGCCTTGTCGAGGATGAACTCGGCGTTGGAATTGTCCAGCCGGC CCAATTCATCGAGCGCAGATTCGTACACATGGCCGGCGGCGACATACGCTTCACCGTGGATCTGCTCCACACGGACCG CCCTGTCGGGATCCTGCTCACGGGTAAAGGAACTTACNTGGCNCTCGGTGCC :::::::::::::Rv153T7.seq::::::::::::: CCTTCTGCGCCACCCACACCGTCAACGCCCGCGAAGTCGACGTCGTCCAGGCCATCGGCGGCCTCACGGATGGATTCG (SEQ ID NO. 109) GCGCGGACGTGGTGATCGACGCCGTCGGCCGACCGGAAACCTACCAGCAGGCCTTCTACGCCCGCGATCTCGCCGGAA CCGTTGTGCTGGTGGGTGTGCCGACGCCCGACATGCGCCTGGACATGCCGCTGGTCGACTTCTTCTCTCACGGCGGTG CGCTGAAGTCGTCGTGGTACGGCGATTGCCTGCCCGAAAGCGACTTCCCCACGCTGATCGACCTTGACCTGCATGGCC GGCTGCCGCTGCAGCGGTTCGTTTCCGAACGCATCGGGCTCGAAGACGTCGAGGAGGCGTTCCACAAGATCCATGGCG GCAAGGTATTGCGTTCGGTGGTGATGTTGTGATGGCCGCCATCGAGCGCGTCATCACCCACGG Clone Rv154 :::::::::::::Rv154SP6.seq::::::::::::: ATACTCAAGCTTGATTTTGATCATCATGATGATCATCACCCGAAGTGTGGTAGCCGCAGTGGTTATCGTGGGTACCGT (SEQ ID NO. 110) CGTGCTTTCCATGGGCGCCTCTTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGGGTATCGAGTTGTACTGGAT GGTGTTGGCGATGTCGGTGATCCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAAA AGAAATTGGGGCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTTACCGCTGCCGGCAT GGTGTTCGCCGTTACCA :::::::::::::Rv154T7.seq::::::::::::: ATTGNCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTCAACGACGACGTCGTCCGCGGGACACACCTCGATGC (SEQ ID NO. 111) TGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGCTTCCGCCGCGGGCGTGA CCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCGACGGCCAAGGCGGCGTG CCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCAGACGACATCGTGGCCAGATT CGCCGGGTACGCCGATGAGGTGGTGTGTTTGGCGACGCCGGCGTTGTTCTTCGCCGTCGGGCAGGGTTACCGCAACTT CACCCAGACCTCCGACGAAGAAGTGGTGGCGTTTTCTGGATCGTGCTC Clone Rv155 :::::::::::::Rv155SP6.seq::::::::::::: ATACTCAAGCTTTTCCCGTCCGTCATCGCCCAAGCGCGTGAGGCCGAAGCGGCTGGTTACGACTCCCTGTTTGTGATG (SEQ ID NO. 112) GACCACTTCTACCAACTGCCCATGTTGGGGACGCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTG GCCACGGCGACCGAGCGGCTGCAACTGGGCGCGTTCGTGACCGGCAATACCTACCGCAGCCCGACCCTGCTGGCAAAG ATCATCACCACGCTCGACGTGGTTAGCGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGTTGGTTTGAGCTGGAACAC CGCCAGCTCGGCTTCGAGTTCGGCACTTTCAGTGACCGGTTCAACCGGCTCGAANAGGCGCTACAGATCCTCGAGCCA ATGGTCAAGGGTGAGCGCCAACGTTTTTCGGCGATTGGTACCCACCGA :::::::::::::Rv155T7.seq::::::::::::: CGGCCACCGGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTACACCATCGAATACGACGGCGTCGCCGACTTTC (SEQ ID NO. 113) CGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCC TGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACTACATCATTC GCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGTTCAAC CAAACTTGAAGGTGATTGTTAACCTGGGCTACGGCGACCCGGCCTATGGTTATTCGACCTCGCCGCCCAATGTTGCGA CTCCGTTCGGGTTGTTCCCAGAGGTCAGCCCGGTCGTCATCGCCGACGCTCTCGTCGCCGGGACCAGCAGGGAATCGG CGATTTCGCCTACA Clone Rv156 :::::::::::::Rv156SP6.seq::::::::::::: ATACTCAAGCTTGGGGTGGCGCTGTCGGTCGGTGTGCTTGGCGGCGTCGGTATCAACACCGCCCACGAAATGGGGCAC (SEQ ID NO. 114) AAGAAGGATTCGCTGGAGCGGTGGCTGTCCAAAATCACCCTCGCCCAGACCTGCTACGGGCACTTCTACATCGAGCAC AACCGTGGCCATCACNTCCGGGTGTCCACACCGGAGGACCCGGCGTCGGCGCGGTTCGGCGAAACGTTGTGGGAGTTC CTGCCCCGCAGTGTTATCGGCGGCTTGCGCTCGGCCGTTCATTTGGAGGCCCAACGGCTGCGTCGGCTCGGCGTCAGC CCCTGGAATCCCATGACGTATCTGCGCAACGACGTGCNCAACNCGTGGCTGATGTCNGTGGTGTTGTGGGGTGGGC :::::::::::::Rv156T7.seq::::::::::::: TCGCCACCGCACCGCGGCGAACGCTCAAAGGCACCTACTGGCACCAAGGCCCCACACGTCACCCTGTGACCTCCTGCG (SEQ ID NO. 115) CCGACCCCGCCCGAGGTCCTGGCCGTTACCACCGAACGGGCGAGCCGGGAGTCTGGTACGCATCGAACAAAGAGCAAG GTGCATGGGCGGAGTTGTTCCGCCACTTCGTCGATGACGGGGTCGATCCATTCGAGGTCCGTCGCCGCGTCGGTCGAG TGGCGGTCACACTCCAGGTACTCGACCTCACAGACGAGAGGACTCGATCCCATCTAGGTGTGGACGAAACAGATCTTC TGTCCGACGACTACACCACCACCCAGGCCATCGCCGCCGCCCGCGATGCCAACTTCGACGCCGTACTGGCCCCGGCGC CGGCGCTCCCCGGTTGTCAAACACTTTGCCGTGTTCGTTCACGCACTGCCCAACATCGAGCCCGA Clone Rv157 :::::::::::::Rv157SP6.seq::::::::::::: ATGAAATAAGAAGAGCACATCCCTCAGTCGGTTATCATCACTAGCGCTCGCCGCACCCGTGTAACCGATCATAGCGAG (SEQ ID NO. 116) CGAACTGGCGAGGAAGCAAAGAATATCTGTTCTGTCAGATAGCTCTTACGCTCAGCGCAAGAAGAAATATCCCCCGCG GGAACAACTCCAGGTAGAGGTACACACGCGGATAGCCAATTCAGAGTAATAAACTGTGACACTCACACCCTCATCAAT GATGACGAACTACACCCCGATATCCGGTCACATGACGAAGGGAAAGAGAAGGATATCATCTGTGACAAACTGCCCTCA AATTTGGCTTCCTTAA Clone Rv159 :::::::::::::Rv159SP6.seq::::::::::::: ATACTCAAGCTTGTCGAACTCCTTCTTGAATACCGGCCGGCCATCCACAGATGCCCGGAAGAACTTCCAGGTACCCAT (SEQ ID NO. 117) GGCGGCTGGATCAGGGGGCGGCACAGTTGGTCTTGTCCTGCCTCGAGTGGCGTCGTTGTCCGGCTTGGACGGGGCTCC GACGGTACCGGAGGGCAGCGACAAAACACTTATGCACTTGGGCGACCCGCCGAGACGGTGCGACACCCATCCCGACGG CACAAGCTCAGCCGCGGCCGCTCTTGTTCTTCGTCGGATCGACATTCACCCACTTCTGACCGGGCTTGGGCGAAGGAA GCAGAA :::::::::::::Rv159T7.seq::::::::::::: GGTATAGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTCGGCGGCTACGTGCCATCGAGACACTGGCGCA (SEQ ID NO. 118) GGCTATCGCACCCGTTATCGGCTACGAGCAAATCGCGGTATGCGTTCTTGAGCATGAGTCGGCGACCGTCGTCATGGT CGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGCCGCGGATTATCAGGACTGACCTCCTGGCTGAC CGGCATGTTTGGTCGCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGGTCGGCTCGGATAGCGAGGTCAGCGAATTCTC GTGGCAGCTCGAAAGGGTCCTGCCGGTGCCGGTCTTTGCGCAAACGATGGCGCAGGTTACGGTCGCGCGGGGTGCGGC CCTGGCGGCGGCCCA Clone Rv15 :::::::::::::Rv15SP6D2.seq::::::::::::: GACACTATATNATACTCAAGCTTCAGGTCAATGTGCGCCAAGCCCTGACGCTGGCCGACCAGGCCACCGCCGCCGGAN (SEQ ID NO. 119) CCCTNTCTAGA :::::::::::::Rv15T7.seq::::::::::::: CTGTAGCCACCTGTTGCCATCCCCGTCATGCCCGACTCTGCTCATCTCGGATCCGCTGACACCCCGCTAAGGCTGCTC (SEQ ID NO. 120) CTCTCGGTGCATTACCTCACCGACGGCGAACNCCCCCAGCTTTACGACTATCCGGATGACGGCACCTGGTTGCCGGCT AACTTCACCGTCAGCTTGGACGGCGGCGCTACCGTCGATGGCGCCAGCGGGGCGATGGCCGGGCCCGGCGACCGATTC GTCNTCANCCTGTCGCGTGAACTTGCCGACGTCATCGTGGTCGGTGTGGGCACCGTGCGCATTGAGGGCTACTCCGGC GTCCGGATGGGTGTCGTCAAGCGCCCGCACCGGCAGGCCCGA Clone Rv160 :::::::::::::Rv160SP6.seq::::::::::::: ATACTCAAGCTTCGCACGCTCGGCGCGCGCGGTACCGCCCAGGTCGCCCAACAGATCGTCGATGTTCGCGTCGTCCGC (SEQ ID NO. 121) CTCGCGCACGTGGTCTGTCACCAGTCAACGTTAACGCCGCCGCACATGTCCTGCGGCCGGGCAAAAACGTGAAAAACG AGCGGGCGACTGCNATGTCATGACACCGACGGCCGCCGATGGGCCCAGGGTCTGGCAAATTCGATCTGTGCGGCCAGT GCCAGCAGCGTCGCCTCGTCATACGGCCGGCCGACGAGTTGAACCGACATGGGCAGGCCGTCGCCGTCGAAGTCCCAC GGCACCACGGGCGCGGGCTGGCCGGTCAGATTCCAAAATTGAAAGTACGGAACCGCTGCACCACCAA :::::::::::::Rv160T7.seq::::::::::::: ATCGTTTCGACCAGGCGCTCCATCCGGCGAGTGGATACTCCCAGCAGGTAGCAGGTCGCCACCACGCTGGTCAGTGCG (SEQ ID NO. 122) CGTTCAGCTCGCTTGCGGCGCTGCAGCAGCCAGTCCGGGAAATAGCTGCCCTGGCGCAGCTTGGGGATCGCGACGTCG ATGGTTGCGGCACGGGTGTCGAAATCACGGTGGCGGTAGCCGTTGCGCTGATTGGACCGCTCATCGCTGCGTTCGCGG TAGCCCGCCCCGCACAGGGCGTCGGCTTCAGCCCCCATCAAGGCGGCGATGAACGTCGAGAGCAGCCCGCGCAGCAGA TCCGGGCTCGCCTGTGCGAGTTGGTCAGCCAGAAGCTGCTCGGTGTCGATAAGATGANAAGAAGTCATTGCGTTATTT CCT Clone Rv161 :::::::::::::Rv161SP6.seq::::::::::::: ATACTCAAGCTTGGGTGTTGCCGATCACCGGAAGCCGCATGATCAGCCACGTTTCGCGCCGCCCGGCATACGGCGGCG (SEQ ID NO. 123) TACCGATCTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAAGGTGACGACGCTGATTG AATCGAGTTCCAGGTCCAGCGGGTGGCGCAGCAACGGCGCGAGCTCAACNACGTCAATCACGTTGTCGCTTTCTACGG TCACCGACCCGGTGACCGTAGTCGCCCGGTGCGCTCGGCCGAGAAGTTGCACCGCCACCACCGCGACAACGTCTTGCA CGCGGACGCCACCCCCCGGAT :::::::::::::Rv161T7.seq::::::::::::: GCGCNAACAGCTCGCGGCAGCCCACGACGTGCTGCGTCGGATTGCCGGCGGCGAGATCAATTCCAGGCAGCTCCCGGA (SEQ ID NO. 124) CAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCGGTGCCCGGGGTCGTGGTGCACCTGCCGATCGC ACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCCGGCAGTTGCCAAACCCAGCGTGATCAGGCTCG GCTCGCGAGTTCGGCGAAAAAGTGGCTCGCCTGATCACCTACCATCGGCCAGGATCTGCGTGTCATCACGACGCTCGC CAAGGAGGTTGTTGTGGTGCTATCGACGGCCTTTAGCCAGATGTTCGGAATCGACTATCCGATAGTGTCCGCGCCAAT GGACTTGATCGCCGGCGGTGAGCTGGCTGCCGCNGT Clone Rv162 :::::::::::::Rv162SP6.seq::::::::::::: ATACTCAAGCTTTCTCCGATACCCGCCATGTCGCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCGGGAT (SEQ ID NO. 125) CCCAAAGTGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGACTCGG TCCACGCGGTGCGGCACATGGTGGACACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCAGCAC TCAATGCCGACCAGGCCGAGGCCGGAAACAAAAGTATCGCTAAGGTCACCGCGATCACGAACATGGTGATCGCAGCAA TGTTGCTAGTGATCTATCGCTCCG :::::::::::::Rv162T7.seq::::::::::::: CCATGAGCACCGCCAGCCGAGCACGAGGCCAAACTCCGCCGACGCAGGCCGGTTGGACTTGTCGTGCTGGACAAGGGG (SEQ ID NO. 126) TTTAGCCGCCGAAGCAGTGACGTACATCGGCGAAGAGCAGTTCGCCTGTCGACCGACGGCGCAAACCGTGAGGCTAGG GAAGCGAGGAGCACATGGCCGCCGACCCGCAATGTACACGCTGCAAGCAAACCATCGAACCCGGATGGCTATACATCA CCGCCCATCGCCGCGGTCAAGCCGGGATCGTCGATGACGGCGCAGTACTGATTCACGTGCCCGGTGAATGCCGCACCC CGGGGAGCACTTTCCGCCAAAACTAACCCGGTTGG Clone Rv163 :::::::::::::Rv163SP6.seq::::::::::::: CGGGTGTCATTGGCCACCGGCGGCGGCTGTCCGGGAAATGGCGGGTCCCCGGTGGTTTTGCTGAGGAGTGCTGAACCG (SEQ ID NO. 127) TAGTCGAAGTGGGCGGCGTCAGACTCCACCCAGCCAGCAGGCAGCGCGAANCTGAATCCTCCAACCGGGTTGTCNATC CGGACAGGTTGGGGTGCGTTTGGGGCAATNACAGGTGGCGGCGGTGCGTTCGGGTCGGCCGGCGGAGGTGCTGCNTTG GGATCCCCGGCTGGGCATTCGGCNTGTTGGCGGCGGCCGGTGGTGGGGGGGGCAACACGTGTCNCCGGTGCGGGTGGC CCT :::::::::::::Rv163T7.seq::::::::::::: CCAAGATCTACACCATCGAATACGACGGCGTCGCCGACTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACG (SEQ ID NO. 128) CCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCGGAACAANTTGACGCAGCGGTTCCGCTGA CCAATACGGTCGGTCCCACGATGACCCAGTACTACATCATTCGCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGAT CGGTGCCGATCGTGGGGANACCCACTGGCGAACCTGGGTTCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGG CGACCCGGCCTATGGTTATTCGACCTCGCCGCCCAAATGTTG Clone Rv164 :::::::::::::Rv164SP6.seq::::::::::::: AGCTTCCCGAGTTCGGCTTTGGATCAAGACCCCAGTCCGCGGGCGCGATCCGGCNGCTCGGTGACTACATCAAGCCAC (SEQ ID NO. 129) AAATCGACGGCTTTCGGGGTGCCGATACCGATGACGTGGCGGATGTCGAGTGTTGAGTTCTCGGCGGGGCGGATGCTC ACCTGGCGATCACCTGCCTCTCGTTGACGATCGATCGTCTATGCCGCCGTCTCTGCGGGAACAGGCCNCCAGTACATC GCCACAGACGGGATCCACCCGCATTTCGGCTACGGTTGCTCGTTTCGGTGTTCGGACTAGTCGGTCCTGGTGACGTGC CGGTGATGCGGACCGGTCCTAGCACTGACCAATGGCCAAAATGCGGGC :::::::::::::Rv164T7.seq::::::::::::: CGGGGGGCCTCTTAATAGTGTAGGAAAGAAGCTCTACATATTCAGGAGGATTCACCATGGCTCGTGCGGTCGGGATCG (SEQ ID NO. 130) ACCTCGGGACCACCAACTCCGTCGTCTCGGTTCTGGAAGGTGGCGACCCGGTCGTCGTCGCCAACTCCGAGGGCTCCA GGACCACCCCGTCAATTGTCGCGTTCGCCCGCAACGGTGAGGTGCTGGTCTGCCAGCCCGCCAAGAACCAGGCAGTGA CCAACGTCGATCGCACCGTGCGCTCGGTCAAGCGACACATGGGCAGCGACTGGTCCATAGAGATTGACGGCAAGAAAT ACACCGCGCCGGAGATCAGCGCCCGCATTCTGATGAAGCTGAAGCGCGACGCCGAGGCCTACCTCGGTGAGGACATTA CCGACGCGGTTATCACGACGCCCGCCTACTTCAATGACGCCCAGCGTCAGGCCACCAAGGACCCGGCCAGATCGCCGG TCTCACGTGCTGCGG Clone Rv165 :::::::::::::Rv165SP6.seq::::::::::::: ATACTCAAGCTTCATAACAGGCCTGTTGTGGGCGCACCCGGCTCGCCGAGTTCTGCACGCACCGCCTCAAGTGCGGCC (SEQ ID NO. 131) CGCACCGCCGGCATCTCCCGGTCACGCAGGGCCGCGGCCCGCGCCGCAGCGACGGCGTGTTCGCGCAGTTCGCCGTCA ATGATGCTGACCTGATCGGCCACCCGGGCGTTCTCGGCGTCTTCGCGTTCACTAATCGCGGTGCTCAGCAGCGTCTCG ACAGCCACCACCCGAGTGGCGACCAGCTGCTCCACCACGGACCGCAGCGATGCCGTCACCTCACCCGTCCAGCGGTCC ACCACGACACGGTCGTGCACCAGCGCGCGGGCATTCACCACCCAGGCGGTCACCGCCAGGCCGATCGCCACACCCGCC ACCATCCCCGATGCAGCCAGGCCGGGAGTAAGA :::::::::::::Rv165T7.seq::::::::::::: CTGGTGCTGGACGGAGCCTAGTACAACTTCCTCTCCAATGCTCTTGCCCCGATCGCGGCGACCAGGATGACCCAGGAC (SEQ ID NO. 132) ATCCTGCCGCCCGAAGTACTGGAAAAGCTCACACCCGAGTTCGTCGCACCGGTGGTGGCCTACCTGTGCACCGAGGAG TGTGCCGACAACCCATCGGTGTACGTCGTCAGTGGTGGTTAGGTGCAGCGAGTTGCGCTGTTTGGCAACGACGGCGCC AACTTCGACAAACCGCCGTCNGTACAAGATGTTGCGGCGCGGTGGGCCGAGATCNCCGATCTGTCCGGTGCGAAAATT GCTGGATTCAAGTTGTAGAACTAAAT Clone Rv166 :::::::::::::Rv166SP6.seq::::::::::::: ATACTCAAGCTTTTCCGGCGTCGTCCACCTGACCCAAAAAGCGCAGGTGCGCCGCCAAACGGCCCGCCTGGCCGCGCA (SEQ ID NO. 133) ACTGGTCGGCGTCGCCGTGGCCGACAATCAGTAGCTGGACATCCGGAAACCGCTGCACCACCTTCGGCAGCGCGTCAA GCAAAAACGGCCATTCC :::::::::::::Rv166T7.seq::::::::::::: TTTCAGATCTCATTTTTATGACATGACTGGAGATCTGTCTAGATTGCAGCTCCTGTGAGCGTGGGTACCGGATTCAAG (SEQ ID NO. 134) CCGGTCGGTCACGCCGCGGTGGTACCGGCTTTGCGGCAGTGCTCGGCCTCGAGTTCGGCGATCGCGCGCGAAGTGCGT TTCGCGCACCAAGATCGCGGCCTAATGGCCGGCGATGACCGCGATGACCAGCGCGATCCAGGAAAAACCGTTCCAACC AGTGCTGGGCGGCCATCCCCG Clone Rv167 :::::::::::::Rv167SP6.seq::::::::::::: ATACTCAAGCTTCCCGACCACAAGTTGAACAGCACCGATTTCGGCGAGCACTTCGTCAACTTCCAGGGTGCCCGCACC (SEQ ID NO. 135) AAGTATTTCGACAAGTATTTCCGTCGGGCCGCCGCCGCCGGCGCGCGGCAGGTGGTCATCCTGGCGGCGGGGCTGGAC TCCCGCGCGTACCGGCTGCCTTGGCCCGACGGGACCACGGTTTTTGAGCTGGACCGCCCGCAGGTCCTTGATTTCAAG CGCGAGGTGCTCGCCAGCCACGGTGCCCAACCGCGCGCCCTGCGCCCGCGA :::::::::::::Rv167T7.seq::::::::::::: GTGTGCTGTCAATTCAGAGCTGAGCCTGATGCACTCAACTTACTGAGCATGCTAACGCTGGTCGTGCGGGTCTTGTTC (SEQ ID NO. 136) CCGCGTGTCGGCAGGGCACACGCTCGGGGCGTAGCTGGGAGAGGCCCCGGTCAAGCCCGGAGAGCAGTGCTCAGTCCG CCAGCTTGACCGACTTTCGATGAGAACGCGCTTCTCGCCGTATTGAACTGGCGTGCTGACGGTCGCTGAGCAGCGCTC GCCGAGTGCGGCCGCTGATTCTTTCATCGAGCCAGGCGAGGCATTCGTGTTCGGCCGCCTGCGGGTCGCCCCCATCGT CGACGCGATCCGTCACCCACTCCTCGATCAGGTCTGCCTCATCGAACGGGCCAACGGTGCTGTCGGACTATGTGTGCG TGGGCACGGCGAGCCGGGTGCTGTGGTACACCCACCGTTGCATGACCAAGTTGACGCCTGACTGGCTGAGCACCGCGA TCCGCTCACAGGTCGGAACGTTGGTG Clone Rv169 :::::::::::::Rv169SP6.seq::::::::::::: ATACTCAAGCTTTTGGTCTAGCCGGCCGAGCCCGATACAGGTGTCATTGGCCACCGGCGGCGGCTGTCCGGGAAATGG (SEQ ID NO. 137) CGGGTCCCCGGTGGTTTTGCTGAGGAGTGCTGAACCGTATGCGAAGTGGGCGGCGTCAGACTCCACCCAGCCAGCAGG CAGCGCGAAACTGAATCCTCCAACCGGGTTGTCGATCCGGACAGGTTGGGGTGCGTTTGGGGCAATGACAGGTGGCGG CGGTGCGTCCGGGTCGGCCGGCGGAAGTGCTGCGTTGGGATCGCCCGGCTGGGCATTCTGCGTGTTGGCGGCGGCCGG TGGTGGGGGGGCAACAGGTGTCTCCGGTGCGGGTGGCGCTGCACC :::::::::::::Rv169T7.seq::::::::::::: GGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTACACCATCGAATACGACGGCGTCGCCGACTTTCCGCGGTAC (SEQ ID NO. 138) CCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCG GAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACTACATCATTCGCACGGAG AACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGTTCAACCAAACTTG AAGGTGATTGTTAACCTGGGCTACGGCGACCCGGCCTATGGTTATTCGACCTCGCCGCCCAATGTTGCGACTCCGTTC GGGTTGTTCCCAGAGGTCAGCCCGGTCGTCATCGCCGACGCTCTCGTCGCCGGGACCCAGCACGGAAT Clone Rv16 :::::::::::::Rv16SP6.seq::::::::::::: TTCTNTCTTCCCNNATTCGTNNNTCTCNTACTACCNGGGCCNCAAAACACCTTGGCNAACGCTCAAAGGCGNTACNGG (SEQ ID NO. 139) CACCAAGGCCCCACACGTCACCCTGTGACCTCCTGCGCCGACCCCGCCCGAGGTCCTGGCCGTTACCACTGAACGGGC GAGCCGGGAGTCTGGTACGCATCGAACAAAGAGCAAGGTGCATGGGCGGAGTTGTTCCGCCNCTTTTTTTATGACGGG GTCGATCCATTCGAGGTCCGTCGCCGCGTCGGTCGAGTGGCGGTCACACTCCAGGTACTCGACCTCNCAGACGAGAGG ACTCGATCCCATCTANGTGTGGACNAAACAGATCTTCTGTCCGACGACTACACACCACCCAGGCCATCGCCGCCGCCC GCGATGCCAACTTCNACNCCGTNCTGGCCCCGGCGGCGGCGCTCCCCGGTTGTCAAACACCTGCCGTGTTCGTTCACN CACTGCCCAACATCNAGCCCGANCNATCCNAGGTCCGTCCAACGCCTCCGCGGCTCNCCAACCTNCTCCCNCTGATCN TCCGCACCAAACACATGCCCGACTCCNTGCNCCNATTGCTTGNATCCCT :::::::::::::Rv16T7.seq::::::::::::: CCGCTATCGGTCGGTGTGCTTGGCGGCGTCGGTATCAACACCGCCCACGAAATGGGGCACAAGAAGGATTCGCTGGAG (SEQ ID NO. 140) CGGTGGCTGTCCAAGATCACCCTCGCCCAGACCTGCTACGGGCACTTCTACATCGAGCACAACCGTGGCCATCACGTC CGGGTGTCCACACCGGAGGACCCGGCGTCGGCGCGGTTCGGCGAGACGTTGTGGGAGTTCCTGCCCCGCAGTGTTATC GGCGGCTTGCGCTCGGCCGTTCATTTGGAGGCCCAACGGCTGCGTCGGCTCGGCGTCAGCCCCTGGAATCCCATGACG TATCTGCGCAACGACGTGCTCAACGCGTGGCTGATGTCGGTGGTGTTGTGGGGTGGGCTGATCGCGGTCTTCGGCCCG GCGCTGATCCCGTTCGTCATCATCCAGGCAGTCTTCGGCTTCAG Clone Rv170 :::::::::::::Rv170SP6.seq::::::::::::: ATACTCATGCTTGCCGAAGTTCCGATGGGTCGCGCCGGCGANCCCAGCGAAGTCGCTAGCGTGGCCGTGTTCTTGGCT (SEQ ID NO. 141) TCGGATCTATCCTCGTACATGACCGGCACCGTGTTGGACGTGACTGGCGGCCGGTTCATATGACACCGAGATCATTGC CACGGTACGGCAATTCGTCAAGAAGGAAATCTTTCCCAATGCACCGGCCCTCGAACGTGGCAACAGCTACCCGCAAGA AATCGTCGATCGGCTGGGTGTTATTGGCTTGCTCGGTCGCCGGCTGCAAGGGTATCGACACCACCGAGTTCATTCTCC GGGCGTGCC :::::::::::::Rv170T7.seq::::::::::::: GGCGTCAACGGTGTCGGCACCGGCGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCAGGCCGATGCCGCGGCCCTC (SEQ ID NO. 142) GTGGCCACGCATGTACAGCACCACGCCGCGCCCCTCACGGGCGACCATCGCCAGCGCGGCGTCCAGCTGAGGCCCGCA ATCGCAGCGGCGTGACCCAAACACATCGCCGGTCAAGCACTCCGAATGCACCCGGACCAGCACGTCGTCACCGTCGGC GTTGGGCCCGGCGATCTCGCCGCGGACCAGCGCGACATGTTCCACGTCCTCGTAGATGCTGGTGTAGCCGATGGCGCG AATCTCCCATGACGAGTCGGAATCCGCGCCTCGGCG Clone Rv171 :::::::::::::Rv171SP6.seq::::::::::::: ATACTCAAGCTTCGGCCTCGCTGCAGGAGTGGGAGCCGCAGGGCTGGAAATCCGAAAAACGAGCCGGTGATCCCACTG (SEQ ID NO. 143) TCGCCGATCGGGGCCGCACCTGGTTGGTGTTACCGATGAATCCGCACCCAAAATGTGGCTGCGGTGGCGTTTCTTGAC TCCTTGGCGTCGACTCTTGTGGCAGCCACCGAGCGGTTGGTCCAGGATCTGGATGGGCAAAGTTGTGCGGCCCGGCCG GTGACGGCCGATGAGCTGACCGAGGTCGACAGCGCCGTGTTGGCTGACTTGGAACCGACATGGATTCGCCCCGGTTGG CGTCACCTCAAGCATTTCAATGGTTAT :::::::::::::Rv171T7.seq::::::::::::: ATGCGTCACCCCGATGCGCCCAGATCGGGGCTTCGCAAATAAAGCACGAACAGGCGGGCAAAACGTCTATCTCGGAGC (SEQ ID NO. 144) CGGAAGGGCAATCAGCCGACCGTCGACGAACGACACCGGCGATAACCACTTAGGCGTTGAACGGCCGGCCCAAACATT ACGCCTCCGTTGATAAGGCTTTCGGTCTCTTCCCCGGTCATCCCAAGCACCTTGCGGCAAATTTGAACGCTTTCCTGT CCGGGCACCGGCCCCGGGCTTTGGGGTCCNTCCGA Clone Rv172 :::::::::::::Rv172SP6.seq::::::::::::: ATACTCAAGCTTCAATCGCGCCGCCACAATCCAAATATGCGTCTAGCGTCTCGATGAGCGTCGGTCCGGCATCGGCTA (SEQ ID NO. 145) GGGGCCGCATCACGTCGGTATGCAGGGCCACGATCGCCCAAGGCGTCGCCCATCAAGGGCGCGTTCGGGCAAAAATTC CCCTATCCAGCACGGGCCGCGGCGCTCCGCNCCAGCCGGCGACGGCGTTCATCCCGGAGATCGCCTCGCTAGCGCTGC GGTGCGCCGCGGTCAGCATGGGCGCCGTGGGGCCGATGACCACCGGGGCGT :::::::::::::Rv172T7.seq::::::::::::: TTCGGCGGGTCTGTAGATTGCGGTCGGCCACCCCACAGGCACTCATGAACCGCAGCCCACGATCGATCTCGGTGG (SEQ ID NO. 146) Clone Rv173 :::::::::::::Rv173SP6.seq::::::::::::: GCGCACCATCGCCAGTAGGTGCCCGTGGTCGGGCGCGTCGAGCCACCCGAGCGGAAACGCGAGTCCGAACAGCAACAG (SEQ ID NO. 147) CAGGACGGGCGCAACCAGGGCGGTGACCATGCCCCCGGCGCTGAACATCAACCACAGGAAGGGCTCCGCCGAGCGTCC GCGCGACC :::::::::::::Rv173T7.seq::::::::::::: CATCGTCGAACTTCGGTCCGGGTTGNTAGNACCGCAGCACCAAACGCACCCACCGACCCCCACGCTTCACCCCAACCC (SEQ ID NO. 148) TTTAGTTCATTGGCGTGAACAGCAGCGTAGCCGGTTGCCCCGATATATGTGGAAAAATCGTTCGGACGTACAAAAAAA GTTCCTGACGCTGGCGTCAACTCGAAACTGCCTCGGAAGTCAATGATGATCCATCAGTCAATATTAAAGTCG Clone Rv174 :::::::::::::Rv174SP6.seq::::::::::::: ATACTCAAGCTTGTCTGCTGCCTCAGCGTATGCATCCAACAGCGCATCGCGATCAACGATCAGGCGCGCCGATTTCGG (SEQ ID NO. 149) GCCGCGGGCAGTGGCACTGGCCAGATGGCCGTTTTTTTCGAGAAACTTCAACGCCTGAGCGCTGCTTCCCATCGAGAG ACCGGTGGCCTCTACAACCGATGCGACAGTTGGACCGGCGATGTTCGCCAGCAGCGCTTCACATACGGCAAGTNTGGC GCGG :::::::::::::Rv174T7.seq::::::::::::: TTGTCCAGGCGGGGAATCGGGCAGGGAGACGACACCTTCGTTCGGTTCGATCGTCGCGAACGGGTAGTTGGCCGCGAC (SEQ ID NO. 150) CACGTTGTTTCGGGTCAGCGCGTTGAAAAGTGTCGACTTGCCGACGTTGGGCAGGCCCACGATCCCCAGGCTCAAGCT CACAGA Clone Rv175 :::::::::::::Rv175SP6.seq::::::::::::: ATACTCATGCTTGGCGCCTGGGTGGCAGCCCACCTGCCCACCACACGGACCGCGGTGCGGACGCGGCTGACGCGCCTG (SEQ ID NO. 151) GTGGTCAGCATCGTGGCCGGTCTGCTGTTGTATGCCAACTTCCCGCCGCGCAACTGCTGGTGGGCGGCGGTGGTTGCG CTCGCATTGCTGGCCTGGGTGCTGACCCNCCGCNCNACAACACCGGTGGGTGGGCTGGGCTACGGCCTGCTATTCGGC CTGGTGTTCTACGTCTCGTTGTTGCCGTGGATCGGCGAGCTGGTGGGCCCCGGGCCCTGGTTGGCACTGGCGACGACG TNCGCGCTGTTCCCCGGCATCTTCGGTCTGTTCGCCGTCGTGGTACCCTGTTGCCGGGTTGGCCC :::::::::::::Rv175T7.seq::::::::::::: CGCCAATTCACGATATCGTTAACCGATATCCCGAGCCGATAGCTGGCGGGCTCGGGTGGTGGCCAGCGGCGCTGCGAC (SEQ ID NO. 152) GAAAGGTGTGACCGTCATGAAACAGACACCACCGGCGGCCGTCGGCCGTCGTCACCTGCTCGAGATCTCAGCATCCGC AGCCGGTGTGATCGCGCTTTCGGCGTGTAGTGGGTCGCCGCCCGACCCCGGCAAAGGCCGGCCCGACACAACCCCGGA ACAGGAAGTCCCGGTCACCGCGCCCGAAGNACTTGATGCGCGAACNCGGAGTGCTCCAAACGCATCCTGCTGAT Clone Rv176 :::::::::::::Rv176SP6.seq::::::::::::: ATACTCAAGCTTGGGCACTGACTTCGGTACCCCCTCCGCCTTTGGCCAGCAGCAGCCACAGCGCGGTTCGCGGACCGA (SEQ ID NO. 153) ACGTGGACATCAATAGCCCGGAATCGGTGTGTGCAAGTTGGTAAACGGTGTTGATCCCAAGCTTTGCCAGCCTTTTCG TAGTCTTGGGCCCCACACCCCACAGTGCTTCGACGGTACGGTCACCCATGATGGCCATCCAGTTGGCATCGGTGAGCT GATAAATGCCAGCTGGTTTCGCGAACCCGGTAGCGATCTTGGCGCGCTGCTTGTTGTCACTGATACCTATCGAGCAAG ACAGCCCGGTTTGCGACAAAATGACTTTTCGGATCTCTTCGGCGACTTCGATGGGGTCGTCGGGA :::::::::::::Rv176T7.seq::::::::::::: AAAGTCCTGTGCCGGTTCGCTAAACACCCGGCGGACACTCAGACGGTGCTGGTGGTGCGGCATGGCACCGCGGGCAGC (SEQ ID NO. 154) AAAGCGCACTTCTCCGGGGGACGACAGCAAGCGACCGCTAGACAAGAGGGGTCGTGCGCAGGCAGAAACGTTGGTACA CAGCTGCTGGCGTTCGGCGCCACCGATGTTTATGCCGCCGACCGGGTGCGCTGCCACCAGACGATGGAGCCACTCGCC GCGGAACTGAACGTGACCATACACA Clone Rv177 :::::::::::::Rv177SP6.seq::::::::::::: ATACTCAAGCTTGGGTTCCACGCCCGCGCAGCCACGCCGTCACCTTTCCACGAGACCTCACCTGCCGATCCGAAATGG (SEQ ID NO. 155) AATCGGCCGTGACGGAATTGGCGCACCGAACACCCAACGAGGTGGTGGCTTCGTCGCGAACCGTCACCCGAGTCGCGG CCACCGTGCGCACGGCGACGTTCTACACCCGCACCAAGATCCGAAAGCTGCAAGCTCCCAGCACCGATCCCGACGTCA TCACCGCTGCCGCCCGGCACGTCCTTGACCTATTCGAGCTGGATCGGCCCGTCCGGTTGCTGGGAGTGCGGTTAGAAC TGGCCTAGAACCGGCGGGCACACCGCNCCTGGGCGGGGCGAATTCTTGACCGCNCCGGCC :::::::::::::Rv177T7.seq::::::::::::: CGCGGTTGGCGTAGTTGGACGGGTCGCCCTCCGAGGCCAATGATGACGATGACCACGCCGATCACGATGGCCACCGAG (SEQ ID NO. 156) AGGGACAACAACAGAAAGCTGACGAATCCCTCCTTGGCGGCCGGGGCTTTGTGGTCGCCGGTCGCGATGGGCGCGAAT TTACGGCCCGCTCCCCCAGGCCGCCGCGAAGCAGGGTCCCCAGCCAGTTGGCGTAGGCGGAATTAACGATCAGCGCCA CCGCGATAACCTGCCATGCCTCGGGCATATCGATGTGCGGCCAGAACAGGCCGAAC Clone Rv178 :::::::::::::Rv178SP6.seq::::::::::::: CCAACAAGAGCATCGGGACATACGGAGTCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACG (SEQ ID NO. 157) ACGCCAGCGACCACATTCAGCAGATGGCCAGCGCGTGCCGGGCCACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTG CGGCCGTGATCGACATCGTCACCGCCGCACCACTGCCCGGCCTCGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGACG ATCACATCGCCGCGATCGCCCTGTTCGGGAATCCCTCGGGCCGCGCTGGCGGGCTGATGACCGCCCTGACCCCTCAAT TCGGGTCCAAGACCATCANCCTCTGCAACAACGGCGACCCGATTTGTTCNGACGGCAACCGGTGGCGAGCGCACCTAG GCTACGTGCCCGGGATGACCAACCAGGCGGCGCGTTTCGTCGCGAGCAGGATCTAACCGCGAGCCGCCCATAGATTCC CG :::::::::::::Rv178T7.seq::::::::::::: TAANACCCGTGTAATTTGGGATGGGCAAAAAGGCCAAGCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGC (SEQ ID NO. 158) GGCTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCNCCCTCCGACCGCGAACATTCGG GGATGGCAGCAACCTGGTAGCNCCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCT ACAGTCTGAAACGCGATGACCATCGATGTGTGGATGCAGCATCCGACGCAACGGTTCCTACACGGCGATATGTTCGCC TCGCTGCGCCGGTGGACCGGTGGGTCTATCCCGGAGACCGACNTCCCGATCGAAGCGACCGTCTCCTCGATGGACGCC GGCGGCGTCACCCTGGGTTTGCTCACCGCCTGGCGTGGCCCCAA Clone Rv179 :::::::::::::Rv179SP6.seq::::::::::::: GTCCGCAAAAGACTCAGCGGCCGACTTTGCTCGCAGCTGGCGGTACCGCGCCACCGATTCGATGCCGTGGTCGCGGAA (SEQ ID NO. 159) GAATGCCTCCCGAAATCGCACGGCCGACTCCAGTTCGGCGAGCATCCGCGATGCCAGCTGCGGCTGCGCCCTGCCGGC CACGGCACCCACATGCGGCAGTTCGTCCACCTGGGCCAGCGCCCCGCCGCCGAAGTCCAAACAATAGAACTGCACCCG GCCCGCATCGTGGGTAGCAGCCAACGCCATGATCAGCGTCCGCAGCGCGGTTGACTTGCCCGTTTGCGGTGCACCTAC GACCGCGACATTGCCTGCGGCCCCGGACAAGTCGATCGTCAGCGGCACCCN :::::::::::::Rv179T7.seq::::::::::::: CGTGGCCACGAACGCCGGGAGGGACANTCTCGGGCGGCTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCA (SEQ ID NO. 160) ACACGTCGCGTCGCCCTCCGACCGCGAACATTCGGGGATGGCAGCAACCTGGCAGCTACCTGGCCGGGCGATGATCTG CAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCTACAGTCTGAAACGCGATGACCATCGATGTGTGGATGCATCATC CGACGCAACGGTTCCTACACGGCGATATGTTCNCCTCGCTGCGCCGGTGGACCGGTGGGTCTATCCC Clone Rv17 :::::::::::::Rv17SP6.seq::::::::::::: ATACTCAAGCTTTGCGGCGGGCGCCGAAATGTGAACGCACCAAACCCGCCCGCTGCGGGTCGGCGGGCCACTCGACCT (SEQ ID NO. 161) CGAATTTCGCCGCCGTGACCATCCAGCCCGACGGCAGTTGGGCACCCGGCCCCCCGGTCGCGGCATAACTGTTGGCGT CGCCGTCATAAAGCTCGAACAGCACCGAAACCGACTCCACCACCGGCCGGTGCGCCTCAAAATCCACGCCGATCTCCA CATACCGGGAAAACGTCGGTGTCCCATCGGGTTTCGGCTTGCCCGCCAGCTGCACACCACCGGTGGCCTCGGCCACCT TCGCGGCCTGAGCGCAGCTACNCATCCTGACGATCATCACCCCGCCCCCGGCTCACGCTTGGCCTCCGTCACCGCACG CATCGCCCGGTTGCGCGCACCGCGACGCCCGTACAGCCGCGCGCAC :::::::::::::Rv17T7.seq::::::::::::: AGCTTGCCGGGACTGCGGAACAGAAGCGGCGGTTCCTACCGCGGTGTGCGGCCGGCGCGATATCGGCCTTTTTACTAA (SEQ ID NO. 162) CCGAACCCGATGTGGGCTCCGATCCGGCGCGCATGGCATCGACGGCGACGCCGATCGATGACGGCCAGGCTTACGAGC TTGAGGGTGTGAAGTTGTGGACCACCAACGGTGTGGTAGCGGACCTGCTAGTGGTTATGGCGCGGGTACCGCGCAGTG AAGGGCACCGAGGGGGAATCAGCGCCTTTGTCGTCGAGGCTGATTCGCCCGGGATCACCGTGGAGCGGCGCAACAAGT TCATGGGACTGCGTGGCATCNAAAACGGCGTGACCCGGCTTCATCGCGTCNGGGTGCCCAAAGACAACTTGATCGGCA Clone Rv180 :::::::::::::Rv180SP6.seq::::::::::::: CTCAAGCTTGGCGATGCGGGCTGGCCAAAACTGGCCGGGCGGGGGTTGGCTTGTTCAATCAAGGGTGGGTTGCCG (SEQ ID NO. 163) :::::::::::::Rv180T7.seq::::::::::::: CCGAAGGCCCGTTCCCGGGCGTTCAGCAAGCGATCGTCGGTTGGCCCACTGCGGGTCGAATCTTGCGGCCGCGCCGGT (SEQ ID NO. 164) CGTGGAACGCCCAGGTCACCCGGCGGCGTACC Clone Rv181 :::::::::::::Rv181SP6.seq::::::::::::: ATACTCAAGCTTTTTTCTGCTCATGAAGGTTAGATGCCTGCTGCTTAAGTAATTCCTCTTTATCTGTAAAGGCTTTTT (SEQ ID NO. 165) GAAGTGCATCACCTGACCGGGCAAATAGTTCACCGGGGTGAGAAAAAAGAGCAACAACTGATTTAGGCAATTTGGCGG TGTTGATACAGCGGGTAATAATCTTACGTGAAATATTTTCCGCATCAGCCAGCGCAGAAATATTTCCAGCAAATTCAT TCTGCAATCGGCTTGCATAACGCTGACCACGTTCATAAGCACTTGTTGGGCGATAATCGTTACCCAATCTGGATAATG CAGCCATCTGCTCATCATCCAGCTCGCCAACCAGAACACGATAATCACTTTCGGTAAGTGCAGCAGCTTTACGACGGC GACTCCCATCGGCAATTTCTATGACACCAGATACTCTTCGACCGAACGCCGGTGTCTGTTGACCA Clone Rv182 :::::::::::::Rv182SP6.seq::::::::::::: CTCAAGCTTGGTGCCGACATGGCCGGGCTGGAGCCCGCGTATGGCAAGGTTCCGCTCAATGTGGTTGTGATGCAGCAG (SEQ ID NO. 166) GACTACGTTCGCCTCAATCAGCTCAAACGTCACCCCCGTGGCGTGCTGCGCAGCATGAAGGTCGGCGCCCGCACGATG TGGGCGAAGGCAACAGGTAAAAACCTGGTCGGCATGGGTCGAGCCCTCATTGGGCCGTTGCGGATCGGGTTGCACCGC GCCGGAGTGCCGGTCGAACTCAACACCGCCTTCACCGATCTTTTCGTCAAAAATGGCGTCGTGTCCGGGGTATAC :::::::::::::Rv182T7.seq::::::::::::: CCGAAGCGTGGGAAATCCTGACCGAATACCGCGACGTGCTGGACACTTTGGCCGGCGAGCTGCTGGAAAAGGAGACCC (SEQ ID NO. 167) TGCACCGACCCGAGCTGGAAAGCATCTTCGCTGACGTCTAAAAGCGGCCGCGGCTCACCATGTTCGACGACTTCGGTG GCCGGATCCCGTCGGACAAACCGCCCATCAAGACACCCGGGGGAGATCGCGATCGAAACGCGGCGAAACTTGGGCC :::::::::::::Rv183SP6.seq::::::::::::: CGACTCGACAAGCATTCTTGACAGTTGTTTTGGCTCGGCATGGTTAGCCAAGGTTCTGCGGTCCCACCAGATCATCTT (SEQ ID NO. 168) GGTCCGGTAGCGCTCGTCCGGGTATGCTGCCGCCGGGATTCTCGCTGCTATTACTCCCCCCGAAAAACGCCACCGGTC CAGCGCGTGGGCCGCCGCGGTCCCCATCACAAACTGAACCCCCAACAGGGGACATGCTTAGCGGTAGGGCGCGCGCCA AGGCGGCAGCAATCGCATCACTGCGCTGCGCGTCACTATTAACCCACCCGGACTTCACTTCCACGACCCCGAATGGCG CCCGGTCATTGATCATCTTGCGCACCGCGGATAATCCGGGATTGCCAGCCCATTCGACTACCGCATGCGAGTCATCGG CTGACCGCAGCGGTCCGATTACCCGAGCGCCCCGANTACATCTCCTCCAATATCAATGGGCGCAA Clone Rv183 :::::::::::::Rv183T7.seq::::::::::::: GCGGTNTAGCTTCCCGTCGTACCGGCGACCGCCAGCCGAGAAGCTCGTTTTCCCAGTGTTGCTGGGGATTCTCACGCT (SEQ ID NO. 169) GCTGCTGAGTGCGTGCCAGACCGCTTCCGCTTCGGGTTACAACGAGCCGCGGGGCTACGATCGTGCGACGCTGAAGTT GGTGTTCTCCATGGACTTGGGGATGTGCCTGAACCGGTTCACCTACGACTCCAAGCTGGCGCCGTCTCGTCCGCAGGT CGTTGCTTGCGATAGCCGGGAGGCCCGGATCCGCAATGACGGATTCCATGCCAACGCTCCGAGTTGCATGCGGATCGA CTACGAATTGATCACCCAGAACCATCGGGCGTATTACTGCCTGAAGTACCTGGTGCGGGTCGGATACTGCTATCCGGC GGTGACGACCCCCGGCAAGCCGCCATCCGTGCTGCTGT Clone Rv184 :::::::::::::Rv184SP6.seq::::::::::::: CTCAAGCTTGGGCGTGACGGCCACCGGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTACACCATCGAATACGA (SEQ ID NO. 170) CGGCGTCGCCGACTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCA CTCCAACTACTTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGAC CCAGTACTACATCATTCGCACGGAGAACCTGCCGCTGCTAAAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACT GGCGAACCTGGTTCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGGCGACCCGGCCTATGGTTATTCC :::::::::::::Rv184T7.seq::::::::::::: CGGGTGTCATTGGCCACCGGCGGCGGCTGTCCGGGAAATGGCGGGTCCCCGGTGGTTTTGCTGAGGAGTGCTGAACCG (SEQ ID NO. 171) TAGTCGAAGTGGGCGGCGTCAGACTCCACCCAGCCAGCAGGCAGCGCGAAGCTGAATCCTCCAACCGGGTTGTCGATC CGGACAGGTTGGGGTGCGTTTGGGGCAATGACAGGTGGCGGCGGTGCGTTCGGGTCGGCCGGCGGAGGTGCTGCGTTG GGATCGCCCGGCTGGGCATTCGGCGTGTTGGCGGCGGCCGGTGGTGGGGGGGCAACANGTGTCGCCGGTGCGGGTGGC GCTGCA Clone Rv185 :::::::::::::Rv185SP6.seq::::::::::::: NCTTGATATTGGCGTCAACGGTGTCGGCACCGGCGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCAGGCCGATGC (SEQ ID NO. 172) CGCGGCCCTCGTGGCCACGCATGTACAGCACCACGCCGCGCCCCTCACGGGCGACCATCGCCAGCGCGGCGTCCAGCT GAGGCCCGCAATCGCAGCGGCGTGACCCAAACACATCGCCGGTCAAGCACTCCGAATGCACCCGGACCAGCACGTCGT CACCGTCGGCGTTGGGCCCGGCGATCTCGCCGCGGACCAGCGCGACATGTTCCACGTCCTCGTAGATGCTGGTGTAGC CGATGGCGCGAAACTCCCCATGACGAGTCGGAATCCGCGCCTCGGCGACCCGCTCAATGTGCTTCTCGTGCTTGCGCC GCCATTCGATCAAGTCAGCAATGGTGATCAGCGCCAGACCGTGCTCNTCGGCG :::::::::::::Rv185T7.seq::::::::::::: CATAAGGGCCGGCGTACCCGGTACCGGCCGCGGGCCTACCACGTGCCGGAACTGGAAGCGCAGTAAGCCCTCAACGCG (SEQ ID NO. 173) CCACCGCTTTGGCCCGCGCGCCCGGCGTAGGCGCATCGGCGGTGGCCGTGGGGCGGCGCACTGCGACCTCACCAGCGG CTTTCGAGCTTTGTTCGATCAACCGGCCAGCATGGTCGAGGATGCATTCGAGACCATATTCGAAATTGGTTTCATCGG GGGCCCCGATCCGATGCCCCCTCCCAGTTGCGTGAGCAAGCAGCGGAGTCGTCGCGGGATCCATGGCCACGGGGTGTT CAATGGCGGATGGTCCGCTGCCCGCCGACTGGCTCTTGCGGGAGAGCCGATCTAGCACCACCGATCCGCGCACGTGGA CCGAAACCGCCGAGTAGATGTCGAAAGCGT Clone Rv186 :::::::::::::Rv186SP6.seq::::::::::::: CGTCCTTTTCCCCAAGATAGAAAGGCAGGAGAGTGTCTTCTGCATGAATATGAAGATCTGGTACCCATCCGTGATACA (SEQ ID NO. 174) TTGAGGCTGTTCCCTGGGGGTCGTTACCTTCCACNAGCAAAACACGTAGCCCCTTCAGAGCCNNATCCTGAGCAANAT GAACAGAAACTGAGGTTTTGTAAACGCCACCTTTATGGGCAGCAACCCCGATCACCGGTGGAAATACGTCTTCAGCAC GTCGCAATCGCGTACCAAACACATCACGCATATGATTAATTTGTTCAATTGTATAACCAACACGTTGCTCAACCCGTC CTCGAATTTCCATATCCGGGTGCG Clone Rv187 :::::::::::::Rv187SP6.seq::::::::::::: CTCAAGCTTCATGTCCGTACGGCTCGGGTACGCTTCCGTCGCAGTGTGCGAGTGATAAATGACGACCGGGACCTCGTC (SEQ ID NO. 175) GGCATCTTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTCGGCATT GGTCATCGGGATATGCCGCTCGGGACGGTCAGAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTC GCGACACGCATGGGCCACCATCGCATTCAC :::::::::::::Rv187T7.seq::::::::::::: NCGCCGCCAGCCACCACGCGCGGGTCGGGCGCCGGGCCCGGGCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACC (SEQ ID NO. 176) GCGACACCACCCGGCTGCGCTACGTCGAGCCATACCGGGCGGAGCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCT CTTTCGAGGTCGAGGTCGATACCGATTTGCGCATCCGCAGCCGCACCCTGGACGACAGAACCGTGCCCTACGANTGCT TGTCGGGCGGGGCCAAAGAACAGCTTGGCATCCTGGCGCGATTGGCCGGCGCGGCGCTGGTCTCCAAAGAAGACGCCC TTCCGGTGCTGAT Clone Rv188 :::::::::::::Rv188SP6.seq::::::::::::: CGCCACGTTCATGGGCAACAACCCCGATCACCGGTGGAAATACGTCTTCAGCACGTCGCAATCGCGTACCAAACACAT (SEQ ID NO. 177) CACGCATATGATTAATTCGTCCAATTGTATAACCAACACGTTGCTCAACCCGTCCTCGAATTTCCATATCCGGGTGCG GTAGTCGCCCTGCTTTCTCGGCATCTCTGATAGCCTGAGAAGAAACCCCAACTAAATCCGCTGCTTCNCCTATTCTCC AGCGCCGGG Clone Rv189 :::::::::::::Rv18SP6.seq::::::::::::: ATACTCAAGCTTCAACCGATTGACGCATTGTGCGAACTGACGGCGCCCGCGCATGGCCAATCCGGAAGACCATCATTG (SEQ ID NO. 178) GCCAGTGGCCGGGCGCTAACAGGTTCCAGCCCCCCACCAGTGCCGCTCGAACATGCGGTGCAACCCATTCGCAGGCCG GCAGGGAAAGCACCGCGGAAGCCGCAAAGGGCTGCAGTTCCGCGCCCAATAGTGTCGTCCGCAACCAGATGCGCTCGA AAACCGCGCCGGCAGTCAGCGCACCCGACGCGAGGTCGAGAGACGTCGTCAGCGCGCCCACATGGGGTGCCAATCGGC ACGGCAGGTAGGCCGCGCGCAACCCGAACGCGTGGTGCATGCCCACGGTCCGCAGGAGGCGCAGCACCCGCCAATGCC GAAGCCCACGAAACATCGGGCGCATCCACGCTTCAACCTC Clone Rv18 :::::::::::::Rv18T7.seq::::::::::::: AGCTTTTGGCAGGGTCTCCTTCGAATTCGGCGTGCACCGCTATGGGTTGCAGCAGCGGCTGGCGCCGCACACCCCACT (SEQ ID NO. 179) GGCCCGGGTGTTTTCGCCCCGAACCCGGATCATGGTGAGCGAAAAGGAGATTCGCCTGTTCGATGCTGGGATTCGCCA CCGCGAGGCCATCGACCGATTACTCGCCACCGGGGTGCGAGAGGTGCCGCAGTCCCGCTCCGTCGACGTCTCCGACGA TCCATCCGGCTTCCGCCGTCGGGTGGCGGTAGCCGTCGATGAAATCGCTGCCGGCCGCTACCACAAGGTGATTCTGTC CCGTTGTGTCGAAGTGCCTTTCGCGATCGACTTTCCGTTGACCTACCGGCTGGGGCGTCGGCACAACACCCCGGTGAG GTCGTTTTTGTTGCAGTTGGGCGGAATCCGTGCTCTGGGTTACAGCCCGAATCGTCAC Clone Rv190 :::::::::::::Rv190SP6.seq::::::::::::: ATACTCAAGCTTTGTCACACCAACTGTTTCCACCAGGCGCTCCATCCGGCGAGTGGATACTCCCAGCAGGTAGCAGGT (SEQ ID NO. 180) CGCCACCACGCTGGTCAGTGCGCGTTCAGCTCGCTTGCGGCGCTGCAGCAGCCAGTCCGGGAAATAGCTGCCCTGGCG CAGCTTGGGGATCGCGACTTCTATGGTTGCGGCACGGGTGTCGAAATCACGGTGGCGGTAGCCGTTGCGCTGATTGGA CCGCTCATCGCTGCGTTCGCGGTAGCCCGCCCCGCACAGGGCGTCGGCTTCAGCCCCCATCAAGGCGGCGATGAACGT CGAGAGCAGCCCGCGCAGCAGATCCGGGCTCGCCTGTGCGAGTTGGTCAGCCAGAACCTGCTCGGTGT :::::::::::::Rv190T7.seq::::::::::::: CCTTAAGCCCCGCAGGGCCCGGCACGCGCGGTACCGCCCAGGTCGCCCAACAGATCGTCGATGTTCGCGTCGTCCGCC (SEQ ID NO. 181) TCGCGCACGTGGTCTGTCACCAGTCAACGTTAACGCCGCCGCACATGTCCTGCGGCCGGGCAAAAACGTGAAAAACGA GCGGGCGACTGCAATGTCATGACACCGACGGCCGCCGATGGGCCCAGGGTCTGGCAGATTCGATCTGTGCGGCCAGTG CCAGCAGCGTCGCCTCGTCATACGGCCGGCCGACGAGTTGAACCGACATGGGCAGGCCGTCGCCGTCGAAGTCCCACG GCACCACGGCCGCGGGCTGGCCGGTCAGATTCCAGACTTGAAAGTACGGAACCCGCTGCACCACCAGCAGCAACGTCG AAACTGCACCCCGGCGTTGGTAGGCGCCGATGCGGGACGGGCCGGTCGCGGCGCCTGGCGTCACAACTACGTCGACAT CGTCGAAGATCGACTGGATCGGCTGCTCACACCACTCGGCGGCCGCAGGCCGCCATCCGCCCTC Clone Rv191 :::::::::::::Rv191SP6.seq::::::::::::: AGCTTTTTGAGCGTCGCGCGGGGCAGCTTCGCCGGCAATTCTACTAGCGAGAAGTCTGGCCCGATACGGATCTGACCG (SEQ ID NO. 182) AAGTCGCTGCGGTGCAGCCCACCCTCATTGGCGATGGCGCCGACGATGGCGCCTGGACCGATCTTGTGCCGCTTGCCG ACGGCGACGCGGTGGGTGGTCAAGTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTCGCGGTTGCGC CGCGAAAGCGGCGGGTCGGGTGCCATCAGGAATGCCTCACCGCCGCGGCACTGCACGGCCAGTGCCGCGGCGATGTCA GCCATCGGGACATCATGCTCGCGTTCATACTCCTCGACCAGTCGGCGGAACAGCTCGATTCCCGGACCGCCCAGCGCA TTGGTGATGGAATCGGCGAACTTGGCCACCCGCTGGGTGTTGACATCCTCGACGGTGGGCAATTGCCCCCGGTAACGT TTGCCGCCT :::::::::::::Rv191T7.seq::::::::::::: CGGTCCGACCCTGTTCGACGGCTACCTGAATCAACCCGATGCCACCGCCGCGGCGTTCGACGCCGACAGCTGGTACCG (SEQ ID NO. 183) CACCGGCGACGTCGCGGTGGTCGACGGCAGTGGGATGCACCGCATCGTGGGACGCGAGTCGGTCGACTTGATCAAGTC GGGTGGATACCGGGTCGGCGCCGGTGAAATTGAAACGGTGCTGCTCGGGCATCCGGACGTGGCGGAGGCGGCAGTCGT CGGGGTGCCCGACGATGATCTAGGCCAGCGGATCGTTGCCTACGTAGTCGGCTCAGCGAATGTCGATGCGGACGGGCT TATCAACTTTGTTGCCCAACAACTTTCGGTGCACAAGCGCCCGCGCGAGGTGCGTATCGTANATGCGCTGCCGCGCAA CGCCTTGGGGAAAGTGCTCCAGAACATTGCTGTCAGAAGCTGANCTACGCGAATTATCGTGTTACGCTGGA Clone Rv192 :::::::::::::Rv192SP6.seq::::::::::::: ATACTCAAGCTTGCCGAAGTTCCGATGGGTCGCCCCGGCGAGCCCAGCGAAGTCGCTACCGTGGCCGTGTTCTTGGCT (SEQ ID NO. 184) TCGGATCTATCCTCGTTCATGACCGGCACCGTGTTGGACGTGACTGGCGGCCGGTCCATATGACACCGAGATCATTGC CACGGTACGGCAATTCGTCAAGAAGGAAATCTTTCCCAATGCACCGGCCCTCGAACGTGGCAACAGCTACCCGCAAGA AATCGTCGATCGGCTGGGTGTTATTGGCTTGCTCGGTCGCCGGCTGCAAGGGTATCGACACCACCGAGTTCATTCTCG GGCGTGCCGGCGCATTCGAGCTGGCGGTGCGCGCTGCCCAGCACCGTCATAGGTACTTGACGATGGTCCACGTCGGAC GAGCGCCTCCACGTCGCTGCCGAACGGTATGCATGGCGGCTACGATTCTC :::::::::::::Rv192T7.seq::::::::::::: CGGTGTCGGCACCGGCGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCAGGCCGATGCCGCGGCCCTCGTGGCCAC (SEQ ID NO. 185) GCATGTACAGCACCACGCCGCGCCCCTCACGGGCGACCATCGCCAGCGCGGCGTCCAGCTGAGGCCCGCAATCGCAGC GGCGTGACCCAAACACATCGCCGGTCAAGCACTCCGAATGCACCCGGACCAGCACGTCGTCACCGTCGGCGTTGGGCC CGGCGATCTCGCCGCGGACCAGCGCGACATGTTCCACGTCCTCGTAGATGCTGGTGTAGCCGATGGCGCGAAACTCCC CATGACGAGTCGGAATCCGCGCCTCGGCGACCCGCTCAATGTGCTTCTCGTGCTTGCGCCGCCATTCGATCAAGTCAG CAATGGTGATCAGCGCCAGACCGTGCTCATCGGCGAACACCGCAATTCATCGGTGTTGCGCCATCGAGCCCTCATCTT TTTGGCTGACGATCTCGCAAATCGCCCCCGCGGGTTGCAGCCGGCAT Clone Rv193 :::::::::::::Rv193SP6.seq::::::::::::: ATACTCAAGCTTTGGGTGAAAGCCGATCACCGGAAGCCGCATGATCAGCCACGTTTCCCGCCGCCCGGCATACGGCGG (SEQ ID NO. 186) CGTACCGATCTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAAGGTGACGACGCTGAT TGAATCGAGTTCCAGGTCCAGCGGGTGGCGCAGCAACGGCGCGAGCTCAACGACGTCAATCACGTTGTCGCTTTCTAC GGTCACCGACCCGGTGACCGTNCTCGCCCGGTGCGCTCGGCCGATAAGTTGCACCGCCACCACCGCGACACCGTCTTG CACGCGGACCCACCCCCGGATCCGTTGTTGGCC :::::::::::::Rv193T7.seq::::::::::::: AGCTTGCTGGCATCCGCTCCAGTAGCGCCCCGCGCGTGGCTTCCAGCGCCCGCAGATGCTCCATGAGCCGGCCGGTCG (SEQ ID NO. 187) AGTCGGCGCCGGCGTTCACCGCCACCCGCCAGGAGCTGGCGGCCAGCATCTCCGCCTTCACGCATTGCGCGATCACAG AGAGAATATACGTCTCATATTCGTTGGAGGTCGTCGCAGGCAATCGGTCGATGACGGATTTGATGGCATCGAGCTGTG CTTCGGCGTAGCCCTCCAGCACGTCGGTATCGCTGTGGCGGTCCACGACGACCGCACCGGCGCGGCGGACAGCCGTCG GGTTGGACGNTGTGCGGCGATCAGTCCGGCCAGCTCCGCCTCGGGATCAGCGGC Clone Rv194 :::::::::::::Rv194SP6.seq::::::::::::: ATACTCAAGCTTGCTGCAGCTTCCTATGACTGCTCCCGAAACCTGGGGGTGTGCCTGCTGTGTATGCACGGCATACGG (SEQ ID NO. 188) ACATCCTTCCCCTGAGACCCGCGGTCGAACCAGCCACGTGTCCATCATCAGGGGTCAACCCCGGCCAAGGGCGACGGC ACGCCAAGTTCGCCGACCGTTAACCTAGTGCTGTTAGCTTCATTTGCTGCGAGCAAAACAGCTGGTCGGCCGTTAGGA ACTGAATTGAAACTCAACCGATTTGGTGCCGCCGTAGGTGTCCTGGCTGCGGGTGCGCTGGTGTTGTCCGCGTGTGGT AACNACNACAATGTGACCGGGGGAGGTGCAACCACTGGCCAGGCGTCGGCGAAGGTCGATTGCGGGGGGAAGAAGAAC TCAAAGCCAGTGGGTCGACGCGCAGGCCAACGC :::::::::::::Rv194T7.seq::::::::::::: AGCTTGACGCGGAGACGGACACATTGCGAACATTGATGACAAAATAGAAATCATTGATGGTTTGAGTCACCAGGCCGA (SEQ ID NO. 189) TCAAGCCTTCGCCGAGCCAAATTCCAATCAAGAGGCCCAAGCCCGTACCAATCAGCCCGGCAACGAGGGATTCCGTCA TTATCAGCCAAAATAACTGCTCTCGGGTTACACCCAAACAGCGCAATATGGCGAAAAACGGTCGCCGTTGCACGACAT TAAATGTCACGGTATTGTAGATTAAAAAGATACCCACCAACAAGGCAATCAAACTGAGAGCGGTTAAATTGACCGTAA AAGCGTCCGTCATCTGTTTGACGGTGTCCCGTTGGGTATCCGACGTTTCCATACGCACACCGGCCGGCAGTCTTTGTT GGATGCGTGTTGCAGTGGCCTCATCTTTGATGATCAAATCGATGTGGCTCAGTCTTCCGGGCA Clone Rv195 :::::::::::::Rv195SP6.seq::::::::::::: ATACTCAAGCTTCGGCTCAGGCGGCGCTGCTGGTAAAGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTC (SEQ ID NO. 190) GGCGGCTACGTGCCATCGAGACACTGGCGCAGGCTATCGCACCCGTTATCGGCTACGAGCAAATCGCGGTATGCGTTC TTGAGCATGAGTCGGCGACCGTCGTCATGGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGCC GCGGATTATCAGGACTGACCTCCTGGCTGACCGGCATGTTTGGTCGCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGG TCCGCTCGGATAGCGAGGTCAGCGAATTCNCNTGGCAGCTCCAAAGGGTCCTGCCGGTGCCGGTCTTTGCGCAAACNA AGGCNCAGGTTA :::::::::::::Rv195T7.seq::::::::::::: TGATCGCGCATCACCTGCTTCATAAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCAACATCAGCCAGCCTCTCG (SEQ ID NO. 191) TCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCC6CG ACGAACGACGCCAGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGCCCG GGTGTGGGGTGTTTCGGCGACCGGCAGCCAGGTGGTCCACACTGCCGACGGGCGCCGCGAGCCGTTCACCGACCAGGC CGCCGAGCAAGTCCGCCCGATCGCATACTCCAACCGGTTGCGGTACTGCAGGTTCAGCTGGCGTACTCCTCGTCGCGC TCGGCGAGGTCTTGCTCCAGCACGTCGCANACGGCAG Clone Rv196 :::::::::::::Rv196SP6.seq::::::::::::: CAAAGCGCGAACTGCTCGCGGCAGCCCACGACGTGCTGCGTCGGATTGCCGGCGGCGAAATCAATTCCAGGCAGCTCC (SEQ ID NO. 192) CGGACAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCGGTGCCCGGGGTCGTGGTGCACCTGCCGA TCGCACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCCGGCAGTTGCCAAACCCAGCGTGATCAGG CTCGGCTCGCGAGTTCCGGGAAGAAGTGGCTCCGCCTGATCACCTACCATCCGCCAGGATCTGCGTGTCTTCACCACG CCCGCCAAGGAGGTTGTTGTGGTGCTATCGACCGN :::::::::::::Rv196T7.seq::::::::::::: CCGGAAGCCGCATGATCAGCCAAGTTTCGCGCCGCCCGGCATACGGCGGCGTACCGATCTCCGCGTCATACACCCGCG (SEQ ID NO. 193) GGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAAGGTGACGACGCTGATTGAATCGAGTTCCAGGTCCAGCGGGTGGC GCAGCAACGGCGCGAGCTCAACGACGTCAATCACGTTGTCGCTTTCTACGGTCACCGACCCGGTGACCGTNGTCGCCC GGTGCGCTCGGCCGAAAANTTGCACCGCCACCACCGCGAAACCGTCTTGCACNCCGGAAGCCACCCCCGATCCGTTGT TGGGCCAGGTTATTGGGT Clone Rv19 :::::::::::::Rv19SP6.seq::::::::::::: CCGGAACCGCCGACGGCACGGTATAACGCCTCCGCATATGGGTCGACAACCAGCGGGTCGGACTTCTGGGCTTCTAGC (SEQ ID NO. 194) GTTCGCGCNGTCGCGACAAACAGCGCGGTCGAACCGACACTCGTTGTGATGTCCTAGCTATCACGTTCGGTACGCACC CAATCGAGTCTAGCGCGGGTAGNTCAGCCCCGATCTCCANGCTCCGCCGAGCCAGGCGC :::::::::::::Rv19T7.seq::::::::::::: CTGGTTTATGTCCCGTTGAAGTTCCATCACCCGATGTGGCGGGAGCACTGCCAGGTCGATCTCAACTACCACATCCGG (SEQ ID NO. 195) CCGTGGCGGTTGCGCGCCCCGGGGGGTCGGCGCGAACTCGACGAGGCGGTCGGAGAAATCGCCAGCACCCCGCTGAAC CGCGACCACCCGCTGTGGGAGATGTACTTCGTTGAGGGGCTTGCCAACCACCGGATCGCGGTGGTTGCC Clone Rv1 :::::::::::::Rv1SP6D2.seq::::::::::::: CCGAGCAGTTGGGAATCGCTCTGCANCAAACCAATATTCTGCGCGACGTCGCGCGACGAGCTGGACCGATTAGCCGTA (SEQ ID NO. 196) CGCCTCCGNCTGGACGACACCGGGGCACTCGATGACCCCGACGCCTACGCTCGCAGGATATTGTTCGCCGGACCCCTC TCTAG :::::::::::::Rv1T7.seq::::::::::::: TATATAATACTCAAGCTTGCCGACGCCAACGCTCGCGCGATGTTCTTAGCCCGACCCGGCTCTTACATGGCACCGGTG (SEQ ID NO. 197) CCCCACACGTCAGCCTGTGACGTCCTGCACCGCGACTCTTTACATAGAATGTGGATTGCCGGATTGGGGATGTCCGGC ATCGCTCAATCTGTAGTCCGCGTTGTCCCGCGAGGGCCATGTGGATGGGGGGAAGGATCCGTGGCGTCCGGGATCACC ATGGGG Clone Rv201 :::::::::::::Rv201SP6.seq::::::::::::: ATACTCAAGCTTGCCGAAGTTCCGATGGGTCGCGCCGGCGAGCCCAACGAAATCGCTAGCGTGGCCGTGTTCTTGGCT (SEQ ID NO. 198) TCGGATCTATCCTCGTACATGACCGGCACCGTGTTCGACGTGACTGGCGGCCGGTTCATATGACACCGAGATCATTGC CACGGTACGGAAATTCGTCCAGAAGGAAATCTTTCCCAATGCACCGGCCCTCGAACGTGGCAACAGCTACCCGCAAGA AATCGTCAATCGGCTGGGTGTTATTGGCTTGCTCGGTCGCCGGCTGCGAGGGTTTCTACACCACCGAGTTCATTCTCG GGCGTGCCGGCGCATTCGAACTGGCGGTGCGCGCTG :::::::::::::Rv201T7.seq::::::::::::: GCACCGGCGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCAGGCCGATGCCGCGGCCCTCGTGGCCACGCATGTAC (SEQ ID NO. 199) AGCACCACGCCGCGCCCCTCACGGGCGACCATCGCCAGCGCGGCGTCCAGCTGAGGCCCGCAATCGCAGCGGCGTGAC CCAAACACATCGCCGGTCAAGCACTCCGAATGCACCCGGACCAGCACGTCTTCACCGTCGGCGTTGGGCCCGGCGATC TCGCCGCGGACCAACGCGACATGTTCCACGTCCTCGTAGATGCTGGTGTAGCCGATGGCGCGAAACTCCCCANGACAA GTCGGAATCCGCGCCTCGGCGAACCGCTCAATGTGCCTCTCGTGCTTGCGCCGCCATTC Clone Rv204 :::::::::::::Rv204SP6.seq::::::::::::: TGGTCCGTGTGCGCATACCAATACAACGCGCCGGGCACCTGACGCGGCGGCCGCAACCAATCGGTGGCCATCGCCATC (SEQ ID NO. 200) TTCTGCTACCCGGTCAACGGACGCACCTTCTCCTGGCCGACGTAGTGCGCCCACCCGCCGCCGTTGCGTCCCATCGAT CCGGTCAAC Clone Rv205 :::::::::::::Rv205SP6.seq::::::::::::: GGCGTGTTGGCCACCGGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTACACCATCGAATACGACGGCGTCGCC (SEQ ID NO. 201) GACTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTAC TTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACTAC ATCATTCGCACGGAGAACCTGCCGCTGCTAAAGCCACTGGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCT GGTTCAACCAAACTTGAAGGTGATTGTTTACCTGGGCTACGGCGACCCGGCCTATGGTTATTCGACCTCCCCGCCCAA :::::::::::::Rv205T7.seq::::::::::::: CGTCCGTGNCCCCTCAANCGCGTGNNGCCGAAGCGGCTGGTTACGACTCCCTGTTTGTGATGGACACTTCTACCAACT (SEQ ID NO. 202) GCCCATGTTGGGGACGCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGCGACCGANCG GCTGCAACTGGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCCGACCCTGCTGGCAAAGATCATCACCACGCTCGA CGTGGTTAGCGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGTTGGTTTGAGCTGGAAACACCGCCAGCTCGGCTTCG AGTTCGGCACTTTCAGTGACCGGTTCAACCGGCTCGAAGAGGCGCTACAGATCCTCCAGCCAATGGTCAAGGGTGAGC GCCCAACGTTTTTCGGCGATTGGTACACCACCGAATC Clone Rv207 :::::::::::::Rv207SP6.seq::::::::::::: CCGCTTCCGTGTAACCGAGCANNGCGAGCGANCTGGCGAGGAAGCAAAGAAGAACTGTTCTGTCAGATAGCTCTTACG (SEQ ID NO. 203) CTCAGCGCAAGAAGAAATATCCACCGTGGGAAAAACTCCAGGTAGAGGTACACACGCGGATAGCCAATTCAGAGTAAT AAACTGTGATAATCAACCCTCATCAATGATGACGAACTATCCCCCGATATCAGGTCACATGACGAAGGGAAAGAGAAG GAAATCAACTGTGACAAACTGCCCTCAAATTTGGCTTCCTTAAAAATTACAGTTCAAAAAGTATGAGAAAATCCATGC AGGCTGAAGGAAACAGCAAAACTGTGACAAATTACCCTCAGTAGGTCAGAACAAATGTGACGAACCNCCCTCAAATCT GTGACAGATAACCCTCAGACTATCCTGTCGTCATGGAAGTGATATCGCGGAAGGAAAATACGATNTGAGTCGTCTGGC GGCCTTTCTTTTTCTCAATGTATGAGAGCG Clone Rv209 :::::::::::::Rv209SP6.seq::::::::::::: TGACACCCAACAGAGGGCACTTAAGATGGCAATGCGGCCGCCTACCTGCACGTTTTCGCGATGTCAGAGGATGCCGAG (SEQ ID NO. 204) GGAGAACAATGCGAGCACGGCCGCTGACNTTGCTCACCGCTTTGGCGGCGGTGACATTGGTGGTGGTTGCGGGCTGCN AGGCCCGANTCNAGGCCGAAGCATATAGCGCGGCCGACCGCATTTCGTCTCGACCGCAAGCGCGACCTCAGCCGCAGC CGGTGGAGCTACTGCTGCGCGCCATCACGCC :::::::::::::Rv209T7.seq::::::::::::: ACGGGCGACGCTGAGGTGGGCCCGCGGCTATTCATGCTGTCGTCCACGTCCAGCGACGCACTCCGCCAGACGGCCCGC (SEQ ID NO. 205) CAACTAGCCACCTGGGTGGAAGAACACCAGGACTGCGTGGCGGCCTCGGATCTGGCCTACACGCTGGCGCGTGGCCGC GCGCACCGGCCGGTGCGCACCGCGGTGGTTGCCGCCAACCTGCCGGAGCTCGTCGAGGGTTTGCGCGAGGTGGCCGAC GGTGACCCCTCTATGACGCGGCGGTGGGACACTGTGATCTAAGACCGGTCTGGGTCTTCTCCGGGCAAGGGTCTCAGT GGGCGGCGATGGGCACCCAATTGCTCGCCAGCGAACCAGTGTTCGCGGCCACCATCG Clone Rv20 :::::::::::::Rv20SP6.seq::::::::::::: ATACTCAAGCTTCGCGAGATCCGGATGGCACTCACGCTGGACAAGACCTTCACAAAATCTGAAATCCTGACCCGATAC (SEQ ID NO. 206) TTGAACCTGGTCTCGTTCGGCAATAACTCGTTCGGCGTGCAGGACGCGGCGCAAACGTACTTCGGCATCAACGCGTCC GACCTGAATTGGCAGCAAGCGGCGCTGCTGGCCGGCATGGTGCAATCGACCAGCACGCTCAACCCGTACACCAACCCC GACGGCGCGCTGGCCCGGCGGAACGTGGTCCTCGACACCATGATCNAAAACTTCCCGGGGAGGCGGAGGCGTTGCGTG CCGCCCAGGGCGAACCGCTGGGGGTTCTGCCGCAGCCCAATGATTGCCGCGCGGCTGCATCGCGGGCGGCGACCGCCA TTCTTCTGCGAATACGTCCAGGAGTACTGTCTCGGGGC :::::::::::::Rv20T7.seq::::::::::::: AGCTTATGTGGCCGCCCACCTACCTTATCTAGCCTAGCTAACTAAATCCAGTGCCGACAGTGCGCGGCTGGCCACCCA (SEQ ID NO. 207) GCATGAGGTTATGACCACGGCATATGCCAGCGCGCTGGCGGCGATGCCGACGCTGACCGAGTTGGCCGCTAATCACAC CAGCCATGCGGTGTTGCTGGGAACGAATTTCTTTGGAATCAATACGATCCCGATCGCGCTCAATGAGGCCGACTATGC GCGGATGTGGATTCAGGCGGCCACCACGATGAGTATCTATGAGGGCACCTCCGATGCGGCGCTGGCGTCNGCACCGCA AACCACACCGGCTCCGGTACTGTTCAACGGCGGTGCTGGCGTTTGCCAGCGCCTGCCGGCGATCTC Clone Rv214 :::::::::::::Rv214SP6.seq::::::::::::: ATACTCAAGCTTGCCACCCATGCCGAGCAAGGTCGACTCAGCGATGACGAATTGTTCTTCTTCGCGGTGTTGCTGCTG (SEQ ID NO. 208) GTTGCGGGCTATGAGAGCACTGCTCATATGATTAGCACNTTGTTTCTGACGCTGGCCGACTATCCAGATCAGCTGACA CTCCTTGCGCAGCAACCAGACCTGATCCCGTCGGCGATCGAGGAGCACCTCCGCTTTATATCGCAATCCAAAACATCT GCCGCACAACGCGCGTCGACTATTCGGTCGGTCAAGCGGTCATCCCGGGA :::::::::::::Rv214T7.seq::::::::::::: CCGGGGTAGAACGATGCGATCTGGGCCATGTCGACATCGGTGGTACAGGTAAACCGCGCCGTGTGCGCGGTCTCGGAG (SEQ ID NO. 209) ATCAGAACGTGGTCGCAGTTGACACCGCGGGCTTTCAGCCAGTCGCGATAATCGGCGAAGTCGGCGCCTGCCGCCCCA ACTAGCGCGACCTCGCCACCTAGCACACCGATGGCGAAGGCCATGTTTCCGGCCACGCCGCCGCGGTGCATCATCAAC TC Clone Rv215 :::::::::::::Rv215SP6.seq::::::::::::: ATACTCAAGCTTGGCGGCAACGCCACTACCGGGCTCACCAGGTCCTGTGCCGCCACCGCCGGCGCCGAAAGCACCATC (SEQ ID NO. 210) AGGTCGTAGTTGTCTGGACGTTCGACACCGTAAGCGAACACAATGCCGCCGCCCATGCTGTGCCCGAGCACGATGCGC TTGCACCCGGGATATTCCCGGGTGGCGATCCCAACGAGGGTGTCGAAGTCAGCGGTGTATCTGAGATGTCTCTCACTA TCATCCGTTTGGCACCCGAGCGGGCATGCCCGCGGGGGGTCAAC :::::::::::::Rv215T7.seq::::::::::::: GTCGACGGCATCAAGGTCCGCAGTGATGGTGTTCATCTCACCCAGGAAGGCGTGAAGTGGCTGATACCGTGGCTTGAG (SEQ ID NO. 211) GATTCGGTGCGGGTCGCCAGTTAATCCGCCGTGTGCTCCGGATGAGCGCGACGGTAACCCTGGAATTGTGCTGTGTGC TGGCTGTGTCGTTGTGATGAGCCTGTCTAAGTGGTGCGTAACCGTTTGACGAGCCGCGGCCTCGCTGCAAACATTGAA GCCCGCACGTCTGGGTTTGTATTTACACAACGAGGGCGCTCCCCGATCTGGCGCGCGCAACGAGGTGCNCACTATCCA TTCGAGGTGAACTGGACTCCTTGATGCTCATGCCGGTGCGGTTTTGTC Clone Rv217 :::::::::::::Rv217SP6.seq::::::::::::: ATACTCAAGCTTGCGTTCGATGAAGTAGTCGTCGGTCAGCGCCGCCTCTTCGAGCTCCTTGGCGATGCCCAGCAAGGA (SEQ ID NO. 212) GTCATCGCCGCCGAGCTTGGCCAGGATCTTGTCGGCCTGTTCCTTGACGATGCGGGCCCGCGGATCGTAGTTCTTGTA GACACGATGACCGAAACCCATCAATTTGACCCCGGCCTCGCGGTTCTTGACCTTGCGTTACAAACTCGCTGACGTCGT CGCCGCTGTCGCGAATGCCCTC :::::::::::::Rv217T7.seq::::::::::::: NGTCAAGCCGAGCATGCGCGAGGNAACGACGAACCCAACAAGCCATGGTGGTTGGCGCCGTCGAGAGGTCGGCGGTCG (SEQ ID NO. 213) CCACAACGGGAAGATCGCCTTGAGCGTCGCTCGACCGCCGCCTCGAGTTGGGTCATAACGAAGTAGCTGATGCCGATC ATGTCGACGTTTCCGTCGCATCAGCGTGCAGCGGCGACCCACTCGACGAGGTCTCGGTGCCGCCGCGGCCAGGGGACC AGCAGTGACGATTCCAGGCGCCGTCGGG Clone Rv218 :::::::::::::Rv218SP6.seq::::::::::::: CGATAATCGCTTCCGGTAAGTGCAGCAGCTTTACGACGGCGACTCCCATCGGCAATTTCTATGACACCAGATACTCTT (SEQ ID NO. 214) CGACCGAACGCCGGTGTCTGTTGACCAGTCAGTAGAAAAGAAGGGATGAGATCTCCCCGTGCGTCCTCAGTAAGCAGC TCCTGGTCGCGTTCATTACCTGACCATACCCGAGAGGTCTTCTCAACACTATCACCCCGGAGCACTTCTAGAGTAAAC TTCCCATCCCGACCACATATAGGCTAAGGTAATGGGCATTACCGCGAGCCATTACTCCTACGCGCGCAATTAACGAAT CCACCATCGGGGCCGCTGGTGTCN Clone Rv219 :::::::::::::Rv219SP6.seq::::::::::::: NAATACTCAAGCTTTCTCGTGATTACCACCCGTGTAATTTGGGATGGGCAAAAAGGCGAATCACCGCGTGGCCACAAA (SEQ ID NO. 215) CGCCGGGAGGGACAATCTCGGGCGGCTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTC GCCCTCCGACCGCGAACATTCGGGGATGGCAGCAACCTGGTATCACCCTGGCCGGGCAATGATCTGCAGCGTCGCCGC GGGTAGTGNCCGCCCGGGCGGCTAC :::::::::::::Rv219T7.seq::::::::::::: CCAACTAGAGCATCGGGACATACGGAGTCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACG (SEQ ID NO. 216) ACGCCAGCGACCACATTCAGCAGATGGCCAGCGCGTGCCGGGCCACGATGTTGGTGCTCGGCGGCTACTCCCAGGGTG CGGCCGTGATCGACATCGTCACCGCCGCACCACTGCCCGGTCTCGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGACG ATCACATCGCCGCGATCGCCCTGTTCGGGAATCCCTCGGGGCCGCGCTGGCGGGCTGATGATCGCCCTGACCCCTCAA TTCGGGTCCAAGA Clone Rv21 :::::::::::::Rv21SP6.seq::::::::::::: ATACTCAAGCTTGCTGCAGCTTCCTGTGACTGCTCCCGAAACCTGGGGGTGTGCCTGCTGTGTATGCACGGCATACGG (SEQ ID NO. 217) ACATCCTTCCCCTGAGACCCGCGGTCGAACCAGCCACGTGTCCATCATCAGGGGTCAACCCCGGCCAAGGGCGACGGC ACGCCAAGTTCGCCGACCGTTAACCTAGTGCTGTTAGCTTCATTTGCTGCGAGCAAAACAGCTGGTCGGCCGTTAGGA ACTGAATTGAAACTCAACCGATTTGGTGCCGCCCGTAAGTGTCCTGGCTGCCGGTGCGCTGGTGTT :::::::::::::Rv21T7.seq::::::::::::: AGCTTGCGCGGCGTGGCGATCGCGGTTCAAGGCGCGCTCTTCGAGCACAACGAGCGAAGACAGCTCCGCGACGGAGCC (SEQ ID NO. 218) TTTATCGACATCCGTTCGGGCTGGCTGACCGGCGGCGAAGAACTGCTGGACGCGTTGTTGTCGACGGTGCCGTGGCGA GCCGAGCGCCGTCAGATGTACGACCGGGTGGTCGATGTGCCGCGGCTGGTGAGTTTTCACGACCTGACCATCGAAGAT CCGCCGCATCCGCAGCTGGCGCGGATGCGCC Clone Rv220 :::::::::::::Rv220SP6.seq::::::::::::: AATACTCAAGCTTGCGCACGACCAGGACGTCGAGTGGCGCTTGCAGTGACTTGGCGACCTCAAAGGCCACCGGTACCC (SEQ ID NO. 219) CGCCGCGCGGCAAGCCAAGGACNACNACGGCCTTGCCGGATAGCTGCGCCAGGCGTTGCGCCAACTGGCGTCCAGCGT CGCCACGATCGTCAAAGAGCTTCATCTGCCGAGTGTGTCGCCATCTCATGGCTCCAAATATGGAATTAGGTCCCTGGG CCGACTGACGACAGTCCCTCAGCGACCGGATTGCGCATCCCGCCTTGTACGCTGCTCCGCAAATCCCGGGCTTGCCTC CGCGGAAGCGAACTCGGCGGCGCTACGGTGGTGGCTCACTTCGGCCGTGC :::::::::::::Rv220T7.seq::::::::::::: GGTTGGTGCGGTCCACCTTCGCGGCGGCGGCGCGATATGCCTTGCTGGTCTTGCTCATTTGATATCCAATCTATGGGT (SEQ ID NO. 220) CGTGGTTACTCAGCGGGCCGAAGCTGGCCCTCCCACGGGTAGGGCCCTATTCGACGGTGATGCCCATCGACCGAGCGG TACCGGCGATGATCTTGGCCGCAGCGTCGACGTCGTTGGCGTTGAGGTCCGTCTTCTTGGTCTCGGCGATTTCGCGGA CTTGATCCCAGGTGACTTTGGCGACCTTGGTCTTGTGCGGCTCCGCCGAACCCTTCGCCACACCAGCGGCCTTAAGCA GCAGCTTGGCGGCGGGCGGCGTCTTCAGCGTGAAAGTGAAGCTACGGTCTTCATAAACGGTGATCTCCACCGGGATGA CGTTGCCGCGCTGGTTCTCCGTCGCGGCGTTGTACGCCTTGCAGAACTCCATGATGTTGACCCGTGCTGACCGAACGC GGGGCCCACTGGCGGGGC Clone Rv221 :::::::::::::RV221SP6.seq::::::::::::: ATACTCAAGCTTTTCGACCCGCAAGCCGGCGGTGCCCCTCCTCGTTCCGCTGCCCGGTCTGCTCGATCGGTTCGGGGT (SEQ ID NO. 221) CGCCGCGCTAGGCCCAATTGCCCGGCTCCTCCTCGGGCCGTTCCACAACCCGCATCGTCGCCGGGCTAGGTTCAACCC ATGCCGGTAAACCCCAGGACGCCAGTGCTGATCGGCTATGGACAGGTCAACCACCGAGGCGACATCGACGCCNAAAAT CAGTCCATCGAACCCGTCGACCTGATGGCCNCCGCGGCCCGGAAAGCCGCCGAGTCCACCGTGCTCGAAGCGGTGGAT TCCATCCGTGTGGTGCACATGCTGTCGGCGCATTACCGGAATTCCCGGGCGTCTCCTCGGC :::::::::::::Rv221T7.seq::::::::::::: NCCTGGTTCATGAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCAACATGAGCCAGCCTCTCGTCGGCGGTCGGC (SEQ ID NO. 222) TGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCCGCGACGAACGACGCC AGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGGCCGGGTGTTGGGGTG TTCGGCAACGGCAACCAAGTTGGTCCACACTGCCGACGGGCGCCGCAAATCCGTTCACCGAACCAGGCCGCCNAAACA ATTCCGCCCGATCCCATAT Clone Rv222 :::::::::::::Rv222SP6.seq::::::::::::: ATACTCAAGCTTGTCGGGATCAATCTCGAGGGCATCCACGCACGAAAAGTAAACTCTATCAAGCTTTTTGACGACACC (SEQ ID NO. 223) CACGGACGCCCCATATATGTTCGGGTGGGCAAGAACGGTCCCTACCTGGAACGTTTGGTGGCCGGCGACACCGGTGAG CCCACGCCGCAGCGGGCCAACCTCAGCGACTCGATTACCCCGGACGAACTGACTCTACAGGTGGCCGAAGAGCTCTTT GCCACACCGCAACAGGGACGGACTTTGGGCTTGGACCCAGAAACCGGCCACGAAATCTTTGCCAGGGGAAGGCCGGTT TGGGCCTTATGTTACCTATATCCTGCCGGAACCTGCGGCTGATGCGGCCGCGGCCGCTCAGGGAN :::::::::::::Rv222T7.seq::::::::::::: AGCAGCTAGCCGCGCTCGCCGCGCTGGTCGGTGCGTGCATGCTCGCAGCCGGATGCACCAACGTGCTCGACGGGACCG (SEQ ID NO. 224) CCGTGGCTGCCGACAAATCCGGACCACTGCATCAGGATCCGATACCGGTTTCAGCGCTTGAAGGGCTGCTTCTCGACT TGAGCCAGATCAATGCCGCGCTGGGTGCGACATCGATGAAGGTGTGGTTCAACGCCAAGGCAATGTGGGACTGGAGCA AGAGCGTGGCCGACAAGAATTGCCTGGGCTATCGACGGTCCAGCACAGGAAAAGGTCTATGCCGGCACCGGGTGGACC GCTATGCGCGGCCAACGGCTGGATGACAGCATCGATGACTCCAAGAAACGCGACCACTACGCCATTCAAGCGGTCGTC GGCTTCCCGACCGCACATGATGCCGAAGAATTCTACAGCTCCTCCG Clone Rv223 :::::::::::::Rv223IS1081N1400.seq::::::::::::: CGCGACTGGCTCCCCGGNCGGCTGCTCGGGTCCGCCGATAGAGACCGGGATCTCGCCCGACGACGGGCAGCCGGGTTG (SEQ ID NO. 225) CGTGGGACGGGGCGGGGGTCGGGCAGCCCAAGCAACGGGCTAGTCCCCGAATCCTACGGAGCCGTCACCTACGCCTAC GTAATAGTAGCTATCAATAACAGTTGACATACGCAACGATCTGTGAGATCAATATTGCCTGACGCATGTCAAGACAGG CGTCAAGACAGGTGTCAATAATTCGCTCCGCTGGTGACGGTAACCGGTCGTGCGGGTGTGTGACGCCTAAGGAAGGAG TGTGGGTGGTGACGCTGAGAGTGGTTCCTGAGGGTTTGGCGGCCGCCAGTGCGGCGGTGGAGGCGTTGACCGCACGGC TGGCCGCCGCACACGCTGGCGCGGCGCCGGCGATTACGGCGGTGGTGGCGCCCGCGGCGGATCCGGTGTCGTTGCAGA ATGCGGTGGGGTTTAGCGCCTTAAGTAGCCAGCATGCCGCGATCGCCGGCGAAAGGGTCCAAGAACTGGGT :::::::::::::Rv223SP6.seq::::::::::::: ATACTCAAGCTTATTGAACCGCGGGTCGCAGGCAAAGTGGACCTCATAACGACTCGGGTCCAGCGACCGCGCCAACAC (SEQ ID NO. 226) GAACGGCCGGACGACGTGGGCCAGGGTCGCGGCCTCCCCTACAAACAGGATCCGTTGCCTGCGAACGACAGGCTCCGG TGCGGCGTTGGGCGCCGTGCTCGTCCCAGCGTCCGGTCCCGGGTCGCCGGCGACGCTTGTTTCCTCCATACTCGCCCC CTAATCTCGAGGCAGCCCGTACCCGCAGGCAACCTCCCAAAAATGCAATCCCGCAAAATGCAATGCGTCNAGCTATTT CTCACACCGACCGCTAGTTGCGGATCAGAAATCCGTTGGGCGCGGAAGTCCAGCCGAATTTGTTCTCCCGCTCCGCAT CATGCTTGTAATCGTTTGGAAATTCATCCTCATATGCCTCGATCGCTTCATAGGGTCCAGGCCCAAACCCGGGCAGGA CTGGGTGGCCGTTGATGTTGGAATCCTCCACTACTAGGTATTCACCGGC :::::::::::::Rv223T7.seq::::::::::::: GTCTCGATCATGGCCAAAGAGCTCGACGAAGCCGTAGAGGCGTTTCGGACCCGCCCGCTCGATGCCGGCCCGTATACC (SEQ ID NO. 227) TTCCTCGCCGCCGACGCCCTGGTGCTCAAGGTGCGCGAGGCAGGCCGCGTCGTCGGGGTGCACACCTTGATCCCCACC GGCGTCAACGCCGAGGGCTACCGAGAGATCCTGGGCATCCAGGTCACCTCCGCCGAGGACGGGGCCGGCTGGCTGGCG TTCTTCCGCGACCTGGTCGCCCGCGGCCTGTCCGGGGTCGCGCTGGTCACCGGCGACGCCCACGCCGGCCTGGTGGCC GCGATCGGCGCCACCCTGCCCGCAGCGGCCTGGCAGCGCTGCAGAACCCACTACGCAGCCAATCTGATGGCAGCCACC CCGAAGCCCTCCTGGCCGTGGGTGCGCACCCTGCTGCACTCCATCTACGACCAGCCCGACGCCGAATCAGTTGTTGCC AATATGATCGGGTTCTCGAC Clone Rv224 :::::::::::::Rv224SP6.seq::::::::::::: ATACTCAAGCTTTCGTCAGTTCATGGCGCCAGCAGACCAACAAGAGCATCGGGACATACGGAGTCAACTACCCGGCCA (SEQ ID NO. 228) ACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACGACGCCAGCGACCACATTCAGCAAATGGCCAGCGCGTGCCGGG CCACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCGTGATCAAGATCTTCACCGCCGCACCACTGCCCGGCC TCGGGTTCACGCATCCGTTTGGCCGCCGCC :::::::::::::Rv224T7.seq::::::::::::: GCCCCGTGTAATTTGGGATGGGCAAAAAGCGAAGCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCGGCT (SEQ ID NO. 229) AGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCGAACATTCGGGGAT GGCAGCAACCTGGTAGCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCTCCGCCCGGGCCGC Clone Rv225 :::::::::::::Rv225SP6.seq::::::::::::: ATACTCAAGCTTCCTTTGACCGAACGCGTCCACCGCACCGTGAGATTGGTGGCGCCATTCGTCGTGGTGTAGCTGCTG (SEQ ID NO. 230) TTGGCGGCGTCGCCGTATTGTGCGGGCCAGCCTTGTGCGGGGGCCGCTTCTACCCACAAGTCGGCACTTCCGCAACCG CCCAGCTCGACCGCGAATTACGGCGGCCGCAACGGCCGCCGGAAGGCGTCACGCAATCGCTTATCCTTTCCAGGTTCC CAAATCCTCCGCTTACTTGGGTCCTTCATCGG :::::::::::::Rv225T7.seq::::::::::::: GGCAGCGGCGACAACCGGAACGTCCGCACGGTGCTCAATCACGGGTGCACGGTGTGCATCAGAATGGCGGGGGTTCGT (SEQ ID NO. 231) TGTCGCGGTGAGGCGTTCGGCGAGGAGGTAGTGTCTACCCCTTGCCCGCGGGTTCGTGCGGACTGAAAGGGATTTCAT TGGGAACCCACGGCTGCGTATCGCAGGGCCTCGGTGACGTCTGCTTCCTCNAGCTCAGGAAGTTCGGCGAGAATCTCG GTGGATGTTATTTGGTCCGCCTAC Clone Rv226 :::::::::::::Rv226SP6.seq::::::::::::: ATACTCAAGCTTTCTCGGCTTCTCTGATAGCCTGAGAAGAAACCCCAAGTTAATCCGCTGCTTCACCTATTCTCCAGC (SEQ ID NO. 232) GCCGGGTTATTTTCCTCGCTTCCGGGCTGTCATCATTAAACTGTGCAATGGCGATAGCCTTCGTCATTTCATGACCAG CGTTTATGCACTGGTTAAGTGTTTCCATGAGTTTCATTCTGAACATCCTTTATTCATTGTTTTGCGTT Clone Rv227 :::::::::::::Rv227SP6.seq::::::::::::: ATACTCAAGCTTGGTGACCGGCACCGCGATACGTTGCGGCAGGCATCTGGGCTGGCGGTGGTTCGCCGCTCCGAAGCC (SEQ ID NO. 233) GTCGAACACCATCGCCAGCGCGGCTTCCACATCAACGACCATTTCGGCCAGCTTGCGGCGCATCAGCGGCTTGTCGAT GAGCGCCCCACCGAATGCCCGCCGCTGCCCGGCGTATCACATCGATTCGACCATCGCGCGGCGCGCGTTGCCGAGGGC GAACGAGGCGGTGCCCAACCGCAATCTGTTTGGTCAGCTCCCTCATGCGGGTTGATTCCTTGCCGTCCGGACGGGCCC GCGTCATGCGCTCGGTTCGCC :::::::::::::Rv227T7.seq::::::::::::: CCGTTGCGCAGCGTGAGCCGATAGTTGACATCCGGCTCGGTGAAGGTGAAATCGATGGCCAGGTCGAGGTCCCATGCG (SEQ ID NO. 234) CGTGGGCCATTGATGCTGATCGCCAGGACGTCAAAGATTTGGTCCGGCGTCAGCTGGGCGAAAAACGTGGGCGCCGGG ACTTGCCCGGAGCTGCCCGGGTTCCCGTCGCGCAGCTCGGCGGCCCCGGTCAGAAAGAAATTGCGCCAGGTCGCACAC TCCGCGCCGTAGGCCAGCTGCTCCAGGGTGTCGGCATAGAGCCCGCGGGCCGCAGCGTGCTCGCTGTCGGCGAACACC GCATGGTCGAGAAGCGTTGCCGCCCAACGGGAAATCACCTGCGTCGAAAGCTTCGCGGGCCAGCTCCAGCACTCGGTC GATGCCACCCAACGCGT Clone Rv228 :::::::::::::Rv228SP6.seq::::::::::::: ATACTCAAGCTTGCGGATGTTACCCCTGACAGCGTGAACTATGTCNAAACACACGGCACCGGAACGGTGTTGGGGGAC (SEQ ID NO. 235) CCCATCGAGTTCGAGTCGCTGGCGGCCACTTATGGCCTGGGTAAAGGCCAGGGCGAGAGCCCGTGCGCATTGGGGTCG GTCAAAACCAACATCGGCCACCTGGAGGCGGCCGCCGGTGTGGCTGGATTCATCAAGGCGGTGCTGGCGGTGCAACGT GGGCACATTCCCCGCAACTTGCACTTCACCCGGTGGAACCCGGCCATCAACACGTCGGGGACGCGGCTGTTCGTGCCG ACCGAAAGCGCCCCGTGGCCGGCGGCTGCCGGTCCACGCAGGGCTGCGGTGTCATCGTTCGGCCTCAGCGGGACCAA :::::::::::::Rv228T7.seq::::::::::::: CCGGTAACCAGATCAGCTCGTCGACCTCACTGCCGGGGGTGAATTCCCCACCGCTGCTGCGCGCTCCCCAGTAGTGCA (SEQ ID NO. 236) CCTTCTTGACGCCTCGAAAAGGGGAGTCCGTCGGGTAGGTCACCGTCAGGAGCCGCCTACCCAGGTTGGCGCGGTGAC CGGTCTCCTCGAGTATCTCCCGCACCGCCCCCACCGGTGCGGTCTCGCCCGGATCCACTTTGCCCTTGGGCAGCGACC AGTCGTCGTAACGGGGGCGGTGAATGACAGCGATCTCGACCGGCCCTTCCGAATCGGCACTGCCGGGTCGCCAGAACA CCGCACCGGCGGCGTACACAATCCGGCCCGCCCAGCGCCGGCGGGCGGACGANTTCTGGATCGACACCTCAACTCCTG CAGGTCAATTCGGCCAAGCTGCTCGCGGTCGTGGATGTGGTC Clone Rv229 :::::::::::::Rv229SP6.seq::::::::::::: ATACTCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCACCCACCACGCGCGGGTCGGGCGCCGGGCCCGG (SEQ ID NO. 237) GCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACGTCGAGCCATACCGGGCG GAGCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCGAGGTCGAGGTCTATACCGATTTGCGCATCCGCAGC CGCACCCTGGTCGTCTCGTACCGTGCCCTACCTCTGCTTGTCGGGCGGGGCCA :::::::::::::Rv229T7.seq::::::::::::: TCCGTACGGCCCGGGTACGCTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGACCTCGTCGGCATCTTCCATA (SEQ ID NO. 238) GCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTCGGCATTGGTCATCGGGATA TGCCGCTCGGGACGGTCAGAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACGCGCATGG GCCACCATCCATCCACCAGGTCTGCGCGAATCACCCGC Clone Rv22 :::::::::::::Rv22SP6.seq::::::::::::: GGACACATTGCGAACATTGATGACAAAATAGAAATCATTGATGGTTTGAGTCACCAGGCCGATCAAGCCTTCGCCGAG (SEQ ID NO. 239) CCAAATTCCAATCAAGAGGCCCAAGCCCGTACCAATCAGCCCGGCAACGAGGGATTCCGTCATTATCAGCCAAAATAA CTGCTCTCGGGTTACACCCAAACAGCGCAATATGGCGAAAAACGGTCGCCGTTGCACGACATTAAATGTCACGGTATT GTAAATTAAAAAGATACCCACCAACAAGGCAATCAAACTGAGAGCGGTTAAATTGACCGTAAAAGCGTCCGTCATCTG TTTGACGGTGTCCCGTTGGGTNTCCGACGTTTCCATACGCACACCGGCCGGCAGTCTTTGTTGGATGCGTGTTGCAGT GGCCTCATCTTTGATGATCA :::::::::::::Rv22T7.seq::::::::::::: GCCTGGCCCAGGTGAAGGCCGACCTCGACGCCAAAGCCGCTGATCCGGCACATGAGTCGGTGGACTGGGACTTGAAGT (SEQ ID NO. 240) CGCTGCGATGGGCGTGGAACCGAGCCAAAGATGACGTGGCGCCGTGGTGGGCCGAGAATTCCAAGGAGTGCTACTCGT CGGGGTTGGCCGATCTGGCCCAGGGCCTGGCTAATTGGAAAGCTGGCAAGAACGGGACCCGCAAAGGCCGGCGGGTGG GCTTCCCGCGATTCAAATCCGGGCGGCGTGATCCTGGCAGGGTGCGGTTCACCACCGGCACCATGCGCATAGAGGATG ACCGGCGCACGATCACGGTCCCGGTGATCGGGCCGCTGCGGGCCAAGGAGAACACCCGCCGGGTGCAACGCCACCTCG TGAGCGGGCGCGCGCAGATCCTGAACATGACCTTGTCGCAGCGGTGGGG Clone Rv230 :::::::::::::Rv230SP6.seq::::::::::::: TAACTCAAGCTTCAAGTCCGCNGTCCGACCCTGTTCGACGGCTACCTGAATCAACCCGATGCCCCGCCGCGGCGTTCG (SEQ ID NO. 241) ACCCGACAGCTGGTACCGCACCGGCGACGTCGCGGTGGTCGACGGCAGTGGGATGCACCGCATCGTGGGACGCGAGTC GGTCGACTTGATCAAGTCGGGTGGATACCGGGTCGGCGCCGGTGAAATTGAAACGGTGCTGCTCGGGCATCCGGACGT GGCGGANGCGGCAGTCGTCGGGGTGCTCGACTATTATCTAGGCCAGCGGATCGTTGCCTACGTAGTCGGCTCAGCGAA TGTCGATGCGGACGGGCTTATCAACTTTGTTGCCCAACAACTTT :::::::::::::Rv230T7.seq::::::::::::: CCATGTCGCCCAACATATCGTCGATGTTCGCGTCGTCCGCCTCGCGCACGTGGTCTGTCACCAGTCAACGTTAACGCC (SEQ ID NO. 242) GCCGCACATGTCCTGCGGCCGGGCAAAAACGTGAAAAACGAGCGGGCGACTGCAATGTCATGACACCGACGCCGCCGA TGGGCCCAGGGTCTGGCAGATTCGATCTGTGCGGCCAGTGCCAGCAGCGTCGCCTCGTCATACGGCCGGCCGACGAGT TGAACCGACATGGGCATGCCGTCGCCGTCGAAGTCCCACGGCACCACGGCCGCGGGCTGGCCGGTCAGATTCCANACT TGAAAGTACTGAAGCCGCTGCACCACCAG Clone Rv231 :::::::::::::Rv231SP6.seq::::::::::::: CGAAAGCGTGAAACAGCTCGCGGCAGCCCCCGACGTGCTGCGTCGGATAGCCGGCGGGCGAAGATCAATTCCAGGCAG (SEQ ID NO. 243) CTCCCGGACAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCGGTGCCCGGGGTCGTGGTGCACCTG CCGATCGCACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCCGGCAGTTGCCAAACCCAGCGTGAT CNTGCTCNGCTCTNTANTTCGGCGAAGAAGTGGCTCGCCTGATCACCTACCATCGGCCAGGATCTGCGTGTCATCACA ACGCTCGCCAAGGAGGTTGTTGTG :::::::::::::Rv231T7.seq::::::::::::: TCCGCCACGCTTCGCGCCGCCCGGCATACGGCGCGTACCGATCTCCGCGTCATACACCGCGGGTAATCGCCGACGGTG (SEQ ID NO. 244) CCGGTTCGCGAGCCGAAGGTGACGACGCTGATTGAATCGAGTTCCAGGTCCAGCGGGTGGCGCAGCAACGGCGCGAGC TCAACGACGTCAATCACGTTGTCGCTTTCTACGGTCACCGACCCGGTGACCGTAGTCGCCCGGTGCGCTCGGCCGAGA AGCTGCACCGCCACCACCGCGACACCGTCTTGCACGCGGACCCACCCCGGATCGGTTGTTGGCCAAGGTAATTGGGTC ATTCCATTTGACGGGACGCCGACCC Clone Rv232 :::::::::::::Rv232SP6.seq::::::::::::: CATTCTTTAACAGTTGTTTTGGGCTCGGCATGGTTAGCCAACGTTCTGCGGTCCACCATATCATCTTGGTCCGGTAGC (SEQ ID NO. 245) GCTCGTCCGGGGTATGCTGCCGCCGGGATTCTCGCTGCTATTACTCCCCCCGAAGAACCGCCACCGGTCCAGCGCGTG GGCCGNCGCGGTCCCATCACAAACTGAACCCCCAACAGGGACATGCTTATCGGTAGGGCGCGCGCCAAGGCGGCAGCA ATCGCATCACTGCGCTCTGCGCGTCACTATTAACCCACCCGGACTTCACTTCCACCACCCCGAATGGCGCCCGGTCAT TGATCATCTGGCGCACCGCGGATAA :::::::::::::Rv232T7.seq::::::::::::: CGGTGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCATGCCGATGCCGCGGCCTCGTGGCCACGCATGTACAGCAC (SEQ ID NO. 246) CACGCCGCGCCCCTCACGGGCGAACATCGCCAGCGCGGCGTCCAGCTGAAGCCCGCAATCGCACCGGCGTGACCAAAC ACATCGCCGGTCAAGCACTCCGAATGCACCGGACCAGCACGTCGTCACCGTCGGCGTTGGGCCCGGCGATCTCGCCGC GGACCATGCGCGACATGTTCCACGTCCTCGTANATGCTGGTGTAGCCGATGGCGCGAAACTCCCCATGACGAGTCGGA ATCCGCGCCTCGGCGACCCGCTCAATGTGCT CloneRv233 :::::::::::::Rv233SP6.seq::::::::::::: CGGCATCTGGCGGCTGAACCTGTTCTTGGGCAACATGCCGAGGATCGCCTCTTCCACCACGCGGTCGGGGTGGCGTTG (SEQ ID NO. 247) CATTACCTCACCGATGGTGCGCTTGTGCAGGCCGCCGGGATACCCCGAGTGCCGGTAAACCATCTTGTGCTGCAGTTT GTCGCCGCTGATGGCGACCTTGTCGGCGTTGATCACGATNACNAATCACCGCCANCGACATTGGGGGCGAACGTCGGC TCGTGCTTGCCGCGCAGCAGGCTGGCCGCCGCGACGCAAGGCGCCAACCACCACGTCCGTGGCGTCGATGACGTACCA CCATCGCGTGGTGTCACCCGCCTTGGGC :::::::::::::Rv233T7.seq::::::::::::: GCGGCAAAAATTGAAGCACTCNTGGCCACTNCCGCCGGGAGGGACAATCTCGGGCGGCTAGGGCTTCTCGCGGGAAGG (SEQ ID NO. 248) CCCGAACGTACTGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCGAACATTCTGGGATGGCAGCAACCTGTTAGCAC CCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCCCCGGGCGGCTACAGTCTGAAACGCGATGACCATC GATGTGTGGACGCCGCATCCGACNCAACGGTTCCTACACTGTGATATGTTCGCCTCGCTGCGCCGGTGGACGGTGGGT CTATCCCGGA Clone Rv234 :::::::::::::Rv234SP6.seq::::::::::::: CGCGTTGAACTGAAGGGGTGCCGCCCGGCTCGAGCAGGCAAGCCATTTGTTCGATGCGGTTACCGAAGATCTCTTCGG (SEQ ID NO. 249) TGACTGCCCGCCGCCGGCCAGCTCGGCTCAGTGTCCGGCGTTGGTCGCCGCGGCGACAATCTTGGCGTCCACGGTGGT CGGGGTCATGCCCGCGAGCAGGATTGGCGAGCGGNCGGTCAGCCGGGTGAACTTCGTCAAGAGCTGACGCTGCGGTTG GGGAGGCGAATCATGGTCGGTGCGTAGCCTCGACTAGGCCCGGG :::::::::::::Rv234T7.seq::::::::::::: TGACAACGCGGCGGCGATTACCCCGCTACCGCAGCAGCATGACGCGGTAGCGAACACCGCCGGATGCAGCGCAGGTGC (SEQ ID NO. 250) GTCGATGTGCTCACGGAATCGCCCCGGCACCGCGATCTCGAGGATCACCAGTGCCACCCCCTGCAGCGCGACACCGAC GATTCCGTACACCGCCACGCCGATCAGGCCCTGGGCCAGCTGATTGGAGCTGGCGTATATGGCGGCGATGGTGACGAT GGTCATCGCCTCTTACATTGTGGCGGCCAGAACCACGGCGTTGGGGCGGCGGTCGATGAACACTAGGCGACCANATCC CCGGGGTCAACAGGTTGACCATCC Clone Rv235 :::::::::::::Rv235SP6.seq::::::::::::: CGCGGACATCCCGAACGAGGACACGCGACCGCTTCGGTGTGTGATCTATCAGGGCTCGCACCACGCGCAACCGCTTCC (SEQ ID NO. 251) GGCTACCTAGACGCGGT :::::::::::::Rv235T7.seq::::::::::::: GCATGCGGGTGATGCCGTTCTCAGTGCGCAACAGCGTTCGACGCGGCATACCCAGCCGCACATGCCGTGCACGCCGGN (SEQ ID NO. 252) GCCGGGGCGGGAATCT Clone Rv237 :::::::::::::Rv237SP6.seq::::::::::::: CTCAAGCTTCAGNCCNTCTAAGCGGTCTGCGCGGCGATCGCAAAGATCGCCCTTTGCCGGCGTTGGGGGCTTCTGCTC (SEQ ID NO. 253) GGGGGTGTTGTACACCTTCTCGAACACCTCGGCACCGACACCACCACCGTCGGCTTGAACACCGCCAACATCGGCAGC ANATCTTGATGTCCTGGTGAATCCACGGTGACTTTGGAGTGGAAGGCGGCCATACTGATCGCGCGCGCCACCACATGA GCTAGCGGCAGGAAAACCAGCAGCCGCTCACCCTTGCGCAGCAGCGTCGGGTGATATGCCTGGCGCCC :::::::::::::Rv237T7.seq::::::::::::: AGTCGAANGTCAGTCCGGTCTCCTCTCCGACTACGGCCAAGAACTGGGGCGACGGTGTCAGTGCAGAACAGCGGAAAC (SEQ ID NO. 254) TGGTGGCGCCCTAGGCGAGCGAACGCTCACAAACGGCGGTGACCGCTTCTGGTCGTGCACCATCGAGCCGTGCCCAGC CCGGCCGCGTGCCGTCAGCCGCATCCACTGGATGCCCTTCTCGGCGGTTTCAATCANGTACAGGCGACGTTCGCCACC ATCGTGCCGGGGCACGGTTAGCGAGAAACGCCGACTTCACCGATTGCCTCGGTGATGxxxxx Clone Rv23 :::::::::::::Rv23T7.seq::::::::::::: AGCTTCGCGGCGTGGCGATCGCGGTTCAAGGCGCGCTCTTCGAGCACAACGAGCGAAGACAGCTCGGCGACGGAGCCT (SEQ ID NO. 255) TTATCGACATCCGTTCGGGCTGGCTGACCGGCGGCGAAGAACTGCTGGACGCGTTGTTGTCGACGGTGCCGTGGCGAG CCGAGCGCCGTCAGATGTNCGACCGGGTGGTCGATGTGCCGCGGCTGGTGAGTTTTCACGACCTGACCATCGAAGATC CGCCGCATCCGCAGCTGGCGCGGATGCGCCGGCGGCTCAACGACATCTACGGCGGCGAACTGGGTGAGCCCTTCACCA CCGCCGGGCTGTGCTACTACCGCGACGGCTCTGACAGCGTCGCCTGGCATGGCGACACCATTGGTCGCGGCAGCACTG AGGACACTATGGTGGCGATCGTCAGCCTCGGCGCCACCCGCGTCTTCGCGCTGCGGCCGCGTGG Clone Rv240 :::::::::::::Rv240SP6.seq::::::::::::: AGCTTCAGCTGATACTCGACCAGCCCCACTCGGGCCAATACGTGAATGTCTAGCATCTTCACCCGTTCACGGGCTANT (SEQ ID NO. 256) CGAGTAGTAGACATTGATTAGCCTGAACGTACCTCCGACGCCAGCTGACGAACGGGTATGACGGATGGATTTCGTGGT GTCGCGCCCGAGGTCAATTCGTTACGGATGTATCTCGGGGCCGGATCGGGGCCGATGTTGGCGGCCGCGGCGGCCTGG GACGGACTATCCGACGAACTGGCGGTGGCGGCGTCGTGGTTTGGGTCGGTGACCTCGGGCCTGGCGGATGCGGCGTGG CGCGGCCCGCGGCGGTTGCGATGGCNCGCGCGGT :::::::::::::Rv240T7.seq::::::::::::: CTGGTCATGGACGTTGCTCCGGTAGTGGCTCACTGCCGATCCTCCTCGTTGAGAGTGCCACCTCAGGGTTGGGTAGGG (SEQ ID NO. 257) TTGGGTACTCGAAACCAAGTTACCCACCAGTAACACCGTCAAAATATATCCGTTGCATAGGTCAATGCAAGTTGATGT GAGCTACATTGCACCAACTAACTAACCAACCGGTTGGGTTAGCGGTGATCCTGGCCGTGTCGGTCCTCTCACCTGCGG TGATAGCGATCAAATGAAGAATATGCGGAGTCTAGGGCGGCAGCGCCTGGCANCGTAGATCATCGGCTCACGCGGATG CGGCCTCTTGGTACGGACATGCGCGCG Clone Rv241 :::::::::::::Rv241SP6.seq::::::::::::: CTCGTGAGTAGCACCCCTGTAATTTGGGATCGGCAAAAAGGCGAATCACCGCGTGGCCACGACACGCCGGGAGGGACN (SEQ ID NO. 258) ATCTCGGGCGGCTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCG AACATTCGGGGATGGCAGCAACCTGG :::::::::::::Rv241T7.seq::::::::::::: GGATCAACTACCGGCCAACGGTGATTCTTGGGCGCCGCTGACGCGCGAACGACCCAGCGACACATTCAGCAGATGGCC (SEQ ID NO. 259) AGCGCGTGCCGGGCCACGATGTTGGTGCTCGGCGGCTACTCCCATGGTGCGGCNCGTGATCGACATCGTCACCGCCGC ACCACTGCCGGCCTCGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGACGATCACATC Clone Rv243 :::::::::::::Rv243SP6.seq::::::::::::: AGGACCGTCAGCACGGCGACGTGCTACTCGCCGAGCAGTGGGAATCGCTCTGCAGCAAACCATTACTCTGCGCGACGT (SEQ ID NO. 260) TCGAGATGACCTTCTGAATGGACGGATCTACCTGCCGCGCGACGACCTGGACCGCGTATGCGTCCGCCTCCGCCTGGA CGACACCGGGGCACTCTATGACCCCGACGGACGGCTCGCGGTACTGCTGCGGTTCACCGCCGACGCCCGCACGGTACG CGTCGGGACTGCGCTGAGTCCANCCTCGACGCCGTAGCGCTGCTGCTGTGCGGCCATGTCTGGCATCTACCGCCGTCG CTCCCTTGA :::::::::::::Rv243T7.seq::::::::::::: CGACTCTGTTGGCCACTGCGGGTCGATCTTGCGGCCGCCCCGGTCGTGGAACGCCCAGGTCACCCCGCGGCGCACCGC (SEQ ID NO. 261) GGTCAGCGCGTCGTTGGCCAGCGTGGTCACATGGAAGTGGTCGACGACGAGCTTGGCGTTGGGCAGCAGCCCGGGCGT GCGGATCGCCGAGGCGTATGCAGCGGCGGGGTCGATGGCCACCGTACTGGATGCTCTCCCGGAACTGCGGTGTGCGCG CTTGCAGCCATGCCAGCACCGCCGCGCCGCCGCGGCCTTCATGCTGCCCATAAACCCTGATACCGGCCAGCTCGACNA ACCNGTATCCCACGGTCAACCC Clone Rv244 :::::::::::::Rv244SP6.seq::::::::::::: CACACGGACGGCGGTGCGGACGCAGCTGACGCGCATGGTGGTCAGCATCGCGGCCGGTCTGCTGTTGTATGCCTACTT (SEQ ID NO. 262) CGCGCCGCGCAAATGCTGGTGGGCGGCGGTGGTGGCGCTCGCATGGCTGGGCTGGGTGCTGACCCAACTCTCGAACCA CACCGGTGGGTGGGCTGGGCTATGGCCTGCCATATCGGCCTGGTGTTCTACN :::::::::::::Rv244T7.seq::::::::::::: CCGATATCCGAGCCGATAGCTGGCGGGCTCGGGTGGTNGCCAGCGGCGCTGCGACGAAAGTGTGACCGTCATGAAACA (SEQ ID NO. 263) GACACCACCGGCGGCCGTCGGCCGTCGTCACCTGCTCGAGATCTCAGCATCCGCAGCCGGTGTGATCGCGCTTTCGGC GTGTAGTGGGTCGCCGCCCGAGCCCGGCAAACGCCGGCCCGACACAACCCCGGAACAGGAAGTCCGGTCACCGCGCC Clone Rv245 :::::::::::::Rv245SP6.seq::::::::::::: GCTTCAGGACAAATTGNATCCCTATGCACCCGTTGTCACGCCGATGAGTGAAGACTGCACGCAATCGCCGGAATCCGG (SEQ ID NO. 264) CAAAACCCTGCACAAGCGAAATCAACCGGAGGCTGACAAGGCAACGTCGGTGATCCGTACCGCCTGGTTGGACAAACG GCAGAAGGCGCCTCGTCCGGTCCATCTACGCCGAGCACACTGGTGATAGCGCCATCGGCATCGGTGCGGCCACGGTGG AGACGAACGTCCGCNGGCGTCTGGGTCAGTAACCCGCCGACCAGTTCTCGGGCAAGCTGGTCAACATCGGGCGCCACG TCTCCAAC :::::::::::::Rv245T7.seq::::::::::::: GTTTGGCGGCCTTATTGCACTGAGGTCGTCAATTGACCCACAGCGGAAATGCCGACTATTCGCAGGCCTCCTTCGCCT (SEQ ID NO. 265) TGGCTGCCGGAGATGGGCTCCGCGGGAACCGCATGCAGGTATATGACCTCGGTTTCTCGGGTGCTACCGCGTGCCTTG TCGAGGATGAACTCGGCGTTGGAATTGTCCAGCCGGCCCAATTCATCGAGCGCAGATTCGTACACATGGCCGGCGGCG ACATACCTTCACCGTGGATCTGCTCCACACGGACCGCCCTCTCGGGATCTGCTCACGGGTAAAGGAATTA Clone Rv246 :::::::::::::Rv246SP6.seq::::::::::::: GCGCACTCCTCCTTATCGCTCCGCTCTGCATCGTCGCGGCGCGGTCAGGTGCAAACGCCTTCGGGGGTGGGGCTCCTG (SEQ ID NO. 266) CGGAGCACACCGGATACGGAGCGCAACGCGTCGCGTTGTGCGGGCAAACAAGTGTGCAGGNNCCAATGCCATGTCCAG CAGCTTATCAGTGTCGAACGTGCGAACGTCGCGCCTTCGCCGGTGCCTGAATCTCTACAAG :::::::::::::Rv246T7.seq::::::::::::: CGCTGAAAGCCACCATTCGCGGGTCGGGCGCCGGGCTCGGGCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCG (SEQ ID NO. 267) CGACACCACCCGGCTGCGCTACGTCGAGCCATACCGGGCGGAGCTACATCGGCTCGGCCGCCTAGTGTTCGGGNCCTC TTTCGAGGTCGAGGTCGA Clone Rv247 :::::::::::::Rv247SP6.seq::::::::::::: TGTAATTTGGGATGGGCAAAAAGCAAANCACCGCGTGGCCACAAACGCGGGGAGGGACAATCTCGGGCGGCTAGGGCT (SEQ ID NO. 268) TCTCGCGGGAAGCCCGAAACGTACGGCGTTTCAACACGTCGCGTCGCCTCCGACGCGAAATTCGGG :::::::::::::Rv247T7.seq::::::::::::: CTTGGGCAACATGCTGAGGATCGCCTTTTCACCACGCGGTCGGGGTGGCGTTGCATTAGCTCACCGATGGTGCGCTTG (SEQ ID NO. 269) TTGCAGGCCGCCGGGATACCCGAGTGCCGGTAAACCATCTTGTGCTGCAGTTTGTCCCCCTGATGGCGACCTTGTCGC GTTGATCACGATGACGAAGTCACCGCCATCGACATTGGGGGCGAACTCGGCTTGTGCTTG Clone Rv249 :::::::::::::Rv249SP6.seq::::::::::::: GCATGCTTCATTATCTAATCTCCAGCCGTGGTTTAATCAGACGATCGAAAATTCATGCAGACGGTCCCAAATAGAAAG (SEQ ID NO. 270) ACATTCTCCAGGCACCAGTTGAAGAGGTTGATCAATGGTCTGTTCAAAAACAAGTTCTCATCCGGATTGAACTTTACC AACTTCATCCGTTTCATGTACAACATTTTTAGAANCATGCTTC Clone Rv24 :::::::::::::Rv24SP6.seq::::::::::::: ATACTCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCAGCCACCACGCGCGGGTCGGGCGCCGGGCCCGG (SEQ ID NO. 271) GCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTCCGCTACGTCTATCCATACCGGGCG GAGCTACATCGGCTCGGCCGCCCATTGTTCNGGCCCTCTTTCGAGGTCGAGGTCTATACCGATTTGCGCATCCG :::::::::::::Rv24T7.seq::::::::::::: TCCGTACTGGTCGGGTACGCTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGACCTCGTCGGCATCTTCCATA (SEQ ID NO. 272) GCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTCGGCATTGGTCATCGGGATA TGCCGCTCGGGACGGTCAGAACCTCGGGTCCG Clone Rv251 :::::::::::::Rv251SP6.seq::::::::::::: GTTCTCGCACGATTTCGGATTAGCGGGATGGTCTCAATTGGGTATGCGGGGAAGGCGCTGACATTCGCCGCGATTAGC (SEQ ID NO. 273) TGTTTGATGGACCGGGGGTGATTTTTGATCACGGAAATGGGTGTTTATNCAGGTCGCACGCTTTCATCCGGGGCGGAA CG :::::::::::::Rv251T7.seq::::::::::::: GGGTGTGCCTGCTGTGTATGCACGGCATACGGACATCCTTCCCCTGAAGACCCGCGGTCGAACAGCCACGTGTCCATC (SEQ ID NO. 274) ATCANGGGGTCAACCCCGGCCAAGGGCGACGGCACGCCAAGTTCGCCGACCGTTAACCTAGTGCTGTTAACTTCATTT GCTGCGAGCAAAACAGCTGGTCGGNCGTTAGGAATGAATTGAAACTCAACCGATTTGGTGCCGCCGTAGGTGTCCTGG CTG Clone Rv252 :::::::::::::Rv252T7.seq::::::::::::: ACTACCCGGCCAACGGTGATNTCTTGGCCGCCGCTGACNGCGCGAACGACGCCAGCGACCACATTCAGCAGATGGCCA (SEQ ID NO. 275) GCGCGTGCCGGGCCACGANGTTGGTGCTCGGCGGCTACTCCCANGGTGCGGNCGTGATCGACATCNTCACCGCCGCAC CACTGCCCGGCCTCGGGTTCACCAGCCGTTGCCGCCCGCAGCGGACGATCACATCGCTTTTATTTNNTNTTCNGGAAT CCCTCGGGCCGCGCTGGCGGGCTGATGA Clone Rv253 :::::::::::::Rv253SP6.seq::::::::::::: ACGTCGGGANACTGTTCGCGTTCATCCTCGTCTCGGCGGATTGGTCTGCTGCGCCGGACCGACCGATCTTCAGCGGGG (SEQ ID NO. 276) GGTCACGCTCCGTGGGGTGCCGTTACTTCCGATCGCCCAGTGTGCGCGTGCTGTGGCTGATGCTGAACCTCACCGCGT TGANTTGGATCGGTTCGGGATCTGGCTGGTGGCCGGAACGCNATTTATGTCGCTACGGGCGCCGGC :::::::::::::Rv253T7.seq::::::::::::: GCTCAAAGGCACTACTGGCACCAAGGCCCACACGTCACCTGTGACTCCTGCGCCGACCCGCCCGAGGTCTGGCCGTTA (SEQ ID NO. 277) CACCGAACGGGCGAGCCGGGAGTTGGTACCATCGAACAAGACAAGGTGCATGGGCGGAGTTGTTCCGCCACTTCGTCG ATGACGGGTC Clone Rv254 :::::::::::::Rv254SP6.seq::::::::::::: CGATACCGGCTGCTTACCGAGACATCCACCATGCCACCCGAATCACCGCACGCGCCGAAATCGCACAACAGCTTGACG (SEQ ID NO. 278) CCTTGCAGGTTCCGCGATTGGAATTGCCGACGGTCTCTGACGGCGTCGACCTTGGCAGCCTCTACGAGCTCTCGGAAT CACTTGCCCAGCAGGGGGTTCGATGAGTGTCACACCGAAGACCTCGATATGGGCGCAATCCTGGCCGACACATCCAAC CGGGTGGTTGTGTGCTGCGGCGCCGGTGGGGTCNGCAANACACTACCGCGGCCGCGCTGGCGTTGCGCGCGGCCGAAT ATGGCCGCACTGTGGTCG :::::::::::::Rv254T7.seq::::::::::::: CGTCGTCGTCGTGGTATGCGATAGCCATCCCGTCGGGCTACTCGCCATCACCGATCAGCTTCGCCCCGAAGCCGCCGC (SEQ ID NO. 279) GGCGATTTCCGCTGCGACCAAACTGACCGGGGCCAAACCGGTATTGCTTACCGGCGACAACCGGGCCACCGCCGATCG GCTCGGTGTACANGTTGGCATCGACGACGTACGGGCCGGGCTACTGCCGACGACAANGTCGCAGCCGTGCNGCNGCTG CAAGCTGGAGGTGCCAGATTGACCGTGGTCGGTGACGGTATCAACGACCTCCGGCCTTAGCGGCCGCGCATGTCGCAT CGCCATGGGCAGCGCCCGAC Clone Rv255 :::::::::::::Rv255SP6.seq::::::::::::: GCACGCAATCGAAGTCACCCAAACCGGGCGGGCCAGGCGTCTNACGCCACGTCNACCAGCCGCAACCTCAACCCGGCC (SEQ ID NO. 280) ACGGCGAGCTCCTGATCAAGGCCGAGGCCATCGGTGTCTACTTCATCGACACCTACTTCCGCTCCGGGCAATATCCGC GCGAACTCCCGTTCGTCATCTGCTCCGAAGTATGCGGCACGGTGGANGCCGTCGGCCAGGGGTTAC :::::::::::::Rv255T7.seq::::::::::::: TCGACTGTGTGGCCACAGATCACGCCCCGCATGCCGAGCACGAGAAATGCGTCGAATTCGCCGCGGGCCGGCCGGCAT (SEQ ID NO. 281) GCTCGGGTTGCAGACGGGATTGTCGGTGGTGGTGCATACAATGGTGGCGCCGGCTTGTTGANTTNGGCGCGATATCGC GCGGGTGATGAGTGANAACCGGCGTGCA Clone Rv257 :::::::::::::Rv257SP6.seq::::::::::::: GAACCTGACACCCTGGTCACGGGTGAGCACGGACTTGATTTCTTCNCTATTGGTCGGCGCTGTTGAGCACACCACGCC (SEQ ID NO. 282) GCTGACGGCCGTCGCGTCCTCGCTGTGCTCGGTCTGGTGGAGCGCGCTGCCCGCGGCCNAACATCNTAAATCAAGCGT ATTCGTCAACAGATATCATCAATGTCGGCGCTGGACTATTCAAATCATCGATATACTGGTGACCTGGTCCTTCGCCAT CGATCAATGGCGATAGTCACGCAAATCGTCACGGACATCGTCGGCGTCCCAGCTGGCCCGTGCCAACAGATGCTGCAA CCCATCGGGGTGGTATCACCGCGGTGCTCGGCGATGGTCCACAATTCTTGCGGTCCAAGCCCNAAACATCCCGGGCAT GAATTCACCGGCATGCGCN :::::::::::::Rv257T7.seq::::::::::::: CTATCGTACCGCGCCGGTCACCTTCTGGATATCGCCGGCCTGGTCAAGGGGGGCGTCCGAGGGAGCCGGGCTGGGTNA (SEQ ID NO. 283) CAAGTTCCTGGCTCATATCCGCGAATGCGACGCCATTTGTCAGGTGGTGCGGGTGTTCGTCGACGACGACGTGACTCA TGTCACCGGACGGGTCGATCCCCAGTCCGACATTGAGGTCGTCGAGACCGAGCTGATCCTGGCAGATCTGCAAACCCT GGAGCGGGCCACGGGCCGGCTGGAGAATGAAGCGCGCACCAACAAGGCGCGCAAGCCGGTCTACGAAGCGGCACTGCG TGCCCAGCANGTGCTCGACGCCGGGCAAGACGCTGTTCGCCGCGGGGGTGGATGCCGCCGCGTTGCGCGACTGAAACT GCTGACCACCAAGCCCTTCCTGT Clone Rv258 :::::::::::::Rv258SP6.seq::::::::::::: TACTCAAGCTTCAGGCCGCCACGTCCGCCGTCCGTCGGCGACGTGACCTCGAGCGCCGAGTTCGACTCGACATCGCCG (SEQ ID NO. 284) CCGGCGCATGCCGACATGAACGCGGCACTCACCGCAAGCCCGTCGGACGTCAGGTCGATCGACTCCGCTTCAAGCACC GGATCGTCCGGGCAACTCGCGGCCTCGGCCTGTGCGAACGGCACACCCGTCGTGGCGGCNCCCCGCGCGGAACTGGGC TCATCACGGTCGTTGCGAGCCGGTCGCGTCACCGCGTACCGACGCCGTC :::::::::::::Rv258T7.seq::::::::::::: CCGACATCGAGTGGGCTCGCAGTGACTTGGCGACCTCCAAGCCACCGGTACCCGCCGCGCGGCAAGCCAAGGACGACG (SEQ ID NO. 285) ACGGCCTTGCCGGATAGCTGCGCCAGGCGTTGCGCCAACTGGCGTCCAGCGTCGCCACGATCGTCAAAGAGCTTCATC TGCCGAGTGTGTCGCCATCTCATGGCTCCAAATATGGAATTAGGTCCCTGGGCCGACTGACGACAGTCCCTCAGCGAC CGGATTGCGCATCCCGCCTTGTACGCTACTCCGCAAATCCCGGGCTTGCGTCCGCGGAAGCGAACTCGGCGGCGCTAC GTGGTGGTTCACTTCGGCCGTGCGCACTCGGATCGACGGGCCGATGGTGGCCGGGCCCGCGCGCTTCTTGGTCATCCG ATTGAGT Clone Rv259 :::::::::::::Rv259SP6.seq::::::::::::: ATACTCAAGCTTGTCGCGGTAAACCGCACGCAGGGCGGTGGGTGCGGTGTCAAAGACACCCACACTTCTTTGCGGTTC (SEQ ID NO. 286) GGTGATCTCGACACCGGCCGCGAGCCGACCACCATGCGCGCGTAGATCGGCGATCAGCGCGTCGGCTATCGCCTGGGT GCCGCCCACCGGAATCGGCCAGCCGACCGAATGGGCCAGCGTTGCCAGCATCAGTCCGGCGCCGGCCGACACCAGTGA CGGCAACGGTGAAATCGCGTGGGCGGCAACGCCGGTGAACAACGCGCGGGCATCCTCGCCCGCCAACGACCGCCAGGC AGGGTGCCTGGGCCATCATCCGCAGCCCGA :::::::::::::Rv259T7.seq::::::::::::: TGGACTCATAACGATCGGGTCAGCGACGCGCCAACACGAACGGCCGGACGAGTGGGCCAGGGTCGCGCCTCCCCTACA (SEQ ID NO. 287) AACAGGATCCGTTGCCTGCGAGCGACAGGCTCCGGTGCGGCGTTGGGCGCCGTGCTCGTCCCAGCGTCCGGTCCCGGG TCGCCGGCGACGCTTGTTTCCTCCATACTCGCCCCCTAATCTCGAGGCAGCCCGTACCCGCAGGCAACCTCCCAAAAA TGCAATCCCCCAAAATGCAATGCGTCGAGCTATTTCTCACACCGACCGCTAGTTGCGGATCAGAAATCCGTTGGGCGC GGAAGTCCAGCCGAATTTGTTCTCCCGCTCCGCATCATGCTTGTAATCGTTTGGAAATCATCCTCATATGCCTCGATC GCTTCATAGGTCAAGCCCAAACCCGGCAGGATGGGTGGCC Clone Rv25 :::::::::::::Rv25SP6.seq::::::::::::: CTTTACACTTTATGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATG (SEQ ID NO. 288) ACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTAGTGGTTGCGCACGTAAATTCGTCAGGT GACCGATCCCCTGCTGTCTCACTCGCCTCACAGCGACCACCACGGCTGGCGCTCAAGGCGGGCACGTGCGGAGCAGAT GAGGAATGTGCGACGTCTTGATGCAGCCTGTCAGAACACCGAGACCCTCGACGAACTTACGATCGAAACCGCTTAGGC CAACCGGTGACGGGGGTGTCTTTCCGCGGCTAGGGCGCCTTATCGTCCGAAGGCCGTGGGTGGTGATCGCCTTCTGGG TCGCGCTTGCGGGTCTGCTTGCGCCGACGGTGCCGTCCCTGGACCGATCTCCCAGCGGCATCCAGTGGCGATTCTGCC ATCGG :::::::::::::Rv25T7.seq::::::::::::: CAGGCATGCAAGCTTGCGATGTATCAACACGCCGTTGCGCAGCGTGAGCCGATAGTTGACATCCGGCTCGGTGAAGGT (SEQ ID NO. 289) GAAATCGATGGCCAGGTCGAGGTCCCATGCGCGTGGGCCATTGATGCTGATCGCCAGGACGTCAAAGATTTGGTCCGG CGTCAGCTGGGCGAAAAACGTGGGCGCCGGGACTTGCCCGGAGCTGCCCGGGTTCCCGTCGCGCAGCTCGGCGGCCCC GGTCAGAAAGAAATTGCGCCAGGTCGCACACTCCGCGCCGTAGGCCAGCTGCTCCACGGTGTCGGCATATAGCCCGCG GGCCGCAGCGTGCTCGCTGTCGGCGAACACCGCATGGTCGAGAAGCGTTGCCGCCCAACGGAAATCACTGCGTCAAAG CTTCGCCGGGCCACTCCAGCACTCCGTC Clone Rv260 :::::::::::::Rv260SP6.seq::::::::::::: ATACTCAAGCTTGACCGACGCTGATCGCACCGCACGCGGGAACCTCAAGGGCACTACTGGCACAAGGGCCCACACGTC (SEQ ID NO. 290) AACCTGTTAACTCCTGCGCCGACCCCGGCCGAAGTCCTTGGCGTTAACACCGAACGGGCCAACCCGGGAATTTGGGTT CCATCAAAACAAATAGCAGGTGCCTGGGCGGAGTGTTC :::::::::::::Rv260T7.seq::::::::::::: GTCGTCGTGTGCTGGGGCGTCCGTATCAGCACGCCCACGAAATGGGGCACAAGAAGGATTCCTGGAACGGTGGCTGTC (SEQ ID NO. 291) CAAGATCACCCTCGCCCAAAACTGCTACGGGCACTTCTACATCGAGCACAACCGTGGCCATCACGTCCGCGGTGTCCA CACCGGGAGG Clone Rv261 :::::::::::::Rv261SP6w.seq::::::::::::: ATATGCCTTGCTGAGCTTTTCGGATCGCAGCGAGTCGTACCCGCGCCGGTCACCTTCGTGGATATCGCCGGCCTGGTC (SEQ ID NO. 292) AAGGGGGCGTCCGAGGGAGCCGGGCTGGGTAACAAGTTCCTGGCTCATATCCGCGAATGCGACGCCATTTGTCAGGTG GTGCGGGTGTTCGTCGACAACGACGTGACTCATGTCACCGGACGGGTCGATCCCCAGTCCGACATTGAGGTCGTCGAG ACCGAGCTGATCCTGGCAGATCTGCAAGCCCTGGAGCGGGCCACGGGGCGGCTNGAA :::::::::::::Rv261T7.seq::::::::::::: GACACCCTGGTCACGGGTGAGCAGGACTCGATTTCTTCGCTATTGGTCGGCGCTGTTGAGGCACAGCACGCCGCTGAG (SEQ ID NO. 293) GCCGTCGCGTCCTCGCTGTGCTCGGTCTGGTGGAGCGCGCTGCCCGCGGCCGAACATCGTAAATCAAGCGTATTCGTC AACAGATATCATCAATGTCGGCGCTGGACTATTCAAATCATCGATATACTGGTGACCTGGTCCTTCGCCATCGATCAA TGGCGATAGTCACGCAGATCGTCACGGACATCGTCTGCGTCCCAGCTGGCCCGTGCCAACAGATGCTGCAACCCATCG GGGTGGTATCNCCGCGGTGCTCGGCGATGGTCCAACAATTCTTGCGGTCCAAGCCCGAAACCATCCGGCCATGAGTTC ACCGGCATGGCGCAACGGCTGGTGCCGGGCAAAACGCGGCGCGATCGAATTC Clone Rv262 :::::::::::::Rv262SP6.seq::::::::::::: TGTAGAAGGTGGGTCCCGTCCAACTTCGCGGCGGCGGCGCGATATGCCTTGCTGGTCTTGCTCATTTGATATCCAATC (SEQ ID NO. 294) TATGGGTCGTGGTTACTCAACGGGCCGAAGCTGGCCCTCCCACGGGTAGGGTCCTATTCGACGGTGATGTCC :::::::::::::Rv262T7.seq::::::::::::: CCCGAATCCGGTGGCCGGCAGGGGGCCTGGCGACGTGGACACCTTCTAACTTGTCTTTACCGGTCACTGTTGCACCCC (SEQ ID NO. 295) AACACCTTTAACGACGTGGACGGACGTTACATCGGATTCGACGGTGTCATCCACAGCGTTGCCATTGGGCACACCCAC TACGCCAATTTCTCCGACTGGGACACCTACCGCAGCCTCGCCCCACTGCAGGGACTGTTGTTCCCGCAACGGGCCATC GACATGATCCAGTCGTTGGTGACCGACGCGGAGCAGACTGGTGCGTATCCGCGTTGGGCGCTGGCGAAATTCCGCCAC CGGCATGAT Clone Rv263 :::::::::::::Rv263SP6.seq::::::::::::: TTGAGATGCTGGTCGGGATGCCGATGGTTGGAACATGGTCCCCTGGCCTCGAATACGCGCGAGCGCATGAGCTCACCG (SEQ ID NO. 296) GTTCGGAACAACGTATCGAAGAACTCGCACTGCTGGCAGATGGTATCTCCGATGTGGTTGTAATTTGTATCCCAACTC TAACTGTGCTATCGGATCTGCGTGAATA :::::::::::::Rv263T7.seq::::::::::::: CGTAATCACGATCCCGCTGAGACACTTGACCTTACGGCCGAAGTGACTTCGCTGCTGCTATGCCGACACCCGATTTCC (SEQ ID NO. 297) ATACGCTGCTGTACACGACGGCCGGGCCGGTGGCCTCCATCACGCTCAACCGCCCGGAACAGCTCAACACCATCGTCC CGCCCATGCCCGACGAGATCGAGGCCGCTATCGGGTTGGTCGAACGCGACCAGGACATCAAGGTCATCNTNCTGCGCG GTGGCGGGCGCGCCTTCTCCGGCGG Clone Rv264 :::::::::::::Rv264SP6.seq::::::::::::: CAAGCTTAAGCTGGTTCCGGCCACTCCATGAGCCGTAGTGCAATGGTTCGTGCACGGCGAGGCCGAACTTGCCATAAA (SEQ ID NO. 298) CATCCCTGACGAAAGTCTCCGGCAAGCCGATTGCTTCTTCGGGCCGCTTCTTGTGGATTGTCCGATAACCCGGTCCCT CATGCTGGAAGTTGTGCGCACTCTTTCCTTCCGCGATGTGGGCTAACGACTCGTCATTGAGCAAGAAGTACGTGCACA GGCATCGTCCGCCGGGCTTCAGCACGCGGGAGATCTCGTCCAGATAGTGCTCCACGTCCGGNGGGAAACATGTGGGTG AACACCGAGGTNAGAAACACCNCATCCAACGACGCATCCGGGATATGGAAAGCGAAA :::::::::::::Rv264T7.seq::::::::::::: TATGGTCTTCGTCGACCAGTACGTCGTAGGCGCCATGAGCCAGCGACTGAAGCCGCGCCATGCCTGCACGGCCCGCTC (SEQ ID NO. 299) ATCCAGCGAGGCGGCCATCTCCCGCAGATAGCCTGCCGCCTCGGCGCGCACGCTGTCCGGATCGCGTCCGAGCTCGTC GGCCAGCGCACGCAGCCGCTCGTCATACCATCGGGCATCCAGCAGTTGGGTAACCTCAACGGGGTCGGTCGCTAGCGG CGTCATTGATTCAGCAACAATACCGATGCGCTGCAGCAACTTTCGCAGTCCGATGCGGCCCACCTCCCGTGCAGTCAC TGGCTAGCCCCCGTCATGCCGGTTGTGTCGATGGCACGGCAGCGGGCTCGTAAACCTGCGGTCTCAGCTCGCTGG Clone Rv265 :::::::::::::Rv265SP6.seq::::::::::::: GCTTAGCGGTCTTGCTCGAACCGACATTGCGTGCCACTCATGAGCGGGTGGCGGTCGCGGTGCTTACACATCT (SEQ ID NO. 300) :::::::::::::Rv265T7.seq::::::::::::: GTATCTGGCGCCTCTCGAATATCCTTGAACGTCCCGCGGTGCCACCCAGATAGATCGCAGCGCCCTGCAATGGAGTTC (SEQ ID NO. 301) CCTTTATGGCCTCTCTAGCCTCCCGCTTGATCGGCTCGACCCGAGAGATGCCCTCGGGCGTTGCGGGATCTCCCTCCA Clone Rv266 :::::::::::::Rv266SP6.seq::::::::::::: CTTCACGCCGATCCGCGACCGCGAACGCGACGGTGACGGTGGGCGACAAGGTTCGGTTGGTCGCCGCGGCGCTGGGCG (SEQ ID NO. 302) ATATCAGCTCACCCGGTTTCGAGGTGTTCGGCGACCGGACGGTGCTGCAGACATTCTTGAGCGTCCTCGACCGGCCCG ATTCGGCCTTCAACATCGTGACGCCGTATTTCGGCGGTACCGCTCGGCGCCGAGTCGAAGGCGGCCTGAGCTAAAGCC GGGCATTGGGCGAGTGGTAAACAAGTTCGGTGACTTCGGTTGACCGACTCGACGGGCTCGATCTGGGCGCCCTGGACC GGTATCTGCGTTCGCTGGGGATCGGGCCNACCGCNANTTGCGTTGCGANCTGATTCCGGTGGAGCTCCAATCTGACTT CCGG :::::::::::::Rv266T7.seq::::::::::::: GCAGCTACCGACCCTAGCGACGAGTGTGTTCGCAGCGTCGAATGTGAACGTTCGGCGTGATTCGGCGCGCGGGTTCCC (SEQ ID NO. 303) GCTCTCAGCGCACGTTCGGCGCCGAGGNGGCTAGTCCCTGGTTAAGCAATGTCTCGGTCGCCGCCAGCAGCGCGCATG TCGCCAACCCGTCNACCGCGTTGCGCATGTCCGGTACCGACGGAAACGACGGCGCGATCCGGATGTTCTTGTCGTCCG GATCCTTTCGATACGGGAACGACCCCCCGCCTCGGTCACCGCGATACCAACGTCCTTACCCAANGCTACNGTCCGGCG CGCGGTCCCGGGCAACACGTCGAAGCTGATGAANTAACCACCCTTGGGCTCGGTCCAAGANGCGATCTTGGACTCCTT AACCGCTGATNCAA Clone Rv267 :::::::::::::Rv267IS1081N60.seq::::::::::::: TCCCCATCGGCGCCGGACCGTTTGAAAGTCCAAGCACGGGTGGGATGGAATCGACGACAGTTGAGCGCCGTCGGTGGC (SEQ ID NO. 304) CGTGGTCAGCAGCTGTTCGCGAACGCACCAGGTCACATCCCTTCGACATCTCACCGACGTGGCACGGGCGACATCAAC AGGAAGATTGACGAATCCCTCGCAGGCGCGGCACGTCCGCAGGCCAACGCCAACTACGGGGCCACCAGCGATCCTCCG CTCACGCACCAGCCCAAGCCAGGCTCANCCACCCAAGTCGGCCCGCGCTCTCCCTCGCCCCCTGGTCTCCGGGGCCTT GTTAAACAACTACCGGAAGTCCACCAATCCTCGCTGCATCTCGACACCGTCCGCCTCACTCCCTTCCTCCCGCCCCTC TCCACACNACACACCTCTTGCATTAAGGTCACGGAGCGGTCACTTTTCGTCGGACGAAATTCGCAATCCGGCCGCTCG CCGCCAGAGAT :::::::::::::Rv267SP6.seq::::::::::::: CGGAAAGTGGATACTCCCAGCAGGTAGCAGGTCGCCACCACGCTGGTCAGTGCGCGTTCAGCTCGCTTGCGGCGCTGC (SEQ ID NO. 305) AGCAGCCAGTCCGGGAAATAGCTGCCCTGGCGCAGCTTGGGGATCGCGACGTCGATGGTTGCGGCACGGGTGTCGCAA ATCACGGTGGCGGTAGCCGTTGCGCTGATTGGACCGCTCATCGCTGCGTTCGCGGTAGCCCGCCCCGCACAGGGCGTC GGCTTCAGCCCCCATCAAGGCGGCGA :::::::::::::Rv267T7.seq::::::::::::: GGCCGAGTCCAGCACTTCGCACTATGTGCAGACCAAANACCCGGTGGTCGCCGCGCTGCGGCAGCGGCTGGCAACGGC (SEQ ID NO. 306) GCCGGTGATCACCGAGTGGTGCGNAGTTGCCGACCGGCAGTTCGCCGCGGGCTTACTACGAGAAGGGCCTGCGCGACG TCATCAGGTATCACGTGTCGATGACGTCGAGCGTTAACTTCCCCGACCAGACGGCGACCTCGCCGATGGACCCCGCGT TGTACCTGGTGTGGGCGCAAGCTAACGCCGCCGCANGCTATCGGTACTCGGTCGAAGCGCAGCCGGGGTCGCAAGCGC TAGCGGGCAAGGTCGCGACGATCTCGGTCACCTGGACCAACTACGGCGCTGCTGCCGCCACCGAATAGTGNGTGCCCG GCTACCGGCTGGTGGATTCCACGGGACATGTGGTTCGGACCTGCCGGCAGCGGTGGAACTGAAGANGCTGGTCT Clone Rv268 :::::::::::::Rv268SP6.seq::::::::::::: AGCTTCAAGGACATCGTCATCGCGACCAAAACCGCGAGCTAGGTCGGCATCCGGGAAGCATCGCGACACCGTGGCGCC (SEQ ID NO. 307) GAGCGCCGCTGCCGGCAGGCCGATTAGGCGGGCAGATTAGCCCGCCGCGGCTCCCGGCTCCGATTACGGCGCCCCGAA TGGCGTCACCGGCTGGTAACCACGCTTGCGCGCCTGGGCGGCGGCCTGCCGGATCAGGTGGTATATGCCGACAAAGCC TGCGTGATCGGTCATCACCAACGGTGACAGCAGCCGGTTGTGCACCATCGCNAACGCCACCCCGGTCTCCGGGTCTGT CAN :::::::::::::Rv268T7.seq::::::::::::: GCTCGCGGTCCAGCAGCAGACGTGTCTGACCCCGACGCCCGGCCGCCGGTACCGAAACCGGATCGGCCCGCCGATGGC (SEQ ID NO. 308) CGCGGCCACGGCGTCTGCCTTACCCGGCCCGGATACCAGCAGCCACACCTCGCGGGAACGCTGAATCGCCGGCAGGGT CAAGGTGATTCGGCGTGGCGGCGGTTTCGCGAATCGTCCACCGCCACCACCATGCGGGTGCTCTCGAAGACGCGGGGC TGTGCGGGAACAGCGAGTTAATGTGGCCCTCGGGCCCCATGCCCAGCAGGTGGACGTCGAAATTCGGCCCGGGTCACC TGGTGCGGCACTGGCGGCC Clone Rv269 :::::::::::::Rv269SP6.seq::::::::::::: AGCTTGTCGATCGTCCGGCAGCGTCCGGCGAGTCAAGTCGAAGCCAGTCCGGTCTCCTCTCCGACTACGGCCAAGAAC (SEQ ID NO. 309) TGGGCGACGGTGTCAGTGCATACCAGCGGANACTGGTGGCGCCCTAGGCGAGCGACCGCCTCACAAACGGCGGTGACC GCGTTCTGGTCGTGCACCATCGAGCCGTGCCCATCCCGGCCGCGTGCCGTCAGCCGCATCCACTGGATGCCCTTCTCG GCGGTTTCAATCAGGTACAGGCGACGTTCGCCANCATCGTGCCGGGGCANGG :::::::::::::Rv269T7.seq::::::::::::: TTGGTGATCATCGNCCCAACGACCCCGAGGCGATGTTCTTGCACACCGAGGAGTGTCGCAAGCTGGGGCTGGCCTTCG (SEQ ID NO. 310) CCGCCGATCCGTCTCAGCAGCTGGCGAAGCTGTCGGGGTGAGGAAATTCGCAGGCTCGTCAACGGTGCTGCTTACTTG TTCACCAACGACTACTAATGGGATCTGCTGCTGTCCAAGACCGGCTGGTCAGANGCCGATGTGATGGCGCAGATCGAC CTGCGGGTGACCACATTGGGTCCTAAGGGTGTCCATTTGGTAGAACCTGACGCACCACCATCCACGTCGGCGTTGGTC CCCGAAACAGCCAGACCGA Clone Rv26 :::::::::::::Rv26SP6.seq::::::::::::: GGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACGCCAAGCT (SEQ ID NO. 311) ATTTAGGTGACACTATAGAATACTCAAGCTTGATTTTGATCATCATGATGATCATCACCCGAAGTGTGGTAGCCGCAG TGGTTATCGTGGGTACCGTCGTGCTTTCCATGGGCGCCTCTTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGG GTATCGAGTTGTACTGGATGGTGTTGGCGATGTCGGTGATCCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGC TGATTTCCCGGTTGAAAGAGGAAATTGGGGCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAG TGGTGACGGCTGCCGGCATGGTGTTCGCCGTTACCATGTCGTTGTTTGTGTTCAGCGATTTGCGAATT :::::::::::::Rv26T7.seq::::::::::::: CAGGCATGCAAGCTTGGCGTGCCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTC (SEQ ID NO. 312) AACGACGACGTCGTCCGCGGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTA CAACGCCGCGCGGAACGCTTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGAC GGCATCGCCACCGGAGCGACGGCCAAGGCGGCGTGCCAGGTCNCCCGGGCGCACG Clone Rv270 :::::::::::::Rv270SP6.seq::::::::::::: GGCATCTTGGCCGCCATGTTAGCCACACTGCCACCGGCTATAGAAGCGATGCGCACCGTCCTGCCAGCACATTGCGGC (SEQ ID NO. 313) GCTCCTCCCTGGAAAGCAAGATAACCAAGCTCATGCCGTGGTTGTGGGTGGCGTGGTTTGGTTTGGGTAACTTTGG :::::::::::::Rv270T7.seq::::::::::::: TCGGCTAATAATCGTCGACGCCGGCCTCCTCTGCAATCGCCTTGGCGGTCGCCGGGTTGTCACCGGTGATCATCACGG (SEQ ID NO. 314) TGCGGATGCTCATTCGGCGCATTTCGTCGAATCGTTCCCGTATGCCCACCTTGACGATGTCCTTCAGATGGACGACGC CGATGGCCCGCGCGCTGCTGTTATCGGTCCATTCCGCAACGACTAGGGGTGTCCCCCGCCGGAGCTGATGCCGTCGAC AATGGCACCCACCTCCTCGGTGGGGTGGGCACCGTGATCGCGAACCCACTTCATCACCGCAGCCGCGGCACCTTGCGG ATTCGACGGATG Clone Rv271 :::::::::::::Rv271SP6.seq::::::::::::: CTCAAGCTTGGAGGCGTGGCGATCGCGGTCCAAGGCGCGCTCTCCGAGCACAACGAGCGAAGACNGCTCGGCGACGGA (SEQ ID NO. 315) GCCTTTATCGACNTCCGTTCGGGCTGGCTGACGGCGGCNAAATAATGCTGGACTCGTTGTTGTCGACGGTGCCGTGGC GAGCCGAGCGCCGTCAGATGTACGACCGGGTGGTCTATGTGCCGCGGTTGGTGAGTTTCCACGACCTGACCATCGAAG ATCCGCCGCATCCGCTGCTGGCGCGGATGCGCCGGTGGCTCAACTAATTCTACGGCGGCGAACTGGGTNATCCCTTCN CCACCGTCGG :::::::::::::Rv271T7.seq::::::::::::: CCTAGGTCAACCGTACCGTCATCGGATCGGGGTCGACCGCACAGATGGACTGGAGCTTCGGCGAGGTCATCGCCTATG (SEQ ID NO. 316) CCTCGCGGGGGGTGACGCTGACCCCGGGTGACGTGTTCGGCTCGGGCACGGTGCCCACCTGCACGCTCGTCGAAGCAC CTCAGGCCACCGGAAATCATTCCCGGGCTGGCTGCACGACTGCGACGTGGTCACCCTCCAGGTCGAAGGGCTGGGCGA GACGATGCAGACCGTCCGGACGAGCGGCACTCCTTTTCCGTTGGCTCTTCGGCCGAATCCGGACGCCGAACCCGACCG GCGCGGGGTCAACCCGGCACCGACGCGGGTGCCGTTTACCCGCGGGCTGCACAAATCCCGACGGGTATGGGCTTTGAC CTGCCGACGGGGGA Clone Rv272 :::::::::::::Rv272SP6.seq::::::::::::: AGCTTGGCGTGACACCAACACAGGGCACTTAAGATGGCAATGCGCCGCCTACCTGCACGTTTTCGCGATGTCAGAGGA (SEQ ID NO. 317) TGCCGAGGGGAGAACAATGCGAGCACGGCCGCTGACGTTGCTCACCGCTTTGGCGGCGGTGACATTGGTGGTGGTTGC GGGCTGCGAGGCCCGAGTCTAGGCCGAAGCATATAGCGCGGCCGACCGCATTTCGTCTCGACCGCAAGCGCGACCTCA GCCGCAGCCGGTGGAGCTACTGCTGCGCGCCATCACGCCGCCTAGGGCTCCGGCGGCGTCGCCGAACGTCGGGTTTGG CGAACTGCCTACCCGGGTCCGGCAGGCAACCGAT :::::::::::::Rv272T7.seq::::::::::::: TCATGCCGTTGGACCGACCATCGGAGTTAGTTGCCGAACCGCGGGACCACCGCAAGCACCCGGTCCTGGTCGCGCACC (SEQ ID NO. 318) GCGTCGGCCAACCGCTTGAGCACCACCACGCCGCAGCCCTCGCCGCGCACGAATCCATCCGCGTTGGCGTCGAAGCTG TTGCATCGGCCGGTCGGTGACAGCGCCGACCACTTGGACAGCGCGATGGCGGTGAACGGTGACAAGGTGAGCTGCACC CCGCCCGCCAATGCGACGTCGGTTTCACGCAGGCGAAGCTCTGACACGCGAAGTGAATTGCCACCAGCGACGACGAAC AAGCGGTATCTACGGCGATGG Clone Rv273 :::::::::::::Rv273SP6.seq::::::::::::: GGGTCGACTTTCTGCAAGGCGAGGCTACACCGTCGTCGTCGTGGTATGCGATAGCCATCCCGTCGGGCTACTCGCCAT (SEQ ID NO. 319) CACCGATCAGCTTCGCCCCGAAGCCGCCGTGGTGATTTCCGCTGCGACCAAACTGAACGGGGCCAAACCGGTATTGCT TACCGGCGACAACCGGGCCACCGCCGATCGGCTCGGTGTTCAGGTTGGCAT :::::::::::::Rv273T7.seq::::::::::::: AATCCGAAATCCTGACCGATACTTGAACCTGGTCTCGTTCGGCAATAACTCGTCGGCGTGCAGGACCCGGCGCAAACG (SEQ ID NO. 320) TACTTCGGCATCAACGCGTCCGACCTGAATTGGCAGCAAGCGGCGCTGCTGGCCGGCATGGTGCAATCTAACAGCACG CTCTTCCCGTACACCAACCCCGACGGCGCGCTGGCCCGGGCGGAACGTGGTCCTCGACACCATGATCGAAAAACCTTC CCGGGGAGGCGGATGC Clone Rv274 :::::::::::::Rv274SP6.seq::::::::::::: TTCCGAATTTCGGGTCCNGGTCATATGACCCTCATGGAAGAAGAAGCGGCCGCCCCGCGCCCGTGCGACGGCGAATGA (SEQ ID NO. 321) AAACCCTCACCCAGGCCGCATTGAACGCCGACAAGACGGTGGAGCAGGTCGAAGACGTCCTGGACGGTCTGGGTAAGA CCATGGCCGAGCTGAACAGCTCGCTGTCACAGCTGAACAGCACCGTGGAGCGCTTGGAGGACGGTCTGGACCATCTCG AAGGTACCCTGCACAGCCTGGACGATCTCGCGAAACGGCTCATCGTGTTGGTCGAGCCGGTGGAAGCCATCGTCGATC GGATCGACTACATCGTGAGCCTCGGCGAAACGGTGATGTCACCGCTGTCGGTC :::::::::::::Rv274T7.seq::::::::::::: NCTCGATCTTGGGGTACGTTCGATGAGGCTGCTGACCAACAACCCGGCCAAGCGGGTGGGACTGGATGGATACGGATT (SEQ ID NO. 322) GCACATCATCGAGCGCGTGCCGCTGCCGGTGCGGGCCAACGCGGAGAAACATCCGTTACCTGATGACCAAGCGTGACA AATTGGGGCACGACTTGGCTGGGTTGGACGATTTTCACGAATCCGTGCATCTGCCCGGAGAATTCGGCGGTGCCTTGT GAAGGTGGCGCCGGGGTGCCGGATCTGCCGTCGCTGGATCGTCTGGTGTGCGGCTGGCGATTGTCGCCAGCAGCTGGC ACGGAAAGATCTGCGACGCGCTGTTGGACGGCGCCCGCAAGTGGCCGCCGGGTGTGGCCTCGATGACCGACTGTGGTT CGGGTGCTCCGCGCGATCGATAT Clone Rv275 :::::::::::::Rv275SP6.seq::::::::::::: TCATCCCGACCAAAACGCGAGCTAGGTCGGCATCCGGGAAGCATCGCGACACCGTGGCGCCGAGCGCGCTGCCGGCAG (SEQ ID NO. 323) GCCGATTAGGCGGGCATATTATCCCGCCGCGGCTCCCGGCTCCGAGTACGGCGCCCCGAATGGCGTCACCGGCTGGTA ACCGCTCTTGCGCGCCTGGGCGGCGGCCTGCCGGATCAGGTGGTAGATGCCNACAAAGCCTGCGTGATCGGTCATCAC CAACGGTGACAGCAGCCGGTTGTGCACCAAGCGCGAACGCCACCCCGGTCTCCGGGTCTGTCCAACCGATCGACCGCC CAAGCCCACATGAACAAACCCCGGCATCACGTTGCCGATCGGCATACCGTGA :::::::::::::Rv275T7.seq::::::::::::: TTGGCGGGTTGGCCCAGAGCCCGCCCGGTGACGGCGACGATGCTGGGCTGGTTGCGGCCCTGCGCCACCGCGGCTTGC (SEQ ID NO. 324) ATGCTGGTTGGCTGTCTTGGGACGATCCCGAAATAGTCCACGCGGATCTGGTGATTTTGCGGGCTACCCGCGATTACC CCGCGCGGCTCGACGAGTTTTTGGCCTGGACTACCCGCGTGGCCAATCTGCTGAACTCGCGGCCGGTGGTGGCCTGGA ATGTCGAGCGCCGTTACCTACGTGACCTGATGGATCGGGGGGTGCCGACCGTGCCCGGCGATGTGTATGTGCCGGGAN AGCCGGTCCGGTTGCCACGCAAAGGCCATGTCTTCGTCGGTCCGACCATCGGTACCGGGACACGGCGCTGTATTGCCC GGTTCGCTGCCGAGTTCGTCGCGCAACTGCACGCNGGCGGGCCAGCGGTGCTCGTTCANCCCGGAGGTTCCGGTGACG ATGATCGTGTTGGTCTCCCT Clone Rv276 :::::::::::::Rv276SP6.seq::::::::::::: GTAGGAGAGAACAAAGACCGTCGATAGGACACGTGTTACGCCGGTAGCTGTCATTGGTATGGGGTGCCGCTGCCGGGG (SEQ ID NO. 325) GGCATCTACTCACCCGATCGGTTGTGGGAGGCGTTGCTGCGGGGCGACAATCTGGTCACCGAGATCCCCGCCGACCGC TGGGACATCTACGAGTACTACGACCCCGAACCCGGCGTGCCCGGACGCACCGACTGCAAATGGGGCGCGTACCTCGAT AACGTCGGCGACTTTGATCCCGAGTTCTTCGGGATCGGGGAGAAAGAAACGATAGCGATCGATCCGCAGCACCGCTTG TTGCTGGAAACCTCCTGGGAAGCCATGGAACACGGCGGGCTAACACCGAACCATATGCCTCCCGACANGGGTTTTCGT GGGGTT :::::::::::::Rv276T7.seq::::::::::::: CGAACTGAGCCCATAGAAAGGCAGCGACTAATTCGCTGGGCAAATAGGAAGACCCTTTGTCCTGCCACGTATATTTGT (SEQ ID NO. 326) CGACCTCGTTGCGAAGGAAGCGGCTGCGATTGGTGCCCTTTTCCCTGGAGAATCTCTGCCCGGAGCAGGAAGTCTTAT GAGTTGACAAGCAGGGGCGCCGCCTTCGCCGGAAATCACATTCTTGGTCTCGTGAAATGAGAGCGCTCCCAGGTCGCC GATGCTGCCGAGCGCCCGCCCACGATACGACGCCATCGCGCCTTGGGCCGCGTCTTCGACCACCGCCAGGTTGTGGTG CGTGGCGATCTTCATGATCGCGTCCATCTCGCAGGCCACCCGGCATAGTGAACGGGGACCATGGCCTCGGTTCGCGGG TGAA Clone Rv277 :::::::::::::Rv277SP6.seq::::::::::::: CTTAGACGCCACCTCCGGGCCGAGCTCCACGGGGTGGATAAGTACGGCCGGATGTGGCCGCAATGGGAAGTTGTTGCC (SEQ ID NO. 327) CGCTTGACTGTCCGGGTTAACGCCGGATTCCACCACATCCCCTTGCGAAAGGCCGTTGGGTT :::::::::::::Rv277T7.seq::::::::::::: GATCGCGATCGTCGATGTGGCCATCCGGCTTGGCGTCGACCCGCGTAAGGCAGACCAGATGGTTCGCGGCACGGTCAA (SEQ ID NO. 328) CCTGCCACACGCACTGGTAAGACTGCCCGCGTCGCGGTATTCGCGGTTGGTGAAAAGGCCGATGCTGCCGTTGCCGCG GGGGCTGATGCTGTCGGATCGACGATCTGATCGAGAGGATCAGGGCGGCTGGCTGGAATTCGATGCCGCGATCGCGAT ACCGGATT Clone Rv278 :::::::::::::Rv278SP6.seq::::::::::::: AGCTTACGCCGCTTTCGCTTCNGATTTGGGACGCCGCATCGAAAGCGCAGTTGGAAGCGCGGCGCCCGGCTGGTCGAG (SEQ ID NO. 329) CTGCTCAAGCAGCCGCAATCCCAGCCCATGCCCGTTGAGGAGCAAGTGGTTTCGATCTTCCTGGGCACCGGCGGTCAC CTGGACTCGGTGCCCGTCAAGGATCTCGGCGGTTCGAAACCGAATTACTGGACCACATGCGGGC :::::::::::::Rv278T7.seq::::::::::::: CGACGGGACCTCGTCGCATCTTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTATAAGGTCGGC (SEQ ID NO. 330) GAAGCGCTCGGCATTGGTCATCGGGATATGCCGCTCGGGACGGTCAGATGCCCTCGGGTCCNGCCAGCACTCCTCAGG CTTCGTCGGGGTGGTCGCGACCGCATGGGCCACATCGCATTCACCAGGTCTGCGCGAATCACCAGCACGTANACGGTT CCTTTCCTAAGCAACACCGAAATTTCAGGACCCGAATGCTCCGGGAAAACATGTCACGGTAAGTCCGGTATTCCGGGT ACCGGTTGAGCATTGA Clone Rv279 :::::::::::::Rv279SP6.seq::::::::::::: CGGCATCGGTTTGGGCTGTCACCAGCAGTTGGTAGTTCTTCACTACTGTTGTTCGAGCGTCGAGCCGCCGCGCGTGTC (SEQ ID NO. 331) GAGGTCGCCGGACGCGTACCCGCCAGGCCGGTCAGGGTGCCCTTCCAGTCCACGCNGCTGTGGTCGGCTAACCGCTTA TCTTCAATCGAGACNATCGCCAGCTTCATCGTGTTGGCGATCTTGTCCGAGGGCACCTCGAACCGGCGCTGCGANTAC AGCCACGCGATCGTGTTGCCCTTCGCGTCGACCATCGTCGATACCGCAGGCACTTGCCCCTCGAGCAGCTGGGCCGAT CCGTTGGCAACGACCTCAGAGGCACGATTGGACATCAGCCCTAGCCCGCCTGCG :::::::::::::Rv279T7.seq::::::::::::: CCGTCGANGCCGCCGACTTGGCTTGACCGACACCAACATGGCCTGAGGGTGTTCAACAAGACCGTGGCCGACGGGCTG (SEQ ID NO. 332) AACATCACCATGAGCGGCATGAGCCACGCCACCGAGTTCATCATGTTGATCGCCGAAAACCATTGGCGGGTAGCGGAA GAACGGTCGAGGTGCTCTACACCGAGTATTCGAAGTCGAAAGGCCAACCGCTGCTCAACGGCGTCAACATCATTTTCG ACGGGTTTCTGCGAGGGAGGATGCCACGATGAACTGGATCCAGGTGCTGTTGATCGCGTCGATCATCGGGTTGCTGTT CTACCTGTTGCGGTCGCGCCGAAGCGCGCGGTCCGTGCCTGGGTCAAGGTGGGCTATGTCTTGTTCGTGCTCCCGGCA TCTATGCCGTGCTGAGA Clone Rv27 :::::::::::::Rv27SP6.seq::::::::::::: TTACACGNCCTGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGAC (SEQ ID NO. 333) CATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTTTTGAGCGTCGCGCGGGGCAGCTTCGCCGG CAATTCTACTAGCGAGAAGTCTGGCCCGATNCGGATCTGACCGAAGTCGCTGCGGTGCAGCCCACCCTCATTGGCGAT GGCGCCGACNATGGCGCCTGGACCGATCTTGTGCCGCTTGCCGACGGNGACGCGGTANGTGGTCAAGTCCGGTCTACN CTTGGGCCTTTGCGGACGGTCCCGACGCTGGTCGCGGTTGCGCCGCGGAAAGCGGCGGGTCGGGTGCCATCAGGAATG CCTCACCGCCGCGGCACTGNACGGCCAGTGCCGCGGCGATGTCNGCCATCGGGACATCATGCTCGCCTTCATACTCCT CGACC :::::::::::::Rv27T7.seq::::::::::::: CAGGCATGCAAGCTTTGTCACACCAAGTGTTTCGACCAGGCGCTCCATCCGGCGAGTGGATACTCCCAGCAGGTAGCA (SEQ ID NO. 334) GGTCGCCACCACGCTGGTCAGTGCGCGTTCAGCTCGCTTGCGGCGCTGCAGCAGCCAGTCCGGGAAATAGCTGCCCTG GCGCAGCTTGGGGATCGCGACGTCGATGGTTGCGGCACGGGTGTCGAAATCACGGTGGCGGTAGCCGTTGCGCTGATT GGACCGCTCATCGCTGCGTTCGCGGTAGCCCGCCCCGCACAGGGCGTCGGCTTCAGCCCCCATCAAGGCGG Clone Rv280 :::::::::::::Rv280SP6.seq::::::::::::: AGCTTAGCCAGTTTTTCTACTCTTGGGCCCACACCCACAGTGCTTCGACGGTACGGTCACCCATGATGGCCATCCAGT (SEQ ID NO. 335) TGGCATCGGTGAGCTGATAAATGCCAGCTGGTTTCGCCAACCCGGTAGCGATCTTGGCGCGCTGCTTGTTGTCACTGA TACCTATCGAGCAAGACAGCCCGGTTTGCGACAAGATGACTTTTCGGATCTCTTCGGCGACTTCGATGGGGTCGTCGG GAGTCCCGGGCGCCACCGCGAGGTAAGCCTCGTCCCAGCCCCATACCTCGACCGGGTATCCCAGGTCGCGCAATAACG CCACCACCTCCTCGGACGCCGCGTTGTAGGCGGCTGGGTTCGACGGCAAGAAGTGGCCTCAGGGCATCGTCGGCGCGG TCCCAACGGCNTGCCGGCGCGCACACCGTAGGCGCGGGGCTC :::::::::::::Rv280T7.seq::::::::::::: CCGGCGGAACTCAGACGTGCTGGTGGTGCGGCATGGCACCGCGGGCAGCAAAGCGCACTTCTCCGGGGACGACAGCAA (SEQ ID NO. 336) GCGACCGCTAGACAAGAGGGGTCGTGCGCAGGCAGAAGCGTTGGTACCACAGCTGCTGGCGTTCGGCGCCACCGATGT TTATGCCGCCGACCGGGTGCGCTGCCACCAGACGATGGAGCCACTCGCCGCGGAACTGAACGTGACCATACACAACGA GCCCACCCTGACCGAAGACTCCTACGCCAACAACCCCAAACGCGGCCGACACCGAGTGCTGCAGATCGTCGAGCAAGT AGGCACACCCGTGATCTGCACGCAGGGCAAGGTCATTCCCGATCTGATCACCTGGTGGTGCGAGCGCGACCCTGTGCC CCCGACAGTCCCGCAATCGCAAAGGCAGCACGTTGGTGT Clone Rv281 :::::::::::::Rv281SP6.seq::::::::::::: GTATGGTCAGCTGTCCATCCGGCGCTGTCGGCCGAGCTGCCAGATCTCGTCAGCCGTAACCGGGTTGCGGGATCCACG (SEQ ID NO. 337) CGTGCGGGTTGTCTAC :::::::::::::Rv281T7.seq::::::::::::: CCGACTTTCCGCGGGTACCCGCTCAACTTTGTGTCNACCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACT (SEQ ID NO. 338) ACTTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACT ACATCATTCGCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGATCCGTGCCGATCGTGGGGAACCCACTGGCGAACC TGGTTCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGCGACCCGGCCTATGGTTATTCGACCTCGCCGCCCAA TGTTGCGACTCCGTTCGGTTGTTCCAGAANGTCAGCCCG Clone Rv282 :::::::::::::Rv282SP6.seq::::::::::::: GCACCGATGTCGGCGAGCACTTCGTCAACTTCCAGGGGTGCCCGCACCAAGTATTTCGACGAGTATTTCCGTCGGGCC (SEQ ID NO. 339) GCCGCCGCCGGTGCGCGGCAGGTGGTCATCCTGGCGGCGGGGCTGGGACTCGCGCGCGTACCGGCTGCCTCGGC :::::::::::::Rv282T7.seq::::::::::::: TGCACCCAACTTACTGAGCATGCTAACGCTGGTCGTGCGGGTCTTGTTCCCGCGTGTCGGCAGGGCACACGCTCGGGG (SEQ ID NO. 340) CGTAGCTGGGAGAGGCCCCGGTCAAGCCCGGAGAGCAGTGCTCAGTCCGCCAGCTTGACCGACTTTCGATGAGAACGC GCTTCTCGCCGTATTGAACTGGCGTGCTGACGGTCGCTGAGCAGCGCTCGCCGAGTGCGGCCGCTGATTCTTTCATCG AGCCAGGACGCGCATTCGTGTTCGGCCGC Clone Rv283 :::::::::::::Rv283SP6.seq::::::::::::: AGCTTACGGCCGGTCGACGCGACGAGTGGTTCATGACACCACAAACCGTCAACGCCTACTACAACCCGGGGATGAACG (SEQ ID NO. 341) AAATCGTCTTCCCGCAGCGATTTTACAGCCACCATTTTTCGATCCGCAGGCCGACGAGGCCGCCAACTACGGCGGGAT CGGGGCGCGTGATCGGGCACGATGATCGGGCACGGTTTCGACGATAGGGCGCCAAATACGANGGCGACGCAATCTGGT CNATTGGTGGATCGA :::::::::::::Rv283T7.seq::::::::::::: ATGTCGTCACGTCACCACAATCGCGAGGACCCAATCATGCCGCCCAGGGCGGCCAACCCAATGGTGGCCGCGAAGCGG (SEQ ID NO. 342) CAGCTCGATCGCAGCGCGGAGGTGCCGGCCGCCAGTTGATTCACGAACAGGGTGAGGTCATAGGCGGGCAGGATAGTG ACGAACGCAAGACCTATATCTGCCGTCGGAGTAAGAATCGAGTAGCCGGTCGACCAACGGAAGCGAAAGTCTCCGCGA TGTTGATGAGCGTCGCCGGTTGTGGCGGCGGTGGC Clone Rv284 :::::::::::::Rv284SP6.seq::::::::::::: AGCTTCACCAGCGTGCCGATGCTGTTCGCNACACCTCCCTACTATGCGCAATTCGCCGACACGGGTGGCATCAACACG (SEQ ID NO. 343) GGCGATAAGGTGGACATCGCTGGGGTGAACGTCGGGCTGGTGCGCTCGCTGGCAATCCGCGGCAACCGCGTGTTGATC GGATTCTCGTTGCCCGGCAAGACAATCGGGATGCAAAGCCGGGCAGCAATTCGCACCGACACCATTCTTGGCCGTAAG AACCTGGAAATCGAACCCCGCGGTTCGGAGCCGTTGAAACCCAACGGTTTCCTGCCGTTGGCGCAGAACACTACGCCA TACCAAATCTATGACGCGTTCGTC :::::::::::::Rv284T7.seq::::::::::::: CTGCCGCGGTGGCGGTCAGCGCCTGGCAAGTCACCGCACCGCCGTCCGGTTCATCGGCAGGCTCCCCCGAAAAGGGCC (SEQ ID NO. 344) CTGGCAACAGAAGGTGATCAATGAGCTCCCGCAGACCTTCGCCGATCTGGGACCGACATACGTGAAGTTCGGCCAGAT CATCGCGTCCAGCCCGGGAGCATTCGGTGAGTCGCTGTCGCGGGGAATTCCGCGGCCTGCTCGACCGGGTGCCGCCCG CAAAAACCGACGAGGTGCACAAGCTCTTCGTCGAGGAACTCGGCGACGAGCCGGCCCGGCTGTTCGCCTCCTTCGAGG AAGAACCGTTCGCGTCTGCGTCCATCGCCCAAGTGCACTACGCGACCTGCGCAGCGGCGAAGAAGTGTGGTCAAGATC CACGGCCGGGCATCCGCCGCCGCGTTT Clone Rv285 :::::::::::::Rv285SP6.seq::::::::::::: GATCGTGCCGGCCCCCCGGCGGCAGTAGCAGATCAGCTCGTCGAAATCGCGGCAACCAGTCCAGTCGATTTCCATACG (SEQ ID NO. 345) GGCGCCGTCAATCAACTCTGCGAACATCGCGATCGGCACCGGAAACCGGCGAGCCGCGTCAGCCAGCGCAACCAGCAC CGGGATCGGATGAATCATCAATATTATCAAGTGATTTCCTGATGGCATCGAGCTCGGTGATCTTGGTCTCGGGGGCCA GCTCGCCGTCGGCGACGTCGTCGATCCGGCGGCCGAGCGCATAGACCGCAAATAGTGCCGCTCGCTTTTCGCGCGGCA AGAGTCGGATGCCGTAATATANGTTTCTGGCGGCCGTGCGCGTGATCNACTCGGTGATTCGATACGCCTGTTCATCTC GGTCATGCCGTCCTC :::::::::::::Rv285T7.seq::::::::::::: GGTGGCGCAATGACCGAAACCACCCCAGCCCCGCAAACCCCGGCGGCCCCGGCCGGGCCCGCACAATCGTTCGTGTTG (SEQ ID NO. 346) GAGCGGCCCATCCAGACCGTTGGGCGCCGTAAGGAGGCCGTGGTACGAGTGCGGCTGGTGCCCGGCACCGGCAAGTTC GACCTCAACGGCCGCAGCTTGGAGGACTACTTCCCAAACAAGGTGCACCAGCAGTTGATCAAGGCACCCCTGGTCACC GTGGATCGGGTGGAAAGTTTCGACATCTTTGCCCACCTGGGCGGCGGCGGCCCGTCGGGTCATGGCCGGCGCGCTGCG CCTGGGTATCGCCCGGGCATTGATTCTNGTATCGCCGGATGACCGGCCCGCGCTGAATAANGCCGGCTTCTTGACCGT GATCCACGCGCCACCGAACGCAAA Clone Rv286 :::::::::::::Rv286SP6.seq::::::::::::: CACAATAGATTACTCAAGCTTCGAACCAGCGGCCTTATCACGTATCCCCGCTGAGACCTTGACCCTTAGGGCCGAAGT (SEQ ID NO. 347) GACTTCGCTGCTGCTATGCCGACACCCGATTTCCAGACGCTGCTGTTACACGACGGCCGGGCCGGTGGCCACCATCAC GCTCAACCGCCCGGAACAGCTCAACACCATCGTCCCGCCCATGCCCGACGAGATCGAGGCCGCTATCGGGTTGGCCGA GCGCGACCAGGACATCAAGGTCATCCTGCTGCGCGGTGCCGGCCGCGCCTTCTCCGGCGGTTACAACTTCGGCGGCGG GTTCCAACATTGGGGGCAT :::::::::::::Rv286T7.seq::::::::::::: TCAGGACGCTTATGGTTGGCAGATGGTCGCCCTGGCGTCGAATACGCGCGAGCGCATGAGCTCACCGGTTCGGAACAA (SEQ ID NO. 348) CGTATCGAAGAACGTCGCACTGCTGGCAGATGGTATCTCCGATGTGGTTGTAATTTGTATCCCAACTCTAACTGTGCT ATCGGATCAGCGTGAATATCGAGATATTGCGAATGCGATGACAGGCCGCCATTCGGTTTATTCGCTTACGCTTCCCGG GTTCGATTCGTCTGATGCACTGCCGCAAAACGCGGATATGATTGTTGAAACCGTATCTAACGCAATTATTGATGTGGT AGGCGGCAGCTGCCGTTTTGTGCTGTCGGGCTATTCATCGGGTGGGGGTGTTTGGCTATGCCCTCTGCTCCCAT Clone Rv287 :::::::::::::Rv287SP6.seq::::::::::::: CGCAGCTGTCGCCGATCTGGTCCGGAATACCTAGCTCCAGGTTCTGAGTGGAGATGAGTGCGGCCATCGAAGTGTTGT (SEQ ID NO. 349) CAATGTACTCCAGGATGTCAGGTGCCAGGCCGCTGGCGAGGATCTTGGGCACCGCCGCCATGACTTGGTCGAAGTCGG CGAACGGGGCGAGCACGCTGGCGTCGTGGTC :::::::::::::Rv287T7.seq::::::::::::: GTAGTTCGTTCATCCAAACACAGTGCGGTACCGGCTCAAGCGGATCACCGACTTCACCGGGCGCGATCCCACCCACCC (SEQ ID NO. 350) ACGCGATGCCTATGTCCTTCGGGTGGCGGCCACCGTGGGTCAACTCAACTATCCGACGCCGCACTGAAGCATCGACAG CAATGCCGTGTCATAGATTCCCTCGCCGGTCAGAGGGGGTCCAGCAGGGGCCCCGGAAAAGATACCAGGGGCGCCGTC GGACCGA Clone Rv288 :::::::::::::Rv288SP6.seq::::::::::::: TCCGCTCGCTTCTCCGAGAGGTTGAGTGCCAACGCTCTGCCGATGCCCGAAGCCGGCCCCGGTGATGACGGCGACCTT (SEQ ID NO. 351) GCCTTCGAATGAGCTCATTTGACTACTCCCCGTGGTTGTCCCTGCGATTGGTGGAGGTGGCCGCGCAGCCTTGCCCCG AGGTCGGCGATCGCGTCTCGGGCTTCGGGGAGCAGACTGACCTGCAGATGGAAGTCGTGCCACATGCCCGCGAACCGG CGATGCTCGATGCTTGTTTTCGAAGCGGCGCAGGCGGTTTCGATCTTGTCCGCGTCAACACNGATCGGATCGTCGCCC GCGGTCTGCATGACGAATGGGCG :::::::::::::Rv288T7.seq::::::::::::: ATGGGAGGCCACCGATTACCATCTTGCACACACCGATTCCGGGCTATTGATGTCCACGTTCGGTCCGCGAACCGCGCT (SEQ ID NO. 352) GTGGCTGCTGCTGGCCAAAGGCGGAGGCGATACCGAAGTCAGTGCCCAAGCTTGGGTTCCACGCTCGCGCAGCCACGC CGTCACCTTTCCACGAGACCTCACCTGCCGATCCGAAATGGAATCGGCCGTGACGGAATTGGCGCAGCGAACACTCAA CGAGGTGGTGGCTTCGTCGCGAACCGTCACCCGAGTCGCGGTCACCGTCCGCACGGCGACGTTCTACACCCGCACCAA GATCCGAAAGCTGCAAGCTCCCAGCACCGATCCCGACGTCATCACCGCTGCCGCCCGGCACGTTCTTGAACCTATTCG AGCTGGAATCGGCCGTCCGGTTGCTGGGAATTGCNGTTAAGAACTGGGCCT Clone Rv289 :::::::::::::Rv289SP6.seq::::::::::::: GCTTTGCGCGCTTCTCCGAGAGGTTGGAGTGCCAACGCTCTGCCGATGCCCGAGCCGGCCCCGGTGATGACGGCGACC (SEQ ID NO. 353) TTGCCTTCGAATGAGCTCATTTGACTACTCCCCGTGGTTGTCCCTGCGATTGGTGGAGGTGGCCGCGCAGCCTTGCCC CGAGGTCGGCGATCGCGTCGCGGGCTTCGGGGAGCAAACTGACCTGCAGATGGAAGTCGTGCCACATGCCCGCGAACC GGCGATGCTCGATGCTTGTTTTCGAAGCGGCGCAGGCGGTTCGATCTTGTCCGCGTCAACGCAGATCGGATCGTCGCC CGCGGGTCTGCATGAAGAAT :::::::::::::Rv289T7.seq::::::::::::: CTCACGCAGCCACGCCGTCACCTTTCCACGAAGACCTCACCTGCCGATCCGAAATGGAATCGGCCGTGACGGAAATTG (SEQ ID NO. 354) GCGCAGCGAAACACTCAACGAGGTGGTGGCTTCGTCGCGAACCGTCACCCGAGTCGCGGTCACCGTGCGCACGGCGAC GTTCTACACCCGCACCAACATCCGAAAGCTGCAAGCTCCCAGCACCGATCCCGACGTCATCACCGCTGCCGCCCGGCA CGTTCTTGACCTATTCGAGCTGGATCGGCCCGTCCGGTTGCTGGGAGTGCGGTTAGAAACTGGCCTAGAAACCGGCGG GCACACCGCACCTGGGCGGGGN Clone Rv28 :::::::::::::Rv28SP6.seq::::::::::::: TGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACG (SEQ ID NO. 355) CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCAGCCACC ACNCGCGGGTCGGGCGCCGGGCCCGGGTCGCCANGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGC TGCGCTACGTCGAGCCATACCGGGCGGAGCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCGAAGTCGAAG TCGATACCGATTGCGCATCCGCNGCCGCA :::::::::::::Rv28T7.seq::::::::::::: CAGGCATGCAAGCTTCACGTCCGTACGGCTCGGGTACGCTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGAC (SEQ ID NO. 356) CTCGTCTGCATCTTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTC GGCATTGGTCATCGGGATATGCCGCTCGGGACGGTCAGAACCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGG GTGGTCGCGACGCGCATGGGCCACC Clone Rv290 :::::::::::::Rv290SP6.seq::::::::::::: GCTTGTCTATCGTCCCGGCCAGGTCCGGCCAGTCAAGGTCGAACGCCAGTCCGGTCTCCTCTCCGACTACGGCCAAGA (SEQ ID NO. 357) ACTGGGCGACGGTGTCAGTGCAGACCAGCGGAAACTGGTGGCGCCCTAGGCGAGCGACCGCCTCACAAACGGCGGTGA CCGCGTTCTGGTCGTGCACCATCGAGCCGTGCCCAGCCCGGCCGCGTGCCGTCAGCCGCATCCACTGGATGCCCTTCT CGGCGGTTTCAATCAGGTACAGGCGACGTTCGCCACCATCGTGCCGGGGCACGGTTAGCGAGAAACCGCCGACTTCAC GATTGCCTCGGTGATGCCGTCGAAACAGATCGGGCCT :::::::::::::Rv290T7.seq::::::::::::: GCGCGCCATGTTGAGGTTGTCCGACGGTGACGACGGTGAACCACAACTGTTTGACCTGTCCGCACACACCGTGTGGAT (SEQ ID NO. 358) CGGCGAGCGGACCCGACAAATCGATGGCGCGCACATCGCGTTTGCCCAGGTGATTGCTAATCCGGTCGGGGTCAAGTT GGGCCCCAACATGACCCCGGAACTGGCCGTGGAGTACGTCGAGCGGCTCGACCCGCACAATAAGCCGGGCCCGCTGAC TTGGTGAGCAGGATGGGCAACCACAAGGTCCGCGATCTGTTGCCACCGATCGTGGAGAACGTCCATGCCACCGGGCAT CAGGTCATCTGGC Clone Rv291 :::::::::::::Rv291SP6.seq::::::::::::: TTGCCTTCCATGCCGAGCAAGGTCGACTCAGCGATGACGAATTGTTCTTCTTCGCGGGTGTTGCTGCTGGTTCCGGGC (SEQ ID NO. 359) TATGAGAGCACTGCTCATATGATTAGCACATTGTTTCTGACGCTGGCCGACTATCCAGATCAGCTGACACTCCTTGCG CAGCAACCAGACCTGATCCCGCCGGCGATCGAGGA :::::::::::::Rv291T7.seq::::::::::::: CGACGCTGGGCCCAACTGCGACCACCAGGTCCTGGTATGGCAGGACATGGCCGGGTTCAGCGGCGCCAATACCG (SEQ ID NO. 360) Clone Rv292 :::::::::::::Rv292SP6.seq::::::::::::: TAACGACTCGGGTCCAGCGACCCCGCCAACACNAACGGCCGGACNACGTGGGCCAGGGTCGCGGCCTCCCCTACAAAC (SEQ ID NO. 361) AGGATCCGTTGCCTGCGAACGACAGGCTCCGGTCCGGCGTTGGGCGCCGTGCTCGTCCCAGCGTCCGGTCCCGGGTCG CCGGCGACGCTTGTTTCCTCCATACTCGCCCCCTAATCTCGAGGCAGCCCGTACCCGCAGGCAACCTCCCAAAAATGC AATCCCCCAAAATGCAATGCGTCNAGCTATTTCTCACACCGACCGCTAGTTGCGGATCANAAATCCGTTGGGCGCGGA :::::::::::::Rv292T7.seq::::::::::::: CNTGGCGGTGGGTGCGGTGTCGAACACGACCACACTTCTTTGCGGTTCGGTGATCTCGACACCGGCCGCGAGCCGACC (SEQ ID NO. 362) ACCATGCGCGCGTAGATCGGCGATCAGCGCGTCGGCTATCGCCTGGGTGCCGCCCACCGGAATCGGCCAGCCGACCGA ATGGGCCAGCGTTGCCATCATCAGTCCGGCGCCGGCCGACACCAGTGACGGCAACGGTGAAATCNCGTGGGCGGCAAC GCCGGTGAACAACGCGCGGGCATCCTCGCCCGCCAGCGACCGCCAGGCAGGGGTGCCCTGGGCCAGCATCCGCAGCCC GAGACNCAGGACCGANCCCAGTG Clone Rv293 :::::::::::::Rv293SP6.seq::::::::::::: GCTTTTCNGATCGCAGCGAGTCGTACCCGCGCCGGTCACCTTCGTGGATATCGCCGGCCTGGTCAAGGGGGCGTCCGA (SEQ ID NO. 363) GGGAGCCGGCCTGGGTAACAAGTTCCTGGCTCATATCCGCGAATGCNACGCCATTTGTCAGGTGGTGCGGGTGTTCGT CAACAACNACTTGACTCATGTCACCGGACGGGTCGATCCCCANTCCGACATTGAGGTCGTCGANACCGAGCTGATCCT GGCANATCTGCAAACCCTGGAGCGGGCCACGGGCCGGCTGGAGAAGGAANCGCGCACCAACAAGGCGCGCAAGCCGGT CTACGACGCGGCACTGCGTGCCCAGCAGGTGCTCGACGCCGGCAANACGCTGTTCGCCGCGGGGGTGGATGCCG :::::::::::::Rv293T7.seq::::::::::::: GTCGTACGCCATTNGTCGGTGTGCGCATACCAGTACGACGCGCCGGGCACCTGACGCGGCGGCCGCCACCAGTCGGTG (SEQ ID NO. 364) GCCATCGCCATCGTCTGCCACCCGGTCAACGGACGCACCTTCTCCTGGCCGACGTAGTGCGCCCACCCGCCGCCGTTG CGTCCCATCNATCCGGTCAACATGAGCAGCGCCAACACCGAGCGGTACATGACATCGCTGTGGAACCAGTGACAGATT CCGCCGCCCATGATGATCATCGACCGTCCTCCGGATTCGGTCGCGTTGCGGGCGAAATTCCTTGGCAAACCGGATTGC CTGCGCGGCCGGCACACCGGTGATCGACTCCTGCCAGGCCGGGGTGTTCTGCTGGGTTCGGTCGTGGTACCGGT Clone Rv294 :::::::::::::Rv294SP6.seq::::::::::::: GCGAGGCGGTATCGCTTCCCGTCGTACCGGCGACCGCCAGCCGAGAAGCTCGTTTTCCCAGTGTTCCTGGGGATTCTC (SEQ ID NO. 365) ACGCTGCTGCTGANTGCGTGCCANACCGCTTCCGCTTCGGGTTACAACGAGCCGCGGGGCTACGATCGTGCGACGCTG AANTTGGTGTTCTCCATGGACTTGGGGATGTGCCTGAACCGGTTCACCTACNACTCCAAGCTGGCGCCGTCTCGTCCG CAGGTCGTTGCTTGCGATAGCCGGGAGGCCCGGATCCGCAATGACGGATTCCATGCCAACGCTCCGAGTTGCATGCGG ATCGAATACNAATTGATCACCCA :::::::::::::Rv294T7.seq::::::::::::: TGGGTCTTGCCGGCGAGCCCAGCGAAGTCGCTAGCGTGGCCGTGTTTCTTGGCTTCGGATCTATCCTCGTTACATGAC (SEQ ID NO. 366) CGGCACCGTGTTGGACGTGACTGGCGGCCGGTTCATATGACACCGAGATCATTGCCACGGTACGGCAATTCGTCAAGA AGGAAATCTTTCCCNATGCACCGGCCCTCGAACGTGGCAACAGCTACCCGCAAGAAATCGTCGATCGGCTGGGTGTTA TTGGCTTGCTCGGTCGCCGGCTGCAAGGGTATCGACACCACCGAGTTCATTCTCGGGCGTGCCGGCGCATTCGAGCTG GCGGTGCGCGCTGCCCAGCACCGTCATAAGTACTTGANGATGGTCAAACGTCGGACGAACCGCCACCACGTCGCTGCC GAACGG Clone Rv295 :::::::::::::Rv295SP6.seq::::::::::::: TAGATGCCCAAGCTTGCCNTTANAGACCTCGTCGACCAAGCACGGACGCGACCGTCGAAGGTGGCGAATCCGGGCTTG (SEQ ID NO. 367) GCGTCNACCCGCGTAAGGCAGACCAGATGGTTCGCGGCACGGTCAACCTGCCACACGGCACTGGTAAGACTGCCCGCG TCGCGGTATTCGCGGTTGGTGAAAAGGCCGATGCTGCCGTTGCCGCGGGGGCGGATGTTGTCGGGAGTGACGATCTGA TCGAGAGGATTCAGGGCGGCTGGCTGGA :::::::::::::Rv295T7.seq::::::::::::: TCTCCACGGCGTGGATCAAGGTACCGGCCGGGATGTTGCGCAATGGCN3GTTGTTGCCCGGCTTGATGTCTGCGTTAG (SEQ ID NO. 368) CGCCGGATTCCACCACATCCCCTTGCGAAAAGTCCGTTGGGTGCAATGATGTAGCGCTTCTCCCCATCGAGATAGTGG AGCAACGCAATCCGTGCGGTACGGTTCGGGTCGTACTCGATGTGCGCGACCTTGGCGTTGACACCATCTTTGTCATTG CGGCGAAAGTCGATCATCCGGTAAGCGCGCTTATGACCGCCGCCTTTGTGCCGGGTNGGTAATCCGGCC Clone Rv296 :::::::::::::Rv296SP6.seq::::::::::::: GCCCGGTTCGATCGGGCATGTCCGCAGTCGTCGTTACCGGAGGCGGTCGTGGCCGCGCTAATCGGCGTCGGCGCCGAC (SEQ ID NO. 369) AAGATGTGGGATATCCGCAATCGGGGCGTCATCCCTGCGGGCGCGCTCCCCCGCGTCCGAGCCTTCGTCGACGCAATC GAGGCAAGTCACGACGCGGATGAGGGGCAGCAGTGAATTACAGCGAGGTCGAGCTGTTGAGTCGCGCTCATCAACTGT TCGCCGGAAACAGTCGGCGACCGGGGTTGGATGCGGGCACCACACCCTACGGGGGATCTGCTGTCTCGGGCTGCCGAC CTGAATGTNGGTGCGGGCANCGCCGGTATCNACTCCCGTGGAACACAGCCGGGGC :::::::::::::Rv296T7.seq::::::::::::: CTCGGCGTGGATATCGGTGTAGCCGGCGCCGGTGAANGTCGGCTCCTTACGTCCACTCGACAACAGCTCATAGCGATC (SEQ ID NO. 370) CAACCAGTANGCAACCGCCTTCAGCAGTACAACCGCGCCGGCGAACACTGCGAGTTGAACGCGAGCTGCCTGGGTCAG CATGCCTCTGCCGGTTGTCAGCCGAAGGCCGCCGAACAGGTAATGCGTCAACAGGCTCGCTAGAAACGCCAGAACCAC GGCCACGAACAGCCAGTTCAGCACCGACCGGTAGAACGGCAGATCGAAGACGAAAAAACCCAATGTCATAGCCGAATT CGGGGTCCACGATGCCAAAGGTGCCCCCGTGTACAACAACTGAACCTTGACCCA Clone Rv29 :::::::::::::Rv29SP6.seq::::::::::::: TCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACGCCAA (SEQ ID NO. 371) GCTATTTAGGTGACACTATAGAATACTCAAGCTTCACGTCCGTACGGCTCGGGTACGCTTCGGTCGCAGTGTGCGAGT GATAGATGACGACCGGGACCTCGTCGGCATCTTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGT AGAAGGTCGGCGAGCGCTCGGCATTGGTCATCGGGATATGCCGCTCGGGACGGTCAGAGCCCTCGGGTCCGGCCAGCA CTCCGCAGGCTTCGTCGGGGTGGTCGCGACGCGCATGGGCCACCATCGCATTCACCAGGTCTGCGCGAATCACCAGCA CGTAGACGGTTCCTTTCCTAAGCAACACCGAAGTTTCAGGACCGAATGCTCCGGGAAACATGTCA :::::::::::::Rv29T7.seq::::::::::::: CAGGCATGCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCAGCCACCACGCCCGGGTCGGGCGCCGGGCC (SEQ ID NO. 372) CGGGCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACGTCGAGCCATACCGG GCGGAGCTCCATCCGCTCGGCCGCCAGTGTCCGGGCCCTC Clone Rv2 :::::::::::::Rv2SP6.seq::::::::::::: CCTGCATCCGGCTCGTATGTTGTGTGGAATTGTGANCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTA (SEQ ID NO. 373) CGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTCCAATCCCCCTGCCCTGATACGCGTCGGCAACCGTGAA CGCGATCTCGGCGACCGTCGGATCGGTTTCATCCCGCACAAAACGCGCGTCGGCTACGGGGTCGCTTCCGTCGGTCAC CACCCAGACGAAGTGGTCGACGTAGTCGACTTCCGACAGGTAGTGCATCAACGCCGGACTGGGAACACNAGCCGACAT GAACCGTCGATACAGCGTCTCNCCGGAGAACTGGATGTGTCCGTGCACGGTCCGCTCGCGGTCACCGGGCAGCACGGG GCGTAACATCAGTTGAGTCCCGTCGGCAAGCCGTACCGGAATCGGGGAGACGA :::::::::::::Rv2T7.seq::::::::::::: CAAGATGATCGCCGGTGCCACCCCGATCCGTGCCTCGGTCAGCGCGAACGTGCTTTCCGGTCCGGCGACCACCATGTC (SEQ ID NO. 374) GCACGCACCGACCAGGCCGAACCCGCCGGCCCGCACATGCCCGTTGATGGCGCCGACCACCGGCAGCGGCGACTCGAC GATGGCGCGCAACAGCGCCGTCATTTCCCGCGCCCGCGCCACCGCCATCCGGTACGGATCACCACCACCACCGCCGGC CTCGCTGAGGTCCGCGCCGGCGCAGAACGTTCCGCCGGTATGCCCCAGCACGACCAGCCGCACCGCCGGATCTGCTTC GGCCGCACTCAGCCCTTGATGTAGTTGGCTGACCAGCGTGCTCGACAGCGCGTTGCGGTTGTGCGGAGAGTTCAGTGT CAGCCTGGCGAAGGGGCCGCCGCAGGCGGCCGGGCCAGCGTAGTCGACGGGGCTG Clone Rv301 :::::::::::::Rv301SP6.seq::::::::::::: CTCAAGCTTCGATCGACAGTACTCCCGCCTTGGGTCTGGTCTTCGAGCTGGTCGGTCATGGTCGGACCTGCTCGTAGT (SEQ ID NO. 375) GGGGATCTAACGCAACATGGTCGGGATTCATCATGGTGTACCCGTGATACCCATTCGCAGCTGCCGGTGAAACCCCGC GATGCCGGGATTTCCAGCCGCACTAGGATGTCTAGCCGGCCAGCCGCTGCCGCCGGACTTCGGGATGTTCGGTATACC ACCGATCGGCAATCTTGCNTATCCGCCGATGCTCGAACGCTAGCCACCCCAAACCAACCACTGTGACNACAATC :::::::::::::Rv301T7.seq::::::::::::: TGAATTTCCCGATCCCACAATCTCGGTTCAGATACAGGTCGCCATACCCCTTACTTCCGCAACGCTGGGCGGATTGGC (SEQ ID NO. 376) CCTGCCGCTGCAGCAGACCATCGACGCCATCGAATTGCCGGCAATCTCGTTCAGCCAATCCATACCCATCGACATTCC GCCGATCGACATCCCGGCCTCCACTATCAACGGAATTTCGATGTCGGAGGTCGTGCCGATCGATGTGTCCGTCGACAT TCCGG Clone Rv302 :::::::::::::Rv302SP6.seq::::::::::::: TACTCAAGCTTGAACGCTGCGAGCGAGCCCATGTAGAGCGTTTGGTACCAAACCGATCGGTGGGCCAACTTGCCATGG (SEQ ID NO. 377) GCTCACAGCGGCTATCGCGAGCGTGTAGCCGATCATCCGCCAGGCGACGGTGGCCTGAGCGGCAGGGGTTGCCTTATC CATCCTCTTGCGGCATGGTTGCCGCAGGGAGTGCCGGTAAGTCTGGTCGGCAACCTGGCCCGCTGCGGGTTGGGTTCG GATTCCCTCGGCTAGTAAGGTGCTCGCCTGGTGTTACAACGAATCGCTAGACAGCTCTTATCGGGAGTGGCCGTCGCG ATCGTTGCGCTGCCGCTGGCGATCGCGTTCGGCNTTACCGCCACCGGAACGTCCCAAGGTGCGCTCATCGGGCTCTAC GGCGCCATCTTCGCCGGATTCTTCCCNGCCGTGTTCGGTGG :::::::::::::Rv302T7.seq::::::::::::: GCGGTGTCTGAACTTCGCCCGTTCCCTCCAGCGCATTGAGCTTCAGCCCGACCGGCAGGTAGGGAGTCGGCATGCGGT (SEQ ID NO. 378) CCTTCGCCCCGACCCCGCTGGCTAAATAGCCACCCCCGAGCGCGGTCACGGTCTTTGCACCGGGACGACGGCATACCG GCAGCGCGAACATCGCCGCGGGCTGCAGCGTGAACGTCGAATACGAGTCGAACAGTGTCGGCGCGTAAAAACCCGAGC CGGCGGTCGCTTCGGTAATCAACGGCTCCTGCGCAACCAGCTGCAANTCNCCGGTGCCACCGGCGTTGACAATCTTGA TNTCGGCGACCTCGCGCACCAN Clone Rv303 :::::::::::::Rv303SP6.seq::::::::::::: TACTCAGCTTCGGCTCAGGTGGTGCTGCTGGTAAAGTTCNCTGAACGGTGCAGGTTTCGACAATGTGGTGCCGGTTCG (SEQ ID NO. 379) GCGGGTACTGCCATCGAGACACTGGCGCAGGCTATCGCACCCGTTATCGGCTACAAACAAATCGCGGTATGCGTTCTT GAGCATGAGTCGGCGACCGTCGTCATGGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCNTGTGTGCCGC GGATTATCAGGACTGACCTCCTGGCTGACCGGCNTGTTTGGTCNCGATGCCTGGCGCCCGGCCGGCGT :::::::::::::Rv303T7.seq::::::::::::: CATCACCTGGTTCATGAAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCAACATGAGCCAGCCTCTCGTCGGCGG (SEQ ID NO. 380) TCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCCGCGACGAACG ACGCCAGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAMCGCGTTCTCCACCGACCGGGCCCGGGTGTGG GGTGTT Clone Rv304 :::::::::::::Rv304SP6.seq::::::::::::: CTCAAGCTTCCCGGCGGCCAGTACCGAAAGCGCGAACAGCTCGCGGCAGCCCACAACNTGCTGCGTCGGATTGCCGGC (SEQ ID NO. 381) GGCGANATCAATTCCAGGCAGCTCCCGGACAATGCGGCTCTGCTGGCCCGCAACGAAGGACTCGAGGTCACCCCGGTG CCCGGGGTCGTGGTGCACCTGCCGATCGCACAGGTTGGCCCACAACCGGCCGCTTGATGCCCGGTCGGCAAGCCCGGC AGTTGCCAAACCCAGCGTGATCAGGCTCGGCTCGCGAGTTCGGCGAAGAAGTGGCTCGCCTGATCACCTACCATCGGC CAGGATCTGCGTGTCATCACNACGCTCGCCAAGGAGGTTGTTGTGGTGCT :::::::::::::Rv304T7.seq::::::::::::: GCCACGTTTCGCGCCGCCCGGCATACGGCGGCGTACCGATCTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGC (SEQ ID NO. 382) CGGTTCGCGAGCCGAAGGTGACGACGCTGATTGAATCGAGTTCCAGGTCCAGCGGGTGGCGCAGCAACGGCGCGAGCT CAACGACGTCAATCACGTTGTCGCTTTCTACGGTCACCGACCCGGTGACCGTAGTCGCCCGGTGCGCTCGGCCGAGAA GTTGCACCGCCACCACCGCGACACCGTCTTGCACGCGGACGCCACCCCCGGATCGGTTGTTGGCCAAGGTAATTGGGT CATTCCATTTGACGGGACGCCGACCCCGCAGCCCCAGTACCGCCCACGACCACGCCGGCTGACCCCACCACTGTACGA ACACCAAGGCGACGCCGACCA Clone Rv306 :::::::::::::Rv306SP6.seq::::::::::::: CTCAAGCTTGATGCCGCCTAAACCGAAGCGTGAGCACGCCGCCACCCACCACGCGCGGGTCGGGCGCCGGGCCCGGGC (SEQ ID NO. 383) CGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACGTCAAGCCATACCGGGCGGA GCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCGAGGTCNAGGTCNATACCGATTTGCGCATCCGCAGCCG CACCCTGGACGACAGAACCGTGCCCTACGAGTGCTTGTCGGGCGGGGCCAAAGAACANCTTGGCATCCTGGCGCGATT GGCCGGCGCGGTCCTGGTC :::::::::::::Rv306T7.seq::::::::::::: CTCGGGTACGCTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGACCTCGTCGGCATCTTCCATAGCCCGCCAC (SEQ ID NO. 384) ACCTTCAGTTGCTCACCGGAATCCAACCGGTANAANGTCGGCGAGCGCTCGGCATTGGTCATCGGGATATGCCGCTCG GGACGGTCAGAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACNCGCATGGGCCACCATC GCATTCACCAGGTCTGCGCG Clone Rv307 :::::::::::::Rv307SP6.seq::::::::::::: CTCAAGCTTCAATTCCTCCACGACGCGTTCCCAAATGAATTTCCCGATCCCACAATCTCGGTTCAGATACAGGTCGCC (SEQ ID NO. 385) ATACCCCTTACTTCGGCAACGCTGGGCGGATTGGCCCTGCCGCTGCAGCAAACCATCGACGCCATCGAATTGCCGGCA ATCTCGTTCAGCCAATCCATACCCATCGACATTCCGCCGATCGACATCCCGGCCTCCACTATCAACGGAATTTCGATG TCGGAGGTCGTGCCGATCGATNTNTCCGTCNACATTCCGGNGGTCACCATCACCGGCACCAGNATCGACCCGATTCCG CTGAACTTCGACGTTCTCAGCAGCGCCGGAACCA :::::::::::::Rv307T7.seq::::::::::::: TTAACCCCCGTGGCCTCTACGCCGCCTNCGGGTCGAACATGCATCCCGAGCANATGCTCGAGCGCGCACCCCACTCGC (SEQ ID NO. 386) CGATGGCCGGAACCGGCTGGTTACCCGGGTGGCGGCTGACGTTCGGCGGCGAGGACATCGGCTGGGAAGGGGCGCTTG CCACCGTCGTCGAAGACCCAGATTCGAAGGTGTTCGTCGTGCTCTACGACATGACCCCGGCGGACGAGAAGAACCTTG ACCGGTGGGAAGGCTCCGAGTTCGGGATCCACGANAAGATCCGATGCCGCGTT Clone Rv308 :::::::::::::Rv308SP6.seq::::::::::::: CTCAAGCTTGATTTTGATCATCATGGATGATCATCACCCGAAGTGTGGTAGCCGCAGTGGTTATCGTGGGTACCGTCG (SEQ ID NO. 387) TGCTTTCCATGGGCGCCTCTTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGGGTATCGAGTTGTACTGGATGG TGTTGGCGATGTCGGTGATCCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAAANG AAATTGGGGCCGGATTGAACACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTGACGGCTGCCGGCATGG TGTTCGCCGTTACCATGTCGTTGTTTGTGTTCAGCGATTTGCGAATTATTGGTCAGAT :::::::::::::Rv308T7.seq::::::::::::: CGNCCAACCCGAATTGGTTTTCGGCGCCNTCGGTGAGGACGGCGTGCGGGTGCTCAACGACGACGTCGTCCGCGGGAC (SEQ ID NO. 388) ACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGCTTCCG CCNCNGGCGTTACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCGACCGC CAAGGCGGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCANACGACAT CGTGGCGAGATTCGCCGG Clone Rv309 :::::::::::::Rv309SP6.seq::::::::::::: CGTGACTGCCACCGGGGCCACTCCGCAGAATCTGTACCCGACCAAGATCTACACCATCGAATACGACGGCGTCGCCGA (SEQ ID NO. 389) CTTTCCGCGGTACCCGCTCAACTTTGTGTCNACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTT CATCCTGACGCCGGAACAAATTGACNCAGCGGTTCCNCTGACCAATACGGTCGGTCCCACGATGACCCANTACTACNT CATTCGCACGGANAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGT TCAACCAAACTTGAAGGTGATTGTTAACCTGGGG :::::::::::::Rv309T7.seq::::::::::::: TCGCTCAAGCGCNTGAGGCCGAANCGGCTGGTTACGACTCCCTGTTTGTGATGGACCACTTCTACCAACTGCCCATGT (SEQ ID NO. 390) TGGGGACGCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGCGACCGAGCGGCTGCAAC TGGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCCGACCCTGCTGGCAAAGATCATCACCACGCTCGACGTGGTTA GCGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGTTGGTTTGAGCTGGAACACCGCCAGCTCGGCTTCGAGTTCGGCA CTTTCAGTGACCGGTTCAACCGGCTCGAAAAGGCGCTACANAT Clone Rv30 :::::::::::::Rv30SP6.seq::::::::::::: ATACTCAAGCTTCCGCTGGGGCCTGTTCAACCATGGCGATCCCGTTGGTCCCGGACATCCCGAACGAGGACACCGCGA (SEQ ID NO. 391) CCCNCTTCGGTGTGTGATCATTACCGTTGGGCCACTGCGTAACCGCTTGCGGCACAAAGAGCCCGGTCTCGACGTCGG AAAGCTCATCGGGCACCCGATTGAAATGCAGCAGCGGCGGCACCACCCCGTGCCGCAGTGACAGAATTGCCTTGATCA GCCCGACGGTCCCCGCCGATGCCGTGCTGTGCCCCATGTTGCTCTTGGCCGATCCAAGCGCGCAGGGGGTGCCCGCGC CATACACCCGCGCCAGGCTGCGGTACTCAATCGGGTCGCCGATTGGCGTACCGGTGCCGTGCGCCTCCACCACACCGA CCGTTTCGGGCTG :::::::::::::Rv30T7PEG.seq::::::::::::: CAACAGCGTTCCAGCGGCATACCACCGCACATGCCGTGCACCCGGCGCCGGGCGGAGTCGCCGCATAACACANGTACA (SEQ ID NO. 392) CCTTGGGAATCGGTGTGCGCCAGGGATTCNACCGCGGGGTGGGGCCGGCGATCGCGCGCCAGGTCGAGTTGGCGCCGA CCGTGATNTCACCGCCGACGTAGTTGGCGTTGTGGTCCGCCATCCGCGCGGCGGGCACGGCGCGGGCCGCCACCACGA TGTCACGGAAGCCGGGGGCGAACGCTCGACGACCTGGTTACCGTCTCNGTCGCNTCNANCGTGGACCCGACNCCACCT GGGCATATGTCCANAACGGACGNGGCCGGTTTCNTCGATGCNGCCGGGGTCCGCGACNTGCGGACNCNCNGNCACACC ATCCGCCAGTCCGCGTGGCGTCCCGCCGCGACTCTGCCTCGGCCGCGCCA Clone Rv310 :::::::::::::Rv310SP6.seq::::::::::::: CTCAAGCTTTGNCGACGATCGGGCGATGTCGATGANAGGAAACCCCAGCGCACAACCGACNATTTTGGCGTAGCCGGC (SEQ ID NO. 393) GGACNTCTGCTCGATTCCGATCACGTCGGCGCTCGCATCGAGCATGGCGCCGGCGACGGCTAGCAGCGATCCGCCGTC GTCGAGGAACACGACACGAGCCGTACGCCCGGCCGTAAGCCGCGCCCAGGATTCGGCGAAAAACCGTTCTACGTGGCG GGTGTACTGGGTGTCCAATGATTCGTGGGGTGCGTAGGCGTCGCTGCAATCGTCGACATAAATGCCGTCGGCCCGCAT CGCGTCAACAACTCCCGGGTGAGTGGAATANCACTTGCCGA :::::::::::::Rv310T7.seq::::::::::::: TCCAACGCGGTGACAGATTTGTCTATCCTGGACCTGACGGTGAGGTCGAAGTTTTCCAGGAATTCGGCAAAATCGGTA (SEQ ID NO. 394) AGAGCCTGAAGAATTCGGTATCGCCGGACGAAATCTGCGACGCATACGGGGCAGATACGCTTCGGGTTTACGAGATGT CGATGGGGCCGCTGGAGGCTTCACGTCCATGGGCCACAAAGGATGTTGTCGGCGCGTACCGTTTTCTGCAGCGGGTGT GGCGCTTGGTCGTCGACGAGCACACCGGCGAAACTCGGGTGGCTGACGGCGTGGAACTCGACATCGATACGCTACGGG CGTTGCACCGCACCATCGTCGGCGTGTC Clone Rv311 :::::::::::::Rv311SP6.seq::::::::::::: CTCGTCCTTGACTACGCCCAGTATCGAAANCCTCCTGTGCCGGTNCGCTAAACACCCGGCGGACACTCANACGGTGCT (SEQ ID NO. 395) GGTGGTGCGGCATGGCACCGCGGGCAGCAAAGCGCACTTCTCCGGGGACGACAGCAAGCGACCGCTAGACAAGAGGGG TCGTGCGCAGGCAGAAGCGTTGGTACCACAGCTGCTGGCGTTCGGCGCCACCGATGTTTATGCCGCCGACCGGGTGCG CTGCCACCANACNATGGAGCCACTCGCCGCGGAACTGAACGTGACCATACACAACGAGCCCNCCCTGACCGAAGAGTC CTACGCCAACAACCCCAAACGCGGCCGACACCGAGTGCTGCAGATCTTCG :::::::::::::Rv311T7.seq::::::::::::: GTATCGCCTCCNCCTTTGGCCACCAGCAGCCACAGCGCGGTTCGCGGACCGAACGTGGACATCAATAGCCCGGAATCG (SEQ ID NO. 396) GTGTGTGCAAGTTGGTAAACGGTGTTGATCCCAAGCTTTGCCAGCCTTTTCGTAGTCTTGGGCCCCACACCCCACAGT GCTTCGACGGTACGGTCACCCATGATGGCCATCCAGTTGGCATCGGTGAGCTGATAGATGCCAGCTGGTTTGGCCAAC CCGGTAGCGATCTTGGCGCGCTGCTTGTTGTCACTGATACCTATCGAGCAAGACAGCCCGGTTTGCGACAAGATGACT TTTCGGATCTCTTCNGCGAACTTCCAATGGGGGTCTCCGGGANT Clone Rv312 :::::::::::::Rv312SP6.seq::::::::::::: CTCAAGCTTTTGGTCTAGCCGGCCGAGCACGATACGGGTGTCCTTGGCCACCGGCGGCGGCTCTCCGGGAAATGGCGG (SEQ ID NO. 397) GTCCCCGGTGGTTTTGCTGANGANTGCTGAACCGTAGTCGAAGTGGGCGGCGTCAGACTCCACCCAGCCAGCAGGCAG CGCGAAGCTGAATCCTCCAACCGGGTTGTCGATCCGGACAGGTTGGGGTGCGTTTGGGGCAATGACAGGTGGCGGCGG TGCGTTCGGGTCGGCCGGCGGAGGTGCTGCGTTGGGATCNCCCGGCTGGGCATTCGGCNTNTTGGCGGCGGCCGGTGG TGGGGGGGCAACANGTGTCCCGGTGCGGGTGGCGCTGC :::::::::::::Rv312T7.seq::::::::::::: ATCTGTACCCGACCAAGATCTACACCATCGAATACGACGGCGTCGCCGACTTTCCGCGGTACCCGCTCAACTTTGTGT (SEQ ID NO. 398) CGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCGGAACAAATTGACGCAG CGGTTCCGCTGACCAATACGGTCGGTCCCACGATGACCCAGTACTACATCATTCGCACGGAGAACCTGCCGCTGCTAG AGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGTTCAACCAAACTTGAAGGTGATTGTTAACC TGGGCTACGGCGACCCGGCCTATGGTTATTCGACCTCGCCGCC Clone Rv313 :::::::::::::Rv313SP6.seq::::::::::::: CTCAAGCTTGCAATGCGGGTCGGGATGCCCATGGTTGGAANATGGTCGCCCTGGCGTCNAATACGCGCGAGCGCATGA (SEQ ID NO. 399) GCTCACCGGTTCGGAACAACGTATCGAAAAACGTCGCACTGCTGGCAGATGGTATCTCCGATGTGGTTGTAATTTGTA TCCCAACTCTAACTGTGCTATCGGATCAGCGTGAATATCGANATATTGCGAATGCGATGACAGGCCGCCATTCGGTTT ATTCGCTTACGCTTCCCGGGTTCGATTCGTCTGATGCACTGCCGCAAAACGCGGATATGATTGTTGAAACCGTATCTA ACGCAATTATTGATGTGGTAGGCGGCAGCTGCCGTTTTGTGCTGTCGG :::::::::::::Rv313T7.seq::::::::::::: CAAATACACGCCGGACGCACAGGCGGACATCGCCATCCCGAGCACACCCAAAACGGGATACAGGATCGAGGCCAACGC (SEQ ID NO. 400) CACGGCCGCGCCCAGGATCACCAACCACACCGGCTTGGTCAGCTTGTCGGCGCGGTATAGGCATCGGGCCGCTGCCAA CGCAGCATGCACAAACGCGTACACCGCTGTCACCAAGACGGCGACCAGCAATACCAGCATGACGGTACCCACGAGGTG GCTCACGCATTCAGACTATGCGGTTTGCATCCAACACG Clone Rv314 :::::::::::::Rv314SP6.seq::::::::::::: CTCGTCCTTCGGCCTCGCTGCAGGAGTGGGAGCCGCAGGGCTGGAAATCCGAAAAACGAGCCGGTGATCGCACTGTCG (SEQ ID NO. 401) CCGATCGGCGCCGCACCTGGTTGGTGTTACGGATGAATCCGCAGCGAAATGTGGCTGCGGTGGCGTGTCGTGACTCGT TGGCGTCGACGCTGGTGGCAGCCACCGAGCGGTTGGTCCAGGATCTGGATGGGCAAAGTTGTGCGGCCCGGCCGGTGA CGGCCGATGAGCTGACCGAGGTCGACAGCGCCGTGTTGGCTGACTTGGAACCGACATGGAGTCGCCCCGGTT :::::::::::::Rv314T7.seq::::::::::::: GTCTAGNCCGCCGAACACGATACGGGTGTCATTGGCCACCGGCGGCGGCTGTCCGGGAAATGGCGGGTCCCCGGTGGT (SEQ ID NO. 402) TTTGCTGAAGANTGCTGAACCGTAGTCGAAGTGGGCGGCGTCAGACTCCACCCAGCCAGCAGGCAGCGCGAAGCTGAA TCCTCCAACCGGGTTGTCGATCCGGACAGGTTGGGGTGCGTTTGGGGCAATGACAGGTGGCGGCGGTGCGTTCGGGTC GGCCGGCGGAAGTGCTGCGTTGGGATCGCCCGGCTGGGCATTCGGCGTGTTGGCGGCGGCCGGTGG Clone Rv315 :::::::::::::Rv315SP6.seq::::::::::::: ACTCAAGCTTGAGATTGGCGTCAACGGGTGTCGGCACCGGCGTCCTGCAGTTGGTAGGCCTGCAGTTTGTGCATCAGC (SEQ ID NO. 403) CCGATGCCGCGGCCCTCGTGGCCACGCATGTACANCACCACGCCGCGCCCCTCACGGGCGACCATCGCCAGCGCGGCG TCCAGCTGAGGCCCGCAATCGCAGCGGCGTGACCCAAACACATCGCCGGTCAAGCACTCCGAATGCACCCGGACCAGC ACGTCG TCACCGTCGGCGTTGGGCCCGGCGATCTCGCCGCGGACCAGCGCGACATGTTCCACGTCCTCGTAAATGCTGGTGTAN CCGATGGCGCGAAACTCCCCATGACAANTCGGAATCCCGCGCCTCGGCGACCCCGCTCAATGTTGCTTCTCNTGCTTG :::::::::::::Rv315T7.seq::::::::::::: TCGACNAGCATTCTTGACNGTTGTTTTGGCTCGGCATGGTTAGCCAAGGTTCTGCGGTCCCACCAGATCATCTTGGTC (SEQ ID NO. 404) CGGTAGCGCTCGTCCGGGTATGCTGCCGCCGGGATTCTCGCTGCTATTACTCCCCCCGAAGAACGCCACCGGTCCAGC GCGTGGGCCGCCGCGGTCCCCATCACAAACTGAACCCCCAACAGGGGACATGCTTAGCCGTAGGGCGCGCGCCAAGGC GGCAGCAATCGCATCACTGCGCTGCGCGTCACTATTAACCCACCCGGACTTCACTTCCACGACCCCGAATGGCGCCCG GTCATTGATCATCTTGCGCACCGCGGATAATCCGGGAT TG Clone Rv316 :::::::::::::Rv316SP6.seq::::::::::::: ACCGGGGCCACTCCGCACAATCTGTACCCGACCAANATCTACACCATCGAATACGACGGCGTCGCCGACTTTCCGCGG (SEQ ID NO. 405) TACCCGCTCAACTTTGTGTCNACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACG CCGGACAAATTGACGCNGCGGTTCCGCTGACCAATACGGTCGGTCCCACNATGACCCANTACTACATCATTCGCCACG GANAACCTGCCGCTGCTAAAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGTTCAACCAAAC TTGAAGGTNATTGTTNACCTGGGCTACGGCGANCCGGCCTNTGGTTATTCCACCTCNCCGCCCAATGTTTGCNACTCC CGTTCGGGGTTGTTCCCNNAAGGTCAACCC :::::::::::::Rv316T7.seq::::::::::::: CGCTCAAGCGCNTGAGGCCGAANCGGCTGGTTACGACTCCCTGTTTGTGATGGACCACTTCTACCAACAGCCCATGTT (SEQ ID NO. 406) GGGGACGCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGCGACCGAGCGGCTGCAACT GGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCCGACCCTGCTGGCAAAGATCATCACCACGCTCGACGTGGTTAG CGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGTTGGTTTGANCTGGAACACCGCCAGCTCGGCTTCGAGTTCGGCAC TTTCAGTGACCGGTTC Clone Rv317 :::::::::::::Rv317SP6.seq::::::::::::: CTCAAGCTTGCGTTCGATGAAGTAGTCGTCGGTCAGCGCCGCCTCTTCGAGCTCCTTCGCGATGCCCAGCAAGGAGTC (SEQ ID NO. 407) ATCGCCGCCGAGCTTGGCCAGGATCTTGTCGGCCTGTTCCTTGACGATGCGGGCCCGCGGATCGTAGTTCTTGTAGAC ACGATGACCGAAACCCATCAATTTGACCCCGGCCTCGCGGTTCTTGACCTTGCGTACAAACTCGCTGACGTCGTGGCC GCTGTCGCGAATGCCCTCGAGCATCTCCAGGACAGCCTGATTGGCGCCGCCATGAAGCGGACCCCATAGTGCGTTGAT GCC :::::::::::::Rv317T7.seq::::::::::::: GGTCAGGCCGAGCAGGCGCGAGGAACGACGAACCCAACAAGCCATGGTGGTTGGCGCCGTCGAGAGGTCGGCGGTCGC (SEQ ID NO. 408) CACAACGGGAAGATCGCCTTGAGCGTCGCTCGACCGCCGCCTCGAGTTGGGTCATAACGAAGTAGCTGATGCCGATCA TGTCGACGTTTCCGTCGCATCAGCGTGCAGCGGCGACCCACTCNACGAGGTCTCGGTGCCGCCGCGGCCAGGGCACCA GCAGTGACGAGTCCAGGCGCCGTCGGGCCAAGCAGTCGCGGTGCCANCCGTGGTGGGTCGGGCGATGGTTGGGTGTGC TCATTTCGGGAACGCCA Clone Rv318 :::::::::::::Rv318SP6.seq::::::::::::: CTCGAAGCTTTAACAGCATCAACCCCGCCCCGCACCAGCACCGACACNATGTCGATGCCATCGAGGTGAATGTCGAAC (SEQ ID NO. 409) TGGCGCAAACCATCGGCGACCGCGACCACCGGCAACATGGGTACCGGCGATTTCCGGTGCCAATGCCGACCCGACGGG CCGCTCTCACCGCAGGTGACCTCGATCACCGAGACCANCCGGCCGTTNTNNTCACGCACCCCTACCGTGTCACGCCCA AAACGGCGCTGGTGGTCGATTGCCGGAGTGCACCCCNCACCCAGTGTCGTGCCCGGATCC :::::::::::::Rv318T7.seq::::::::::::: TGATGCCGCACCCGATCGACGGTCGTTGGTCGGGGTTGACTGGCCGCCCGGCGAAGCAGGGCGTCGACCGCGGCCCGG (SEQ ID NO. 410) ACGTCGGCGGCCGTCACCGGTCGGCCATTGCCCGGGCGGGAGTCGTCGAGCTGACCACGGTAGACAAGTCGGCGCTGG CCGTCGAAGACNAACGTGTCGGGTGTGCAGGCCGCGGAGAAGGCGCGGGCGACNTCTTGGGTTTCGTCGTANAGATAC GGGAACGTCCAGCCGTGGCGGCGGGCCTCGGCGACCATCTGATCGGGCCCGTCC Clone Rv319 :::::::::::::Rv319SP6.seq::::::::::::: TTTCGGGCGAGGCGGTATANCTTCCCNTCGTACCGGCGACCGCCAGCCGANAAGCTCGTTTTCCCAGTGTTGCTGGGG (SEQ ID NO. 411) ATTCTCACGCTGCTGCTGANTGCGTGCCAAACCGCTTCCGCTTCGGGTTACAACGAGCCGCGGGGCTACNATCGTGCG ACGCTGAAGTTGGTGTTCTCCATGGACTTGGGGATGTGCCTGAACCGGTTCACCTACNACTCCAAGCTGGCGCCGTCT CGTCCGCAGGTCGTTGCTTGCGATAGCCGGGAGGCCCGGATCCGCAATGACGGATTCCNTGCCANCGCTCCGAGTTGC NTGCGGATCGACTACNAATTGATCACCCANAACCATCGGGCGTNTTACTGCCTGAAGTACCTGGTGCGGGTCGGATAC TGCTATCCGGCGGTGACAACCCCGGCAAGC :::::::::::::Rv319T7.seq::::::::::::: GTTTTGGCTCGGCATGGTTAGCCAAGGTTCTGCGGTCCCACCAGATCATCTTGGTCCGGTAGCGCTCGTCCGGGTATG (SEQ ID NO. 412) CTGCCGCCGGGATTCTCGCTGCTATTACTCCCCCCGAAGAACGCCACCGGTCCAGCGCGTGGGCCGCCGCGGTCCCCA TCACAAACTGAACCCCCAACAGGGACATGCTTAGCGGTAGGGCGCGCGCCAAGGCGGCAGCAATCGCATCACTGCGCT GCGCGTCACTATTAACCCACCCGGACTTCACTTCCACGACCCCGAATGGCGCCCGGTCATTGATCATCTTGCGCACCG CGGATAATCCGGGATTGCCAGCCCATTCNACTACCGCATGCGAGTCATCGGCTGACCGCAGCGGTC Clone Rv31 :::::::::::::Rv31SP6.seq::::::::::::: TCGCCTAGGCGGGCTTCCCCTTCCGTCCGAGCNGTCAGAAGCTCCTATGACAATGCACTACCCGAGACNATCAACGGC (SEQ ID NO. 413) CTATGCAATACCNAGCTGATCAAACCCGGCAAGCCCTGGCGGTCCATCGAGGATGTCGAGTTGGCCACCGCGCGCTGG GTCGACTGGTTCAACCATCGCCGCCTCTACCGGTACTGCGGCGACATCCCGCCGGTCTAACTCGACGCCGCCTCACTA CGCTCAACGCCAGAGACCANCCGCCGGCTGACGTCTCAGATCAGAGAGTCTCCGGACTCACCGGGGCGGTTCATCCCC ACTGTCGATAGCGTCTGTGGATAACTTTGTCTGCA :::::::::::::Rv31T7.seq::::::::::::: GCGCGTNGAACTGATAGGTGCGGCCCGGCTCGAGCANGCCGGCCATTTGTTCGATGCGGTTACCGAAGATCTCTTCGG (SEQ ID NO. 414) TGACCTGCCCGCCGCCGGCCAGCTCGGCCCAGTGCCCGGCGTTGGCCGCCGCGGCGACAATCTTGGCGTCCACGGTGG TCTGGGTCA Clone Rv321 :::::::::::::Rv321SP6.seq::::::::::::: CTCAAGCTTCAATACAGAGTTATAAACTGTGATAATCAACCCTCATCAATGATGACNAACTAACCCCCGATATCAGGT (SEQ ID NO. 415) CACATGACGAAGGGAAAGAGAAGGAAATCAACTGTGACAAACTGCCCTCAAATTTGGCTTCCTTAAAAATTACAGTTC AAAAAGTATGAGAAAATCCATGCAGGCTGAAGGAAACAGCAATAACTGTGACAAATTACCCTCAGTAGGTCAGAACAA ATGTGACGAACCACCCTCAAATCTGTGACAGATAACCCTCAGACTATCCTGTCGTCATGGAAGTGATATCGCGGAAGG AAAAT Clone Rv322 :::::::::::::Rv322SP6.seq::::::::::::: CTCAAGCTTCGATCGACATTACTCCCGCCTTGGGTCTGGTCTCCGAGCTGGTCGGTCATGGTCGGACCTGCTGGTAGT (SEQ ID NO. 416) GGGGATCTAACGCAACATGGTCGGGATTCATCATGGTGTACCCGTGATACCCATTCGCAGCTGCCGGTGAAACCCCGC GATGCCGGGATTTCCAGCCGCACTAGGATGTCTAGCCGGCCAGCCGCTGCCGCCGGACTTCGGGATGTTCGGTATACC ANCGATCGGCAATCTTGCGTATCCGCCGATGCTCGAACGCTANCCACGCCAAACCAACCACTGTGACNACAATCGCCA CCACACCAAAGGTCATGCCCTCGGCGTGATGTCCGGTGCCGAAAGCCGCAAGAGCTCCGACGCCGCC :::::::::::::Rv322T7.seq::::::::::::: CATTCCCAATTGAATTTCCCNATCCCACAATCTCGGTTCAGATACAGGTCGCCATACCCCTTACTTCGGCAACGCTGG (SEQ ID NO. 417) GCGGATTGGCCCTGCCGCTGCAGCANACCATCGACGCCATCGAATTGCCGGCAATCTCGTTCAGCCAATCCATACCCA TCGACATTCCGCCGATCGACATCCCGGCCTCCACTATCAACGGAATTTCGATGTCGGAGGTCGTGCCGATCGATGTGT CCGTCGACATTCCGGCGGTCACCATCACCGGCACCAGGATCGACCCGATTCCGCTGAACTTCGACGTTCTCAGCAGCG CCGGACCCATCAACATCTCGATCATCGACATTCCGGCGCTGCCGGGCTTTGGCAACTCGACCGAGCTGCCGTCGTCGG GCTTCTTCAACACCGGCGGCGGTGGCGGCT Clone Rv327 :::::::::::::Rv327SP6.seq::::::::::::: CTCAAGCTTTCGGCGGAGACGGACANNTTGCGAACATTGATGACAAAATAGAAATCATTGATGGTTTGAGTCACCAGG (SEQ ID NO. 418) CCGATCAAGCCTTCGCCGAGCCAAATTCCAATCAAGAGGCCCAAGCCCGTACCAATCAGCCCGGCAACGAGGGATTCC GTCATTATCAGCCAAAATAACTGCTCTCGGGTTACACCCAAACAGCGCAATATGGCGAAAAACGGTCGCCGTTGCACG ACATTAAATGTCACGGTATTG :::::::::::::Rv327T7.seq::::::::::::: AGCTTAACTGCTCCCTAATACCTGGGGCTGTGCCTGCGGTGTATGCACGGCATACGGACATCCNTCCCCTGAGACCCN (SEQ ID NO. 419) CGGTCTAATCAGCCACGTGTCCACCATCAGGGGTCAACCCCGGCCAAGGGCGACGGCACCCCAAGTTCGCCGACCGTT AACCTATTGCTGTGAGCTTCATTTGCTGCGAGCAAAACAGTTGGTCGGCCGTTAGGAACTGAATTGACACTCAACCGA TTTGGTGCCNCCGTAGGTGTCCTGGCTGCGGGTGCGCTGGTGTTGTCCGCGTGTGGTAACGACCACAATGTGACCGGG GGAGGTGCAACCACTGGCCACGCGTCCGCGAATGTCTATTGCGGGGG Clone Rv328 :::::::::::::Rv328SP6.seq::::::::::::: CTCAAGCTTGGGGTGGCGCTGTCGGTCGGTGTGCTTGGCGGCGTCGGTATCAACACCGCCCACGAAATGGGGCACAAG (SEQ ID NO. 420) AAGGATTCGCTGGAGCGGTGGCTGTCCAAAATCACCCTCGCCCAGACCTGCTACGGGCACTTCTACATCGAGCACAAC CGTGGCCATCACGTCCGGGTGTCCACACCGGAGGACCCGGCGTCGGCGCGGTTCGGCGAAACGTTGTGGGAGTTCCTG CCCCGCAGTGTTATCGGCGGCTTGCGCTCGGCCGTTCATTTGGAGGCCCAACGGCTGCGTCGGCTCGGCGTCAGCCCC CT :::::::::::::Rv328T7.seq::::::::::::: GCACCAAGGCCCCACACGTCACCCTGTGACCTCCTGCGCCGACCCCGCCCGAGGTCCTGGCCGTTACCACCTGAACGG (SEQ ID NO. 421) GCGAGCCGGGAGTCTGGTACGCATCGAACAAAGAGCAAGGTGCATGGGCGGAGTTGTTCCGCCACTTCGTCGATGACG GGGTCNATCCATTCGAGGTCCGTCGCCGCGTCGGTCGAGTGGCGGTCACACTCCAGGTACTCGACCTCACAGACGAGA GGACTCGATCCCATCTAGGTGTGGACGAAACAGATCTTCTGTCCGA Clone Rv329 :::::::::::::Rv329SP6.seq::::::::::::: TCGCCTCCGCATATGGGTCGACGCCAAGCGGGTCCGGATTTCTGGGCTTCATCGCTCGCGCCGTCGCGACAAACAGCG (SEQ ID NO. 422) CGGTCGAACCGACACTCGTTGTGATGTCCCAGCTATCACCTTCGGTACGCACCCAATCGACCCTACNCGGCTATCTCA GCCGCGATCTCCAGGCTCCGCCGAGCCAGGTGCATCCCGGTCCGGATCCCACTAACCCGGCACCATTGGCGTCN :::::::::::::Rv329T7.seq::::::::::::: GTCCTCGAGTGCCGCCGTCGNCACNCCCAGCGCCCGCGCGGCCACTTGGATGCGACCCGTTTCAAGTCCCTTCATCAT (SEQ ID NO. 423) CTGCGAAAAGCCTTGACCCATGGCTCCGCCCAGGATCCCCGAGACCGGCACCCGGAGGTTGTCGAACGACAGCTCGCA GGATTCGACGCCCTTGTAACCCAACTTCGGCAAGTCCCGCGACACCGTGAGTCCCGGCCCGGGTTCGACGAGCACGAT CGACATGCCTTGGTGCCGCGGTGTGGCGTTCGGGTCGG Clone Rv32 :::::::::::::Rv32SP6.seq::::::::::::: GGCATACCAATGTGGACTTCTGCTCACCCACGATATCCGTGGTCTGATCCGCTGCTGCGGCGGGCTGCNACCTGCNTC (SEQ ID NO. 424) TCNGCGGCACCCGTNACTACATGGCNCGCGCCGCACGCATACGTCGCGGCGGGACCCACTCCNACTGGTCGACGGTGC TGGCCGCGTGTCCGCANGTCCCNAACCCGGCCGCACCGACGAAACCGGCCGCCGTCCGTTCTGGACCAACGCTCATGT GCCGTCGGGGTCCATGCTCGACGCCATCGAGACCGTAACCAGCGTCCTCGAGCGGTTCGCCTCCGGCTTCCGTGACAT CTTCGTGGCTGCTCGCGCCGTGCCGCCGCGCGGATGGTCGACCACAACGCCAACCACCTCGGCGGTGACATCACCGTC CGCGCCACTCGACCTGGCGCGCGATCGCGGCCC :::::::::::::Rv32T7.seq::::::::::::: GTGAGCAGACCTACGCCNCCTGGTTGCGCCAACTCGGTACCGATCATGGCGCGCNGCCTGTCGTCACCGATACCCAGC (SEQ ID NO. 425) GAACAAGACAGCCCGGTCCGCGACAAGATGACTTTCCCGATCTCTTCGGCGACTTCCATGGGGTCGTCCGGAGTCCCG GGCGCCACCGCGAGGTAACCCTCGTCTCAGTCCCATACGCGACCGGGTATCCACGTCGCGCAACAACGCCACCACCTC CCCAGACGCCNCGTTGTACGCGGCTGGGTTCCACNGCAATAAGTGGCCTCANGGCATCGTCCGGCGGCGGTCCNCAAC GCA Clone Rv330 :::::::::::::Rv330SP6.seq::::::::::::: CTCAAGCTTGAGGTTAACTTTGAACGGATCGAGCTGGACGTTCGAGACGGTGATCGGGCCGAACCTGAATTGTCCGGT (SEQ ID NO. 426) AATGCCCAACGCAAAAAGCAGGGTGGTGGCCGGGGCGGTGAAACCGGCGTCGGCGGCACCGTCGAAATCTATGTGGAT TGCCGGAATGGGGATGTCCGGCACGGCGAAACCGTAGTTCGCTTGTCCCGTGAGGCCCACGTGGATGGGGGGAAAGAT CCTGGTGTCCGGGATAATAATGGGGCCGATGCCGCCGGTTGAAGTCCACTGGATCGGGAATTCCGGAATCTTGATCCG ACGTTCAGGCCGAACAGGCCCTC :::::::::::::Rv330T7.seq::::::::::::: CGGCGACGTCGCGATACGCCGAGCAGTTGGGAATCGCTCTGCAGCAAACCAATATTCTGCGCGACGTTCGAGAGGACT (SEQ ID NO. 427) TTTTGAATGGACGGATCTACCTGCCGCGCGACGAGCTGGACCGATTAGGCGTACGCCTCCGCCTGGACGACACCGGGG CACTCGATGACCCCGACGGACGGCTCGCGGCNCTGCTGCGGTTCAGTGCCGACCGCGCCGCAGACTGGTNTTCGCTGG GACTGCGGCTGATTCCACACCTCGACCGCCGCAGCGCTGCCTGCTGTGCGGCCATGTCTGGCATCTACCGCCGTCAGC TCGCCTTGATCAGAGCATCGCCGGCGGTCGTCTA Clone Rv331 :::::::::::::Rv331SP6.seq::::::::::::: CTATAAAATACTCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCAGCCACCACGCGCGGGTCGGGCGCCG (SEQ ID NO. 428) GGCCCGGGCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGNTGCGCTACGTCNAGCCATA CCGGGCGGAGCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCGAGGTCNAGGTCNATACCGATTTGCGCAT CCGCAGCCGCACCCTGAACNACANAACCGTGCCCTACTATTGCTTGTCNGGCGGGGCCAAAAAACAGCTTGGCATCCT GGCCCNATTGGCCGGCGCGG :::::::::::::Rv331T7.seq::::::::::::: CTTCGGTCGCAGTGTGCGAGTGATAGATGACGACCGGGACCTGCTCGGCATCTTCCATAGCCCGCCACACCTTCAGTT (SEQ ID NO. 429) GCTCACCGGAATCCAACCGGTAGAAGGTCGGCGAGCGCTCGGCATTGGTCATCGGGATATGCCGCTCGGGACGGTCAG AGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACGCGCATGGGCCACCATCGCATTCACCA GGTCTGCGCGAATCNCCANCACGTANACNGTTCCTTTCCTAA Clone Rv333 :::::::::::::Rv333SP6.seq::::::::::::: CTGGCACCAAGGCCCCACACGTCACCCTGTGACCTCCTGCGCCGACCCCGCCCGAGGTCCTGGCCGTTACCACCGAAC (SEQ ID NO. 430) GGGCGAGCCGGGAGTCTGGTNCGCATCGAACAAANAGCAAGGTGCATGGGCGGAGTTGTTCCGCCACTTCGTCGATGA CGGGGTCNATCCATTCGAGGTCCGTCGCCGCGTCGGTCNAGTGGCGCTCACACTCCAGGTACTCGACCTCACAGACNA AAGGACTCNATCCCATCTAGGTGTGGACNAAACAGATCTTCTGTCCGACNACTACACCACCACCCAGGCCATCGCCGC CGCCCGCGATGCCAACTTCGACGCCGTACTGGCCCCGGCGGGGGGCGCTCCCCGGTTGTCAACACTTGCCGTGTTCNT TCACGCNCTGCCCCACATCCAACCCCAACG Clone Rv334 :::::::::::::Rv334T7.seq::::::::::::: GTTCTTGGGCCCATGCGGAGGTATCGCCGTTTCCACCACGCGGTCGGGGTGGCGTTGCATTAGCTCACCGATGGTGCG (SEQ ID NO. 431) CTTGTGCAGGCCGCCGGGATACCCCGAGTGCCGGTAAACCATCTTGTGCTGC Clone Rv335 :::::::::::::Rv335SP6.seq::::::::::::: CAATACTCAAGCTTGGCGTGCCGTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTCA (SEQ ID NO. 432) ACNACNACGTCGTCCGCGGGACACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAAGTAC AACGCCGCGCGGAACGCTTCCGCCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATC :::::::::::::Rv335T7.seq::::::::::::: CNTCATGATGATCATCACCCGAAGTGTGGTAGCCGCAGTGGTTATCGTGGGTACCGTCGTGCTTTCCATGGGCGCCTC (SEQ ID NO. 433) TTTCGGGCTTTCCGTATTGGTCTGGCAGGACATTCTGGGTATCGAGTTGTACTGGATGGTGTTGGCGATGTCGGTGAT CCTGCTCCTGGCGGTGGGATCCGACTACAATCTGCTGCTGATTTCCCGGTTGAAAGAGGAAATTGGGGCCGGATTGAA CACCGGAATTATCCGTGCCATGGCTGGTACCGGGGGAGTGGTGACGGCTGCCGGCATGGTGTTCGCCGTTACCATGTC GTTGTTTGTCTTCACCCATTTGCGAATTATTGGTCAGATCGGTACCAC Clone Rv336 :::::::::::::Rv336SP6.seq::::::::::::: ATACTCAAGCTTTTACGGTGATCGCNCATCACCTGGTTCATGAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCA (SEQ ID NO. 434) ACATGAGCCAGCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCNACAGCCGCCTGACCCTGAAAC CAGCTTCCATATCCCGCGANNAACGACGCCAGTCCGCTACGTNACCCCTCCGCGACTCTCCATGGACAACAGCCCCTT CTCCACCGACCGGGCCCGGGTGTGGGGTNTT :::::::::::::Rv336T7.seq::::::::::::: GCTGGTAGAGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTCGGCGGCTACGTGCCATCGAGACACTGGC (SEQ ID NO. 435) GCAGGCTATCGCACCCGTTATCGGCTACGAGCAAATCGCGGTATGCGTTCTTGAGCATGAGTCGGCGACCGTCGTCAT GGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGCCGCGGATTATCAGGACTGACCTCCTGGCT GACCGGCATGTTTGGTCGCGATGCCTGGCG Clone Rv337 :::::::::::::Rv337SP6.seq::::::::::::: GCTTTCCGCCGATACCCGCCATGTCNCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCGGGATCCCAAAG (SEQ ID NO. 436) TGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGACTCGGTCCACGC GGTGCGGCACATGGTGGACACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCANCACTCAATGC CGACCAGGCCGAGGCCGGANACAAAANTATCGCTAAGGTCACCGCGATCACNAGCATGGTGATCGCAGCAATGTTGCT AGTGATCTATCGCTCCGTAATTA :::::::::::::Rv337T7.seq::::::::::::: CTTCCAACCCGAATTGGCTTTCGGCGCCATCGGTGAGGACGGCGTGCGGGTGCTCAACGACGACGTCGTCCGCGGGAC (SEQ ID NO. 437) ACACCTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGCTTCCG CCGCGGGCGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCGACGGC CAAGGCGGCGTGCCANGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCA Clone Rv338 :::::::::::::Rv338SP6.seq::::::::::::: TACTCAAGCTTCGCGAGATCCGGATGGCACTCACGCTGGACAAGACCTTCACAAAATCTGAAATCCTGACCCGATACT (SEQ ID NO. 438) TGAACCTGGTCTCGTTCGGCAATAACTCGTTCGGCGTGCAGGACGCGGCGCAAACGTNCTTCGGCATCAACGCGTCCG ANCTGAATTGGCAGCAAGCGGCGCTGCTGGCCGGCATGGTGCAATCNACCAGCACGCTCAACCCGTA :::::::::::::Rv338T7.seq::::::::::::: CCCACGACTTTCTCCTCGATCACTTGGATTTGTACGAAGAGGCAACGAAAGCAGTGATCCTCGGGATGGTCGACGCCT (SEQ ID NO. 439) ACATCGACCCGCCGTTCACGCCGCACAGCCTGCTAGATGCGCTGGGCGAGCAGGTCCCACAGTTCGCCGCTAAGGCAC GGCGTCTGTTCCCGTCCGGATCGCCATTCGGCCTCGGCGTCCTGCTCCCATTCGATCAATAGGGCTGGCAGCTCCGTC GGCAGGGGCCTACGCCTCACCCCGTCACG Clone Rv339 :::::::::::::Rv339SP6.seq::::::::::::: CTCAAGCTTATGCGCGCCGGCCGAGGTCTGCTCACGGCAACCCCTGAAGTTTAGGGGACNACCTACTCAGCGCAAAAT (SEQ ID NO. 440) TTCGCTAATGTGAGTCCGCCCCACCAGGGGNANATCAACCCATGTCGATCATGATCTACCCGGATACCGGATTGGCGG TAGCGCCCACGATCGTCNAAATNTCCGCCTGAATCATCGGATAGCTGATCCGGCGTCAACGCGTTTTGANTTCACCGC GCAACAGCCGCCAGGCCGGCCCGCANCGANCCGATCTCNTCGGGCCGCATGGGCCCCAATCTTNTCG :::::::::::::Rv339T7.seq::::::::::::: GTGTGTGGTGGAACCCATCTGAGCAGTGTGCCAAACCGGGGCAGACAGCTCCCAATTGACGTGAGCCCGCTCACTTGC (SEQ ID NO. 441) TGGGTAAGCGTC Clone Rv33 :::::::::::::Rv33SP6.seq::::::::::::: CTTTACACTTCCTGCATCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATG (SEQ ID NO. 442) ACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGGGCGTGACGGCCACCGGGGCCACTCCG CACCATCTGTACCCGACCAAGATCTAC :::::::::::::Rv33T7.seq::::::::::::: CAGGCATGCAAGCTTTAGCTGCCCGAATGCGTCACCCCGATGCGCCCAGATCGGGGCTTCGCACATAAAGCACGAACA (SEQ ID NO. 443) GGCGGGCAAAACGTCNATCTCGGAGCCGGAAGGGCAATCAGCCGACCGTCGACGAACGACACCGGCGAGACCACTTAG GCAGTGACGGCCGGCCCGAACATTACGCGCTCGTTGATTAGGCGTTCGGTCTCGTCCGCGGTCATGCCGAGCAGCTTG CGGCAGATCTGAACGCTGTCCTGTCCGGGCAGCGGCGCCGGGCGTTGGGGTGCCTGCCCGAATGTGACGAAACGGAGC CGGACCCGTCTCGGCGGGCCGCGGACGGCGATCCGC Clone Rv340 :::::::::::::Rv340SP6.seq::::::::::::: CNCAAGCTTGCGGATGTTACCCCTGACAGCCTGAACTATGTCNAAACACACGGCACCGGAACGTTGTTGGGGGACCCC (SEQ ID NO. 444) ATCGANTTCGAGTCGCTGGCGGCCACTTATGGCCTGGGTAAAGGCCAGGGCNANAGCCCGTGCGCATTGGGGTCGGTC AAAACCAACATCGGCCACCTGGAGGCGGCCGCCGGTGTGGCTGGATNCATCAAGGCGGTGCTGGCGGTGCAACGTGGG CACATTCCCCGCAACTTGCACTTCACCCGGTGGAACCCGGCCATCNACGCGTCGGCNACGCGGCTGTTCGTGCCNACC NAAAACCCCCCGTGGCCGGCGGC :::::::::::::Rv340T7.seq::::::::::::: GGAACCGGTAACCAGATCAGCTCGTCGACCTCACTGCCGGGGGTGAATTCCCCACCGGTGCTGCGCGCTGCCCAGTAG (SEQ ID NO. 445) TGCACCTTCTTGACGCCTCGAAAAGGGGAGTCGGTCGGGTAGGTCACCGTCAGGAGCCGCCTACCCAGGTTGGCGCNA TAGCCGGTCTCCTCGAGTATCTCCCGCACCGCCCCCACCGGTGCGGTCTCACCCANATCCACTTTGCCCTTGGGCAGC GACCAGTCGTCGTANCNGGGGCGGTGAATGACAACGATCTCGACCGGCCCTTCCN Clone Rv341 :::::::::::::Rv341SP6.seq::::::::::::: TACTCAAGCTTCAGAACAGGCCTGTTGTGGGCNCACCCGGCTCGCCGAGTTCTGCACCCACCGCCTCAAGTGCGGCCC (SEQ ID NO. 446) GCACCGCCGGCATCTCCCGGTCACGCAGGGCCGCGGCCCGCGCCGCAGCGACGGCGTGTTCGCGCAGTTCGCCGTCAA TGATGCTGACCTGATCGGCCACCCGGGCGTTCTCGGCGTCGTCGCGTTCACTAATCGCGGTGCTCAGCAGCGTCTCGA CAGCCACCACCCGAGTGGCGACCAGCTGC :::::::::::::Rv341T7.seq::::::::::::: TAATGTCTTGCCGACGTCACCACAATCGCGATGAATTCAATCATGCCGCCCAGGGCGGCCAACCCAATGGTGGCCGCG (SEQ ID NO. 447) AGCGGCAGCTCGATCGCAGCGCGGAGGTTGCCGGCCGCCAGTTGATTCACGAACAGGGTGAGGTCATAGGCGGGCAGG ATAGTGACGAAGGCAAGACCTATATCTGCCGTCGGAAGAAGAATCGAGTAGCCGGTCGACACAACGGAAGCGAAAGTG TCCGCGATGTTGATGAGCGTCGCCGGTTGTGGCGGCGGTGGCGGC Clone Rv343 :::::::::::::Rv343SP6.seq::::::::::::: TACTCAAGCTTTCGTCAGTTCATCGCGCCAGCAGACCAACAAGAGCATCGGGACATACGGAGTCAACTACCCGGCCAA (SEQ ID NO. 446) CGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACGACGCCAGCGACCACATTCAGCANATGGCCAGCGCGTGCCGGGC CACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCGTGATCGACATCGTCACCGCCGCACCACTGCCCGGCCT CGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGANNATCACATCGCCGCGATCGCCCTGTTC :::::::::::::Rv343T7.seq::::::::::::: CCACCCGTGTAATTTGGGATGGGCNAAAAGGCNAACCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCGG (SEQ ID NO. 449) CTAGGGCTTCTCGCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCCTCGCCCTCGGACCGCGAACATTCGGGG ATGGCAGCAACCTGGTAGCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCTAC AGTCTGAAACGCGATGACCATCGATGTGTGGATGCAGCATCCGACG Clone Rv344 :::::::::::::Rv344SP6.seq::::::::::::: TCAAGCTTTAGCTGCCCGAATCCGTCANCCCGATGCNCCCAGATCGGGGCTTCGCANATAAAGCACNAACAGGCGGGC (SEQ ID NO. 450) AAAACGTCNATCTCGGAGCCGGAAGGGCAATCANCCGACCGTCNACAAACGACACCGGCGANACCACTTAGGCAGTGA CGGCCGGCCCGAACATTACNCGCTCGTTGATTAGGCGTTCGGTCTCGTCCGCGGTCATGCCGAGCAGCTTGCGGCANA TCTGAACGCTGTCCTGTCCGGGCAGCGGCGCCGGGCGTTGGGGTGCCTGCGGAATGTGACNAAACGGAGCCGGACCCN TCTCGGCG :::::::::::::Rv344T7.seq::::::::::::: CCGGGGCCACTCCGCACAATCNGTACCNNACCAANATCTACACCATCGAATACGACGGCGTCGCCGANTTTCCGCGGT (SEQ ID NO. 451) ACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGC CGGAACAAATNGACGCNTCGGTTCCGCTGACCAATACGGTCGGTCCC Clone Rv346 :::::::::::::Rv346SP6.seq::::::::::::: NCTGGCCTTTGGTCCACACTAANACAATACTCAAGCTTCCGGCCGCAGAGCCGCCAACTCACGATATCGTTAACCGAT (SEQ ID NO. 452) ATCCCGAGCCGATAGCTGGCGGGCTCGGGTGGTGGCCAGCGGCGCTGCGACNAAAGGTGTGACCGTCATGAAACAGAC ACCACCGGCGGCCGTCGGCCGTCGTCACCTGCTCGANATCTCAGCATCCGCAGCCGGTGTGATCGCGCTTTCGGCGTG TNGTGGGTCNCCGCCCGAGCCCGGCAAAGGCCGGCCCGACACAACCCCGGAAC :::::::::::::Rv346T7.seq::::::::::::: CATCTGCCCACCACACGGACCGCGGTGCGGACGCGGCTGACGCGCCTGGTGGTCAGCATCGTGGCCGGTCTGCTGTTG (SEQ ID NO. 453) TATGCCAGCTTCCCGCCGCGCAACTGCTGGTGGGCGGCGGTGGTTGCGCTCGCATTGCTGGCCTGGGTGCTGACCCAC CGCGCGACGACACCGGTGGGTGGGCTGGGCTACGGCCTGCTATTCGGCCTGGTGTTCTACGTCTCGTTGTTGCCGTGG ATCGGCGAGCTGGTGGGCCCCGGGCCCTGGTTGGCACT Clone Rv347 :::::::::::::Rv347SP6.seq::::::::::::: GACAATACTCAAGCTTGACTGGCCACCCACCGGCATGACCACCGACAGGCCCGACTGGTCGTACCACTCGAACGCCGG (SEQ ID NO. 454) GGTGTTGATGTCCCAGCCGCTGAANTCGTCCTGCGCGCGCAGGCCGTCNAACAGGTACAGGGCGGGCGAATTGGCACC ACCACTTTGGAATTGGACCTTGATGTCACGGCCCATCGACGGCGACGGCACCTGCAGGTACTCCACCGGCAAGCCCGC CCGGGAAAATGCCCCCGCGGTCNCCGTGCCACCGACGGCGCCCANCAAACCCGACACTAGGGCCGCGCCNACGGCCCC GACCACNANTCNACGCGACATACCCGTGACGGCGCCACNAACCCTGTCAACA :::::::::::::Rv347T7.seq::::::::::::: CCTCCAACTCGGCGGGGAAGCGACNCCAGCCTACCGAGCTTGGAGTCCANGACGCCAGCGGCGGCGTCGGTCTGCGTC (SEQ ID NO. 455) GTGGTGCCGCCGGGGTGGCGTTGGCTGGCAACGATCTCCACCCAGCCGGTCGGGTTACCCACGATCTCGGCATANACG CGGGCCGAGGCCGGTGCGATACCGTATTGCGTCAATTGGGACGCGGTTGTGCATTCGGCTAGCTCGGTTGCCACACCC GTCAGGGGTTCGACGTTGGCGGGTTCGGCGGGCCCCANCACCGCTGTCACCATGCCCGCCAAGCCGACCTGCGGCGCC ACCAACTGCAGCACCANCATGTCGCCGTCGCGCGCCGCGATCACATGG Clone Rv348 :::::::::::::Rv348SP6.seq::::::::::::: CTCAAGCTTTTTGAGCGTCGCGCGGGGCANCTTCGCCGGCAATTCTACTANCGAGAANTCTGGCCCGATACGGATCTG (SEQ ID NO. 456) ACCGAANTCGCTGCGGTGCANCCCACCCTCATTGGCGATGGCGCCGACNATGGCGCCTGGACCGATCTTGTGCCGCTT GCCGACGGCGACGCGGTAGGTGGTCAAGTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTCGCGGTT GCGCCGCNAAAGCGGCGGGTCGGGTGCCATCAGGAATGCCTCNCCGCCGCGGCACTGCACCGCCAGTGCCGCGGCGA :::::::::::::Rv348T7.seq::::::::::::: CNCCAGCTTGATTGGTCTGGTTGCATTGGCCAGCTGCGCGAGCCTGGCTCACTTCAACTACGACGACCGCAAACAATT (SEQ ID NO. 457) GCCGCCTTCGGATCCGAGTTCGGTTGGGTACGCGGCAATGGAGCACCATTTCTCGGTGAATCAGACTATTCCTGAGTA CTTGATCATCCACTCTGCACACGACCTGCGAACCCCGCGCGGCCTTGCCGACCTGGAGCAGCTGGCGCAACGTGTGAG CCAGATCCCAGGCGTTGCCATGGTTCGCGGTGTGACCCGGCCAAACGGGGAAAC Clone Rv349 :::::::::::::Rv349SP6.seq::::::::::::: CAATACTCAAGCTTGACTGGGCCCGCACCTTCGGCGCCACCCACACCGTCAACGCCCGCGAAGTCNACGTCGTCCAGG (SEQ ID NO. 458) CCATCGGCGGCCTCACGGATGGATTCGGCGCGGACGTGGTGATCGACGCCGTCGGCCGACCGGAAACCTACCAGCAGG CCTTCTACGCCCGCGATCTCGCCGGAACCGTTGTGCTGGTGGGTGTTCCNACGCCCGACATGCGCCTGGACATGCCGC TGGTCNACTTCTTCTCTCACGG :::::::::::::Rv349T7.seq::::::::::::: TCGACGGTTTGGCGGCCTTAAATGCACTGAGGTCGTCAATTGACCCCACAGCGGAAATGCCGACTATTCGCAGGCCTC (SEQ ID NO. 459) CTTCGCCTTGGCTGCCGGAGAGGGGCTCCGCGGGAACCGCATGCAGGTATATGACCTCGGTTTCTCGGGTGCTACCGC GTGCCTTGTNTANGATNANCTCGGCGTTGGAATTGTCCAGCCGGCCCAATTCATCGAGCGCANATTCGTACACNTGGC CGGCGGCGACATACGCTTCACCGTGGATCTGCTCCACACGGACCGCCCTGTCGGGATCCTGCTCACGGGTAANGGAAC TTACGTGGCACTCGG Clone Rv34 :::::::::::::Rv34SP6.seq::::::::::::: GACCACGCCAGGCTAATCACGTGACGCTACCGAATACCCTNCCTAGTGGTGCAGGCTCCCGCTGGAAATGGCCCTGTA (SEQ ID. NO. 460) CCAACTCGCGCACCGGTGCCAG :::::::::::::Rv34T7.seq::::::::::::: CGGCACCCGACCCCTTTGAGCCGTCCGCCGTGGCCGCGGTGGAACTGGCCGACGAGGGACTGATCGTGCTGGGCAAAT (SEQ ID NO. 461) TGGTCGATGGCACGCTGGCCGCCGATCTGAAGGTCN Clone Rv350 :::::::::::::Rv350SP6.seq::::::::::::: CTCAAGCTTGCCGTTACCCCGACTTCCGGAGGGACACCATGAGCACCGCCAGCCGAGCACGAGGCCAAACTCCGCCGA (SEQ ID NO. 462) CGCAGGCCGGTTGGACTTGTCGTGCTGGACAAGGGGTTTAGCCGCCGAAGCAGTGACGTACATCGGCGAAAAGCAGTT CGCCTGTCGACCGACGGNGCNNACCGTGAGGCTAGGGAAGCGAGGAGCACATGGCCGCCGACCCGCAATGTACACGCT GCAAGCAAACCATCGAACCCGGATGGCTATNCNTCACCGCCCATCGCCGCGGT :::::::::::::Rv350T7.seq::::::::::::: CATGTCGCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCGGGATCCCAAAGTGCGGATGATCGGGCCGCC (SEQ ID NO. 463) TACGTCGTGGTGTACCTCGTCGGTAACAACGAAACCGAAGCGTATGACTCGGTCCACGCGGTGCGGCACATGGTGGAC ACCACACCGCCACCGCACGGGGTGAAGGCCTATGTCACCGGTCCGGCAGCACTCAATGCCGACCAGGCCGAGGCCGGA GACAAAAGTATCGCTAAGGTCACCGCGATCACGAGCATGGTGATCGCAGCAATG Clone Rv351 :::::::::::::Rv351SP6.seq::::::::::::: ATACTCAAGCTTCGGTACGGTGGCGGGCCGTGCTGCTGGCCGCGGTCGCGGCGTGCGCGGCCTGCGGTCTCGTTTACN (SEQ ID NO. 464) AGCTCGCGCTGCTGACACTGGCGGCNAGCCTGAACGGCGGCGGGATCGTGGCCACCTCCCTGATCGTCGCGGGCTACA TAGCCGCGCTGGGAGCAGGCGCCTTGCTGATCAAGCCGCTACTTGCAGACGCGGCCATCGCGTTCATCGCCGTGGAGG CGGTGCTGGGGATGATCGGCG :::::::::::::Rv351T7.seq::::::::::::: TGTCAAGTCCTTTCAGATCTCNTTTTTATGACATGACTGGAGATCTGTCTAGATTGCAGCTCCTGTGAGCGTGGGTAC (SEQ ID NO. 465) CGGATTCAAGCCGGTCGGTCACGCCGCGGTGGTACCGGCTTTGCGGCAGTGCTCGGCCTCGAGTTCGGCGATCGCGCG CGAAGTGCGTTCGCGCAGCAAGATCGCGGCCGTAATGCCGGCGATGACCGCGATGACCAGCGCGATCCAGGAGAACCG TTCCAACCAGTGCTGGGCGGCCATCCCGGCGAAGTAGACCAGTGCAGTGGTGCC Clone Rv352 :::::::::::::Rv352SP6.seq::::::::::::: CAATACTCAAGCTTCAAAACAGGCCTGTTGTGGGCGCACCCGGCTCGCCGAGTTCTGCACGCACCGCCTCAANTGCGG (SEQ ID NO. 466) CCCGCACCGCCGGCATCTCCCGGTCACGCAGGGCCGCGGCCCGCGCCGCANCGACGGNGTGTTCGCGCAGTTCGCCGT CAATGATGCTGACCTGATCGGCCACCCGGGCGTTCTCGGCGTCGTCNCGTTCACTAATCGCGGTGCTC :::::::::::::Rv352T7.seq::::::::::::: TACGCTGGCGCTGGAGGGAGCCANNTACAACATCCACGCCAATGCTCTTGCCCCGATCGCGGCGACCAGGATGACCCA (SEQ ID NO. 467) GGACATCCTGCCGCCCGAAGTACTGGAAAAGCTCACACCCGAGTTCGTCGCACCGGTGGTGGCCTACCTGTGCACCGA GGAGTGTGCCGACAACGCATCGGTGTACGTCGTCGGTGGTGGCAAGGTGCAGCGAGTTGCGCTGTTTGGCAACGACGG CGCCAACTTCGACAAACCGCCGTCGGTACAAGATGTTGCGGCGCGGTGGGCCGAGATCACCGATCTGTCCGGTGCGAA AATTGCTG Clone Rv353 :::::::::::::Rv353SP6.seq::::::::::::: GCTTTTCCCGTCCGTCNNCGCTCAACCGCGTGAGGCCGAAGCGGNTGGTTACGACTCCCTGTTTGTGATGGACCACTT (SEQ ID NO. 468) CTACCAACTGCCCATGTTGGGGACNCCCGACCAGCCGATGCTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGC GACCGANCGGCTGCNNNTGGGCGCGTTGGTGACCGGCAATACCTACCGCAGCCCGACCCTGCTGGCAAANATCATCAC CACGCTCGACGTGGTTAGCGCCGGTCGAGCGATCCTCGGCATTGGAGCCGGTTGGTTTGANCTGGAACA :::::::::::::Rv353T7.seq::::::::::::: CNGCTTTTTAATGGCCTTGACNTGGGCGNGCCGGCCACCGGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTAC (SEQ ID NO. 469) ACCATCGAATACGACGGCGTCGCCGACTTTCCGCGGTACCCGCTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGC ACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCGGAACAAATTGACGCAGCGGTTCCGCTGACCAATACGGTC GGTCCCACGATGACCCAGTACTACATCATTCGCACGGAGAACCTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATC GTGGGGAACCCACTGGCGAACCTGGTTCAACCAAACTTGAAGGTGATTGTTAACCTGGGCTACGGCGACCCGGCCTAT G Clone Rv354 :::::::::::::Rv354SP6.seq::::::::::::: CTCAAGCTTGCCGGGAGGGTGCATGGCCGACTCGGATTTACCCACCANGGGGCGCCAACGCGGTGTCCGCGCCGTCNA (SEQ ID NO. 470) GCTGAACGTTGCTGCCCGCCTGGAGAACCTGGCGCTGCTGCGCACCCTGGTCGGCGCCATCGGCACCTTCGAGGACCT GGATTTCGACGCCGTGGCCGACCTGAGGTTGGCGGTGGACGAGGTGTGCACCCGGTTGATTCGCTCGGCCTTGCCGGA TGCCACCCTGCGCCTGGTGGTCGATCCGCGAAAANACGAANTTGTGGTGGAGGCTTCTGCTGCCTGCGACACCCACNA CGTGGTGGCACCGGGCAGCTTTAGCTGGCAT :::::::::::::Rv354T7.seq::::::::::::: CCGACGCCGTCGTGGCCACCAACACCGCGACCAGCACCGTGACCCGGACCGGGGTGCCGCGCGAACCGGTCTTGGCCA (SEQ ID NO. 471) ATTGCCGCGGCACCAAGCCGTCGCGCGCCATGGCGAACAGCACGCGGCATTGCCCGAGCATCAACACCATCACCACCG TGGTAAGCCCGGCCAGCGCGCCGACGGAGATGATGCCGCTGGCCCAGTACACCCCGTTGGCCTGGAACGCGGTGGCCA GATTTGCCGGCCCGCGGCCCGGTACGGTCCGCAGTTGGGTGTATGGAACCATGCCCGACAGCACCACCG Clone Rv355 :::::::::::::Rv355SP6.seq::::::::::::: TTNACTGGCCTTTGGTCCACACTAGACAATACTCAAGCTTCCAGGACATCGTCATCGCGACCAAAACCGCGAGCTAGG (SEQ ID NO. 472) TCGGCATCCGGGAAGCATCGCGACACCGTGGCGCCGAGCGCCGCTGCCGGCAGGCCGATTAGGCGGGCAAATTAGCCC GCCGCGGCTCCCGGCTCCGANTACGGCGCCCCGAATGGCGTCACCGGCTGGTAACCACGCTTGCGCGCCTGGGCGGCG GCCTGCCGGATCAGGTGGTAAATGCCGACA :::::::::::::Rv355T7.seq::::::::::::: NGACGTCTTCCATCCGCGCGTCGTTTTGGCGGGTTGGCCACAGCAGCCCGCCGGTGACGGCGACGATGCTGGGCTGGT (SEQ ID NO. 473) TGCGGCCCTGCGCCACCGCGGCTTGCATGCTGGTTGGCTGTCTTGGGACGATCCCGAAATAGTCCACGCGGATCTGGT GATTTTGCGGGCTACCCGCGATTACCCCGCGCGGCTCGACGAGTTTTTGGCCTGGACTACCCGCGTGGCCAATCTGCT GAACTCGCGGCCGGTGGTGGCCTGGAATGTCGAGCGCCGTTACCTA Clone Rv356 :::::::::::::Rv356SP6.seq::::::::::::: CTTCCTCCTGAGTACCNCCCGTNTACTTTGGGATGGGTAAAAAGGCGAATCNCCGTTTGGTCACGAACGCCGGGAGGG (SEQ ID NO. 474) ACAATCTCGGGCGGCTGGGGCCTCTCGCGGGAANGCCCGAATGTACGGTGTCTCGACACTTCCCNTCCCCCTCCG :::::::::::::Rv356T7.seq::::::::::::: GAGCATCGGGACNTACGGAGTCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACGACGCCNC (SEQ ID NO. 475) CGACCACATTCAGCAGATGGCCAGCGCGTGCCGGGCCACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCNT GATCNACATCGTCACCGCCGCACCACTGCCCGGCCTCGGGTTCACGCAGCCGTTGCCGCCCNCAGCGGACGATCACNT CGCCGCGATCGCC Clone Rv357 :::::::::::::Rv357SP6.seq::::::::::::: TACTCATGANCATCCTTTAATCANNGCTTTGCGTTTTTTTATTAAATCTTGCAATTTACTGCAAAGCAACAACAAAAT (SEQ ID NO. 476) CGCAAAGTCATCAAAAAACCGCAAAGTTGTTTAAAATAAGAGCANCACTACAAAAGGAGATAAGAAGAGCACATACCT CAGTCACTTATTATCACTAGCGCTCGCCGCAGCCGTGTAACCGAGCATAGCGAGCGAACTGGCGAGGAAGCAAAGAAG AACTGTTCTGTCAGATAGCTCTTACGCNCA Clone Rv358 :::::::::::::Rv358SP6.seq::::::::::::: CTCAAGCTTCAGGTCAATGTGCNCCAAGCCCTGACGCTGGCCGACCAGGCCACCGCCGCCGGANACNCTGCCAAGGCC (SEQ ID NO. 477) ACCGAATACAACAACGCCGCCGAGGCGTTCGCANCCCAGCTGGTGACCGCCGAGCANANCGTCAAAAACCTCAAGACG CTGCATGACCAGGCGCTTANCNCCGCANCTCAGGCCAAGAAGGCCGTCNAACGAAATGCGATGGTGCTGCACCANAAG ATCGCCGAGCGAACCAAGCTGCTCAGCCNG :::::::::::::Rv358T7.seq::::::::::::: CATGGTGGCACTGTAGCGACGTGCTGCAATCAAGGTCATGCCCGACTCTGGTCAGCTCGGANCCCCTGACACCCCGCT (SEQ ID NO. 478) AAGGCTGCTCAGCTCGGTGCATTACCTCACCGACGGCGAACTCCCCCAGCTTTACGACTATCCGGATGACGGCACCTG GTTGCGGGCGAACTTCATCATCAGCTTGGACGGCGGCGCTACCGTCGATGGCACCAGCGGGGCGATGGCCGGGCCCGG CGACCGATTCGTCTTCAACCTGTTGCGTGAACTTGCCGACGTCATCGTGGTCGGCGTGGGCACCGTGCGCATTGAGGG CTACTCCGGCGTCCGGATGGGTGTCGTCCAGCGCCAGCAC Clone Rv359 :::::::::::::Rv359SP6.seq::::::::::::: TACTCAAGCTTGCGGGTGATCGCCTTGGTCAACGGCACCGTGATCGGATCGGGGTCNACCGCACAAATGGACTGGAGC (SEQ ID NO. 479) TTCGGCGAANTCATCGCCTATGCCTCGCGGGGGGTGACGCTGACCCCGGGTGACNTGTTCGGCTCGGGCACGGTGCCC ACCTGCACGCTCGTCTATCACCTCNGGCCACCGGAATCATTCCCGGGCTGG :::::::::::::Rv359T7.seq::::::::::::: GTTGGNGCCTCGTCGGCGAACAGTTCTCGCACGATTTCCGGATTAGCGGGACTGGTCACCAGTTGGGTATGCGGGAAG (SEQ ID NO. 480) GCGCTGACGTTCGCCGCGATTAGCTGTTTGATGGACGCGGTGGTGATGTTCTGATCACGGAACTGGCTGTAATAGCCC AGGGTCGCCACGCTTTCATCCGGGCCCGGACCCGGCGCACCGAGCGTGTCGCGCAGGTATGCGACGTGATTTTCGCTG AAGTCCCCGTACCCGGAGAACT Clone Rv35 :::::::::::::Rv35SP6.seq::::::::::::: TGCTTCCGGCTCGTATGTTGTGTGGAATTGTGANCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACG (SEQ ID NO. 481) CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTCCAGGTCAATGTGCGCCAAGCCCTGACGCTGGCCGACCAGG CCACCGCCGCCGGAGACGCTGCCTTTGTCACCGAATACAACAACGCCGCCGAGGCGTTCGCAGCCCAGCTGGTGACCG CCGAGCAGAGCGTCGAAGACCTCAAGACGCTGCATGACCAGGCGCTTAGCGCCGCAGCTCAGGCCAAGAATGCCGTCG AACGAAATGCGATGGTGCTGCGGCATAAGATCGCCGAGCGAACCAAGCTGCTCAGCCAGCTCGAGCAGGCGAAGATGC ACGAGCA :::::::::::::Rv35T7.seq::::::::::::: CAGGCATGCAAGCTTCGGAGGCAGACCCGTGCATGGTGGCACTGTAGCGACGTGCTGCAATCAAGGTCATGCCCGACT (SEQ ID NO. 482) CTGGTCAGCTCGGAGCCGCTGACACCCCGCTAAGGCTGCTCAGCTCGGTGCATTACCTCACCGACGGCGAACTCCCCC AGCTTTACGACTATCCGGATGACGGCACCTGGTTGCGGGCGAACTTCATCAGCAGCTTGGACGGCGGCGCTACCGTCG ATGGCACCAGCGGGGCGATGGCCGGGCCCGGCGACCGATTCGTCTTCAACCTGTTGCGTGAACTTGCCGACGTCATCG TGGTCGGCGTGGGCACCGTGCGCATTGAAGGCTACTCCGGCGTCCGGATGGGTGTCGTCCATCGCCA Clone Rv360 :::::::::::::Rv360SP6.seq::::::::::::: TACTCAAGCTTGGGGTGGCGCTGTCGGTCGGTGTGCTTGGCGGCGTCGGTATCAACACCGCCCACGAAATGGGGCACA (SEQ ID NO. 483) AGAAGGATTCGCTGGAGCGGTGGCTGTCCAAAATCACCCTCGCCCANACCTGCTACGGGCACTTCTACATCGAGCACA ACCGTGGCCATCACGTCCGGGTGTCCACACCGGAGGACCCGGCGTCGGCGCGGTTCGGCNAAACGTTGTGGGANTTCC TGCCCCGCANTGTTATCGGCGGCTTGCGCT :::::::::::::Rv360T7.seq::::::::::::: GGCCATCGCCACCGCNCCGCGGCGAACGCTCAAAGGCACCTACTGGCACCAAGGCCCCACACGTCACCCTGTGACCTC (SEQ ID NO. 484) CTGCGCCGACCCCGCCCGAGGTCCTGGCCGTTACCACCGAACGGGCGAGCCGGGAGTCTGGTACGCATCGAACAAAGA GCAAGGTGCATGGGCGGAGTTGTTCCGCCACTTCGTCGATGACGGGGTCGATCCATTCGAGGTCCGTCGCCGCGTCGG TCGAGTGGCGGTCACACTCCANGTACTCGACCTCACAGACGAGAGGACTCGATCCCATCTAGGTGTGGACGAAACAGA TCTTCTGTCCGACGACTACACCACCACCCAGGCCATCGC Clone Rv361 :::::::::::::Rv361SP6.seq::::::::::::: GCTTGCGGGTGATCGCCTTGGTCAACGGCACCGTGATCGGATCGGGGTCNACCGCNCAGATGGACTGGANCTTCGGCG (SEQ ID NO. 485) AANTCNTCGCCTATGCCTCGCGGGGGGTGACCCTGACCCCGGGTGACNTGTTCGGCTCGGGCACGGTGCCCACCTGCA CGCTCGTCAAGCACCTCNGGCCACCGGAATCATTCCCGGGCTGGCTGCACNACGGCGACNTGGTCNCCCTCCAGGTCG AAGGGCTGGGCNAAACAANGCAGACCGTCCGGACAANCGGCACTCCTTTTCCGTTGGCTCTTCGGCCGAATCCGGACG CCNAACCCGACCGGCG :::::::::::::Rv361T7.seq::::::::::::: GTTCTCGCACGATTTCCGGATTAGCGGGACTGGTCACCAGTTGGGTATGCGGGAAGGCGCTGACGTTCGCCGCGATTA (SEQ ID NO. 486) GCTGTTTGATGGACGCGGTGGTGATGTMCTGATCACGGAACTGGCTGTAATANCCCAGGGTCGCCNCGCTTTCATCCG GGCCCGGACCCGGCGCACCGAGCGTGTCGCGCAGGTATGCGACGTGATTTTCGCTGAAGTCCCCGTACCCGGAGAACT CGAACACGCTGAGGCGCTCGTCACCGTCGTNNCGGCGACCAAGCGCGGCGAGCAACTGCGCAAAATCGTTAAGANAGG TCGAATCGTTGAAATTCGGCACCACCTGCACC Clone Rv363 :::::::::::::Rv363SP6.seq3::::::::::::: CACAAGACAATACTCAAGCTTCAGGTCAATGTGCNCCAAGCCCTGACGCTGGCCGACCAGGCCACCGCCGCCGGANAC (SEQ ID NO. 487) GCTGCCAAGGCCACCGAATACAACAACGCCGCCGAGGCGTTCGCAGCCCAGCTGGTGACCGCCGAGCANANCGTCNAA AACCTCAAGACGCTGCATGACCAGGCGCTTANCGCCNCAGCTCAGGCCAAGAAGGCCGTCGAACGAAATGCGATGGTG CTGCAGCANAANATCGCCGANCGAACCAAGCTGCTCAGCCAGCTCGAGCAG :::::::::::::Rv363T7.seq::::::::::::: CCACCCGTGCATGGTGGCACTGTAGCGACGTGCTGCAATCAAGGTCATGCCCGACTCTGGTCAGCTCGGAGCCGCTGA (SEQ ID NO. 488) CACCCCGCTAAGGCTGCTCAGCTCGGTGCATTACCTCACCGACGGCGAACTCCCCCAGCTTTACGACTATCCGGATGA CGGCACCTGGTTGCGGGCGAACTTCATCAGCAGCTTGGACGGCGGCGCTACCGTCGATGGCACCAGCGGGGCGATGGC CGGGCCCGGCGACCGATTCGTCTTCAACCTGTTGCGTGAACTTGCC Clone Rv364 :::::::::::::Rv364SP6.seq::::::::::::: GCTTTCCGCCGATACCCNCCATGTCCCGCACATCCAGGACTTCTGGGGGGATCCGCTGACAGCGGCGGGATCCCAAAG (SEQ ID NO. 489) TGCGGATGATCGGGCCGCCTACGTCGTGGTGTACCTCGNCGGTAACAACGAAACCGAANCGTATGACTCNGTCCACGC GGTG :::::::::::::Rv364T7.seq::::::::::::: CAACCCGANTTGGCTTTCGGCGCCNTCGGTGAGGACGGCGTGCGGGTGCTCAACGACGACGTCGTCCGCGGGACACAC (SEQ ID NO. 490) CTCGATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGATCTACNACGCCGNGNGGAACGCTTCNGCCGC GGGCGTGACCGCNTCCCGTT Clone Rv365 :::::::::::::RV365SP6.seq::::::::::::: GGGATGGGCAAAAAGGCGAAGCACCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCGGCTAGGGCTTCTCGCG (SEQ ID NO. 491) GGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCGAACATTCGGGGATGGCAGCAACCTGG TAGCACCCTGGCCGGGCGATGATCTGCCAGCGTCCCCGCGGGTAGTCGCCGCCCGGGCGG :::::::::::::Rv365T7.seq::::::::::::: CAGCAGACCAACAAGAGCATCGGGACATACGGAGTCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCTGACGGC (SEQ ID NO. 492) GCGAACGACGCCAGCGACCACATTCAGCAGATGGCCAGCGCGTGCCGGGCCACGAGGTTGGTGCTCGGCGGCTACTCC CACGGTT Clone Rv366 :::::::::::::Rv366SP6.seq::::::::::::: CTCAAGCTTGACTGGCCACCCACCGGCATGACCACCGACAGGCCCGACTGGTCGTACCACTCGAACGCCGGGGTGTTT (SEQ ID NO. 493) GA :::::::::::::Rv366T7.seq::::::::::::: TTGGTGCCCGGAATGGCGAGTCCCATTTANTCGCTGATTTGTTTGAACAGCGACGAAACCGGTGTTGAAAATGTCGCC (SEQ ID NO. 494) TGGGTCGGGGATTCCCTCTCCAAGCAAGAGTAACTGGCCCCAAATAAAGTTACTCGTCGTCTTGCAAAGACCGCTACC CGATGCCATTTATGTGTTTCCTTACGCTCNNNNTTCCGGTGCGCCATCATTATCTGCACCTTTGCACTGCACATTGAG CTTAGCAGCGCTCG Clone Rv367 :::::::::::::Rv367T7.seq::::::::::::: GAATTNGCTTTCGGCGCCATCGGCCCAGGACCGCGTGCGGGTGCTCAACGACGACGTCGTCCGCGGGACACACCTCGA (SEQ ID NO. 495) TGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGCTTCCGCCGCGGGCG TGACCGCATCCCGTTGACCGGGCGGATCGCNGTGATCGTCGATGACGGCATCGCCACCGGAGCGACGGCCAAGGCGGC GTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCAGACGACATCGTGGCGAG ATTCGCCGGGTACGCCGATGAAGTGGTGT Clone Rv368 :::::::::::::Rv368SP6.seq::::::::::::: TAAAGCTTTCGTCAGTTCATNGNGCCCCCGGACCAACAAAAGCATCGGGACATACGGAGTCAACTACCCGGCCAACGG (SEQ ID NO. 496) TGATTTCTTGGCCGCCGCTGACGGCGCNAACGACGCCAGCGACCACATTCAGCAGATGGCCAGCGCGTGCCGGGCCAC GAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCGTGATCNACATCGTCACCGCCGCACCACTGCCCGGCCTCGG GTTCACGCAGCCGTTGCCGCCCGCAGCGGACGATCACNTCGCCGCGATCGCCCTGTTCGGGAATCCCTCGGGCCGCGC TGGCGGGCTGATGAGCGCCCTGACCCCTCAATTCGGGTCCAANACCATCNACCTCTGCAACAACGGCGACCCGATTTG TTCGGACGGCAACCGGTGGCGANCGCACCT :::::::::::::Rv368T7.seq::::::::::::: CCGGGAGGGACCATCNCGGGCGGCTNCGGCTTCTCTCCGGAAGGTTCTANNGTNNNGCGTTTCNACNCTTCCCGTCGC (SEQ ID NO. 497) CCTGCGACCGCCGAACATTCGGGGTATGGNNGCANCCTGTNAGCATCCNGGCCGGGC Clone Rv369 :::::::::::::Rv369SP6.seq::::::::::::: CTCAAGCTTCCGCATCAGATCGCTATAGAACCGGTGCGCGTCCCCACCGAGTGGCTGGTCGCCTTCCAGCACGATCGT (SEQ ID NO. 498) TACCGCGTTATCGGAATCAAACTCNCCGAACACCTGACCAACGCGCTTGATCGCCTGAATCGATGCGGCGTCGCTGGG GCTCATCGATACCGAGTGTGCTTTTCCGACCACTTCCAGTTGCGGTACGGCGAGATTGACAAAGGCGGTGAAGCCCAG CCAGAGCAGGACGATCACCNCCGCAAACCGGCGGATTTGCCCG :::::::::::::Rv369T7.seq::::::::::::: GCTTGGCAGCCTGCGGCTGGGCGCCCTNGAGCTCTTCGATCTGGATCTCCGGACTCGAGATGCTCACTTGCCCGGCCG (SEQ ID NO. 499) TGGACGTACCCATTGCGGCCGGGACCCCAGCGCCCCAGGTGACCAGCGAGTTGGGCTGCACGCTGACCGGCCCGTCGG GGTCGACGCCGGTAACGGTCAGCAGCTCCGANGTCCNNCTGATCCCGACCGCAGCTGCCAATGCGCGGCTGGCAGCCG ACGTGGATGTGCCGGGGCCTAGATCGCGGGGCAGCAGCGAGACCGCGTCACCGACGGTCATCACCTTGCCGAGTTTNG GCCTGCCGCAN Clone Rv36 :::::::::::::Rv36SP6.seq::::::::::::: GCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTNCACACAGGAAACAGCTATGACCATGATTACGC (SEQ ID NO. 500) CAAGCTATCTAGGTGACACTATAGAATACTCAAGCTTGAGCCATCGGGCTATCAGCTGGTTGATGTCCCG :::::::::::::Rv36T7.seq::::::::::::: CAGGCATGCAAGCTTGTCGTCTATCACATCCGACCACCAACCGCCCGACGGCTCGGCAGAACGCCTCCGCATATGGGT (SEQ ID NO. 501) CGACGACCAGCGGGTCGGACTTCTGGGCTGCCAGCGCTCGCGCCGTCGCGACAAACAGCGCGGTCGAACCGACACTCC TTGTGATGTCCCACCTATCACCTTCGGTACGCACCCAATCGACCCTACGCGGCTAGCTCAGCCCCGATCTTCCAGAGC TCCGCCCG Clone Rv370 :::::::::::::Rv370SP6.seq::::::::::::: GCTTTTTGAGCGTCGCGCGGGGCCGCTTCCCCGGCAATTCTACTAGCGAGAAGTCTGGCCCGATACGGATCTCACCGA (SEQ ID NO. 502) AGTCGCTGCGGTGCAGCCCACCCTCATTGGCGATGGCGCCGACNATGGCGCCTGGACCGATCTTGTGCCGCTTGCCGA CGGCGACGCGGTAGGTGGTCAATTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTCGCGGTTG :::::::::::::Rv370T7.seq::::::::::::: CGANCCTGTTCGACGGCTACCTGAATCACCCCGATNCCACCGCCGCGGCGTTCGACGCCGACAGCTGGTACCGCACCG (SEQ ID NO. 503) GCGACGTCGCGGTGGTCGACGGCAGTGGGATGCACCGCATCGTGGGACGCGAGTCGGTCGACTTGATCAAGTCGGGTG GATACCGGGTCGGCGCCGGTGAAATTGAAACGGTGCTGCTCGGGCATCCGGACGTGGCGGAGGCGGCAGTCGTCGGGG T Clone Rv371 :::::::::::::Rv371SP6.seq::::::::::::: NAAGCTTTGTCACACCAAGTGTTTCNACCAGNCGCTCCATCCGGCGAAGTGGATACTCCCAGCAGGTAGCAGGTCGCC (SEQ ID NO. 504) ACCACGCTGGTCAGTGCGCGTTCAGCTCGCTTGCGGCGCTGCAGCAGCCAGTCCGGGAAATAGCTGCCCTGGCG :::::::::::::Rv371T7.seq::::::::::::: CGCTGGNCGCCGGCGCTGGGCTGCGGTAACCAATTACCACAACACTTTTCGGTAGCCGAACAGCGGCGCGTACCAGCG (SEQ ID NO 505) AAATGGCACAGCCACCGCAGTCGCCGACATCCCGCGAAGATGTGGCAGATTTTCGTGCGGTCGAGCCGGCGAAGGCCT AGCGTCATTGTTGCCTGGCAAGGTTGCTGGGCCCGG Clone Rv373 :::::::::::::Rv373SP6.seq::::::::::::: CTCAAGCTTCTTCTGCCCCTTGCCGTTNCGGATNACATCCGGCAGCGACTCGGCTTCGGCGTCGATGTCGAAGTTCTC (SEQ ID NO. 506) GATCAGCTTCTGGATCGACTCCGCGCCCATGGCACCGGTGAAGTACTCGCCGTAGCGGTCGACNAGTTCGCGGTAGAG GTTTTCGTCNACNATCAGCTGCTTGGGCGCCANCTTGGTGAAAGTGCTCCAAATGTCCTCCAACCGGTCCAGCTCACG CTGCGCGCGGTCACGGATCTGGCGCATCTCGCGCTCGCCGCCGTCGCGAACTTGCGCCGCGCATCGGCCTTGGGGCCC :::::::::::::Rv373T7.seq::::::::::::: GTTCACACCTACCTACTATGCCNCAATTCNCCGACACGGGTGGCATCAACACGGGCGATAAGGTGGAAATCGCTGGGG (SEQ ID NO. 507) TGAACGTCGGGCTGGTGCGCTCGCTGGCAATCCGCGGCAACCGCGTGTTGATCGGATTCTCGTTCCCCGGCAAGACAA TCGGGATGCAAAGCCGGGCAGCAATTCNCNCCNACACCATTCTTGGCCGTAAGAACCTGGAGATCGAACCCCGCGGTT CGGAGCCGTTGAAACCCAACGGTTTCCTGCCGTTGGCGCANACCACTACGCCATACCAAATC Clone Rv374 :::::::::::::Rv374SP6.seq::::::::::::: CTCAAGCTTTACGCCGACGCCGGCCTACACAACACCAAGGAAACGATTGCCTACTGCCGAATCGGGGAACGGTCCTCG (SEQ ID NO. 508) CACACCTGGTTCGTGTTGCGGGAATTACTCGGACACCAAAACGTCAAGAACTACGACGGCAGTTGGACAGAATACGGC TCCCTGGTGGGCGCCCCGATCGAGTTGGGAAGCTGATATGTGCTCTGGACCC :::::::::::::Rv374T7.seq::::::::::::: TCCCNCATGGGATAACGGGTTTAGATTTCNACAACGGCACCGTGTTTCTCAACAAGCCGGTCATCAGCTGGGCCGGCG (SEQ ID NO. 509) ACAACGGTATCTACTTCACCCGCTTTCGCCCGTACAAGAAAAACCACTAGGCCACCATCGAGTCCAAGAACAACCACC TGGTCCGCAAGTACGCGTTCTACTACCGCTATGACACCGCCGAGGAACGCGCCGTGCTCAACCGGATGTGGAAGCTGG TCAACGACCGCCTCAACTACCTCACCCCGACCATCAAACCGATC Clone Rv375 :::::::::::::Rv375SP6.seq::::::::::::: CTCAAGCTTGGGTGTTGCCGATCACCGGAAGCCNCATGATCAGCCACGTTTCGCGCCGCCCGGCATACGGCGGCGTAC (SEQ ID NO. 510) CGATCTCCGCGTCATACACCCGCGGGTAATCGCCGACGGTGCCGGTTCGCGAGCCGAAGGTGACAACGCTGATTGAAT CNAGTTCCANGTCCAGCGGGT :::::::::::::Rv375T7.seq::::::::::::: TNAACAGCTCGCGGCAGCCCACGACCTGCTGCGTCGGATTGCCGGCGGCGAGATCAATTCCAGGCAGCTCCCGGACAA (SEQ ID NO. 511) TGCGGCTCTGCTGGCCCGCAACGAANGACTCGAGGTCACCCCGGTGCCCGGGGTCGTGGTGCACCTGCCGATCGCACA GGTTGGCCCACAACCGGCCGCTTGATGNNNNGTCGGCAAGCCCGGCAGTNGCCAAACCCAGCGTGATCANGCTCGGCT CGCGAGTTCGGCGAANAAGTGGCTCGCCTGATCACCTACCATCGGCCANGATCTGCGTGTCA Clone Rv376 :::::::::::::Rv376SP6.seq::::::::::::: GCCANCCGGCTTGGCGTCGACTCCCGTTCNGCACATCATACGGTCCCCGGTACTGTCCAACTGCGCCGGTGCGCTAGC (SEQ ID NO. 512) CAAACGTCACGACTCTCAGTGATCCCAGTTCGTGATCCGGCCGGTGGCCCCGCTGCGGCGGGGGCTNATNTACTTCGG ACTNATTATCTCATCCAAAGGACACCGGGCCGGTGGCTGGAATCCCATGGTGCGATCGGCCACACAN :::::::::::::Rv376T7.seq::::::::::::: CCGACCTGGTATCTTCCGATAGCGCGCGTTGATATCCGGTCTGATCTCCTGCCCTTAACGCCGGATCTCAGCAGGTCC (SEQ ID NO. 513) CCATGCAAAGATCCGAGGTGTCCCNGATCTAGGGGTCCTCGTCCTCCAGATGATGGAGCAAGTCGGCCC Clone Rv377 :::::::::::::Rv377SP6.seq::::::::::::: CTCAAGCTTCGGCTCAGGCGGCGCTGCCGGTAACGTCGCTGACCGGTGCAGGTTTCGACAATGTGGTGCCGGTTCGGC (SEQ ID NO. 514) GGCTACGTGCCATCAAGACACTGGCGCAGGCTATCGCACCCGTTATCGGCTACAAACAAATCGCGGTATGC :::::::::::::Rv377T7.seq::::::::::::: CATCACCTGNTTCATGAACTGGAAGCACCGCAGCGCTTCCTTTTCGGCCGCAACATGAGCCAGCCTCTCGTCGGCGGT (SEQ ID NO. 515) CGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAGCTTCCATATCCCGCGACGAACGA CGCCAGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGCCCGGGTGTGGG GTGT Clone Rv378 :::::::::::::Rv378SP6.seq::::::::::::: AGCTTAGCTTCCCGCCCCGGCAATAGGGCTCCAGCTCATCCGGTGTGACCAGATAGGGGCCCAGGGTGATACCGCTGT (SEQ ID NO. 516) CTTTGCCCTTGGCCTGTCCGATGCGCAGCTGGCCCTCCAGCATCTGCAGGTCCCGTGCGGACCAGTCGTTGAAAATGG TATAGCCGATGATCGACCG :::::::::::::Rv378T7.seq::::::::::::: CCNGAACAGAAGCGGNGGTTCCTACCGCGGTGTGCGGCCGGCGCGATATCGGCCTTTTTACTAACCGAACCCGATGTG (SEQ ID NO. 517) GGCTCCGATCCGGCGCGCATGGCATCGACGGCGACGCCGATCGATGACCGCCAGGCTTACCACCTT Clone Rv379 :::::::::::::Rv379SP6.seq::::::::::::: CTCAAGCTTGCGCGACTCGAGAAGCATTCTTGACAGTTGTTTTGGCTCGGCATGGTTAGCCAAGGTTCTGCGGTCCCA (SEQ ID NO. 518) CCAGATCATCTTGGTCCGGTAGCGCTCGTCCGGGTATGCTGCCGCCGGGATTCTCGCTGCTATTACTCCCCCCGAAGA ACGCCACCGGTCCAGCGC :::::::::::::Rv379T7.seq::::::::::::: GCNAGGCGGTATAGCTTCCCGTCGTACCGGCGACCGCCAGCCGAGAAGCTCGTTTTCCCAGTGTTGCTGGGGATTCTC (SEQ ID NO. 519) ACGCTGCTGCTGAGTGCGTGCCAGACCGCTTCCGCTTCGGGTTACAACGAGCCGCGGGGCTACGATCGTGCGACGCTG AAGTTGGTGTTCTCCATGGACTTGGGGATGT Clone Rv37 :::::::::::::Rv37SP6.seq::::::::::::: GTGTGGAACCGTGAGCGGATAACAATTTCACACAGGAAACAGCTNTGACCTTGATTACGCCAAGCTATTTAGGTGAGG (SEQ ID NO. 520) CTATATTAATACTCAAGATTGCGGTCGAGCACATCGGCCCAAGAACCGCCGAAGGCACGGCGGAACGCCTGCGGCACA TGGGGCGACGACCAGCGGGTCGGACTTCTGGGCTGTCCAGCCGGATCGCGCCGTCGCGA :::::::::::::Rv37T7.seq::::::::::::: CACTGTCAGTACATATGCGCCGCTCCTCCTCATCGCTGCGCTCGGCATCGTCGCCGGCGGTCATGGCGTCACCCTACC (SEQ ID NO. 521) CAAGCCGAACGCGAAACGAGAACGTGTTCCATTATTAGGGTGTGAGCACCAATACCAGATTGCTCACCAGGAACTCAC GCAGCACCGGGACGGATGTCAGCCACCACGCCCATCTGGGGTGGTAGCGGGGAAATACGGCTAACGCGGCTCCGGTGC CGGCAGCCCAGCGCAGACCCTCGGCGGCGGACACGGCAAACAACGACGACCCATAGTTGTTCTTTGCCGGATGGCCGT GTTTGCGGACATATCGGGCGGCGGCGCGGGCGCCGCCGAGGTAGTGGCTGAGGCCCATCTCGTGCCCGCCGAATGGCC CCAGCCAAACCGTGTA Clone Rv381 :::::::::::::Rv381SP6.seq::::::::::::: CTCAAGCTTTTACGGTGATCGCGCATCACCTGGTTCATGAACTGGAAGCAGCGCAGCGCTTCCTTTTCCGCCGCAACA (SEQ ID NO. 522) TGAGCCANCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAACCAG CTTCCATATCCCGCGACNAACGAC :::::::::::::Rv381T7.seq::::::::::::: CTCAGAAGCCGCTAGCTGGTAGAGTCGCTGACCGGTGCACGTGGCGNCAATGTGCGCTGCCGGTTCGCG (SEQ ID NO. 523) Clone Rv382 :::::::::::::Rv382SP6.seq::::::::::::: CTCAAGCTTGCGCTCATCAAGCGCGAACAGCAGGGCGGTCGGCTGGTCGCCATGACGGGTGACGGGACCAATGACGCA (SEQ ID NO. 524) CCCGCGCTCGCGCAAGCCGATGTCGGGGTGGCNATNAATACCGGCACCCAGGCGGCCCGGGAAGCCGGCAACATGGTC NATCTCCACTCC :::::::::::::Rv382T7.seq::::::::::::: ACTTCTATTTCGACTGGTGTGCTGTGGCGCGATCCGACTGCCGGCGTGGTCAAGGCCGGCCAGTTGTGGGATNCCACA (SEQ ID NO. 525) GGCAC Clone Rv353 :::::::::::::Rv383SP6.seq::::::::::::: GCTTGTCGTATTCCGTGGCACTGTCAGACATATGCGCCGCTCCTCCTCATCGCTGCGCTCGGCATCGTCGCCGGCGGT (SEQ ID NO. 526) CATGGCGTCACCCTACCCAAGCCGAACGCGAAACGAGAACGTGTTCCATTATTAGGGTGTGAGCACCAATACCAGATT GCTCACCAGGAACTCAC :::::::::::::Rv383T7.seq::::::::::::: CGATATTCGTCGGCCGCGTTGTCTCGACTGGGTCGCGT (SEQ ID NO. 527) Clone Rv384 :::::::::::::Rv384SP6.seq::::::::::::: GACCTCGGCCACCAAGCCGGACGCGACCGTCGAGGTGGCGATCCGGCTTGGCGTCGACCCGCGTAAGGCAGACCACAT (SEQ ID NO. 528) GGTCCGCGGCACGGCCANCCTGCCACACGGCACTGGTAAGACTGCCCGCGTCGCGGCN :::::::::::::Rv384T7.seq::::::::::::: CCGGAAGTCTAGGGGACGACCTACTCAGCGCAAAATGTCGCTAATGTGAGTCCGCCCCACCAGGGCAGATCAACCCAT (SEQ ID NO. 529) GTCGATGATGACCTACCCGGATACCGGATTGGCGGT Clone Rv385 :::::::::::::Rv385SP6.seq::::::::::::: AGCTTCAGTTCCTCCACGACGCGTTCCCAAATGAATTTCCCGATCCCACAATCTCGGTTCAGATACAGGTCGCCATAC (SEQ ID NO. 530) CCCTTACTTCGGNAACGCTGGGCGGATTGGCCCTGCCGCTG :::::::::::::Rv385T7.seq::::::::::::: CCGCCTACGGGTCGAACATGCATCCCGAGACCGATGCTCGAGCGCGCACCCCACTCGCCGATGGCCGGAACCGGCTGG (SEQ ID NO. 531) TTACCCGGGTGGCGGCTGACC Clone Rv386 :::::::::::::Rv386SP6.seq::::::::::::: GCGGCTGGTTACGACTCCCTGTTTGTGATGGACCACTTCTACCAACTGCCCATGTTGGGGACGCCCGACCAGCCGATG CTGGAGGCCTACACGGCCCTTGGTGCGCTGGCCACGGCGACCGAGCGGCTGCAACTGGGCGCNTTCGTNACCGGCAAT (SEQ ID NO. 532) ACCTACCGCAGCCCGACCCTGCTGGCAAAGATCATCACCACGCTCGACGTGGTTAGCGCCGGTCGAGCGATCCTCGGC ATTGGAGCCGGTTGGTTTGAGCTGGAACACCGCCAGCTCGGCTTCGAGTTCGGCACTTTCAGTGACCGGTTCAN :::::::::::::Rv386T7.seq::::::::::::: GCCTTTCCGCACAATCTGTACCCCAGGACCNTCTAAAAAATCGAATACGACGGCGTCGCCGACTTTCCGCGGTACCCG CTCAACTTTGTGTCGACCCTCAACGCCATTGCCGGCACCTACTACGTGCACTCCAACTACTTCATCCTGACGCCGGAA CAAATTGACGCAGCGGTTCCGCTGACCANTNNGTGCGGTCCCACGATGACCCAGTACTACATCATTCGCACGGAGAAC CTGCCGCTGCTAGAGCCACTGCGATCGGTGCCGATCGTGGGGAACCCACTGGCGAACCTGGTTCAACCAAACTTGAAG (SEQ ID NO. 533) GTGATTGTTAACCTGG Clone Rv387 :::::::::::::Rv387T7.seq::::::::::::: GCAGACCAACAAGATGCATCGGGATCATACGCCGTCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCCCAC (SEQ ID NO. 534) Clone Rv388 :::::::::::::Rv388SP6.seq::::::::::::: CTCAAGCTTGCCAAAGAGACCTCGTCCACCAAGCNGGACGCGACCGTCNAGGTGGCGATCCGGCTTGGCGTCCACCCG (SEQ ID NO. 535) CGTAAGGCANACCANATGGTTCGCGGCACGGTCAACCTGCCACACGGCACTGGTAANACTGCCCGCGTCGCGGTATTC GCGGTTGGTGAAAAGGCCGATGCTGCCGTTGCCGCGGGGGCGGATGTTGTCGGGAGTGACAATCTGATCGANAGGATT CAGGGCGGCTGGCTGGAATTCGATGCCGCGATCGCGACACCGGATCAGATGGCCAAAGTCGGTCNCATCGCTCGGGTG CTGGGTC :::::::::::::Rv388T7.seq::::::::::::: CCACGGCCTGGATCAAGGTACCGGCCGGGATGTTGCGCAATGGCAGGTTGTTGCCCGGCTTGATGTCGGCGTTAGCGC (SEQ ID NO. 536) CGGATTCCACCACATCCCCTTGCGAAACTCCGTTGGGTGCAATGATGTACCGCTTCTCCCCATCGAGATAGTGGAGCA ACGCAATCCGTGCGGTACGGTTCGGGTCNTACTCGATGTGCGCGACCTTGGCGTTGACACCATCTTTGTCATTGCGGC GAAAGTCGATCATCCGGTAAGCGCGCTTATGACCGCCGCCTTTGTGCCGGGTGGTAATCCGGCCATGCGCGTTGCGTC Clone Rv389 :::::::::::::Rv389SP6.seq::::::::::::: GGCGGCTGCGTCGGCGAGATGATCGCCCGGTGCCACCCCGATCCGTGCCTCGGTCAGCGCCAACGTGCTTTCCGGTCC (SEQ ID NO. 537) GGCGACCACCATGTCGCATGCGCCGAC :::::::::::::Rv389T7.seq::::::::::::: GCAATCGCCTTGGCGGTCGCCGGGTTGTCACCGGTGATCATCNCGGNGCGGATGCTCATNCGGCGCATTTCGTCNAAT (SEQ ID NO. 538) CGTTCCCGTATGCCCACCTTGACGATGTCCTTCATATGGACCACGCCGATGGCCCNCGCGCTNCTG Clone Rv38 :::::::::::::Rv38SP6.seq::::::::::::: CCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACGCCAAG (SEQ ID NO. 539) CTATTTAGGTGACACTATAGAATACTCAAGCTTCCACATCGGTATGCCAAAGCATTGCGCCGCTATCGATTTCGCGCT GGGTCGCCAAGGTGGACTTCTTGCTCAGCGACGAGATCCCGTGGTCGGATCCGCCGGCTGCGGCGGGCTGCGACCCTG CATCTCGGCGGCACCCGTGACCAGATGGCGCGCGCCGAGGCAGACGTCGCGGCGGGACGCCACGCCGACTGGCCGATG GTGCTGGCCGCGTGTCCGCACGTCGCCGACCCCGGCCGCATCGACGAAACCGGCCGCCGTCCGTTCTGGACCTATGCC CACGTGCCGTCGGGGTCCACGCTCGACGCGACCGAGACCGT :::::::::::::Rv38T7.seq::::::::::::: CGCGTCCACCGCAGCGTGAGATTGGTGGCGCCATTCGTCGTGGTGTAGCTGCTGTTGGCGGCGTCGCCGTATTGTGCG (SEQ ID NO. 540) GGCCAGCCTTGTGCGGGGGCCGCTTCTACCCACGAGTCGGCACTTCCGCAACCGCCCAGCTCGACCGCGATTACGGCG GCCGCAACGGCCGCCGGAAGGCGTCTCGCAAGCGCCTTATCCTTTCGCAGGTTCCCAGATCCTTCCGCTACGTGGGTC GCTCATCGGCGGGCCCGGCCGAATGAGTACAGGTGAGGGTAACCGCTACAAATGAAGTTGGTCAGTGCTGGCCAACTG TGTAATGGTTGCCCGGCTCGGGTCACCACGTACATTCTGGCAAGGCGGGCGAGATTCGGTTCCTCGCGTCCTTGGCCG GTGGCGGTTCCCGGTTGTCCGTGGGCGTGTCGTGTACGTGGTGTAAGTGTCGTGAACTCCTCAGTTTGGGCT Clone Rv390 :::::::::::::Rv390SP6.seq::::::::::::: CTCAAGCTTGCGCTGGATCTGGCGGCTGAGCCTGTTCTTGGGCAACATGCCGAGGGATCGCCTTTTCCACCACGCGGT (SEQ ID NO. 541) CGGGGTGGCGTTGCATTAGCTCACCGATGGTGCGCTTGTGCAGGCCGCCGGGATACCCCGAGTGCCGGTAAACCATCT TGTGCTGCAGTTTGTCGCCGCTGATGGCGACCTTGTCGGCGTTGATCACNATGACNAAGTCACCGCCATCGACATTGG GGGCGAACGTCGGCTTGTGCTTGCCGCGCAGCAGGTTGGCCGCCGCGACGGCAAGGCGGCCAANCACCACGTC :::::::::::::Rv390T7.seq::::::::::::: TTTGGGATGGGCAAAAAGGCGAAGCNCCGCGTGGCCACGAACGCCGGGAGGGACAATCTCGGGCGGCTAGGGCTTCTC (SEQ ID NO. 542) GCGGGAAGGCCCGAACGTACGGCGTTTCAACACGTCGCGTCGCCCTCCGACCGCGAACATTCGGGGATGGCAGCAACC TGGTAGCACCCTGGCCGGGCGATGATCTGCAGCGTCGCCGCGGGTAGTCGCCGCCCGGGCGGCTACAGTCTGAAACGC GATGACCATCGATGTGTGGATGCAGCATCCGACGCAACGGTTCCTACACGGCGATATGTTCGCCTCGCTGCGCCCGTG GACCGGTGGGTCTATCCCGGA Clone Rv391 :::::::::::::Rv391SP6.seq::::::::::::: CTCAAGCTTCGTCATAAGACCATGGTGCGCTTTCTTTCACCCGTCCANAGTCGGGGGCATCCGCACCGGCTCGCATCG (SEQ ID NO. 543) CATCATCCTCCCACGACGGGCCGCTCATCAGCTTGGGCCATTTCAATGTACTTGATACCCCGCGCTGCGGGTAGGCCA CTGCNACAATTCAAACACGGTGTCACACGGTGAATANTGTCNANATGGGCTCTGATCAACCGTCNCAAACCCGGTTTC :::::::::::::Rv391T7.seq::::::::::::: GAATTCTGCGTGCACCGCTATGGGTTGCAGCAGCGGCTGGCGCCGCACACCCCACTGGCCCGGGTGTTTTCGCCCCGA (SEQ ID NO. 544) ACCCGGATCATGGTGAGCGAAAAGGAGATTCGCCTGTTCGATGCTGGGATTCGCCACCGCGAGGCCATCGACCGATTA CTCGCCACCGGGGTGCGAGAGGTGCCGCAGTCCCGCTCCGTCGACGTCTCCGACGATCCATCCGGCTTCCGCCGTCGG GTGGCGGTAGCCGTCGATGAAATCGCTGCCGGCCGCTACCACAAGGTGATTCTGTCCCGTTGTGTCGAAGTGCCTTTC GCGATCGACTTTCCGTTGACCTACCGGCTGGGGCGTCTGCACAACACCCCGGTGAGGTCGTTTTTGTTGCAGTTGGGC GGAATCCGTGCTCTGGGTTACAGCCCCGAACTCGTCNCGGCGGTGCGCGC Clone Rv392 :::::::::::::Rv392SP6.seq::::::::::::: GCAGTTGGGAATCGCTCTGCAGCAAACCANTATTCTGCGCGACGTTCGAGAGGACTNTTTGAATGGACGGATCTACCT (SEQ ID NO. 545) GCCGCGCGACGAGCTGGACCGATTAGGCGTACNCCTCCGCCTGGACGACTCCGGGGCACTCGATGACCCCGACGGACG GCTCGCGGCACTGCTGCGGTTCANTGCCNACCGCGCCGCANACTGGTATTCGCTGGGACTGCGGCTGATTCCACACCT CGACCGCCGCAGCGCTGCCTGCTGTGCGGCCATGTCTGGCATCTACCGCCGTCNGCTCGCCTTGATCAGACCATCGCC GGCGGTCGTCTACCATCGGCGAATCTCTCTGTTCGGGACTGAANAANGCCCAAGTGGCGGCGGCAGCACTGGNCTCTT CGGTAACCTGCNGACCGCCCATTGGACCGCTACCG :::::::::::::Rv392T7.seq::::::::::::: TTGATCTGGACGTCTGAGACGGTGATCGGNCCGAACCTGAATTGTCCGGTAATGCCCAGCGCAGAAAGCANGGTGGTG (SEQ ID NO. 546) GCCGGGGCGGTGAANCCGGCGTCGGCGGCACCGTCGAAGTCGATGTGGATTGCCGGAATGGGGATGTCCGGCACGGCG AAGCCGTAGTTCGCTTGTCCCGTGAGGCCCANGTGGATGGGGGGAAGGATCGTGGTGTCCGGGATGATAATGGGGCCG ATGCCGCCGGTTGAAGTCCAGTGGATCGGGAATTCGGGAATCGTGATGCCGACGTTCAGGCCGAACAGGCCCTCCAAG TTGCCTCGCCACNAGATGCCGTTGCTGAAGTTGCCCGACATGAGGGCGCCGGTGTCCACATTGCCCGAATTGGCGACG CCGGTGTTGGC Clone Rv393 :::::::::::::Rv393SP6.seq::::::::::::: CACGTAGGCGCCGTCCATAAATNACTCCGCCGCGCTTCGCACATCCTCGTANCGATCCTTGGCGAGCAGGTCAACCGG (SEQ ID NO. 547) GCGCTGCCCGTCNAGGAGCCGGTTTTTGGCGTGCAGCCACTGGCCGACACCTCGGGGGGTAAGCGAATCCGAGAGCAG GAGGACNAGGTCACGAANCTGCGCCAGCCGGTCGTACCGCTCAGGGCGGATGTCGCCGGTCCGCCACCCGCGTACCGC CCGATCGGACACCTGTATGACCGCGGCGACNTCGACCTGGGTGACGCCGAAGGGTTTCAGGGCATCNACNATCTCGCT GGCCTCGACCGCCCGGTCCAGGGTGACCGCCATCGTGGTTCCTCCGCAACTTCCGGTTCTACTACCGTAAACGCTACC G :::::::::::::Rv393T7.seq::::::::::::: CGGGGAACGGTCCTCGCACACCTGGTTCGTGTTGCGGGAATTACTCGGACANCAAAACGTCAAGAACTACGACGGCAG (SEQ ID NO. 548) TNGGACAGAANACGGCTCCCTGGTGGGCGCCCCGATCGAGTTGGGAAGCTGATATGTGCTCTGGACCCAAGCAAGGAC TGACATTGCCGGCCAGCGTCGACCTGGAAAAAGAAACGGTGATCACCGGCCGCGTAGTGGACGGTGACGGCCAGGCCG TGGGCGGCGCGTTTCGTGCGGCTGCTGGGACNCCTCCGACGAGTTCACCGCCGGGAGGTCGTGGCGTCGGCCACCGGG CGAATTTCCGGTTCTTCGCCGCGCCCCGGGATCCTGGGACCGCNGGCGCGCGCTGTT Clone Rv396 :::::::::::::Rv396SP6.seq::::::::::::: CTCAAGCTTTGTCCGACAAGCGTTCCCGGGCGGTCAGCAAGCGAACGTCGGTTGGCCCACTGCGGGTCGATATTGCCCG (SEQ ID NO. 549) CCAGGGA :::::::::::::Rv396T7.seq::::::::::::: CGTCAGCACGGCGACGTCGCGNTACGCCGAGCAGTTACACAATCGCTCTGCAGCAAACCAATATTCTGCGCGACGTTC (SEQ ID NO. 550) GAGAGGACTTCTTGATTGGACTG Clone Rv39 :::::::::::::Rv39SP6.seq::::::::::::: CTGCATCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTAC (SEQ ID NO. 551) GCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTCGCGCAGCGGCGGGTTGACCCGGTTCACGCCGTCATAGC TGGCCAATCTGGCATCGTCGATCANCATGTGGTGGGGGGTGACCTCGGCGGTGATCGAAATACCCTGGTCCTTATCCC ATTTCAGGATTTCGACGGTGCCCGCGGCCGACGCGTGACAGATGTGCACCCGGGCGCCGGCGTCACGGGCCAGCAAGG CGTCGCGGGCGACGATCGATTCCTCGGCGGCCCGCGGCCATCCCGCCAGGCCCAGCCGCGCCGCCATGGGTCCCTCGT GCGCGACGGCGCCGACCGTCAGCCGGGGCTCCTCGGCGTGCTGGGCGATCAGCACGCCCAAACCGGTG :::::::::::::Rv39T7.seq::::::::::::: CCGACGCGCACTACGTGCTGGTGTCCACCCGCGACCCGCACCGGCACGAGCTACGCAGCTACCGCATCGTCGATGGCG (SEQ ID NO. 552) CTGTCACCGAGGAACCTGTCAATGTCGTCGAGCAGTACTGAACCGTTCCGAGAAAGGCCAGCATGAACGTCACCGTAT CCATTCCGACCATCCTGCGGCCCCACACCGGCGGCCAGAAGAGTGTCTCGGCCAGCGGCGATACCTTGGGTGCCGTCA TCAGCGACCTGGAGGCCAGCTATTCGGGCATTTCCGAGCGCCTGATGGACCCGTCTTCCCCAAGGTTGTTGCACCGCT TCGTGAACATCTACGTCAACGACGAAGACGTGCGGTTCTCCGGCGGCTTGGCCACCGCGATCGCTGACGGTGACTCGG TCACCATCCTCCCCGCCGTGGCCGGTGGGTGAGCGGACACATGACACGATACGACTCACTGTTGCATGCCTTG Clone Rv3 :::::::::::::Rv3SP6.seq::::::::::::: TGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACG (SEQ ID NO. 553) CCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGCCGGGAGGGTGCATGGCCGACTCGGATTTACCCACCAAG GGGCGCCAACGCGGTGTCCGCGCCGTCGAGCTGAACGTTGCTGCCCGCCTGGAGAACCTGGCGCTGCTGCGCACCCTG GTCGGCGCCATCGGCACCTTCGAGGACCTGGATTTCGACGCCGTGGCCGACCTGAGGTTGGCGGTGGACGANGTGTGC ACCCGGTTGATTCGCTCGGCCTTGCCGGATGCCACCCTGCGCCTGGTGGTCGATCCGCGAAAAGACGAAGTTGTGGTG GAGGCTTCTGCTGCCTGCGACACCCACGACGTGGTGGCACGGGCAGCTTTAGCTGGCATTCCT :::::::::::::Rv3T7.seq::::::::::::: GGAAACACCGNCGCCGTCGTGGCCACCAACACCGCGACCAGCACCGTGACCCGGACCGGGGTGCCGCGCGAACCCGTC (SEQ ID NO. 554) TTGGCCAATTGCCGCGGCACCAAGCCGTCGCGCGCCATGGCGAACAGCACGCGGCATTGCCCGAGCATCAACACCATC ACCACCGTGGTAAGCCCGGCCAGCGCGCCGACGGAGATGATGCCGCTGGCCCAGTACACCCCGTTGGCCTGGAACGCG GTGGCCAGATTTGCCGGCCCGCGGCCCGGTACGGTCCGCAGTTGGGTGTATGGAACCATGCCCGACAGCACCACCGAT ACCGCGACGTAGAGAAGGGTCACGACCCCCAGCGACGCGAGAATCCCTCGAGGGACGTCTCGTTGAGGACGCTTGGTC TCCTCGGCCATGGTGGCCACGATGTCAAACCCGATAAACGCGAAGAACACGATCGATGCCCGGCCAGCACGCCCTA Clone Rv40 :::::::::::::Rv40SP6.seq::::::::::::: CCTGCTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTA (SEQ ID NO. 555) CGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGTCCTCGGGCGTGGCCTCGGCCAAGAAATCGTCGACGC CGGCCTCCTGTGCAATCGCCTTGGCGGTCGCCGGGTTGTCACCGGTGATCATCACGGTGCGGATGCTCATTCGGCGCA TTTCGTCGAAGCGTTCCCGTATGCCCACCTTGACGATGTCCTTCAGATGGACGACGCCGATGGCCCGCGCGCTGCTGT TATCGGTCCATTCCGCAACGACTAGGGGTGTCCCCCCGCCGGAGCTGATGCCGTCGACAATGGCACCCACCTCCTCAG TGGGGTGGCCACCGTGATCGCAAAACCACTTCATCACCGCAGCCGCGGCACCTTGCGGATCCGAACGGATGCGCTC :::::::::::::Rv40T7.seq::::::::::::: TTCGTTCGATGGCGCCGCCCCGGCTACGGTTTGACCTGTGGGTGTCGAATTGGGGTCAAATTCCGAGGTCGGCGCGCT (SEQ ID NO. 556) AAGAGTGGTCATCCTGCACCGCCCGGGGGCCGAACTGCGCCGGCTCACACCGCGCAACACCGACCAGCTGCTGTTCGA CGGCCTGCCCTGGGTATCCCGCGCGCATGACGAGCACGACGAATTCGCCGAGCTGCTGGCTTCCCGCGGTGCGGAAGT GCTGTTGCTGTCGGACCTGTTGACTGAGGCACTACATCACAGCGGGGCCGCCCGCATGCAGGGGATCGCCGCTGCCGT CGACGCACCGCGGCTGGGACTGCCGCTGGCGCAAGAACTTTCGGCCTACCTGCGTATCTCGACCCAAGCANGTTGGCG CATGTGCTGACGCCGGCATGACTTCAACGAACTCCCNTCCGACACGCCGAACGAAGTGTCGTTGGTGTTGCGTATGC Clone Rv412 :::::::::::::Rv412SP6.seq::::::::::::: GCGGCGAGTGTGGTGGGTGCCGAACACGAATCCAACGACGCACTGGCGGAGAGATACCACTTGCTGTACTGGAAGCAC (SEQ ID NO. 557) GTGCTGATGATCTCCCGTGGAATGTGCCTCGCCCCCGTCTATCGAAAACAGTGAGCATGCTGCG :::::::::::::Rv412T7.seq::::::::::::: CAACCGCGCTCGGCGCGTCTGGGCCTTCCGCCGGCTCCGCCGACAATTCTATCTCTGGATCAGCGGGGCTCTCCGGGC (SEQ ID NO. 558) CGGCCTCCGCGAACTCAACAGGCCGCGCCTTCCGGCCGAAACATTCCCTAGCCATATATGATCGCACCTCGATACACG ATCTGGCGGCAACACCGCAAAGCGTCCGACGGGCCCAACCTCCGCAATTCAGGTATCCGGG Clone Rv413 :::::::::::::Rv413SP6.seq::::::::::::: GAAGGTCGGCGAAGGTGTGGCTGGMTGCCGATCACGAATCCAATGATGCAGTGGTCGGAAGATATTAGCCACTTGCTG (SEQ ID NO. 559) TTCTGGAGACAGGTGCTGATGATCTCCCGTGGAATGTCCCTCGACTCCGTCTATCGAAATCTGTGAACA :::::::::::::Rv413T7.seq::::::::::::: TCCTGCGCTCTGGGCCATTCTCGGGTCTGCCGACAATTCTATCTCTGGATCTGTGGGGCTCTCTTGGCCGGCCTCNGC (SEQ ID NO. 560) GATCTCTTCANGGCGCGCCTTCCGGCCGAAACATTCCCTATCCATATATGATCGCACCTCTATACACCGTTTGGCGGC AACACCGCAAAGTGTCTGTCG Clone Rv414 :::::::::::::Rv414SP6.seq::::::::::::: AGCTTTACGCTGGCGTATCAGCGTTGGGGCCGCTGCCATTTCGGTCGCCCAACGCGTTGCCAGCTCCCTGCGCTGTCA (SEQ ID NO. 561) GGGCTTGCGCGCCAAACTGGCCACCGCAACAAACTTGGCTGAGCTTGATC :::::::::::::Rv414T7.seq::::::::::::: CTCTATCTGGCGTCACATTCGCAATCTTTAGATTGCAGATATCGATAAAATCACCCGCGCGACAAGACCGCCATGTCA (SEQ ID NO. 562) TCCTTTCGATGTTATTTCGCCGGCCTGGGGAAAGCGCAACGACGTTGCCTACACGTTCCGCCGT Clone Rv415 :::::::::::::Rv415SP6.seq::::::::::::: AGCTTTNCCTTGCATCTGCACCCCGATCCACGTCAGCCACGTCGGCGTTCTCCACCAAGAAGTTGCGGGCATTCTCCT (SEQ ID NO. 563) TGCCCTGGCCGAGCTGCTCGCCCTCGTAGGTGAACCAGGCACCCGACTTGCGGATGAGGCCCTGATCCACACCCATGT CGATCAGCGAGCCCTCCCTGCTGATTCCCTTGCCGTAGAGGATGTCGAACTCGGCCTGCTTGAAGGGGGGCGAACAGT TGTGCACGACAACCCCTTCGGCGACGAGGGTGTGCAGTTCCTCGACCTCGAGGTCGAACGTTCGTGCCCGCCGCGTTG GCAGCACTTCTCGGATCACGGAATAGCGGANTTCTTCCGCCAGCATGTCGTGCAGGAATTTGTCATCCAGGGCATCCG CGAGCGCCTGCACGCG :::::::::::::Rv415T7.seq::::::::::::: ACTGTCNAGGGAATGCTTCGCAGCATCTACCTGCAGTCGCTTGTGCATAAGCGGACGGCCCNACCTGTTCGTGTTCCG (SEQ ID NO. 564) GGACACCAGACGCGGGAGCACCGGCAGTACGGCGAAGGTTTGAGCGGAAGGAGTTGCGCAAATCGGGGCGCGCCCAAC ACCCGTCCGCAAGACGCGGTCAACGACCTGTTTCAGGCGATCAGGGTCACCGACTCACCTGCACTGAGAACAAGCGAT CTGCTGATCTGCCAGAAGATGGACATGAATGTCCACGGCAAGCCTGATGGCCTGCCGCTCTTCCGGGAATGTTTGGC Clone Rv416 :::::::::::::Rv416SP6.seq::::::::::::: TGAATTATGATCCCGACACAACTGCATCANTTTAGCCGCGTCGNGATGCTATCCGCCGACGGTTTGGANCNGGTCCGT (SEQ ID NO. 565) GTCGTTCGTGTTGATCTCACCCGAAGTTGTGTCCGCCGCCGCCGGGGATCTAGCGAACGTGGGATCGACAATCAGCGC CGCCAACAAGGCGGCAGCGGCTGCGACCACGCAGGTGCTGGCCGCGGGCGCCGATNAGGTGTCAGCGCGCATCGCGGC GCTGTTTGGTATGTACGGCCTGNAATATCCGGCGATCAGTGCGCAAGTTGCCGCGTATCACCANCAGTCCGTGCAG :::::::::::::Rv416T7.seq::::::::::::: AACGGGGACCNCAAGAAACCATTCAANAACGAGGGGTCGTCACCAACGTCGAAACCGACGGTTGCCAGCCGGCCCACG (SEQ ID NO. 566) ATATTGCGTGCTCGAGGGTCCGCTGTACCCTCACCGAACGTGAGTCCCACACCGCGGAGGCGGGCGACTCTGGCGTCG TTAGCAGCCGAGCTCAAGGTGTCCCGCACCACTGTCTCGAATGCTTTTAACCGACCGGATCAGCTCTCCGCCGATCTA CGTGAACGAGTGCTTGCCACGGCCAAGCGACTGGGCTATGCCGGACCGGATCCGGTGGCGCGATCGTTGCGGACCCGC AAAGCCGGTGCGGT Clone Rv417 :::::::::::::Rv417SP6.seq::::::::::::: AGCTTTGGAGCCNCNCCGANCCNCCGGTACGCCCCGCCACCGCCGTACCCGGCACCCGACCCCTTTGAGCCGTTCGCC (SEQ ID NO. 567) GTGGCCGCGGTGGANCTGGCCGACGAGGGACTGATCGTGCTGGGCAAAGTGGTCGATGGCACGCTGGCCGCCGATCTG AAGGTCGGCATGGAGATGGAGCTGACGACCATGCCGCTGTTCGCCGACNACGACGGTGTGCAGCGCATCGTCTACGCG TGGCGGATCCCATCGCGCGCCGGCGACNATGCANAGCGCANCGATGCTGAGGAGCGGCGCCGATGAGGATGAGCGCGC CGGAACCCGTTTACNTCCTGGGTGCCGGTATGCACCCGTGGGGGAAATGGGGTAATGACTTC :::::::::::::Rv417T7.seq::::::::::::: TTCTCNCATCGTTCGTACTNNGATGGGACGCTGCTGCCCGAGGCGATCCTGGCCAACCGGCTCTCGCCGGCGCTGACC (SEQ ID NO. 568) TTCGGCGGGGCGAACCTGAACTTCTTTCCGATGGGCGCTTGGGCCAAACGTACCGGGGCTATCTTCATTCGGCGTCAG ACGAAAGATATTCCCGTCTACCGCTTCGTATTACGTGCTTACGCCGCGCAGCTGGTGCAAAACCATGTCAACCTCACC TGGTCGATCGAAGGGGGTCGGACCAGAACGGGCAAGCTACGGCCACCGGTGTTCGGGATCCTGCGTTACATCACCGAT GCGGTCGACGAAATCGACGGTCCCGAAGTGTATTTGGTGCCGACCTCGATCGTGTACGAACAGCTGCACGAAGTGGAA GCCATGACCACCGAAGCCTATGGCGCCGTGAA Clone Rv418 :::::::::::::Rv418SP6.seq::::::::::::: TTCTTCCGGGTACCGCTGATCGGCGGCACCATCACGCACCCGGTGCAGGGCGAGGCGGCCGCCGGTGTGGTGTTGCTA (SEQ ID NO. 569) CGGCCGGCCAGCCCGGGTACCGGTGTGATCGCCGGTGGTGCGGCCCGCGCGGTGCTGGAATGTGCGGGGGTGCACGAC ATCTTGGCCAAGTCGCTGGGCAGTGACAACGCGATCAATGTGGTGCACGCCACCGTGGCCGCGCTCAAGCTGCTGCAC CGTCCGGAGGAGGTGGCGGCGCGCCGCGGTTTGCCAATAGAAGACGTCCCCCCGGCCGGGATGCTG :::::::::::::Rv418T7.seq::::::::::::: GTCGAAAGTGACCATCTCTACCTTGAGTGCCATACCGCCCGACCCTATGCCTCGGATAGCTCGGCGGAAAGAAACGCT (SEQ ID NO. 570) TGCAGTGCCGCCGAATAGGCGGCTACGTCGTGAGCGCCCATCAACTCTCGCGCGGAGTGCATCGCCAGCTGGGCGGCG CCGACGTCGACCGTGGGGATTCCGGTGCGCGCCGCGGCCAACGGCCCGATCGTCGACCCGCACGGCAGATCGGCGCGA TGTTCGTAACGCTGCATAGGCACTCCCGCGCGCTGGCAGGCCAGTTGCGAAACGCCCCCGCCGGGTGCCTTCCGTCGG TTGGCTTTACCGCAAATTTGGGGTTGCCCCT Clone Rv419 :::::::::::::Rv419SP6.seq::::::::::::: AAAGCCACGGAAACGATTGCCTACTGCCGAATCGGGGAACGGTCCTCGCACACCTGGTTCGTGTTGCGGGAATTACTC (SEQ ID NO. 571) GGACACCAAAACGTCAAGAACTACGACGGCAGTTGGACAGAATACGGCTCCCTGGTGGGCGCCCCGATCGAGTTGGGA AACTGATATGTGCTCTGGACCCAAGCAAGGACTGACATTGCCGGCCAGCGTCTACCTGGAAAAA :::::::::::::Rv419T7.seq::::::::::::: TTTCGCCACCGCNAGGTCGTGCGCGTTCCAGAAAAGCGTGGTTTCGCCGGGCGCGAGGATTCGACGGTCCAACTGACC (SEQ ID NO. 572) AGCCGGTCCCGCCACCCGTTAGGCAGGATCGCGGTGTCTATATGTTCGCCCTCGGCATAAACGCCATTGCTGCGGTGA AAATCGGACATCTCGCCGATTGCCACGTCTACATGATCCGCTTTGTCCCGCGCCGGGTCGTTGACAAACGCGATGTCN GCCTCCTGGGAAGCGGTGGC Clone Rv41 :::::::::::::Rv41SP6.seq::::::::::::: TCGCCAAGTGGATTCGTGCTCACCNACGAGATCCGTGGTCGGATCCGCNGCTGCGGCGGGCTGCGACCCTGCATCTCG (SEQ ID NO. 573) GCGGCACCCGTGACCAAATGGCGCGCGCCGAAGCAGACGTCTCGGCGGGACGCCACGCCGACTGGCCGATGGTGCTGG CCGCGTGTCCGCNCGTCNCCGACCCCGGCCGCATCNACCAAACCGGCCGCCGTCCGTTCTGGACCTATCCCACGTGCC NTCGGGGTCCACGCTCGACGCGACCGANAACGTAACCAGCGTCCTCGANCGGTTCGCCCCCGGCTTCCGTGACATCGT GGTGGCGGCCGCGCCGT :::::::::::::Rv41T7.seq::::::::::::: GTACCGTCACCATGATCGCCCCCATCCGCATCGGTGAGCTGATAGATCCCAGCCGGTTTCGCCAACCCCGGAGCGATC (SEQ ID NO. 574) TTGGCGCGCTGCTNGTNGTCNCTGANACNTAGCCACCAACAGAGCCCGGTGTGCGACAAGANGACTGATCGGATCTCT CCGGACACNTCGAGGGGGTCWTCAGGAGNCCGGGCGCCACCCCGAGGTAAGCCTCCGCCCAGCCTCACACCGCGACCG GGTATCNCAAGTCGCGCAATAANCCCACCACCTCCTCGGACCCCACGTTGTATGCGGCTGGGT Clone Rv42 :::::::::::::Rv42SP6.seq::::::::::::: ATACTCAAGCTTAGACCTCACTGATGTGGCGGGACGCGGGAGATAACCGCGGTTCGAGCCGTTCAACAGTGGTGGTTC (SEQ ID NO. 575) CCACACCAGTTGTTTGCCTTTGCGAAGTAAAGCGATTCGATTTGCTCGAAAAGAGGGCTGGCTGCTCGTGAGGGACAT CCATGGCCGATACCTCAGCGATCTCAACGGTCAAGCGACTGCATGTTTGGCGCAAGGTATCGCTAAGCATAGGTTCGT GACGGATTTGACAGCAAGAGCTTTCCAAAGATTGCTGTCCACATANTGATTCGCATCTCTACACCTCTTCGCCGGTGC TGTCAAGAGCCATTCGAATCAGTTATCTCGCTCGTGCTTGGAANAAATTTTCCCAGCCTGCGTTGGACAAACCGCGTC GCCAAAGCGGT :::::::::::::Rv42T7.seq::::::::::::: AGCTTCCCGAGAAACAGTGCATTCCCTAAGCAGCCCGTTGTCACGCCGATGAGTGAAGAGTGCACGCAATCGCCGGAA (SEQ ID NO. 576) TCCGGCAAAGCCCTGCACAAGCGAAATCAACCCGGAGGCTGACAAGGCAACGTCGGTGATCCGTACCGCCTGGTTGGA CAAACGGCAGAAGGCGGCCTCGTCCGGTCCATCTACGCCGAGCACACTGGTGATAGCGCGCATCGGCATCGGTGCCGC CACGGTGGAGACGACGTCCGCGGGCGTCTGGGTCAGTAACCCGCCGACCAGTTCTCGGGCAAGCTGGTCGACCATCGG GCGCCACGTCTCCAACGCGCCACGCGCCATACCTGGTGCCAGTTGCTTGCGCATCCGGGTGTGCGCCGGCGGATCGGA CGTCGCAGAAACGCAGCCACCCCGTGAGAAGTGACCCACGGCGCTGGACACGTGTCTGGTTAC Clone Rv43 :::::::::::::Rv43SP6.seq::::::::::::: CGGCCGGGATGTGCGCAATGGCAGGTTGTCGCCCGGCTTGATGTCGGCGTTAGCGCCGGATTCCACCACATCCCCTTG (SEQ ID NO. 577) CGAAAGTCCGTTGGGTGCAATGATGTANCGCTTCTCCCCATCGAGATAGTGGAGCAACGCAATCCGTGCGGTACGGTT CGGGTCGTACTCGATGTGCGCGACCTTGGCGTTGACACCATCTTTGTCATGGCGGCGAAAGTCGATCATCCGGTAAGC GCGCTTATGACCGCCGCCTTTGTGCCNGGTGGTAATCCGGCCATGCGCGTTGCGTCCACCGCGACCGTGCAGCGGGCG CACCAGCGACNTCTCCGGGGTTGACCGGGTGATCTCGGCGAAATCAGATACGCTGGCGCCGCGACGACCAGGCGTCGT GGGCTTGTACTTGCGAATTGCCATGGTCTAATCAGGTCTTTCTCTCACCTCTCGTCGCCGGGCTAGGGCGCATTGCCT GCTCCT :::::::::::::Rv43T7.seq::::::::::::: TAGCGGTGTAACCAACTCCCGGGTCACCACCCGCAAACCTCTTGCGGCAACAGCACCGTCGACGCGTCAACCGGGCTG (SEQ ID NO. 578) CCCGGAATCCTGTGGATGGGCATCGAGTGCATGGTCACGACGTCCCCGACGCGGCCGGTGGCAACGACAAGTGGCCCG GATGCACCACAAATGACGGCCGCACACCGGTGGGGACGGCCAGCACGAGAGCCGTGTCGCCGAAGTCGACGCTAATGC CGTAGGCATTGGCCGTCACAACAGGCGACGCCCCGCGTACCACCGAGTCCACGGNGGTTGGGCGGTCTCCTCGGCCAA CCAGGCGTGAACCCGGCGGATCCGAATGCAGCAAGACCCGTGGGC Clone Rv44 :::::::::::::Rv44-2ndSP6.seq::::::::::::: CCATTGGTCGGTGTGCGCATACCANTACNACGCGCCGGGCACCTGACGCGGCGGCCGCAACCATTCGGTGGCCATCGC (SEQ ID NO. 579) CATCGTCTGCCACCCGGTCAACGGACGCACCTTCTCCTGGCCGACCTAGTGCGCCCACCCGCCGCCGTTGCGTCCCAT CGATCCGGTCAACATGAGCAGCGCCAACACCGAGCGGTACATGACATCTGCTGTGGAACCAGTGACANATTCCGCCGC CCATGATGATCNTCGACCGTCCTCCGGATTCGGTC :::::::::::::Rv44-2ndT7.seq::::::::::::: GCCGGCCTGGTCAAAGGGGCGTCCGAAGGANCCGGGCTGGGTAAGAAGTTCCTGGCTCATATCCGCGAATGCGACGCC (SEQ ID NO. 580) ATTTGTCAGGTGGTGCGGGTGTTCGTCGACGACNACGTGACTCATGTCACCGGACGGGTCGATCCCCAGTCCGACATT GAGGTCGTCGAGACCGAGCTGATCCTGGCAGATCTGCAAACCCTGGAGCGGGCCACGGGCCGGCTGGAGAANGAAGCN CGCACCAACAAGGCGCGCAAGCCGGTCTACGACCCGGC Clone Rv45 :::::::::::::Rv45SP6.seq::::::::::::: GATCCACTGACCACGATGACATATCGAAATGCTCGACGATTCCGATGGCGATCAAGGCCACGATGCCCTGGCCGTTGG (SEQ ID NO. 581) GCGGTATCTGGTGGATGGTGTACCCGCGGTAGGTTCCCGTGATCGTGTCGACCCAGTCCACGCGATGGGCGGCGAGGT CGTCGGCACGCATCACCCCGCCGTNTGCCGCCGAGTGCGCCTCGAGTTTGGCGGCCAGCTCTCCCCGGTAGAACTCTC ACCGTTGGTCGCCGCGATCTTCTCTANCGTCGCCGCGTGGTCAGGAAAGGTAAACAGCTCACCGGGTTTCGGCGCTCG TCCGCCGGGCATGAACGCATCTGCGAATCCGGGCTGGGATGCGAACAACGGACCTGTGCCG :::::::::::::Rv45T7.seq::::::::::::: TCTACTGCCGAATCGGGGAACGGTCCTCGCCCACCNGGTTCGTGTTGCCGGAATTACTCAGGACACCGAAACGTCGAG (SEQ ID NO. 582) AACTACGAGCGGAGTTGGACANAATACCGCTCCCNGGTGGGCGCCCCCATCGANTTGGGAAGCNGAAATCTGCTCTGG ACCCCACCCAAGAATGACATTGCCGGCCGCCCTCCAACTGGAAATAGAAACNGTGATCACCCGCCGCGTTCTTGGAAG GAATGGCATGCCCTGGGCCGGGCGTTCCTTCCGCTGCCGGACTCCTCCCACCAATTCACCGCCGAAGGCGTCCCGTCT GC Clone Rv46 :::::::::::::Rv46SP6.seq::::::::::::: ATACTCAAGCTTCTGTCACCGAAATCCCGCATGGGATAACGGGTTTAGATTTCGACAACGGGACCGTGTTTCTCAACA (SEQ ID NO. 583) AGCCGGTCATCAGCTGGGCCGGCGACAACGGTATCTACTTCACCCGCTTTCGCCCGT :::::::::::::Rv46T7.seq::::::::::::: CTGGCTCAAGCGCTCGGCGCGCAGGTGAACTCGGACCGGCTCGACGTCGCCGAACGCGAGGCGGTGCTGGCCCACGCC (SEQ ID NO. 584) GACGCCGTCGTCGCACATATCGGCACCGTGCACAAGTCTACAACAACGCCGGCATCGCGTACAACGGCAACGTCGACA AGTCGGAGTTCAAGGACATCGAGCGCATCATCGACGTCGACTTCTGGGGCGTCCTCCACGGGCCC Clone Rv47 :::::::::::::Rv47SP6.seq::::::::::::: CCGCCCTCCGCATTATGGGTCAAGAACCATCGGGTCGGACTTCTGGGCTTCCAACGCTCGCGCCGTCCCN (SEQ ID NO. 585) :::::::::::::Rv47T7.seq::::::::::::: CCGTGGCACTGTCAGACATATGCGCCGCTCCTCCTCATCGCTGCGCTCGGCATCGTCGCCGGCGGTCATGGCGTCACC (SEQ ID NO. 586) CTACCCAAGCCGAACGCGAAACGAGAACGTGTTCCATTATTAGGGTGTGAGCACCAATACCAGATTGCTCACCAGGAA CTCACGCAGCACCGGGACGGATGTCGGCCACCACGCCCATCTGGGGTGGTAGCGGGGAAATACCGCTAACGCGGCTCC GGTGCCG Clone Rv48 :::::::::::::Rv48SP6.seq::::::::::::: TACTCAAGCTTGTCCAAATATCGAAGCGTCGGGTCGCGAGGCTCGGTCGGCAGCTCCAGCAAAACCCGCTCCACCCCT (SEQ ID NO. 587) AGATGCCGGTATCCCTCAAGGTCTTTATCCGCCGCTTCACCCCACTGGCACACGGTCACCGGCACGTCGCCCCCGGCC ATGGCGCGCAACCGCTGAAGCGGACCCGACAGCCGCTGCGGTGATGGACTGATCGCGATCCACCCGGCATTGAGCCGG GCTATCCGCGGGAAGTTCGCCGGTCCCCCGCCCACATACAGCGGAGGATAGGGCTTTGTCACCGGCTTCGGCCAGCAG TAGATCGGATCGAAGTCCACATATGTCCCATGGAATTCCGCCTGCTCCTGCGTTCAGATCTCGATTATCGCGCGCAAC CGCTCATCGATCACACGTCCGCGCACCGCAGGGTCCACACCATGGTTGGCGACTTCTTCGCGCAACCAGCCACACCCA CGCCGAAACGAAACCGTCCCTGCG :::::::::::::Rv48T7.seq::::::::::::: CAGGCATGCAAGCTTGGCCAACTCCTCATCGGACTTGAAGGTGCCGTCCTCGTTGGCGGCCCTGCTCCACGGCACGTT (SEQ ID NO. 588) GATGGCACCAGGAATGTGTCCGGGCCGCTGGCTTTGTTCCTGCGGCAGGTGCGCGGGGGCCAGGATCTTGCCGGAGAA CTCGTCGGGAGAGCGCACGTCGATGAGGTTCTTGACGTTGATGGCCGCCAGGACCTCGTCGCGGAATGCCCGAATCGT GTTATCCGGCGGGGANGCGGTGTAGGAAGTCACCGGCCGGCTGACCGGGTCGCTGGACAGCGGGCGTCCGTCGAGCTC C Clone Rv49 :::::::::::::Rv49SP6.seq::::::::::::: ATACTCAAGCTTCAAAACAGGCCTGTTGTGGGCGCACCCGGCTCGCCGAGTTCTGCACGCACCGCCTCAAGTGCGGCC (SEQ ID NO. 589) CGCACCGCCGGCATCTCCCGGTCACGCAGGGCCGCGGCCCGCGCCGCAGCGACGGCGTGTTCGCGCAGTTCGCCGTCA ATGATGCTGACCTGATCGGCCACCCGGGCGGTCTCGGCGTCGTCCCGTTCACTAATCGCGGTGCTCAGCAGCGTCTCG ACAGCCACCACCCGAGTGGAGACCAGATGCNCCACCACGGACCGCAGCGATGCCAGTCACCTCACCCGTCC :::::::::::::Rv49T7.seq::::::::::::: CAGGCATGCAAGCTTTGCAGTTGCTGACTAATGTCGGCCAACGTCACCACAATCGCGATGAATTCAATCATGCCGCCC (SEQ ID NO. 590) AGGGCGGCCAACCCAATGGTGGCCGCGAGCGGCAGCTCGATCGCAGCGCGGAGGTTGCCGGCCGCCAGTTGATTCACG AACAGGGTGAGGTCATAGGCGCGCAGGATAGTGACGAAGGCAAGACCTAGATCTGCCGTCGGAAGAAGAATCGAGTAT CCGGTCGACACAACGGAAGCGAAAGTGTCCGCGATGTTGATGAGCGTCGCCGGTTGTGGCGGCGGTGGCGGCGGTAGC ACCGTCCGCACATACCGCGGGAACGCGGGCATCCGAATTTGGGGCAGGGTGTTCAAGGCGGCTGGCAACTCACCATGA ATCT Clone Rv4 :::::::::::::Rv4SP6.seq::::::::::::: CCGGCTCGTATGTTGTGTGGAATTGTGACCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACGCCAAG (SEQ ID NO. 591) CTATTTAGGTGACACTATAGAATACTCAAGCTTGGCCGCAGGGCCGAGTCGATTGGTCGCGGTCGCCTCGACAGTTAG CTTATGCAATGCTAACTTCGGGGCAAAGTTCAGGCGGATCGGCCGATGCCGGGCGTAGGTGAAGGAGACAGCGGAGGC GTGGAGCGTGATGACATTGGCATGGTGGCCGCTTCCCCCGTCGCGTCTCGGGTAAATGGCAAGGTAGACGCTGACGTC GTCGGTCGATTTGCCACCTGCTGCCGTGCCCTGGGCATCGCGGTTTACCAGCGTAAACGTCCGCCGGACCTGGCTGCC GCCCGGTCTGGTTTCGCCGCGCTGACCCGCGTCGCCCATGACAGTGCGACCCTGNACCGGGCTGGCC :::::::::::::Rv4T7.seq::::::::::::: GTGTGCTGTCAATTCAGAGCTGAGCCTGATGCACTCAACTTACTGAGCATGCTAACGCTGGTCGTGCGGGTCTTGTTC (SEQ ID NO. 592) CCGCGTGTCGGCAGGGCACACGCTCGGGGCGTAGCTGGGAGAGGCCCCGGTCAAGCCCGGAGAGCAGTGCTCAGTCCC CCAGCTTGACCGACTTTCGATGAGAACGCGCTTCTCGCCGTATTGAACTGGCGTGCTGACGGTCGCTGAGCAGCGCTC GCCGAGTGCGGCCGCTGATTCTTTCATCGAGCCAGGAGGCGCATTCGTGTTCGGCCGCCTGCGGGTCGGCCCCATCGT CGACGCGATCCGTCACCCACTCCTCGATCAGGTCTGCCTCATCGAACGGGCCAACGGTGCTGTCGGAGTAAGTGTGCG TGGGCACGCGAGCCGGGTGCTGTGGTACACCCACCGTTGCATGAACAA Clone Rv50 :::::::::::::Rv50SP6.seq::::::::::::: ATACTCAAGCTTCACCAGGCGCCGGCGGGCCGCGGCGCCAAGCCAGGCAGCCGCGCTCGGCGCGTCGGGGCCTTCCGC (SEQ ID NO. 593) CGGCTCGGCCGACAGTTCGATCTCTGGATCGGCGGGGCTCTCCGGGCCGGCCTCGGCGACCTCAGCGGGCCGCGCCTT CCGGCCGAACCATTCCCTAGCCATAGATAACCGCACCTCAATGCACGGTTTGGCGGCAACCCGG :::::::::::::Rv50T7.seq::::::::::::: AGCTTCCGTCACGACCCGCCCTCGCCGGTGCCGGCGCCATCGGTCATCGGATCTCATGACGACGTCACGTAGGCCCGC (SEQ ID NO. 594) TAGCCGCGAGCGGGCGCGGTCAACTGGCGAGGCGGCGGCGACGTGACTGAGCTGGCCGAGCTGGACCGGTTCACCGCG GAACTACCGTTCTCGCTCGACGACTTTCAGCAGCGGGCTTGCAGCGCGCTGGAACGCGGCCACGGTGTTGCTGGTGTG CGCGCCGACCGGCGCTGGCAAGACGGTGGTCG Clone Rv51 :::::::::::::Rv51SP6.seq::::::::::::: ATACTCAAGCTTGCCGGGACCGCGGAACAGAACCGGCGGTTCCTACCGCGGTGTGCGGCCGGCGCGATATCGGCCTCC (SEQ ID NO. 595) CGACTAACCGAACCCGATGTGGGCTCC :::::::::::::Rv51T7.seq::::::::::::: ACGTTGGCTCTGCCGGAACGTATTTCCAGCGGCACGCATTCGGCGTGGGTGCCGGGCGCCGAGTTGCGTCGCTGGGAT (SEQ ID NO. 596) CACGCAGCAGTCGCCGGCGGCTGCCGTCGGGCTATGAATTGCACCGAGCCGGAAAATCCNCAC Clone Rv52 :::::::::::::Rv52SP6.seq::::::::::::: ATACTCAAGCTTGTCGTATTCCGTGGCACTGTCAGACATATGCGCCGCTCCTCCTCATCGCTGCGCTCGGCATCGTCG (SEQ ID NO. 597) CCGGCGGTCATGGCGTCACCCTACCCAAGCCGAACGCGAAACGAGAACGTGTTCCATTATTAGGGTCTGAGCACCAAT ACCAGATTGCTCACCAGGAACTCACGCAGCACCGGGACGGATGTCAGCCACCACCCCCATCTGGGGTGGTAGCGGGGA :::::::::::::Rv52T7.seq::::::::::::: CGTTGGTAGCCCGATATGCATAGTGTATCTTACTGAACATGATTTCCATTATGGAGCCCGGGGTGCCGGCAGCGCGAA (SEQ ID NO. 598) CGGTGCGCCGTCAGACGCGGGCGGCACTGACCAGGGTGTTGCGGGCGAACATCGGCCCGGCTTCGGATTCCGGTCCGG GTACCGGGCGACCCACCGCTTCGAGGTA Clone Rv53 :::::::::::::Rv53SP6.seq::::::::::::: ATACTCAAGCTTGGCCAACTCCTCATCGGACTTGAAGGTGCCGTCCTCGTTGGCGGCCCTCCTCCACGGCACGTTGAT (SEQ ID NO. 599) GGCACCAGGAATGTGTCCGGGCCGCTGGCTTTGTTCCTGCGGCAGGTGCGCGGGGGCCATGATCTTGCCGGAAAACTC GTCGGGAGAGCGCACGTCGATGAGGTTCTTGACGTTGATGGCCGCCAGGACCTCGTCGCGGAATGCCCGAATCGTGTT ATCCGGCGGGGAGGCGGTGTATGAGGTCACCGGCCGGCTGACCGGGTCGCTGGACACCGGGCGTCCGTCCAGCTCCCA CTTCTTGCGGGCGCCGTCCAACNACTTGACTTCTCCTGG :::::::::::::Rv53T7.seq::::::::::::: ATATCTTAAGCGTCGGGTCCCGAGGCTCGGTCGGCAGCTCCAGCAAAACCCGCTCCACCCCTAGATGCCGGTATCCCT (SEQ ID NO. 600) CAAGGTCTTTAGCCGCCGCTTCACCCCACTGGCACACGGTCACCGGCACGTCGCCCCCGGCCATGGCGCGCAACCGCT GAAGCGGACCCGACAGCCGCTGCGGTGATGGACTGATCGCGATCCACCCGGCATTGAGCCGGGCTATCCGCGGGAAGT TCGCCGGTCCCCCGCCCACATACAGCGGAGGATAGGGCTTTGTCACCGGCTTCGGCCAGCAGTAGATCGGATCGAAGT CCACATATGTCCCATGGAATTCCGCCTGCTCCTGCGTCCAGATCTCGATTATCGCGCGCAACCGCTCATCGATCACAC GTCCGCGCACCGCAGGGTCCACACCATGGTTGGCGACTTCTTCGCGCA Clone Rv54 :::::::::::::Rv54SP6.seq::::::::::::: ATACTCAAGCTTGTCGCGGTAAACCCGCAGCAGGGCGGTGGGTGCGGTGTCAAAAACAACCACACTTCTTTGCGGTTC (SEQ ID NO. 601) GGTGATCTCGACACCGGCCGCGAGCCGACCACCATGCGCGCGTAAATCGATCAGATCAGCGTCGGCTATCGCCTGGGT GCCGCCCACCGGAATCGGCCAGCCGACCGAATGGGCCAGCGTTGCCAGCATCAGTCCGGCGCCGGCCGACACCAGTGA CGGCAACGGTGAAATCGCGTGGGCGGCAACGCCGGTGAACAACGCGCGGGCATCCTCGCCCGCCAGCGACCGCCAGGC AGGGGTGCCCTGGGCCAGCATCCGCAGCCCGAGACGCAGGACCGAGCCCAGTGCAGTAGGCAAAGACCGCTTGTCGGA GACATGAACTCCACGACCGT :::::::::::::Rv54T7.seq::::::::::::: AGCTTATTGAACCGCGGGTCGCAGGCAAAGTGGACCTCATAACGACTCGGGTCCAGCGACCGCGCCAACACGAACGGC (SEQ ID NO. 602) CGGACGACGTGGGCCAGGGTCGCGGCCTCCCCTACAAACAGGATCCGTTGCCTGCGAGCGACAGGCTCCGGTGCGGCG TTGGGCGCCGTGCTCGTCCCAGCGTCCGGTCCCGGGTCGCCGGCGACGCTTGTTTCCTCCATACTCGCCCCCTAATCT CGAGGCAGCCCGTACCCGCAGGCAACCTCCCAAAAATGCAATCCCCCAAAATGCAATGCGTCGAGCTATTTCTCACAC CGACCGCTAGTTGCGGATCAGAAATCCGTTGGGCGCGGAAGTCCAGCCGAATTTGTTCTCCCGCTCCGCATCATGCTT GTAATCGTTTGGAAATTCATCCTCATATGCCTCGATCGCTTCATAGGGTCCAGGCCAAACCGGGCA Clone Rv55 :::::::::::::Rv55SP6.seq::::::::::::: CTTCCGGCTCGTATGTTGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAAACAGCTATGACCATGATTACGCC (SEQ ID NO. 603) AAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGGCCACCTCGCGGTGTGTGGTGGAACCCATCTGAGCAGTGTG CCAAACCGGGGCAGACAGCTCCCAATTGACGTGAGCCCGCTCACTTGCTGGGTAAGCGTCG :::::::::::::Rv55T7.seq::::::::::::: TAGCGCCCCCTCCCGGGCGGAGCTCCACGGCGTGGATCAAGGTACCGGCCGGGATGTTGCGCAATGGCAGGTTGTTGC (SEQ ID NO. 604) CCGGCTTGATGTCGGCGTTAGCGCCGGATTCCACCACATCCCCTTGCGAAAGTCCGTTGGGTGCAATGATGTAGCGCT TCTCCCCATCGAGATAGTGGAGCAACGCAATCCGTGCGGTACGGTTCGGGTCGTACTCGATGTGCGCGACCTTGGCGT TGACACCATCTTTGTCATTGCGGCGAAAGTCGATCATCCGGTAAGCGCGCTTATGACCGCCGCCTTTGTGCCGGGTGG TAATCCGGCCATGCGCGTTGCGTCCACCGCGACCGTGCAGCGGGCGCACCAGCGACTTCTCCGGGGTTGACCGGGTGA TCTCGGCGAAATCAGATACGCTGGCGCCGCGACGACCAAGCGTCGTGGGCTTGTTCTTGCGAATTGCATGTCTAATCA GGTCTTTCTC Clone Rv56 :::::::::::::Rv56SP6.seq::::::::::::: TGAAACTATATAATACTCAAGCTTGCCAAAGAAGACCTCGTCGACCAAGCAGGACGCGACCGTCGAGGTGGCGATCCG (SEQ ID NO. 605) GCTTGGCGTCGACCCGCGTAAGGCAAACCAGATGGTTCGCGGCACGGTCAACCTGCCACACGGCACTGGTAAGACTGC CCGCGTCGCGGTATTCGCGGTTGGTGAAAAGGCCGATGCTGCCGTTGCCGCGGGGGCGGATGTTGTCGGGAGTGACGA TCTGATCGAAAGGATTCAGGGCGGCTGGCTGGAATTCGATGCCGCGATCGCGACACCGGATCAGATGGCCAAAGTCGG TCGCATCGCTCGGGTGCTGGGTCCGCGCGGCCTGATGCCCAACCCGAAAACCGGCACCGTCACCGCCGACGTCGCCAA GGCCGTCGCGGACATCAAGGGCGGCAAGATCAACTTCCGGGTTGACAAGCAGGCCAACCTGCACTTCTC :::::::::::::Rv56T7.seq::::::::::::: GCTGAGCTCCACGGCGTGGATCAAGGTACCGGCCGGGATGTTGCGCAATGGCAGGTTGTTGCCCGGCTTGATGTCGGC (SEQ ID NO. 606) GTTAGCGCCGGATTCCACCACATCCCCTTGCGAAAGTCCGTTGGGTGCAATGATGTAGCGCTTCTCCCCATCGAGATA GTGGAGCAACGCAATCCGTGCGGTACGGTTCGGGTCGTACTCGATGTGCGCGACCTTGGCGTTGACACCATCTTTGTC ATTGCGGCGAAAGTCGATCATCCGGTAAGCGCGCTTATGACCGCCGCCTTTGTGCCGGGTGGTAATCCGGCCATGCGC GTTGCGTCCACCGCGACCGTGCAGCGGGCGCACCAGCGACTTCTCCGGGGTTGACCGGGTGATCTCGGCGAAATCAGA TACGCTGGCGCCGCGACGACCAGGCGTCGTGGGCTTGTACTTGCGAATTGCCATGTCTAATCAGGTCTTTCTCT Clone Rv57 :::::::::::::Rv57SP6.seq::::::::::::: ATACTCAAGCTTGTTGGTGACCTCGCCGGCGAACAGTTCTCGCACGATTTCCGGATTAGCGGGACTGGTCACCAGTTG (SEQ ID NO. 667) GGTATGCGGGAAGGCGCTGACGTTCGCCGCGATTAGCTGTTTGATGGACGCGGCGGTGATGTCCTGATCACGGAACTG GCTGTAATAGCCCAGGGTCGCCACGCTTCCATCCGGGCCCGGACCCGGC :::::::::::::Rv57T7.seq::::::::::::: GATGATCGCCGGTGCCACCCCGATCCGTGCCTCGGTCAGCGCGAACGTGCTTTCCGGTCCGGCGACCACCATGTCGCA (SEQ ID NO. 608) CGCACCGACCAGGCCGAACCCGCCGGCCCGCACATGCCCGTTGATGGCGCCGACCACCGGCAGCGGCGACTCGACGAT GGCGCGCAACAGCGCCGTCATTTCCCGCGCCCGCGCCACCGCCATCCGGTACGGATCACCACCACCTCCGCCGGCCTC GCTGAGGTCC Clone Rv58 :::::::::::::Rv58SP6.seq::::::::::::: ATACTCAAGCTTGCCGCAATCGAAACCAACCTGTTTGTGCCGCAAGAAATTACGCCGTGGCCCGGCGCCGATCAAGAA (SEQ ID NO. 609) ACGCCCCGGCGCGCGGCGGTGTCGTCGTATGGCATGACGGGCACCAATGTGCACGCCATTGTCGAGCAGGCACCGGTG CCAGCCCCCGAATCCGGTGCACCAGGCGACACCCCGGCCACACCCGGTATCGACGGCGCGCTGCTGTTCGCGCTGTCG GCCAGCTCGCAGGACGCGCTGCGGCAAACCGCCGCGCGGCTGGCCGATTGGGTCT :::::::::::::Rv58T7.seq::::::::::::: TTGGCGGGTTGGCCACANCANCCCGCCGGTGACGGCGACGATGCTGGGCTGGTTGCGGCCCTGCGCCACCGCGGCTTG (SEQ ID NO. 610) CATGCTGGTTGGCTGTCTTGGGACGATCCCGAAATAGTCCACGCGGATCTGGTGATTTTGCGGGCTACCCGCGATTAC CCCGCGCGGCTCGACGAGTTTTTGGCCTGGACTACCCGCGTGGCCAATCTGCTGAACTCGCGGCCGGTGGTGGCCTGG AATGTCCANCGCCGTTCACCTACGTGACCTTGATGGGATCCGGGGGNT Clone Rv59 :::::::::::::Rv59SP6.seq::::::::::::: NCGTGGACACCGGTGTCGANCGCCACCAGCCGCATGTCTGCANGTCNATTCCGTCCTCGGCAACATCTTGAATGCCGA (SEQ ID NO. 611) GCAGCGCCTGGGCGTGATCGGCAACCGGGGATGACCGCTCGCCGATCCGCTCGACAATCCCGGCGGCACGTGACATGC GCCGCCACGGCTCGACGAGCTGGAACTTCAGCGACGACGATCCGGAATTGATCACCAGCACGGTGCTACTCATGGACC CCTGCGCCTGAATCCCGTGATGGCCACGGTGTTGACTATTCGTCGACAGTGCACCCGAGATAGTCTTCACGGCTGCGT :::::::::::::Rv59T7.seq::::::::::::: CATGTATTGCCGTGCTCACGGCGCCACGCTCGATGGTTTCTCGAAGTCTCCGGGCTGGTGTACAGCTTCTCGTTGATC (SEQ ID NO. 612) TCGTTCGCCACGCCGTCCTCTTCCCGCCGACGACCCGATCTCGATCTCCANAATGATCTTGGCGGCCGCCGCCGCCTT GAGCAGCTCCTGGGCGATGGCCAGGTTCTCATCGATGGGCACTGCCGACCGTCCCACATGTGCGACGGAACAAAGATG TCACCTTGCTCACGCGTGCGCNAGATCNCANAAGGGCCGGACATACTGTCNACTTGTCCTTGGGCAGTGGTCCGTGTC AGCCCACGTGACGGGTACTTGGCGCGATAACGTGGTG Clone Rv5 :::::::::::::Rv5SP6.seq::::::::::::: GCCACCACGACCCGGCCGTAACTCTGCTCACGGAAATGCGGCCAGGCCGCGCGTAGCACGTGGTATCCGCCATAAAGG (SEQ ID NO. 613) TGCACCTTAAGCACGGCGTCCCAATTCTCGAACGACATCTTGTGGAAGGTGCCGTCGCGCAAGATCCCGGCGTTGCTC ACCACACCGTGCACGGCGCCGAATTCGTCAAGCGCGGTCTTGATGATGTTCGCTGCGCCGTCCTCGGTGGCGACGCTG TCCTTAGTTGGCGACCGCCCGGCCCCCCTTGTCGCGAATCTCGGCGACGACCTCATCGGCCATCGCCGAACGGCGCCC GTGCCCGTCGCGGGCGCCACCGAGGTCGTTGACCACGA :::::::::::::Rv5T7.seq::::::::::::: CAGGCATGCAACCTTTGTCCACACGGCGTCTACTCCGTGCAAGGTCCGACCGCTTCCACGTCCCGCCGTGACGGTGCT (SEQ ID NO. 614) CCATCTCCCTCAGCAACGCGTGAAGTGGTCCGATCCCGCGGCTTCAGG Clone Rv60 :::::::::::::Rv60SP6.seq::::::::::::: GTTGAGACGCAACCAGCGCACAACGACGATTTGGCGTAGCGGCGGACGTCTGCTCGATTCGATCACGTCGCGCTCGCA (SEQ ID NO. 615) TCGAGCATGGCCCGCGACGCTACACGATCGCCGTCGTCGATGACACGACCGAGCCGTACGCCGGCCGTAAGCCGCGCC AGGATTCGGCGAAAAACGTCTACGTGGCGGGTGTACTGGGTGTCGAATGATTCGTGGGGTGCGTATGCGTCCTGCAAT CGTCGACATAGATCCGTCGCCGCATCGCGTCGACAACTCCGGGTGAGTGGAATACACTTGCCGATCACGCGACGTGCG CGGATCGATGCCGACCGAAATACGACCACATGGCTCTTGTTGCNCAGTGTTGGCGGCATCAAATACCCTCAGTGCCGT CCGAC :::::::::::::Rv60T7.seq::::::::::::: TTNCCGCCTTNACGCCTACTCCNAGACGATGCTCGACGCGTGTGAGCACACGGCGCTGCTGTAGACGGCACGGCGCAG (SEQ ID NO. 616) CTGGATCGCGCTTGGTGCACCCAAGCCTCTACGCGCGTCGCTGCGTCGTCATCGGGTACCGAACATATTCCGGTCGTT GCGCAGAGTGTGCATGTGCGGCTCTTGTGAACGAACATAGCAAAGCGTATATGTCTGTGGCGGCTCTGCAGATATCGC GATAATACGTATATACATAAGGTGGCGCGCGATCTATCGGTATATCCGTTATGGCGGACGTGCGTGAGCGTGAGTCGC GGCGCATCGCGCACTTCGCGATCGCGTGACTGGTCCTCGCGACTGCGCGCATGCGTAGC Clone Rv61 :::::::::::::Rv61SP6.seq::::::::::::: GGTGATGACGCACTTGCTTCGAATGAGTCATTGACTACTCCCGTGGTTGTCCTGCGATGGTGGAGTGCCGCGCAGCCT (SEQ ID NO. 617) TGCCCGANGTCGCGATCGCGTCGCGGGCTTCGGGGAGCAGACTGACCTGCAGATGGAAGTCGTGCCACATGCCCGCGA ACGGCGAGCTCGATGCTTGTTTTCGAAGNGCGCANGCGGTTTCGATCTTGTCCGCGTCAACGCAGATCGGATCTCGCC GCGGTCTGCATGACGATGGGCGCAGGCCCGCTCATGTCCCGTAGACGGGGAGATACGGGCAGCCGCGGATCGAGACCT ACGTAGCGCGGCGCCCATCGTGCCATCGACGAAGAATGACGGATCGCGCAGCGCCGTCGCGTCGCTTCGATGTCACGC GAGATCGCCACGGCAGATCAGCGATGCGCGGGC :::::::::::::Rv61T7.seq::::::::::::: CGGTACGCCGGCAACAAACGCCTTGTGACGAGCGCGTCCGAGCGGTCATCGGCCTCCACCGTCATGCACAGCTCCTTC (SEQ ID NO. 618) TCCAGGTCTACGCCGACGTCGCGGTCCACATTGGTGAGCTTGGCGAATGCCTCGGCAACCTCGTCGAAATGCGCCTCC GCGTCCGCATCGAAGGTCGCCATGTCAAAGATCAACTCGACGTAGTAGCTAGTTACCGCATCAGGTCAGTGTTTGCTG GCCTCGGAGTCCGGCCGAACAATGGCCATTTCCCGCGACTCTAGAATCCAGTCATCGTCTCGGTGACGACGCCTTGCC GATCACATAGCTCGACCGGATCGGAGAGAATCTGGTTCTCGT Clone Rv62 :::::::::::::Rv62SP6.seq::::::::::::: ATACTCAAGCTTAAGCGCAGCAGTACCGGCGGTGCCTGGGCATCCCAGCAAAACGGGGAGCTCAACGAACGATTCCTG (SEQ ID NO. 619) AACGAAGGGTCGTCCACCAACCTCCAAACCGAACGGTTGCCAGCCCCGGC :::::::::::::Rv62T7.seq::::::::::::: GCAAGTCCGCTCAATGTGGTTGTGATCACANGACTACGTCGCCTCAATCAGCTCAAACGTCACCCCGTGGCGTGCTGC (SEQ ID NO. 620) GCAGCATGAAGGTCGGCGCCCGCACGATGTGGGCGAAGCAACAGGTAATAACTGGTCGGCATGGGTCAACCCTCATTG GGCCGTTGCGGATCGGGTGCACGCCCGGAGTGCCGGTCGAACTCAACACCGCCTTCACCGATCTTTTCGTCGAAAATG GCGGTCGTGTCGGGGTATACGTCCGCGATCCCACGAGGCGGAATCCGCTGAGCCGCACTGA Clone Rv63 :::::::::::::Rv63SP6.seq::::::::::::: ATACTCAAGCTTCGCGCCCTCAAGCGGCTGAAGGTGGTTCCGGCGTNCCAACNGTCGGGCAACTCGCCGATGGGCATG (SEQ ID NO. 621) GTGCTCGACNCCGTCCCGGTGATCCCGCCGGAGCTGCGCCCGATGGTGCAGCTCGACGGCGGCCGGTTCGCCNCGTCC GACTTGAACGACCTGTACCGCAGGGTGATCAACCGCMACMMCMMGMTGAAAAGGCTGATCGATCTGGGTGCGCCGGAA ATCATCGTCAACAACNAGAANCGGATGCTGCNGGAATCCGTGGACGCGCTGTTCGACAATGGCCGCCGCGGCCGGCCC GTCACCGGGCCGGGCAACCGTCCGCTCAAGTCGCTTTCCGATCTGCTCA :::::::::::::Rv63T7.seq::::::::::::: TGCGCATGGCAGTTGTTGCCGGCTTGAGTCGCGTTAGCGCGGATTCCACCACATCCCTTGCGAAGTCGTGGGTGCAAT (SEQ ID NO. 622) GATGTAGCGCTTCTCCCATCGAGATAGTGGAGCAACGCAATCCGTGCGTACGTTGGGTCGTACTCGAGTGCGCANCTT GGCGTTGACACCATCTTTGTCATTGCGGCGAAGTCGATCATCCGGTAAGCGCGCTTATCGACGCCGCCTCTGTGCCGG GTGGTAATCCGGCCATGCGCTTGCGTCCACCGCGACGTGCAGCGGGCGCACACCGACTTCTCCGGGTGACGGGTGATC TCGGCGAATCAGAACCTGGCGCGCGACACAGCGTCGTGGCTGTACTTGC Clone Rv64 :::::::::::::Rv64SP6.seq::::::::::::: TGGGTGATCAGATACTGGCTAGTTGGTCGGGTGGGGTGATCGAAGATCGCGGTGGCCGGCAGCGTTACTGCGGTGACG (SEQ ID NO. 623) CTGTTAAGCGGTTACGTACTCCACGGCACTCAANGAATTANATCCCGAATCGGCAAACCCTGGCCAGCGTCGAGTCCG CAGCGCCGTCGCGCCCCCCACCGCTGCGGCATGCTCACATACCACCTCGATCGCTGCGGGAGTTGCTCGTCGGCCGAC CGACCGGCCAGCCGGGCGGCAAACCGGAGGACCCAAGATTCAGCACCACCATCGCTAGCCCGATCTGGCCGCGCGTGG :::::::::::::Rv64T7.seq::::::::::::: TCGTAGCGGTTGCGACCANTCCGCGGACAGCTCCGCCACGCGACGGGTCGGGATCACCGCGGTCAAACCACCGAGCGG (SEQ ID NO. 624) CGAGGATCTCTGGCCGTCGACGTGACCGCGCACGGCCGCGGTGATGGCCAGTCCCGACCGCCCTTCCACTTGGCGTAC GCGCTGGATGTGTTGTGCCGCAACGGAATCCCACCTCAATTATGACCTCGTTGTGGGCGAGCGCGGTATCGTACGCCC GACCAGGAATCGTCGATGCTATCTCACGTCACCGAAGGCCTCTCCCAGCACACCGCATCCAGAACGTGCACACNGTCG ACATGTCTCGGCGGATCCGCCTGCAGAACGAACGCCANGTGCGCTGTGCGACACGGGTCGCGATCACCGCTCGCACGC GGAGATCGGCACACGCGCAGCGCATCGATCATAATCTCTCGATGCGGTCTCCACCACCGAACAG Clone Rv65 :::::::::::::Rv65SP6.seq::::::::::::: ATACTCAAGCTTCGCTGAGGTGGTGGGGCACGATCACGTCACCGCACCGCTGTCGGTGGCGCTGGATGCCGGCCGGAT (SEQ ID NO. 625) CAACCACGCGTACCTGTTCTCTGGGCCGCGTGGCTGCGGAAAGACGTCGTCAGCGCGTATCCTGGCNCGGTCGTTGAA CTGTGCGCAGGGCCCTACCGCCAACCCGTGCGGGGTCTGCGAATCCTGCGTTTCGTTGGCGCCCAACGCCCCCGGCAG CATCGACGTGGTAGAGCTGGATGCCGCCAGCCACGGCGGCGTGGACGACACCCGCGAGCTGCGGGACCGCGCGTTCTA TGCGCCGGTCCACTCACGGTACCGGGTATTTATCGTCGACGAGGCGCACATGGT :::::::::::::Rv65T7.seq::::::::::::: GCACTCACGCTGGTACAAGACCTTCACAAAATCTGAAATCCTGACCCGATACTTGAACCTGGTCTCGTTCGGCAATAA (SEQ ID NO. 626) CTCGTTCGGCGTGCAGGACGCGGCGCAAACGTACTTCGGCATCAACGCGTCCGACCTGAATTGGCAGCAAGCGGCGCT GCTGGCCGGCATGGTGCAATCGAGCAGCACGCTCAACCCGTACACCAACCCCGACGGCGCGCTGGCCCGGCGGAACGT GGTCCTCGACACCATGATCGAGAACCTTCCCGGGGAGGCGGAGGCGTTGCGTGCCGCCAAGGCCGATCCGCTGGGGGT ACTGCCGCAGCCCAATGAGTTGCCGCGCGGCTGCATCGCGGCCGGCGACCG Clone Rv66 :::::::::::::Rv66SP6.seq::::::::::::: ATACTCAAGCTTGTATAAAAAGATCGGTGAGCGCATCGATTCGCTCCGCCGGGTTTGCCGCTGCGGCGGCGGAGCTGC (SEQ ID NO. 627) CGTGACCGTCTATTTGGGTGATCAGATACTGGGCTAGTTCGGTCGGGGTGGGGTGATCGAAGATCGCGGTGGCCGGCA GCGTTACTGCGGTGACGGCTGTTAAGCGGTTACGTACCTCCACGGCACTCAAGGAATTAAATCCCGAATCGGCAAACG CCTGGCCAGCGTCGAATCCGGCAGCGCCGTCGCGCCCCAGCACCGCTGCGGCATGCTCACATACCACCTCCATCGCTG CGGCGAATTGCTCGTCGGCCGACCGACCGGCCAGCCGGGCGGCAAACCCGGAAGA :::::::::::::Rv66T7.seq::::::::::::: CCTCATCATATGCCGATAGAGCTCTACATATTCAGGAGATCACCATGGCTCGTGCGGTCGGGATCGACTCGGGACCAC (SEQ ID NO. 628) CAACTCCGTCGTCTCGGTTCTGGAANGTGGCGACCNGGTCGTCGTCGCCAACTCCGGAGGGCTCCAGGACCACCCGTC AATTGTCGCGTTCGCCCGCAACGGTGAGGTGCTGGTCNGCCAGCCCGCCAAGAACAGGCAGTGACCAACGTCGATCGC ACCGTGCGCTCGGTCAAGCGACCATGGGCAGCGACTGGTCCATAGAGATTGACGCAAGAAATACACGCCCGGAGATCT CGCCGCATTCTGATGAACTGAACGCGACCCGAGGCTACTCGGTGANGACATNACGACGCGTTATCACACCCCGCCTNC TTCAATGACCCCACGTCNGGCACCAAGGACCCGGCAATCGCGGCTCACTTGNGCGATNGTCNACAACCAACGCGNCGC CTGGCTACGGGCTCAACAAGGCANAAGACACAATCCGCTCTCGATTGGTG Clone Rv67 :::::::::::::Rv67SP6.seq::::::::::::: ATACTCAAGCTTATCGAGGCGGCGCATACCGAAGCGTGGGAAATCCAGACCGAATACCGCGACGTGCTGGACACTTTG (SEQ ID NO. 629) GCCGGCGAGCTGCTGGAAAAGGAGACCCTGCACCGACCCGAGCTGGAAAGCATCTTCGCTGACGTCGAAAAGCGGCCG CGGCTCACCATGTTCGACAACTTCGGTGGCCGGATCCCGTCGGACAAACCGCCCATCAAGACACCCGGCGAGCTCGCG ATCGAACGCGGCGAACCTTGGCCCCAGCCGGTCCCCGAGCCGGCGTTCAAGGCGGCGATTGCGCATGCTACCCAAGCC GCTGAGGCCGCCCGGTCCGACCCGGCCAAACCGGGCACGGCGCCAACGGTTCGCCCGCCGGCACCACCGGTCCGGTGA CCGCAGTACGGTCCCCCCAGCCTGACTACCGTGCCCCGGCGGGCT :::::::::::::Rv67T7.seq::::::::::::: TGGCCGGGCTGGTAGCCCGCGTATGGCAAGGTTCCGCTCAATGTGGTTGTGATGCAGCAGGACTACGTTCGCCTCAAT (SEQ ID NO. 630) CAGCTCAAACGTCACCCCCGTGGCGTGCTGCGCAGCATGAAGGTCGGCGCCCGCACCATGTGGGCGAAGGCAACAGGT AAGAACCTGGTCGGCATGGGTCGAGCCCTCATTGGGCCGTTGCGGATCGGGTTGCAGCGCGCCGGAGTGCCGGTCGAA CTCAACACCGCCTTCACCGATCTTTTCGTCGAAAATGGCGTCGTGTCCGGGGTATACGTCCGCGATTCCCACGAGGCG GAATCCGCTGAGCCGCAGCTGATCCGGGCTCGCCGCGGCGTGATCCTGGCCTGTGGTGGTTTCGAGCATAACGAGCAG ATGCGAAT Clone Rv68 :::::::::::::Rv68SP6.seq::::::::::::: GTCCAGTCAAGCATCGGTCCTCTCCGACTACGCCAAGANTGGCGACGTGTCAGTGCANACAGCGGANATGGTGGCGCC (SEQ ID NO. 631) TATGCGTCGACGCTCACAAACNGCGGTGANCGCGTTCTGGTCGTGCACCATCGAGCCGTGCCAGCCCGGCCGCGTGCC GTCAGCCGCATCCACTGGATGCCTTCTCGGNGTTTCAATCANGTACANGCGACGTTCGCCACCATCGTGCCGGGGCAC GGTTAGCGAGAAACCGCCGACTTCACCGATTGCCTCGGTGATGCCGTCGAACAGATCGGGCCTATTGTCGACAGCCAG TGTGATNCGTATTTGCCGCCGTGCTCCTCGTCGCAACGATGCGAACACAGATCCGTGGNGGACGATAGCGGCTGACAA NGTGGGGGCAACACAATCACATGCCACATTTCTTCATTTCACGCCCACAACCCAGACTTCGTCTCGATGNGCCG :::::::::::::Rv68T7.seq::::::::::::: CACGCGGTCTGGCCCGATCCGAAGATCCCTTTGCCGGCGTGGCGGCTCTGCTCGGCGGTGTTGTACACTTCTCGAACA (SEQ ID NO. 632) CCTCGGCACCGACACCACCACCGTNGCTTGAACACCGCCAACATCGGCAGCAGATCTTGATGGTCCTGGTGAATCCCA CGGTGACTTTGGAGTGGAAGGCGCCATACTGATCGCCGCGCCAGCACATGAGCTAGCGGCAGGAAAACCAGCAGCCGC TCACCTTGCGCAGCAGCGTCNGGTGATATGCCTGGCGCCCTTAATCTCGTGAACCAGTTGGATTGGGTCAACTGGCAG CCTTGGGTCTCCGGTGGTGCCGANGTGTANATAAGCTCCCGGGTCCGTCAACGTANTGCGCAGGCGGCGGTTACTCGG CGGGTCAACGAGCCCCGCTCGTGAGCNATCAGCCTTTGGACCGAACGGGATTCATACTCCGCAGGCGGCCCTCCGAAA TCGGCACATGTCCTTTGATCGTTCGCAACAN Clone Rv69 :::::::::::::Rv69T7D3.seq::::::::::::: GGCCATGTCACATCGGTGGTACAGGTAAACCGCGCCGTGTGCGCGGTCTCGGAGATCAGAACGTGGTCGCAGTTGAAC (SEQ ID NO. 633) CGCGGGCTTTCAGCCAGTCGCGATAATCGGCGGAAGTCGGCGCCTGCCGCCCCAACTAGCGCGACTCGCCACCTAGCA CACCGATGGCGAAGGCCATGTNTCCGGCCACGCCGCCGCGGTGCATCACCAAGTCATCGACTAGGAAGCTAAGCGACA NCTTGTGCAGGTGTTCGGGCAGTAGCTGCTCGGAAAATCGGCTGGAAACCGCATCAAATGGTCGGTCCAATCGAACCG GTTACCCGATCGTCACAAAAATCTCCGTCCT Clone Rv6 :::::::::::::Rv6SP6.seq::::::::::::: GGGTCTACAACCACCGGGTCTGACTTCTGGGCTTCCACCGCTCGCGCCGTCGCGACAAACAGCGCGGTCGAACCGACA (SEQ ID NO. 634) CTCGTTGTGATGTCCCAGCTATCACCTCCGGTAGGCACCCAATCGACCCTACCCGGCTATCTCACCCCCGATCTCCAG GCTCCGCCGATCCATGCGCATCCCGGTCCGGATCCC :::::::::::::Rv6T7.seq::::::::::::: CAGGCATGCAAGCTTGTCGTATTCCGTGGCACTGTCAGACATATGCGCCGCTCCTCCTCATCGCTCCGCTCGGCATCG (SEQ ID NO. 635) TCGCCGGCGGTCATGGCGTCACCCTACCCAAGCCGAACGCGAAACGAGAACGTGTTCCATTATTAGGGTGTGAGCACC AATACCAGATTGCTCACCAGGAACTCACGCAGCACCGGGACGGATGTCAGCCACCACGCCCATCTGGGGTGGTAGCGG GGAAATACGGCTAACGCGGCTCCGGTGCCGGCAGCCCAGCGCAGACCCTCGGCGGCGGACACGGCTAACAACGACGAC CCATAGTTGTTCTTTGCCGGATGGCCGTGTTTGCTGACATATCGGGCGCGGCGCCGGCGCCGCC Clone Rv70 :::::::::::::Rv70SP6D2.seq::::::::::::: NCTACGCTGCTGAATGTTGTGCGCCGGAGGANCTCAAGACCCACGCGGTTGTACGCGGACNTGCGACATGTTCAACCG (SEQ ID NO. 636) CCGGA :::::::::::::Rv70T7D3.seq::::::::::::: CTAACCAACAAGCCATGGTGGTTGGCGCCGTCGAGAGGTCGGCGGTCGCCACAACGGGAAGATCGCCTTGAGCGTCGC (SEQ ID NO. 637) TCGACCGCCGCCTCGAGTTGGGTCATAACGAAGTACTGATGCCGATCATGTCGACGTGTCCGTCGCATCAGCGTGCAG CGGCGACCCCTCGACGAGCCTCGGTGCCGCCGCGGCCAGGGCACCAGCTGTTTTAGCGCATTGTGCTCCGCCGGTAAT AAAGGANGTCGGTCGCCTCCGCTGCTGTGGTTGCGGAATAACATCTTCCCTTCCTGCAACAGGATGAGAATGGTTTTA ATTGCTC Clone Rv71 :::::::::::::Rv71SP6.seq::::::::::::: CTAAGCTTTCGGGTCCGCCGCCACTAGTACCGCGTTGCCGGCCCCGCCGACCTAGAATGTTCCGCCCATTGCCGTTTC (SEQ ID NO. 638) CTCCCGCCGCCGGGTT :::::::::::::Rv71T7.seq::::::::::::: TCTGGTGCCGGGTGTGCCGACGGGTCCGTCCGCCTCTGCTTCAGTGATTCTGTGATGCGACCGGCAACGTCCTCCTTG (SEQ ID NO. 639) TTCGGTGTCTATGTGGTCCGTCTCTCCTTGTTCCGCATACGATT Clone Rv72 :::::::::::::Rv72SP6D2.seq::::::::::::: GCGATCGNTNACCACAAGGGCGCAACCGTTCGCGCGTCGACTGAACGTGCTGCCGCCTGGAGAACTGGCGCTGCTGCC (SEQ ID NO. 640) ACCTGGTCGGCGCATCGGCACTTCGAGGACTGGATTTCGACGCGTGGCCCGACCTGANGTNGGCGGTGGACNNGTGTG CACCCGGTTGATTCCTCGGCCTTGCCGGGATGCCACCTGCGCCTGGTGGTCGAT :::::::::::::Rv72T7D3.seq::::::::::::: CGTGACCGGACGGGCTGCCGCGCGAACCGGTCTTGGCCAATTGCCGGGGACTGGGGCTGGAGTATAAAGCGGGCCTGT (SEQ ID NO. 641) TGCCGGAAGATAAAGTCAAAGCGGTGACCGAGCTGAATCAACATGCGCCGCTGGCGATGGTCGGTGACGGTATTAACG ACCGCCAGCGATGAAAGCTGCCGCCATCGGGATTGCAATGGGTAGCGGCACAGACTGGCGCTGGAAACCGCCGACGCA CATTAACCATAACCACCTGCGCGGCTGGTGCAAATGATTGAACTGGCACGNCCACTCACGCCAATATCCGCCAGAACA TCACTATTGCGCTGGG Clone Rv73 :::::::::::::Rv73SP6.seq::::::::::::: ATACTCAAGCTTCTTACCCANAGCATGAACCCCGCCGTCCAATGCCGCCACCGTGGTGCTGTCGGCCGGCCGGGTGCG (SEQ ID NO. 642) GGCACAATCGCCGAGTTCGGCGAACAGATCCTCGAAGGTCTTCACGGCCAGCGATTGTTGCACGTGTCAGCCAGCCAA GTCACGGTGGTTTGACGCCACACGTTCGCCACCGCCGCGCCGCGCATTAGGGCATCCTAATATAGGTTAGGCTACCCT ANTTATTCCTGTGGTCNAAGGAGGCAGCCGAACGTGACCTTCCCGATGTGGTTCGCAGTTCCGCCGGAAGTGCCGTCA GCATGGCTGTCCACCGGCATGGGCCCCGGTCCGCTGCTGGCCGCGGCCAGGGCGTGGCACGCGCTGGCCGCGCAATAC ACCGAAATTGCAACGGAACTCGCAAGCGTGCTCGCTGCGGTGCAGGCAACTCGTGGCAGGGGCCCAGCGCCGACGGTT CGTCNTCCCCATCAACCGTTCCGTATTGGCTAACCACCTGCACGGTGGCACCGCACAACGCCGCCACAAACGCGCCCC GGTATAC :::::::::::::Rv73T7.seq::::::::::::: GGCCGAACTTAATCGGTTGTTGGCGGCTGCCGAGTTGGGTCACTCGGGGGGTGTGCACTGGCACATGGTGGGCCGGAT (SEQ ID NO. 643) TCAACGCAACAAAGCCGGGTCGCTGGCTCGCTGGGCGCACACCGCTCACTCGGTGGACAGCTCGCGGTTGGTGACCGC GCTGGATCGGGCGGTTGTTCCGGCGCTGGCCGAACACCGTCGTGGCGAGCGGCTGCGGGTTTACGTCCAGGTCAGCCT CGACGGTGACGGATCCCGGGGCGGCGTCGACAGCACGACGCCCGGCGCCGTAGACCGGATTTGCGCGCAGGTGCAGGA GTCAGAGGGCCTCGAACTGGTCGGGTTGATGGGCATTCCGCCGCTGGATTGGGACCCGACGAAGCCTTTGACCGGCTG CAATCGGAGCACAACCGGGTGCGTGCGATGTTCCCGCACGCGATCGGTCTGTCGCGGGCATGTCCAACAACTTGAAAT CCCGTCAACATGGTCGAC Clone Rv74 :::::::::::::Rv74SP6.seq::::::::::::: GCTTCCCCTGATACTCGACCAGCCCCACTCGGGCCAATACGTGAATGTCCTAGCATTTTTCACCCGTTCACGGGCTAG (SEQ ID NO. 644) TCGAGTAGTAGACGATTGATTAGCCTGAACGTACCTCCGACGGCCAGCTGACGAACGGGTTTGACGGA :::::::::::::Rv74T7D3.seq::::::::::::: TCAGCTGTCTGTAGAAGGGCTGGCGATACTGTGCACTGTCTGATATCGCNNCGTNGTGGGACTATNCAGNCCATNANG (SEQ ID NO. 645) ATGCGGTTCNGNNNNTGCAGAGNATCCTGGNACACATNCGGTTCACGTTAATCANCATCGCGANTTNCTNCGTNTTCG ATTANTTCTGCTAACGNNTCTNNNAGTGCCTGCGGGTCGACTCTAGAG Clone Rv75 :::::::::::::Rv75SP6D2.seq3::::::::::::: NCTCTGCCGGGCNAGAGCGCAGAGTCGGACGGCTTCGTCGATCGTGAAGCGACCNTGCGATGANCAGATATCGNTNAC (SEQ ID NO. 646) ACTGCTCANAAACTTCGGATCATCGNTGATACACAGGCCAACGGGTAGCGGTTGTCCAACCGCTTCGTCAACGANATG GGATCGTGACGANCCTACGCTCGCAGGATATGTCGCNCACCNGNTCTAGANAN :::::::::::::Rv75T7D3.seq::::::::::::: CACTTCATGCTCGTGCGTTGGCNTCGATTTGCNCGAGNGGTTAGCTCCTCGAGTGNGTGACGTATCACTCCGGCNGAC (SEQ ID NO. 647) TANCCGTATCNGCGTCCCGCACCGGTCAACTGGTCTAGCCACACCGGGGAGAATNCNCGACCGGNGCTATCGACCNAT CACGGCTTGTCGNNAAGATAGNCAGCC Clone Rv76 :::::::::::::Rv76SP6.seq::::::::::::: ATACTCAAGCTTGCCAACCGCCACCCTGCATCCGGGGGGCGAGCACTGCTCCGCCGACCAGTACGAACCAACCTGCGG (SEQ ID NO. 648) TGCCCAGGCCATTGACAATGTGCTGGTCGGCGCCCGCGAGTTCTAGCACAGCAACGCCGCGGCCACCACAGGGGCG :::::::::::::Rv76T7.seq::::::::::::: CGGTCGGTGTGCTTGGCGGCGTCGGTATCAACACCGCCCACGAAATGGGGCACAAGAAGGATTCGCTGGAGCGGTGGC (SEQ ID NO. 649) TGTCCAAGATCACCCTCGCCCAGACCTGCTACGGGCACTTCTACATCGAGCACAACCGTGGCCATCACGTCCGGGTGT CCACACCGGAAGACCCGGCGTCGGCGCGGTTCGGCAAAACTTTGTGGGATTTCCCGCCCCCCC Clone Rv77 :::::::::::::Rv77SP6.seq::::::::::::: AATACTCAAGCTTCGCGGAGGTGGTGGGGCAGGAGCACGTCACCGCGCCGCTGTCGGTGGCGCTGGATGCCGGCCGGA (SEQ ID NO. 650) TCAACCACGCGTACCTGTTCTCTGGGCCGCGTGGCTGCGGAAAGACGTCGTCAGCGCGTATCCTCGCGCGGTCGTTGA ACTGTGCGCAGGGCCCTACCGCCAACCCGTGCGGGGTCTGCGAATCCTGCGTTTCGTTGGCGCCCAACGCCCCCGGCA GCATCGACGTGGTAGAGCTGGATGCCGCCAGCCACGGCGGCGTGGAGCAACCCCGCGAGCTGCGGGACCGCCC :::::::::::::Rv77T7.seq::::::::::::: GATGGCACTCACGCTGGACAAGACCTTCACAAAATCTGAAATCCTGACCCGATACTTGAACCTGGTCTCGTTCGGCAA (SEQ ID NO. 651) TAACTCGTTCGGCGTGCAGGACGCGGCGCAAACGTACTTCGGCATCAACGCGTCCGACCTGAAATTGGCAGCAAACCG GCGCTGCTGGGCCGGGCATGGTGCAATCCGAACAAGCACGCTCAACCCGTACACCAACCCCGAAGGGCCGCTGGCCCG GCGGAACCTTGTCCTCCA Clone Rv78 :::::::::::::Rv78SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTCTGGGCGTCGTGGTGCCC (SEQ ID NO. 652) GGCCTGCCGGTGCAGGAACTGGATTTTACTGCCATCTCTCGCGACCCTGAGGTGGTCCAGGCTTACAACACCGACCCA CTCGTGCACCACGGACGGGTTCCGGCCGGGATTGGCCGCGCGCTGCTGCANGTGGGCGAGACCATGCCGCGGCGANCA CCGGCATTGACCGCGCCGCTGCTAGTGCTGCACGGCACCGATGACCGGCTGATCCCCATCGAAGGCAGCCGTCGCCTG GTCNAATGTNTNGGATCNGCCGACGTGCANCTGAANGANTATCCCCGGCTGTNCCACNAGGTGTTCAACGAACCGGAN CGCAACCAAGTG :::::::::::::Rv78T7.seq::::::::::::: CAAGGCATACGCCAAGACCCAAGGGATCGCAGTCACCTCCGTCAACGGCCTGGTCGCCGGCCACGGGTCCGTGCAGGA (SEQ ID NO. 653) GACGTGGCTGGCCATGCAAAGCGCCGCCGCCTTATCAGGAACGCCCCGGCTTGTCGGCTTTTCCTGCATCGACACATT TCCGGAGGTGTTGTGGTTGGCGCANCGCGCGAGACAGGCCTGGGATGGCGTGCGCATCGTCATCGGGAATGCGATGGC AACACTGAACTACGAGCGCATCCTGCGCCAGCATGACTGTTTCGACTACGTCGTCGTTGGCGACGGGGANGTAGCGTT CACCAAGCTGGCCTTGGCCCTGGCGAATGACCTGCGGTTGACGACTCCCGGGACTAACCCGCCGTANTGAGCAAGGAC AGATTCTGCGCACACCCTCCTCGCTGGTCGACCTTGACA Clone Rv79 :::::::::::::Rv79SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGCCGGTGATCTGGGTGGC (SEQ ID NO. 654) CAACTCGGCGGGCACCATCTCCATCACGACNGCAAACGCTCCGGCTTCGGCGACAGCGATCGCGTCTGCGATNGTTTG TTCGGCGGCGTCTCCGCGGCCCTGCACCCGGAAGCCGCCCAAGGTGTTGACNCTTTGCGGGGTGAAGCCGATGTGTGC CATCACCGGGATNCCCGCCGCGGTCAGACANGCGATTTGCTCGGCCACCCGCTCACCGCCCTCGANCTTGACNGCATG TGCGCCGCCGTCCTTGAAGAAACCGGTGGCGGNGGCAACCC :::::::::::::Rv79T7.seq::::::::::::: CGTTGAGATCCAGCTGCGCACTGTGCAGCGCCTCGGTGGTCTGCTCGGCCTGCCGGGATAACTCGTTGAGCTTCGCCA (SEQ ID NO. 655) GCGCGTCGTCGGCCGGATCAGCCAGCACATTCGCGGCCAGGACGCCGGAGGAGACGGTGAAGCTCGCAAAGAAACCTA TGGCGGACCGCATGATTACACGCGCGATCAACCACCTCTGGTCGAGCCTCAAAATTTGCTTCCTTAAACGGGCCATCG ACGGATGACGTCGAGCTGGTTTAGGTCCAAACAGGTTACGAAACGATCTCGGAATTGTCCAAAAGGGGAAGTTTAAGA AAATGGATAGATTTCTACCATTTCGCTGTGGACGATCGTACTTCTGCTATAGGGCTCCAGGGGCATCGACACGCAACG ACCTTACGCGACACCGGATCCGCGCTGGCGGCGGAACGGCACCANGCGCAACCGAAGGGCCAATCCGACATCGG Clone Rv7 :::::::::::::Rv7SP6.seq::::::::::::: ATACTCAAGCTTATCTAGGCGCCAGCTTGATTGGTCTGGTTGCATTGGCCAGCTGCGCGAGCCTGGCTCACTTCAACT (SEQ ID NO. 656) ACAACAACCGCAAACAATTGCCGCCTTCGGATCCGAGTTCGGTTGGGTACGCGGCAATGGANCACCATTTCTCGGTGA ATCAGACTATTCCTGAGTACTTGATCATCCACTCTGCACACGACCTGCGAACCCCGCGCGGCCTTGCCGACCTGGAGC AGCTGGCGCAACGTGTGAGCCANATCCCAGGCGTTGCCATGGTTCGCGGTGTGACCCGGCCAAACGGGGAAACCCTTG AACAGGCCCGGGCGACATACCAAGCCGGCCAAGTTGGCAACCGGCTGGGCGGCGCGTCGCGAATGATCGATGAGCGCA CCGGCGACCTGAATCGGCTGGCATCGGGTGCCAACCTGTTGGCCGACAATCTCGGTGACTTCGCGGTCAAGTCAGCCG GGCCGTTGCGGGTGTCCGCAGCCTTGTCCAGCCCCTCGCTTACTCCA :::::::::::::Rv7T7.seq::::::::::::: CAGGCATGCAAGCTTTTTGAGCGTCGCGCGGGGCAGCTTCGCCGGCAATTCTACTAGCGAGAAGTCTGGCCCGATACG (SEQ ID NO. 657) GATCTGACCGAAGTCGCTGCGGTGCAGCCCACCCTCATTGGCGATGGCGCCGACGATGGCGCCTGGACCGATCTTGTG CCGCTTGCCGACGGCGACGCGGTAGGTGGTCAAGTCCGGTCTACGCTTGGGCCTTTGCGGACGGTCCCGACGCTGGTC GCGGTTGCGCCGCGAAAGCGGCGGGTCGGGTGCCATCAGGAATGCCTCACCGCCGCGGCACTGCACGGCCAGTGCCCG CGGCGATTCAGCCATCGGGACATCATGCTCGCTTCATACTCCTCGACCAGTCGGCGGAACAGCTCGATTCCCGGAACG CCCACGCATGGTG Clone Rv80 :::::::::::::Rv80SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGTAGAAAAAGATCGGTGA (SEQ ID NO. 658) GCGCATCGATTCGCTCCGCCGGGTTTGCCGCTGCGGCGGCGGAGCTGCCGTGACCGTCTATTTGGGTGATCAGATACT GGGCTAGTTCGGTCGGGGTGGGGTGATCGAAGATCGCGGTGGCCGGCAGCGTTACTGCGGTGACAGCTGTTAAGCGGT TACGTATCTCCACGGCACTCAAGGAATTAAATCCCGAATCGGCAAACGCCTGGCCAGCGTCNAGTCCGGCAGCGCCGT CNCGCCCCAGCACCGCTGCGGCATGCTCACATACCACCTCGATCGCTGCGGCGANTTGCTCGTCNGCCGACCGACCGG CCANCCGGGCGGCAAACCCNGAAGACCCAAGAATTCATCACCACCATCGCTAGC :::::::::::::Rv80T7.seq::::::::::::: CCTTCTTGACACCCACCTCGCCATCGACCTTGAGCACTCCGTCGTAGTTGGTGAACATGTGACCGGCGATCGGGCGGG (SEQ ID NO. 659) TGAACGCGTACTGGGTGTCGGTGTCGACGTTCATCTTCACCACGCCGTAGCGCAGCGCCTCCTCGATCTCCGACTTAA GCGAACCCGAGCCGCCGTGGAACACGAAATCNAACGGCTTGGCGTCNGCCGGCAGTCCGAGCTTGGCCGCCGCCACCT GTTGCCCTTGCGCAAGGATGTCNGGGCGAANCTTGACGTTGCCGGGCTTGTANACGCCATGCACGTTGCCGAACGTCN CGGCCAGCANGTATTTGCCGTGCTCACCGGCGCCCANCGCCTCGATGGTTTTCTCGAAGTCCTCCGGGCTGGTGTACA GCTTCTCGTTGATCTCGTTCGCCACGCCGTCCTCTTCGCCGCCGACG Clone Rv81 :::::::::::::Rv81SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTGGAAAGGAGATCCCCGGG (SEQ ID NO. 660) AACCTGGTGGCAACCCCGCCATTGGGGTTGTTGGGATTGCCGATCAGCGTGAANGAAGCTCTGTCTGGAGACAGCGGG TCGGCCGAAGCCGCAAGATTGGCCATCACTAGTGACGANATCGTGGCGCTCTGCGAGTANCCNAAGACAGTGACGTTG TTNCCGGCGGCAATTTGCTGCCGAATCGCACTTTCGAGAATGACNGCACCCTGCGCCACCGANGAATCNAAAGTGAGG TTCTTGATCACGACCACCGGGTNGAGCCCTTGGGGCGTGAAGANCGCCTGCGCNATAACACCCGGGACGCTGCCACTC ATGTNCAGCGCGTTCGCGANCTCNACATATCT :::::::::::::Rv81T7.seq::::::::::::: TCCTGGTGATCGANGGCCGCGGTTCCGGCCGAAAATCCGGTTCGGGTTCGGGTCGCGGTTCCAACTTGANCGCGGTCC (SEQ ID NO. 661) GCAGCTGATTCACCGTGGCAACGCCGGCCAACTGCGCATAATGCGCATCCGAACCCTCACCCGCCCGCCCCGCGATCA CCCCAACCTGATCCAACGACAACCGCCCCTCCCGCATACCCCGGGCGCAGCGCGGAAACTCCGGCAACCGCCGCGCCA CCGTGGCGATCGTGTGGGCGTTGCCTGACGAACANCCCATCTTCCAGGCCACCAACCCCGCCACCGACCGCGCCCCCG TCACACCCCACAACCCGTCGCGATCCAGCTCAGCCACGATCTCCACAATGCGCCCATCAATCGCATTGCGCTGAACGG GCAACTCCGCCAACTCCTCCAA Clone Rv82 :::::::::::::Rv82SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGATCTGGTACCCATCCGTGATA (SEQ ID NO. 662) CATTGAGGCTGTTCCCTGGGGGTCGTTACCTTCCACGAGCAAAACACGTAGCCCCTTCAGAGCCAGATCCTGAGCAAG ATGAACAGAAACTGAGGTTTTGTAAACGCCACCTTTATGGGCAGCAACCCCGATCACCGGTGGAAATACGTCTTCAGC ACGTCGCAATCGCGTACCAAACACATCACGCATATGATTAATTTGTTCAATTGTATAACCAACACGTTGCTCAACCCG TCCTCGAATTTCCATATCCGGGTGCGGTAGTCGCCCTGCTTTCTCGGCATCTCTGATAGCCTGAGAAGAAACCCCAAC TAAATCCGCTGCTTCACCTATTCTCCAGCGCCGGGTTATTTTCCTCGCTTCCGGGCTGTCATCATTAAACTGTGCAA Clone Rv83 :::::::::::::Rv83SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATAGAATACTCAAGCTTANCGCCACCTCCCGGGCG (SEQ ID NO. 663) GAACTCCACGGCGTGGATNAAGGTACCGGCCGGGATGTTGCGCAATGGCAGGTTGTTGCCCGGCTTGANGTCCGCGTT AGCGCCGGATTCCACCACATCCCCTTGCGAAANTCCGTTGGGTNCNATGATGTNNCGCTTCTCCCCNTCNANATAATG GANCAACGCNATCCGTGCGGTACGGTTCGGGTCNTACTCCATGTNCGCGACCTTGGCGTTGANACCATCTTTGTCATT GCGGCGAAAGTCNATCATCCGGTNAGCNCGCNTATGANCGCCGCCTTTGTGCCGGGTGGTAATCCGGCCATGCGCNTT GCGTCCACCGCGAACGTGCAACGGGGGCNCCAACGANTTCTCCNGGGTTGAACCGGTNATCT :::::::::::::Rv83T7.seq::::::::::::: TGTGTGTGGTGGTAACCCATCTGAGCAGTGTGCCAAACCGGGGCAGCCAGCTCCCAATTGACGTGAGCCCGCTCACTT (SEQ ID NO. 664) GCTGGGTAAGCGTCG Clone Rv84 :::::::::::::Rv84SP6.seq::::::::::::: AACAGCTATGACCATGATTACGCCAAGCTATTTAGGTGACACTATANAATACTCAAGCTTGCGGGTNATNGCCTTGGT (SEQ ID NO. 665) CAACGGCACCGTGATCGGATCNGGGTCTACCGCACACATNGACTGGAGCTTCGGCGAANTCATCGCCTATGCCTCGCG GGGGGTGACGCTGANCCCNGGTGACNTGTTCNGCTCNGGCACGGTGCCCACCTGCACGCTCNTCNAACACCTCANGCC ACCGGAATCATTCCCNGGCTGGCTGCACGANAGCGANNTTGTCNCCCTCCAAGTCTAAAGGCTGGGCGANANAAGCAN AACGTCCCGACNAACGGCACTCCTTTTCCNTTTGCTCTTC :::::::::::::Rv84T7.seq::::::::::::: GAAATCATTGATGGTTTGAGTCACCAGGCCGATCAAGCCTTCGCCGAGCCAAATTCCAATCAAGAGGCCCAAGCCCGT (SEQ ID NO. 666) ACCAATCAGCCCGGCAACGAGGGATTCCGTCATTATCAGCCAAAATAACTGCTCTCGGGTTACACCCAAACAGCGCAA TATGGCGAAAAACGGTCGCCGTTGCACGACATTAAATGTCACGGTATTGTAGATTAAAAAGATACCCACCAACAANGC AATCAAACTGAGAGCGGTTAAATTGACCGTAAAAGCGTCCGTCATCTGTTTGACNGTGTCCCGTTGGGTATCCGACGT TTCCATACGCACACCGGCCGGCAGTCTTTGTTGGATGCGTNTTGCAATGGCCTCATCTTTGATGATCAAATCGATGTN GCTCAGTCTTCCGGGCATATGGAACAACTCTTGGGCCGTGGAAATATCAGCAATGATA Clone Rv85 :::::::::::::Rv85SP6.seq::::::::::::: CTTTCGCCCAGGCCGGCGCGGATGTCCTCATCGCTTCACGAACATCATCCGAGCTTGACGCTGTCGCCGAACAGATCC (SEQ ID NO. 667) GCGCTGCCGGCCGCCGCGCCCACACCGTTGCCGCCGATCTGGCCCATCCCGAGGTGACCGCGCAGCTGGCTGGTCAGG CCGTCGGAGCTTTCGGGAAGCTCGACATCGTCGTCAACAACGTTGGCGGCACCATGCCCAACACGCTGCTAAGCACCT CGACCAABGACCTCGCGGACGCCTTCGCCTTCAACGTGGGCACCGCCCACGCGCTGACCGTCGCGGCGGTGCCGTTGA CGACCAANGACCTCGCGGACGCCTTCGCCTTCAACGTGGGCACCGCCCACGCGCTGACCGTCGCGGCGGTGCCGTTGA TGCTGGAACACTCCGGCGGCGGCAGCGTGATCAACATCAGCTCCACCATGGGCCGGCTGGCGGCGCGGGGTTTC :::::::::::::Rv85T7.seq::::::::::::: TGTGGGCTCCGATCCGGCGCGCATGGCATCGACGGCGACGCCGATCGATGACGGCCAGGCTTACGAGCTTGAGGGTGT (SEQ ID NO. 668) GAAGTTGTGGACCACCAACGGTGTGGTAGCGGACCTGCTAGTGGTTATGGCGCGGGTACCGCGCAGTGAAGGGCNCCG AGGGGGAATCANCGCCTTTGTCGTCGAGGCTGATTCGCCCGGGATCACCGTGGAGCGGCGCAACAAGTTCATGGGACT GCGTGGCATCGAAAACGGCGTGACCCGGCTTCNTCGCGTCAGGGTGCCCAAAGACAACTTGATCGCANGGAAGCGACG GTCTGAAGATCGCGCTGACCACACTGACGCCGGACGGCTGTCCCTACCGGCGATCCAACCGAGT Clone Rv86 :::::::::::::Rv86SP6.seq::::::::::::: GAGCTGGCCGAGCTGGACCGGTTCACCGCGGAACTACCGTTCTCGCTCGACGACTTTCAGCAGCGGGCTTGCAGCGCG (SEQ ID NO. 669) CTGGAACGCGGCCACGGTGTGCTGGTGTGCGCGCCGACCGGCGCTGGCAAGACAGTGGTCGGCGAGTTCGCCGTGCAC CTGGCGCTGGCGGCCGGCAGTAAATGTTTCTACACCACGCCGCTGAAAGCCCTGAGCAACCAAAAGCACACCGATCTC ACAGCACGCTACGGCCGTGACCAGATCTGGCTGCTGACCGGTGACCTGTCNGTCAACGGCAACCGCCGGTGGTGGTGA TGACCACCGAAATGCTGCGCAACATCCTCTAC :::::::::::::Rv86T7.seq::::::::::::: GATCTCTGGATCGGCGGGGCTCTCCGGGCCGGCCTCGGCGACCTCAGCGGGCCGCGCCTTCCGGCCGAACCATTCCCT (SEQ ID NO. 670) AGCCATAGATGACCGCACCTCGATGCACGGTTTGGCGGCAACGCGGCAAGGCGTCNGTCGGGCCCAGCCGCGGCAATG CGGGTACCCGGGAGCGCGGGTCNGTANACCANCGCTGGACTGCGTCGCGCGGTGCGTCNACNTCAAAGTCCCCGGCCT CCCATATCGCGTATGACGCGGGCGCGCCCGGCACCANGGGTGCCGATCCGGCCGTCTCGAACACCACCGGCCCGCCAG CCGCCGCGGGTCCGGCAGCNAACCCGCCCGCGCCGATACCCGCTGCCCGCGTGCGTGATTGACCGCCGCGCGCACGCT GGCCANGGATCAAAGCCCGTG Clone Rv87 :::::::::::::Rv87SP6.seq::::::::::::: GGACGCGTAGCCCGCCAGGCCGGTCAGGGTGCCCTTCCAGTCCACGCCGCTGTGGTCGGCGAACCGCTTATCTTCAAT (SEQ ID NO. 671) CGAGACGATCGCCAGCTTCATCGTGTTGGCGATCTTGTCCGAGGGCACCTCGAACCGGCGCTGCGAGTNCAGCCACGC GATCGTGTTGCCCTTCGCGTCGACCATCGTCGATACCGCAGGCACTTGCCCCTCGAGCAGCTGGGCCGAGCCGTTGGC AACGACCTCAGANGCACGATTGGACATCAGCCCTAGCCCGCCTGCGAACGGGAACGTCAGCGCAGTGGCGACGACACT GGCCAACAGACAGCACCCAGCCAGCTTCAGAACGGTGATCGCGGCCGGGAAGCGCTCGGGCATGCGTNCTACAGTAGC GACCTCCTGTCACTCCACGTGCCGCTCGGTCCAATAGAATCTTTCCGCGGGCGGGTGAATCTCTGCNGGATCGGGGCN GGCGC :::::::::::::Rv87T7.seq::::::::::::: GCTCGTTGCCGGCGGCGATCTCGTCGAGCTCGTCTTCCATCGCCGCGGTGAAGTCGTAGTCGACGAGCCGACCGAAAT (SEQ ID NO. 672) GCTGCTCGAGCAGACCGGTTACCGCGAACGCCACCCATGACGGCACCAGTGCACTGCCCTTCTTGTGCACGTNGCCGC GATCCTGGATGGTCTTGATGATCGACGANTAGGTCGACGGGCGGCCGATGCCCAGCTCCTCGAGCGCTTTGACCAGCG ACGCCTCNGTGTNNCGGGCCGGCGGGTTGGTGGCATGGCCGTCTGGGGTCAACTCGACNATGTCCAACCGTTGACCCG GGGTCAGATGGGGCAGTCGCCGCTCGGCATCGTCAGCCTCGCCGC Clone Rv88 :::::::::::::Rv88SP6.seq::::::::::::: GTCTTTCGATGGCTGCTTCTTCGGCGCTGACGCTGGCGATCTATCACCCCCAGCAGTTCGTCTACGCGGGAGCGATGT (SEQ ID NO. 673) CGGGCCTGTTGGACCCCTCCCAGGCGATGGGTCCCACCCTGATCGGCCTGGCGATGGGTGACGCTGGCGGCTACAAGG CCTCCGACATGTGGGGCCCGAAGGAGGACCCGGCGTGGCAGCGCAACGACCCGCTGTTGAACGTCNGGAANCTGATCG CCAACNACACCCNCGTCTGGGTGTACTGCGGCAACNGCAAGCCGTCGGATCTGGGTGGCAACAACCTGCCGGCCAAGT TCCTCGAGGGCTTCGTGCGGACCATCAACATCAAGTTCCAAGACGCCTACAACGCCNGTGGCGGCCACAACCGCGTGT TCGACTTCCCGG :::::::::::::Rv88T7.seq::::::::::::: GCCAGGTCGAGGTCCCATGCGCGTGGGCCATTGATGCTGATCGCCAGGACGTCAAANATTTGGTCCGGCGTCAGCTGG (SEQ ID NO. 674) GCGAAAAACGTGGGCCCCAGGACTTGCCCGGAGCTGCCCGGGTTCCCGTCGCGCAGCTCGGCGGCCCCGGTCAGAAAN AAATTGCGCCAGGTCGCACACTCCGCGCCGTANGCCAGCTGCTCCAGGGTGTCGGCATAGAGCCCGCGGGCCGCAGCG TGCTCGCTGTCGGCGAACACCGCATGGTCGAGAAGCGTTGCCGCCCAACGGAAATCACCTGCGTCNAANGCTTCGCGG GCCAACTCCAGCACTCGGTCGATG Clone Rv89 :::::::::::::Rv89SP6.seq::::::::::::: NAAACGTTCCGGCTTNGGTGCCGGGCGCTTATTTGCGTCTCTGGGATCACNCTCAGTCGCCGGCGGCTGCCGTTGGGC (SEQ ID NO. 675) TATNANTTGCACCGANCCGGAAAATCCGCACNANAACTGCNAGTAGCGGCCTGCAGAANTGCATCCTCGGCGAANCNG ACTACCGGTGGACANCNACAAGCGCCGCCGAACAACGCACTGGCCCGAGGGATNGGCGTCTATCGGCCCGGCCCGTCG AACTNGGAACAGACNGTGCGGTTCTACCGTGATCTGGTGGGAATGCTCNACCANACCTTCCCNANNGCTACGGAACNA CGGCGCGATATTCNGCCNTCCCANCTCGAGCCTGACNCTNGATATCGTCGANNCTCACCATCNCGATCNGCTGTGCCG GTNTTGCTCGGACTN :::::::::::::Rv89T7.seq::::::::::::: CGAACGACGAACNCCNCAAGCCATGGTGGTTGGCGCCGTCAAAAGGTCCGCGGTCGCCACTACTGGAAAATCGCCTTG (SEQ ID NO. 676) AGCGTCNCTCGACCNCCGCCTCGAGTTGGGTCNTAACGAAATACCTGATGCCGATCANGTCNACGTCTCCGTCGCNNC AACGTGCAGCGGCGACCCACTCTACNANCTCTCGGTNCCGCCNCGGCCAGNGCACCACCAGTGACNAATCCNTGCGCC NTCGGGCCNAGCANTCCCGGTGCNACCGNGGTGGGTCCGGCGATGGTNGGGTGTNCTCNNTACNGGAACGCCAGCGCN ATCANCATCGGCANACTCNCGTCGATGTGCCGCGGCGCAACCATCCCCCACAATGATCNGGTGCGTCTGATCAGGCN Clone Rv8 :::::::::::::Rv8SP6D.seq::::::::::::: TTAGGCGTGACGGCGACCGGGGCCACTCCGCACAATCTGTACCCGACCAAGATCTACACGATCGAATACGACGGCGTC (SEQ ID NO. 677) GCCGACTTTCCGCGGTACCCGCTGAACTTTGTGTCGACCCTCAACGCCATTGCCGGC :::::::::::::Rv8T7D4.seq::::::::::::: CGTCACCCCGATGCGCCCAGATCGGGGCTTCGCAGATAAAGCACGAACTGGCGGGCAAAACGTCGATCTCGGAGCCGG (SEQ ID NO. 678) AAGGGCAATCAGCCGACCGTCGACGAACGACACCGGCGAGACCACTTAGGCAGTGACGGCCT Clone Rv90 :::::::::::::Rv90SP6.seq::::::::::::: CTTTTCNCGATGTCTCATGATNCCNANGGAGAACNNTGCNANCNCNGCCGCTGACNTNGCNCACCGCTNTGGCNGNGG (SEQ ID NO. 679) TGACATTGGTGGTGGTTGCGGGCTGCNACGCCCGACTCGANGCCGANCCATNTNTTGCGGCCGACCGCNTNTCGTCTC NACCGCANNCCCNATCTCNGCCGCNCCCGGTGGANCTACNGCTNCTTCGCCATCTCTCGCCNATGGCTCCNGCGNNTC GCNCAACGTNTGGTTTGGTNANCTGCCTACCTGGTCNT :::::::::::::Rv90T7.seq::::::::::::: GCTGCGCCAGTCGTTCGGTGCGGTCATGCCGTTGGACCNACCATCGGAGTTAGTTGCCGAACCGCGGACCACCGCAAG (SEQ ID NO. 680) CACCCGGTCCTGCTCGCGCACCGCGTCGGCCAACCGCTTGAGCACCACCACGCCGCAGCCCTCGCCGCGCACGAATCC ATCCGCGTTGGCGTCNAANCTGTNGCATCGGTCGGTCGGTGACAGCGCCGACCACTTGGACAGCGCGATGGCGGTGAA CGGTNANTAGGTGACCTGCCNCCNCGCCCGCCAATGCCCACCTCCGCTTCACNCATGCGAATGGTCTGACACGCCNAG TGAATTGCCACCAGCGACAACAAAAATCGGTATCTNCNGCGACGGCGGACACGCNATCCCNACTGATACTCGATCCGC CCCACCGCTTGNANCTCCGGGTTCCNGTGCTCATGTACCNTCATGTCGGTCTGCGCNCGATATTGACCATCGTGTTTC CCACGANNANAGANCCTCATCACGCCGGTTCGAGTGCCG Clone Rv91 :::::::::::::Rv91SP6.seq::::::::::::: CTGTGTGCGGNCGGCGCGATATCGGCCTTTTTACTAACCGAACCCGATGTGGGCTCCGATCCGGCGCGCATGGCATCT (SEQ ID NO. 681) ACNGCGACGCCGATCGATGACGGCCAGGCTTACGAGCTTGAGGGTGTGAANTTGTGGACCNCCAACGGTGTGGTAGCG GACCTGCTANTGGTTATGGCGCGGGTACCGCGCAGTGAANGGCACCGAGGGGGAATCANCGCCTTTGTCGTCTANGCT GATTCTCCCGGGATCACCNTGGAGCGCNCCNCNANTTCATGGGACTGCGTGGCATCCAANACGGCGTGACCGGCTTCA TCCNTCNGGGTGCCCAAAGACAACTTGATCNGCNNGGAAGCGACGTCTGAANATCGCGCTGATCNCACTCAACGCCGG ACGCTGTCCTACCGGCGATCGCACCGGANTTGCCAANCCGCGCTNANNATNCGCGNGAATGNCCGTCCACNANTGCAT GG :::::::::::::Rv91T7.seq::::::::::::: TGGGGTGCCGGGCGCCGAGTTGCGTCCCTGGGATCACGCAGAGTCGCCGGCGGCTGCCGTTGGGCTATGAATTGCACC (SEQ ID NO. 682) GAGCCGGAAAATCCGCANCAAAACTGCGAGTAGCGGCCTGCAGAAGTGCANCCTCGGCGAAACGGAGTACGGTGGACA ACGAAAAGCGCCGCCGAACNACGCACTGGCCCGAGGGATTGGCGTCAATCGGCCCCGCCCGTCGAACTTGGAAGANAC ANTGCGGTTCTACCGTGATCTGGTGGGAATGCTCCAACNNACCTTCNCGGAAAGCTACGGAAGCNACGGCGCGATNTT CGGCCTTCCCAGCTCGACCTGACGCTGGAAATCG Clone Rv92 :::::::::::::Rv92SP6.seq::::::::::::: NGGCNGGGAAGTTAATGCCCTACTGGTTCNATGCTCNCACNTCNCCNGTGACNNCCTGCNCCGACCCGCCGAGGTCCT (SEQ ID NO. 683) GNCCGTNACCACCGANCNGGCGATCCGGGACTCTNGTACGCATCCAACANNGANCAACGTGCACGGGCGGAGTNGTNC CGCCACTTCGNCNATGACGGGGTCGATCCNTTCGACGTCCGTCGCCGCGTCGCTCGAGTGGCGGTCACNCTCCNNGTA CTCGACCNCACNGACGAGAGGACTCGANCCCATCTACGTGTGGACGAAACANATCTTCTGTCCNACGACTACACCACC ACCCAGGCCATCGCCGNCGCCCGCGANGCCCCTTCGACGCCNTACTGGTCCNGNGGNGGCGCTCTCCGGTTGTCTNNC NCNTGNCGTGTTCCTTCACNCACTGCCCNACATCGANCCCGAGCNATNCNANGTCCGTCAATC :::::::::::::Rv92T7.seq::::::::::::: GGACACTGTTCGCGTGCCCCTCGTCAAAGCCGGAGTGGTCGTGCTGCGCCGGACCCGACCCGACCTTCAGCGGGGGTT (SEQ ID NO. 684) CACAGCTCCGTGGGTGCCGTTACTTCCGATCGCCGCAGTGTGCGCGTGCCTGTGGCTGATGCTGAACCTCACCGCGTT GACTTGGATCCGGTTCGGGATCTGGCTGGTGGCCGGAACCGCGATTTATGTCNGCTACGGGCCCCGGCACTCGGCGCA TGGCCTTCGGCAAGCNCNANANAACGCGACCCGGAGGTGTTGAACTAGCTTCGCCGCGTATTTACAAATTGCNTTATA TGTCTACACATAAGACGCAAACTGCTCTATTGTCAANTCCCANCGTGGTGTGGCNCATGAAGATGTTTGG Clone Rv94 :::::::::::::Rv94SP6.seq::::::::::::: TCCTTCTCGGTATCGGTTTGGGCTGTCACCANCAGTTGGTAGTTCTTCACGTNCTGTTGTTCGAGCGTCNAGCCGTCG (SEQ ID NO. 685) CGCGTGTCNANGTCNCCGGACGCGTATCCCGCCAGGCCGGTCANGGTGCCCTTCCANTCCACGCCGCTGTGGTCGGCG AACGCTNATCTTCAATCGAGACCATCGCCAGCTTCATCNTGTTGGCGATCTTGTCNNACGGCACCTCNAACCGGCGCT NCTAGTACNCCACNCNATCNTGTTNCCTTCNCGTCNACATCCTCGATNCCNCNTGCACTTTCCCTCGANCNCCTGGGC CGAGCCGTTGGCANTNACCTCNGAGCCCCATTGGACATCANCCCANCCCGCCTGCGAACGGGAACGTCAGCNCNCTGG CGACAACCTGGCCAACAN :::::::::::::Rv94T7.seq::::::::::::: CACNCCGTGATCGCNAGCCCCNGTAGAAATNGTTGAGCCAGTTGGTGCGGCGCTCGTTGCCGGCGGTNATCTCGTCGA (SEQ ID NO. 686) GCTCNTCTTCCATCGCCGCGGTGAAGTCGTACTCGACNAGCCGACCNAAATGCTGCTCNAGCAGACCGGTTACCNNNA ACNCCNCCTCNTGACNGCACCAGTGCNCTGCCCTTCTTGTGCACGTACCCGCNATCCTGGATGGTCTTGATGATCNAC TANTNTGTCGACGGGCGGCCGATGCCCATCTCCTCNAGCGCTTTGACCAGCGACNCCTCGGTGTATCGGGCCGGCGGG TTNGTGGCATGGCCGTCTGGGGTCANCTCNACNATNTTCANCCGTTGACCCGGGGTCACA Clone Rv95 :::::::::::::Rv95SP6.seq::::::::::::: TGGCCTTCTTGNCANGGGCNNACATNNGCTATNGCGAGCGTGTAACCGATCATCNTCCNGGCGACTGTGGCCTGANCG (SEQ ID NO. 687) GCAAGGGTNGCCTNATTCNTCCTCCTGNGGCATGGTTNCCACACGGAATGNCGGTAAGTCTGGTCAACAACCTGGCCC GCTGCGGGTTGGGTTCGGATTCGCTCGGCTANTAAGGTGCTCGCCTGGTGTNACNACTAATCNCNATATACNCTTANC GGGAGTNGNCGTCCCGATCCTNGCCCTGCCGCNGGCGATCNCGTTCGCANCACCGCCACCGGAACTCNCAANGTGCGC TCATCGGGCTCTACGCGCCATCTTCCCCGGATTCTTCGCGGCNGNGTNCCGNGGGACCCCGGACTGTGACNGGCCCAA CGGCTCATCATCG :::::::::::::Rv95T7.seq::::::::::::: CCGGATAGCGGTGTCTGAACTTCGCCCGTTCCCTCCANCGCATTGAGCTTCAGCCCGACCGGCAGGTNNGGAGTCGGC (SEQ ID NO. 688) ATGCGGTCCTTCGCCCCGACCCCGCTGGCTAAATANCCACCCCCGAGCGCGGTCACGGTCTTTGCACCGGGACGACGC ATACCGGCAGCGCGAACATCNCCGCGGGCTGCAGCNTGAACGTCCAATACCANTCNAACAGTGTCCGCGCGTNAAAAC CCGANCCGGCGGTCGCTTCNGTAATCAACGGCTCCTGCGCAACCAGCTGCAAGTCGCCGGTGCCACCGGCGTTGACGA TCTTGATGTCTGCGANCTCGCGCACCAGCTCGACGGCCCGGGCA Clone Rv96 :::::::::::::Rv96SP6.seq::::::::::::: CCTCCCGACCACATACAGGCAAAGTAATGGCATTACCGCGAGCCATTACTCCTACGCGCGCAATTAACGAATCCACCA (SEQ ID NO. 689) TCGGGGCAGCTGGTGTCGATAACGAAGTATCTTCAACCGGTTGAGTATTGAGCGTATGTTTTGGAATAACAGCCGCAC GCTTCATTATCTAATCTCCCAGCGTGGTTTAATCAGACGATCGAAAATTTCATTGCAGACAGGTTCCCAAATAGAAAG AGCATTTCTCCAGGCACCAGTTGAAGAGCGTTGATCAATGGCCTGTTCAAAAACAGTTCTCATCCGGATCTGACCTTT ACCAACTTCATCCGTTTCACGTACAACATTTTTTAGAACCATGCTTCCCCAGGCATCCCGAATTTGCTCCTCCATCCA CGGGGACTGAGAGCCATTACTATTGCTGTATTTGGTAAGCAAAATACGT Clone Rv9 :::::::::::::Rv9SP6.seq::::::::::::: CTTCACNTCCGTACGGCTCGGGTACGCTTCGGTCNCATTGTGCGAGTGATAGATGACGACCGGGACCTCGTCGGCATC (SEQ ID NO. 690) TTCCATAGCCCGCCACACCTTCAGTTGCTCACCGGAATCCAACCGGTANAAGGTCGGCGANCGCTCNGCATTGGTCAT CGGGATATGCCGCTCGGGACGGTCANAGCCCTCGGGTCCGGCCAGCACTCCGCAGGCTTCGTCGGGGTGGTCGCGACG CGCATGGGCCACCATCGCATTCACCAGGTCTGCGCGAATCACCAGCACGTANACGGTTCCTTTCCTAAGCAACACCGA ANTTTCAGGACCCGAATGCTCCGGGAAACATGTCACGGTAGGTCGGTATTCCGGCTACCGGCTGANCATTGAGCACGC CGGCCAGCACCGCACGAACCAGGCAATCAGCCGCCGCCGCACCCGACCGCGG :::::::::::::Rv9T7.seq::::::::::::: CAGGCATGCAAGCTTGATGCCGCCGAAACCGAGCGTGAGCACGCCGCCAGCCACCACGCGCGGGTCGGGCGCCGGGCC (SEQ ID NO. 691) CGGGCCGCCAGGCTGCTCCGCTCGGTGATGGCACGCCACCGCGACACCACCCGGCTGCGCTACCTCGAGCCATACCGG GCGGAGCTACATCGGCTCGGCCGCCCAGTGTTCGGGCCCTCTTTCGN3GTCGAGGTCGATACCGATTGGCGCATCCGC AGCCGCACCCTGGACGACAGAACCGTGCCCTACGAATTGCTTGTCGGGCGGGGCCAAAGAACAGCTTGGCATCCTGGC GCGATTGGCCGGCGCGGCGCTGGTCGCCAAGGAAGACCCGTTCCGGTGCTGAT TABLE 4 End-sequences of the polynucleotide inserts cloned in the named recombinant BAC vectors contained in the I-XXXX M. bovis strain Pasteur genomic DNA library. RvXXXSP6 corresponds to the SP6 end-sequence of the clone RvXXX. RvXXXT7 corresponds to the T7 end-sequence of the clone RvXXX. RvXXXIS 1081 corresponds to a region located close to a copy of the IS1081 repetitive sequence (Insertion element). The character << - >> denotes an uncertain base residue. Clone X0001 ::::::::::::::::X0001SP6.seq:::::::::::::: AAG- (SEQ ID NO. 692) TCGGGTTTCCACACGCGCGGTTTGACCCTAGTCATATGTAATCATGTGTACCATGTGCGGGCGCTTTTCGACGGCCG CGAACCACCGGA-ATTTCCTGTGATTTCACTGCATGCGTACCATCTGGCACAATTGAGCA-TTGTCT- TCGCGGTGGTCGG-CGGGTTGCGTGCCGCCTGCTGCGA-ATGCACCA- TAAGCCCGAACCCACCGGCTTGGTGACCACCGCACGCTGCGTGTGGGGGGTAACCACTCCGCGACCCCAAGGATGGT CATTTCCAATGAACCGGCTGGACTTCGTCCA-A ::::::::::::::X0001T7.seq:::::::::::::: GTCGCGGTTCGATCGACCCGATCTTCACCTCGTAACCTCGATGCTTAGCAGGATCCAGCTTGACCGCGTTTCGCTCT (SEQ ID NO. 693) ACCCACTCTTTGAGTGGCGCCGTCGCCTGTGCCCCATCGGTGTTCATGACGAACGCTTCGAAAGACTTCCTCTTGTG AGCCGGAATGTCTGCGTAAAGAAGTTCCATGTCCGGGAAGTAGACCCGGTCGCCCTCCACGTGGTACTCCTTCGAGG TCCGCTTCTCGCCGGATCCGATAAACACCGGCCCCAGGCACCGCAGCGTGAGTTCGAACGGCTTCAGGTAGGTGTTC ATGCGGCGGACTCCGGGAGTGCGAGAAATAGCGGTCGCGCGTAGCTGTAGACCGGATGGTTTCCGCCCAGGCTGACG TCGAAGATGCCTCCTTGGAAGGGGCGCGA Clone X0002 ::::::::::::::X0002SP6.seq:::::::::::::: AACTCAAGTTTTTACGGTGATCGCGCATCACCTGGTTCATGAACTGGAAGCAGCGCAGCGCTTCCTTTTCGGCCGCA (SEQ ID NO. 694) ACATGAGCCAGCCTCTCGTCGGCGGTCGGGTGCAGGTGCTCGGGCAGCTCGGCCGCGACAGCCGCCTGACCCTGAAA CCAGCTTCCATATCCCGCGAC- AACGACGCCAGTCCGCTACGTAACCCCTCCGCGACTGTCCATGGACAACAGCGCGTTCTCCACCGACCGGGCCCGGG TGT ::::::::::::::X0002T7.seq:::::::::::::: GTGCAGGTTTCGACAATGTGGTGCCGGTTCGGCGGCTACGTGCCATCGAGACACTGGCGCA-GCTATCGCACCCGTT (SEQ ID NO. 695) ATCGGCTGCGAGCAAATCGCGGTATGCGTTCTTGAGCATGAGTCGGCGACCGTCGTCATGGTCGACACCCACGACGG AAAGACGCAGATCGCCGTCAAGCATGTGTGCCGCGGATTATCAGGACTGACCTCCTGGCTGACCGGCATGTTTGGTC GCGATGCCTGGCGCCCGGCCGGCGTGGTCGTGGTCGGCTCGGATAGCGAGGTCAGCGAATTCTCGTGGCAGCTCGAA AGGGTCCTGCCGGTGCCGGT Clone X0003 ::::::::::::::X0003SP6.seq:::::::::::::: TTCGAGTCATGCGCCCGCCTCGACCACGAA-ATGCACGTCG- (SEQ ID NO. 696) GGTTCGATCGACCCGATCTTCACCTCGTAACCTCGATGCTTAGCAGGATCCAGCTTGACCGCGTTTGGCTCTACCCA CTCTTTGAGTGGCGCCGTCGCCTGTGCCCCATCGGTGTTCATGACGAACGCTTCGAAAGACTTCCTCTTGTGAGCCG GAATGTCTGCGTAAAGAAGTTCCATGTCCGGGAAGTAGACCCGGTCGCCCTCCACGTGGTACTCCTTCGACGTCCGC TTCTC ::::::::::::::X0003T7.seq:::::::::::::: GTCATGTGTACCATTTGCGGGCGCTTTTCGACGGCCGCGAAACACCGGAGATTTCCTGTGATTTCACTGCATGCGTA (SEQ ID NO. 697) CCGTCTGGCACAATTGAGCAGTTGTCTGTCGCGGTGGTCGGCCGGGTTGCGTGCCGCCTGCTGCGAGATGCACCAAT AAGCCCGAACCCACCGGCTTGGTGACCACCGCACGCTGCGTGTGGGGGGTAACCACGCCGCGACCCCAAGGATGGTC ATTTCCAATGAACCGGCTGGACTTC-TCAACAA Clone X0004 ::::::::::::::X0004T7.seq:::::::::::::: AACAGCGCGGTTGAACTGATAGGTGCGGCCCGGCTCGAGCAGGCCGGGCCATTTGTTCGATGCGGTTACCGAAAGAT (SEQ ID NO. 698) CTCTTCGGTGACCTGCCCGCCGCCGGCCAGCTCGGCCCAGTGCCCGGCGTTGGCCGCCGCGGCGACGATCTTGGCGT CCACGGTGGTCGGGG Clone X0006 ::::::::::::::X0006T7.seq:::::::::::::: GCATCTGGGCTGGCGGTGGTTCGCCGCTCCGAAGCCGTCGAACACCATCGCCAGCGCGGCTTCCACATCAACGACCA (SEQ ID NO. 699) TTTCGGCCAGCTTGCGGCGCATCAGCGGCTTGTCGATGAGCGCCCCACCGAATGCCCGCCGCTGCCCGGCGTA- CACAGCGATTCGACCAGCGCGCGGCGCGCGTTGCCGAGGGCGAACGAAGCGGTGCCCAACCGCAATCTGTTGGTCAG CTCCATCATGCGGGTGAGTCCCTTGCCG Clone X0007 ::::::::::::::X0007SP6.seq:::::::::::::: ATCGGTTTCCAGCAACAGCCGATCGACGGCTTCGCCCA- (SEQ ID NO. 700) GGCCGCTCCCGGGCGACCCGACCATTGCTGTCGCCGCGTAACGCCATCACGGATGACGCGCAGTTCGTCGCTGTCTA GCTCCACCATCGCCTGCACACCGGCGGCCAGGACCCATTGGCCGTCGCACTCGTA- AGCAGGTAATCCTCGTCGACGGACTCGGTAACCACCGCCGCCAGCTCCGCTGCCAGGTCGGCGGGGTTGACACCGGC GGGCATCGGGATGGACGACGACGCGGTGCTGACGGCGCCTGTC ::::::::::::::X0007T7.seq:::::::::::::: AGCGGTTTCCCA- GCGGGATGTGCTGTGAGCGCCGCACCACCAGCGCCGACGCTAAGGATGGAACGCACGGCATCTTCTGACGCGTAACC (SEQ ID NO. 701) GCGTTGTGATCGCGAGCTGAGGAGACGGTATGGGGGAGGGTTCTCGGAGGCCATCTGGGATGTTGATGTCTGTCGAT CTTGAGCCGGTGCAACTCGTCGGCCCGGACGGTACGCCGACGGCCGAACGCCGCTACCACCGTGACCTTCCTGAGGA AACGCTGCGTTGGCTCTACGAGATGATGGTGGTCACCCGCGAGCTGGATACCGAATTCGTCAATCTGCACG Clone X0008 ::::::::::::::X0008SP6.seq:::::::::::::: CAAGCTTCCACAGGTAGGGATCGAGGAACAGCGCGTTGAACTGATAGGTGCGGCCCGGCTCGAGCAGGCCGGCCATT (SEQ ID NO. 702) TGTTCGATGCGGTTACCGAAAATCTCTTCGGTGACCTGCCCGCCGCCGGCCAGCTCGGCCCAGTGCCCGGCGTTGGC CGCCGCGGCAACGATCTTGGCGTCCACGGTGGTCGGGGTCATGCCCGCGAGCAGGATCGGCGAGCGGCCGGTCAGCC GGGTGAACTTCGTCGAAAGCTTGACCCTGCCGTCGGGGAGGCGAACCACGGTCGGTGCGTANCTCCACCAAGCCCGG GCAACCTCGGGGGTGGCGCC ::::::::::::::X0008T7.seq:::::::::::::: TGGACCTCATGACAACGCGGCGGCGATTACCCCCGCTACCGCCAGCAGCATGACGGCGGTAGCGAACACCGCCGGAT (SEQ ID NO. 703) GCAGCGCAGGTGCGTCGATGTGCTCACGGAATCGCCCCGGCACCGCGATCTCGAGGATCACCAGTGCCACCCCCTGC AGCGCGACACCGACGATTCCGTACACCGCCACGCCGATCAGGCCCTGGGCCAGCTGGCGTATATGGCGGCGATGGTG ACGATGGCCAGCGCCACATACATTGTGGCGGCCAGAACCACGGCGTTGGGGCGGCGGTCGATGAACACTAGGCGACG CAGATCGCCCGGGGTCAACAGGTTGACCATCAGAAAGCCTGCGA Clone X0009 ::::::::::::::X0009SP6.seq:::::::::::::: TTTGGTGCGGCCGGCAATCAACTTC-GCTC CAGCGGTTTCCCAGGCGGGATGTGCTGTGAGCGCCGCACCACCAGCGCCGACGCTAAGGATGGAACGCACGGCATCT (SEQ ID NO. 704) TCTGACGCGTAACCGCGTTGTGATCGCGAGCTGAGGAGACGGTATGGGGGAGGGTTCTCGGAGGCCATCTGGGATGT TGATGTCTGTCGATCTTGAGCCGGTGCAACTCGTCGGCCCGGACGGTACGCCGACGGCCGAACGCCGCTACCACCCT GACCTTCCTGAGGAAACGCTGCGTTGGCTCTACGATATGNDGGTGGTCACCCG ::::::::::::::X0009T7.seq:::::::::::::: CGCCCAGGGCCGCTCCCGGGCGACCCGACCATTGCTGTCGCCGCGTAACGCCATCACGGATGACGCGCAGTTCGTCG (SEQ ID NO. 705) CTGTCTAGCTCCACCATCGCCTGCACACCGGCGGCCAGGACCCATTGGCCGTCGCACTCGTAGAGCAGGTAATCCTC GTCGACGGACTCGGTAACCACCGCCGCCAGCTCCGCTGCCAGGTCGGCGGGGTTGACACCGGCGGGCATCGGGATGG ACGACGACGCGGTGCTGACGGCGCCTGTCGCGACGCTGAGCTCGGACACAGCTAGTAAATGTAGCCTAACCTACTTA ATGGGTCGCAGCCCCCCGGGGTCGTCGCATGTCCAACGTTGCTCGACTGGAAGAAAATGCTCGTCGGGGAGCAAATG GCACC Clone X0010 ::::::::::::::X0010SP6.seq:::::::::::::: AATACTCAATCTTGATCGGTTTCCAGCAACAGCCGATCGACGGCTTCGCCCAGGGCCGCTCCCGGGCGACCCGACCA (SEQ ID NO. 706) TTGCTGTCGCCGCGTAACGCCATCACGGATGACGCGCAGTTCGTCGCTGTCTAGCTCCACCATCGCCTGCACACCGG CGGCCAGGACCCATTGGCCGTCGCACTCGTAGAGCAGGTAATCCTCGTCGACGGACTCGGTAACCACCGCCGCCAGC TCCGCTGCCAGGTCGGCGGGGTTGACACCGGCGGGCATCGGGATGGACGACGACGCGGTGCTGACGGCGCCTGTCGC GACTCTGAGCTCGG ::::::::::::::X0010T7.seq:::::::::::::: GGATGTGCTGTGAGCGCCGCACCACCAGCGCCGACGCTAAGGATGGAACGCACGGCATCTTCTGACGCGTAACCGCG (SEQ ID NO. 707) TTGTGATCGCGAGCTGAGGAGACGGTATGGGGGAGGGTTCTCGGAGGCCATCTGGGATGTTGATGTCTGTCGATCTT GAGCCGGTGCAACTCGTCGGCCCGGACGGTACGCCGACGGCCGAACGCCGCTACCACCGTGACCTTCCTGAGGAAAC GCTGCGTTGGCTCTACGAGATGATGGTGGTCACCCGCGAGCTGGATACCGAATTCGTCAATCTGCAGCGCCAGGGGG AAGCTGGCGTTGTACACGCCCTGTCGCGGGCAGGAAGCCGCGCAGGTGGGTGCGGCGGCTTGCCTACGCAAAACCGA CTGGTTGTTCCCC Clone X0012 ::::::::::::::X0012SP6.seq:::::::::::::: ATCACGACAACAGCGACGGTGTGTCGGATCAGCGGCCCCCGTTGCCGGGCAATGTTGAGGCGTTTCTGCGTCTGGTT (SEQ ID NO. 708) GAGGCCGGCTGGGAC- CCGAGGTGGCTCGTCGGCCACATGGGCAGCACACCACCGTGGTGATGCATCTAGACGTGCAGGACCGTGCCGCTGGC CTGCA ::::::::::::::X0012T7.seq:::::::::::::: GCGGCTACGTGCCATCGAGACACTGGCGCAGGCTATCGCACCCGTTATCGGCTGCGAGCAAATCGCGGTATGCGTTC (SEQ ID NO. 709) TTGAGCATGAGTCGGCGACCGTCGTCATGGTCGACACCCACGACGGAAAGACGCAGATCGCCGTCAAGCATGTGTGC CGCGGATTATCAGGACTGACCTCCTGGCTGACCGGCATGTTTGGTCGCGATGCCTG: Clone X00013 :::::::::::::X0013T7.seq:::::::::::::: TACAAGCGGCACCTCGCCGGTGAACTGACCGTTCGCACGCTGCGCACCGCCGCCGGGCGCGTGCTCGGCGCGCCCGC (SEQ ID NO. 710) GGCCCCCGAGGCCTGAGAGGGGAACCAACCATGCAGGTGAACATGACGGTAAACGGCGAGCCCGTCACCGCCGAGGT CGAACCCCGGATGCTGCTGGTCCATTTTCTCCGTGATCAGCTGCGGCTCACCGGAACTCACTGGGGCTGTGATACCA GCAACTGCGGGACATGCGTGGTGGAGGTCGACGGCGTGCCGGTGAAATCCTGCACGATGCTCGCCGTGATGGCCTCC GGGC Clone X0014 ::::::::::::::X0014T7.seq:::::::::::::: AGCGGCTGGTTACGACTCCCTGTTTGTGATGGACCACTTCTACCAACTGCCCATGTTGGGGACGCCCG-CC- (SEQ ID NO. 711) TCCGATGCTGGAAGCCTACACTGCCCTTGGTGCGCTGGCC-C-GCGACCGAGCGGCTGCAACTGGGCGC- TTGGTGACC-GCAATACCTACCGCACCCC-ACCCTGCTGG-CAAA- ATCATCACCACGCTCGACTTGGTTAGCGCCGGTCGA-CGATCCTCGGCATTGGAACCGGTTGGTTT- Clone X0015 ::::::::::::::X0015SP6.seq:::::::::::::: ACGCGCGCCGATCATATCTGCTATGGATGTACAATTCAGCTCTTGCTGTTATACCAGTATATGGTGTACTATTTGAT (SEQ ID NO. 712) CTATGCTGACGTGTGAGATGCGGGAATCGGCCCTGGCTCGACTCGGCCGGGCTCTGGCTGATCCGACGCGGTGCCGG ATTCTGGTGGCGTTGCTGGATGGCGTTTGCTATCCCGGCCAGCTAGCTGCGCACCTCGGGTTGACUCGATCGAATGT GTCCAACCATCTGTCGTGTTTGCGGGGCTGCGGGCTGGTA-TCCCAACCTATGAGGGCCGGCAGGTTCGGTAT ::::::::::::::X0015T7.seq:::::::::::::: CCGCGCTGCTGCTGACGTCGGTCGAACGTGCGACACGTCTGCGAATACCGGCCGAACGCTGGGTTTATCCACAGGCT (SEQ ID NO. 713) GGCACCGACGCCCACGACACACCGGCCGTCGCCGACCGCCACCGACTGCATCGGTCGACGGCCATTCGGATCGCCGG TGCCCGGGCGCTGGAACTGGCTGGGCTGGGGCTCGATGACATCGAATACGTCGACCTGTATTCGTGCTTTCCCTCCG CTGTCCAAGTCGCCGCAATCGAACTCGGCCTGGACACCGACGATCCTGCCCGCCCGCTGACCGTCACCGGGGGCCTG ACCTTCGCCGGCGGGCCGTGGAGCAATTACGTCACGCACTCCAT Clone X0016 ::::::::::::::X0016SP6.seq:::::::::::::: CAGGCGTGCAATGACCTGCACTGCGCCGGA-A- (SEQ ID NO. 714) TCCCTAACCCACTAAACCGGGGCCGCTCACAAGCCGTGCAGCTCGGTCAGCGTCAGGTGCGCGACCAGGAA- TAAATGAGCAGACCCGTGCCGTCAACGATGGTGGCGATCATCGGCCCCGAAACGATGGCCGGGTC- ATGCGCAACTTCTTCAGCAGCGGCGGAAGGACGGCA-CCACCAGCGAC-ACCACACCACGAT ::::::::::::::X0016T7.seq:::::::::::::: GCGAA- (SEQ ID NO. 715) CACTTCGTCAACTTCCAGGGCTGCCCGCACCAAGTATTTCGACGAGTATTTCCGTCGGGCCGCCGCCGCCGGCGCGC GGCAGGTGGTCATCCTGGCGGCGGGGCTGGACTCGCGCGCGTACCGGCTGCCTTGGCCCGACGGGACCACGGTTTTT GAGCTGGACCGCCCGCAGGTCCTTGATTTCAAGCGCGAGGTGCTCGCCAGCCACGGTGCCCAACCGCGCGCCCTGCG CCGCGAGATCGCCGTCGACCTGCGTGACGATTGGCCACAAGCCTTGCGGGACAGTGGTTTCGATGCGGCTGCACCGT CGGCATGGATTGCCGAAGGGCT Clone X0017 ::::::::::::::X0017SP6.seq:::::::::::::: TTGGGC-TTGCCC-CAATA-GGCCCCAATCAAAAGCCGAGCAGGTGGAACCTA-CGCATTCGCCTC-TCGT- (SEQ ID NO. 716) TGTGCACCCGAGCCATCGCACGCGCGGGAATTCCCGGAT-TC- CCGTATTCTCCGGCGGCCGGGCTAACCCATCCCA-GCCGAACGGTTGGCTC- TGCCGTGGGTCCCGTGTTGGCCGATCGGGGCGTCACCGGGGGTGCTCGGGTGCGG-TGACCATGGC-AACTGCCCC- ATGGGCCGACCCTGGTGCAGATAAACCTG ::::::::::::::X0017T7.seq:::::::::::::: TGGTGGAGGTCCCCACCAA-ACCCGGCCGTAACTCTGCTCACGGAAATGCGG- (SEQ ID NO. 717) CAGGCCGCGCGTAGCACGTGGTATCCGCCATAAAGGTGCACCTTAAGCACGGCGTCCCAATTCTCGAACGACATCTT GTGGAAGGTGCCGTCGCGCAAGATCCCGGCGTTGCTCACCACACCGTGCACGGCGCCGAATTCGTCAAGCGCGGTCT TGATGATGTTCGCTGCGCCGTCCTCGGTGGCGACGCTGTCGGTA- TTGGCGACCGCCCGGCCCCCCTTGTCGCGAAATCTCGGCGACGACCTCATCGGCCATCGCCGAACCGGGCGCCCG Clone X0018 ::::::::::::::X0018SP6.seq:::::::::::::: GCCGGCCAAACTGGCCGGCGGGGTTGCTGTC-TCAAGGTGGGTTCCGCCACCAA-ACC- (SEQ ID NO. 718) CACTCAAGGATCGCAAGGAAAGC- TCAAGGATGCGGTCGCGGCCGCCAAGGCCGCGGTCAAGGAGGGCATCGTCCCTGGTGGGGGA- CCTCCCTCATCCACCAGGCCCGCAAGGCGCTGACCGAACTGC-TGCGTC-C-GACCGGTGACAA- GTCCTCGGTGTCCACGTGT-CTCCGAAGCCCTTGCCGCTCCGTTGTTCTGGATC-CC-CCAAC- CTGGCTTGGACGGCTC-GTGGTGGTCAACAAGGTCAGCGAGCTACCCGCCGGGCATGGGCTGAACGTGA Clone X0018 ::::::::::::::X0018T7.seq:::::::::::::: CGAACCT-AATTGTCCTGTAATGCCCAGCTCACCAA- (SEQ ID NO. 719) GCATGGCTGGTGGCCGGGGCGGTGAAGCCGGCGTCTGCGGCACCGTCCAACTC-ATGTGGAT- GCCGGAATGGGGATGTCCGG-ACGGCGAATCCGTA- TTCGCTTGTCCCGTGAGGCCCAGGTGGATGGGGGGAAGGATC-TGGTGTCCGGGATGAT- ATGGGGCCGATGCCGCCGGTTGAAGTCCACTGGATCGGGAATTCGGGAATCGTGAT-CCGACGTTCAGGCCGAAC Clone X0019 ::::::::::::::X0019SP6.seq:::::::::::::: CTAACGGAATGAAAGCCCTGGTGGCCGT- (SEQ ID NO. 720) TCGGCGGTGGCCGTCGTCGCACTGCTCGGTGTATCTTCCGCCCAAGCTGATCCCGAGGCGGATCCCCGCGCAGCTGA GGCCAACTATGGTGGCCCCCCAAGTTCCCCACGTCTTGTCGATCACACCGAATGGGCGCA- TGGGGAATTCTGCCCAGCCTCCGGGTCTACCCGTCCCAAGTTGGGCGTACA- CCTCCCGCCGCCTCGGGATGGCCGCTGCCGACCCGGCCTGGGCC- AGGTTCTCGCGCTGTCACCGGAAGCCGACACTGCCGGC ::::::::::::::X0019T7.seq:::::::::::::: CCGCGGGACAC-CCTC- (SEQ ID NO. 721) ATGCTGCCGCCATGGACGCGGTCGAACGCAAGCAGCTGATCGAGCTACAACGCCGCGCGGAACGCTTCCGCCGCGGG CGTGACCGCATCCCGTTGACCGGGCGGATCGCGGTGATCGTCGATGACGGCATCGCCACCGGAGCGACGGCCAAGGC GGCGTGCCAGGTCGCCCGGGCGCACGGTGCGGACAAGGTGGTGCTGGCGGTCCCGATCGGCCCA- ACGACATCGTGGCGAAGATTCGCCGGGTACGCCGATGATGTGGTGTGTTTGGCGACGCCGGCGTTGT Clone X0020 ::::::::::::::X0020T7.seq:::::::::::::: CTCTGGGACCGGCCACGGTGCC- (SEQ ID NO. 722) CCGGCGTTCCCGGACGTGCTGCGCCAGGTGTCCGGCGGCCGCGTGCATGGTGTTCCCGGATCGCCCGCTGGCCAGAG CCCACCGGTGAATCTGGCGCCTGGCCGACCACCGTGCGCCGTAGGCTTGCGATCGTGCAGCGCTGGCGTGGCCAGGA CGAGATCCCGACGGATTGGGGCAGATGCGTGCTCACCATCGGGGTATTTGACGGCGTGCACCGCGGGCACGCCGAAC TGATCGCGCACGCGGTCAAAGGCGGC Clone X0021 ::::::::::::::X0021SP6.seq:::::::::::::: AATACTCAAGCTTTCGTCAGTTCATTGCGCCAGCAGACCAACAA-AGCATCGGGACATACGGA- (SEQ ID NO. 723) TCAACTACCCGGCCAACGGTGATTTCTTGGCCGCCGCTGACGGCGCGAACGACGCCAGCGACCAC- TTCAGCAAATGGCCA-CGCGTGCCGGGCCACGAGGTTGGTGCTCGGCGGCTACTCCCAGGGTGCGGCCGTGATC- ACATC-TCACCGCCGCACCACTGCCCGGCCTCGGGTTCACGCAGCCGTTGCCGCCCGCAGCGGAC- ATCACATCGCCGCGATCGCCCTGTTCGGGAATCCCTCGGCCGCGCTGGCGGGCTGATTAAC ::::::::::::::X0021T7.seq:::::::::::::: TGCCGCGGATTTGGCTGGCTGCCCAATATTCAGAATCGGGCCTTTCTTTTTGCGCGACAATAAGGTCACAGTAAACC (SEQ ID NO. 724) CTCGTTTTGTGAGATGCGGGGCGGGCCGGGCGAA- TCGACCTCGAGTGAATGGATCTCGAGTGAATGGACAGGGCATCGCCTACGAGTCGCATCCCCATCCAACAGACCGGT GCTCTTGCATCGGACCCTGAAGGTCCCGCACGGAGGGTGTGGTTGCCGGCGCGGGCTCACGGTGCGGTAGCGACGTA GTGTTTGAACGAATTTCTTGATGCTCCAACCTGTTTGGTGTTCAATCCAGTTCT Clone X0175 .....X0175SP6..... AA-CTTGCGCGCTCGGCCGGGTC-AGCATCCAGCTGCTCGGCAAGAGGCCAGCTAC-C- (SEQ ID NO. 725) TCGCTGCGTATGCCCAGCGGTGAGATCCGCCGGGTC- ACGTCCGCTGCCGCGCGACCGTCGGCGAAGTGGGCAATGCCGAGCAGGCAAACATCAACTGGGGCAAGGCCGGTCGG ATGCGGTGGAAGGGCAAGCGCCCGTCGGTCCGGGGCGTGGTGAT-AACCCGGTC- ACCACCCGCACGGCGGTGGTGAGGGTAAAACCTCCGGCGGCCGTCACCCGGTTAGCCCGTGGGGCAA .....X0175T7..... A-TCGAAAGTGACCATCTCTACCTTGAGTGCCATACCGCCCGACCCTATGCCTCGGATAGCTCGGCGGAAAGAAACG (SEQ ID NO. 726) CTTGCAGTGCCGCCGAATAGGCGGCTACGTCGTGAGCGCCCATCAACTCTCGCGCGGAGTGCATCGCCAGCTGGGCC GCGCCGACGTCGACCGTGGGGATTCCGGTGCGCGCCGCGGCCAACGGCCCGATCGTCGACCCGCACGGCAGATCGGC GCGATGTTCGTAACGCTGCATAGGCACTCCCGCGCGCTGGCAGGCCAGTGCGAACGCCGCCGCGGTGCGTCCG REFERENCES Altschul, S. F., W. Gish, W. Miller, E. W. Myers, and D. J. Lipman. 1990. Basic local alignment search tool. J. Mol. Biol. 215:403-10. Balasubramanian, V., M. S. Pavelka, Jr., S. S. Bardarov, J. Martin, T. R. Weisbrod, R. A. McAdam, B. R. Bloom, and W. R. Jacobs, Jr. 1996. Allelic exchange in Mycobacterium tuberculosis with long linear recombination substrates. J. Bacteriol. 178:273-279. Baranv F., 1991, Proc. Natl. Acad. Sci. USA, 88:189-193. Bensimon, A., A. Simon, A. Chiffaudel, V. Croquette, F. Heslot, and D. Bensimon. 1994. Alignment and sensitive detection of DNA by a moving interface. Science. 265:2096-2098. Bergh, S., and S. T. Cole. 1994. MycDB: an integrated mycobacterial database. Mol. Microbiol. 12:517-534. Birnboim, H. C. and J. Doly. 1979. A rapid alkaline extraction procedure for screening recombinant plasmid DNA. Nucleic Acids Res. 7:1513-1523. Burg J. L. et al., 1996, Mol. and Cell. Probes, 10:257-271. Cai, L., J. F. Taylor, R. A. Wing, D. S. Gallagher, S. S. Woo, and S. K. Davis. 1995. Construction and characterization of a bovine bacterial artificial chromosome library. Genomics. 29:413-425. Canard, B., and S. T. Cole. 1989. Genome organization of the anaerobic pathogen Clostridium perfringens. Proc. Natl. Acad. Sci. USA 86:6676-6680. Chu B. C. F. et al., 1986, Nucleic Acids Res., 14:5591-5603. Chuang S. et al., 1993. Global regulation of gene expression in Escherichia coli. J. Bact., 175(7): 2026-2036. Chuang, S., D. L. Daniels, and F. R. Blattner. 1993. Global regulation of gene expression in Escherichia coli. J. Bacteriol. 175:2026-2036. Cole, S. T., R. Brosch, K. Eiglmeier, T. Garnier, S. V. Gordon, C. Churcher, D. Harris, K. Badcock, D. Basham, D. Brown, T. Chillingworth, R. Connor, R. Davies, K. Devlin, T. Feltwell, S. Holroyd, S. Gentles, K. Jagels, J. McLean, S. Moule, L. Murphy, K. Oliver, J. Osborne, J. Parkhill, M. Quail, M-A. Rajandream, J. Rogers, S. Rutter, K. Seeger, J. Skelton, R. Squares, S. Squares, J. Sulston, K. Taylor, S. Whitehead and B. G. Barrell. 1997. Genome Sequence of Mycobacterium tuberculosis H37Rv. Microbial Comparative Genomics, 2:174. Collins, D. M., and D. M. Stephens. 1991. Identification of an insertion sequence, IS1081, in Mycobacterium bovis. FEMS Microbiol. Lett. 67:11-15. Cousins D. et al., 1998, 36(1): 168-170. De Wit D. et al., 1990, J. Clin. Microbiol., 28: 2437-2441. Dear, S., and R. A. Staden. 1991. Sequence assembly and editing program for the efficient management of large projects. Nucleic Acids Res. 19:3907-3911. Duck P. et al., 1990, Biotechniques, 9:142-147. Guateli J. C. et al., 1990, Proc. Natl. Acad. Sci. USA, 87:1874-1878. Kievitis T. et al., 1991, J. Virol. Methods, 35:273-286. Kim, U. J., B. W. Birren, T. Slepak, V. Mancino, C. Boysen, H. L. Kang, M. J. Simon, and H. Shizuya. 1996. Construction and characterization of a human bacterial artificial chromosome library. Genomics. 34:213-218. Kwoh D. Y. et al., 1989, Proc. Natl. Acad. Sci. USA, 86:1173-1177. Landegren U. et al., 1988, Science, 241:1077-1080. Liu, Y. G., and R. F. Whittier. 1995. Thermal asymmetric interlaced PCR: automatable amplification and sequencing of insert end fragments from P1 and YAC clones for chromosome walking. Genomics. 25:674-681. Lizardi P. M. et al., 1988, Bio/technology, 6:1197-1202. Matthews J. A et al., 1988, Anal. Biochem., 169:1-25. Michalet, X., R. Ekong, F. Fougerousse, S. Rousseaux, C. Schurra, N. Hornigold, M. Vanslegtenhorst, J. Wolfe, S. Povey, J. S. Beckmann, and A. Bensimon. 1997. Dynamic molecular combing—stretching the whole human genome for high-resolution studies. Science. 277:1518-1523. Misumi, D. J., D. L. Nagle, S. H. McGrail, B. J. Dussault, Jr., J. S. Smutko, H. Chen, O. Charlat, G. M. Duyk, C. Ebeling, L. Baldini, G. A. Carlson, and K. J. Moore. 1997. The physical and genetic map surrounding the Lyst gene on mouse chromosome. Genomics. 40:147-150. Pavelka, M. S., Jr., and W. R. Jacobs, Jr. 1996. Biosynthesis of diarninopimelate, the precursor of lysine and a component of peptidoglycan, is an essential function of Mycobacterium smegmatis. J. Bacteriol. 178:6496-6507. Philipp, W. J., S. Nair, G. Guglielmi, M. Lagranderie, B. Gicquel, and S. T. Cole. 1996a. Physical mapping of Mycobacterium bovis BCG pasteur reveals differences from the genome map of Mycobacterium tuberculosis H37Rv and from M. bovis. Microbiology. 142:3135-3145. Philipp, W. J., S. Poulet, K. Eiglmeier, L. Pascopella, V. Balasubramanian, B. Heym, S. Bergh, B. R. Bloom, W. R. Jacobs, Jr., and S. T. Cole. 1996b. An integrated map of the genome of the tubercle bacillus, Mycobacterium tuberculosis H37Rv, and comparison with Mycobacterium leprae. Proc. Natl. Acad. Sci. USA. 93:3132-3137. Poulet S. et al., 1995, Arch. Microbiol., 163 : 87-95. Ross B C, 1992, J. Clin. Microbiol., 30 : 942-946. Sambrook, J., E. F. Fritsch, and T. Maniatis. 1989. Molecular cloning: a laboratory manual, 2nd ed. Cold Spring Harbor Laboratory, NY: Cold Spring Harbor. N.Y. Sanchez-Pescador R., 1988, J. Clin. Microbiol., 26(10):1934-1938. Segev D., 1992, in <<Non-radioactive Labeling and Detection of Biomolecules>>. Kessler C. Springer Verlag, Berlin, N.Y., 197-205. Sheng, Y., V. Mancino, and B. Birren. 1995. Transformation of Escherichia coli with large DNA molecules by electroporation. Nucleic Acids Res. 23:1990-1996. Shinnick T. M. et al., 1987, J. Bact., 169(3): 108-1088. Shizuya, H., B. Birren, U. J. Kim, V. Mancino, T. Slepak, Y. Tachiiri, and M. Simon. 1992. Cloning and stable maintenance of 300-kilobase-pair fragments of human DNA in Escherichia coli using an F-factor-based vector. Proc. Natl. Acad. Sci. USA. 89:8794-8797. Spargo C. A. et al., 1996, Mol. and Cell. Probes, 10:247-256. Stone B. B. et al., 1996, Mol. and Cell. Probes, 10:359-370. Trieselman B. A. et al., 1992. Transcriptionally active regions in the genome of the archaebacterium Haloferax volcanii. J. Bact., 174 : 30-34. Trieselmann, B. A., and R. L. Charlebois. 1992. Transcriptionally active regions in the genome of the archaebacterium Haloferax volcanii. J. Bacteriol. 174:30-34. Urdea M. S. et al., 1991, Nucleic Acids Symp. Ser., 24:197-200. Urdea M. S., 1988, Nucleic Acids Research, 11: 4937-4957. Van Soolingen D., 1993, J. Clin. Microbiol., 31: 1987-1995. Willets, N., and R. Skurray. 1987. Structure and function of the F-factor and mechanism of conjugation. In Escherichia coli and Salmonella Typhimurium:Cellular and Molecular Biology (F. C. Neidhardt, Ed) Vol. 2 pp 1110-1133, Am. Soc. Microbiol., Washington, D.C. Woo, S. S., J. Jiang, B. S. Gill, A. H. Paterson, and R. A. Wing. 1994. Construction and characterization of a bacterial artificial chromosome library of Sorghum bicolor. Nucleic Acids Res 22:4922-4931. Zimmer, R., and A. M. V. Gibbins. 1997. Construction and characterization of a large-fragment chicken bacterial artificial chromosome library. Genomics. 42:217-226.
<SOH> I. BACKGROUND OF THE INVENTION <EOH>The present invention pertains to a method for isolating a polynucleotide of interest that is present in the genome of a mycobacterium strain and/or is expressed by said mycobacterium strain and that is absent or altered in the genome of a different mycobacterium strain and/or is not expressed in said different mycobacterium strain, said method comprising the use of at least one clone belonging to a genomic DNA library of a given mycobacterium strain, said DNA library being cloned in a bacterial artificial chromosome (BAC). The invention concerns also polynucleotides identified by the above method, as well as detection methods for mycobacteria, particularly Mycobacterium tuberculosis, and kits using said polynucleotides as primers or probes. Finally, the invention deals with BAC-based mycobacterium DNA libraries used in the method according to the invention and particularly BAC-based Mycobacterium tuberculosis and Mycobacterium bovis BCG DNA libraries. Radical measures are required to prevent the grim predictions of the World Health Organisation for the evolution of the global tuberculosis epidemic in the next century becoming a tragic reality. The powerful combination of genomics and bioinformatics is providing a wealth of information about the etiologic agent, Mycobacterium tuberculosis, that will facilitate the conception and development of new therapies. The start point for genome sequencing was the integrated map of the 4.4 Mb circular chromosome of the widely-used, virulent reference strain, M. tuberculosis H37Rv and appropriate cosmids were subjected to systematic shotgun sequence analysis at the Sanger Centre. Cosmid clones (Balasubramanian et al., 1996; Pavelka et al., 1996) have played a crucial role in the M. tuberculosis H37Rv genome sequencing project. However, problems such as under-representation of certain regions of the chromosome, unstable inserts and the relatively small insert size complicated the production of a comprehensive set of canonical cosmids representing the entire genome.
<SOH> II. SUMMARY OF THE INVENTION <EOH>In order to avoid the numerous technical constraints encountered in the state of the art, as described hereabove, when using genomic mycobacterial DNA libraries constructed in cosmid clones, the inventors have attempted to realize genomic mycobacterial DNA libraries in an alternative type of vectors, namely Bacterial Artificial Chromosome (SAC) vectors. The success of this approach depended on whether the resulting BAC clones could maintain large mycobacterial DNA inserts. There are various reports describing the successful construction of a BAC library for eucaryotic organisms (Cai et al., 1995; Kim et al., 1996; Misumi et al., 1997; Woo et al., 1994; Zimmer et al., 1997) where inserts up to 725 kb (Zimmer et al., 1997) were cloned and stably maintained in the E. coli host strain. Here, it is shown that, surprisingly, the BAC system can also be used for mycobacterial DNA, as 70% of the clones contained inserts in the size of 25 to 104 kb. This is the first time that bacterial, and specifically mycobacterial, DNA is cloned in such BAC vectors. In an attempt to obtain complete coverage of the genome with a minimal overlapping set of clones, a Bacterial Artificial Chromosome (SAC) library of M. tuberculosis was constructed, using the vector pBeloBAC11 (Kim et al., 1996) which combines a simple phenotypic screen for recombinant clones with the stable propagation of large inserts (Shizuya et al., 1992). The BAC cloning system is based on the E. coli F-factor, whose replication is strictly controlled and thus ensures stable maintenance of large constructs (Willets et al., 1987). BACs have been widely used for cloning of DNA from various eucaryotic species (Cai et al., 1995; Kim et al., 1996; Misumi et al., 1997; Woo et al., 1994; Zimmer et al., 1997). In contrast, to our knowledge this report describes the first attempt to use the BAC system for cloning bacterial DNA. A central advantage of the BAC cloning system over cosmid vectors used in prior art is that the F-plasmid is present in only one or a maximum of two copies per cell, reducing the potential for recombination between DNA fragments and, more importantly, avoiding the lethal overexpression of cloned bacterial genes. However, the presence of the BAC as just a single copy means that plasmid DNA has to be extracted from a large volume of culture to obtain sufficient DNA for sequencing and it is described here in the examples a simplified protocol to achieve this. Further, the stability and fidelity of maintenance of the clones in the BAC library represent ideal characteristics for the identification of genomic differences possibly responsible for phenotypic variations in different mycobacterial species. As it will be shown herein, BACs can be allied with conventional hybridization techniques for refined analyses of genomes and transcriptional activity from different mycobacterial species. Having established a reliable procedure to screen for genomic polymorphisms, it is now possible to conduct these comparisons on a more systematic basis than in prior art using representative BACs throughout the chromosome and genomic DNA from a variety of mycobacterial species. As another approach to display genomic polymorphisms, the inventors have also started to use selected H37Rv BACs for “molecular combing” experiments in combination with fluorescent in situ hybridization (Bensimon et al., 1994; Michalet et al., 1997). With such techniques the one skilled in the art is enabled to explore the genome of mycobacteria in general and of M. tuberculosis in particular for further polymorphic regions. The availability of BAC-based genomic mycobacterial DNA libraries constructed by the inventors have allowed them to design methods and means both useful to identify genomic regions of interest of pathogenic mycobacteria, such as Mycobacterium tuberculosis, that have no counterpart in the corresponding non-pathogenic strains, such as Mycobacterium bovis BCG, and useful to detect the presence of polynucleotides belonging to a specific mycobacterium strain in a biological sample. By a biological sample according to the present invention, it is notably intended a biological fluid, such as plasma, blood, urine or saliva, or a tissue, such as a biopsy. Thus, a first object of the invention consists of a method for isolating a polynucleotide of interest that is present in the genome of a mycobacterium strain and/or is expressed by said mycobacterium strain and that is absent or altered in the genome of a different mycobacterium strain and/or is not expressed in said different mycobacterium strain, said method comprising the use of at least one clone belonging to a genomic DNA library of a given mycobacterium strain, said DNA library being cloned in a bacterial artificial chromosome (BAC). The invention is also directed to a polynucleotide of interest that has been isolated according to the above method and in particular a polynucleotide containing one or several Open Reading Frames (ORFs), for example ORFs encoding either a polypeptide involved in the pathogenicity of a mycobacterium strain or ORFs encoding Polymorphic Glycine Rich Sequences (PGRS). Such polynucleotides of interest may serve as probes or primers in order to detect the presence of a specific mycobacterium strain in a biological sample or to detect the expression of specific genes in a particular mycobacterial strain of interest. The BAC-based genomic mycobacterial DNA libraries generated by the present inventors are also part of the invention, as well as each of the recombinant BAC clones and the DNA insert contained in each of said recombinant BAC clones. The invention also pertains to methods and kits for detecting a specific mycobacterium in a biological sample using either at least one recombinant BAC clone or at least one polynucleotide according to the invention, as well as to methods and kits to detect the expression of one or several specific genes of a given mycobacterial strain present in a biological sample.
20040318
20101130
20051110
64611.0
0
HA, JULIE
METHOD FOR ISOLATING A POLYNUCLEOTIDE OF INTEREST FROM THE GENOME OF A MYCOBACTERIUM USING A BAC-BASED DNA LIBRARY. APPLICATION TO THE DETECTION OF MYCOBACTERIA
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,803,024
ACCEPTED
Method and apparatus for storage network management
A managed network storage apparatus comprising a plurality of storage service management devices, a storage device, a multi protocol label switching network and a plurality of client groups performs a label distribution method that insures that clients and service providers are provided with network Quality of Service, storage performance, and network security. A network management device calculates alternative best routes for the data in order to satisfy the Quality of Service parameters and the storage performance requirements.
1. In a storage system having a plurality of interface ports and a plurality of logical devices, wherein the interface ports are connected to a multiple protocol label switching (MPLS) network and the interface ports are formed to conduct MPLS protocol, a method of establishing a path between a logical device and a client connected to the MPLS network, comprising: selecting an interface port from among the plurality of interface ports; establishing a label switching path via the selected interface port to a client having a requested bandwidth; setting a service priority of the selected interface port to the client in response to the requested bandwidth; and operatively connecting at least one logical device selected from the plurality of the logical devices to the selected interface port. 2. The method of claim 1, wherein said step of selecting the interface port from among the plurality of interface ports includes selecting the interface port based on a bandwidth characteristic of the interface port. 3. The method of claim 2, wherein said step of establishing a label switching path between the selected interface port and the client having a requested bandwidth includes establishing the label switch path based on performance characteristics of the label switch path and matching the bandwidth characteristic of the selected interface port with the performance characteristic of the label switch path. 4. The method of claim 1, wherein said step of establishing a label switching path between the selected interface port and the client having a requested bandwidth includes establishing the label switch path based on performance characteristics of the label switch path. 5. In a storage system having a plurality of interface ports and a plurality of logical devices, wherein the interface ports are connected to a multiple protocol label switching (MPLS) network and the interface ports are formed to conduct MPLS protocol, a method of establishing a path between a logical device and a client connected to the MPLS network, comprising: selecting an interface port from among the plurality of ports; requesting a management server connected to the MPLS network to establish a label switching path between the selected interface port and a client having a requested bandwidth; establishing the label switching path between the selected interface port and the client with the requested bandwidth in response to said requesting step; setting a service priority of the selected interface port with respect to the client in response to the requested bandwidth; and attaching at least one of the plurality of logical devices to the selected interface port. 6. The method of claim 5, wherein said step of selecting the interface port from among the plurality of interface ports includes selecting the interface port based on a bandwidth characteristic of the interface port. 7. The method of claim 6, wherein said step of requesting a management server connected to the MPLS network to establish a label switching path between the selected interface port and a client having a requested bandwidth includes determining performance characteristic of the label switch path to be established and matching the bandwidth characteristic of the selected interface port with the performance characteristic of the label switch path. 8. The method of claim 5, wherein said step of establishing a label switching path between the selected interface port and the client having a requested bandwidth includes establishing the label switch path based on performance characteristics of the label switch path. 9. A storage system, comprising: a plurality of interface ports coupled to a multiple protocol label switching (MPLS) network, each of the interface ports being formed to establish a label switching path (LSP) to a client coupled to the MPLS network; and a plurality of logical devices formed to be operatively attachable to at least one of the plurality of interface ports. 10. The storage system of claim 9, wherein each of said plurality of interface ports includes a means for establishing a label switching path in response to a client having a requested bandwidth. 11. The storage system of claim 10, wherein each of said plurality of interface ports further includes means for setting a priority of service to the client with which the label switching path is established in response to the requested bandwidth. 12. The storage system of claim 9, further comprising: a management server operatively connected to the MPLS network, the management server including a means for establishing a label switching path between at least one of the plurality of interface ports and a client coupled to the MPLS network. 13. The storage system of claim 12, wherein said client has a requested bandwidth, and said management server further includes means for setting a priority of service to the client with which the label switching path is established in response to the requested bandwidth.
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention is related to a network management method and apparatus directed to providing security and performance guaranteed service to clients and service providers of storage networks. 2. Related Art Storage area networks, also called SANs, use Fibre Channel (FC) network platform technology. According to a presently widespread technology, SANs are used to maximize network performance by offloading storage from the server to a dedicated storage device accessed and accessible by the server. These devices (that can be RAID arrays, JBODs, tape drives) are located on the network. SANs are wide-ranging and very diverse. Depending on need, a SAN can range from a simple server-to-storage device connection, to a labyrinth of servers, hubs, switches, and storage devices in either a loop (hub) or across a fabric (switch). For example, the point-to-point “starter” SAN is a preferred choice for a home office, small office, or department. One of the greatest benefits a SAN offers is scalability. Unlike a small computer system interface (SCSI) connection, which only allows for the attachment of 15 nodes per bus, a SAN offers up to 16 million devices attached and running on a single network. For the currently running Fibre Channel SANs, upgrading is easy, and virtually limitless. Storage input/output requires high-speed data transfer, especially for the business application services. Fibre channel network platforms have provided that so far. But the appearance of applications such as Internet Protocol storage (IP), and more specifically of Internet Small Computer System Interface Protocol (iSCSI), or Internet Fibre Channel Protocol (iFCP), posses new challenges for SANs. IP SANs provide access from distances that prior were not available without compromising the Quality of Service parameters. The present invention is directed to methods and systems that aim to consistently provide network Quality of Service and storage performance for clients and service providers alike. SUMMARY OF THE INVENTION By employing the means and methods of the present invention network clients are able to access their storage via a Quality of Service guaranteed network path. At the same time, service providers can manage their Quality of Service more effectively. Service providers are able to manage clients by groups, such as IP subnets, very large area networks (VLANs) and others. Further, service providers can set up an end-to-end path between clients and storage devices while maintaining the consistency of Quality of Service and security. The present invention can be implemented with a managed network storage apparatus that allows service providers to attain network Quality of Service (QoS) and storage performance. The managed network storage apparatus comprises a plurality of storage service management servers, a storage device, a multi protocol label switching network (MPLS) operatively connected to the storage device, and a plurality of client groups functionally connected to the MPLS network. The plurality of storage service management servers is operatively connected to the storage device. The plurality of storage service management servers and the storage device are operatively connected by a storage device. The storage device and the MPLS network are operatively connected by a plurality of network paths. The MPLS network and the plurality of client groups are functionally connected by a plurality of network paths. The invention can also be implemented using a storage network with network management service. In this embodiment the network comprises a plurality of storage service management servers, a storage device, a multi protocol label switching (MPLS) network operatively connected to the storage device, a plurality of client groups functionally connected to the MPLS network, and a network management server simultaneously operationally connected to the plurality of storage service management servers and functionally connected with the storage device and to at least one of the plurality of client groups. The plurality of storage service management servers is operatively connected with the storage device. The plurality of storage service management servers and the storage device are operatively connected by a network path. The storage device and the MPLS network are operatively connected by a plurality of network paths. The MPLS network and the plurality of client groups are functionally connected by a plurality of network paths. The network management server is operationally connected with the plurality of storage service management devices by means of storage network management communication path. The network management server is functionally connected with the storage device by a network path. In a storage system having a plurality of ports and a plurality of logical devices, wherein the ports are connected via a MPLS network and the ports conduct MPLS protocol, a method for establishing a path between at least one logical device and a client connected to the MPLS network according to the invention comprises selecting a port of the ports; establishing, at the port, a label switching path (LSP) to the client with requesting bandwidth; setting priority or bandwidth of the port; and attaching the at least one logical device to the port. In a storage system having a plurality of ports and a plurality of logical devices, wherein the ports are connected via a MPLS network and the ports conduct MPLS protocol, a method for establishing a path between at least one logical device and a client connected to the MPLS network according to the invention comprises selecting a port of the ports; requesting from the port to a management server connected to the MPLS network, establishment of a label switching path to the port with requesting bandwidth; establishing at the port a LSP to the client with requesting bandwidth; setting priority or bandwidth of the port; and attaching the at least one logical device to the port. A storage system of the invention comprises a plurality of ports coupled to a MPLS network, the ports with capability of establishing a LSP to a client coupled to the MPLS network; and a plurality of logical devices to be attached to at least one of the plurality of ports. Establishing a label switching table involves issuing network path information with quality parameters, sending at least one path setup request to at least one of a plurality of label switch routers, distributing at least a label generated by the at least one of a plurality of label switch routers, and establishing the label switching table. The network path information is issued by at least one of a plurality of storage service management devices to a penultimate label switch router of a plurality of label switch routers. Retrieving data comprises receiving data from at least one of a plurality of client groups, transferring the data via at least one of a plurality of label switching tables each pertaining to a plurality of label switch routers, writing the data into a storage device, generating a signal that indicates successful receipt of data by said storage device, and transferring the signal to at least one of the plurality of client groups. Transferring retrieved data to at least one of a plurality of clients, and releasing a label switching table entails sending a label switching table release request to an ultimate label switch router, transferring the request to at least one of a plurality of label switch routers, and releasing the retrieved data from a label switching table. The transfer occurs in reverse from the ultimate label switch router, in a single-step transfer between successive label switch routers. The method of using the managed network storage apparatus with network management service further comprises the steps of sending a request from a storage management device to a network service management device, calculating a network route to satisfy the QoS parameters, sending a path setup request to a storage device, sending a path setup request to at least one of a plurality of label switch routers, establishing a label switching table, and updating status information for a virtual private network based on said label switching table. The request consists of identifying a network route based on the QoS parameters. The path setup request originates from the network service management device. BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES The present invention will be described hereinbelow with reference to the accompanying drawings. FIG. 1A is a high-level block diagram of a managed network storage apparatus, in accordance with the invention. FIG. 1B illustrates the managed network storage apparatus of FIG. 1A, in accordance with an aspect of the present invention. FIG. 2 illustrates an example method flowchart for using an apparatus for storage network management, in accordance with an aspect of the present invention. FIG. 3 illustrates another example method flowchart for using an apparatus for storage network management, in accordance with another aspect of the present invention. FIG. 4 illustrates an example of a data structure for the storage service level agreement definition table. FIG. 5 illustrates an example storage network interface that has the capability to establish the label switching path. FIG. 6A is a high-level block diagram of an apparatus for storage network management with network management service. FIG. 6B illustrates an apparatus for storage network management with network management service of FIG. 6A, in accordance with an aspect of the invention. FIG. 7A illustrates a sequence of an example method flowchart for using an apparatus for storage network management, in accordance with an aspect of the invention, to set a label switching table using a network management service. FIGS. 7B and 7C illustrate another sequence for the example method flowchart for using an apparatus for storage network management, in accordance with another aspect of the invention, for purposes of setting a label switching table using a network management service. FIG. 8 illustrates an example of data structure for the topology map of the network service management element. FIG. 9 illustrates status information for the virtual private network of the network service management element. FIG. 10 illustrates an example of network that provides storage service without the capability to establish a Label Switching Path. FIG. 11 illustrates an example of network that provides storage service with the capability to establish a Label Switching Path. FIG. 12 illustrates an example computer system in which the storage service management block can be implemented, in accordance with an aspect of the present invention. FIG. 13 illustrates an implementation in computer readable code for the present invention. DETAILED DESCRIPTION OF THE INVENTION The present invention is directed to storage devices and, more particularly, to storage devices that have label switching capability on a network interface. The present invention is also directed to networked storage devices and, more particularly, to storage devices that do not possess label switching capability. In this aspect of the invention, a port bandwidth controller insures the network QoS consistency, between networked label switching ports and the storage port. The present invention is directed to networked storage systems and, more particularly to storage systems that have the capability of establishing a label switching path between the network client groups and the storage system. The present invention is directed to networked storage devices and, more particularly, to storage devices that are managed by a management server. The label switching path established between the network client groups and the storage system is both network quality and network security guaranteed, as defined by the storage service management server. The present invention is described herein in relation to storage area networks (SAN) that are accessed by clients or by service providers interested in receiving, providing and maintaining QoS, security of service and storage performance. The present invention is not, however, limited to use within SANs. Based on the description herein, one skilled in the relevant art(s) will understand that the invention can be implemented in other environments as well. Such implementations are within the spirit and scope of the invention as disclosed and claimed. The apparatus that constitutes the object of the present invention and its various embodiments allows service providers to practice a method that permits them to provide consistent guaranteed QoS storage services, which constitutes another object of the present invention. Among other benefits that arise from practicing the present invention, clients or client group can access their storage volume via a QoS guaranteed network path; service providers can manage their clients by groups, such as Internet Protocol subnets, Very Large Array Network (VLAN) groups, etc.; service providers can set-up an end-to-end path between clients and logical storage devices and concurrently maintain the QoS parameters and security of service requirements; and the MPLS based network can transfer data for distances that are beyond the physical limitations imposed by the fibre channel networks. EXAMPLE APPARATUS EMBODIMENTS FIG. 1A is a high-level block diagram of a managed network storage apparatus, in accordance with the present invention. The managed network storage apparatus 100 can be implemented in hardware, software and/or a combination thereof. The managed network storage apparatus 100 includes a plurality of storage service management devices 101, a storage device 102, a multi protocol label switching (MPLS) network 103, and a plurality of client groups 104. The plurality of storage service management devices 101 and the storage device 102 are operatively connected. They exchange data through a bi-directional data storage/logical device path 110 and a bi-directional data storage/MPLS Path Management path 112. The storage device 102 and the MPLS network 103 are operatively connected by at least one network path 114. The MPLS network 103 and the client group section 104 are functionally connected by a plurality of network output paths 116. FIG. 1B illustrates an example implementation of the managed network storage apparatus of FIG. 1A, in accordance with one aspect of the present invention. The plurality of storage service management devices 101 may be implemented using general purpose PC hardware or other data processing system as would be understood by one of skill in the art given this disclosure of the invention. An example of such PC hardware will be further described in connection with FIG. 12. As shown in FIG. 1B, according to an embodiment of the present invention, each of the plurality of storage service management devices 101 comprises at least one Service Level Agreement (SLA) management console 101.2 and one storage SLA definition element for the SLA definition table 101.4. The SLA management console 101.2 and the storage SLA definition element for the SLA definition table 101.4 are operatively connected by a command/release path 101.6. A user interface program runs on the operating system installed on a general purpose PC or other similar device that constitutes the hardware implementation basis for the plurality of storage service management devices 101. The user interface program is the software implementation basis for the SLA management console 101.2. The storage for the SLA definition table 101.4 is a data depository. One of the functions of the SLA management console 101.2 is to maintain the data stored by the storage SLA definition table, and at the same time to operationally manage the data through the command/release path 101.6. According to FIG. 4, the storage for the SLA definition table 101.4 stores the following data parameters: client's address 402, service class 404, disk storage resource (LDEV) ID 406, port number 408, label switching table ID (LSP ID) 410, and direction 412. The parameter service class 404 is defined depending on the parameter bandwidth 414. Further information about the above-mentioned parameters will be discussed hereinbelow and in connection with FIG. 4. An external agent, operator or device manually manages the LSP ID 410 and releases commands via SLA Management console 101.2. The managed network storage apparatus 100 further includes a storage device 102. The storage device 102 of the managed network storage apparatus 100 is a disk storage array. An example implementation for the storage device 102 is a redundant array of independent disks (RAID) sub-system. Referring back to FIG. 1B, at least one storage service management device of the plurality of service management devices 101 is operatively connected to the storage device 102 by means of two bi-directional paths, a data storage/MPLS Path Management data path 112 and a storage/logical device data path 110. More precisely, the bi-directional data storage/logical device data path 110 operatively connects the storage for the SLA definition table 101.4 to an array of logical devices 102.6. Each logical device of the array of logical devices 102.6 is provided, through an active data path 118, with access to the MPLS network 103 by means of an assigned network interface 108. In one embodiment of the present invention, each network interface 108 incorporates and maintains predetermined volume mapping on the corresponding logical devices assigned to it. A storage path management element 102.2 of the storage device 102 stores and operates a storage path management program that is responsible for maintaining the predetermined volume mapping on each network interface 108. In the case of this example RAID subsystem implementation, a predetermined minimum number of logical devices or volumes must be available in order to be assigned to and activate a network interface 108. Concurrently, the storage path management program stored by the storage path management element 102.2 controls a security function for the logical units (LUN) that address the data provided through the network 103 from the storage device 102. Currently, there are four approaches to providing LUN security: (i) host software, (ii) host bus adapter utilities, (iii) switch zoning, and (iv) mapping within a storage controller. All four of the above mentioned approaches are discussed in the paper: LUN Security Considerations for Storage Area Networks by Hu Yoshida, Hitachi Data Systems, (HYPERLINK http://www.hds.com), which is hereby incorporated herein by reference. The storage path management program allows volumes of data transmitted through the MPLS network to be masked from unauthorized access. The MPLS Path Management element 102.10 is bi-directionally, operatively connected to the storage service management devices 101 for the SLA definition table 101.4. Element 102.10 stores a Network Path Quality Controller program. This program controls the parameters of a network path assigned to a network interface 108. Each of the plurality of network interfaces 108 is operatively connected to the MPLS Path Management element 102.10 through path 124. Among the controlled parameters are control bandwidth, route, etc. Each of the plurality of network interfaces 108 of storage device 102 is operatively connected with a network I/F Quality controller 102.4 through link 122. Further, each of the network interfaces 108 of the storage device 102 is operatively connected with corresponding devices among the array of logical devices 102.6 through link 118, with the MPLS Path Management element 102.10 through link 124 and with the network I/F quality controller element 102.4 through link 122. In one example embodiment of the invention, the network interface 108 is implemented with label switching and LSP management capabilities. In another example embodiment of the invention, the network interface 108 is implemented with a port priority control function. For example, U.S. Patent Application Publication 2002/0003891 A1, published on Jan. 10, 2002, to Hoshino S., describes such an interface. For both embodiments mentioned above, the Network I/F Quality Controller program controls the network interface 108. Again with reference to FIG. 1B, the storage system 102 is operatively connected to the MPLS network 103 by a connection network path 114. The MPLS network 103 consists of a plurality of label switch routers 106A, 106B, . . . , 106n that are interconnected by paths 107. The MPLS network 103, in one embodiment may be implemented using a technology that allows transferring data packets via label switching paths 107 that are assigned to special traffic. The client groups 104 consist of a plurality of client groups 104A, 104B, 104C to 104n, and within each client group 104 are clients 105A, 105B, 105C to 105n. Specifically, each client group 104 consists of a set of clients 105 that can be subdivided, for purposes of better management, in subgroups. Examples of possible types of subgroups are: IP subnets, VLAN groups, groups selected according to the sites location, or groups selected according to a specific sets of logical parameters. In an example embodiment of this aspect of the invention and for illustrative purposes only, client group 104 is considered to be a single IP subnet. FIG. 4 which will be discussed hereinbelow further illustrates and defines the parameters that characterize, for this example implementation, the client 104. Under the same assumptions, client 105 is a client computer that issues an input/output request addressed to a storage array. The term of client computer is not intended to be used with any limitations. As one of skill in the art would understand, given this disclosure, a client 105 may be embodied in an iSCSI initiator or other similar devices/systems. As mentioned above, the managed storage network apparatus 100 is used for purposes of insuring QoS and security of service for clients and service providers. FIG. 2 illustrates an example method flowchart for using an apparatus for storage network management 100, in accordance with an aspect of the present invention. Label distribution method 200 consists of three main sequences: sequence A, including steps 201 to 204, that establishes a label switching table; sequence B, including steps 205 to 210, that transfers the data from the storage device to the client; and sequence C, including steps 211 to 213, that releases the label switching table. Sequence A of method 200 consists of steps 201, 202A, 202B, 203A, 203B, 204A, 204B and 204C. In operation, an external operator defines a new storage service request in the storage definition table 101.4. Subsequently, at least one of the plurality of storage service management devices 101 sends requests via paths 110 and 112 to both the storage path management block 102.2 and to the network path quality controller block 102.4. Storage service management device 101 issues network path information including the quality parameters (Step 201). The information is transmitted to the storage device 102, as described above. The storage device 102, more precisely the network path quality controller 102.4, sends a path setup request to a first label switch router via a network path 114 at Step 202 A. The path is set and its parameters defined from a network port to the client group with adaptive service regarding quality. The intrinsic parameters for the path are defined by the SLA definition table 101.4 and constitute part of the request made at Step 201. The path setup request is further transmitted to a subsequent label switch router, at Step 202B, via a label switching path 107. The path setup request is subsequently transmitted to LSRN, at Step 202B. LSRn returns the label at Step 203A, and at the same time this label becomes a part of a label switching table that is being established with the contribution of each LSR. Each LSR returns a label to the storage device via network path 114. A label switching table (LSP) is formed at any of Steps 204A-204C. Regarding the succession of steps of Sequence A, standard protocols are used to set the label switching table. Examples of such protocols are Label Distribution Protocol (LDP), Constrained Based Routing Using Label Distribution Protocol (CR-LDP) and Reservation Protocol Traffic Engineering (RSVP-TE). Sequence A of method 200 is an example of a downstream-on-demand mode for the label distribution method. This implementation assumes that the LSP is static and is set at the external operator demand. However, in an alternative implementation, LSP may be dynamic, when new data is requested. Sequence B of method 200 consists of Steps 205 to 210. At Step 205, the client or the client group, for example 104, issues a data request. In this implementation, the assumption that the client is an iSCSI initiator is still valid. Traditionally, iSCSIs use a SCSI protocol to transfer command messages over IP networks. Therefore, iSCSI clients customarily request block data transfers. The data request is transmitted to the storage device 102. At Step 206, data is read from a disk storage resource of the storage device 102, as requested. At the subsequent Step 207, the storage device 102 transfers the data from the network interface port that is connected to the LDEV, using the storage path 118. A label is pushed into the packet header to identify the label switching table. The label switching routers transfer the data via label switching tables. At the subsequent Step 208, data is received by the client. The client issues an acknowledgement of receipt at Step 210, that the data was successfully received; at Step 209, the acknowledgement is returned to the storage device 102. Sequence C of method 200 consists of Steps 211 to 213. The storage service management device 101 sends a LSP release request at Step 211 to be transmitted subsequently through the storage device to the LSRn. The request transfer constitutes Step 212. LSR1-n, release the LSP at Steps 213A-213C as the request is transferred to each of them. As a result, the label switch table is released by the network. The data transfer as described above has a guaranteed quality. The data is provided according to how it was defined by the label switch table. Therefore, the QoS parameters for the data provided through the managed network are guaranteed for the clients and for the service provides. The Label Distribution in method 200 is performed with the contribution of each individual element of the managed storage network apparatus 100. The plurality of storage service management elements 101 performs Step 201 by issuing a network path information with quality parameters. Element 101 also performs Step 211 when sending a LSP release request to the storage device 102. The storage device 102 performs a plurality of the steps of the method 200. A summary of the steps performed by the storage device 102 is provided below: Step 202A when sending a path setup request to LSR1; Step 204B when establishing a LSP; Step 206 when reading data from disk storage; Step 207A when transferring data via LSP; Step 209 when returning a signal that data was received successfully; Step 212A transferring the LSP release request; and Step 213A when releasing the LSP. The LSR designated number one (LSR1) also performs a plurality of the method steps. A summary of the steps performed by the LSRn is as follows: Step 202B when transferring a path setup request to a subsequent LSR; Step 203B when returning a label; Step 204B when establishing a LSP; Step 207B when transferring data via a LSP; Step 212B when transferring a LSP release request; and Step 213B when releasing the request. The LSR designated with the ultimo number (LSRn) in the MPSL network 103 performs a plurality of method steps. A summary of steps performed by the LSRn is presented below: Step 203A when returning a label; Step 204A when establishing a LSP; Step 207C when transferring data via LSP; and Step 213C when releasing the LSP. The plurality of client groups or clients 105A-105n also perform a plurality of steps. A summary of the steps performed by the clients or client groups are presented below: Step 205 when getting the data request; Step 208 when receiving data; and Step 210 when receiving a confirmation signal that the data was successfully received. The steps of the label distribution method 200 may be performed using the apparatus for storage network management 100, in different succession from the one illustrated in FIG. 2 and described above. FIG. 3 illustrates another example method flowchart for using a managed network storage apparatus, in accordance with another aspect of the present invention. The distribution method 300 consists of three main sequences: sequence A, including Steps 301 to 304, that establishes a label switching table; sequence B, including steps 305 to 309, that transfers the data from the storage device to the client, and sequence C, including steps 310 to 312, that releases the label switching table. When performing the succession of steps 300 it is assumed that the information output path 116 is unidirectional. According to this hypothesis, an individual information output path must be established from the client 104 or 105, to the storage device 102, in order to realize the upstream data transfer. Sequence A of method 300 consists of steps 301, 302A, 302B, 303A, 303B, 304A, 304B and 304C. An external operator defines a new storage service with parameters in the storage definition table 101.4. Subsequently, at least one of the plurality of storage service management devices 101 sends requests via paths 110 and 112 to both the storage path management block 102.2 and to the network path quality controller block 102.4. Storage service management device 101 issues network path information with quality parameters at Step 301. The storage device 102, more precisely the network path quality controller, sends a path setup request to an ultimate label switch router LSRn via a network path 114. The path is set and its parameters defined from a network port to the client group with adaptive service regarding quality. These intrinsic parameters of the path are defined by the SLA definition table 101.4 and constitute part of the request made at Step 301. The information is transmitted to the final or ultimate designated label switching router (LSRn) at Step 302A by sending a path setup request to the penultimate designated LSR (LSRn-1). From the ultimate label switching router LSRn, the setup request in forwarded in a reversed single step transfer to the LSR1 at Step 302B. The storage device 102 ultimately receives the transfer of path setup request. The storage device 102 returns a label at Step 303A and establishes a LSP, at Step 304A. The label is returned by the storage device at Step 303A, and is received by the first designated LSR1 at Step 303B. LSR1 then establishes a LSP at Step 304B. The above sequence repeats or continues identically for each LSR of the MPLS network 103 until, in step 304C, the last designated LSRn establishes a LSP. Regarding the succession of steps in sequence A of method 300, standard protocols are used to set the label switching table. Examples of such protocols are: Label Distribution Protocol (LDP), Constrained Based Routing Using Label Distribution Protocol (CR-LDP) and Reservation Protocol Traffic Engineering (RSVP-TE). Sequence B of method 300 consists of steps 305, 306A, 306B, 307, 308 and 309. At Step 305, the client or the client group, for example 104, issues data. In this implementation, the assumption that the client is a iSCSI initiator is again valid. Traditionally iSCSIs use a SCSI protocol to transfer command messages over IP networks. Therefore, iSCSi clients customarily request block data transfers. The data is transmitted to the storage device 102 via LSRs. In steps 306A to 306B, data is transmitted from the final or ultimate designated LSRn to the penultimate designated LSRn−1 and subsequently to each LSR, until it arrives at LSR1. From the LSR1, the data is transmitted to the storage disk. The data is written in the storage device at Step 307. The storage device generates and returns a signal indicating that the data was successfully received at Step 308. The client or client group that transmitted the data receives the signal at Step 309, that the data was successfully received by the storage device 102. Sequence C of method 300 consists of steps 310, 311A, 3111B, 312A, 312B to 312n. The storage service management 101 sends a LSP release request (Step 310) to be transmitted to the final or ultimate designated LSRn. LSRn releases the LSP at Step 312. The request transfer is forwarded step by step in reverse order, until it arrives at LSR1. Each LSR that receives the request releases the LSP at Steps 312B to 312n. Ultimately, LSR1 transfers the request to the storage device and the storage device releases the LSP at Step 312A. The label switching table is thus released by the network. As with the method 200, the data transfer has a guaranteed quality. The data is provided according to how it was defined by the label switch table, such that the QoS parameter for the data provided through the managed network is guaranteed for the clients and for the service provides. The Label Distribution Method 300 is performed with the contribution of each individual element of the managed storage network apparatus 100. The plurality of storage service management elements 101 performs Step 301 by issuing a network path information with quality parameters. Element 101 also performs Step 310 by sending a LSP release request to the final or ultimate designated LSRn. The storage device 102 performs a plurality of the method steps. A summary of the steps that are performed by the storage device 102 is provided below: Step 303A when returning a table; Step 304A when establishing an LSP for the storage device; Step 307 when writing data into the disk storage; Step 308 when returning an acknowledgement signal to the client that the storage device has successfully received the data; and Step 312A when releasing the LSP. LSR1 also performs a plurality of method steps. A summary of the steps that are performed by LSR1 is as follows: Step 302B when transferring a path setup request to the storage device; Step 303B when returning a label; Step 304B when establishing a LSP; Step 306B when transferring data via LSP; Step 311B when transferring a LSP release request; and Step 312B when releasing the LSP. LSRn in the MPSL network 103 performs the following method steps: Step 302A when sending a path setup request to LSRn−1; Step 304C when establishing a LSP; Step 306A when transferring data via LSP; Step 311A when transferring the request; and Step 312n when releasing the LSP. The plurality of clients performs the following steps: Step 305 when transferring the data request; and Step 309 when receiving a confirmation signal that the data was successfully received by the storage device. FIG. 4 illustrates an example of a data structure for the storage service level agreement definition table. The table stored by element 101.4 consists of data that sorted or classified according to the following parameters: client's address 402, service class 404, disk storage resource (LDEV) ID 406, port 408, label switching port ID 410, and direction 412. The service class parameter 404 is defined depending on the available bandwidth 414. The information contained by table 101.4 is predefined and inputted by external operators that use the SLA management console 101.2. The parameters comprised by table 101.4 are defined as follows: Parameter 402, Client Address, is a domain address that is assigned to each client or client group. This is the address the client uses for accessing the storage resource. As shown in the embodiment illustrated in FIG. 4, the client address parameter is able to represent the IP subnet address. The IP subnet address consists of 32 bits of a network IP address with subnet mask bit numbers. Parameter 404, service class, refers to a service profile. Each profile is defined according to the network's quality, and more precisely either according to the bandwidth of the storage device ports or on the network LSP path performance. Examples of service classes, such as bronze, silver, gold and their corresponding bandwidth values are shown in the table 414 of FIG. 4. Each service class is assigned a priority depending on its bandwidth. As an example, the service class gold is assigned the first priority, the service class silver is assigned the second priority and the service class bronze is assigned the third priority, as shown in table 416. As shown above in connection with FIG. 1, the performance of the storage ports of storage device 102 is managed through a storage path management element 102.2, and separately from the performance of network paths. As a result, the capability for the system described above to match the performance of the network path with the one of the network ports is provided. Parameter 406, disk storage resource ID (LDEV), is the storage resource ID that is provided to the client groups. Parameter 408, port, refers to the network interface ID on the storage device. The term port refers both to a physical port and a logical port. A parameter pair consisting of LDEV IDs 406 and a port 408 together define a storage internal path. Parameter 410, label switch table ID, represents the ID stored in the table field after the LSP has been set. After the LSP has been released, this table field is cleared. However, the information stored in other fields of table 101.4 can be kept for future use. Parameter 412, direction, indicates the direction of the data flow and the request flow. It can be either upstream or downstream. As an example of an entry in the table 414, for client address 10.1.2.0/24, the service provided is Silver that corresponds to a bandwidth of 1 Gb/sec; the IDs of storage disks are 000 and 001; the port used is 1; and the direction for the unidirectional LSP is down. FIG. 5 illustrates the embodiment of network 100 while providing storage services that are characterized by the above-mentioned example parameters. The storage device 102 handles the MPLS network 103 using the set A01 LSP. If the storage device is selected or designed to be capable of handling the MPLS, and the storage-network port is at least 1 Gb/sec capable, the LSP should be capable of reaching the network interface on the storage device. Based on such parameters, the quality guaranteed network path reaches the storage device. FIG. 6A is a high-level block diagram of an apparatus for storage network management with network management service, in accordance with another aspect of the invention. The managed network storage apparatus 600 may be implemented in hardware, software and/or a combination thereof. The managed network storage apparatus with network management service 600 includes a plurality of storage service management devices 101, a storage device 102, a multiprotocol label switching (MPLS) network 103, one or more client groups 104 and a network management device 601. The plurality of storage service management elements 101 and the storage device 102 are operatively connected in that they exchange data through a bi-directional data storage/logical device path 110 and a bi-directional data storage/port path 112. The storage device 102 and the MPLS network 103 are operatively connected by at least one port/router path 114. The MPLS network 103 and the client group section 104 are functionally connected by a plurality of information output paths 116. The network management device 601 is functionally connected to the storage device 102. The connection is realized through a bi-directional data storage/network management path 602. The network management device 601 is functionally connected to the client groups 104. An example implementation of the above-described apparatus 600 is shown by FIG. 6B. FIG. 6B illustrates the apparatus for storage network management with network management service of FIG. 6A, in accordance with another aspect of the present invention. The managed network storage apparatus 600 includes a plurality of storage service management devices 101. The plurality of storage service management devices 101 may be implemented using general purpose PC hardware or other similar devices or systems as would be understood by one of skill in the art given the disclosure of the invention. An example of such PC hardware will be further described in connection with FIG. 12. Elements 101, 102, 103, and 104 of network 600 have been previously described in connection with FIG. 1B. The description provided above for these elements applies also in connection with FIG. 6B. In addition, the managed network storage apparatus with network management service 600 comprises a network management device 601. The network management device 601 comprises a device 604 that stores the virtual private network (VPN) status information, an apparatus 606 for generating alternative route calculation, and a storage device 608 that stores the network topology map. Apparatus 606 is connected to both device 604 and device 608 by paths 610 and 612. respectively. The apparatus 606 is directionally connected with the network path quality controller 102.4 by a data storage/network management path 602. Device 608 interacts with network interfaces 108, LSD of MPLS network 103 and the client groups 104 through router/map data management paths. All other functional and operational connections among the elements of network 600 have been previously described in connection with network 100 and apply identically to network 600. As previously mentioned in connection with network 100, the network route of data through LSD is determined by traditional routing protocol. The quality controller element 102.4 stores a Network Path Quality Controller program. This program controls the parameters of the network path assigned to a network interface 108. The controlled parameters include controlled bandwidth, route, etc. The embodiment illustrated in FIG. 6B posses a network management device 601 that fulfills the function of route server. The external route server calculates routes and determines a preferable route for purposes of traffic engineering. FIG. 7A illustrates a sequence of an example method flowchart for using an apparatus for storage network management with network management service in accordance with another aspect of the present invention to set a label switching table. Label distribution method 700A consists of three main sequences. Sequence A, including steps 701 to 706 as shown, establishes a label switching set. Sequence B, that transfers the data from the storage device to the client; and sequence C, that releases the label switching table, both of which are not illustrated incorporate the same steps as those used in sequences B and C of method 200, which was previously described. According to FIG. 7A, an external operator defines a new set of storage service parameters in the storage definition table 101.4. Subsequently, at least one of the plurality of storage service management devices 101 sends requests to the network service management device 601. This is done with the purpose of determining a static route LSP. The storage service management devices send a request that contains information about the network port (source), the client (destination), and quality (bandwidth). Sending the request to determine the network route with QoS parameters constitutes Step 701 of method 700A. The route calculation program stored by the network management device 601, in device 606, calculates the route from the network port (source) to the client (destination). The calculated route satisfies the QoS (bandwidth) parameter. The route calculation algorithm depends on the network management server. Cisco's IOS Release 12.0(5)S: Multi Protocol Label Switching (MPLS) Traffic Engineering that is incorporated herein by reference, describes an example of traffic engineering that occurs in the environment referenced above. At this point, the network management device 601 must have completed the initialization of its topology mapping. This process and an example topology will be described further on in connection with FIG. 8. The calculation of a network route that satisfies the QoS parameters constitutes Step 702 of method 700A. The network service management device 601 sends a path setup request with the calculated route information to storage device 102 at Step 703. More precisely, the path setup request is forwarded to the network path quality controller 102.4. A standard protocol is used to deliver the network policy delivery request. Specifically, a Common Open Policy Service (COPS) protocol may be used. A full description of the techniques and mechanics of using this protocol for the above-mentioned purpose can be found in memo the COPS (Common Open Policy Service) Protocol by D. Durham et al., which is incorporated herein by reference. The storage device 102 sends a path setup request to the LSRs at Step 704. The LSRs receive the request and each LSR establishes an LSP. The storage device also establishes a LSP at Step 705. The established LSP is forwarded from the storage device to the network service management device 601. The network service management device updates the VPN status information stored by device 604 at Step 706. FIGS. 7B and 7C illustrate other sequences for the example method flowchart for using an apparatus for storage network management, in accordance with further aspects of the invention, to set a label switching table using a network management service. Label distribution methods 700B and 700C each also consist of three main sequences, among which sequence A, including steps 707 to 718 or steps 707 to 722, is illustrated in FIGS. 7B and 7C, respectively. Sequence B, that transfers the data from the storage device to the client; and sequence C, that releases the label switching table, for both methods 700B and 700C, both of which are also not illustrated incorporate the same steps as those used in sequences B and C of method 200, which was previously described. As illustrated in FIG. 7B, the storage service management device determines a network interface that is used for storage input/output by the clients. The storage service management device determines a logical storage device that is used for input/output by clients, at Step 707. Subsequently, at steps 708 and 709, the storage service management element sends a request to mount the logical device into the network interface selected at Step 707, and in actuality mounts the selected logical device into the network interface. From the storage device, an acknowledgement about the mounting of the logical device is returned to the storage service management device at Step 710. At Step 711, the storage service management device determines a QoS class that is reserved or assigned for network interface. The attributes of QoS class are defined in the SLA definition table presented in FIG. 4. At Step 712, the storage service management device sends a request to reserve a bandwidth on the network interface. The bandwidth is specified for each QoS class selected at Step 711. As a consequence, at Step 712, a request to reserve a bandwidth on the network interface is sent to the storage device. At Step 713, the network path quality controller for the storage device reserves the bandwidth on the network interface, as requested in the previous Step 712. After the preferred bandwidth is reserved on the network interface, an acknowledgement is sent from the storage device to the storage service management device, at Step 714. After the reservation is made and the acknowledgement is received, the storage SLA definition table is updated at Step 715. The storage service management device requests the storage device to setup a LSP at Step 716. At Step 717, the path setup request is sent to the LSR. At Step 718, the LSP that is set up is connected to the network interface selected during Step 707. Label distribution method 700C consists of Steps 707 to 715, which are identical with those steps of method 700B. In addition, method 700C further incorporates Steps 716 to 722 in connection with the operation of a network service management device. Specifically, after the reservation is made and the acknowledgement is received, the storage SLA definition table is updated at Step 715, a request to determine the network route with QoS parameters is set by the storage service management device to the network service management device at Step 722. The network service management device calculates a network route to setup the LSP while satisfying the QoS requirements at Step 719. The network service management device sends a request to the storage device at Step 720 for setting up an LSP while providing route information. This request contains route information that helps in electing between the LSRs on the LSP. The storage device sends at Step 717 a path setup request. This request contains a list of LSRs that are used and available to establish a LSP. This request message is transferred from LSR to LSR, as prescribed in the request. As a result, the LSP is calculated by the network service management device. An LSP path is then established at Step 718. The storage device sends the information about the established LSP to the network service management where the VPN status information is updated at Step 721. FIG. 8 illustrates an example of data structure for the topology map stored by device 608. The data structure is composed of the link ID 802, the object ID 804, the port ID 806, the object ID 808, and the port ID 810. The network manager device 601 can thereby identify and locate network devices and their connection status using a traditional simple network management protocol (SNMP). An example of traditional SNMP can be found in memo IP Node Network Manager which is incorporated herein by reference. The actual topology of the network defined in FIG. 8 by the network topology map 608 is presented in FIG. 10. Object 6 is linked to object 0 through link 0001 through port 1. The same rational applies to the rest of the information contained in network topology map 608. FIG. 9 illustrates an example of VPN status information stored by device 604 for network management device 601. The virtual private network status information data structure consists of LSP ID 902, LSR ID 904, link ID 906, label 908, and quality 910. An example of a network that provides the services defined by the VPN status information table is illustrated by FIG. 11. According to FIG. 11, the client group with address 10.1.2.0 will be delivered information with respect to the QoS parameters from storage devices LDEV 000 and 001 through port 1, with the best route defined by the LSP A01, with a bandwidth of 1 Gb/sec. In an analogous manner, the client group with addressees 10.2.3.4 and 10.2.3.16 receives information stored in LDEV 003 through port 2, with parameters defined by LSP A02, with a bandwidth of 500 Mb/sec. Where the storage network interface does not have the capability to establish the label switching path, situation as illustrated by FIG. 10, the network manager set establishes a LSP. In this case, it is the storage service manager that controls port performance, according to how it was predefined in table 101.4. This example of storage and network integration achieves and maintains consistency in service quality. FIG. 12 illustrates an example of a processing system/environment for the storage service management device 101, in which the present invention can be implemented. The processing system includes a processor 1202 (or multiple processors 1202), a memory 101.4, an input/output (I/O), interface (I/F) 1204, and a communication I/F 1206 coupled between the processor, memory and I/O I/F. The processing system may also include interfaces for interfacing with external memory, external communication channels, external clocks and timers, external devices, and so on. Memory 101.4 includes a data memory for storing information/data and program memory for storing program instructions. In the case of the preferred embodiments illustrated generically in FIGS. 1 and 6 and in detail in FIGS. 6A and 6B, element 101.4 is a simple data depository. Processor 1202 performs processing functions in accordance with the program instructions stored in memory 101.4. Processor 1202 may access data in memory 101.4 as needed. Additionally, or alternatively, processor 1202 may include fixed/programmed hardware portions, to perform some or all of the above-mentioned processing functions without having to access program instructions in memory 101.4. The present invention can also be implemented in computer-readable code, or software, that executes on a computer system. More precisely, all elements of the above described apparatuses that store computer readable/executable protocols may be implemented in computer-readable code, that execute on a computer system such as that shown by FIG. 13. FIG. 13 illustrates an example computer system 1300, in which the present invention may be implemented as computer-readable code. Various embodiments of the invention are described in terms of this example computer system 1300. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the invention using other computer systems and/or computer architectures. For example, in the present invention, all the protocol storing blocks of the storage device can execute on one or more distinct computer systems 1300, to implement the various methods of the present invention (for example, method 200). The computer system 1300 includes one or more processors, such as processor 1304. Processor 1304 may be a special purpose or a general purpose digital signal processor. The processor 1304 is connected to a communication infrastructure 1306 (for example, a bus or a network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the invention using other computer systems and/or computer architectures. Computer system 1300 also includes a main memory 1305, preferably random access memory (RAM), and may also include a secondary memory 1310. The secondary memory 1310 may include, for example, a hard disk drive 1312 and/or a removable storage drive 1314 representing a floppy drive, a magnetic drive, an optical disk drive, etc. The removable storage drive 1314 reads from and/or writes to a removable storage unit 1315 in a well known manner. Removable storage unit 1315, represents a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by any removable storage drive 1314. As will be appreciated, the removable storage unit 1315 includes a computer usable storage medium having stored therein computer software and/or data. In alternative implementations, secondary memory 1310 may include other similar means for allowing computer programs or other instructions to be loaded into compute system 1300. Such means may include a program cartridge and cartridge interface, a removable memory chip (such as EPROM, or PROM) and associated socket, and other removable storage units 1322 and interfaces 1320 which allow software and data to be transferred from the removable storage unit 1322 to the computer system 1300. Computer system 1300 may also include a communication interface 1324. Communication interface 1324 allows software and data to be transferred between computer system 1300 and external devices. Examples of communications interface 1324 may include a modem, a network interface communications interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 1324 are in the form of signals 1325 which may be electronic, electromagnetic, optical and other form of signals capable of being received by communications interface 1324 via a communications path 1326. Communications path 1326 carries signals 1325 and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels. In this document, the terms computer program medium and computer usable medium are used to generally refer to media such as removable storage drive 1314, a hard disk installed in hard disk drive 1312, and signals 1325. These computer program products are means for providing software to computer system 1300. Computer programs (also called computer control logic) are stored in main memory 1305 and/or secondary memory 1310. Computer programs may also be received via communications interface 1324. Such computer programs, when executed, enable the computer system 1300 to implement the present invention as discussed herein. In particular, the computer programs, when executed, enable the processor 1304 to implement the processes of the present invention, such as the method(s) implemented using the structure 100 described above, such as method 200, for example. Accordingly, such computer programs represent controllers of the computer system 1300. By way of example, in the embodiments of the invention, the processes performed by SLA Management console 101.2 and Storage SLA Definition Table 101.4 may be performed by computer control logic. Where the invention is implemented using software, the software may be stored in a computer program product and loaded into computer system 1300 using removable storage drive 1314, hard drive 1312 or communications interface 1324. CONCLUSION While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. The present invention has been described above with the aid of functional blocks and relationship thereof. The boundaries of these functional building blocks and method steps have been arbitrarily defined herein for the convenience of the description. Alternate boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Any such alternate boundaries ate thus within the scope and spirit of the claimed invention. One skilled in the art will recognize that these functional blocks can be implemented by discrete components, application specific integrated circuits, processors executing appropriate software and the like or any combination thereof, as was described above in connection with FIGS. 12 and 13, for example. Thus, the breath and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The invention is related to a network management method and apparatus directed to providing security and performance guaranteed service to clients and service providers of storage networks. 2. Related Art Storage area networks, also called SANs, use Fibre Channel (FC) network platform technology. According to a presently widespread technology, SANs are used to maximize network performance by offloading storage from the server to a dedicated storage device accessed and accessible by the server. These devices (that can be RAID arrays, JBODs, tape drives) are located on the network. SANs are wide-ranging and very diverse. Depending on need, a SAN can range from a simple server-to-storage device connection, to a labyrinth of servers, hubs, switches, and storage devices in either a loop (hub) or across a fabric (switch). For example, the point-to-point “starter” SAN is a preferred choice for a home office, small office, or department. One of the greatest benefits a SAN offers is scalability. Unlike a small computer system interface (SCSI) connection, which only allows for the attachment of 15 nodes per bus, a SAN offers up to 16 million devices attached and running on a single network. For the currently running Fibre Channel SANs, upgrading is easy, and virtually limitless. Storage input/output requires high-speed data transfer, especially for the business application services. Fibre channel network platforms have provided that so far. But the appearance of applications such as Internet Protocol storage (IP), and more specifically of Internet Small Computer System Interface Protocol (iSCSI), or Internet Fibre Channel Protocol (iFCP), posses new challenges for SANs. IP SANs provide access from distances that prior were not available without compromising the Quality of Service parameters. The present invention is directed to methods and systems that aim to consistently provide network Quality of Service and storage performance for clients and service providers alike.
<SOH> SUMMARY OF THE INVENTION <EOH>By employing the means and methods of the present invention network clients are able to access their storage via a Quality of Service guaranteed network path. At the same time, service providers can manage their Quality of Service more effectively. Service providers are able to manage clients by groups, such as IP subnets, very large area networks (VLANs) and others. Further, service providers can set up an end-to-end path between clients and storage devices while maintaining the consistency of Quality of Service and security. The present invention can be implemented with a managed network storage apparatus that allows service providers to attain network Quality of Service (QoS) and storage performance. The managed network storage apparatus comprises a plurality of storage service management servers, a storage device, a multi protocol label switching network (MPLS) operatively connected to the storage device, and a plurality of client groups functionally connected to the MPLS network. The plurality of storage service management servers is operatively connected to the storage device. The plurality of storage service management servers and the storage device are operatively connected by a storage device. The storage device and the MPLS network are operatively connected by a plurality of network paths. The MPLS network and the plurality of client groups are functionally connected by a plurality of network paths. The invention can also be implemented using a storage network with network management service. In this embodiment the network comprises a plurality of storage service management servers, a storage device, a multi protocol label switching (MPLS) network operatively connected to the storage device, a plurality of client groups functionally connected to the MPLS network, and a network management server simultaneously operationally connected to the plurality of storage service management servers and functionally connected with the storage device and to at least one of the plurality of client groups. The plurality of storage service management servers is operatively connected with the storage device. The plurality of storage service management servers and the storage device are operatively connected by a network path. The storage device and the MPLS network are operatively connected by a plurality of network paths. The MPLS network and the plurality of client groups are functionally connected by a plurality of network paths. The network management server is operationally connected with the plurality of storage service management devices by means of storage network management communication path. The network management server is functionally connected with the storage device by a network path. In a storage system having a plurality of ports and a plurality of logical devices, wherein the ports are connected via a MPLS network and the ports conduct MPLS protocol, a method for establishing a path between at least one logical device and a client connected to the MPLS network according to the invention comprises selecting a port of the ports; establishing, at the port, a label switching path (LSP) to the client with requesting bandwidth; setting priority or bandwidth of the port; and attaching the at least one logical device to the port. In a storage system having a plurality of ports and a plurality of logical devices, wherein the ports are connected via a MPLS network and the ports conduct MPLS protocol, a method for establishing a path between at least one logical device and a client connected to the MPLS network according to the invention comprises selecting a port of the ports; requesting from the port to a management server connected to the MPLS network, establishment of a label switching path to the port with requesting bandwidth; establishing at the port a LSP to the client with requesting bandwidth; setting priority or bandwidth of the port; and attaching the at least one logical device to the port. A storage system of the invention comprises a plurality of ports coupled to a MPLS network, the ports with capability of establishing a LSP to a client coupled to the MPLS network; and a plurality of logical devices to be attached to at least one of the plurality of ports. Establishing a label switching table involves issuing network path information with quality parameters, sending at least one path setup request to at least one of a plurality of label switch routers, distributing at least a label generated by the at least one of a plurality of label switch routers, and establishing the label switching table. The network path information is issued by at least one of a plurality of storage service management devices to a penultimate label switch router of a plurality of label switch routers. Retrieving data comprises receiving data from at least one of a plurality of client groups, transferring the data via at least one of a plurality of label switching tables each pertaining to a plurality of label switch routers, writing the data into a storage device, generating a signal that indicates successful receipt of data by said storage device, and transferring the signal to at least one of the plurality of client groups. Transferring retrieved data to at least one of a plurality of clients, and releasing a label switching table entails sending a label switching table release request to an ultimate label switch router, transferring the request to at least one of a plurality of label switch routers, and releasing the retrieved data from a label switching table. The transfer occurs in reverse from the ultimate label switch router, in a single-step transfer between successive label switch routers. The method of using the managed network storage apparatus with network management service further comprises the steps of sending a request from a storage management device to a network service management device, calculating a network route to satisfy the QoS parameters, sending a path setup request to a storage device, sending a path setup request to at least one of a plurality of label switch routers, establishing a label switching table, and updating status information for a virtual private network based on said label switching table. The request consists of identifying a network route based on the QoS parameters. The path setup request originates from the network service management device.
20040318
20070213
20050922
72989.0
0
DENNISON, JERRY B
METHOD AND APPARATUS FOR STORAGE NETWORK MANAGEMENT
UNDISCOUNTED
0
ACCEPTED
2,004
10,803,164
ACCEPTED
Data processing apparatus and method for determining a processing path to perform a data processing operation on input data elements
The present invention provides a data processing apparatus and method for performing a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent. The data processing apparatus comprises processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists. Further, at least one detector logic unit is provided which is operable to receive both the first exponent and the second exponent and to detect the presence of the predetermined alignment condition. Each detector logic unit comprises half adder logic operable to perform a half adder operation to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the half adder operation. Further, each detector logic unit comprises generation logic operable to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of the predetermined alignment condition. The processing logic is then operable to select the first data processing path to perform the data processing operation if the select signal from one of the at least one detector logic units is set. The particular structure of detector logic unit provided enables a fast detection of the existence of the predetermined alignment condition, which enables an early selection of the first data processing path if the select signal is set. This enables significant power and area savings to be made.
1. A data processing apparatus for performing a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus comprising: processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists; at least one detector logic unit operable to receive both said first exponent and said second exponent, and to detect the presence of said predetermined alignment condition, each detector logic unit comprising: half adder logic operable to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and generation logic operable to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; the processing logic being operable to select the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set. 2. A data processing apparatus as claimed in claim 1, wherein the number of half adder operations performed by the half adder logic is a plurality of half adder operations. 3. A data processing apparatus as claimed in claim 1, wherein if the select signal from one of said at least one detector logic units is set, the processing logic is operable to prevent performance of the data processing operation in the processing paths other than the first processing path. 4. A data processing apparatus as claimed in claim 1, wherein the predetermined alignment condition specifies that the first and second floating point data elements require at most a one-bit alignment, and the at least one detector logic unit is operable to detect whether the first and second exponents differ by one by determining whether the sum value has a value of −2, if the sum value has a value of −2 the at least one detector logic unit being operable to generate a shift signal in addition to the select signal. 5. A data processing apparatus as claimed in claim 4, wherein the at least one detector logic unit is operable to detect whether the first and second exponents are equal or differ by one by determining whether the sum value has a value of −1 or −2, if the sum value has a value of −1 or −2 the at least one detector logic unit being operable to generate the select signal. 6. A data processing apparatus as claimed in claim 4, wherein both the first and second exponents have n bits, and the half adder logic comprises: first n-bit half adder logic operable to perform a first half adder operation to logically subtract said one exponent from said other exponent to produce an intermediate sum value and an intermediate carry value; and additional logic operable to perform at least a partial second half adder operation to logically add the intermediate sum value and intermediate carry value to generate said sum value. 7. A data processing apparatus as claimed in claim 6, wherein the additional logic comprises XOR logic operable to perform an XOR operation on corresponding bits of the intermediate sum value and the intermediate carry value other than the least significant bit. 8. A data processing apparatus as claimed in claim 4, wherein the processing logic has a plurality of pipeline stages, and each processing path comprises multiple pipeline stages, the at least one detector logic unit being operable to generate the shift signal for input to a first pipeline stage of the first processing path, this first pipeline stage containing shift logic, and the shift signal being used to control the operation of the shift logic. 9. A data processing apparatus as claimed in claim 8, wherein the first floating point data element specifies a first mantissa and the second floating point data element specifies a second mantissa, and the shift logic comprises first shift logic provided to selectively perform a shift operation on the first mantissa and second shift logic provided to selectively perform a shift operation on the second mantissa, the at least one detector logic unit comprising a first detector logic unit associated with the first shift logic and a second detector logic unit associated with the second shift logic, the half adder logic of the first detector logic unit being operable to logically subtract the first exponent from the second exponent and the half adder logic of the second detector logic unit being operable to logically subtract the second exponent from the first exponent. 10. A data processing apparatus as claimed in claim 8, wherein the first pipeline stage is common to the multiple processing paths. 11. A data processing apparatus as claimed in claim 1, wherein the data processing operation is an unlike-signed addition operation. 12. A method of determining a processing path of a data processing apparatus to perform a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus having processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists, the method comprising the steps of: (a) providing at least one detector logic unit which receive both said first exponent and said second exponent, and within each detector logic unit detecting the presence of said predetermined alignment condition by performing the steps of: (a)(i) employing half adder logic to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and (a)(ii) generating a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; (b) selecting the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set. 13. A method as claimed in claim 12, wherein the number of half adder operations performed by the half adder logic is a plurality of half adder operations. 14. A method as claimed in claim 12, wherein if the select signal from one of said at least one detector logic units is set, the method further comprises the step of preventing performance of the data processing operation in the processing paths other than the first processing path. 15. A method as claimed in claim 12, wherein the predetermined alignment condition specifies that the first and second floating point data elements require at most a one-bit alignment, and the at least one detector logic unit detects at said step (a) whether the first and second exponents differ by one by determining whether the sum value has a value of −2, if the sum value has a value of −2 the at least one detector logic unit generating a shift signal in addition to the select signal. 16. A method as claimed in claim 15, wherein the at least one detector logic unit detects at said step (a) whether the first and second exponents are equal or differ by one by determining whether the sum value has a value of −1 or −2, if the sum value has a value of −1 or −2 the at least one detector logic unit generating the select signal. 17. A method as claimed in claim 15, wherein both the first and second exponents have n bits, and said step (a)(i) comprises the steps of: performing a first half adder operation to logically subtract said one exponent from said other exponent to produce an intermediate sum value and an intermediate carry value; and performing at least a partial second half adder operation to logically add the intermediate sum value and intermediate carry value to generate said sum value. 18. A method as claimed in claim 17, wherein the step of performing at least a partial second half adder operation comprises the step of performing an XOR operation on corresponding bits of the intermediate sum value and the intermediate carry value other than the least significant bit. 19. A method as claimed in claim 15, wherein the processing logic has a plurality of pipeline stages, and each processing path comprises multiple pipeline stages, the at least one detector logic unit generating the shift signal for input to a first pipeline stage of the first processing path, this first pipeline stage containing shift logic, and the shift signal controlling the operation of the shift logic. 20. A method as claimed in claim 19, wherein the first floating point data element specifies a first mantissa and the second floating point data element specifies a second mantissa, and the shift logic comprises first shift logic provided to selectively perform a shift operation on the first mantissa and second shift logic provided to selectively perform a shift operation on the second mantissa, the at least one detector logic unit comprising a first detector logic unit associated with the first shift logic and a second detector logic unit associated with the second shift logic, at said step (a) the half adder logic of the first detector logic unit logically subtracting the first exponent from the second exponent and the half adder logic of the second detector logic unit logically subtracting the second exponent from the first exponent. 21. A method as claimed in claim 19, wherein the first pipeline stage is common to the multiple processing paths. 22. A method as claimed in claim 12, wherein the data processing operation is an unlike-signed addition operation.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a data processing apparatus and method for determining a processing path to perform a data processing operation on input data elements. 2. Description of the Prior Art A data processing apparatus may be arranged to perform a data processing operation on various types of data element. One type of data element which may be subjected to such data processing operations is the floating point data element. A floating point number can be expressed as follows: ±1.x*2y where: x=fraction 1.x=significand (also known as the mantissa) y=exponent When performing a data processing operation on floating point data elements, a number of eventualities have to be catered for in the processing logic path, and accordingly extra logic needs to be included in the data processing path to perform the required processing dictated by these eventualities (for example rounding, normalization, etc). This often means that the processing path for performing the data processing operation is relatively long, which can have an impact on processing speed. As an example, in a pipelined data processing apparatus used to perform such data processing operations, a relatively large number of pipeline stages may be required to ensure that all of the necessary logic elements required to cover the various eventualities is provided. For certain data processing operations, for example floating-point addition, it is known to provide within the processing logic different processing paths, each of which is capable of performing the data processing operation under certain conditions. As an example, for floating-point addition, it is known to provide a near processing path and a far processing path, as for example is discussed in the paper “1-GHz HAL SPARC64 Dual Floating Point Unit with RAS Features” by A Naini et al, Proceedings of the 15th EEE Symposium on Computer Architecture, 2001. The near path can be used if the first and second floating point data elements require at most a 1-bit alignment, whereas otherwise the far path needs to be used. When the input floating point data elements require at most a 1-bit alignment, it is possible that when performing an unlike-signed addition (i.e. equivalent to subtracting one data element from the other) massive cancellation may occur, and to enable the resultant floating point value to be correctly aligned, it is then necessary to provide normalisation logic within the near path. Such logic is not required in the far path. However, in the far path, it is necessary to provide rounding logic due to the fact that the data elements may need more than a 1-bit alignment. Such rounding logic is not required in the near path. Accordingly, by providing a near path and a far path, the length of each path can be made shorter than would be the case if a single unitary path were provided for performing the data processing operation, and this can hence produce an increase in processing speed. For example, considering the earlier pipelined processing logic example, the pipeline depth can be reduced by using a near path and a far path, which can give rise to increase in processing speed when compared with a unitary processing path. However, one problem that arises when providing more than one processing path for performing the data processing operation is in determining whether the alignment condition required for using any particular path does in fact exist. In accordance with the technique discussed in the above-mentioned paper from the 15th IEEE Symposium on Computer Arithmetic, prediction logic is used to predict whether the alignment condition for the near path exists, which can make an early prediction as to whether the alignment condition for the near path appears to exist. However, predicted results by their very nature will not necessarily be true, and accordingly it is necessary to perform the processing in both the near path and the far path until such time as the presence of the alignment condition can actually be determined. Hence, whilst the predicted result can be used to perform some initial processing, for example shifting, in the near path, it is not until the actual alignment condition is positively determined that the result from any particular path can be used. Hence, such an approach is not very power efficient, since the data processing operation needs to be performed in both processing paths. Further, this has some impact on the area required for the processing logic, since further logic is needed in addition to the prediction logic to perform the actual detection of the alignment condition at a later stage in the processing path, and to manage the computations being performed within several different processing paths. A further problem is that because the prediction may be wrong, any assumptions made in an early part of the near processing path based on that prediction cannot be used in the far processing path, since if the prediction proves wrong it will be necessary to rely on the processing performed in the far processing path in order to generate the correct result. Accordingly, there is no opportunity to share logic between the near and far processing paths, which again leads to an implementation which is inefficient in terms of size of the processing logic, and in terms of power consumption. It is an object of the present invention to provide an improved technique for determining a processing path to be used to perform a data processing operation on input data elements. SUMMARY OF THE INVENTION Viewed from a first aspect, the present invention provides a data processing apparatus for performing a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus comprising: processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists; at least one detector logic unit operable to receive both said first exponent and said second exponent, and to detect the presence of said predetermined alignment condition, each detector logic unit comprising: half adder logic operable to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and generation logic operable to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; the processing logic being operable to select the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set. In accordance with the present invention, a detector logic unit is provided which can detect the presence of the predetermined alignment condition required for using a first processing path, and which can be used instead of the prediction logic used in the prior art. The detector logic unit of the present invention employs half adder logic to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents. A half adder operation typically produces a carry data value and a sum data value. In particular, if it is assumed that the first and second floating point data elements are X and Y where X=xn−1 . . . x1x0, and Y=yn−1 . . . y1y0 are n-bit words with low order bits x0 and y0, an n-bit half adder produces a carry word C=cn−1 . . . c10 and a sum word S=sn−1 . . . s1s0 such that carry ci=xi−1 AND yi−1 (1) sum si=xi XOR yi (2) By adding C and S together, it will be possible to determine whether the predetermined alignment condition exists, but in practice there would be insufficient time to perform that addition early enough to enable the output to be used at an early stage to select the required processing path to perform the data processing operation. Only if the detection of the alignment condition can be determined at an early stage can significant savings in power and area be achieved relative to the earlier described prior art techniques. The inventors of the present invention realised that the properties of the half-adder form (C,S) dictated by the above equations (1) and (2) mean that it is possible, once a number of half adder operations have been performed, to determine the presence of the predetermined alignment condition from the sum data value alone. Accordingly, the detector logic unit of the present invention arranges the half adder logic to produce at least a sum data value of the sum and carry data values representing the result of the number of half adder operations, and generation logic is then provided to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of the predetermined alignment condition. This means that there is no requirement to add together the carry data value C and the sum data value S, and this enables the existence of the predetermined alignment condition to be detected significantly more quickly than was previously thought possible. Accordingly, through use of the present invention it is possible for the processing logic to be operable to select the first data processing path to perform the data processing operation if the select signal from one of the at least one detector logic units is set. Because of the speed with which the detector logic unit of the present invention detects the presence of the predetermined alignment condition, this selection can be performed at an early stage in the processing path, and hence allow significant savings to be made in terms of both power and area. The number of half adder operations performed by the half adder logic will vary dependent on the predetermined alignment condition to be detected. However, in one embodiment, the number of half adder operations performed by the half adder logic is a plurality of half adder operations. In one embodiment, if the select signal from one of said at least one detector logic units is set, the processing logic is operable to prevent performance of the data processing operation in the processing paths other than the first processing path. This is possible due to the fact that the detector logic unit is able to detect the presence of the predetermined alignment condition significantly more quickly than known detectors, and in particular early enough to enable the processing paths other than the first processing path to be turned off to conserve power. It will be appreciated that there are a number of ways to prevent performance of the data processing operation in the processing paths other than the first processing path. In one particular embodiment, this is done by routing the select signal to logic which generates enable signals for the various components in the processing paths, with this logic then being arranged to disable the logic elements in the processing paths other than the first processing path upon receipt of a set select signal. It will be appreciated that the predetermined alignment condition may take a variety of forms dependent on, for example, the data processing operation being performed. However, in one embodiment, the predetermined alignment condition specifies that the first and second floating point data elements require at most a one-bit alignment, and the at least one detector logic unit is operable to detect whether the first and second exponents differ by one by determining whether the sum value has a value of −2, if the sum value has a value of −2 the at least one detector logic unit being operable to generate a shift signal in addition to the select signal. If the first and second exponents differ by one, then it is appropriate to shift the mantissa of one of the data elements so that they are aligned prior to performing the data processing operation. Accordingly, this shift signal can be routed to the logic within the first processing path used to perform such a shift. In such an embodiment, it will be appreciated that the select signal will be set if the first and second exponents differ by one. However, in addition, the select signal should still be set if the first and second floating point data elements are actually aligned. A separate zero-alignment detector can be used to make that detection, with the select signal then being produced if either the zero-alignment detector detects a zero-alignment, or the at least one detector logic unit detects a sum value of −2 (i.e. detects that the first and second exponents differ by one). However, in one embodiment of the present invention the at least one detector logic unit is operable to detect whether the first and second exponents are equal or differ by one by determining whether the sum value has a value of −1 or −2, if the sum value has a value of −1 or −2 the at least one detector logic unit being operable to generate the select signal. Accordingly, in such an embodiment, the at least one detector logic unit detects when the first and second exponents differ by one and also detects if a first and second exponents are equal, if they are equal this being indicated by the sum value having a value of −1. It will be appreciated that the half adder logic within each of the at least one detector logic units can take a variety of forms. However, in one embodiment, both the first and second exponents have n bits, and the half adder logic comprises: first n-bit half adder logic operable to perform a first half adder operation to logically subtract said one exponent from said other exponent to produce an intermediate sum value and an intermediate carry value; and additional logic operable to perform at least a partial second half adder operation to logically add the intermediate sum value and intermediate carry value to generate said sum value. It is possible for second n-bit half adder logic to be used instead of the additional logic referenced above, but since the generation logic only needs to use the sum data value in order to determine whether to generate a select signal, then the additional logic can be used instead of a second n-bit half adder logic to provide a more efficient implementation of the half adder logic. It will be appreciated that the additional logic may be constructed in a variety of ways. However in one embodiment, the additional logic comprises XOR logic operable to perform an XOR operation on corresponding bits of the intermediate sum value and the intermediate carry value other than the least significant bit. The processing logic may take a variety for forms. However, in one embodiment the processing logic has a plurality of pipeline stages, and each processing path comprises multiple pipeline stages, the at least one detector logic unit being operable to generate the shift signal for input to a first pipeline stage of the first processing path, this first pipeline stage containing shift logic, and the shift signal being used to control the operation of the shift logic. Hence, the at least one detector logic is able to generate the shift signal in time for it to be input to a first pipeline stage of the first processing path, thus enabling any necessary shift of one of the data elements to take place prior to performing the data processing operation. Further, since this shift signal is based on an actual detection of the presence of the predetermined alignment condition, rather than merely a prediction of it, this means that the shift is guaranteed to be correct, and accordingly no further logic is required later in the processing paths to account for a situation in which an incorrect shift is made (as would be the case if the shift was based on a prediction). In one particular embodiment, the first floating point data element specifies a first mantissa and the second floating point data element specifies a second mantissa, and the shift logic comprises first shift logic provided to selectively perform a shift operation on the first mantissa and second shift logic provided to selectively perform a shift operation on the second mantissa, the at least one detector logic unit comprising a first detector logic unit associated with the first shift logic and a second detector logic unit associated with the second shift logic, the half adder logic of the first detector logic unit being operable to logically subtract the first exponent from the second exponent and the half adder logic of the second detector logic unit being operable to logically subtract the second exponent from the first exponent. It will be appreciated that the multiple processing paths may incorporate entirely separate logic. However, since the shifting performed within the first pipeline stage of the first processing path is based on an exact determination of the presence of the predetermined alignment condition (rather than just a prediction), it can be guaranteed that any shift performed is appropriate, and accordingly in one embodiment the first pipeline stage is common to the multiple processing paths. This enables a reduction in area of the processing logic and can also give rise to a reduction in power consumption. It will be appreciated that the data processing operation can take a variety of forms. However, in one embodiment the data processing operation is an unlike-signed addition operation. The first processing path can be arranged to allow such an unlike-signed addition operation to be performed in a particularly efficient manner in situations where the predetermined alignment condition is determined to exist. Viewed from a second aspect, the present invention provides a method of determining a processing path of a data processing apparatus to perform a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus having processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists, the method comprising the steps of: (a) providing at least one detector logic unit which receive both said first exponent and said second exponent, and within each detector logic unit detecting the presence of said predetermined alignment condition by performing the steps of: (a)(i) employing half adder logic to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and (a)(ii) generating a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; (b) selecting the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be described further, by way of example only, with reference to preferred embodiments thereof as illustrated in the accompanying drawings, in which: FIG. 1 is a block diagram illustrating logic provided within a near processing path of a data processing apparatus providing a near path and a far path for performing a data processing operation on first and second floating point data elements; FIG. 2 is a diagram illustrating logic provided within the difference equals one/zero detector of FIG. 1; FIG. 3 is a diagram illustrating the construction of a one-bit half adder provided within the 8-bit half adder of FIG. 2; FIG. 4 illustrates an alternative embodiment of the difference equals one/zero detector of FIG. 1; FIG. 5 is a flow diagram illustrating the processing performed within each difference equals one/zero detector of FIG. 1; FIG. 6 is a block diagram of logic provided within a data processing apparatus to compute an absolute difference between first and second integer data elements in accordance with one embodiment; FIG. 7 is a block diagram illustrating a prior art end around carry adder; and FIG. 8 is a flow diagram illustrating the processing steps performed in one embodiment to calculate an absolute difference between first and second data elements. DESCRIPTION OF PREFERRED EMBODIMENTS A data processing apparatus may be arranged to perform a data processing operation on various types of data element. One type of data element which may be subjected to such data processing operations is the floating point data element. A floating point number can be expressed as follows: ±1.x*2y where: x=fraction 1.x=significand (also known as the mantissa) y=exponent A data processing apparatus arranged to perform certain data processing operations on first and second floating point data elements may provide both a near processing path and a far processing path for performing the data processing operation. In one embodiment, the near processing path can be used to perform unlike-signed addition operations on the first and second floating point data elements. Further, the near path can be used if the first and second point floating data elements require at most a 1-bit alignment, whereas otherwise the far path needs to be used. When the input floating point data elements require at most a 1-bit alignment, it is possible that when performing an unlike-signed addition (i.e. equivalent to subtracting one data element from the other) massive cancellation may occur, and to enable the resultant floating point value to be correctly aligned, it is then necessary to provide normalisation logic within the near path. Such logic is not required in the far path. However, in the far path it is necessary to provide rounding logic due to the fact that the data elements may need more than a 1-bit alignment. Such rounding logic is not required in the near path. FIG. 1 is a block diagram illustrating logic provided within the near processing path of a data processing system to perform the necessary processing on the significand portions of first and second floating point data elements when performing an unlike-signed addition in accordance with one embodiment. In particular, it can be seen from FIG. 1 that the illustrated near path logic is contained within four pipeline stages N1 to N4. The first floating point data element A is stored in the register 10 whilst the second floating point data element B is stored in the register 20. It will be appreciated that the floating point values A and B may be single precision floating point values or double precision floating point values. However, in the example illustrated in FIG. 1, it is assumed that both input data elements are single precision floating point values. Such single precision values are 32-bit values, with the most significant bit specifying a sign value, the next 8 bits specifying an exponent value, and the final 23 bits specifying a fraction value. From the 23-bit fraction value, a 24-bit significand can be constructed, and the 24-bit significand of the first data element is routed to associated shift logic 35 during the first pipeline stage, whilst the corresponding 24-bit significand of the second data element B is routed to associated shift logic 45 during the first pipeline stage. Also, during this pipeline stage, the 8-bit exponents of both data elements are routed to the two detectors 30, 40, the detector 30 being associated with shift logic 35 and the detector 40 being associated with shift logic 45. As mentioned earlier, for the near path to be used, there needs to be at most a 1-bit alignment between the first and second floating point data elements, and the presence of this alignment condition is detected by the detectors 30, 40 by a comparison of the exponents of both input data elements. As will be discussed in more detail with reference to FIG. 2, each detector 30, 40 seeks to detect this alignment condition by performing a number of half adder operations in a manner such that the detection of the alignment condition can be determined from analysis of the sum data value alone. Before discussing the logic of FIG. 2, the following background is provided concerning the operation of an n-bit half adder and the manner in which the half adder operations can be performed to enable solely the analysis of the resultant sum value to provide an indication of the presence of the alignment condition. An n-bit half adder consists of n independent half adders. It takes two n-bit two's complement numbers as inputs, and produces two outputs: an n-bit sum and an n-bit carry. In the present context, the exponent values are unsigned values that can be treated as two's complement numbers. Let X=xn−1 . . . x1x0, and Y=yn−1 . . . . y1y0 be n-bit words with low order bits x0 and y0. An n-bit half adder produces a carry word C=cn−1 . . . c10 and a sum word S=sn−1 . . . s1s0 such that: ci=xi-1 AND yi-1 (1) si=xi XOR yi (2) Note that c0 is always 0, and that C+S=X+Y (modulo 2n). By definition, (C,S) is in n-bit half-adder form (also referred to as n-bit h-a form) if there exist n-bit X and Y satisfying equations 1 and 2. We write (C,S)=ha(X,Y), and the modifier “n-bit” can be omitted unless it is necessary for clarity. Theorem 1 Let (C,S) be a number in h-a form. Then it can be proved that the situation where S=−1 means that C+S=−1. Proof (C,S) is in h-a form, so there exist X and Y such that X+Y=−1 and (C,S)=ha(X,Y). By the definition of a two's complement number, X+Y=−1 means that Y={overscore (X)}. Then by equation 2, S=X XOR {overscore (X)}=−1. By the definition of h-a from (see equations (1) and (2) above), only one of ci and si−1 can be set for i=1, . . . , n−1, so C=0, and C+S=−1. The above Theorem 1 was discussed in the paper “Early Zero Detection” by D Lutz et al, Proceedings of the 1996 International Conference on Computer Design, pages 545 to 550. However, it was only discussed in the context of integer arithmetic. By the above Theorem 1, it can be seen that if it is desired to determine whether two numbers are equal, then a half adder operation can be performed using the two numbers as inputs, and if the sum value has a value of −1, this will indicate that the carry value is zero, and that the two numbers are hence equal. However, in the current context of the detectors 30, 40 in FIG. 1, a key requirement is to detect whether the two input exponents differ by one. In other words, if the two exponents are considered to be X and Y, then the detector logic 30, 40 needs to determine whether X−Y=1 or Y−X=1. The following discussion will illustrate why, through the use of two half adder operations (or their equivalent), such an alignment condition can still be detected merely by reviewing the value of the sum data value produced. Lemma 1 Given two n-bit numbers X and Y, then it can be shown that the equation X−Y=1 is equivalent to the equation Y+{overscore (X)}=−2. Proof: X - Y = 1 ⇔ ⁢ Y - X = - 1 ⇔ ⁢ Y + X _ + 1 = ⁢ - 1 ⁢ ( by ⁢ ⁢ definition ⁢ ⁢ of ⁢ ⁢ two ’ ⁢ s ⁢ ⁢ complement ⁢ ⁢ numbers ) . ⇔ ⁢ Y + X _ = - 2 The earlier theorem 1 provides an easy test for comparing sums with −1, but we need a test for comparing sums with −2. Theorem 2 Let (C,S) be a number in h-a form, and suppose c1=0. Then it can be proved that the situation where S=−2 means that C+S=−2. Proof: Recall that −2 is represented in two's complement numbers as a word consisting of all ones except for a zero in the low order bit. c1=c0=0, so we cannot have C+S=−2 unless s1=1 and s0=0. Now s1=1c2=0. Again, we cannot have C+S=−2 unless S2=1. A simple induction completes this half of the proof. S=−2si=1 for i=1,2, . . . ,n−1. By the definition of h-a form, only one of ci and si−1 can be set for i=1, . . . , n−1, so ci=0 for i=2,3, . . . ,n−1. By assumption, c1=c0=0. Therefore, C=0, and C+S=−2. The critical step in the proof above relies on the fact that the AND and XOR of two bits cannot both be true. Note that c1=0 can be guaranteed by using two levels of half adders. FIG. 2 illustrates logic provided within each detector 30, 40 that uses the concepts set out in the above proof to detect a condition where the sum value equals −2, thereby indicating the presence of the required alignment condition, i.e. that the two exponents differ by one. In particular, one of the exponents X is latched in register 200 while the other exponent Y is latched in register 205. The detector 30 is used to evaluate whether subtraction of the exponent of A from the exponent of B gives a result of one, whilst the detector logic 40 is used to evaluate whether subtracting the exponent of B from the exponent of A gives a result of one. Accordingly, with reference to FIG. 2, for the detector 30, the exponent of B is placed in register 200, and the exponent of A is placed in register 205, whilst for detector logic 40, the exponent of A is placed in register 200 and the exponent of B is placed in register 205. The inverter 210 inverts the exponent value X stored in register 200 prior to input to the 8-bit half adder, and the 8-bit half adder 215 is then arranged to perform the above equations 1 and 2 on each pair of bits received from registers 200, 205. In particular, as illustrated schematically in FIG. 3, within the 8-bit half adder 215 is provided eight 1-bit half adders 275, each 1-bit half adder 275 including an exclusive OR gate 280 and an AND gate 285. Given the earlier equations 1 and 2, it can be seen that the output from AND gate 285 is the carry value c′i+1 and the output from XOR gate 280 is the sum value s′i. The apostrophe after the c and s values is intended to indicate that these carry values and sum values are intermediate carry and sum values. Given the earlier discussed Theorem 2, a second level of half adder is required to perform a second half adder operation before the resultant sum value can be assessed to determine whether that sum value is −2. However, since in this implementation there is no interest in the resultant carry value, then the second half adder operation only needs to perform a partial half adder operation in order to generate the resultant sum data value, and accordingly instead of a second 8-bit half adder, the sequence of XOR gates 220, 225, 230, 235, 240, 245 and 250 can be used. These will implement the earlier mentioned equation 2 for i=1 to 7. Since by definition of the half adder form the bit zero of the intermediate carry value will be zero, this means by virtue of the earlier equation 2 that bit zero of the final sum value must be the same as bit zero of the intermediate sum value. As discussed earlier, if the final sum value is to be −2, this will require that all bits of the final sum value other than the least significant bit are 1, and that the least significant bit is 0. Accordingly, inverter 255 is used to invert bit zero of the intermediate sum value (equivalent to bit zero of the final sum value), as a result of which AND gate 260 will only output a logic one value if the final sum value is −2. This output from AND gate 260 is used as a shift signal to input to the associated shift logic 35, 45. Accordingly, if a logic one shift signal is produced by the detector 30, this will cause the shift logic 35 to shift the significand of the data element A right by 1 bit, whilst if alternatively a logic one shift signal is produced by the detector 40, this will cause the shift logic 45 to shift the significand of data element B right by 1 bit position. In addition to determining the shift signal, it is required that the detectors 30, 40 also detect whether it is appropriate to use the near processing path instead of the far processing path. This will be the case if either shift signal from the detectors 30, 40 is set, but will also be the case if in fact the exponents are equal. Accordingly, the detectors 30, 40 will typically also include logic for detecting whether the two exponents are equal, and it will be appreciated by those skilled in the art that such logic can be implemented in a variety of ways. With reference to FIG. 2, the output from such “difference equals zero” detect logic will be routed to OR gate 270 along with the shift signal output by AND gate 260, with the output of the OR gate 270 providing the select signal. Accordingly, the select signal will be set if either the shift signal is set or the output from a difference equals zero detector is set. This select signal, which is produced in pipeline stage N1, can be sent to enable logic to cause that enable logic to then disable the logic in the far processing path in the event that the select signal is set. Hence, this early generation of a select signal enables the far processing path to be turned off at an early stage in the event that the alignment condition required for using the near path is detected, thus allowing significant power savings to be achieved. In addition, since the detectors 30, 40 detect the actual presence of the required alignment condition for using the near path, rather than merely making a prediction about the presence of that alignment condition, it can be guaranteed that any shifts performed by the shift logic 35, 45 are correct. This means that the logic in pipeline stage N1 can be shared by both the near path logic and the far path logic, providing savings in terms of area and power. FIG. 4 is a block diagram illustrating an alternative configuration of the detector logic 30 or 40, in which the detection of both exponents being equal is performed directly by the logic that is being used to detect whether the exponents, differ by one. As can be seen by comparison of FIG. 4 with FIG. 2, the 8-bit AND gate 260 of FIG. 2 is replaced by a 7-bit input AND gate 300. Given the earlier discussions, it will be appreciated that if the exponents are equal, the sum value output by the detector logic will have a value of −1 (i.e. 11111111), whilst if the exponents differ by one the sum value will have a value of −2 (i.e. 11111110). Accordingly, if all bits other than the least significant bits are set to a logic one value, this will directly indicate that the select signal should be set, since this will confirm that the exponents either differ by one, or are equal. The condition that the exponents differ by one can then be captured by routing the output from AND gate 300 to the input of AND gate 310, which also receives the output from inverter 255. Hence, it can be seen that the logic of FIG. 4 will produce both the shift signal and the select signal, which can then be used in the manner described earlier with reference to FIG. 2. FIG. 5 is a flow diagram schematically illustrating the processing performed within each detector logic unit 30, 40. At step 400, one of the exponents is inverted and added to the other exponent in half adder logic in order to produce an intermediate carry value and an intermediate sum value. Then, at step 410, the computation si=c′iXOR s′i is performed for all bits of the intermediate carry and sum values other than the least significant bit. Meanwhile, at step 420, the least significant bit of the intermediate sum value is inverted. By reference to FIGS. 2 and 4, it will be appreciated that in one embodiment steps 410 and 420 are performed in parallel. Then, at step 430, it is determined whether the sum value produced is equal to −2, and if so the process proceeds to step 440, where the shift signal is set and the select signal is set. In FIG. 2, this occurs via the outputs from AND gate 260 and OR gate 270, whilst in FIG. 4 this occurs via the outputs from AND gates 300 and 310. If at step 430 it is determined that the sum value does not equal −2, then the shift signal is not set at step 450. The process then proceeds to step 460, where the select signal is then only set by the detector logic unit if the first and second exponents are detected to be equal. It will be appreciated that the process of FIG. 5 is performed independently within each detector logic unit 30, 40, with the detector logic 40 inverting the first exponent, whilst the detector 30 inverts the second exponent. The logic of FIG. 2 or 4 provides a particularly efficient technique for allowing quick detection of a difference of one between the exponents of the two input floating point data elements. For example, with reference to the embodiment of FIG. 2, the delay for an 8-bit implementation will be the delay of two XOR gates followed by an 8-input AND function (for example logic equivalent to an 8-input AND gate). This computation can be performed in the first pipeline stage N1 to enable the shift and select signals to be generated during that first pipeline stage. Returning to FIG. 1, it can be seen that the outputs from the shift logic 35 and the shift logic 45 are latched in the registers 55, 60, respectively, and accordingly these registers will store the 24-bit significands of the input data elements A and B, shifted one place to the right as appropriate. In pipeline stage N2, it is required to determine the absolute difference between these stored significand values (the absolute difference being the magnitude of the difference between the two data elements, expressed as a positive value). One known approach for performing such an absolute difference computation is to use an end around carry adder such as that illustrated in FIG. 7. As shown in FIG. 7, the significand from data element B is inverted prior to input to the end around carry adder 600, with the significand of data element A being input without inversion. The carry out from the adder 600 is routed via path 610 as a carry in to the adder. The output from the end around carry adder is routed via path 620 to one input of the multiplexer 630, and is also routed via path 625 where it is inverted prior to input to the other input of the multiplexer 630. If the significand of A is larger than the significand of B, then this will be indicated by a logic zero value in the most significant bit position of the output from the end around carry adder 600, and hence this most significant bit can be routed over path 615 to control the output from the multiplexer 630. Similarly, if the significand of A is less than the significand of B, then the output from the end around carry adder will be negative (as indicated by a logic one value in the most significant bit position), and negation of the result is required in order to produce the absolute difference value. This can be achieved by using the most significant bit of the output from the end around carry adder to select as the output from the multiplexer 630 the signal received at the second input of that multiplexer (i.e. an inverted version of the output from the end around carry adder). However, such an end around carry adder is relatively slow when compared with a normal adder, and this speed problem is compounded by the fact that the selection of the output or the inverted version of the output can only be made once the most significant bit of the output from the end around carry adder is known. As cycle times reduce, it is envisaged that there will be insufficient time in the pipeline stage N2 for the use of such an end around carry adder to compute the absolute difference. As an alternative to using such an end around carry adder, an approach can be used where a determination is made as to which of the first and second data elements is the larger, with the ordering of the significand values then being swapped if required prior to input to a normal adder. This approach can ensure that when the normal adder is used to subtract one significand from the other, the significand of the smaller data element is the one that is subtracted from the other significand, thereby ensuring that the output from the adder is a positive value. However, as cycle times decrease, it is envisaged that there will be insufficient time in pipeline stage N2 to allow such swapping of the significand values to take place prior to input to the adder. In accordance with the embodiment illustrated in FIG. 1, absolute difference logic is provided in pipeline stage 2 consisting of the inverter 70, the adder 80, the inverter 85 and the multiplexer 90. The adder 80 and the multiplexer 90 receive a signal stored in the carry register 65, this signal being generated by logic 50 provided in pipeline stage N1. In the example illustrated in FIG. 1, this logic 50 is arranged to receive the exponent and fraction portions from both input data elements A and B, and to detect which of the data elements is the largest. It will be appreciated by those skilled in the art that the logic 50 can be arranged in a variety of ways. However, in one embodiment, the logic 50 is arranged to perform a non-redundant subtract operation on its two input values, with a comparison result being output for storage in the carry register 65 which comprises a carry out result of the non-redundant subtract operation. In particular, the comparison result is set to a logic one value if the data element A is larger than or equal to the data element B, and is set to a logic zero value if the data element B is larger than the data element A. Before discussing the operation of the absolute difference logic employed in pipeline stage N2, the following discussion is provided to indicate why the value of the carry signal stored in the carry register 65 can be arranged to ensure that the absolute difference logic produces a positive result without the need to provide logic for selectively swapping the ordering of the significand values before they are input to the absolute difference logic. A two's complement adder produces a difference by inverting the minuend, and then adding it to the subtrahend with a carry-in of one. This works because for two's complement numbers, A−B=A+{overscore (B)}+1. In the present context, the significand values are unsigned values that can be treated as two's complement numbers. The technique of the present embodiment is to manipulate the carry-in to the adder based on the magnitude comparison done in the preceding cycle by logic 50. Suppose that A≧B. In this case, A−B is positive, so we set the carry-in to one and compute A+{overscore (B)}+1. Now suppose A<B. In this case, A−B is negative, and in order to easily compute the absolute value, we set carry-in to zero and compute A+{overscore (B)}, and then invert the sum to get |A−B|. The reason this works is that, for two's complement numbers, −X={overscore (X)}+1, and so {overscore (X)}=−X−1, which means that X={double overscore (X)}={overscore (−X−1)}. This means that if we compute −X−1, then we can get X with a simple inversion. With respect to our original problem, −X=A−B, and −X−1=A−B−1=A+{overscore (B)}. Accordingly, returning to FIG. 1, it can be seen that the output from register 60 is inverted by inverter 70 and then provided as one of the inputs to the adder 80. The other input of the adder logic 80 is the significand value stored in the register 55. If the carry value in register 65 is set to one, indicating that data element A is larger than data element B, then a carry-in of one will be fed to the adder 80, and the output from the adder 80 will correctly identify the absolute difference value. Accordingly, the same logic one value from the carry register 65 can be used to cause the multiplexer 90 to output the output from the adder 80 directly for storage in the sum register 100. However, if the value in the carry register 65 is a logic zero value, then the adder 80 will receive a logic zero value as a carry-in, and the output from the adder 80 will need to be inverted in order to produce the absolute difference value. This is achieved by using the carry value from the carry register 65 to drive the multiplexer 90, which in this scenario will cause the multiplexer to output to the sum register 100 the inverted input received via inverter 85. Accordingly, it can be seen that through the use of the absolute difference logic illustrated in pipeline stage N2 of FIG. 1, the absolute difference value can be generated and stored in the sum register 100 without the need to provide any means for swapping the ordering of the inputs to the adder 80. This provides a significant performance improvement, which ensures that the absolute difference can be calculated in a single pipeline stage N2. As mentioned earlier, when the input floating point data elements require at most a 1-bit alignment, then it is possible that when performing an unlike-signed addition operation within the near path logic, massive cancellation may occur. This means that when logically subtracting one significand value from the other, the result may have a significant number of leading zeros. The presence of such leading zeros is detected by the leading zero adjust detector 75 which is arranged to receive the output from register 55 and the inverted version of the output from register 60 as produced by inverter 70. The leading zero adjust detector 75 is constructed in a standard manner, and produces a 5-bit output signal identifying the number of leading zeros predicted to exist in the sum stored in the register 100, this value being stored in the register 95. Normalisation logic 105 is then provided in pipeline stage N3 for normalising the value stored in the register 100 based on the LZA value output from register 95. As will be appreciated by those skilled in the art, since the leading zero adjust detector 75 is an anticipator of the number of leading zeros, it is possible that the adjustment performed by the normalisation logic 105 is out by 1 bit. Hence, once the normalised result has been produced by the normalisation logic 105, the output is evaluated to check whether the most significant bit is a logic one value. If it is, then no further adjustment is required, whereas if the most significant bit is a logic zero value, then a further 1-bit adjustment is performed within the 1-bit adjustment logic 110, whereafter the result is stored in the register 115. The result in the register 115 is the result of the unlike-signed addition operation performed by the near path logic. In pipeline stage N4, this is routed to a multiplexer 120, which is also arranged to receive the result from the far path, such that one of the results can be selected for storing in the adder result register 125 as the result of the unlike-signed addition operation. As mentioned earlier, in preferred embodiments, if the select signal from either detector 30, 40 is set in pipeline stage N1, then this indicates that the near path should be used to perform the operation rather than the far path, and accordingly a signal derived from this select signal can be used to control the multiplexer 120. In one embodiment of the present invention, each input operand to the data processing apparatus only includes a single floating point data element. However, in an alternative embodiment, a Single Instruction Multiple Data (SIMD) processing is performed by the data processing apparatus, in which event each input operand will comprise a plurality of floating point data elements. In such embodiments, it is envisaged that the logic of FIG. 1 will be replicated for each pair of first and second floating point data elements provided by the input operands. Accordingly, a pair of first and second floating point data elements extracted from first and second operands will be stored in the registers 10, 20, with the logic of FIG. 1 then being replicated for each pair of first and second floating point data elements. The absolute difference logic described earlier can also be applied in a data processing apparatus used to manipulate integer data elements, as is illustrated by FIG. 6. In the example of FIG. 6, the first integer data element is stored in register 500 and the second integer data element is stored in register 505. In pipeline stage N1, the logic 510 is arranged to receive the first and second integer data elements and to determine which is the largest value, with a comparison result being output for storing in the carry value register 525 indicative of the result of that comparison. As will be discussed later, the logic 510 can actually be arranged to produce a plurality of comparison results in the event that SIMD processing is being performed, but for the time being we will assume that only a single integer data element is included within each input operand, and that accordingly the logic 510 produces a single comparison result (i.e. n=1). The contents of the registers 500 and 505 pass directly through stage N1, where they are stored in registers 515, 520, respectively. Thereafter, the outputs of these registers 515 and 520 are routed through the absolute difference logic 530, 535, 540, 545, which operates in an identical manner to that discussed earlier with reference to the absolute difference logic 70, 80, 85, 90 of FIG. 1. This results in an absolute difference result being output from the multiplexer 545 for storing in the result register 550. In one embodiment, it is envisaged that integer SIMD processing may be performed within the data processing apparatus, in which event a first operand will comprise a plurality of first integer data elements and a second operand will comprise a plurality of second integer data elements. In such embodiments, the entire operands are stored in the registers 500, 505, with the logic 510 being operable to receive the first and second operands and to produce, for each pair of first and second integer data elements provided by the first and second operands, an associated comparison result for storing in the carry value register 525. Accordingly, if, for the sake of example, four integer data elements are included within each input operand, a 4-bit value will be output from the logic 510 for storing in the carry value register 525. In the general sense, an n-bit value is output from the logic 510 for storing in the carry value register 525, where n is equal to the number of integer data elements contained within each input operand. Considering now pipeline stage N2, the inverter 530 will invert the entirety of the second operand B prior to inputting that inverted version of the operand to the adder 535. For each pair of first and second integer data elements, the adder 535 will then add the associated inverted data element from the second operand to the corresponding data element from the first operand and to the associated comparison result received from the carry value register 525 in order to produce an associated intermediate result. This will result in the output from the adder 535 containing a sequence of n intermediate results, with this sequence being inverted by inverter 540 to create an inverted sequence. The multiplexer 545 is then arranged, for each pair of first and second integer data elements, to output as the associated absolute difference either the associated intermediate result or the inverted version of the associated intermediate result dependent on the associated comparison result received from the carry value register 525. Accordingly, it can be seen that when performing integer arithmetic, a single block of absolute difference logic, and associated comparison logic 510 can be used to calculate in parallel the absolute difference for a plurality of pairs of integer data elements contained within the pair of input operands. FIG. 8 is a block diagram illustrating the process performed when computing an absolute difference for first and second data elements when using the logic of either FIG. 1 or FIG. 6. For simplicity, FIG. 8 considers the non-SIMD approach. At step 700, the first and second data elements are compared and a comparison result is produced indicative of which data element is the larger data element. At step 710, it is then determined whether the comparison result indicates that the first data element is greater than or equal to the second data element. If this is the case, then the process proceeds to step 720, where the data element A is added to the inverted version of the data element B and added to a logic one value in order to generate the absolute difference. However, if at step 710 it is determined that the comparison result indicates that the second data element is greater than the first data element, then process proceeds to step 730, where the data element A is added to the inverted version of the data element B to generate an intermediate result. Thereafter, at step 740, the intermediate result is inverted in order to generate the absolute difference. By using the absolute difference logic discussed above with reference to FIGS. 1 and 6, the generation of the absolute difference can be produced in a particularly efficient manner. In particular, the critical path for the implementation of the absolute difference logic is the path involving a subtraction, inversion, and then the driving a two-input multiplexer. This provides a significantly faster implementation than the known prior art techniques. Although a particular embodiment of the invention has been described herein, it will be apparent that the invention is not limited thereto, and that many modifications and additions may be made within the scope of the invention. For example, various combinations of the features of the following dependent claims could be made with the features of the independent claims without departing from the scope of the present invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a data processing apparatus and method for determining a processing path to perform a data processing operation on input data elements. 2. Description of the Prior Art A data processing apparatus may be arranged to perform a data processing operation on various types of data element. One type of data element which may be subjected to such data processing operations is the floating point data element. A floating point number can be expressed as follows: in-line-formulae description="In-line Formulae" end="lead"? ±1.x*2 y in-line-formulae description="In-line Formulae" end="tail"? where: x=fraction 1.x=significand (also known as the mantissa) y=exponent When performing a data processing operation on floating point data elements, a number of eventualities have to be catered for in the processing logic path, and accordingly extra logic needs to be included in the data processing path to perform the required processing dictated by these eventualities (for example rounding, normalization, etc). This often means that the processing path for performing the data processing operation is relatively long, which can have an impact on processing speed. As an example, in a pipelined data processing apparatus used to perform such data processing operations, a relatively large number of pipeline stages may be required to ensure that all of the necessary logic elements required to cover the various eventualities is provided. For certain data processing operations, for example floating-point addition, it is known to provide within the processing logic different processing paths, each of which is capable of performing the data processing operation under certain conditions. As an example, for floating-point addition, it is known to provide a near processing path and a far processing path, as for example is discussed in the paper “1-GHz HAL SPARC64 Dual Floating Point Unit with RAS Features” by A Naini et al, Proceedings of the 15th EEE Symposium on Computer Architecture, 2001. The near path can be used if the first and second floating point data elements require at most a 1-bit alignment, whereas otherwise the far path needs to be used. When the input floating point data elements require at most a 1-bit alignment, it is possible that when performing an unlike-signed addition (i.e. equivalent to subtracting one data element from the other) massive cancellation may occur, and to enable the resultant floating point value to be correctly aligned, it is then necessary to provide normalisation logic within the near path. Such logic is not required in the far path. However, in the far path, it is necessary to provide rounding logic due to the fact that the data elements may need more than a 1-bit alignment. Such rounding logic is not required in the near path. Accordingly, by providing a near path and a far path, the length of each path can be made shorter than would be the case if a single unitary path were provided for performing the data processing operation, and this can hence produce an increase in processing speed. For example, considering the earlier pipelined processing logic example, the pipeline depth can be reduced by using a near path and a far path, which can give rise to increase in processing speed when compared with a unitary processing path. However, one problem that arises when providing more than one processing path for performing the data processing operation is in determining whether the alignment condition required for using any particular path does in fact exist. In accordance with the technique discussed in the above-mentioned paper from the 15th IEEE Symposium on Computer Arithmetic, prediction logic is used to predict whether the alignment condition for the near path exists, which can make an early prediction as to whether the alignment condition for the near path appears to exist. However, predicted results by their very nature will not necessarily be true, and accordingly it is necessary to perform the processing in both the near path and the far path until such time as the presence of the alignment condition can actually be determined. Hence, whilst the predicted result can be used to perform some initial processing, for example shifting, in the near path, it is not until the actual alignment condition is positively determined that the result from any particular path can be used. Hence, such an approach is not very power efficient, since the data processing operation needs to be performed in both processing paths. Further, this has some impact on the area required for the processing logic, since further logic is needed in addition to the prediction logic to perform the actual detection of the alignment condition at a later stage in the processing path, and to manage the computations being performed within several different processing paths. A further problem is that because the prediction may be wrong, any assumptions made in an early part of the near processing path based on that prediction cannot be used in the far processing path, since if the prediction proves wrong it will be necessary to rely on the processing performed in the far processing path in order to generate the correct result. Accordingly, there is no opportunity to share logic between the near and far processing paths, which again leads to an implementation which is inefficient in terms of size of the processing logic, and in terms of power consumption. It is an object of the present invention to provide an improved technique for determining a processing path to be used to perform a data processing operation on input data elements.
<SOH> SUMMARY OF THE INVENTION <EOH>Viewed from a first aspect, the present invention provides a data processing apparatus for performing a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus comprising: processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists; at least one detector logic unit operable to receive both said first exponent and said second exponent, and to detect the presence of said predetermined alignment condition, each detector logic unit comprising: half adder logic operable to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and generation logic operable to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; the processing logic being operable to select the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set. In accordance with the present invention, a detector logic unit is provided which can detect the presence of the predetermined alignment condition required for using a first processing path, and which can be used instead of the prediction logic used in the prior art. The detector logic unit of the present invention employs half adder logic to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents. A half adder operation typically produces a carry data value and a sum data value. In particular, if it is assumed that the first and second floating point data elements are X and Y where X=x n−1 . . . x 1 x 0 , and Y=y n−1 . . . y 1 y 0 are n-bit words with low order bits x 0 and y 0 , an n-bit half adder produces a carry word C=c n−1 . . . c 1 0 and a sum word S=s n−1 . . . s 1 s 0 such that in-line-formulae description="In-line Formulae" end="lead"? carry c i =x i−1 AND y i−1 (1) in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? sum s i =x i XOR y i (2) in-line-formulae description="In-line Formulae" end="tail"? By adding C and S together, it will be possible to determine whether the predetermined alignment condition exists, but in practice there would be insufficient time to perform that addition early enough to enable the output to be used at an early stage to select the required processing path to perform the data processing operation. Only if the detection of the alignment condition can be determined at an early stage can significant savings in power and area be achieved relative to the earlier described prior art techniques. The inventors of the present invention realised that the properties of the half-adder form (C,S) dictated by the above equations (1) and (2) mean that it is possible, once a number of half adder operations have been performed, to determine the presence of the predetermined alignment condition from the sum data value alone. Accordingly, the detector logic unit of the present invention arranges the half adder logic to produce at least a sum data value of the sum and carry data values representing the result of the number of half adder operations, and generation logic is then provided to receive the sum data value and to generate a select signal which is set if the sum data value has a predetermined value indicating the existence of the predetermined alignment condition. This means that there is no requirement to add together the carry data value C and the sum data value S, and this enables the existence of the predetermined alignment condition to be detected significantly more quickly than was previously thought possible. Accordingly, through use of the present invention it is possible for the processing logic to be operable to select the first data processing path to perform the data processing operation if the select signal from one of the at least one detector logic units is set. Because of the speed with which the detector logic unit of the present invention detects the presence of the predetermined alignment condition, this selection can be performed at an early stage in the processing path, and hence allow significant savings to be made in terms of both power and area. The number of half adder operations performed by the half adder logic will vary dependent on the predetermined alignment condition to be detected. However, in one embodiment, the number of half adder operations performed by the half adder logic is a plurality of half adder operations. In one embodiment, if the select signal from one of said at least one detector logic units is set, the processing logic is operable to prevent performance of the data processing operation in the processing paths other than the first processing path. This is possible due to the fact that the detector logic unit is able to detect the presence of the predetermined alignment condition significantly more quickly than known detectors, and in particular early enough to enable the processing paths other than the first processing path to be turned off to conserve power. It will be appreciated that there are a number of ways to prevent performance of the data processing operation in the processing paths other than the first processing path. In one particular embodiment, this is done by routing the select signal to logic which generates enable signals for the various components in the processing paths, with this logic then being arranged to disable the logic elements in the processing paths other than the first processing path upon receipt of a set select signal. It will be appreciated that the predetermined alignment condition may take a variety of forms dependent on, for example, the data processing operation being performed. However, in one embodiment, the predetermined alignment condition specifies that the first and second floating point data elements require at most a one-bit alignment, and the at least one detector logic unit is operable to detect whether the first and second exponents differ by one by determining whether the sum value has a value of −2, if the sum value has a value of −2 the at least one detector logic unit being operable to generate a shift signal in addition to the select signal. If the first and second exponents differ by one, then it is appropriate to shift the mantissa of one of the data elements so that they are aligned prior to performing the data processing operation. Accordingly, this shift signal can be routed to the logic within the first processing path used to perform such a shift. In such an embodiment, it will be appreciated that the select signal will be set if the first and second exponents differ by one. However, in addition, the select signal should still be set if the first and second floating point data elements are actually aligned. A separate zero-alignment detector can be used to make that detection, with the select signal then being produced if either the zero-alignment detector detects a zero-alignment, or the at least one detector logic unit detects a sum value of −2 (i.e. detects that the first and second exponents differ by one). However, in one embodiment of the present invention the at least one detector logic unit is operable to detect whether the first and second exponents are equal or differ by one by determining whether the sum value has a value of −1 or −2, if the sum value has a value of −1 or −2 the at least one detector logic unit being operable to generate the select signal. Accordingly, in such an embodiment, the at least one detector logic unit detects when the first and second exponents differ by one and also detects if a first and second exponents are equal, if they are equal this being indicated by the sum value having a value of −1. It will be appreciated that the half adder logic within each of the at least one detector logic units can take a variety of forms. However, in one embodiment, both the first and second exponents have n bits, and the half adder logic comprises: first n-bit half adder logic operable to perform a first half adder operation to logically subtract said one exponent from said other exponent to produce an intermediate sum value and an intermediate carry value; and additional logic operable to perform at least a partial second half adder operation to logically add the intermediate sum value and intermediate carry value to generate said sum value. It is possible for second n-bit half adder logic to be used instead of the additional logic referenced above, but since the generation logic only needs to use the sum data value in order to determine whether to generate a select signal, then the additional logic can be used instead of a second n-bit half adder logic to provide a more efficient implementation of the half adder logic. It will be appreciated that the additional logic may be constructed in a variety of ways. However in one embodiment, the additional logic comprises XOR logic operable to perform an XOR operation on corresponding bits of the intermediate sum value and the intermediate carry value other than the least significant bit. The processing logic may take a variety for forms. However, in one embodiment the processing logic has a plurality of pipeline stages, and each processing path comprises multiple pipeline stages, the at least one detector logic unit being operable to generate the shift signal for input to a first pipeline stage of the first processing path, this first pipeline stage containing shift logic, and the shift signal being used to control the operation of the shift logic. Hence, the at least one detector logic is able to generate the shift signal in time for it to be input to a first pipeline stage of the first processing path, thus enabling any necessary shift of one of the data elements to take place prior to performing the data processing operation. Further, since this shift signal is based on an actual detection of the presence of the predetermined alignment condition, rather than merely a prediction of it, this means that the shift is guaranteed to be correct, and accordingly no further logic is required later in the processing paths to account for a situation in which an incorrect shift is made (as would be the case if the shift was based on a prediction). In one particular embodiment, the first floating point data element specifies a first mantissa and the second floating point data element specifies a second mantissa, and the shift logic comprises first shift logic provided to selectively perform a shift operation on the first mantissa and second shift logic provided to selectively perform a shift operation on the second mantissa, the at least one detector logic unit comprising a first detector logic unit associated with the first shift logic and a second detector logic unit associated with the second shift logic, the half adder logic of the first detector logic unit being operable to logically subtract the first exponent from the second exponent and the half adder logic of the second detector logic unit being operable to logically subtract the second exponent from the first exponent. It will be appreciated that the multiple processing paths may incorporate entirely separate logic. However, since the shifting performed within the first pipeline stage of the first processing path is based on an exact determination of the presence of the predetermined alignment condition (rather than just a prediction), it can be guaranteed that any shift performed is appropriate, and accordingly in one embodiment the first pipeline stage is common to the multiple processing paths. This enables a reduction in area of the processing logic and can also give rise to a reduction in power consumption. It will be appreciated that the data processing operation can take a variety of forms. However, in one embodiment the data processing operation is an unlike-signed addition operation. The first processing path can be arranged to allow such an unlike-signed addition operation to be performed in a particularly efficient manner in situations where the predetermined alignment condition is determined to exist. Viewed from a second aspect, the present invention provides a method of determining a processing path of a data processing apparatus to perform a data processing operation on first and second floating point data elements, the first floating point data element specifying a first exponent and the second floating point data element specifying a second exponent, the data processing apparatus having processing logic providing multiple processing paths which are selectable to perform the data processing operation, including a first processing path operable to perform the data processing operation if a predetermined alignment condition exists, the method comprising the steps of: (a) providing at least one detector logic unit which receive both said first exponent and said second exponent, and within each detector logic unit detecting the presence of said predetermined alignment condition by performing the steps of: (a)(i) employing half adder logic to perform a number of half adder operations to logically subtract one of the first and second exponents from the other of the first and second exponents to produce at least a sum data value of sum and carry data values representing the result of the number of half adder operations; and (a)(ii) generating a select signal which is set if the sum data value has a predetermined value indicating the existence of said predetermined alignment condition; (b) selecting the first data processing path to perform the data processing operation if the select signal from one of said at least one detector logic units is set.
20040318
20080408
20050922
58188.0
0
MALZAHN, DAVID H
DATA PROCESSING APPARATUS AND METHOD FOR DETERMINING A PROCESSING PATH TO PERFORM A DATA PROCESSING OPERATION ON INPUT DATA ELEMENTS
UNDISCOUNTED
0
ACCEPTED
2,004
10,803,694
ACCEPTED
Electrically conductive compositions and method of manufacture thereof
A method for manufacturing a conductive composition comprises blending a polymer precursor with a single wall carbon nanotube composition; and polymerizing the polymer precursor to form an organic polymer. The method may be advantageously used for manufacturing automotive components, computer components, and other components where electrical conductivity properties are desirable.
1. A method for manufacturing a conductive composition comprising: blending a polymer precursor with a single wall carbon nanotube composition; and polymerizing the polymer precursor to form an organic polymer. 2. The method of claim 1 wherein the composition has an electrical bulk volume resistivity less than or equal to about 1012 ohm-cm, and a notched Izod impact strength greater than or equal to about 5 kilojoules/square meter. 3. The method of claim 1 wherein the composition has an electrical surface resistivity less than or equal to about 1012 ohm/square. 4. The method of claim 1, wherein the polymer precursor has the structure (I): wherein for each structural unit, each Q1 is independently hydrogen, halogen, primary or secondary lower alkyl, phenyl, haloalkyl, aminoalkyl, hydrocarbonoxy, halohydrocarbonoxy wherein at least two carbon atoms separate the halogen and oxygen atoms; and each Q2 is independently hydrogen, halogen, primary or secondary lower alkyl, phenyl, haloalkyl, hydrocarbonoxy, halohydrocarbonoxy wherein at least two carbon atoms separate the halogen and oxygen atoms. 5. The method of claim 1, wherein the polymer precursors are 2,6-dimethylphenol and 2,3,6-trimethylphenol. 6. The method of claim 1, wherein the organic polymer is the polymerization product of carbonyl compounds and dihydroxy compounds, wherein the dihydroxy compounds have the general formula (IV) HO-A2—OH (IV) wherein A2 has the structure of formula (V): wherein G1 represents an aromatic group, E represents an alkylene, alkylidene group or a cycloaliphatic group, R1 represents hydrogen or a monovalent hydrocarbon group, Y1 is an inorganic atom, m represents any integer from and including zero through the number of positions on G1 available for substitution; p represents an integer from and including zero through the number of positions on E available for substitution; t represents an integer equal to at least one; s is either zero or one; and u represents any integer including zero. 7. The method of claim 1, wherein the organic polymer is a polyester polymer having recurring units of the formula (VIII): wherein R3 represents an aryl, alkyl or cycloalkyl radical having greater than or equal to about 2 carbon atoms and which is the residue of a straight chain, branched, or cycloaliphatic alkane diol; and R4 is an aryl, alkyl or a cycloaliphatic radical. 8. The method of claim 7, wherein the polyester is the polymerization product of a diol or diol chemical equivalent with a diacid or diacid chemical equivalent. 9. The method of claim 7, wherein the polyester is poly(1,4-cyclohexane-dimethanol-1,4-cyclohexanedicarboxylate) having recurring units of formula (IX) 10. The method of claim 7, wherein the polyester is the polymerization product of an aromatic dicarboxylic acid with a bisphenol. 11. The method of claim 1, wherein the organic polymer comprises structural units of the formula (XIV) wherein each R1 is independently halogen or C1-12 alkyl, m is at least 1, p is up to about 3, each R2 is independently a divalent organic radical, and n is at least about 4. 12. The method of claim 1, wherein the organic polymer is the polymerization product of a polymer precursor of the formula (XV): wherein R5 is hydrogen lower alkyl or halogen; Z1 is vinyl, halogen or lower alkyl; and p is from 0 to about 5. 13. The method of claim 1, wherein the organic polymer is a copolymer of styrene. 14. The method of claim 1, wherein the organic polymer is a polyimide having the general formula (XVI) wherein a is greater than or equal to about 1; and wherein V is a tetravalent linker comprising (a) substituted or unsubstituted, saturated, unsaturated or aromatic monocyclic and polycyclic groups having about 5 to about 50 carbon atoms, (b) substituted or unsubstituted linear or branched, saturated or unsaturated alkyl groups having 1 to about 30 carbon atoms; or combinations of the foregoing tetravalent linkers; R is a substituted or unsubstituted divalent aromatic hydrocarbon radical having about 6 to about 20 carbon atoms, a straight or branched chain alkylene radical having about 2 to about 20 carbon atoms, a cycloalkylene radical having about 3 to about 20 carbon atoms, or a divalent radicals of the general formula (XIX) wherein Q includes a divalent moiety selected from the group consisting of —O, —S—, —C(O)—, —SO2—, —SO—, —CyH2y— or its halogenated derivatives an y is about 1 to about 5. 15. The method of claim 14, wherein the tetravalent linker comprises aromatic radicals of formula (XVII), wherein W is —O—, —S—, —C(O)—, —SO2—, —SO—, —CyH2y— or halogenated derivatives thereof, wherein y is from 1 to 5, or a group of the formula —O-Z-O— wherein the divalent bonds of the —O— or the —O-Z-O— group are in the 3,3′, 3,4′, 4,3′, or the 4,4′ positions, and wherein Z is a divalent radical of formula (XVIII) 16. The method of claim 1, wherein the organic polymer is a polyamide that is the polymerization product of organic lactams represented by the formula (XXVII) wherein n is about 3 to about 11 and amino acids represented by the formula (XXVIII) wherein n is about 3 to about 11. 17. The method of claim 1, wherein the organic polymer is a polyamide that is the polymerization product of aliphatic dicarboxylic acids having from 4 to 12 carbon atoms and aliphatic diamines having from 2 to 12 carbon atoms. 18. The method of claim 1, wherein the organic polymer is a polyamide that is the polymerization product of a first polyamide with a second polyamide; wherein the first polyamide comprises repeating units having formula (XXX) wherein R1 is a branched or unbranched alkyl group having nine carbons; and wherein the second polyamide comprises repeating units having formula (XXXI) and/or formula (XXXII) wherein R2 is a branched or unbranched alkyl group having four to seven carbons and R3 is an aromatic group having six carbons or a branched or unbranched alkyl group having four to seven carbons. 19. The method of claim 1, wherein the polymer precursor is an ethylenically unsaturated monomer. 20. The method of claim 1, wherein the organic polymer is a polyacetal, a polyacrylic, a polyalkyd, a polyacrylate, a polycarbonate, a polystyrene, a polyester, a polyamide, a polyaramid, a polyamideimide, a polyarylate, a polyarylsulfone, a polyethersulfone, a polyphenylene sulfide, a polysulfone, a polyimide, a polyetherimide, a polytetrafluoroethylene, a polyetherketone, a polyether etherketone, a polyether ketone ketone, a polybenzoxazole, a polyoxadiazole, a polybenzothiazinophenothiazine, a polybenzothiazole, a polypyrazinoquinoxaline, a polypyromellitimide, a polyquinoxaline, a polybenzimidazole, a polyoxindole, a polyoxoisoindoline, a polydioxoisoindoline, a polytriazine, a polypyridazine, a polypiperazine, a polypyridine, a polypiperidine, a polytriazole, a polypyrazole, a polycarborane, a polyoxabicyclononane, a polydibenzofuran, a polyphthalide, a polyacetal, a polyanhydride, a polyvinyl ether, a polyvinyl thioether, a polyvinyl alcohol, a polyvinyl ketone, a polyvinyl halide, a polyvinyl nitrile, a polyvinyl ester, a polysulfonate, a polysulfide, a polythioester, a polysulfone, a polysulfonamide, a polyurea, a polyphosphazene, a polysilazane, or a combination comprising at least one of the foregoing thermoplastic polymers. 21. The method of claim 1, further comprising carbon nanotubes, wherein the carbon nanotubes are multiwall carbon nanotubes, vapor grown carbon fibers, or a combination comprising at least one of the foregoing types of carbon nanotubes. 22. The method of claim 1, wherein the single wall carbon nanotubes have an inherent electrical conductivity of about 104 Siemens/centimeter. 23. The method of claim 1, wherein the single wall carbon nanotube composition comprises single wall carbon nanotubes in the form of ropes prior to processing and wherein the composition comprises a single wall carbon nanotube network in three dimensions after processing. 24. The method of claim 1, wherein the single wall carbon nanotube composition comprises metallic carbon nanotubes, semi-conducting carbon nanotubes, or a combination comprising at least one of the foregoing single wall carbon nanotubes. 25. The method of claim 1, wherein the single wall carbon nanotube composition comprises about 1 to about 99 wt % metallic carbon nanotubes. 26. The method of claim 1, wherein the single wall carbon nanotube composition comprises about 1 to about 99 wt % semi-conducting carbon nanotubes. 27. The method of claim 1, wherein the single wall carbon nanotube composition comprises single wall carbon nanotubes, and wherein the single wall carbon nanotubes are armchair nanotubes, zigzag nanotubes, or a combination comprising at least one of the foregoing nanotubes. 28. The method of claim 1, wherein at least a portion of the single wall carbon nanotube composition is derivatized with functional groups. 29. The method of claim 1, wherein the single wall carbon nanotube composition comprises at least a portion of single wall carbon nanotubes derivatized with functional groups either on a side-wall or on a hemispherical end. 30. The method of claim 1, wherein the single wall carbon nanotube composition comprises at least a portion of single wall carbon nanotubes having no hemispherical ends attached thereto or have at least one hemispherical end attached thereto. 31. The method of claim 1, wherein the blending is accomplished through sonicating. 32. The method of claim 1, further comprising adding a solvent prior to sonication. 33. The method of claim 1, wherein the blending is accomplished in a solution comprising a solvent. 34. The method of claim 1, wherein the blending is accomplished in the melt. 35. The method of claim 1, wherein the composition is used as a masterbatch. 36. The method of claim 1, wherein the composition is further blended with additional organic polymer. 37. The method of claim 1, wherein the organic polymer is semi-crystalline or amorphous and has a molecular weight of about 100 g/mole to about 1,000,000 g/mole. 38. The method of claim 1, wherein the blending involves the use of shear force, extensional force, compressive force, ultrasonic energy, electromagnetic energy, thermal energy or combinations comprising at least one of the foregoing forces and energies and is conducted in processing equipment wherein the aforementioned forces are exerted by a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, barrels with pins, screen packs, rolls, rams, helical rotors, baffles, ultrasonicator or combinations comprising at least one of the foregoing. 39. The method of claim 1, wherein the blending is conducted in a kettle, while the polymerization is conducted in a device having a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, screws with screens, barrels with pins, rolls, rams, helical rotors, baffles, or a combination comprising at least one of the foregoing. 40. An article manufactured by the method of claim 1. 41. A method for manufacturing a conductive composition comprising: blending a polymer precursor with a single wall carbon nanotube composition; and polymerizing the polymer precursor to form an organic polymer; wherein the composition has an electrical bulk volume resistivity less than or equal to about 1012 ohm-cm, and a notched Izod impact strength greater than or equal to about 5 kilojoules/square meter. 42. The method of claim 41, wherein the composition has a Class A surface finish. 43. The method of claim 41, wherein the composition comprises about 0.001 to about 5 wt %, based upon the total weight of the composition. 44. The method of claim 41, further comprising carbon nanotubes, wherein the carbon nanotubes are multiwall carbon nanotubes, vapor grown carbon fibers, or a combination comprising at least one of the foregoing types of carbon nanotubes. 45. The method of claim 41, wherein the single wall carbon nanotube composition comprises single wall carbon nanotubes in the form of ropes prior to processing and wherein the composition comprises a single wall carbon nanotube network in three dimensions after processing. 46. The method of claim 41 wherein the single wall carbon nanotube composition comprises metallic carbon nanotubes, semi-conducting carbon nanotubes, or a combination comprising at least one of the foregoing single wall carbon nanotubes. 47. The method of claim 41, wherein the single wall carbon nanotube composition comprises about 30 to about 99 wt % metallic carbon nanotubes. 48. The method of claim 41, wherein the single wall carbon nanotube composition comprises about 50 to about 99 wt % metallic carbon nanotubes. 49. The method of claim 41, wherein the single wall carbon nanotube composition comprises about 30 to about 99 wt % semi-conducting carbon nanotubes. 50. The method of claim 41, wherein the single wall carbon nanotube composition comprises about 50 to about 99 wt % semi-conducting carbon nanotubes. 51. The method of claim 41, wherein at least a portion of the single wall carbon nanotube composition is derivatized with functional groups. 52. The method of claim 41, wherein the single wall carbon nanotube composition comprises at least a portion of single wall carbon nanotubes derivatized with functional groups either on a side-wall or on a hemispherical end. 53. The method of claim 41, wherein the single wall carbon nanotube composition comprises at least a portion of single wall carbon nanotubes having no hemispherical ends attached thereto or have at least one hemispherical end attached thereto. 54. The method of claim 41, wherein the blending is accomplished through sonicating. 55. The method of claim 41, wherein the blending is accomplished in the melt. 56. The method of claim 41, wherein the composition is used as a masterbatch. 57. The method of claim 41, wherein the composition is further blended with additional organic polymer. 58. The method of claim 41, wherein the blending involves the use of shear force, extensional force, compressive force, ultrasonic energy, electromagnetic energy, thermal energy or combinations comprising at least one of the foregoing forces and energies and is conducted in processing equipment wherein the aforementioned forces are exerted by a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, barrels with pins, screen packs, rolls, rams, helical rotors, baffles, ultrasonicator or combinations comprising at least one of the foregoing. 59. The method of claim 41, wherein the blending is conducted in a kettle, while the polymerization is conducted in a device having a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, screws with screens, barrels with pins, rolls, rams, helical rotors, baffles, or a combination comprising at least one of the foregoing. 60. An article manufactured by the method of claim 41. 61. A method for manufacturing a conductive composition comprising: blending a polymer precursor with a single wall carbon nanotube composition, wherein the composition comprises about 0.001 to about 5 wt %, based upon the total weight of the composition; and polymerizing the polymer precursor to form an organic polymer; wherein the composition has an electrical bulk volume resistivity less than or equal to about 1012 ohm-cm, a notched Izod impact strength greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. 62. An article manufactured by the method of claim 61.
CROSS-REFERENCE TO RELATED APPLICATION This application claims benefit to U.S. Provisional Patent Application Ser. No. 60/494,678 filed Aug. 12, 2003, which is fully incorporated herein by reference. BACKGROUND OF THE INVENTION This disclosure relates to electrically conductive compositions and methods of manufacture thereof. Articles made from organic polymers are commonly utilized in material-handling and electronic devices such as packaging film, chip carriers, computers, printers and photocopier components where electrostatic dissipation or electromagnetic shielding are important requirements. Electrostatic dissipation (hereinafter ESD) is defined as the transfer of electrostatic charge between bodies at different potentials by direct contact or by an induced electrostatic field. Electromagnetic shielding (hereinafter EM shielding) effectiveness is defined as the ratio (in decibels) of the proportion of an electromagnetic field incident upon the shield that is transmitted through it. As electronic devices become smaller and faster, their sensitivity to electrostatic charges is increased and hence it is generally desirable to utilize organic polymers that have been modified to provide improved electrostatically dissipative properties. In a similar manner, it is desirable to modify organic polymers so that they can provide improved electromagnetic shielding while simultaneously retaining some or all of the advantageous mechanical properties of the organic polymers. Conductive fillers such as graphite fibers derived from pitch and polyacrylonitrile having diameters larger than 2 micrometers are often incorporated into organic polymers to improve the electrical properties and achieve ESD and EM shielding. However, because of the large size of these graphite fibers, the incorporation of such fibers generally causes a decrease in the mechanical properties such as impact. There accordingly remains a need in the art for conductive polymeric compositions, which while providing adequate ESD and EM shielding, can retain their mechanical properties. BRIEF DESCRIPTION OF THE INVENTION A method for manufacturing a conductive composition comprises blending a polymer precursor with a single wall carbon nanotube composition; and polymerizing the polymer precursor to form an organic polymer. DETAILED DESCRIPTION OF THE INVENTION Disclosed herein are compositions comprising organic polymers and a single wall carbon nanotube (SWNT) composition that are manufactured by adding the SWNTs to the polymer precursors either prior to or during the process of polymerization of the polymer precursor. Disclosed herein are compositions comprising organic polymers and a single wall carbon nanotube (SWNTs) composition that have a bulk volume resistivity less than or equal to about 1012 ohm-cm, while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. In one embodiment, the composition has a surface resistivity greater than or equal to about 108 ohm/square (ohm/sq) and a bulk volume resistivity less than or equal to about 1012 ohm-cm while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. In another embodiment, the composition has a surface resistivity of less than or equal to about 108 ohm/square (ohm/sq) and a bulk volume resistivity of greater than or equal to about 108 ohm-cm, while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. In one embodiment, the composition has a bulk volume resistivity of less than or equal to about 1010 ohm-cm while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. In another embodiment, the composition has a bulk volume resistivity of less than or equal to about 108 ohm-cm while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. In yet another embodiment, the composition has a bulk volume resistivity of less than or equal to about 105 ohm-cm while displaying impact properties greater than or equal to about 5 kilojoules/square meter and a Class A surface finish. Such compositions can be advantageously utilized in computers, electronic goods, semi-conductor components, circuit boards, or the like that need to be protected from electrostatic charges. They may also be used advantageously in automotive body panels both for interior and exterior components of automobiles that can be electrostatically painted if desired. In one embodiment, the SWNTs are added to the polymer precursors prior to the process of polymerization. In another embodiment, the SWNTs are added during the process of polymerization of the polymer precursors. In yet another embodiment, a proportion of the SWNTs are added to the polymer precursors prior to the process of polymerization, while another proportion of the SWNTs are added to the polymer precursors during the process of polymerization. The polymer precursors, as defined herein, comprise reactive species that are monomeric, oligomeric or polymeric and which can undergo additional polymerization. The organic polymers that may be obtained from the polymerization of the polymer precursors are thermoplastic polymers, blends of thermoplastic polymers, or blends of thermoplastic polymers with thermosetting polymers. The organic polymers may also be a blend of polymers, copolymers, terpolymers, interpenetrating network polymers or combinations comprising at least one of the foregoing organic polymers. Examples of thermoplastic polymers include polyacetals, polyacrylics, polycarbonates, polyalkyds, polystyrenes, polyesters, polyamides, polyaramides, polyamideimides, polyarylates, polyarylsulfones, polyethersulfones, polyphenylene sulfides, polysulfones, polyimides, polyetherimides, polytetrafluoroethylenes, polyetherketones, polyether etherketones, polyether ketone ketones, polybenzoxazoles, polyoxadiazoles, polybenzothiazinophenothiazines, polybenzothiazoles, polypyrazinoquinoxalines, polypyromellitimides, polyquinoxalines, polybenzimidazoles, polyoxindoles, polyoxoisoindolines, polydioxoisoindolines, polytriazines, polypyridazines, polypiperazines, polypyridines, polypiperidines, polytriazoles, polypyrazoles, polycarboranes, polyoxabicyclononanes, polydibenzofurans, polyphthalides, polyacetals, polyanhydrides, polyvinyl ethers, polyvinyl thioethers, polyvinyl alcohols, polyvinyl ketones, polyvinyl halides, polyvinyl nitriles, polyvinyl esters, polysulfonates, polysulfides, polythioesters, polysulfones, polysulfonamides, polyureas, polyphosphazenes, polysilazanes, or the like, or combinations comprising at least one of the foregoing organic polymers. Specific examples of blends of thermoplastic polymers include acrylonitrile-butadiene-styrene/nylon, polycarbonate/acrylonitrile-butadiene-styrene, polyphenylene ether/polystyrene, polyphenylene ether/polyamide, polycarbonate/polyester, polyphenylene ether/polyolefin, and combinations comprising at least one of the foregoing blends of thermoplastic polymers. In one embodiment, an organic polymer that may be used in the composition is a polyarylene ether. The term poly(arylene ether) polymer includes polyphenylene ether (PPE) and poly(arylene ether) copolymers; graft copolymers; poly(arylene ether)ether ionomers; and block copolymers of alkenyl aromatic compounds with poly(arylene ether)s, vinyl aromatic compounds, and poly(arylene ether), and the like; and combinations comprising at least one of the foregoing. Poly(arylene ether) polymers per se, are polymers comprising a plurality of structural units of the formula (I): wherein for each structural unit, each Q1 is independently hydrogen, halogen, primary or secondary lower alkyl (e.g., alkyl containing up to 7 carbon atoms), phenyl, haloalkyl, aminoalkyl, hydrocarbonoxy, halohydrocarbonoxy wherein at least two carbon atoms separate the halogen and oxygen atoms, or the like; and each Q2 is independently hydrogen, halogen, primary or secondary lower alkyl, phenyl, haloalkyl, hydrocarbonoxy, halohydrocarbonoxy wherein at least two carbon atoms separate the halogen and oxygen atoms, or the like. Preferably, each Q1 is alkyl or phenyl, especially C1-4 alkyl, and each Q2 is hydrogen. Both homopolymer and copolymer poly(arylene ether)s are included. The preferred homopolymers are those containing 2,6-dimethylphenylene ether units. Suitable copolymers include random copolymers containing, for example, such units in combination with 2,3,6-trimethyl-1,4-phenylene ether units or copolymers derived from copolymerization of 2,6-dimethylphenol with 2,3,6-trimethylphenol. Also included are poly(arylene ether) containing moieties prepared by grafting vinyl monomers or polymers such as polystyrenes, as well as coupled poly(arylene ether) in which coupling agents such as low molecular weight polycarbonates, quinones, heterocycles and formals undergo reaction with the hydroxy groups of two poly(arylene ether) chains to produce a higher molecular weight polymer. Poly(arylene ether)s further include combinations comprising at least one of the above. The poly(arylene ether) has a number average molecular weight of about 10,000 to about 30,000 grams/mole (g/mole) and a weight average molecular weight of about 30,000 to about 60,000 g/mole, as determined by gel permeation chromatography. The poly(arylene ether) may have an intrinsic viscosity of about 0.10 to about 0.60 deciliters per gram (dl/g), as measured in chloroform at 25° C. It is also possible to utilize a high intrinsic viscosity poly(arylene ether) and a low intrinsic viscosity poly(arylene ether) in combination. Determining an exact ratio, when two intrinsic viscosities are used, will depend somewhat on the exact intrinsic viscosities of the poly(arylene ether) used and the ultimate physical properties that are desired. The poly(arylene ether) is typically prepared by the oxidative coupling of at least one monohydroxyaromatic compound such as 2,6-xylenol or 2,3,6-trimethylphenol. Catalyst systems are generally employed for such coupling; they typically contain at least one heavy metal compound such as a copper, manganese or cobalt compound, usually in combination with various other materials. Particularly useful poly(arylene ether)s for many purposes are those, which comprise molecules having at least one aminoalkyl-containing end group. The aminoalkyl radical is typically located in an ortho position to the hydroxy group. Products containing such end groups may be obtained by incorporating an appropriate primary or secondary monoamine such as di-n-butylamine or dimethylamine as one of the constituents of the oxidative coupling reaction mixture. Also frequently present are 4-hydroxybiphenyl end groups, typically obtained from reaction mixtures in which a by-product diphenoquinone is present, especially in a copper-halide-secondary or tertiary amine system. A substantial proportion of the polymer molecules, typically constituting as much as about 90% by weight of the polymer, may contain at least one of the aminoalkyl-containing and 4-hydroxybiphenyl end groups. In another embodiment, the organic polymer used in the composition may be a polycarbonate. Polycarbonates comprising aromatic carbonate chain units include compositions having structural units of the formula (II): in which the R1 groups are aromatic, aliphatic or alicyclic radicals. Preferably, R1 is an aromatic organic radical and, more preferably, a radical of the formula (III): -A1-Y1-A2- (III) wherein each of A1 and A2 is a monocyclic divalent aryl radical and Y1 is a bridging radical having zero, one, or two atoms which separate A1 from A2. In an exemplary embodiment, one atom separates A1 from A2. Illustrative examples of radicals of this type are —O—, —S—, —S(O)—, —S(O2)—, —C(O)—, methylene, cyclohexyl-methylene, 2-[2,2,1]-bicycloheptylidene, ethylidene, isopropylidene, neopentylidene, cyclohexylidene, cyclopentadecylidene, cyclododecylidene, adamantylidene, or the like. The bridging radical Y1 can be a hydrocarbon group or a saturated hydrocarbon group such as methylene, cyclohexylidene or isopropylidene. Polycarbonates may be produced by the Schotten-Bauman interfacial reaction of the carbonate precursor with dihydroxy compounds. Typically, an aqueous base such as sodium hydroxide, potassium hydroxide, calcium hydroxide, or the like, is mixed with an organic, water immiscible solvent such as benzene, toluene, carbon disulfide, or dichloromethane, which contains the dihydroxy compound. A phase transfer agent is generally used to facilitate the reaction. Molecular weight regulators may be added either singly or in admixture to the reactant mixture. Branching agents, described forthwith may also be added singly or in admixture. Aromatic dihydroxy compound comonomers that can be employed in the disclosure comprise those of the general formula (IV): HO-A2-OH (IV) wherein A2 is selected from divalent substituted and unsubstituted aromatic radical. In some embodiments, A2 has the structure of formula (V): wherein G1 represents an aromatic group, such as phenylene, biphenylene, naphthylene, etc. E may be an alkylene or alkylidene group such as methylene, ethylene, ethylidene, propylene, propylidene, isopropylidene, butylene, butylidene, isobutylidene, amylene, amylidene, isoamylidene, etc. and may consist of two or more alkylene or alkylidene groups connected by a moiety different from alkylene or alkylidene, such as an aromatic linkage; a tertiary amino linkage; an ether linkage; a carbonyl linkage; a silicon-containing linkage; or a sulfur-containing linkage such as sulfide, sulfoxide, sulfone, etc.; or a phosphorus-containing linkage such as phosphinyl, phosphonyl, or the like. In addition, E may be a cycloaliphatic group. R1 represents hydrogen or a monovalent hydrocarbon group such as alkyl, aryl, aralkyl, alkaryl, or cycloalkyl. Y1 may be an inorganic atom such as halogen (fluorine, bromine, chlorine, iodine); an inorganic group such as nitro; an organic group such as alkenyl, allyl, or R1 above, or an oxy group such as OR; it being only necessary that Y1 be inert to and unaffected by the reactants and reaction conditions used to prepare the polymer. The letter m represents any integer from and including zero through the number of positions on G1 available for substitution; p represents an integer from and including zero through the number of positions on E available for substitution; “t” represents an integer equal to at least one; “s” is either zero or one; and “u” represents any integer including zero. Suitable examples of E include cyclopentylidene, cyclohexylidene, 3,3,5-trimethylcyclohexylidene, methylcyclohexylidene, 2-[2.2.1]-bicycloheptylidene, neopentylidene, cyclopentadecylidene, cyclododecylidene, adamantylidene, etc.); a sulfur-containing linkage, such as sulfide, sulfoxide or sulfone; a phosphorus-containing linkage, such as phosphinyl, phosphonyl; an ether linkage; a carbonyl group; a tertiary nitrogen group; or a silicon-containing linkage such as silane or siloxy. In the aromatic dihydroxy comonomer compound (III) in which A2 is represented by formula (IV) above, when more than one Y1 substituent is present, they may be the same or different. The same holds true for the R1 substituent. Where s is zero in formula (IV) and u is not zero, the aromatic rings are directly joined with no intervening alkylidene or other bridge. The positions of the hydroxyl groups and Y1 on the aromatic nuclear residues G1 can be varied in the ortho, meta, or para positions and the groupings can be in vicinal, asymmetrical or symmetrical relationship, where two or more ring carbon atoms of the hydrocarbon residue are substituted with Y1 and hydroxyl groups. In some particular embodiments, the parameters “t”, “s”, and “u” are each one; both G1 radicals are unsubstituted phenylene radicals; and E is an alkylidene group such as isopropylidene. In particular embodiments, both G1 radicals are p-phenylene, although both may be o- or m-phenylene or one o- or m-phenylene and the other p-phenylene. Suitable examples of aromatic dihydroxy compounds of formula (IV) are illustrated by 2,2-bis(4-hydroxyphenyl)propane (bisphenol A); 2,2-bis(3-chloro-4-hydroxyphenyl)propane; 2,2-bis(3-bromo-4-hydroxyphenyl)propane; 2,2-bis(4-hydroxy-3-methylphenyl)propane; 2,2-bis(4-hydroxy-3-isopropylphenyl)propane; 2,2-bis(3-t-butyl-4-hydroxyphenyl)propane; 2,2-bis(3-phenyl-4-hydroxyphenyl)propane; 2,2-bis(3,5-dichloro-4-hydroxyphenyl)propane; 2,2-bis(3,5-dibromo-4-hydroxyphenyl)propane; 2,2-bis(3,5-dimethyl-4-hydroxyphenyl)propane; 2,2-bis(3-chloro-4-hydroxy-5-methylphenyl)propane; 2,2-bis(3-bromo-4-hydroxy-5-methylphenyl)propane; 2,2-bis(3-chloro-4-hydroxy-5-isopropylphenyl)propane; 2,2-bis(3-bromo-4-hydroxy-5-isopropylphenyl)propane; 2,2-bis(3-t-butyl-5-chloro-4-hydroxyphenyl)propane; 2,2-bis(3-bromo-5-t-butyl-4-hydroxyphenyl)propane; 2,2-bis(3-chloro-5-phenyl-4-hydroxyphenyl)propane; 2,2-bis(3-bromo-5-phenyl-4-hydroxyphenyl)propane; 2,2-bis(3,5-disopropyl-4-hydroxyphenyl)propane; 2,2-bis(3,5-di-t-butyl-4-hydroxyphenyl)propane; 2,2-bis(3,5-diphenyl-4-hydroxyphenyl)propane; 2,2-bis(4-hydroxy-2,3,5,6-tetrachlorophenyl)propane; 2,2-bis(4-hydroxy-2,3,5,6-tetrabromophenyl)propane; 2,2-bis(4-hydroxy-2,3,5,6-tetramethylphenyl)propane; 2,2-bis(2,6-dichloro-3,5-dimethyl-4-hydroxyphenyl)propane; 2,2-bis(2,6-dibromo-3,5-dimethyl-4-hydroxyphenyl)propane; 1,1-bis(4-hydroxyphenyl)cyclohexane; 1,1-bis(3-chloro-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-bromo-4-hydroxyphenyl)cyclohexane; 1,1-bis(4-hydroxy-3-methylphenyl)cyclohexane; 1,1-bis(4-hydroxy-3-isopropylphenyl)cyclohexane; 1,1-bis(3-t-butyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-phenyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-dichloro-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-dibromo-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-dimethyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-chloro-4-hydroxy-5-methylphenyl)cyclohexane; 1,1-bis(3-bromo-4-hydroxy-5-methylphenyl)cyclohexane; 1,1-bis(3-chloro-4-hydroxy-5-isopropylphenyl)cyclohexane; 1,1-bis(3-bromo-4-hydroxy-5-isopropylphenyl)cyclohexane; 1,1-bis(3-t-butyl-5-chloro-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-bromo-5-t-butyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-chloro-5-phenyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3-bromo-5-phenyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-disopropyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-di-t-butyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(3,5-diphenyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetrachlorophenyl)cyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetrabromophenyl)cyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetramethylphenyl)cyclohexane; 1,1-bis(2,6-dichloro-3,5-dimethyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(2,6-dibromo-3,5-dimethyl-4-hydroxyphenyl)cyclohexane; 1,1-bis(4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-chloro-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-bromo-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(4-hydroxy-3-methylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(4-hydroxy-3-isopropylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-t-butyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-phenyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-dichloro-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-dibromo-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-dimethyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-chloro-4-hydroxy-5-methylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-bromo-4-hydroxy-5-methylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-chloro-4-hydroxy-5-isopropylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-bromo-4-hydroxy-5-isopropylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-t-butyl-5-chloro-4-hydroxyphenyl)-3,3,5-trimethyl cyclohexane; 1,1-bis(3-bromo-5-t-butyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-chloro-5-phenyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3-bromo-5-phenyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-disopropyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-di-t-butyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(3,5-diphenyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetrachlorophenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetrabromophenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(4-hydroxy-2,3,5,6-tetramethylphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(2,6-dichloro-3,5-dimethyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 1,1-bis(2,6-dibromo-3,5-dimethyl-4-hydroxyphenyl)-3,3,5-trimethylcyclohexane; 4,4′dihydroxy-1,1-biphenyl; 4,4′-dihydroxy-3,3′-dimethyl-1,1-biphenyl; 4,4′-dihydroxy-3,3′-dioctyl-1,1-biphenyl; 4,4′-dihydroxydiphenylether; 4,4′-dihydroxydiphenylthioether; 1,3-bis(2-(4-hydroxyphenyl)-2-propyl)benzene; 1,3-bis(2-(4-hydroxy-3-methylphenyl)-2-propyl)benzene; 1,4-bis(2-(4-hydroxyphenyl)-2-propyl)benzene and 1,4-bis(2-(4-hydroxy-3-methylphenyl)-2-propyl)benzene. The preferred aromatic dihydroxy compound is Bisphenol A (BPA). Other bisphenol compounds that may be represented by formula (IV) include those where X is —O—, —S—, —SO— or —SO2—. Some examples of such bisphenol compounds are bis(hydroxyaryl)ethers such as 4,4′-dihydroxy diphenylether, 4,4′-dihydroxy-3,3′-dimethylphenyl ether, or the like; bis(hydroxy diaryl)sulfides, such as 4,4′-dihydroxy diphenyl sulfide, 4,4′-dihydroxy-3,3′-dimethyl diphenyl sulfide, or the like; bis(hydroxy diaryl) sulfoxides, such as, 4,4′-dihydroxy diphenyl sulfoxides, 4,4′-dihydroxy-3,3′-dimethyl diphenyl sulfoxides, or the like; bis(hydroxy diaryl)sulfones, such as 4,4′-dihydroxy diphenyl sulfone, 4,4′-dihydroxy-3,3′-dimethyl diphenyl sulfone, or the like; or combinations comprising at least one of the foregoing bisphenol compounds. Other bisphenol compounds that may be utilized in the polycondensation of polycarbonate are represented by the formula (VI) wherein, Rf, is a halogen atom of a hydrocarbon group having 1 to 10 carbon atoms or a halogen substituted hydrocarbon group; n is a value from 0 to 4. When n is at least 2, Rf may be the same or different. Examples of bisphenol compounds that may be represented by the formula (V), are resorcinol, substituted resorcinol compounds such as 3-methyl resorcin, 3-ethyl resorcin, 3-propyl resorcin, 3-butyl resorcin, 3-t-butyl resorcin, 3-phenyl resorcin, 3-cumyl resorcin, 2,3,4,6-tetrafloro resorcin, 2,3,4,6-tetrabromo resorcin, or the like; catechol, hydroquinone, substituted hydroquinones, such as 3-methyl hydroquinone, 3-ethyl hydroquinone, 3-propyl hydroquinone, 3-butyl hydroquinone, 3-t-butyl hydroquinone, 3-phenyl hydroquinone, 3-cumyl hydroquinone, 2,3,5,6-tetramethyl hydroquinone, 2,3,5,6-tetra-t-butyl hydroquinone, 2,3,5,6-tetrafloro hydroquinone, 2,3,5,6-tetrabromo hydroquinone, or the like; or combinations comprising at least one of the foregoing bisphenol compounds. Bisphenol compounds such as 2,2, 2′, 2′-tetrahydro-3, 3, 3′, 3′-tetramethyl-1,1′-spirobi-[IH-indene]-6,6′-diol represented by the following formula (VII) may also be used. The preferred bisphenol compound is bisphenol A. Typical carbonate precursors include the carbonyl halides, for example carbonyl chloride (phosgene), and carbonyl bromide; the bis-haloformates, for example, the bis-haloformates of dihydric phenols such as bisphenol A, hydroquinone, or the like, and the bis-haloformates of glycols such as ethylene glycol and neopentyl glycol; and the diaryl carbonates, such as diphenyl carbonate, di(tolyl) carbonate, and di(naphthyl)carbonate. The preferred carbonate precursor for the interfacial reaction is carbonyl chloride. It is also possible to employ polycarbonates resulting from the polymerization of two or more different dihydric phenols or a copolymer of a dihydric phenol with a glycol or with a hydroxy- or acid-terminated polyester or with a dibasic acid or with a hydroxy acid or with an aliphatic diacid in the event a carbonate copolymer rather than a homopolymer is desired for use. Generally, useful aliphatic diacids have about 2 to about 40 carbons. A preferred aliphatic diacid is dodecanedioic acid. Branched polycarbonates, as well as blends of linear polycarbonate and a branched polycarbonate may also be used in the composition. The branched polycarbonates may be prepared by adding a branching agent during polymerization. These branching agents may comprise polyfunctional organic compounds containing at least three functional groups, which may be hydroxyl, carboxyl, carboxylic anhydride, haloformyl, and combinations comprising at least one of the foregoing branching agents. Specific examples include trimellitic acid, trimellitic anhydride, trimellitic trichloride, tris-p-hydroxy phenyl ethane, isatin-bis-phenol, tris-phenol TC (1,3,5-tris((p-hydroxyphenyl)isopropyl)benzene), tris-phenol PA (4(4(1,1-bis(p-hydroxyphenyl)-ethyl) α,α-dimethyl benzyl)phenol), 4-chloroformyl phthalic anhydride, trimesic acid, benzophenone tetracarboxylic acid, or the like, or combinations comprising at least one of the foregoing branching agents. The branching agents may be added at a level of about 0.05 to about 2.0 weight percent (wt %), based upon the total weight of the polycarbonate in a given layer. In one embodiment, the polycarbonate may be produced by a melt polycondensation reaction between a dihydroxy compound and a carbonic acid diester. Examples of the carbonic acid diesters that may be utilized to produce the polycarbonates are diphenyl carbonate, bis(2,4-dichlorophenyl)carbonate, bis(2,4,6-trichlorophenyl)carbonate, bis(2-cyanophenyl)carbonate, bis(o-nitrophenyl) carbonate, ditolyl carbonate, m-cresyl carbonate, dinaphthyl carbonate, bis(diphenyl) carbonate, bis(methylsalicyl)carbonate, diethyl carbonate, dimethyl carbonate, dibutyl carbonate, dicyclohexyl carbonate, or the like, or combinations comprising at least one of the foregoing carbonic acid diesters. The preferred carbonic acid diester is diphenyl carbonate or bis(methylsalicyl)carbonate. Preferably, the number average molecular weight of the polycarbonate is about 3,000 to about 1,000,000 grams/mole (g/mole). Within this range, it is desirable to have a number average molecular weight of greater than or equal to about 10,000, preferably greater than or equal to about 20,000, and more preferably greater than or equal to about 25,000 g/mole. Also desirable is a number average molecular weight of less than or equal to about 100,000, preferably less than or equal to about 75,000, more preferably less than or equal to about 50,000, and most preferably less than or equal to about 35,000 g/mole. Cycloaliphatic polyesters are generally prepared by reaction of a diol with a dibasic acid or derivative. The diols useful in the preparation of the cycloaliphatic polyester polymers are straight chain, branched, or cycloaliphatic, preferably straight chain or branched alkane diols, and may contain from 2 to 12 carbon atoms. Suitable examples of diols include ethylene glycol, propylene glycol, i.e., 1,2- and 1,3-propylene glycol; butane diol, i.e., 1,3- and 1,4-butane diol; diethylene glycol, 2,2-dimethyl-1,3-propane diol, 2-ethyl, 2-methyl, 1,3-propane diol, 1,3- and 1,5-pentane diol, dipropylene glycol, 2-methyl-1,5-pentane diol, 1,6-hexane diol, 1,4-cyclohexane dimethanol and particularly its cis- and trans-isomers, triethylene glycol, 1,10-decane diol, and mixtures of any of the foregoing. Particularly preferred is dimethanol bicyclo octane, dimethanol decalin, a cycloaliphatic diol or chemical equivalents thereof and particularly 1,4-cyclohexane dimethanol or its chemical equivalents. If 1,4-cyclohexane dimethanol is to be used as the diol component, it is generally preferred to use a mixture of cis- to trans-isomers in mole ratios of about 1:4 to about 4:1. Within this range, it is generally desired to use a mole ratio of cis- to trans-isomers of about 1:3. The diacids useful in the preparation of the cycloaliphatic polyester polymers are aliphatic diacids that include carboxylic acids having two carboxyl groups each of which are attached to a saturated carbon in a saturated ring. Suitable examples of cycloaliphatic acids include decahydro naphthalene dicarboxylic acid, norbornene dicarboxylic acids, bicyclo octane dicarboxylic acids. Preferred cycloaliphatic diacids are 1,4-cyclohexanedicarboxylic acid and trans-1,4-cyclohexanedicarboxylic acids. Linear aliphatic diacids are also useful when the polyester has at least one monomer containing a cycloaliphatic ring. Illustrative examples of linear aliphatic diacids are succinic acid, adipic acid, dimethyl succinic acid, and azelaic acid. Mixtures of diacid and diols may also be used to make the cycloaliphatic polyesters. Cyclohexanedicarboxylic acids and their chemical equivalents can be prepared, for example, by the hydrogenation of cycloaromatic diacids and corresponding derivatives such as isophthalic acid, terephthalic acid or naphthalenic acid in a suitable solvent, water or acetic acid at room temperature and at atmospheric pressure using suitable catalysts such as rhodium supported on a suitable carrier of carbon or alumina. They may also be prepared by the use of an inert liquid medium wherein an acid is at least partially soluble under reaction conditions and a catalyst of palladium or ruthenium in carbon or silica is used. Typically, during hydrogenation, two or more isomers are obtained wherein the carboxylic acid groups are in either the cis- or trans-positions. The cis- and trans-isomers can be separated by crystallization with or without a solvent, for example, n-heptane, or by distillation. While the cis-isomer tends to blend better, the trans-isomer has higher melting and crystallization temperature and is generally preferred. Mixtures of the cis- and trans-isomers may also be used, and preferably when such a mixture is used, the trans-isomer will preferably comprise at least about 75 wt % and the cis-isomer will comprise the remainder based on the total weight of cis- and trans-isomers combined. When a mixture of isomers or more than one diacid is used, a copolyester or a mixture of two polyesters may be used as the cycloaliphatic polyester resin. Chemical equivalents of these diacids including esters may also be used in the preparation of the cycloaliphatic polyesters. Suitable examples of the chemical equivalents of the diacids are alkyl esters, e.g., dialkyl esters, diaryl esters, anhydrides, acid chlorides, acid bromides, or the like, or combinations comprising at least one of the foregoing chemical equivalents. The preferred chemical equivalents comprise the dialkyl esters of the cycloaliphatic diacids, and the most preferred chemical equivalent comprises the dimethyl ester of the acid, particularly dimethyl-trans-1,4-cyclohexanedicarboxylate. Dimethyl-1,4-cyclohexanedicarboxylate can be obtained by ring hydrogenation of dimethylterephthalate, wherein two isomers having the carboxylic acid groups in the cis- and trans-positions are obtained. The isomers can be separated, the trans-isomer being especially preferred. Mixtures of the isomers may also be used as detailed above. The polyester polymers are generally obtained through the condensation or ester interchange polymerization of the diol or diol chemical equivalent component with the diacid or diacid chemical equivalent component and having recurring units of the formula (VIII): wherein R3 represents an aryl, alkyl or cycloalkyl radical which is the residue of a straight chain, branched, or cycloaliphatic alkane diol or chemical equivalents thereof; and R4 is an aryl, alkyl or a cycloaliphatic radical which is the decarboxylated residue derived from a diacid, with the proviso that at least one of R3 or R4 is a cycloalkyl group. The aryl radicals may be substituted aryl radicals if desired. A preferred cycloaliphatic polyester is poly(1,4-cyclohexane-dimethanol-1,4-cyclohexanedicarboxylate) having recurring units of formula (IX) wherein in the formula (VIII), R3 is a cyclohexane ring, and wherein R4 is a cyclohexane ring derived from cyclohexanedicarboxylate or a chemical equivalent thereof and is selected from the cis- or trans-isomer or a mixture of cis- and trans-isomers thereof. Cycloaliphatic polyester polymers can be generally made in the presence of a suitable catalyst such as a tetra(2-ethyl hexyl)titanate, in a suitable amount, typically about 50 to 400 ppm of titanium based upon the total weight of the final product. Poly(1,4-cyclohexanedimethanol-1,4-cyclohexanedicarboxylate) generally forms a suitable blend with the polycarbonate. Preferably, the number average molecular weight of the copolyestercarbonates or the polyesters is about 3,000 to about 1,000,000 g/mole. Within this range, it is desirable to have a number average molecular weight of greater than or equal to about 10,000, preferably greater than or equal to about 20,000, and more preferably greater than or equal to about 25,000 g/mole. Also desirable is a number average molecular weight of less than or equal to about 100,000, preferably less than or equal to about 75,000, more preferably less than or equal to about 50,000, and most preferably less than or equal to about 35,000 g/mole. Another preferred polyester is a polyarylate. Polyarylates generally refers to polyesters of aromatic dicarboxylic acids and bisphenols. Polyarylate copolymers that include carbonate linkages in addition to the aryl ester linkages, are termed polyester-carbonates, and may also be advantageously utilized in the mixtures. The polyarylates can be prepared in solution or by the melt polymerization of aromatic dicarboxylic acids or their ester forming derivatives with bisphenols or their derivatives. In general, it is preferred for the polyarylates to comprise at least one diphenol residue in combination with at least one aromatic dicarboxylic acid residue. The preferred diphenol residue, illustrated in formula (X), is derived from a 1,3-dihydroxybenzene moiety, referred to throughout this specification as resorcinol or resorcinol moiety. Resorcinol or resorcinol moieties include both unsubstituted 1,3-dihydroxybenzene and substituted 1,3-dihydroxybenzenes. In formula (X), R is at least one of C1-12 alkyl or halogen, and n is 0 to 3. Suitable dicarboxylic acid residues include aromatic dicarboxylic acid residues derived from monocyclic moieties, preferably isophthalic acid, terephthalic acid, or mixtures of isophthalic and terephthalic acids, or from polycyclic moieties such as diphenyl dicarboxylic acid, diphenylether dicarboxylic acid, and naphthalene-2,6-dicarboxylic acid, and the like, as well as combinations comprising at least one of the foregoing polycyclic moieties. The preferred polycyclic moiety is naphthalene-2,6-dicarboxylic acid. Preferably, the aromatic dicarboxylic acid residues are derived from mixtures of isophthalic and/or terephthalic acids as generally illustrated in formula (XI). Therefore, in one embodiment the polyarylates comprise resorcinol arylate polyesters as illustrated in formula (XII) wherein R is at least one of C1-12 alkyl or halogen, n is 0 to 3, and m is at least about 8. It is preferred for R to be hydrogen. Preferably, n is zero and m is about 10 and about 300. The molar ratio of isophthalate to terephthalate is about 0.25:1 to about 4.0:1. In another embodiment, the polyarylate comprises thermally stable resorcinol arylate polyesters that have polycyclic aromatic radicals as shown in formula (XIII) wherein R is at least one of C1-12 alkyl or halogen, n is 0 to 3, and m is at least about 8. In another embodiment, the polyarylates are copolymerized to form block copolyestercarbonates, which comprise carbonate and arylate blocks. They include polymers comprising structural units of the formula (XIV) wherein each R1 is independently halogen or C1-12 alkyl, m is at least 1, p is about 0 to about 3, each R2 is independently a divalent organic radical, and n is at least about 4. Preferably n is at least about 10, more preferably at least about 20 and most preferably about 30 to about 150. Preferably m is at least about 3, more preferably at least about 10 and most preferably about 20 to about 200. In an exemplary embodiment m is present in an amount of about 20 and 50. It is generally desirable for the weight average molecular weight of the polyarylate to be about 500 to about 1,000,000 grams/mole (g/mole). In one embodiment, the polyarylate has a weight average molecular weight of about 10,000 to about 200,000 g/mole. In another embodiment, the polyarylate has a weight average molecular weight of about 30,000 to about 150,000 g/mole. In yet another embodiment, the polyarylate has a weight average molecular weight of about 50,000 to about 120,000 g/mole. An exemplary molecular weight for the polyarylate utilized in the cap layer is 60,000 and 120,000 g/mole. In one embodiment, the polymer precursor comprises an ethylenically unsaturated group. The ethylenically unsaturated groups used can be any ethylenically unsaturated functional group capable of polymerization. Suitable ethylenically unsaturated functionality includes functionalization that can be polymerized through radical polymerization or cationic polymerization. Specific examples of suitable ethylenic unsaturation are groups containing acrylate, methacrylate, vinyl aromatic polymers such as styrene; vinylether, vinyl ester, N-substituted acrylamide, N-vinyl amide, maleate esters, fumarate esters, and the like. Preferably, the ethylenic unsaturation is provided by a group containing acrylate, methacrylate, or styrene functionality, and most preferably styrene. The vinyl aromatic resins are preferably derived from polymer precursors that contain at least 25% by weight of structural units derived from a monomer of the formula (XV): wherein R5 is hydrogen, lower alkyl or halogen; Z1 is vinyl, halogen or lower alkyl; and p is from 0 to about 5. These polymers include homopolymers of styrene, chlorostyrene and vinyltoluene, random copolymers of styrene with one or more monomers illustrated by acrylonitrile, butadiene, alpha-methylstyrene, ethylvinylbenzene, divinylbenzene and maleic anhydride, and rubber-modified polystyrenes comprising blends and grafts, wherein the rubber is a polybutadiene or a rubbery copolymer of about 98-70% styrene and about 2-30% diene monomer. Polystyrenes are miscible with polyphenylene ether in all proportions, and any such blend may contain polystyrene in amounts of about 5-95% and most often about 25-75%, based on the total weight of the polymers. In yet another embodiment, polyimides may be used as the organic polymers in the composition. Useful thermoplastic polyimides have the general formula (XVI) wherein “a” is greater than or equal to about 1, preferably greater than or equal to about 10, and more preferably greater than or equal to about 1000; and wherein V is a tetravalent linker without limitation, as long as the linker does not impede synthesis or use of the polyimide. Suitable linkers include (a) substituted or unsubstituted, saturated, unsaturated or aromatic monocyclic and polycyclic groups having about 5 to about 50 carbon atoms, (b) substituted or unsubstituted, linear or branched, saturated or unsaturated alkyl groups having 1 to about 30 carbon atoms; or combinations thereof. Suitable substitutions and/or linkers include, but are not limited to, ethers, epoxides, amides, esters, and combinations thereof. Preferred linkers include but are not limited to tetravalent aromatic radicals of formula (XVII), such as wherein W is a divalent moiety selected from the group consisting of —O—, —S—, —C(O)—, —SO2—, —SO—, —CyH2y— (y being an integer from 1 to 5), and halogenated derivatives thereof, including perfluoroalkylene groups, or a group of the formula —O-Z-O—wherein the divalent bonds of the —O— or the —O-Z-O— group are in the 3,3′, 3,4′, 4,3′, or the 4,4′ positions, and wherein Z includes, but is not limited, to divalent radicals of formula (XVIII). R in formula (XVI) includes substituted or unsubstituted divalent organic radicals such as (a) aromatic hydrocarbon radicals having about 6 to about 20 carbon atoms and halogenated derivatives thereof; (b) straight or branched chain alkylene radicals having about 2 to about 20 carbon atoms; (c) cycloalkylene radicals having about 3 to about 20 carbon atoms, or (d) divalent radicals of the general formula (XIX) wherein Q includes a divalent moiety selected from the group consisting of —O—, —S—, —C(O)—, —SO2—, —SO—, —CyH2y— (y being an integer from 1 to 5), and halogenated derivatives thereof, including perfluoroalkylene groups. Preferred classes of polyimides include polyamidimides and polyetherimides, particularly those polyetherimides that are melt processable. Preferred polyetherimide polymers comprise more than 1, typically about 10 to about 1000 or more, and more preferably about 10 to about 500 structural units, of the formula (XX) wherein T is —O— or a group of the formula —O-Z-O— wherein the divalent bonds of the —O— or the —O-Z-O— group are in the 3,3′, 3,4′, 4,3′, or the 4,4′ positions, and wherein Z includes, but is not limited, to divalent radicals of formula (XVIII) as defined above. In one embodiment, the polyetherimide may be a copolymer, which, in addition to the etherimide units described above, further contains polyimide structural units of the formula (XXI) wherein R is as previously defined for formula (XVI) and M includes, but is not limited to, radicals of formula (XXII). The polyetherimide can be prepared by any of the methods including the reaction of an aromatic bis(ether anhydride) of the formula (XXIII) with an organic diamine of the formula (XIV) H2N—R—NH2 (XXIV) wherein T and R are defined as described above in formulas (XVI) and (XX). Illustrative examples of aromatic bis(ether anhydride)s of formula (XXIII) include 2,2-bis[4-(3,4-dicarboxyphenoxy)phenyl]propane dianhydride; 4,4′-bis(3,4-dicarboxyphenoxy)diphenyl ether dianhydride; 4,4′-bis(3,4-dicarboxyphenoxy)diphenyl sulfide dianhydride; 4,4′-bis(3,4-dicarboxyphenoxy)benzophenone dianhydride; 4,4′-bis(3,4-dicarboxyphenoxy)diphenyl sulfone dianhydride; 2,2-bis[4-(2,3-dicarboxyphenoxy)phenyl]propane dianhydride; 4,4′-bis(2,3-dicarboxyphenoxy)diphenyl ether dianhydride; 4,4′-bis(2,3-dicarboxyphenoxy)diphenyl sulfide dianhydride; 4,4′-bis(2,3-dicarboxyphenoxy)benzophenone dianhydride; 4,4′-bis(2,3-dicarboxyphenoxy)diphenyl sulfone dianhydride; 4-(2,3-dicarboxyphenoxy)-4′-(3,4-dicarboxyphenoxy)diphenyl-2,2-propane dianhydride; 4-(2,3-dicarboxyphenoxy)-4′-(3,4-dicarboxyphenoxy)diphenyl ether dianhydride; 4-(2,3-dicarboxyphenoxy)-4′-(3,4-dicarboxyphenoxy)diphenyl sulfide dianhydride; 4-(2,3-dicarboxyphenoxy)-4′-(3,4-dicarboxyphenoxy)benzophenone dianhydride and 4-(2,3-dicarboxyphenoxy)-4′-(3,4-dicarboxyphenoxy)diphenyl sulfone dianhydride, as well as various mixtures thereof. The bis(ether anhydride)s can be prepared by the hydrolysis, followed by dehydration, of the reaction product of a nitro substituted phenyl dinitrile with a metal salt of dihydric phenol compound in the presence of a dipolar, aprotic solvent. A preferred class of aromatic bis(ether anhydride)s included by formula (XXIII) above includes, but is not limited to, compounds wherein T is of the formula (XXV) and the ether linkages, for example, are preferably in the 3,3′, 3,4′, 4,3′, or 4,4′ positions, and mixtures thereof, and where Q is as defined above. Any diamino compound may be employed in the preparation of the polyimides and/or polyetherimides. Examples of suitable compounds are ethylenediamine, propylenediamine, trimethylenediamine, diethylenetriamine, triethylenetertramine, hexamethylenediamine, heptamethylenediamine, octamethylenediamine, nonamethylenediamine, decamethylenediamine, 1,12-dodecanediamine, 1,18-octadecanediamine, 3-methylheptamethylenediamine, 4,4-dimethylheptamethylenediamine, 4-methylnonamethylenediamine, 5-methylnonamethylenediamine, 2,5-dimethylhexamethylenediamine, 2,5-dimethylheptamethylenediamine, 2,2-dimethylpropylenediamine, N-methyl-bis(3-aminopropyl)amine, 3-methoxyhexamethylenediamine, 1,2-bis(3-aminopropoxy) ethane, bis(3-aminopropyl)sulfide, 1,4-cyclohexanediamine, bis-(4-aminocyclohexyl) methane, m-phenylenediamine, p-phenylenediamine, 2,4-diaminotoluene, 2,6-diaminotoluene, m-xylylenediamine, p-xylylenediamine, 2-methyl-4,6-diethyl-1,3-phenylene-diamine, 5-methyl-4,6-diethyl-1,3-phenylene-diamine, benzidine, 3,3′-dimethylbenzidine, 3,3′-dimethoxybenzidine, 1,5-diaminonaphthalene, bis(4-aminophenyl)methane, bis(2-chloro-4-amino-3,5-diethylphenyl)methane, bis(4-aminophenyl)propane, 2,4-bis(b-amino-t-butyl)toluene, bis(p-b-amino-t-butylphenyl) ether, bis(p-b-methyl-o-aminophenyl)benzene, bis(p-b-methyl-o-aminopentyl) benzene, 1,3-diamino-4-isopropylbenzene, bis(4-aminophenyl)sulfide, bis(4-aminophenyl)sulfone, bis(4-aminophenyl)ether and 1,3-bis(3-aminopropyl) tetramethyldisiloxane. Mixtures of these compounds may also be present. The preferred diamino compounds are aromatic diamines, especially m- and p-phenylenediamine and mixtures thereof. In an exemplary embodiment, the polyetherimide resin comprises structural units according to formula (XX) wherein each R is independently p-phenylene or m-phenylene or a mixture thereof and T is a divalent radical of the formula (XXVI) In general, the reactions can be carried out employing solvents such as o-dichlorobenzene, m-cresol/toluene, or the like, to effect a reaction between the anhydride of formula (XVIII) and the diamine of formula (XIX), at temperatures of about 100° C. to about 250° C. Alternatively, the polyetherimide can be prepared by melt polymerization of aromatic bis(ether anhydride)s of formula (XVIII) and diamines of formula (XIX) by heating a mixture of the starting materials to elevated temperatures with concurrent stirring. Generally, melt polymerizations employ temperatures of about 200° C. to about 400° C. Chain stoppers and branching agents may also be employed in the reaction. When polyetherimide/polyimide copolymers are employed, a dianhydride, such as pyromellitic anhydride, is used in combination with the bis(ether anhydride). The polyetherimide polymers can optionally be prepared from reaction of an aromatic bis(ether anhydride) with an organic diamine in which the diamine is present in the reaction mixture at no more than about 0.2 molar excess, and preferably less than about 0.2 molar excess. Under such conditions the polyetherimide resin has less than about 15 microequivalents per gram (μeq/g) acid titratable groups, and preferably less than about 10 μeq/g acid titratable groups, as shown by titration with chloroform solution with a solution of 33 weight percent (wt %) hydrobromic acid in glacial acetic acid. Acid-titratable groups are essentially due to amine end-groups in the polyetherimide resin. Generally, useful polyetherimides have a melt index of about 0.1 to about 10 grams per minute (g/min), as measured by American Society for Testing Materials (ASTM) D1238 at 295° C., using a 6.6 kilogram (kg) weight. In a preferred embodiment, the polyetherimide resin has a weight average molecular weight (Mw) of about 10,000 to about 150,000 grams per mole (g/mole), as measured by gel permeation chromatography, using a polystyrene standard. Such polyetherimide polymers typically have an intrinsic viscosity greater than about 0.2 deciliters per gram (dl/g), preferably about 0.35 to about 0.7 dl/g measured in m-cresol at 25° C. In yet another embodiment, polyamides may be used as the organic polymers in the composition. Polyamides are generally derived from the polymerization of organic lactams having from 4 to 12 carbon atoms. Preferred lactams are represented by the formula (XXVII) wherein n is about 3 to about 11. A highly preferred lactam is epsilon-caprolactam having n equal to 5. Polyamides may also be synthesized from amino acids having from 4 to 12 carbon atoms. Preferred amino acids are represented by the formula (XXVIII) wherein n is about 3 to about 11. A highly preferred amino acid is epsilon-aminocaproic acid with n equal to 5. Polyamides may also be polymerized from aliphatic dicarboxylic acids having from 4 to 12 carbon atoms and aliphatic diamines having from 2 to 12 carbon atoms. Suitable and preferred aliphatic dicarboxylic acids are the same as those described above for the synthesis of polyesters. Preferred aliphatic diamines are represented by the formula (XXIX) H2N—(CH2)n—NH2 (XXIX) wherein n is about 2 to about 12. A highly preferred aliphatic diamine is hexamethylenediamine (H2N(CH2)6NH2). It is preferred that the molar ratio of the dicarboxylic acid to the diamine be about 0.66 to about 1.5. Within this range it is generally desirable to have the molar ratio be greater than or equal to about 0.81, preferably greater than or equal to about 0.96. Also desirable within this range is an amount of less than or equal to about 1.22, preferably less than or equal to about 1.04. The preferred polyamides are nylon 6, nylon 6,6, nylon 4,6, nylon 6, 12, nylon 10, or the like, or combinations comprising at least one of the foregoing nylons. Synthesis of polyamideesters may also be accomplished from aliphatic lactones having from 4 to 12 carbon atoms and aliphatic lactams having from 4 to 12 carbon atoms. The aliphatic lactones are the same as those described above for polyester synthesis, and the aliphatic lactams are the same as those described above for the synthesis of polyamides. The ratio of aliphatic lactone to aliphatic lactam may vary widely depending on the desired composition of the final copolymer, as well as the relative reactivity of the lactone and the lactam. A presently preferred initial molar ratio of aliphatic lactam to aliphatic lactone is about 0.5 to about 4. Within this range a molar ratio of greater than or equal to about 1 is desirable. Also desirable is a molar ratio of less than or equal to about 2. The composition may further comprise a catalyst or an initiator. Generally, any known catalyst or initiator suitable for the corresponding thermal polymerization may be used. Alternatively, the polymerization may be conducted without a catalyst or initiator. For example, in the synthesis of polyamides from aliphatic dicarboxylic acids and aliphatic diamines, no catalyst is required. For the synthesis of polyamides from lactams, suitable catalysts include water and the omega-amino acids corresponding to the ring-opened (hydrolyzed) lactam used in the synthesis. Other suitable catalysts include metallic aluminum alkylates (MAl(OR)3H; wherein M is an alkali metal or alkaline earth metal, and R is C1-C12 alkyl), sodium dihydrobis(2-methoxyethoxy)aluminate, lithium dihydrobis(tert-butoxy)aluminate, aluminum alkylates (Al(OR)2R; wherein R is C1-C12 alkyl), N-sodium caprolactam, magnesium chloride or bromide salt of epsilon-caprolactam (MgXC6H10NO, X═Br or Cl), dialkoxy aluminum hydride. Suitable initiators include isophthaloybiscaprolactam, N-acetalcaprolactam, isocyanate epsilon-caprolactam adducts, alcohols (ROH; wherein R is C1-C12 alkyl), diols (HO—R—OH; wherein R is R is C1-C12 alkylene), omega-aminocaproic acids, and sodium methoxide. For the synthesis of polyamideesters from lactones and lactams, suitable catalysts include metal hydride compounds, such as a lithium aluminum hydride catalysts having the formula LiAl(H)x(R1)y, where x is about 1 to about 4, y is about 0 to about 3, x+y is equal to 4, and R1 is selected from the group consisting of C1-C12 alkyl and C1-C12 alkoxy; highly preferred catalysts include LiAl(H)(OR2)3, wherein R2 is selected from the group consisting of C1-C8 alkyl; an especially preferred catalyst is LiAl(H)(OC(CH3)3)3. Other suitable catalysts and initiators include those described above for the polymerization of poly(epsilon-caprolactam) and poly(epsilon-caprolactone). A preferred type of polyamide is one obtained by the reaction of a first polyamide and a polymeric material selected from the group consisting of a second polyamide, poly(arylene ether), poly(alkenyl aromatic) homopolymer, rubber modified poly(alkenyl aromatic) resin, acrylonitrile-butadiene-styrene (ABS) graft copolymers, block copolymer, and combinations comprising two or more of the foregoing. The first polyamide comprises repeating units having formula (XXX) wherein R1 is a branched or unbranched alkyl group having nine carbons. R1 is preferably 1,9-nonane and/or 2-methyl-1,8-octane. Polyamide resins are characterized by the presence of an amide group (—C(O)NH—) which is the condensation product of a carboxylic acid and an amine. The first polyamide is typically made by reacting one or more diamines comprising a nine carbon alkyl moiety with terephthalic acid (1,4-dicarboxy benzene). When employing more than one diamine the ratio of the diamines can affect some of the physical properties of the resulting polymer such as the melt temperature. The ratio of diamine to dicarboxylic acid is typically equimolar although excesses of one or the other may be used to determine the end group functionality. In addition the reaction can further include monoamines and monocarboxylic acids which function as chain stoppers and determine, at least in part, the end group functionality. In some embodiments it is preferable to have an amine end group content of greater than or equal to about 30 meq/g, and more preferably greater than or equal to about 40 meq/g. The second polyamide comprises repeating units having formula (XXXI) and/or formula (XXXII) wherein R2 is a branched or unbranched alkyl group having four to seven carbons and R3 is an aromatic group having six carbons or a branched or unbranched alkyl group having four to seven carbons. R2 is preferably 1,6-hexane in formula XXXI and 1,5-pentane in formula XXXII. R3 is preferably 1,4-butane. The first polyamide has better dimensional stability, temperature resistance, resistance to moisture uptake, abrasion resistance and chemical resistance compared to other polyamides. Hence, compositions comprising the first polyamide exhibit these same improved properties when compared to comparable compositions containing other polyamides in place of the first polyamide. In some embodiments the combination of the first and second polyamide improves the compatibility of the polyamide phase with other phases, such as poly(arylene ether), in multiphasic compositions thereby improving the impact resistance. Without being bound by theory it is believed that the second polyamide increases the amount of available terminal amino groups. The terminal amino groups can, in some instances, react with components of other phases or be functionalized to react with other phases, thereby improving the compatibility. The organic polymer is generally present in amounts of about 5 to about 99.999 weight percent (wt %) in the composition. Within this range, it is generally desirable use the organic polymer or the polymeric blend in an amount of greater than or equal to about 10 wt %, preferably greater or equal to about 30 wt %, and more preferably greater than or equal to about 50 wt % of the total weight of the composition. The organic polymers or polymeric blends are furthermore generally used in amounts less than or equal to about 99.99 wt %, preferably less than or equal to about 99.5 wt %, more preferably less than or equal to about 99.3 wt % of the total weight of the composition SWNTs used in the composition may be produced by laser-evaporation of graphite, carbon arc synthesis or the high-pressure carbon monoxide conversion process (HIPCO) process. These SWNTs generally have a single wall comprising a graphene sheet with outer diameters of about 0.7 to about 2.4 nanometers (nm). SWNTs having aspect ratios of greater than or equal to about 5, preferably greater than or equal to about 100, more preferably greater than or equal to about 1000 are generally utilized in the compositions. While the SWNTs are generally closed structures having hemispherical caps at each end of the respective tubes, it is envisioned that SWNTs having a single open end or both open ends may also be used. The SWNTs generally comprise a central portion, which is hollow, but may be filled with amorphous carbon. In an exemplary embodiment, the purpose of dispersion of the SWNTs in an organic polymer is to disentangle the SWNTs so as to obtain an effective aspect ratio that is as close to the aspect ratio of the SWNT as possible. The ratio of the effective aspect ratio to the aspect ratio is a measure of the effectiveness of dispersion. The effective aspect ratio is a value that is twice the radius of gyration of a single SWNT divided by the outer diameter of the respective individual nanotube. It is generally desirable for the average value of ratio of the effective aspect ratio to the aspect ratio to be greater than or equal to about 0.5, preferably greater than or equal to about 0.75, and more preferably greater than or equal to about 0.90, as measured in a electron micrograph at a magnification of greater than or equal to about 10,000. In one embodiment, the SWNTs may exist in the form of rope-like-aggregates. These aggregates are commonly termed “ropes” and are formed as a result of Van der Waal's forces between the individual SWNTs. The individual nanotubes in the ropes may slide against one another and rearrange themselves within the rope in order to minimize the free energy. Ropes generally having between 10 and 105 nanotubes may be used in the compositions. Within this range, it is generally desirable to have ropes having greater than or equal to about 100, preferably greater than or equal to about 500 nanotubes. Also desirable, are ropes having less than or equal to about 104 nanotubes, preferably less than or equal to about 5,000 nanotubes. In yet another embodiment, it is desirable for the SWNT ropes to connect each other in the form of branches after dispersion. This results in a sharing of the ropes between the branches of the SWNT networks to form a 3-diminsional network in the organic polymer matrix. A distance of about 10 m to about 10 micrometers may separate the branching points in this type of network. It is generally desirable for the SWNTs to have an inherent thermal conductivity of at least 2000 Watts per meter Kelvin (W/m-K) and for the SWNT ropes to have an inherent electrical conductivity of 104 Siemens/centimeter (S/cm). It is also generally desirable for the SWNTs to have a tensile strength of at least 80 gigapascals (GPa) and a stiffness of at least about 0.5 tarapascals (TPa). In another embodiment, the SWNTs may comprise a mixture of metallic nanotubes and semi-conducting nanotubes. Metallic nanotubes are those that display electrical characteristics similar to metals, while the semi-conducting nanotubes are those, which are electrically semi-conducting. In general the manner in which the graphene sheet is rolled up produces nanotubes of various helical structures. Zigzag and armchair nanotubes constitute two possible confirmations. In order to minimize the quantity of SWNTs utilized in the composition, it is generally desirable to have the composition comprise as large a fraction of metallic SWNTs. It is generally desirable for the SWNTs used in the composition to comprise metallic nanotubes in an amount of greater than or equal to about 1 wt %, preferably greater than or equal to about 20 wt %, more preferably greater than or equal to about 30 wt %, even more preferably greater than or equal to about 50 wt %, and most preferably greater than or equal to about 99.9 wt % of the total weight of the SWNTs. In certain situations, it is generally desirable for the SWNTs used in the composition to comprise semi-conducting nanotubes in an amount of greater than or equal to about 1 wt %, preferably greater than or equal to about 20 wt %, more preferably greater than or equal to about 30 wt %, even more preferably greater than or equal to about 50 wt %, and most preferably greater than or equal to about 99.9 wt % of the total weight of the SWNTs. SWNTs are generally used in amounts of about 0.001 to about 80 wt % of the total weight of the composition when desirable. Within this range, SWNTs are generally used in amounts greater than or equal to about 0.25 wt %, preferably greater or equal to about 0.5 wt %, more preferably greater than or equal to about 1 wt % of the total weight of the composition. SWNTs are furthermore generally used in amounts less than or equal to about 30 wt %, preferably less than or equal to about 10 wt %, more preferably less than or equal to about 5 wt % of the total weight of the composition. In one embodiment, the SWNTs may contain production related impurities. Production related impurities present in SWNTs as defined herein are those impurities, which are produced during processes substantially related to the production of SWNTs. As stated above, SWNTs are produced in processes such as, for example, laser ablation, chemical vapor deposition, carbon arc, high-pressure carbon monoxide conversion processes, or the like. Production related impurities are those impurities that are either formed naturally or formed deliberately during the production of SWNTs in the aforementioned processes or similar manufacturing processes. A suitable example of a production related impurity that is formed naturally are catalyst particles used in the production of the SWNTs. A suitable example of a production related impurity that is formed deliberately is a dangling bond formed on the surface of the SWNT by the deliberate addition of a small amount of an oxidizing agent during the manufacturing process. Production related impurities include for example, carbonaceous reaction by-products such as defective SWNTs, multiwall carbon nanotubes, branched or coiled multiwall carbon nanotubes, amorphous carbon, soot, nano-onions, nanohorns, coke, or the like; catalytic residues from the catalysts utilized in the production process such as metals, metal oxides, metal carbides, metal nitrides or the like, or combinations comprising at least one of the foregoing reaction byproducts. A process that is substantially related to the production of SWNTs is one in which the fraction of SWNTs is larger when compared with any other fraction of production related impurities. In order for a process to be substantially related to the production of SWNTs, the fraction of SWNTs would have to be greater than a fraction of any one of the above listed reaction byproducts or catalytic residues. For example, the fraction of SWNTs would have to be greater than the fraction of multiwall nanotubes, or the fraction of soot, or the fraction of carbon black. The fraction of SWNTs would not have to be greater than the sums of the fractions of any combination of production related impurities for the process to be considered substantially directed to the production of SWNTs. In general, the SWNTs used in the composition may comprise an amount of about 0.1 to about 80 wt % impurities. Within this range, the SWNTs may have an impurity content greater than or equal to about 3, preferably greater than or equal to about 7, and more preferably greater than or equal to about 8 wt %, of the total weight of the SWNTs. Also desirable within this range, is an impurity content of less than of equal to about 50, preferably less than or equal to about 45, and more preferably less than or equal to about 40 wt % of the total weight of the SWNTs. In one embodiment, the SWNTs used in the composition may comprise an amount of about 0.1 to about 50 wt % catalytic residues. Within this range, the SWNTs may have a catalytic residue content greater than or equal to about 3, preferably greater than or equal to about 7, and more preferably greater than or equal to about 8 wt %, of the total weight of the SWNTs. Also desirable within this range, is a catalytic residue content of less than of equal to about 50, preferably less than or equal to about 45, and more preferably less than or equal to about 40 wt % of the total weight of the SWNTs. Other carbon nanotubes such as multiwall carbon nanotubes (MWNTs) and VGCF may also be added to the compositions during the polymerization of the polymeric precursor. The MWNTs and VGCF that are added to the composition are not considered impurities since these are not produced during the production of the SWNTs. MWNTs derived from processes such as laser ablation and carbon arc synthesis, which is not directed at the production of SWNTs, may also be used in the compositions. MWNTs have at least two graphene layers bound around an inner hollow core. Hemispherical caps generally close both ends of the MWNTs, but it may desirable to use MWNTs having only one hemispherical cap or MWNTs, which are devoid of both caps. MWNTs generally have diameters of about 2 to about 50 nm. Within this range, it is generally desirable to use MWNTs having diameters less than or equal to about 40, preferably less than or equal to about 30, and more preferably less than or equal to about 20 nm. When MWNTs are used, it is preferred to have an average aspect ratio greater than or equal to about 5, preferably greater than or equal to about 100, more preferably greater than or equal to about 1000. MWNTs are generally used in amounts of about 0.001 to about 50 wt % of the total weight of the composition when desirable. Within this range, MWNTs are generally used in amounts greater than or equal to about 0.25 wt %, preferably greater or equal to about 0.5 wt %, more preferably greater than or equal to about 1 wt % of the total weight of the composition. MWNTs are furthermore generally used in amounts less than or equal to about 30 wt %, preferably less than or equal to about 10 wt %, more preferably less than or equal to about 5 wt % of the total weight of the composition. Other conductive fillers such as vapor grown carbon fibers, carbon black, conductive metallic fillers, solid non-metallic, conductive fillers, or the like, or combinations comprising at least one of the foregoing may optionally be used in the compositions. Vapor grown carbon fibers or small graphitic or partially graphitic carbon fibers, also referred to as vapor grown carbon fibers (VGCF), having diameters of about 3.5 to about 2000 nanometers (nm) and an aspect ratio greater than or equal to about 5 may also be used. When VGCF are used, diameters of about 3.5 to about 500 nm are preferred, with diameters of about 3.5 to about 100 nm being more preferred, and diameters of about 3.5 to about 50 nm most preferred. It is also preferable to have average aspect ratios greater than or equal to about 100 and more preferably greater than or equal to about 1000. VGCF are generally used in amounts of about 0.001 to about 50 wt % of the total weight of the composition when desirable. Within this range, VGCF are generally used in amounts greater than or equal to about 0.25 wt %, preferably greater or equal to about 0.5 wt %, more preferably greater than or equal to about 1 wt % of the total weight of the composition. VGCF are furthermore generally used in amounts less than or equal to about 30 wt %, preferably less than or equal to about 10 wt %, more preferably less than or equal to about 5 wt % of the total weight of the composition. Both the SWNTs and the other carbon nanotubes utilized in the composition may also be derivatized with functional groups to improve compatibility and facilitate the mixing with the organic polymer. The SWNTs and the other carbon nanotubes may be functionalized on either the graphene sheet constituting the sidewall, a hemispherical cap or on both the side wall as well as the hemispherical endcap. Functionalized SWNTs and the other carbon nanotubes are those having the formula (XXXIII) [CnHLRm (XXXIII) wherein n is an integer, L is a number less than 0.1 n, m is a number less than 0.5 n, and wherein each of R is the same and is selected from —SO3H, —NH2, —OH, —C(OH)R′, —CHO, —CN, —C(O)Cl, —C(O)SH, —C(O)OR′, —SR′, —SiR3′, —Si(OR)yR′(3-y), —R″, —AlR2′, halide, ethylenically unsaturated functionalities, epoxide functionalities, or the like, wherein y is an integer equal to or less than 3, R′ is hydrogen, alkyl, aryl, cycloalkyl, araalkyl, cycloaryl, poly(alkylether), or the like and R″ is fluoroalkyl, fluoroaryl, fluorocycloalkyl, fluoroaralkyl, cycloaryl, or the like. The carbon atoms, Cn, are surface carbons of a carbon nanotube. In both, uniformly and non-uniformly substituted SWNTs and other carbon nanotubes, the surface atoms Cn are reacted. Non-uniformly substituted SWNTs and other carbon nanotubes may also be used in the composition. These include compositions of the formula (I) shown above wherein n, L, m, R and the SWNT itself are as defined above, provided that each of R does not contain oxygen, or, if each of R is an oxygen-containing group, COOH is not present. Also included are functionalized SWNTs and other carbon nanotubes having the formula (XXXIV) [CnHLR″—R]m (XXXIV) where n, L, m, R′ and R have the same meaning as above. Most carbon atoms in the surface layer of a carbon nanotube are basal plane carbons. Basal plane carbons are relatively inert to chemical attack. At defect sites, where, for example, the graphitic plane fails to extend fully around the carbon nanotube, there are carbon atoms analogous to the edge carbon atoms of a graphite plane. The edge carbons are reactive and must contain some heteroatom or group to satisfy carbon valency. The substituted SWNTs and other carbon nanotubes described above may advantageously be further functionalized. Such compositions include compositions of the formula (XXXV) [CnHLAm (XXXV) where n, L and m are as described above, A is selected from —OY, —NHY, —CR′2—OY, —C(O)OY, —C(O)NR′Y, —C(O)SY, or —C(O)Y, wherein Y is an appropriate functional group of a protein, a peptide, an enzyme, an antibody, a nucleotide, an oligonucleotide, an antigen, or an enzyme substrate, enzyme inhibitor or the transition state analog of an enzyme substrate or is selected from —R′OH, —R′NH2, —R′SH, —R′CHO, —R′CN, —R′X, —R′SiR′3, —RSi—(OR′)y—R′(3-y), —R′Si—(O—SiR′2)—OR′, —R′—R″, —R′—NCO, (C2H4O)wY, —(C3H6O)wH, —(C2H4O)wR′, —(C3H6O)wR′ and R″, wherein w is an integer greater than one and less than 200. The functional SWNTs and other carbon nanotubes of structure (XXXIV) may also be functionalized to produce compositions having the formula (XXXVI) [CnHLR′-A]m (XXXVI) where n, L, m, R′ and A are as defined above. The compositions also include SWNTs and other carbon nanotubes upon which certain cyclic compounds are adsorbed. These include compositions of matter of the formula (XXXVII) [CnHLX—Ra]m (XXXVII) where n is an integer, L is a number less than 0.1 n, m is less than 0.5 n, a is zero or a number less than 10, X is a polynuclear aromatic, polyheteronuclear aromatic or metallopolyheteronuclear aromatic moiety and R is as recited above. Preferred cyclic compounds are planar macrocycles such as re porphyrins and phthalocyanines. The adsorbed cyclic compounds may be functionalized. Such compositions include compounds of the formula (XXXVIII) [CnHLX-Aa]m (XXXVIII) where m, n, L, a, X and A are as defined above and the carbons are on the SWNT or on other nanotubes such as MWNTs, VGCF, or the like. Without being bound to a particular theory, the functionalized SWNTs and other carbon nanotubes are better dispersed into organic polymers because the modified surface properties may render the carbon nanotube more compatible with the organic polymer, or, because the modified functional groups (particularly hydroxyl or amine groups) are bonded directly to the organic polymer as terminal groups. In this way, organic polymers such as polycarbonates, polyamides, polyesters, polyetherimides, or the like, bond directly to the carbon nanotubes, thus making the carbon nanotubes easier to disperse with improved adherence to the organic polymer. Functional groups may generally be introduced onto the outer surface of the SWNTs and the other carbon nanotubes by contacting the respective outer surfaces with a strong oxidizing agent for a period of time sufficient to oxidize the surface of the SWNTs and other carbon nanotubes and further contacting the respective outer surfaces with a reactant suitable for adding a functional group to the oxidized surface. Preferred oxidizing agents are comprised of a solution of an alkali metal chlorate in a strong acid. Preferred alkali metal chlorates are sodium chlorate or potassium chlorate. A preferred strong acid used is sulfuric acid. Periods of time sufficient for oxidation are about 0.5 hours to about 24 hours. Carbon black may also be optionally used in the compositions. Preferred carbon blacks are those having average particle sizes less than about 200 nm, preferably less than about 100 nm, more preferably less than about 50 nm. Preferred conductive carbon blacks may also have surface areas greater than about 200 square meter per gram (m2/g), preferably greater than about 400 m2/g, yet more preferably greater than about 1000 m2/g. Preferred conductive carbon blacks may have a pore volume (dibutyl phthalate absorption) greater than about 40 cubic centimeters per hundred grams (cm3/100 g), preferably greater than about 100 cm3/100 g, more preferably greater than about 150 cm3/100 g. Exemplary carbon blacks include the carbon black commercially available from Columbian Chemicals under the trade name Conductex®; the acetylene black available from Chevron Chemical, under the trade names S.C.F. (Super Conductive Furnace) and E.C.F. (Electric Conductive Furnace); the carbon blacks available from Cabot Corp. under the trade names Vulcan XC72 and Black Pearls; and the carbon blacks commercially available from Akzo Co. Ltd under the trade names Ketjen Black EC 300 and EC 600. Preferred conductive carbon blacks may be used in amounts from about 2 wt % to about 25 wt % based on the total weight of the composition. Solid conductive metallic fillers may also optionally be used in the conductive compositions. These may be electrically conductive metals or alloys that do not melt under conditions used in incorporating them into the organic polymer, and fabricating finished articles therefrom. Metals such as aluminum, copper, magnesium, chromium, tin, nickel, silver, iron, titanium, and mixtures comprising any one of the foregoing metals can be incorporated into the organic polymer as conductive fillers. Physical mixtures and true alloys such as stainless steels, bronzes, and the like, may also serve as conductive filler particles. In addition, a few intermetallic chemical compounds such as borides, carbides, and the like, of these metals, (e.g., titanium diboride) may also serve as conductive filler particles. Solid non-metallic, conductive filler particles such as tin-oxide, indium tin oxide, and the like may also optionally be added to render the organic polymer conductive. The solid metallic and non-metallic conductive fillers may exist in the form of powder, drawn wires, strands, fibers, tubes, nanotubes, flakes, laminates, platelets, ellipsoids, discs, and other commercially available geometries. Non-conductive, non-metallic fillers that have been coated over a substantial portion of their surface with a coherent layer of solid conductive metal may also optionally be used in the conductive compositions. The non-conductive, non-metallic fillers are commonly referred to as substrates, and substrates coated with a layer of solid conductive metal may be referred to as “metal coated fillers”. Typical conductive metals such as aluminum, copper, magnesium, chromium, tin, nickel, silver, iron, titanium, and mixtures comprising any one of the foregoing metals may be used to coat the substrates. Examples of substrates include those described in “Plastic Additives Handbook, 5th Edition” Hans Zweifel, Ed, Carl Hanser Verlag Publishers, Munich, 2001. Examples of such substrates include silica powder, such as fused silica and crystalline silica, boron-nitride powder, boron-silicate powders, alumina, magnesium oxide (or magnesia), wollastonite, including surface-treated wollastonite, calcium sulfate (as its anhydride, dihydrate or trihydrate), calcium carbonate, including chalk, limestone, marble and synthetic, precipitated calcium carbonates, generally in the form of a ground particulates, talc, including fibrous, modular, needle shaped, and lamellar talc, glass spheres, both hollow and solid, kaolin, including hard, soft, calcined kaolin, and kaolin comprising various coatings to facilitate compatibility with the polymeric matrix polymer, mica, feldspar, silicate spheres, flue dust, cenospheres, fillite, aluminosilicate (armospheres), natural silica sand, quartz, quartzite, perlite, tripoli, diatomaceous earth, synthetic silica, and mixtures comprising any one of the foregoing. All of the above substrates may be coated with a layer of metallic material for use in the conductive compositions. Regardless of the exact size, shape and composition of the solid metallic and non-metallic conductive filler particles, they may be dispersed into the organic polymer at loadings of about 0.001 to about 50 wt % of the total weight of the composition when desired. Within this range it is generally desirable to have the solid metallic and non-metallic conductive filler particles in an amount of greater than or equal to about 1 wt %, preferably greater than or equal to about 1.5 wt % and more preferably greater than or equal to about 2 wt % of the total weight of the composition. The loadings of the solid metallic and non-metallic conductive filler particles may be less than or equal to 40 wt %, preferably less than or equal to about 30 wt %, more preferably less than or equal to about 25 wt % of the total weight of the composition. In one embodiment, in one method of manufacturing the composition, the polymeric precursor in the form of a monomer, oligomer, or polymer is added to a reaction vessel. Suitable examples of reaction vessels are kettles, thin film evaporators, single or multiple screw extruders, Buss kneaders, Henschel mixers, helicones, Ross mixers, Banbury, roll mills, molding machines such as injection molding machines, vacuum forming machines, blow molding machine, or then like, or combinations comprising at least one of the foregoing machines. The conductive composition comprising the SWNTs and optionally other carbon nanotubes and conductive fillers may then be added to the reaction vessel during the polymerization of the polymeric precursor. In one embodiment, the SWNTs may be added to the reaction vessel prior to the polymerization of the polymer precursor. The polymerization of the polymer precursor may be conducted in a solvent or in the absence of a solvent, in the melt if desired. In another embodiment, the SWNTs may be added to the reaction vessel during the polymerization of the polymer precursor. In yet another embodiment, the SWNTs may be added to the reaction vessel prior the polymerization of the polymer precursor, while the other conductive and non-conductive fillers may be added to the reaction vessel after the polymerization of the organic precursors is substantially completed. In yet another embodiment, the reaction vessel may contain a high proportion of the SWNTs and other conductive and non-conductive fillers during the initial stages of the polymerization process in order to adjust the viscosity in the reaction to vessel to be effective to facilitate the disentangling of the SWNTs and other fillers. After agitating the reaction solution for a desired period of time, additional polymer precursors are added to the reaction vessel to continue the polymerization process. In one embodiment, the SWNTs together with other conductive and non-conductive fillers may be added to the reaction vessel in the form of a masterbatch. In another embodiment, related to the use of masterbatches, a first masterbatch comprising the SWNTs may be added to the reaction vessel at a first time, while the second masterbatch comprising the other non-conductive fillers may be added to the reaction vessel at a second time during the process of polymerization of the polymer precursors. As stated above, the composition may be manufactured in the melt or in a solution comprising a solvent. Melt reacting of the composition involves the use of shear force, extensional force, compressive force, ultrasonic energy, electromagnetic energy, thermal energy or combinations comprising at least one of the foregoing forces or forms of energy and is conducted in processing equipment wherein the aforementioned forces are exerted by a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, screws with screens, barrels with pins, rolls, rams, helical rotors, baffles, or combinations comprising at least one of the foregoing. In one embodiment, ultrasonic energy may be utilized to disperse the SWNTs. The polymer precursors together with the SWNTs, and other optional conductive or non-conductive fillers are first sonicated in an ultrasonicator to disperse the SWNTs. Following the sonication, the polymer precursors are polymerized. The ultrasonication may be continued during the polymerization process if desired. The ultrasonic energy may be applied to the different reaction vessels such as kettles, extruders, and the like, in which the polymerization may be carried out. Melt reacting involving the aforementioned forces may be conducted in machines such as, but not limited to single or multiple screw extruders, Buss kneader, Henschel, helicones, Ross mixer, Banbury, roll mills, molding machines such as injection molding machines, vacuum forming machines, blow molding machine, or then like, or combinations comprising at least one of the foregoing machines. Solution reacting is generally conducted in a vessel such as a kettle. In one embodiment, the polymer precursor in powder form, pellet form, sheet form, or the like, may be first dry blended with the SWNTs and other optional fillers if desired in a Henschel or a roll mill, prior to being fed into a reaction vessel such as an extruder or Buss kneader. While it is generally desirable for the shear forces in the reaction vessel to generally cause a dispersion of the SWNTs in the polymer precursor, it is also desired to preserve the aspect ratio of the SWNTs during the reaction. In order to do so, it may be desirable to introduce the SWNTs into the reaction vessel in the form of a masterbatch. In such a process, the masterbatch may be introduced into the reaction vessel downstream of the polymer precursor. The masterbatch may comprise either an organic polymer or a polymer precursor with the SWNTs. When a masterbatch is used, the SWNTs may be present in the masterbatch in an amount of about 0.01 to about 50 wt %. Within this range, it is generally desirable to use SWNTs in an amount of greater than or equal to about 0.1 wt %, preferably greater or equal to about 0.2 wt %, more preferably greater than or equal to about 0.5 wt % of the total weight of the masterbatch. Also desirable are SWNTs in an amount of less than or equal to about 30 wt %, preferably less than or equal to about 10 wt %, more preferably less than or equal to about 5 wt % of the total weight of the masterbatch. In one embodiment pertaining to the use of masterbatches, while the masterbatch containing the SWNTs may not have a measurable bulk or surface resistivity either when extruded in the form of a strand or molded into the form of dogbone, the resulting composition into which the masterbatch is incorporated has a measurable bulk or surface resistivity, even though the weight fraction of the SWNTs in the composition is lower than that in the masterbatch. It is preferable for the organic polymer in such a masterbatch to be semi-crystalline. Examples of semi-crystalline organic polymers which display these characteristics and which may be used in masterbatches are polypropylene, polyamides, polyesters, or the like, or combinations comprising at least on of the foregoing semi-crystalline organic polymers. The composition may also be used as a masterbatch if desired. When the composition is used as a masterbatch, the SWNTs may be present in the masterbatch in an amount of about 0.01 to about 50 wt %. Within this range, it is generally desirable to use SWNTs in an amount of greater than or equal to about 0.1 wt %, preferably greater or equal to about 0.2 wt %, more preferably greater than or equal to about 0.5 wt % of the total weight of the masterbatch. Also desirable are SWNTs in an amount of less than or equal to about 30 wt %, preferably less than or equal to about 10 wt %, more preferably less than or equal to about 5 wt % of the total weight of the masterbatch. In another embodiment relating to the use of masterbatches in the manufacture of a composition comprising a blend of organic polymers, it is sometimes desirable to have the masterbatch comprising an organic polymer that is the same as the organic polymer that is derived from the polymerization of the polymer precursors. This feature permits the use of substantially smaller proportions of the SWNTs, since only the continuous phase of the organic polymer carries the SWNTs that provide the composition with the requisite volume and surface resistivity. In yet another embodiment relating to the use of masterbatches in polymeric blends, it may be desirable to have the masterbatch comprising an organic polymer that is different in chemistry from other the polymeric that are used in the composition. In this case, the organic polymer of the masterbatch will form the continuous phase in the blend. In yet another embodiment, it may be desirable to use a separate masterbatch comprising multiwall nanotubes, vapor grown carbon fibers, carbon black, conductive metallic fillers, solid non-metallic, conductive fillers, or the like, or combinations comprising at least one of the foregoing in the composition. The composition comprising the organic polymer and the SWNTs may be subject to multiple blending and forming steps if desirable. For example, the composition may first be extruded and formed into pellets. The pellets may then be fed into a molding machine where it may be formed into other desirable shapes such as housing for computers, automotive panels that can be electrostatically painted, or the like. Alternatively, the composition emanating from a single melt blender may be formed into sheets or strands and subjected to post-extrusion processes such as annealing, uniaxial or biaxial orientation. In one embodiment, the organic polymer precursor may be first mixed with the SWNT's in a reaction vessel such as a kettle, and subsequently polymerized in a device where a combination of shear, extension and/or elongational forces are used during the polymerization. Suitable devices for conducting the polymerization are those having a single screw, multiple screws, intermeshing co-rotating or counter rotating screws, non-intermeshing co-rotating or counter rotating screws, reciprocating screws, screws with pins, screws with screens, barrels with pins, rolls, rams, helical rotors, baffles, or combinations comprising at least one of the foregoing. Solution blending may also be used to manufacture the composition. The solution blending may also use additional energy such as shear, compression, ultrasonic vibration, or the like, to promote homogenization of the SWNTs with the organic polymer. In one embodiment, the polymer precursors may be introduced into an ultrasonic sonicator along with the SWNTs. The mixture may be solution blended by sonication for a time period effective to disperse the SWNTs onto the organic polymer particles prior to or during synthesis of the polymer precursors. The organic polymer along with the SWNTs may then be dried, extruded and molded if desired. A fluid such as a solvent may optionally be introduced into the sonicator with the SWNTs and the organic polymer precursor. The time period for the sonication is generally an amount effective to promote dispersion and/or encapsulation of the SWNTs by the organic polymer precursor. After the encapsulation, the organic polymer precursor is then polymerized to form an organic polymer within which is dispersed the SWNTs. This method of dispersion of the SWNTs in the organic polymer promotes the preservation of the aspect ratios of the SWNTs, which therefore permits the composition to develop electrical conductivity at lower loading of the SWNTs. In general, it is desirable to sonicate the mixture of organic polymer, organic polymer precursor, fluid and/or the SWNTs a period of about 1 minute to about 24 hours. Within this range, it is desirable to sonicate the mixture for a period of greater than or equal to about 5 minutes, preferably greater than or equal to about 10 minutes and more preferably greater than or equal to about 15 minutes. Also desirable within this range is a time period of less than or equal to about 15 hours, preferably less than or equal to about 10 hours, and more preferably less than or equal to about 5 hours. In one embodiment, related to the dispersion of the SWNTs having production related impurities, the SWNT compositions having a higher fraction of impurities may be dispersed using less energy than SWNT compositions having a lower fraction of impurities. Without being limited by theory, it is believed that in certain organic polymers, the impurities interact to promote a reduction in the Van der Waal's forces thereby facilitating an easier dispersion of the nanotubes within the organic polymer. In another embodiment, related to the dispersion of SWNTs having production related impurities, the SWNT compositions having a higher fraction of impurities may require a larger amount of mixing than those compositions having a lower fraction of impurities. However, the composition having the SWNTs with the lower fraction of impurities generally lose electrical conductivity upon additional mixing, while the composition having the higher fraction of SWNT impurities generally gain in electrical conductivity as the amount of mixing is increased. These compositions may be used in applications where there is a need for a superior balance of flow, impact, and conductivity. They may also be used in applications where conductive materials are used and wherein the conductive materials possess very small levels of conductive filler such as in fuel cells, electrostatic painting applications, and the like. The compositions described above may be used in a wide variety of commercial applications. They may be advantageously utilized as films for packaging electronic components such as computers, electronic goods, semi-conductor components, circuit boards, or the like that need to be protected from electrostatic dissipation. They may also be used internally inside computers and other electronic goods to provide electromagnetic shielding to personnel and other electronics located outside the computer as well as to protect internal computer components from other external electromagnetic interference. They may also be used advantageously in automotive body panels both for interior and exterior components of automobiles that can be electrostatically painted if desired. The following examples, which are meant to be exemplary, not limiting, illustrate compositions and methods of manufacturing of some of the various embodiments of the electrically conductive compositions described herein. EXAMPLE 1 This example was undertaken to disperse SWNTs in polycarbonate (PC) and to create a masterbatch of SWNTs in PC. 250 milligrams (mg) of SWNTs obtained from Carbon Nanotechnologies Incorporated was first dispersed in 120 milliliter (ml) of 1,2 dichloroethane by using an ultrasonication horn for 30 minutes. The ultrasonic horn used an ultrasonic processor at 80% amplitude (600 Watts, probe diameter of 13 mm available from Sonics & Materials Incorporated). 30 gms of bis(methylsalicyl)carbonate (BMSC) and 20.3467 gms of bisphenol A (BPA) (mol of BMSC/mol of BPA=1.02) were added to dispersion and SWNT the reaction mixture was again sonicated for 30 minutes. The sonicated mass was transferred into a glass reactor, which was first passivated by soaking the reactor in a bath containing 1 molar aqueous hydrochloric acid solution for 24 hours followed by vigorous rinsing with deionized water. The solvent was dried by heating the glass reactor to 100° C. in presence of flowing nitrogen at low pressure. Appropriate amount of catalyst solution was then introduced into the reactor using a syringe. The amount of catalyst consists of 4.5×10−6 moles of NaOH per mole of BPA and 3.0×10−4 moles of TBPA (tetrabutyl phosphonium acetate) per mole of BPA (bisphenol A). The atmosphere inside the reactor was then evacuated using a vacuum source and purged with nitrogen. This cycle was repeated 3 times after which the contents of the reactor were heated to melt the monomer mixture (bis(methylsalicyl)carbonate (BMSC) and bisphenol A (BPA)). When the temperature of the mixture reached about 180° C., the stirrer in the reactor was turned on and adjusted to about 60 revolutions per minute (rpm) to ensure that the entire solid mass fully melted, a process that usually took about 15 to about 20 minutes. Next, the reaction mixture was heated to about 220° C., while the pressure inside the reactor was adjusted slowly to about 100 millibar using a vacuum source. After stirring the reaction mass at this condition for about 15 minutes, the reaction temperature was raised to about 280° C. while readjusting the pressure to around 20 millibar. After being maintained at this condition for about 10 minutes, the temperature of the reaction mixture was raised to 300° C. while bringing the pressure down to about 1.5 millibar. After allowing the reaction to proceed under these conditions for about 2 to about 5 minutes, the pressure inside the reactor was brought to atmospheric pressure and the reactor was vented to relieve any excess pressure. Product isolation was accomplished by breaking the glass nipple at the bottom of the reactor and collecting the material. The glass reactor was dismantled and the rest of the polymer was taken our from the reactor tube. To measure the molecular weight, the resulting polycarbonate was dissolved in methylene chloride followed by re-precipitation of the polymers from methanol. The molecular weight of the polymer was determined by gel permeation chromatography with respect to polystyrene standard. The weight average molecular weight was 55756 g/mole, while the number average molecular weight was 23,938 g/mole and the polydispersity index was 2.32. EXAMPLE 2 This example was undertaken to disperse SWNTs in PCCD (poly(1,4-cyclohexane-dimethanol-1,4-cyclohexanedicarboxylate) polymer and to create a masterbatch of SWNTs in PCCD. The PCCD polymer was synthesized by melt polycondensation in presence of SWNTs obtained from Carbon Nanotechnologies Incorporated. A slurry of SWNTs (0.24 gm, 1 wt %) was prepared by mixing the SWNTs with 1,4-dimethyl cyclohexane dicarboxylate (14.01 gm, 0.07 moles) (DMCD), 1,4-cyclohexane dimethanol (10.09 gm, 0.07 moles) (CHDM) and 1,2-dichloroethane (50 mL) under high stirring. The slurry was transferred to the glass reactor tube. The reactor tube was mounted to the melt polycondensation reactor equipped with side arm, a mechanical stirrer driven by an overhead stirring motor and a side arm with a stop-cock. The side arm is used to purge nitrogen gas as well as for applying vacuum. Initially, the reactor tube was heated under nitrogen to remove the 1,2-dichloroethane and cooled to room temperature. The contents in the reactor were evacuated and purged with nitrogen three times to remove any traces of oxygen. The reactor was purged with nitrogen and brought to atmospheric pressure and the contents of the reaction mixture were heated to 200° C. with constant stirring (100 rpm). Through the side arm 400 parts per million (ppm) of titanium (IV) isopropoxide was added as a catalyst and the ester interchange reaction proceeded with the distillation of methanol which was collected through the side arm in the measuring cylinder (receiver). The temperature of the melt was increased to 250° C. and stirred for 1 hour under nitrogen. The polycondensation was conducted by reducing the pressure in the reactor in stepwise from 900 mm Hg to 700, 500, 300, 100, 50, 25, and 10 mm mercury (Hg). Finally, a full vacuum of 0.5 to 0.1 mbar was applied to the reactor and the polymerization was continued for 30 minutes. After completion of the polymerization, the pressure inside the reactor was brought to atmospheric pressure by purging with nitrogen and the polymer composite was removed from the reactor tube. The polymer was dissolved in dichloromethane for molecular weight determinations using the intrinsic viscosity method. The solution viscosity was determined in phenol/tetrachloroethane (a volume ratio of 2:3 at 25° C.) solution and was found to be 0.58 deciliter/gram (dL/g), which corresponds to the viscosity average molecular weight of 50,000 g/mole. The masterbatches prepared in Examples 1 and 2 were then melt blended with polymers in a small scale laboratory mixing and molding machine to decrease the loading or the SWNT. The strands from the molding machine were fractured under liquid nitrogen and the exposed ends were painted with conductive silver paint to make the conductivity measurements. The conductivity values are shown in the Table 1 below. TABLE 1 Sample # Final Composition Resistivity (kOhm-cm) 1 1.1 wt % SWNT in PC 3.5 2 0.5 wt % SWNT in PC 49 3 0.3 wt % SWNT in PC 119 4 0.2 wt % SWNT in PC 18,500 5 1.1 wt % SWMT in PCCD 17.5 6 0.5 wt % SWNT in PCCD 76 7 0.3 wt % SWNT in PCCD 1,100 8 0.5 wt % SWNT in PCCD/PC 10.0 (50/50 by weight) 9 0.3 wt % SWNT in PCCD/PC 275 (30/70 by weight) As may be seen from the above table, Samples 2-4 were manufactured from PC masterbatches of Example 1 (sample # 1), while Samples 6-9 were manufactured from the masterbatches of Example 2 (sample# 5). From the Examples it can be clearly seen that as the level of the SWNTs is increased, the resistivity is decreased. Further it can be seen that the masterbatches may be advantageously used to disperse the SWNT's in the polymer. EXAMPLE 3 This example was used to prepared a masterbatch of SWNTs in Nylon 6 during the polymerization of the polyamide. 24.8 gm of ε-caprolactam was taken in a beaker and heated to 90° C. After compound has melted, 250 milligrams (mg) of SWNTs containing about 10 wt % impurities (commercially available from Carbon Nanotechnologies Incorporated) was added to the ε-caprolactam. The mixture was ultrasonicated at the same temperture for half an hour using an ultrasonic processor at 80% amplitude (600 Watts, probe diameter of 13 mm available from Sonics & Materials Incorporated). The dispersion of SWNTs in the molten ε-caprolactam was then transferred to a reactor tube and was kept overnight to allow the SWNT ropes to gel (forming a network). 1.5 gm of aminocaproic acid was then added to the reactor and caprolactam was polymerized to nylon-6 by ring-opening polymerization, under nitrogen with slow stirring, for 9 hours at 260° C. EXAMPLE 4 This experiment was undertaken to prepare an SWNT composite in PCCD by in-situ polymerization without using a solvent. In this example, 17.29 gm of 1,4-cyclohexane dicarboxylate, 24.03 gms of 1,4-cyclohexane dimethanol was mixed and melted at 80° C. in a beaker. 33 mg of SWNT containing about 10 wt % impurities (commercially available from Carbon Nanotechnologies Incorporated) was added to the beaker. The mixture was ultrasonicated at the same temperture for half an hour using an ultrasonic processor at 80% amplitude (600 Watts, probe diameter 13 mm, Sonics & Materials Incorporated, USA). The dispersion of SWNT in the molten monomer mixture was then transferred to a reactor tube and was kept overnight to allow the SWNT ropes to gel (forming a network). The monomers were then polymerized to PCCD using the same procedure as in Example 2. A portion of the composite prepared above was heated for one hour to 240° C. for Nylon 6 composite of Example 3 (above the melting point of Nylon 6) and 230° C. for the PCCD composite of Example 4 respectively. The composite was then cooled slowly to room temperature and the conductivity was measured as shown in Table 2. Similarly, the composite material from Examples 3 and 4 was melted mixed with additional polymer and pressed through in a small scale laboratory mixing and molding machine to form strands which were then used to make conductivity measurements as detailed in Example 2. These results are also shown in Table 4. TABLE 4 Resistivity (kOhm-cm) Sample # Final Composition (S.D.*) 10 0.1 wt % SWNT in PCCD of — Example 4 11 0.1 wt % SWNT in PCCD of 10,030 Example 4 (with annealing) 12 1 wt % SWNT in Nylon 6 of 33 (13) Example 3 13 1 wt % SWNT in Nylon 6 of 24 (14) Example 3 (with annealing) 14 0.5 wt % SWNT in Nylon 6 14715 (3986) (melt mixing; sample #12 used as masterbatch) 15 0.5 wt % SWNT in Nylon 6 4075 (2390) (melt mixing using sample #13 as masterbatch) 16 0.5 wt % SWNT in Nylon 6 702 (melt mixed and annealed in the mold) *S. D. represents the numbers in the parenthesis, which are the standard deviations. From the above data it may be seen that the samples that were annealed displayed superior electrical properties than those samples that were annealed. Annealing enables the SWNT ropes to rearrange in the polymer matrix and increases the rejoining/sharing of the SWNT rope-branches, creating an extensive long range networked morphology, which in turn, leads to higher conductivity of the composites. While the invention has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>This disclosure relates to electrically conductive compositions and methods of manufacture thereof. Articles made from organic polymers are commonly utilized in material-handling and electronic devices such as packaging film, chip carriers, computers, printers and photocopier components where electrostatic dissipation or electromagnetic shielding are important requirements. Electrostatic dissipation (hereinafter ESD) is defined as the transfer of electrostatic charge between bodies at different potentials by direct contact or by an induced electrostatic field. Electromagnetic shielding (hereinafter EM shielding) effectiveness is defined as the ratio (in decibels) of the proportion of an electromagnetic field incident upon the shield that is transmitted through it. As electronic devices become smaller and faster, their sensitivity to electrostatic charges is increased and hence it is generally desirable to utilize organic polymers that have been modified to provide improved electrostatically dissipative properties. In a similar manner, it is desirable to modify organic polymers so that they can provide improved electromagnetic shielding while simultaneously retaining some or all of the advantageous mechanical properties of the organic polymers. Conductive fillers such as graphite fibers derived from pitch and polyacrylonitrile having diameters larger than 2 micrometers are often incorporated into organic polymers to improve the electrical properties and achieve ESD and EM shielding. However, because of the large size of these graphite fibers, the incorporation of such fibers generally causes a decrease in the mechanical properties such as impact. There accordingly remains a need in the art for conductive polymeric compositions, which while providing adequate ESD and EM shielding, can retain their mechanical properties.
<SOH> BRIEF DESCRIPTION OF THE INVENTION <EOH>A method for manufacturing a conductive composition comprises blending a polymer precursor with a single wall carbon nanotube composition; and polymerizing the polymer precursor to form an organic polymer. detailed-description description="Detailed Description" end="lead"?
20040318
20060411
20050217
97379.0
0
BOYKIN, TERRESSA M
ELECTRICALLY CONDUCTIVE COMPOSITIONS AND METHOD OF MANUFACTURE THEREOF
UNDISCOUNTED
0
ACCEPTED
2,004
10,803,766
ACCEPTED
Refrigerated compartment with controller to place refrigeration system in sleep-mode
A refrigeration system is employed to cool a refrigerated compartment in a kitchen or restaurant. An electronic refrigeration controller controls various aspects of the refrigerated compartment, including temperature. When a push button is pressed, a “sleep-mode” is activated to safely shut the refrigeration system down and turn the evaporator fan off. An employee can then stock or remove inventory from the refrigerated compartment without cool air blowing on the employee. After a predetermined amount of time, the sleep-mode ends and cool air blows into the refrigerated compartment.
1. A method of maintaining a temperature in a refrigerated compartment comprising the steps of: a) cooling the refrigerated compartment; b) providing a signal to stop step a) for a predetermined amount of time; and c) cooling the refrigerated compartment after the predetermined amount of time. 2. The method as recited in claim 1 further comprising the steps of: compressing a refrigerant to a high pressure; cooling the refrigerant; expanding the refrigerant to a low pressure; and heating the refrigerant, and the step of heating the refrigerant includes accepting heat from a fluid medium to cool the refrigerated compartment. 3. The method as recited in claim 2 wherein the step of heating comprises employing a first evaporator and a second evaporator. 4. The method as recited in claim 3 further including the step of operating the first evaporator and the second evaporator independently. 5. The method as recited in claim 1 wherein the step of providing the signal comprises pressing a button. 6. The method as recited in claim 1 wherein the predetermined amount of time is between 5 minutes and 120 minutes. 7. The method as recited in claim 6 wherein the predetermined amount of time is between 15 minutes and 30 minutes. 8. The method as recited in claim 1 wherein the predetermined amount of time is between 8 hours and 48 hours. 9. The method as recited in claim 1 wherein the refrigerated compartment is one of a display case and a service cabinet. 10. The method as recited in claim 1 wherein the refrigerated compartment is employed with medical and scientific applications. 11. The method as recited in claim 1 further comprising the step of providing a second signal to begin cooling the refrigerated compartment before the predetermined time. 12. The method as recited in claim 1 wherein the method is monitored remotely. 13. The method as recited in claim 1 further including the steps of sensing the temperature in the refrigerated compartment and providing a second signal to stop the step of cooling after step c), and the step of providing a second signal occurs when the step of sensing detects that the temperature in the refrigerated compartment exceeds a threshold value. 14. The method as recited in claim 13 wherein the step of providing a second signal occurs after a threshold amount of time. 15. A system for maintaining a temperature in a refrigerated compartment comprising: a controller to regulate the temperature in the refrigerated compartment; and an evaporator to cool the refrigerated compartment, and the evaporator stops cooling the refrigerated compartment for a predetermined amount of time in response to a signal. 16. The system as recited in claim 15 further comprising: a compressor to a refrigerant to a high pressure; a condenser for cooling the refrigerant; and an expansion device to expand the refrigerant to a low pressure. 17. The system as recited in claim 15 wherein the evaporator heats a refrigerant by accepting heat from a fluid medium, and the fluid medium cools the refrigerated compartment. 18. The system as recited in claim 15 further comprising a button to generate the signal. 19. The system as recited in claim 15 further comprising more than one button to generate the signal. 20. The system as recited in claim 15 wherein the predetermined amount of time is between 15 minutes and 30 minutes. 21. The system as recited in claim 15 further including a temperature sensor to detect the temperature in the refrigerated compartment, and wherein the evaporator stops cooling the refrigerated compartment in response to a second signal after the predetermined time if the temperature sensor detects that the temperature is above a threshold temperature. 22. The system as recited in claim 15 further including second evaporator.
BACKGROUND OF THE INVENTION The present invention relates generally to a refrigerated compartment including a controller that places a refrigeration system in a sleep-mode for a predetermined amount of time in response to a signal. Restaurants, kitchens and food preparation areas commonly include a cooler or freezer having a refrigerated compartment in which perishable items and food, such as vegetables, meats, and dairy products, are stored. The refrigerated compartment is cooled by a remote refrigeration system. The refrigerated compartment is continuously accessed for cleaning, to retrieve food, and to store food. During replenishment of the refrigerated compartment, warm air can enter the refrigerated compartment, possibly exposing the food to temperatures above the safe limits set by the governing food safety bodies (such as the Food and Drug Administration) and causing spoilage. During replenishment, the refrigeration system continues to operate to maintain the temperature in the refrigerated compartment. Most local and national codes require that the evaporators in the refrigerated compartment have an electrical disconnect switch that allow the evaporator fan to be turned off when the evaporators are serviced for extended periods of time. The main power to the refrigeration system can also be turned off. For example, the refrigeration system is commonly turned off during cleaning to prevent water from freezing on the evaporator. Employees occasionally turn off the evaporator fan and the refrigeration system to prevent cold air from blowing on them when stocking items in the refrigerated compartment. In certain applications, the refrigeration system is independent of the evaporator fan, and the employee may not have access to the electrical disconnect for the refrigeration system when the power to the evaporator fan is turned off. When the evaporator fan and the refrigeration system are off, the temperature in the refrigerated compartment increases. If the employee forgets to activate the refrigeration system and the evaporator fan after leaving the refrigerated compartment, the temperature in the refrigerated compartment continues to increases, possibly putting the food at risk of spoiling. In prior refrigerated compartments, the disconnect switch to the evaporator fan is not always wired correctly and may not allow the normally closed liquid line solenoid valve to close. This can cause slugs of liquid refrigerant to flood the compressor, possibly causing compressor failure and a complete shutdown of the refrigeration system. By the time the compressor failure is detected, the temperature of the refrigerated compartment can increase. Incorrectly shutting down the refrigeration system and restoring operation, or leaving the refrigeration system off for an extended period of time, also causes heavy power or demand use of kilowatts (kW) during the pull down mode. There is a need for a refrigerated compartment that enters a sleep-mode and blows cool air into the refrigerated compartment after a predetermined amount of time and overcomes the other disadvantages of the prior art. SUMMARY OF THE INVENTION A refrigeration system is employed to cool a refrigerated compartment in a restaurant or kitchen. Refrigerant is compressed in a compressor to a high pressure and a high enthalpy. The compressed refrigerant is cooled in a condenser and expanded to a low pressure in an expansion device. The refrigerant then flows through an evaporator and cools the air in the refrigerated compartment. The refrigerant then returns to the compressor, completing the cycle. The refrigeration compartment includes an electronic refrigeration controller that controls various aspects of the refrigerated compartment, including the temperature. When an employee stocks or removes inventory from the refrigerated compartment, the employee presses a push button to place the refrigeration system in a sleep-mode. The refrigeration system is safely shut down and the evaporator is turned off to stop cool air from blowing into the refrigerated compartment and on the employee. After a predetermined amount of time, the sleep-mode ends and the refrigeration system and the evaporator fan is activated to cool the refrigerated compartment, ensuring that the temperature of the refrigerated compartment does not elevate above a critical temperature for an extended period of time. These and other features of the present invention will be best understood from the following specification and drawings. BRIEF DESCRIPTION OF THE DRAWINGS The various features and advantages of the invention will become apparent to those skilled in the art from the following detailed description of the currently preferred embodiment. The drawings that accompany the detailed description can be briefly described as follows: FIG. 1 schematically illustrates a refrigeration system utilized to cool the refrigerated component of the present invention; FIG. 2 schematically illustrates a graph showing the effect of improperly shutting down and starting up a refrigeration system with regard to the average kilowatt demand of equipment as a function of time; and FIG. 3 schematically illustrates a graph showing the effect of improperly shutting down and starting up a refrigeration system with regarding to the temperature of the inventory as a function of time. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT As schematically illustrated in FIG. 1, a refrigeration system 20 is employed to cool a refrigerated compartment 30. The refrigerated compartment 30 can be a freezer or a refrigerator in a kitchen or restaurant that cools and stores perishable items, such as food. However, it is to be understood that other uses are possible. For example, the refrigerated compartment 30 can be a display case or a service cabinet that stores items in a preparation area before use. Alternately, the refrigerated compartment 30 can be used for scientific or medical applications. Refrigerant is compressed in a compressor 22 to a high pressure and a high enthalpy. The compressed refrigerant then flows through a condenser 24 and is cooled. The high pressure and low enthalpy refrigerant is then expanded to a low pressure in an expansion device 26. The expansion device 26 can be an electronic expansion valve, or any other type of expansion device. After expansion, the refrigerant flows through an evaporator 28 and accepts heat from the air in the refrigerated compartment 30. A fan 32 blows a fluid over the evaporator 28, and the fluid rejects heat to the refrigerant in the evaporator 28, heating the refrigerant and cooling the fluid in the refrigerated compartment 30. In one example, the fluid is air. The refrigeration system 20 can also include more than one evaporator 28 (i.e., master-slave). If more than one evaporator 28 is employed, the evaporators 28 can operate independently and at different times. That is, one evaporator 28 can be operating when the other evaporator 28 is not operating. The refrigerant then returns to the compressor 22, completing the cycle. The evaporator fan 32 circulates the fluid in the refrigerated compartment 30 separately from the refrigeration system 20. Therefore, the fan 32 can operate when the refrigeration system 20 is not operating. The fluid can also circulate by natural convection. In one example, the cooler compartment 30 includes a door 34 that allows access to the refrigerated compartment 30. When food is to be added to or removed from the refrigerated compartment 30, the door 34 is opened to allow access to the refrigerated compartment 30. However, it is possible that the refrigerated compartment 30 does not include a door 34, such as if the refrigerated compartment 30 is a display case. The refrigeration system 20 includes an electronic refrigeration controller 42 having a timed circuit feature. The electronic refrigeration controller 42 controls various aspects of the refrigerated compartment 30, including the temperature. A push button 36 is located either near the evaporator 28 or near the entrance to the refrigerated compartment 30. Although one push button 36 is illustrated and described, it is to be understood that more than one push button 36 can be employed. Preferably, the push button 36 is incorporated into an existing Guardian electronic refrigeration control by Parker-Hannifinn. When an employee stocks or removes food from the refrigerated compartment 30, the employee pushes the push button 36 to stop cool air from blowing into the refrigerated compartment 30. When the push button 36 is pressed, a “sleep-mode” is activated through the electronic refrigeration controller 42 to stop cool air from blowing into the refrigerated compartment 30. The refrigeration system 20 is safely shut down for a predetermined amount of time when the sleep-mode is activated. A solenoid valve 40 is located between the condenser 24 and the expansion valve 26. When the sleep-mode is activated, the controller 42 provides a signal to close the solenoid valve 40 and the expansion device 26, decreasing the suction pressure of the refrigerant entering the compressor 22. The compressor 22 shuts off by a low-pressure switch. The refrigerant is then pumped out of the low-side of the refrigeration system 20, preventing flooding of the compressor 22 when the refrigeration system 20 is turned on again. Although a solenoid valve 40 is illustrated and described, it is to be understood that the refrigeration system 20 can be safely shut down without a solenoid valve 40. In this example, the refrigeration system 20 is safely shut down by closing the expansion device 26. In the present invention, the refrigeration system 20 is safely shut down and restarted under low load, providing an energy savings. The evaporator fan 32 is also turned off when the sleep-mode is activated to stop cool air from blowing into the refrigerated compartment 30. Preferably, both the evaporator fan 32 and the refrigeration system 20 are shut down simultaneously to stop cool air from blowing in the refrigerated compartment 30. However, it is to be understood that the evaporator fan 32 and the refrigeration system 20 can be shut down independently to stop cool air from blowing into the refrigerated compartment 30. After the predetermined amount of time, the sleep-mode ends and the refrigerated compartment 30 is again cooled, ensuring that the refrigerated compartment 30 does not elevated above a critical temperature. The controller 42 sends a signal to open the solenoid valve 40 and the expansion valve 26, starting the refrigeration system 20. The controller 42 energizes and opens the solenoid valve 40, allowing refrigerant to enter the compressor 22. Because the refrigeration was pumped out of the low side of the refrigeration system 20 when the solenoid valve 40 and the expansion valve 26 were closed, the refrigerant does not flood the compressor 20. The controller 42 also activates the evaporator fan 32 to again blowing cool air over the evaporator 28 and into the refrigerated compartment 30. Operators of the kitchen or restaurant can program the duration of the sleep-mode into the electronic refrigeration controller 42. Alternately, the duration of the sleep-mode can be programmed when the electronic refrigeration controller 42 is manufactured. The duration can be programmed on site at the kitchen or restaurant or remotely. In one example, the duration of the sleep-mode is between 5 minutes and 120 minutes. For example, if the refrigerated compartment 30 is employed in a restaurant or kitchen and usually turned off during cleaning or replenishment, the sleep-mode can be programmed to be between 15 minutes and 30 minutes in duration. The sleep-mode can have a longer duration, such as between 8 hours and 48 hours, for example if the sleep-mode is to occur over a weekend. It is to be understood that the sleep-mode can have other durations depending on the application. By properly shutting down the refrigeration system 20 and the evaporator fan 32, the average kilowatt demand of the equipment in the refrigeration system 20 is kept low. By keeping the kilowatt demand low, the surface temperature of the items in the refrigerated compartment 30 can be kept low. FIG. 2 schematically illustrates the effect of improperly shutting down and starting up the refrigeration system 20 with regard to the average kilowatt demand of the equipment as a function of time over a four-hour time frame. The duration of time between each point is 15 minutes. At point 1, the refrigeration system 20 is improperly shut down. At this time, approximately 3.80 kilowatts is drawn. At point 10, the refrigeration system 20 is turned back on. At point 11, there is a high kilowatt draw because the compressor 22 must pull down the large refrigeration load entering the compressor 22. The average kilowatt draw does not return to the beginning average of 3.80 kilowatts until point 18. That is, the kilowatt draw does not return to the beginning average of 3.80 kilowatts until 1.75 hours after the compressor 22 turns back on. As show in FIG. 3, during this time, the surface temperature of the items in the refrigerated compartment 30 increases. In the present invention, the refrigeration system 20 and the evaporator fan 28 are properly shut down, avoiding a large kilowatt average and preventing the surface temperature of the items in the refrigerated from increasing. The sleep-mode can be interrupted by again pressing the push button 36. The solenoid valve 40 and the expansion valve 26 open to allow refrigerant to enter the compressor 22. The fan 32 of the evaporator 28 is also activated to blow cool air into the refrigerated compartment 30. By pressing the push button 36, the sleep-mode ends before the predetermined time. A programming algorithm limits the number of times that the sleep-mode can be activated in a given time frame. If a person presses the push button 36 after the sleep-mode has ended to again start a sleep-mode, the sleep-mode will not begin again until a temperature sensor 38 detects that the cooler compartment 30 has reached a predetermined temperature for a predetermined amount of time. When the temperature sensor 38 detects that the temperature in the refrigerated compartment 30 exceeds the predetermined temperature, the sleep-mode can again be initiated. Alternately, the electronic refrigeration controller can limit the duration of sequential sleep-modes to ensure that the refrigerated space 30 is not left without refrigeration for too long. The number of times that sleep-mode can be initiated in a given time frame can also be limited. The events relating to the activation of the sleep-mode, the duration of the sleep-mode, and the temperature in the refrigerated compartment 30 are logged and monitored. The time and date associated with these events are also logged. This information can be accessed on site or remotely. The foregoing description is only exemplary of the principles of the invention. One skilled in the art would understand that many modifications and variations of the present invention are possible in light of the above teachings. The preferred embodiments of this invention have been disclosed, however, so that one of ordinary skill in the art would recognize that certain modifications would come within the scope of this invention. It is, therefore, to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described. For that reason the following claims should be studied to determine the true scope and content of this invention.
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention relates generally to a refrigerated compartment including a controller that places a refrigeration system in a sleep-mode for a predetermined amount of time in response to a signal. Restaurants, kitchens and food preparation areas commonly include a cooler or freezer having a refrigerated compartment in which perishable items and food, such as vegetables, meats, and dairy products, are stored. The refrigerated compartment is cooled by a remote refrigeration system. The refrigerated compartment is continuously accessed for cleaning, to retrieve food, and to store food. During replenishment of the refrigerated compartment, warm air can enter the refrigerated compartment, possibly exposing the food to temperatures above the safe limits set by the governing food safety bodies (such as the Food and Drug Administration) and causing spoilage. During replenishment, the refrigeration system continues to operate to maintain the temperature in the refrigerated compartment. Most local and national codes require that the evaporators in the refrigerated compartment have an electrical disconnect switch that allow the evaporator fan to be turned off when the evaporators are serviced for extended periods of time. The main power to the refrigeration system can also be turned off. For example, the refrigeration system is commonly turned off during cleaning to prevent water from freezing on the evaporator. Employees occasionally turn off the evaporator fan and the refrigeration system to prevent cold air from blowing on them when stocking items in the refrigerated compartment. In certain applications, the refrigeration system is independent of the evaporator fan, and the employee may not have access to the electrical disconnect for the refrigeration system when the power to the evaporator fan is turned off. When the evaporator fan and the refrigeration system are off, the temperature in the refrigerated compartment increases. If the employee forgets to activate the refrigeration system and the evaporator fan after leaving the refrigerated compartment, the temperature in the refrigerated compartment continues to increases, possibly putting the food at risk of spoiling. In prior refrigerated compartments, the disconnect switch to the evaporator fan is not always wired correctly and may not allow the normally closed liquid line solenoid valve to close. This can cause slugs of liquid refrigerant to flood the compressor, possibly causing compressor failure and a complete shutdown of the refrigeration system. By the time the compressor failure is detected, the temperature of the refrigerated compartment can increase. Incorrectly shutting down the refrigeration system and restoring operation, or leaving the refrigeration system off for an extended period of time, also causes heavy power or demand use of kilowatts (kW) during the pull down mode. There is a need for a refrigerated compartment that enters a sleep-mode and blows cool air into the refrigerated compartment after a predetermined amount of time and overcomes the other disadvantages of the prior art.
<SOH> SUMMARY OF THE INVENTION <EOH>A refrigeration system is employed to cool a refrigerated compartment in a restaurant or kitchen. Refrigerant is compressed in a compressor to a high pressure and a high enthalpy. The compressed refrigerant is cooled in a condenser and expanded to a low pressure in an expansion device. The refrigerant then flows through an evaporator and cools the air in the refrigerated compartment. The refrigerant then returns to the compressor, completing the cycle. The refrigeration compartment includes an electronic refrigeration controller that controls various aspects of the refrigerated compartment, including the temperature. When an employee stocks or removes inventory from the refrigerated compartment, the employee presses a push button to place the refrigeration system in a sleep-mode. The refrigeration system is safely shut down and the evaporator is turned off to stop cool air from blowing into the refrigerated compartment and on the employee. After a predetermined amount of time, the sleep-mode ends and the refrigeration system and the evaporator fan is activated to cool the refrigerated compartment, ensuring that the temperature of the refrigerated compartment does not elevate above a critical temperature for an extended period of time. These and other features of the present invention will be best understood from the following specification and drawings.
20040318
20061226
20050922
98236.0
0
NORMAN, MARC E
REFRIGERATED COMPARTMENT WITH CONTROLLER TO PLACE REFRIGERATION SYSTEM IN SLEEP-MODE
UNDISCOUNTED
0
ACCEPTED
2,004
10,803,934
ACCEPTED
Reference power supply circuit for semiconductor device
A first PN junction and first current supply are connected between a first potential and a second potential. A second PN junction, first resistive element and second current supply are connected between the first potential and the second potential, the size of the second PN junction being different from that of the first PN junction. A second resistive element is connected in parallel with the first resistive element and second PN junction. A differential amplifier is configured to receive, at an inverting input terminal, a potential between a first current supply and the first PN junction and, at a non-inverting input terminal, a potential on a connection point between a second current supply and the first resistor and to control the first, second and third current supplies by a potential difference between the inverting input and the non-inverting input.
1. A reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first current supply configured to be connected between a second potential and a P type semiconductor area of the first PN junction, the first current supply supplying a current only to the first PN junction; a first resistive element configured to have one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and second PN junction; a second current supply configured to be inserted between the other end of the first resistive element and the second potential; a third current supply configured to be connected between the second potential and an output terminal; and a differential amplifier configured to have an inverting input terminal and a non-inverting input terminal and to receive, at the inverting input terminal, a potential on a first connection point between the first current supply and the first PN junction and, at the non-inverting input terminal, a potential on a second connection point between the second current supply and the first resistive element and to control the first, second and third current supplies by a difference between a potential of the inverting input terminal and a potential of the non-inverting input terminal. 2. A circuit according to claim 1, wherein the differential amplifier has a source follower circuit configured to receive potentials on the first and second connection points. 3. A circuit according to claim 1, wherein the size of the second PN junction is greater than that of the first PN junction. 4. A circuit according to claim 1, wherein the resistive value of the second resistive element is greater than that of the first resistive element. 5. A circuit according to claim 1, further comprising a third resistive element configured to be connected between the output terminal and the first potential, the output terminal outputting a reference voltage. 6. A circuit according to claim 1, further comprising a current mirror circuit configured to be connected between the third current supply and the first potential and to output a reference current. 7. A circuit according to claim 2, further comprising a bias circuit configured to be controlled by a voltage on the output terminal and to apply a bias potential to the differential amplifier. 8. A circuit according to claim 2, further comprising a capacitive load configured to be connected between an output terminal of the differential amplifier and the second potential. 9. A reference power supply circuit comprising: a first diode having a cathode connected to a first potential; a second diode having a cathode connected to the first potential and having a size different from that of the first diode; a first transistor of a first conductivity type configured to be connected between a second potential and the anode of the first diode, the first transistor supplying a current only to the first diode; a first resistive element having one end connected to the anode of the second diode; a second resistive element configured to be connected in parallel with the first resistive element and second diode; a second transistor of a first conductivity type configured to be inserted between the other end of the first resistive element and the second potential and constitute a current supply; a third transistor of a first conductivity type configured to be connected between the second potential and an output terminal and constitute a current supply; and a differential amplifier having an inverting input terminal and a non-inverting input terminal and configured to receive, at the inverting input terminal, a potential on a first connection point between the first transistor and the first diode and, at the non-inverting input terminal, a potential on a connection point between the second transistor and the first resistive element, the differential amplifier being configured to control the first, second and third transistors by a difference between a potential of the inverting input terminal and a potential of the non-inverting input terminal. 10. A circuit according to claim 9, wherein the differential amplifier comprises: a fourth transistor of a first conductivity type having a current path with one end connected to the first potential and a gate connected to the first connection point; a fifth transistor of a first conductivity type having a current path with one end connected to the first potential and a gate connected to the second connection point; a sixth transistor of a first conductivity type having a current path with one end connected to the other end of the current path of the fourth transistor and with the other end connected to the second potential, the gate of the sixth transistor being connected to a first output terminal of the bias circuit; a seventh transistor of a first conductivity type having a current path with one end connected to the other end of the current path of the fifth transistor and with the other end connected to the second potential, the gate of the seventh transistor being connected to the first output terminal of the bias circuit; an eighth transistor of a second conductivity type having a current path with one end connected to the first potential and a gate connected to a second output terminal of the bias circuit; a ninth transistor having a current path with one end connected to the other end of the current path of the eighth transistor and a gate connected to the other end of the current path of the eighth transistor; a tenth transistor of a second conductivity type having a current path with one end connected to the other end of the current path of the eighth transistor and a gate connected to the other end of the current path of the fifth transistor; an eleventh transistor of a first conductivity type having a current path with one end connected to the other end of the current path of the ninth transistor and said output end and with the other end connected to the second potential; and a twelfth transistor of a first conductivity type having a current path with one end connected to the other end of the current path of the tenth transistor and with the other end connected to the second potential, the gate of the twelfth transistor being connected to the gate of the eleventh transistor and to the other end of the current path of the tenth transistor. 11. A circuit according to claim 9, wherein the size of the second diode is greater than that of the first diode. 12. A circuit according to claim 9, wherein the resistive value of the second resistive element is greater than that of the first resistive element. 13. A circuit according to claim 9, further comprising a third resistive element connected between said output terminal and the first potential, said output terminal outputting a reference voltage. 14. A circuit according to claim 9, further comprising a current mirror circuit connected between said third current supply and the first potential and configured to output a reference current. 15. A circuit according to claim 9, wherein said bias circuit comprises a thirteenth transistor of a second conductivity type and fourteenth transistor of a first conductivity type configured to be series-connected between the first potential and the second potential and the gate of the fourteenth transistor being connected to a connection point between the thirteenth transistor and the fourteenth transistor and constituting said output terminal; a fifteenth transistor of a second conductivity type having a current path with one end connected to the first potential, the gate of the fifteenth transistor being connected to the gate of the thirteenth transistor and to the other end of the current path of the fifteenth transistor and constituting said second output terminal; and a fourth resistive element having one end connected to the other end of the current path of the fifteenth transistor and the other end connected to the second potential. 16. A circuit according to claim 15, wherein said bias circuit comprising a sixteenth transistor of a second conductivity type and seventeenth transistor of a first conductivity type configured to be series-connected between the first potential and the second potential, the gate of the seventeenth transistor being connected to said output terminal of the differential amplifier and constituting said first output terminal and the gate of the sixteenth transistor being connected to a connection point between the sixteenth transistor and the seventeenth transistor and constituting said output terminal. 17. A circuit according to claim 10, further comprising a capacitive load connected between an output terminal of the differential amplifier and the second potential. 18. A reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first resistive element having one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and said second PN junction; a current supply connected between a second potential and an output terminal; and a mirror circuit configured to allow a current which flows through the first PN junction to be copied to a corresponding current through the first and second resistive elements and second PN junction and to control the current supply in accordance with the current through the first and second resistive elements and second PN junction. 19. A circuit according to claim 18, wherein the size of the second PN junction is greater than that of the first junction. 20. A circuit according to claim 18, wherein the resistive value of the second resistive element is greater than that of the first resistive element. 21. A circuit according to claim 18, wherein the current mirror circuit comprises: a first transistor has a first gate and a first current path, one end of the first current path is connected to the current supply and another end of the first current path is connected to a P type area of the first PN junction, the first transistor supplies a current only to the first PN junction; and a second transistor has a second gate and a second current path, the second gate is connected to the first gate and one end of the first current path, and the one end of the second current path is connected to the current supply and another end of the second current path is connected to the first and second resistive elements.
CROSS-REFERENCE TO RELATED APPLICATIONS This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2003-411919, filed Dec. 10, 2003, the entire contents of which are incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a reference power supply circuit applied to, for example, a semiconductor device and configured to generate a reference current and reference voltage. 2. Description of the Related Art A semiconductor device has a reference power supply circuit for generating a reference current and reference voltage. The reference power supply circuit is so configured as to include, for example, a BGR (Band Gap Reference) circuit. In recent years, a power supply of the semiconductor device has been made to have a low voltage and a semiconductor device has been developed which can operate even at a low power supply voltage of below 1.25V (see Japanese Patent Laid Open (KOKAI) No. 11-45125). FIG. 17 shows one practical form of a conventional reference voltage generation circuit. In FIG. 17, an output voltage PGT of a differential amplify circuit AMP is supplied to the gates of P channel MOS transistors (hereinafter referred to as PMOS transistors P1, P2). This differential amplifier AMP controls the PMOS transistor P1 and P2 so as to make potentials on connection nodes INP and INN equal to each other. At this time, with IA representing a current flowing through a resistor RA; VA, a potential difference across a diode D2; and VA′, a potential difference across resistors RB, RB, the following equation (1) is established: VA′=RA·IA+VA (1) The current and voltage of the diode are given below. I=Is·exp(q V/kT) (2) V=V0·ln(I/Is), (V0=kT/q) (3) , noting that Is: reverse saturation current; k: Boltzmman constant; T: absolute temperature; and q: electron charge. If the equation (1) is modified with the use of the equation (3), then the temperature characteristic of the current IA is represented as follows: IA=V0/RA·ln(ISA/ISB) (4) Here, ISA, ISB represent the reverse saturation currents of the diodes D2, D1. From the equation (4) the temperature characteristic of the current IA becomes dIA/dT=k/(RA·q)·ln ISA/ISB>0 (5) as shown in equation (5). Further, the relation between the resistance PB, current IB on one hand and the potential difference VA′ across the resistor RB on the other becomes VA′=RB·IB IB=VA′/RB (6) as shown in the equation (6). From the equation (6), the temperature characteristic of the current IB flowing through the resistor RB becomes dIB/dT=1/RB·dVA′/dT<0 (7) If, at this time, the circuit condition is selected under which the variations of the IA and IB with respect to the temperature cancel each other by their sum as shown in the equation (8) below, then a current supply of a smaller temperature dependence is provided. (dIA/dT)+(dIB/dT)=0 (8) For example, if the size ratio of the diodes D2, D1 is given by 100:1, then the resistance ratio RB:RA is found as follows: RB/RA=(q/k·dVA′/dT)/ln(ISA/ISB) Here, the numerical value of each parameter is given below. q=1.6e−19 (C), k=1.38e−23 (J/K) dVA′/dT=−2 (mV), ln (ISA/ISB)=ln (100)≈4.6 Therefore, the resistance ratio RB/RA becomes RB/RA≈23/4.6=5 (9) From the equation (9), the resistance ratio RB:RA becomes equal to about 5:1. If the circuit shown in FIG. 17 is configured with the use of the size ratio of the diodes and resistance ratio above, then the PMOS transistors P1, P2, P3 function as a current supply of a smaller temperature dependence. By connecting a required resistor RC between the PMOS transistor P3 and ground, it is possible to provide an output voltage VREF of a smaller temperature dependence. By the mismatching (variation) of a transistor pair (not shown) constituting an input stage of the differential amplifier AMP, that of a mirror connected PMOS transistors P1, P2, P3 and that of the characteristics of the diodes and resistors, the output voltage VREF also varies. Incidentally, in order to make a variation of the above-mentioned output voltage VREF smaller, a method for increasing the size of the resistors RA, RB, diodes D1, D2, transistors P1, P2, P3, etc., and, by doing so, decreasing the variation of each element is taken. Since this method increases the size of the respective elements, a whole circuit size is increased as a first problem and a high manufacturing cost is involved. In particular, the size of the whole circuit is defined by the size of the diode D1 and resistor RB and it is necessary to reduce the size of these. Further, if the size of the transistor pair constituting an input stage of the differential amplifier AMP is made greater, a parasitic capacitance of a negative feedback circuit is increased and the phase margin is decreased. This poses a second problem of lowering a stability of the circuit involved. FIG. 18 shows the voltage/current characteristic of the circuit shown in FIG. 17. In FIG. 18, the curve CA′ shows the voltage/current characteristic of a circuit constituting a parallel array of a series-connected resistor RA and diode 2 on one hand and a resistor RB on the other, while the current/voltage characteristic CB′ shows a current/voltage characteristic of a parallel connection array of the diode D1 and resistor RB. FIGS. 4B and 5B each show an enlarged view of a crosspoint of the two curves CA′, CB′. In the case where the transistor pair constituting an input stage of the differential amplifier AMP has a variation of a threshold voltage, the curves CA′, CB′ are equivalent to the shifted states as indicated by broken lines CA1′, CA2′, CB1′, CB2′ in FIGS. 4B and 5B. At this time, the current values of the PMOS transistors P1, P2 and P3 are shifted to the characteristics of broken lines CIA1′, CIA2′, CIB1′, CIB2′ with respect to an original current value CI′. At this time, the smaller the crossing angle between the curves CA′ and CB′, the greater the variation of an output current value. In particular, by connecting the resistor in parallel with the diode, the crossing angle between both the curves becomes smaller. As a third problem, this circuit involves a greater variation in output voltage or output current than a circuit not using a parallel connection array of the resistor and diode. Further, the differential amplifier AMP is generally of a type that an input voltage is applied to the gate of the NMOS transistor pair. In such a differential amplifier, if the temperature rises and the forward voltage of the diode becomes smaller, a source potential on an NMOS transistor pair is lowered and a drain potential on a current controlling NMOS transistor (for example, N3 in FIG. 15) becomes deficient. As a result, if use is made of a differential amplifier of a type that an input voltage is applied to the NMOS transistor pair, there is a risk, as a fourth problem, that a circuit involved will cease to operate under a high temperature condition. Further, a current additive type reference voltage generation circuit as shown in FIG. 19 has also been developed. Even this circuit involves a similar problem as in the case of the circuit shown in FIG. 17. Further, more circuit elements are required, presenting a problem. There has been an increasing demand that a reference power supply circuit of a compact size be developed which involves less variation in output voltage or output current and ensures a stabler operation. BRIEF SUMMARY OF THE INVENTION According to a first aspect of the present invention there is provided a reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first current supply connected between a second potential and a P type semiconductor area of the first PN junction; a first resistive element having one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and second PN junction; a second current supply configured to be inserted between the other end of the first resistive element and the second potential; a third current supply configured to be connected between the second potential and an output terminal; and a differential amplifier having an inverting input terminal and a non-inverting input terminal and configured to receive, at the inverting input terminal, a potential on a first connection point between the first current supply and the first PN junction and, at the non-inverting input terminal, a potential on a second connection point between the second current supply and the first resistive element and control the first, second and third power supplies by a difference between a potential of the inverting input terminal and a potential of the non-inverting input terminal. According to a second aspect of the invention, there is provided a reference power supply circuit comprising a first diode having a cathode connected to a first potential; a second diode having a cathode connected to the first potential and having a size different from that of the first diode; a first transistor of a first conductivity type configured to be connected between a second potential and the anode of the first diode and constitute a current supply; a first resistive element having one end connected to the anode of the second diode; a second resistive element connected in parallel with the first resistive element and second diode; a second transistor of a first conductivity type configured to be inserted between the other end of the first resistive element and the second potential and constitute a current supply; a third transistor of a first conductivity type configured to be connected between the second potential and an output terminal and constitute a current supply; and a differential amplifier having an inverting input terminal and a non-inverting input terminal and configured to receive, at the inverting input terminal, a potential on a first connection point between the first transistor and the first diode and, at the non-inverting input terminal, a potential on a second connection point between the second transistor and the first resistive element, the differential amplifier being configured to control the first, second and third transistors by a difference between a potential the inverting input terminal and a potential of the non-inverting input terminal. According to a third aspect of the present invention, there is provided a reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first resistive element having one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and second PN junction; a current supply connected between a second potential and an output terminal; and a mirror circuit configured to allow a current which flows through the first PN junction to be copied to a corresponding current through the first and second resistive elements and second PN junction and control the current supply in accordance with the current flowing through the first and second resistive elements and second PN junction. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING FIG. 1 shows a first embodiment, that is, a practical form of a reference voltage generation circuit; FIG. 2 is a circuit diagram for explaining a principle of the first embodiment; FIG. 3 is a view showing a voltage/current characteristic of the circuit of FIG. 1; FIGS. 4A and 4B are views showing a voltage/current characteristic on an enlarged form; FIGS. 5A and 5B are views showing a voltage/current characteristic on an enlarged form; FIG. 6 shows a second embodiment, that is, practical form of a reference voltage generation circuit; FIG. 7 is a view showing a voltage/current characteristic of a second embodiment; FIG. 8 shows a modification of the second embodiment, that is, a practical form of a reference current generation circuit; FIG. 9 shows a modification of a second embodiment, that is, a practical form of a reference current generation circuit. FIG. 10 shows a modification of the second embodiment, that is, a practical form of a reference voltage generation circuit; FIG. 11 shows a modification of the second embodiment, that is, a practical form of a reference voltage generation circuit; FIG. 12 is a circuit diagram showing a variant of FIG. 1; FIG. 13 shows a modification of the circuit shown in FIG. 1, that is, a reference current generation circuit; FIG. 14 shows a modification of the circuit shown in FIG. 1, that is, a reference current generation circuit; FIG. 15 shows a modification of the circuit shown in FIG. 1, that is, a practical form of a reference voltage generation circuit; FIG. 16 shows a third embodiment, that is, a practical form of a reference voltage generation circuit; FIG. 17 shows a circuit diagram showing an example of a conventional reference voltage generation circuit; FIG. 18 shows a current/voltage characteristic of FIG. 17; and FIG. 19 is a circuit diagram showing another example of a conventional reference voltage circuit. DETAILED DESCRIPTION OF THE INVENTION The embodiments of the present invention will be described below with reference to the accompanying drawing. Identical reference numerals are employed to designate parts or elements corresponding to those shown in respective views. FIG. 1 shows a first embodiment, that is, a practical form of a reference voltage generation circuit. In FIG. 1, a diode D1 and PMOS transistor P2 having a PN junction are connected, as a series-connected array, between a ground node (VSS node) supplied with a ground potential VSS (first potential) and a power supply node (VDD node) supplied with a power supply potential VDD (second potential). Further, a diode D2 having a PN junction, a resistor R1 and a PMOS transistor P1 are series-connected between the VSS node and the VDD node. A resistor R3 and PMOS transistor P3 are series-connected between the VSS node and the VDD node. A resistor R2 is connected between the VSS node and a connection node which is connected between the resistor R1 and the PMOS transistor P1. A connection node INP between the resistor R1 and the PMOS transistor P1 is connected to a non-inverting input terminal of the differential amplifier AMP while, on the other hand, a connection node INN between the diode D1 and the PMOS transistor P2 is connected to an inverting input terminal of the differential amplifier AMP. An output terminal PGT of the differential amplifier AMP is connected to the gates of the PMOS transistors P1, P2 and P3. A connection node between the PMOS transistor P3 and the resistor R3 constitutes an output node where a reference voltage VREF is outputted. Here, the second power supply potential VDD is set to, for example, 1.0V while the reference voltage VREF can be freely set in a range from 0 to VDD-Vdsp in accordance with a resistive value of the resistor R3. Here, Vdsp constitutes a drain/source voltage of the PMOS transistor P3. FIG. 2 is a view for explaining a principle on the first embodiment. FIG. 2 shows an overlay circuit on which an overlay is done between differential amplifiers AMPA and AMPB, diodes D1 and D1′, a parallel circuit of a resistor R4 and diode D3 and a resistor R5, PMOS transistors P9 and P9′, P8 and P10, and P11 and P12 shown in FIG. 19. In FIG. 2, identical reference numerals are employed to designate parts or elements corresponding to those shown in FIG. 1. Here, the diodes D1, D1′ and D2 have a size relation of, for example, D2=nD1, D1′=mD1. In the circuit arrangement, a current I1 flows through the diodes D1 and D2 and a current I2 flows through the diode D1′ and resistor R2. Given that a potential difference across the diode D1 is represented by V, the current/voltage characteristic of the diode D1 is represented by the equations (11) and (12). I1=Is·exp(pV/kT) (11) V=(kT/q)·ln(I1/Is) (12) A voltage V across an array of a resistor R1 and diode D2 is given by: V=R1·I1+kT/q·ln(I1/(n·Is)) (13) Since the voltages V from the equations (12) and (13) are equal to each other, R1·I1+(kT/q)·ln(I1/(n·Is))=(kT/q)·ln(I1/Is) (14) R1·I1=(kT/q)·ln(n·Is/Is) (15) I1=(kT/(q·R1))·ln(n·Is/Is) (16) Since the size of the diode D1′ is m times that of the diode D1, a current flowing through the diode D1′ is m·I1. Since the same current I2 flows through the diode D1′ and resistor R2, R2·m·I1=V (17) I1=V/(R2·m) (18) I2=m·I1 (19) Since the currents through the PMOS transistors P2 and P1 are given by I1+I2, an equation (20) is established from the equations (16) and (19). I1+I2=(kT/qR1)ln(n·Is/Is)+m·I1 (20) I1+I2=(kT/qR1)ln(n·Is/Is)+V/R2 (21) If the equation (21) is differentiated with respect to the temperature, the right side of the equation (21) becomes (k/(q·R1))·ln(n)+(dV/dT)/R2 (22) Here, the temperature characteristic of the PN junction, (dV/dT), is negative. For this reason, by a combination of n, R1, R2 under which the equation (22) becomes a zero, the temperature characteristics of I1+I2 cease to exist. That is, (k/(q·R1))·ln(n)+(dV/dT)/R2=0 (23) R2·ln(n)/R1=−(dV/dT)·q/k (24) The (dV/dT) in the equation (24) represents the temperature characteristic of the diodes D1+D1′. Further, the diodes D1 and D1′ can be regarded as the diode D1 of (1+m). Here, even under m=1, the equation (24) is established. At this time, the arrangement of FIG. 2 can be modified to that of FIG. 1 with the two diodes regarded as one diode. According to the first embodiment, if, in the circuit shown in FIG. 1, the size ratio of the diodes D1, D2 is held, there is no variation in the temperature characteristics. By doing so, in this circuit, the size of the diodes D1 and D2 can be constituted with one half size of those shown in FIG. 17. In the circuit shown, for example, in FIG. 17, if the size ratio of the diodes D1 and D2 is 1:100, then it is possible to set the size ratio of the diodes D1 and D2 to be 1:about 50. Further, the circuit shown in FIG. 1 allows the deletion of one of the two resistors RB shown in FIG. 17. Therefore, the size of the resistor can be substantially halved. FIG. 3 shows the voltage/current characteristic of the connection nodes INN and INP shown in FIG. 1. If, as shown in FIG. 1, a resistor to be parallel-connected to the diode D1 is eliminated, the operation curves CA, CB of the connection nodes INP and INN are such that the crossing angle made at a crosspoint as shown in FIG. 3 becomes greater than that in the case of operation curves CA′, CB′ of the conventional circuit shown in FIG. 18. As shown in FIGS. 4A, 5A, therefore, even if there occurs a variation in a threshold voltage of the NMOS transistor in an input stage of the differential amplifier AMP, it is possible to make, smaller, errors CIA1, CIA2, CIB1, CIB2 of output current CI of the PMOS transistors P1, P2, P3 controlled by an output voltage of the differential amplifier AMP. It is, therefore, possible to generate a stable reference voltage VREF. (Second Embodiment) FIG. 6 shows a second embodiment, that is, a practical form of a reference voltage generation circuit. The second embodiment differs from the first embodiment in the following respects. A differential amplifier AMP1 is comprised of a source follower type differential amplifier. The differential amplifier AMP1 is controlled by a bias voltage VBN which is outputted from a bias circuit BC. That is, the bias circuit BC comprises a resistor R4, NMOS transistors N4, N5 and PMOS transistor P10. The resistor R4 has one end connected to a VDD node and the other end connected to the drain and gate of the NMOS transistor N4 and to the gate of the NMOS transistor N5. The sources of the NMOS transistors N4 and N5 are connected to a VSS node. Further, the drain of the NMOS transistor N5 is connected to the drain and gate of the PMOS transistor P10 and the source of the PMOS transistor P10 is connected to the VDD node. The magnitude of a bias current which is outputted from the bias circuit BC is set by a resistive value of the resistor R4. Further, the differential amplifier AMP1 comprises NMOS-transistors N1, N2 and N3 and PMOS transistors P4, P5, P6, P7, P8 and P9. The sources of the PMOS transistors P4 and P5 are connected to the VDD node. The gates of these transistors P4 and P5 are commonly connected to each other and are connected to the drain of the PMOS transistor P5. The drains of the PMOS transistors P4 and P5 are connected to the drains of the NMOS transistors N1 and N2 in the differential pair. The sources of the NMOS transistors N1 and N2 are connected to the drain of the NMOS transistor N3 and the source of the transistor N3 is connected to the VSS node. The gate of the NMOS transistor N3 is connected to the gates of the NMOS transistors N4 and N5 which act as an output terminal of the bias circuit BC. That is, the NMOS transistor N3 is controlled by the output voltage VBN of the bias circuit BC. The gates of the NMOS transistors N1 and N2 are connected to the drains of PMOS transistors P6 and P7, respectively. The sources of the PMOS transistors P6 and P7 are connected to the VDD node. The gates of the PMOS transistors P6 and P7 are connected to the gate of the PMOS transistor P10 in the bias circuit BC. Therefore, these PMOS transistors P6 and P7 are controlled by an output voltage VBP of the bias circuit BC. Further, the drains of the PMOS transistors P6 and P7 are connected to the sources of the PMOS transistors P8 and P9, respectively. Further, the gates of the NMOS transistors N1, N2 are connected to the sources of the PMOS transistors P8 and P9. The drains of the PMOS transistors P8 and P9 are connected to the VSS node. The gate of the PMOS transistor P8 is connected to a connection node INN and the gate of the PMOS transistor P9 is connected to a connection node INP. The potentials on the connection nodes INN and INP are connected through the PMOS transistors P8 and P9 to the NMOS transistors N1 and N2, respectively, these PMOS transistors acting as a source follower circuit. In this circuit arrangement, the PMOS transistors P4 and P5 which are connected to the NMOS transistors N1 and N2 in the differential amplifier AMP1 is conducive to an amplification action. Therefore, a variation in the characteristics of the PMOS transistors P4 and P5 exerts a greater influence on an output. In order to make such a variation smaller, the sizes of the PMOS transistors P4 and P5 are made greater. Further, the PMOS transistors P8 and P9, constituting a source follower, are less conducive to a voltage amplification and can be made smaller in size. In more detail, the sizes of the PMOS transistors P8 and P9 are made about {fraction (1/10)} the size of the NMOS transistors N1 and N2 constituting a differential pair. By, in this way, making the sizes of the PMOS transistors P8 and P9 smaller than normal PMOS transistors and NMOS transistors, it is possible to decrease the parasitic capacitance of the feedback circuit and, hence, to ensure a greater phase margin. FIG. 7 shows the temperature characteristics of the operation curves of the connection nodes INP and INN in the second embodiment. It is evident from FIG. 7 that, with a rise in temperature, the potentials on the crosspoints of the operation curves of the connection nodes INP and INN become lower. In a differential amplifier including an NMOS transistor having its gate supplied with an input voltage, as shown in FIG. 17, the operation margin decreases, if at a higher temperature, the forward voltages of diodes D1, D2 become smaller. In the circuit arrangement shown in FIG. 6, however, potentials on the connection nodes INN and INP are applied to the gates of the PMOS transistors P8 and P9 acting as the source follower circuit and it is, therefore, possible to positively operate the differential amplifier even at a higher temperature and secure an operation margin. According to the second embodiment, the PMOS transistors P8 and P9 are placed, as a source follower circuit, in the input stages of the differential amplifier AMP1 and configured to receive input signals. In general, under a high temperature condition, the forward currents of the PN junctions of the diodes D1, D2 become greater and, as a result, if a voltage across the PN junction becomes relatively smaller, the input potential of the differential amplifier becomes lower. Since, however, the input voltage is shifted to a higher side by the source follower circuit, it is possible to adequately secure the operation margin even under a higher temperature condition. It is, therefore, possible to obtain an improved stability of the circuit operation even under a higher temperature condition. Further, the PMOS transistors P8 and P9 are made smaller in size than other PMOS transistors and, therefore, the input capacity of the PMOS transistors P8 and P9 can be set to be smaller. It is also possible to reduce the parasitic capacitance of the negative feedback circuit and, hence, to adequately secure the phase margin and improve the stability of the circuit operation. FIG. 8 shows a modification of the second embodiment, that is, a practical form of a reference current generation circuit. The circuit shown in FIG. 8 is such that a resistor R3 is eliminated from the circuit shown in FIG. 6. In this circuit, a reference current IREF is outputted from the drain of a PMOS transistor P3. The circuit, even if being so configured as shown in FIG. 8, can achieve the same advantages as those of the second embodiment. FIG. 9 shows another modification of the second embodiment, that is, a practical form of a reference current generation circuit. NMOS transistors N7 and N8 constituting a current mirror circuit are connected to the drain of a PMOS transistor P3. That is, the drain and gate of the NMOS transistor N7 and gate of the NMOS transistor N8 are connected to the drain of the PMOS transistor P3. The sources of these NMOS transistors N7 and N8 are connected to a VSS node. From the drain of the NMOS transistor N8, a reference current IREF 2 is outputted. According to the arrangement shown in FIG. 9 it is possible to provide a constant current supply of less variation against a temperature variation. FIG. 10 shows still another form of the second embodiment, that is, a practical form of a reference voltage generation circuit. In FIG. 10, a bias circuit BC comprises an NMOS transistor N6 and PMOS transistor P11. The PMOS transistor P11 has its source connected to a VDD node and its gate connected to an output node and the gates of PMOS transistors P6 and P7 are connected to the output node. The PMOS transistor P11 has its drain connected to the drain and gate of the NMOS transistor N6 and to the gate of the transistor N3. The source of the NMOS transistor N6 is connected to the VSS node. According to the arrangement above, a resistor can be eliminated from the bias circuit BC and the bias circuit can be comprised of transistors only. It is, therefore, possible to reduce the size of the bias circuit BC. FIG. 11 shows a further modification of a second embodiment, that is, a practical form of a reference voltage generation circuit. In FIG. 11, a capacitance Cl is connected, as a capacitive load, between a VDD node and an output end of a differential amplifier AMP1. The capacitance C1 compensates for the phase of a negative feedback circuit. By connecting the capacitor C1 between the Vdd node and the output end of the differential amplifier AMP1 it is possible to improve a tolerance to a power supply noise. Further, PMOS transistors P8 and P9 as a source follower circuit involve less parasitic capacitance and it is possible to advantageously reduce the size of the capacitor C1. FIG. 12 shows a modification of the embodiment of FIG. 1. In FIG. 12, a phase compensating capacitor is connected, as in the case of the modification shown in FIG. 11, between an output node of a differential amplifier and a VDD node. According to this arrangement, it is possible to improve the phase margin of the circuit shown in FIG. 1. FIG. 13 shows a modification of the circuit shown in FIG. 1, that is, a practical form of a reference current generation circuit where a resistor R3 is eliminated. FIG. 14 shows a modification of the circuit shown in FIG. 1, that is, a reference current generation circuit. The circuit shown in FIG. 14 is such that, in place of the resistor R3, a current mirror circuit is provided, the current mirror circuit comprising NMOS transistors N7 and N8 and a reference current IREF2 being outputted from the NMOS transistor N8. FIG. 15 shows another modification of the circuit shown in FIG. 1, that is, a practical circuit form with a bias circuit BC. The bias circuit BC comprises a resistor R4 and NMOS transistor N4. The resistor R4 has one end connected to a VDD node and the other end connected to the drain and gate of the NMOS transistor N4. The gate of the NMOS transistor N4 serving as an output end of the bias circuit BC is connected to the gate of the above-mentioned NMOS transistor N3 in the differential amplifier AMP. Thus, the differential amplifier AMP is biased by the bias circuit BC. (Third Embodiment) FIG. 16 shows a third embodiment, that is, a practical form of a reference voltage generation circuit. In the third embodiment, a current mirror circuit CM is used in place of the differential amplifier. That is, in FIG. 16, a current mirror circuit CM comprises PMOS transistors P12, P13 and NMOS transistors N8, N9. To the VDD node, the sources of the PMOS transistors P12 and P13 are connected. The PMOS transistor P12 has its gate connected to the gate of the PMOS transistor P13 and its drain connected to the gate of the PMOS transistor P3. The drains of the PMOS transistors P12 and P13 are connected to the drains of the NMOS transistors N8 and N9. The NMOS transistor N8 has its gate connected to the gate of the NMOS transistor N9 and to the drain of the NMOS transistor N9. A diode D1 is connected between the source of the NMOS transistor N9 and a VSS node. A series circuit of a resistor R1 and diode D2 and a resistor R2 are connected between the source of the NMOS transistor N8 and the VSS node. The size relation of the diodes D1 and D2 is as in the case of the first embodiment and the size of the diode D2 is set to be, for example, 50 times that of the diode D1. The PMOS transistor P3 and resistor R3 are series connected between the VDD node and the VSS node. The gate of the PMOS transistor P3 is connected to the drain of the NMOS transistor N8. A reference voltage VREF is outputted from a connection node between the PMOS transistor P3 and a resistor R3. In this arrangement, a current through the diode D1 is copied by the NMOS transistor N9 to the NMOS transistor N8 and the PMOS transistors P13 and P3 are controlled in accordance with a current flowing through the NMOS transistor N8. For this reason, the same current flows through the transistors N8, N9 and P3 and, in accordance with the current, a reference voltage VREF is outputted from the connection node of the resistor R3. According to the arrangement above, the size of the diodes D1, D2 is the same as in the first embodiment and a resistor is not connected in parallel with the diode D1. Therefore, it is possible to reduce the size of the circuit and ensure a stable operation. A current mirror circuit CM constituted by the NMOS transistors N8, N9 and PMOS transistors P12, P13 has no voltage gain. It is, therefore, not necessary to consider the oscillation of the circuit and, thus, to ensure phase compensation with the resultant advantage. It is to be noted that if, in FIG. 16, the resistor R3 is eliminated, then it is possible to provide a reference current generation circuit. Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalents.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a reference power supply circuit applied to, for example, a semiconductor device and configured to generate a reference current and reference voltage. 2. Description of the Related Art A semiconductor device has a reference power supply circuit for generating a reference current and reference voltage. The reference power supply circuit is so configured as to include, for example, a BGR (Band Gap Reference) circuit. In recent years, a power supply of the semiconductor device has been made to have a low voltage and a semiconductor device has been developed which can operate even at a low power supply voltage of below 1.25V (see Japanese Patent Laid Open (KOKAI) No. 11-45125). FIG. 17 shows one practical form of a conventional reference voltage generation circuit. In FIG. 17 , an output voltage PGT of a differential amplify circuit AMP is supplied to the gates of P channel MOS transistors (hereinafter referred to as PMOS transistors P 1 , P 2 ). This differential amplifier AMP controls the PMOS transistor P 1 and P 2 so as to make potentials on connection nodes INP and INN equal to each other. At this time, with IA representing a current flowing through a resistor RA; VA, a potential difference across a diode D 2 ; and VA′, a potential difference across resistors RB, RB, the following equation (1) is established: in-line-formulae description="In-line Formulae" end="lead"? VA′=RA·IA+VA (1) in-line-formulae description="In-line Formulae" end="tail"? The current and voltage of the diode are given below. in-line-formulae description="In-line Formulae" end="lead"? I=I s ·exp( q V/kT )  (2) in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? V=V 0 ·ln( I/I s ), ( V 0 =kT/q )  (3) in-line-formulae description="In-line Formulae" end="tail"? , noting that I s : reverse saturation current; k: Boltzmman constant; T: absolute temperature; and q: electron charge. If the equation (1) is modified with the use of the equation (3), then the temperature characteristic of the current IA is represented as follows: in-line-formulae description="In-line Formulae" end="lead"? IA=V 0 /RA ·ln( I SA /I SB )  (4) in-line-formulae description="In-line Formulae" end="tail"? Here, I SA , I SB represent the reverse saturation currents of the diodes D 2 , D 1 . From the equation (4) the temperature characteristic of the current IA becomes in-line-formulae description="In-line Formulae" end="lead"? dIA/dT=k/ ( RA·q )·ln I SA /I SB >0  (5) in-line-formulae description="In-line Formulae" end="tail"? as shown in equation (5). Further, the relation between the resistance PB, current IB on one hand and the potential difference VA′ across the resistor RB on the other becomes in-line-formulae description="In-line Formulae" end="lead"? VA′=RB·IB in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? IB=VA′/RB (6) in-line-formulae description="In-line Formulae" end="tail"? as shown in the equation (6). From the equation (6), the temperature characteristic of the current IB flowing through the resistor RB becomes in-line-formulae description="In-line Formulae" end="lead"? dIB/dT= 1/ RB·dVA′/dT< 0  (7) in-line-formulae description="In-line Formulae" end="tail"? If, at this time, the circuit condition is selected under which the variations of the IA and IB with respect to the temperature cancel each other by their sum as shown in the equation (8) below, then a current supply of a smaller temperature dependence is provided. in-line-formulae description="In-line Formulae" end="lead"? ( dIA/dT )+( dIB/dT )=0  (8) in-line-formulae description="In-line Formulae" end="tail"? For example, if the size ratio of the diodes D 2 , D 1 is given by 100:1, then the resistance ratio RB:RA is found as follows: in-line-formulae description="In-line Formulae" end="lead"? RB/RA =( q/k·dVA′/dT )/ln( I SA /I SB ) in-line-formulae description="In-line Formulae" end="tail"? Here, the numerical value of each parameter is given below. q=1.6e −19 (C), k=1.38e −23 (J/K) dVA′/dT=−2 (mV), ln (I SA /I SB )=ln (100)≈4.6 Therefore, the resistance ratio RB/RA becomes in-line-formulae description="In-line Formulae" end="lead"? RB/RA≈ 23/4.6=5  (9) in-line-formulae description="In-line Formulae" end="tail"? From the equation (9), the resistance ratio RB:RA becomes equal to about 5:1. If the circuit shown in FIG. 17 is configured with the use of the size ratio of the diodes and resistance ratio above, then the PMOS transistors P 1 , P 2 , P 3 function as a current supply of a smaller temperature dependence. By connecting a required resistor RC between the PMOS transistor P 3 and ground, it is possible to provide an output voltage VREF of a smaller temperature dependence. By the mismatching (variation) of a transistor pair (not shown) constituting an input stage of the differential amplifier AMP, that of a mirror connected PMOS transistors P 1 , P 2 , P 3 and that of the characteristics of the diodes and resistors, the output voltage VREF also varies. Incidentally, in order to make a variation of the above-mentioned output voltage VREF smaller, a method for increasing the size of the resistors RA, RB, diodes D 1 , D 2 , transistors P 1 , P 2 , P 3 , etc., and, by doing so, decreasing the variation of each element is taken. Since this method increases the size of the respective elements, a whole circuit size is increased as a first problem and a high manufacturing cost is involved. In particular, the size of the whole circuit is defined by the size of the diode D 1 and resistor RB and it is necessary to reduce the size of these. Further, if the size of the transistor pair constituting an input stage of the differential amplifier AMP is made greater, a parasitic capacitance of a negative feedback circuit is increased and the phase margin is decreased. This poses a second problem of lowering a stability of the circuit involved. FIG. 18 shows the voltage/current characteristic of the circuit shown in FIG. 17 . In FIG. 18 , the curve CA′ shows the voltage/current characteristic of a circuit constituting a parallel array of a series-connected resistor RA and diode 2 on one hand and a resistor RB on the other, while the current/voltage characteristic CB′ shows a current/voltage characteristic of a parallel connection array of the diode D 1 and resistor RB. FIGS. 4B and 5B each show an enlarged view of a crosspoint of the two curves CA′, CB′. In the case where the transistor pair constituting an input stage of the differential amplifier AMP has a variation of a threshold voltage, the curves CA′, CB′ are equivalent to the shifted states as indicated by broken lines CA 1 ′, CA 2 ′, CB 1 ′, CB 2 ′ in FIGS. 4B and 5B . At this time, the current values of the PMOS transistors P 1 , P 2 and P 3 are shifted to the characteristics of broken lines CIA 1 ′, CIA 2 ′, CIB 1 ′, CIB 2 ′ with respect to an original current value CI′. At this time, the smaller the crossing angle between the curves CA′ and CB′, the greater the variation of an output current value. In particular, by connecting the resistor in parallel with the diode, the crossing angle between both the curves becomes smaller. As a third problem, this circuit involves a greater variation in output voltage or output current than a circuit not using a parallel connection array of the resistor and diode. Further, the differential amplifier AMP is generally of a type that an input voltage is applied to the gate of the NMOS transistor pair. In such a differential amplifier, if the temperature rises and the forward voltage of the diode becomes smaller, a source potential on an NMOS transistor pair is lowered and a drain potential on a current controlling NMOS transistor (for example, N 3 in FIG. 15 ) becomes deficient. As a result, if use is made of a differential amplifier of a type that an input voltage is applied to the NMOS transistor pair, there is a risk, as a fourth problem, that a circuit involved will cease to operate under a high temperature condition. Further, a current additive type reference voltage generation circuit as shown in FIG. 19 has also been developed. Even this circuit involves a similar problem as in the case of the circuit shown in FIG. 17 . Further, more circuit elements are required, presenting a problem. There has been an increasing demand that a reference power supply circuit of a compact size be developed which involves less variation in output voltage or output current and ensures a stabler operation.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>According to a first aspect of the present invention there is provided a reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first current supply connected between a second potential and a P type semiconductor area of the first PN junction; a first resistive element having one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and second PN junction; a second current supply configured to be inserted between the other end of the first resistive element and the second potential; a third current supply configured to be connected between the second potential and an output terminal; and a differential amplifier having an inverting input terminal and a non-inverting input terminal and configured to receive, at the inverting input terminal, a potential on a first connection point between the first current supply and the first PN junction and, at the non-inverting input terminal, a potential on a second connection point between the second current supply and the first resistive element and control the first, second and third power supplies by a difference between a potential of the inverting input terminal and a potential of the non-inverting input terminal. According to a second aspect of the invention, there is provided a reference power supply circuit comprising a first diode having a cathode connected to a first potential; a second diode having a cathode connected to the first potential and having a size different from that of the first diode; a first transistor of a first conductivity type configured to be connected between a second potential and the anode of the first diode and constitute a current supply; a first resistive element having one end connected to the anode of the second diode; a second resistive element connected in parallel with the first resistive element and second diode; a second transistor of a first conductivity type configured to be inserted between the other end of the first resistive element and the second potential and constitute a current supply; a third transistor of a first conductivity type configured to be connected between the second potential and an output terminal and constitute a current supply; and a differential amplifier having an inverting input terminal and a non-inverting input terminal and configured to receive, at the inverting input terminal, a potential on a first connection point between the first transistor and the first diode and, at the non-inverting input terminal, a potential on a second connection point between the second transistor and the first resistive element, the differential amplifier being configured to control the first, second and third transistors by a difference between a potential the inverting input terminal and a potential of the non-inverting input terminal. According to a third aspect of the present invention, there is provided a reference power supply circuit comprising: a first PN junction configured to connect an N type semiconductor area to a first potential; a second PN junction configured to connect an N type semiconductor area to the first potential and having a size different from that of the first PN junction; a first resistive element having one end connected to a P type semiconductor area of the second PN junction; a second resistive element configured to be connected in parallel with the first resistive element and second PN junction; a current supply connected between a second potential and an output terminal; and a mirror circuit configured to allow a current which flows through the first PN junction to be copied to a corresponding current through the first and second resistive elements and second PN junction and control the current supply in accordance with the current flowing through the first and second resistive elements and second PN junction.
20040319
20060228
20050616
63905.0
0
LAXTON, GARY L
REFERENCE POWER SUPPLY CIRCUIT FOR SEMICONDUCTOR DEVICE
UNDISCOUNTED
0
ACCEPTED
2,004
10,804,057
ACCEPTED
Portable camera with inbuilt printer device
A portable camera with inbuilt printer device, has input means for uploading software. The camera includes a digital image capture device, an inbuilt programming language interpreter internally connected to the digital image capture device for the manipulation of the digital image captured by the capture device and a script input means for inputting a self documenting program script for the manipulation and filtering of said captured digital image to produce visual alterations of the image. A card reader optically reads the script printed as an array of dots on one surface of a portable card, which has a visual example of the likely effect of the script on a second surface of the card. The script is interpreted and executed by the interpreter to modify the captured digital image in accordance with the script to produce a digital image modified, in a manner as visually exemplified on said second surface of said card, which is then printed out on the inbuilt printer device.
1. A portable camera including: (a) digital image capture device for the capturing of digital images; (b) an inbuilt printer device; (c) a programming language interpreter internally connected to said digital image capture device for the manipulation of a digital image captured by said capture device; (d) a script input means for inputting a self documenting program script for the manipulation and filtering of said captured digital image to produce visual alterations thereof, said script input means including a card reader for optically reading a script printed as an array of dots on one surface of a portable card; (e) a display; wherein said script is interpreted and executed by said interpreter means to modify a captured digital image in accordance with said script to produce a digital image modified from said captured digital image, wherein said display is adapted to display said modified image, and wherein said printer device is adapted to print said modified image. 2. A portable camera as claimed in claim 1 wherein said card has, on said one surface, a fault tolerant encoded form of the said script. 3. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing image warping. 4. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing convolution. 5. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing color lookup tables. 6. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing posterising images. 7. A portable camera claimed in claim 2 wherein said programming language includes a language construct for adding noises to images. 8. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing image enhancement. 9. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing image painting algorithms including brush jittering and tiling. 10. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing edge detection. 11. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing image illumination. 12. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing text and fonts. 13. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing face detection. 14. A portable camera claimed in claim 2 wherein said programming language includes a language construct for implementing the utilisation of arbitrary complexity pre-rendered graphical objects.
Continuation Application of 10/291,476 filed on Nov. 12, 2002 CROSS REFERENCES TO RELATED APPLICATIONS The following Australian provisional patent applications are hereby incorporated by reference. For the purposes of location and identification, US patents/patent applications identified by their US patent/patent application serial numbers are listed alongside the Australian applications from which the US patents/patent applications claim the right of priority. CROSS- REFERENCED US PATENT/PATENT AUSTRALIAN APPLICATION PROVISIONAL (CLAIMING RIGHT OF PRIORITY PATENT FROM AUSTRALIAN DOCKET APPLICATION NO. PROVISIONAL APPLICATION) NO. PO7991 09/113,060 ART01 PO8505 6,476,863 ART02 PO7988 09/113,073 ART03 PO9395 6,322,181 ART04 PO8017 6,597,817 ART06 PO8014 6,227,648 ART07 PO8025 09/112,750 ART08 PO8032 6,690,419 ART09 PO7999 09/112,743 ART10 PO7998 09/112,742 ART11 PO8031 09/112,741 ART12 PO8030 6,196,541 ART13 PO7997 6,195,150 ART15 PO7979 6,362,868 ART16 PO8015 09/112,738 ART17 PO7978 09/113,067 ART18 PO7982 6,431,669 ART19 PO7989 6,362,869 ART20 PO8019 6,472,052 ART21 PO7980 6,356,715 ART22 PO8018 09/112,777 ART24 PO7938 6,636,216 ART25 PO8016 6,366,693 ART26 PO8024 6,329,990 ART27 PO7940 09/113,072 ART28 PO7939 6,459,495 ART29 PO8501 6,137,500 ART30 PO8500 6,690,416 ART31 PO7987 09/113,071 ART32 PO8022 6,398,328 ART33 PO8497 09/113,090 ART34 PO8020 6,431,704 ART38 PO8023 09/113,222 ART39 PO8504 09/112,786 ART42 PO8000 6,415,054 ART43 PO7977 09/112,782 ART44 PO7934 6,665,454 ART45 PO7990 09/113,059 ART46 PO8499 6,486,886 ART47 PO8502 6,381,361 ART48 PO7981 6,317,192 ART50 PO7986 09/113,057 ART51 PO7983 09/113,054 ART52 PO8026 6,646,757 ART53 PO8027 09/112,759 ART54 PO8028 6,624,848 ART56 PO9394 6,357,135 ART57 PO9396 09/113,107 ART58 PO9397 6,271,931 ART59 PO9398 6,353,772 ART60 PO9399 6,106,147 ART61 PO9400 6,665,008 ART62 PO9401 6,304,291 ART63 PO9402 09/112,788 ART64 PO9403 6,305,770 ART65 PO9405 6,289,262 ART66 PP0959 6,315,200 ART68 PP1397 6,217,165 ART69 PP2370 09/112,781 DOT01 PP2371 09/113,052 DOT02 PO8003 6,350,023 Fluid01 PO8005 6,318,849 Fluid02 PO9404 09/113,101 Fluid03 PO8066 6,227,652 IJ01 PO8072 6,213,588 IJ02 PO8040 6,213,589 IJ03 PO8071 6,231,163 IJ04 PO8047 6,247,795 IJ05 PO8035 6,394,581 IJ06 PO8044 6,244,691 IJ07 PO8063 6,257,704 IJ08 PO8057 6,416,168 IJ09 PO8056 6,220,694 IJ10 PO8069 6,257,705 IJ11 PO8049 6,247,794 IJ12 PO8036 6,234,610 IJ13 PO8048 6,247,793 IJ14 PO8070 6,264,306 IJ15 PO8067 6,241,342 IJ16 PO8001 6,247,792 IJ17 PO8038 6,264,307 IJ18 PO8033 6,254,220 IJ19 PO8002 6,234,611 IJ20 PO8068 6,302,528 IJ21 PO8062 6,283,582 IJ22 PO8034 6,239,821 IJ23 PO8039 6,338,547 IJ24 PO8041 6,247,796 IJ25 PO8004 6,557,977 IJ26 PO8037 6,390,603 IJ27 PO8043 6,362,843 IJ28 PO8042 6,293,653 IJ29 PO8064 6,312,107 IJ30 PO9389 6,227,653 IJ31 PO9391 6,234,609 IJ32 PP0888 6,238,040 IJ33 PP0891 6,188,415 IJ34 PP0890 6,227,654 IJ35 PP0873 6,209,989 IJ36 PP0993 6,247,791 IJ37 PP0890 6,336,710 IJ38 PP1398 6,217,153 IJ39 PP2592 6,416,167 IJ40 PP2593 6,243,113 IJ41 PP3991 6,283,581 IJ42 PP3987 6,247,790 IJ43 PP3985 6,260,953 IJ44 PP3983 6,267,469 IJ45 PO7935 6,224,780 IJM01 PO7936 6,235,212 IJM02 PO7937 6,280,643 IJM03 PO8061 6,284,147 IJM04 PO8054 6,214,244 IJM05 PO8065 6,071,750 IJM06 PO8055 6,267,905 IJM07 PO8053 6,251,298 IJM08 PO8078 6,258,285 IJM09 PO7933 6,225,138 IJM10 PO7950 6,241,904 IJM11 PO7949 6,299,786 IJM12 PO8060 09/113,124 IJM13 PO8059 6,231,773 IJM14 PO8073 6,190,931 IJM15 PO8076 6,248,249 IJM16 PO8075 09/113,120 IJM17 PO8079 6,241,906 IJM18 PO8050 6,565,762 IJM19 PO8052 6,241,905 IJM20 PO7948 6,451,216 IJM21 PO7951 6,231,772 IJM22 PO8074 6,274,056 IJM23 PO7941 6,290,861 IJM24 PO8077 6,248,248 IJM25 PO8058 6,306,671 IJM26 PO8051 6,331,258 IJM27 PO8045 6,110,754 IJM28 PO7952 6,294,101 IJM29 PO8046 6,416,679 IJM30 PO9390 6,264,849 IJM31 PO9392 6,254,793 IJM32 PP0889 6,235,211 IJM35 PP0887 6,491,833 IJM36 PP0882 6,264,850 IJM37 PP0874 6,258,284 IJM38 PP1396 6,312,615 IJM39 PP3989 6,228,668 IJM40 PP2591 6,180,427 IJM41 PP3990 6,171,875 IJM42 PP3986 6,267,904 IJM43 PP3984 6,245,247 IJM44 PP3982 6,315,914 IJM45 PP0895 6,231,148 IR01 PP0870 09/113,106 IR02 PP0869 6,293,658 IR04 PP0887 6,614,560 IR05 PP0885 6,238,033 IR06 PP0884 6,312,070 IR10 PP0886 6,238,111 IR12 PP0871 09/113,086 IR13 PP0876 09/113,094 IR14 PP0877 6,378,970 IR16 PP0878 6,196,739 IR17 PP0879 09/112,774 IR18 PP0883 6,270,182 IR19 PP0880 6,152,619 IR20 PP0881 09/113,092 IR21 PO8006 6,087,638 MEMS02 PO8007 6,340,222 MEMS03 PO8008 09/113,062 MEMS04 PO8010 6,041,600 MEMS05 PO8011 6,299,300 MEMS06 PO7947 6,067,797 MEMS07 PO7944 6,286,935 MEMS09 PO7946 6,044,646 MEMS10 PO9393 09/113,065 MEMS11 PP0875 09/113,078 MEMS12 PP0894 6,382,769 MEMS13 STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT Not applicable. FIELD OF THE INVENTION The present invention relates to a data processing method and apparatus and, in particular, discloses a programmable camera system with software Interpreter. BACKGROUND OF THE INVENTION Recently, digital camera technology has become increasingly popular. In this form of technology, an image is normally imaged by CCD array. Subsequently, the images are stored on the camera on storage media such as a semiconductor memory array. At a later stage, the images are downloaded from the CCD camera device to a computer or the like where upon they go subsequent manipulation and printing in the course of requirements. The printing normally includes various image processing steps to enhance certain aspects of the image. For details on the operation of CCD devices and cameras, reference is made to a standard text in this field such as “CCD arrays, cameras and displays” by Gerald C Holst, published 1996 by SPIE Optical Engineering Press Bellingham, Wash., USA. Recently, there has been proposed by the present applicant, a camera system having a integral inbuilt printer that is able to produce full colour, high quality output images. Further, it is known to apply a filter to a digital image to produce various effects. The number of filters able to be utilized being totally arbitrary with the expectation that further filters will be discovered or created in future. Unfortunately, changing digital imaging technologies and changing filter technologies result in onerous system requirements in that cameras produced today obviously are unable to take advantages of technologies not yet available nor are they able to take advantage of filters which have not, as yet, been created or conceived. SUMMARY OF THE INVENTION It is an object of the present invention to provide a system which readily is able to take advantage of updated technologies in addition to taking advantage of new filters being created and, in addition, providing a readily adaptable form of image processing of digitally captured images for printing out. According to the invention there is provided a portable camera with inbuilt printer device, and input means for uploading software, said camera including: (a) digital image capture device for the capturing of digital images; (b) an inbuilt programming language interpreter means internally connected to said digital image capture device for the manipulation of a digital image captured by said capture device; (c) a script input means for inputting a self documenting program script for the manipulation and filtering of said captured digital image to produce visual alterations thereof, said script input means comprising a card reader for optically reading a script printed as an array of dots on one surface of a portable card, there being a visual example of the likely effect of said script on a second surface of the card; wherein said script is interpreted and executed by said interpreter means to modify said captured digital image in accordance with said script to produce a digital image modified from said captured digital image, in the manner visually exemplified on said second surface of said card, and to provide a printout of said image on said inbuilt printer device. BRIEF DESCRIPTION OF THE DRAWINGS Notwithstanding any other forms which may fall within the scope of the present invention, preferred forms of the invention will now be described, by way of example only, with reference to the accompanying drawings in which: FIG. 1 illustrates an Artcam device constructed in accordance with the preferred embodiment; FIG. 2 is a schematic block diagram of the main Artcam electronic components; FIG. 3 is a schematic block diagram of the Artcam Central Processor, FIG. 3(a) illustrates the VLIW Vector Processor in more detail; FIG. 4 illustrates the Processing Unit in more detail; FIG. 5 illustrates the ALU 188 in more detail; FIG. 6 illustrates the In block in more detail; FIG. 7 illustrates the Out block in more detail; FIG. 8 illustrates the Registers block in more detail; FIG. 9 illustrates the Crossbar1 in more detail; FIG. 10 illustrates the Crossbar2 in more detail; FIG. 11 illustrates the read process block in more detail; FIG. 12 illustrates the read process block in more detail; FIG. 13 illustrates the barrel shifter block in more detail; FIG. 14 illustrates the adder/logic block in more detail; FIG. 15 illustrates the multiply block in more detail; FIG. 16 illustrates the I/O address generator block in more detail; FIG. 17 illustrates a pixel storage format; FIG. 18 illustrates a sequential read iterator process; FIG. 19 illustrates a box read iterator process; FIG. 20 illustrates a box write iterator process; FIG. 21 illustrates the vertical strip read/write iterator process; FIG. 22 illustrates the vertical strip read/write iterator process; FIG. 23 illustrates the generate sequential process; FIG. 24 illustrates the generate sequential process; FIG. 25 illustrates the generate vertical strip process; FIG. 26 illustrates the generate vertical strip process; FIG. 27 illustrates a pixel data configuration; FIG. 28 illustrates a pixel processing process; FIG. 29 illustrates a schematic block diagram of the display controller; FIG. 30 illustrates the CCD image organization; FIG. 31 illustrates the storage format for a logical image; FIG. 32 illustrates the internal image memory storage format; FIG. 33 illustrates the image pyramid storage format; FIG. 34 illustrates a time line of the process of sampling an Artcard; FIG. 35 illustrates the super sampling process; FIG. 36 illustrates the process of reading a rotated Artcard; FIG. 37 illustrates a flow chart of the steps necessary to decode an Artcard; FIG. 38 illustrates an enlargement of the left hand corner of a single Artcard; FIG. 39 illustrates a single target for detection; FIG. 40 illustrates the method utilised to detect targets; FIG. 41 illustrates the method of calculating the distance between two targets; FIG. 42 illustrates the process of centroid drift; FIG. 43 shows one form of centroid lookup table; FIG. 44 illustrates the centroid updating process; FIG. 45 illustrates a delta processing lookup table utilised in the preferred embodiment; FIG. 46 illustrates the process of unscrambling Artcard data; FIG. 47 illustrates a magnified view of a series of dots; FIG. 48 illustrates the data surface of a dot card; FIG. 49 illustrates schematically the layout of a single datablock; FIG. 50 illustrates a single datablock; FIG. 51 and FIG. 52 illustrate magnified views of portions of the datablock of FIG. 50; FIG. 53 illustrates a single target structure; FIG. 54 illustrates the target structure of a datablock; FIG. 55 illustrates the positional relationship of targets relative to border clocking regions of a data region; FIG. 56 illustrates the orientation columns of a datablock; FIG. 57 illustrates the array of dots of a datablock; FIG. 58 illustrates schematically the structure of data for Reed-Solomon encoding; FIG. 59 illustrates an example Reed-Solomon encoding; FIG. 60 illustrates the Reed-Solomon encoding process; FIG. 61 illustrates the layout of encoded data within a datablock; FIG. 62 illustrates the sampling process in sampling an alternative Artcard; FIG. 63 illustrates, in exaggerated form, an example of sampling a rotated alternative Artcard; FIG. 64 illustrates the scanning process; FIG. 65 illustrates the likely scanning distribution of the scanning process; FIG. 66 illustrates the relationship between probability of symbol errors and Reed-Solomon block errors; FIG. 67 illustrates a flow chart of the decoding process; FIG. 68 illustrates a process utilization diagram of the decoding process; FIG. 69 illustrates the dataflow steps in decoding; FIG. 70 illustrates the reading process in more detail; FIG. 71 illustrates the process of detection of the start of an alternative Artcard in more detail; FIG. 72 illustrates the extraction of bit data process in more detail; FIG. 73 illustrates the segmentation process utilized in the decoding process; FIG. 74 illustrates the decoding process of finding targets in more detail; FIG. 75 illustrates the data structures utilized in locating targets; FIG. 76 illustrates the Lancos 3 function structure; FIG. 77 illustrates an enlarged portion of a datablock illustrating the clockmark and border region; FIG. 78 illustrates the processing steps in decoding a bit image; FIG. 79 illustrates the dataflow steps in decoding a bit image; FIG. 80 illustrates the descrambling process of the preferred embodiment; FIG. 81 illustrates one form of implementation of the convolver; FIG. 82 illustrates a convolution process; FIG. 83 illustrates the compositing process; FIG. 84 illustrates the regular compositing process in more detail; FIG. 85 illustrates the process of warping using a warp map; FIG. 86 illustrates the warping bi-linear interpolation process; FIG. 87 illustrates the process of span calculation; FIG. 88 illustrates the basic span calculation process; FIG. 89 illustrates one form of detail implementation of the span calculation process; FIG. 90 illustrates the process of reading image pyramid levels; FIG. 91 illustrates using the pyramid table for blinear interpolation; FIG. 92 illustrates the histogram collection process; FIG. 93 illustrates the color transform process; FIG. 94 illustrates the color conversion process; FIG. 95 illustrates the color space conversion process in more detail; FIG. 96 illustrates the process of calculating an input coordinate; FIG. 97 illustrates the process of compositing with feedback; FIG. 98 illustrates the generalized scaling process; FIG. 99 illustrates the scale in X scaling process; FIG. 100 illustrates the scale in Y scaling process; FIG. 101 illustrates the tessellation process; FIG. 102 illustrates the sub-pixel translation process; FIG. 103 illustrates the compositing process; FIG. 104 illustrates the process of compositing with feedback; FIG. 105 illustrates the process of tiling with color from the input image; FIG. 106 illustrates the process of tiling with feedback; FIG. 107 illustrates the process of tiling with texture replacement; FIG. 108 illustrates the process of tiling with color from the input image; FIG. 109 illustrates the process of applying a texture without feedback; FIG. 110 illustrates the process of applying a texture with feedback; FIG. 111 illustrates the process of rotation of CCD pixels; FIG. 112 illustrates the process of interpolation of Green subpixels; FIG. 113 illustrates the process of interpolation of Blue subpixels; FIG. 114 illustrates the process of interpolation of Red subpixels; FIG. 115 illustrates the process of CCD pixel interpolation with 0 degree rotation for odd pixel lines; FIG. 116 illustrates the process of CCD pixel interpolation with 0 degree rotation for even pixel lines; FIG. 117 illustrates the process of color conversion to Lab color space; FIG. 118 illustrates the process of calculation of 1/{square root}X; FIG. 119 illustrates the implementation of the calculation of 1/{square root}X in more detail; FIG. 120 illustrates the process of Normal calculation with a bump map; FIG. 121 illustrates the process of illumination calculation with a bump map; FIG. 122 illustrates the process of illumination calculation with a bump map in more detail; FIG. 123 illustrates the process of calculation of L using a directional light; FIG. 124 illustrates the process of calculation of L using a Omni lights and spotlights; FIG. 125 illustrates one form of implementation of calculation of L using a Omni lights and spotlights; FIG. 126 illustrates the process of calculating the N.L dot product FIG. 127 illustrates the process of calculating the N.L dot product in more detail; FIG. 128 illustrates the process of calculating the R.V dot product; FIG. 129 illustrates the process of calculating the R.V dot product in more detail; FIG. 130 illustrates the attenuation calculation inputs and outputs; FIG. 131 illustrates an actual implementation of attenuation calculation; FIG. 132 illustrates an graph of the cone factor; FIG. 133 illustrates the process of penumbra calculation; FIG. 134 illustrates the angles utilised in penumbra calculation; FIG. 135 illustrates the inputs and outputs to penumbra calculation; FIG. 136 illustrates an actual implementation of penumbra calculation; FIG. 137 illustrates the inputs and outputs to ambient calculation; FIG. 138 illustrates an actual implementation of ambient calculation; FIG. 139 illustrates an actual implementation of diffuse calculation; FIG. 140 illustrates the inputs and outputs to a diffuse calculation; FIG. 141 illustrates an actual implementation of a diffuse calculation; FIG. 142 illustrates the inputs and outputs to a specular calculation; FIG. 143 illustrates an actual implementation of a specular calculation; FIG. 144 illustrates the inputs and outputs to a specular calculation; FIG. 145 illustrates an actual implementation of a specular calculation; FIG. 146 illustrates an actual implementation of a ambient only calculation; FIG. 147 illustrates the process overview of light calculation; FIG. 148 illustrates an example illumination calculation for a single infinite light source; FIG. 149 illustrates an example illumination calculation for a Omni light source without a bump map; FIG. 150 illustrates an example illumination calculation for a Omni light source with a bump map; FIG. 151 illustrates an example illumination calculation for a Spotlight light source without a bump map; FIG. 152 illustrates the process of applying a single Spotlight onto an image with an associated bump-map; FIG. 153 illustrates the logical layout of a single printhead; FIG. 154 illustrates the structure of the printhead interface; FIG. 155 illustrates the process of rotation of a Lab image; FIG. 156 illustrates the format of a pixel of the printed image; FIG. 157 illustrates the dithering process; FIG. 158 illustrates the process of generating an 8 bit dot output; FIG. 159 illustrates a perspective view of the card reader; FIG. 160 illustrates an exploded perspective of a card reader, FIG. 161 illustrates a close up view of the Artcard reader, FIG. 162 illustrates a perspective view of the print roll and print head; FIG. 163 illustrates a first exploded perspective view of the print roll; FIG. 164 illustrates a second exploded perspective view of the print roll; FIG. 165 illustrates the print roll authentication chip; FIG. 166 illustrates an enlarged view of the print roll authentication chip; FIG. 167 illustrates a single authentication chip data protocol; FIG. 168 illustrates a dual authentication chip data protocol; FIG. 169 illustrates a first presence only protocol; FIG. 170 illustrates a second presence only protocol; FIG. 171 illustrates a third data protocol; FIG. 172 illustrates a fourth data protocol; FIG. 173 is a schematic block diagram of a maximal period LFSR; FIG. 174 is a schematic block diagram of a clock limiting filter; FIG. 175 is a schematic block diagram of the tamper detection lines; FIG. 176 illustrates an oversized nMOS transistor; FIG. 177 illustrates the taking of multiple XORs from the Tamper Detect Line FIG. 178 illustrate how the Tamper Lines cover the noise generator circuitry; FIG. 179 illustrates the normal form of FET implementation; FIG. 180 illustrates the modified form of FET implementation of the preferred embodiment; FIG. 181 illustrates a schematic block diagram of the authentication chip; FIG. 182 illustrates an example memory map; FIG. 183 illustrates an example of the constants memory map; FIG. 184 illustrates an example of the RAM memory map; FIG. 185 illustrates an example of the Flash memory variables memory map; FIG. 186 illustrates an example of the Flash memory program memory map; FIG. 187 shows the data flow and relationship between components of the State Machine; FIG. 188 shows the data flow and relationship between components of the I/O Unit FIG. 189 illustrates a schematic block diagram of the Arithmetic Logic Unit; FIG. 190 illustrates a schematic block diagram of the RPL unit; FIG. 191 illustrates a schematic block diagram of the ROR block of the ALU; FIG. 192 is a block diagram of the Program Counter Unit; FIG. 193 is a block diagram of the Memory Unit; FIG. 194 shows a schematic block diagram for the Address Generator Unit; FIG. 195 shows a schematic block diagram for the JSIGEN Unit; FIG. 196 shows a schematic block diagram for the JSRGEN Unit. FIG. 197 shows a schematic block diagram for the DBRGEN Unit; FIG. 198 shows a schematic block diagram for the LDKGEN Unit; FIG. 199 shows a schematic block diagram for the RPLGEN Unit; FIG. 200 shows a schematic block diagram for the VARGEN Unit. FIG. 201 shows a schematic block diagram for the CLRGEN Unit. FIG. 202 shows a schematic block diagram for the BITGEN Unit. FIG. 203 sets out the information stored on the print roll authentication chip; FIG. 204 illustrates the data stored within the Artcam authorization chip; FIG. 205 illustrates the process of print head pulse characterization; FIG. 206 is an exploded perspective, in section, of the print head ink supply mechanism; FIG. 207 is a bottom perspective of the ink head supply unit; FIG. 208 is a bottom side sectional view of the ink head supply unit; FIG. 209 is a top perspective of the ink head supply unit; FIG. 210 is a top side sectional view of the ink head supply unit; FIG. 211 illustrates a perspective view of a small portion of the print head; FIG. 212 illustrates is an exploded perspective of the print head unit; FIG. 213 illustrates a top side perspective view of the internal portions of an Artcam camera, showing the parts flattened out; FIG. 214 illustrates a bottom side perspective view of the internal portions of an Artcam camera, showing the parts flattened out; FIG. 215 illustrates a first top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; FIG. 216 illustrates a second top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; FIG. 217 illustrates a second top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; FIG. 218 illustrates the backing portion of a postcard print roll; FIG. 219 illustrates the corresponding front image on the postcard print roll after printing out images; FIG. 220 illustrates a form of print roll ready for purchase by a consumer; FIG. 221 illustrates a layout of the software/hardware modules of the overall Artcam application; FIG. 222 illustrates a layout of the software/hardware modules of the Camera Manager; FIG. 223 illustrates a layout of the software/hardware modules of the Image Processing Manager; FIG. 224 illustrates a layout of the software/hardware modules of the Printer Manager, FIG. 225 illustrates a layout of the software/hardware modules of the Image Processing Manager; FIG. 226 illustrates a layout of the software/hardware modules of the File Manager; FIG. 227 illustrates a perspective view, partly in section, of an alternative form of printroll; FIG. 228 is a left side exploded perspective view of the print roll of FIG. 227; FIG. 229 is a right side exploded perspective view of a single printroll; FIG. 230 is an exploded perspective view, partly in section, of the core portion of the printroll; and FIG. 231 is a second exploded perspective view of the core portion of the printroll. DESCRIPTION OF PREFERRED AND OTHER EMBODIMENTS The digital image processing camera system constructed in accordance with the preferred embodiment is as illustrated in FIG. 1. The camera unit 1 includes means for the insertion of an integral print roll (not shown). The camera unit 1 can include an area image sensor 2 which sensors an image 3 for captured by the camera. Optionally, the second area image sensor can be provided to also image the scene 3 and to optionally provide for the production of stereographic output effects. The camera 1 can include an optional color display 5 for the display of the image being sensed by the sensor 2. When a simple image is being displayed on the display 5, the button 6 can be depressed resulting in the printed image 8 being output by the camera unit 1. A series of cards, herein after known as “Artcards” 9 contain, on one surface encoded information and on the other surface, contain an image distorted by the particular effect produced by the Artcard 9. The Artcard 9 is inserted in an Artcard reader 10 in the side of camera 1 and, upon insertion, results in output image 8 being distorted in the same manner as the distortion appearing on the surface of Artcard 9. Hence, by means of this simple user interface a user wishing to produce a particular effect can insert one of many Artcards 9 into the Artcard reader 10 and utilize button 19 to take a picture of the image 3 resulting in a corresponding distorted output image 8. The camera unit 1 can also include a number of other control button 13, 14 in addition to a simple LCD output display 15 for the display of informative information including the number of printouts left on the internal print roll on the camera unit. Additionally, different output formats can be controlled by CHP switch 17. Turning now to FIG. 2, there is illustrated a schematic view of the internal hardware of the camera unit 1. The internal hardware is based around an Artcam central processor unit (ACP) 31. Artcam Central Processor 31 The Artcam central processor 31 provides many functions which form the ‘heart’ of the system. The ACP 31 is preferably implemented as a complex, high speed, CMOS system on-a-chip. Utilising standard cell design with some full custom regions is recommended. Fabrication on a 0.25 micron CMOS process will provide the density and speed required, along with a reasonably small die area. The functions provided by the ACP 31 include: 1. Control and digitization of the area image sensor 2. A 3D stereoscopic version of the ACP requires two area image sensor interfaces with a second optional image sensor 4 being provided for stereoscopic effects. 2. Area image sensor compensation, reformatting, and image enhancement. 3. Memory interface and management to a memory store 33. 4. Interface, control, and analog to digital conversion of an Artcard reader linear image sensor 34 which is provided for the reading of data from the Artcards 9. 5. Extraction of the raw Artcard data from the digitized and encoded Artcard image. 6. Reed-Solomon error detection and correction of the Artcard encoded data. The encoded surface of the Artcard 9 includes information on how to process an image to produce the effects displayed on the image distorted surface of the Artcard 9. This information is in the form of a script, hereinafter known as a “Vark script”. The Vark script is utilised by an interpreter running within the ACP 31 to produce the desired effect 7. Interpretation of the Vark script on the Artcard 9. 8. Performing image processing operations as specified by the Vark script. 9. Controlling various motors for the paper transport 36, zoom lens 38, autofocus 39 and Artcard driver 37. 10. Controlling a guillotine actuator 40 for the operation of a guillotine 41 for the cutting of photographs 8 from print roll 42. 11. Half-toning of the image data for printing. 12. Providing the print data to a print-head 44 at the appropriate times. 13. Controlling the print head 44. 14. Controlling the ink pressure feed to print-head 44. 15. Controlling optional flash unit 56. 16. Reading and acting on various sensors in the camera, including camera orientation sensor 46, autofocus 47 and Artcard insertion sensor 49. 17. Reading and acting on the user interface buttons 6, 13, 14. 18. Controlling the status display 15. 19. Providing viewfinder and preview images to the color display 5. 20. Control of the system power consumption, including the ACP power consumption via power management circuit 51. 21. Providing external communications 52 to general purpose computers (using part USB). 22. Reading and storing information in a printing roll authentication chip 53. 23. Reading and storing information in a camera authentication chip 54. 24. Communicating with an optional mini-keyboard 57 for text modification. Quartz Crystal 58 A quartz crystal 58 is used as a frequency reference for the system clock. As the system clock is very high, the ACP 31 includes a phase locked loop clock circuit to increase the frequency derived from the crystal 58. Image Sensing Area Image Sensor 2 The area image sensor 2 converts an image through its lens into an electrical signal. It can either be a charge coupled device (CCD) or an active pixel sensor (APS)CMOS image sector. At present, available CCD's normally have a higher image quality, however, there is currently much development occurring in CMOS imagers. CMOS imagers are eventually expected to be substantially cheaper than CCD's have smaller pixel areas, and be able to incorporate drive circuitry and signal processing. They can also be made in CMOS fabs, which are transitioning to 12″ wafers. CCD's are usually built in 6″ wafer fabs, and economics may not allow a conversion to 12″ fabs. Therefore, the difference in fabrication cost between CCD's and CMOS imagers is likely to increase, progressively favoring CMOS imagers. However, at present, a CCD is probably the best option. The Artcam unit will produce suitable results with a 1,500×1,000 area image sensor. However, smaller sensors, such as 750×500, will be adequate for many markets. The Artcam is less sensitive to image sensor resolution than are conventional digital cameras. This is because many of the styles contained on Artcards 9 process the image in such a way as to obscure the lack of resolution. For example, if the image is distorted to simulate the effect of being converted to an impressionistic painting, low source image resolution can be used with minimal effect Further examples for which low resolution input images will typically not be noticed include image warps which produce high distorted images, multiple miniature copies of the of the image (eg. passport photos), textural processing such as bump mapping for a base relief metal look, and photo-compositing into structured scenes. This tolerance of low resolution image sensors may be a significant factor in reducing the manufacturing cost of an Artcam unit 1 camera. An Artcam with a low cost 750×500 image sensor will often produce superior results to a conventional digital camera with a much more expensive. 1,500×1,000 image sensor. Optional Stereoscopic 3D Image Sensor 4 The 3D versions of the Artcam unit 1 have an additional image sensor 4, for stereoscopic operation. This image sensor is identical to the main image sensor. The circuitry to drive the optional image sensor may be included as a standard part of the ACP chip 31 to reduce incremental design cost Alternatively, a separate 3D Artcam ACP can be designed. This option will reduce the manufacturing cost of a mainstream single sensor Artcam. Print Roll Authentication Chip 53 A small chip 53 is included in each print roll 42. This chip replaced the functions of the bar code, optical sensor and wheel, and ISO/ASA sensor on other forms of camera film units such as Advanced Photo Systems film cartridges. The authentication chip also provides other features: 1. The storage of data rather than that which is mechanically and optically sensed from APS rolls 2. A remaining media length indication, accurate to high resolution. 3. Authentication Information to prevent inferior clone print roll copies. The authentication chip 53 contains 1024 bits of Flash memory, of which 128 bits is an authentication key, and 512 bits is the authentication information. Also included is an encryption circuit to ensure that the authentication key cannot be accessed directly. Print-Head 44 The Artcam unit 1 can utilize any color print technology which is small enough, low enough power, fast enough, high enough quality, and low enough cost, and is compatible with the print roll. Relevant printheads will be specifically discussed hereinafter. The specifications of the ink jet head are: Image type Bi-level, dithered Color CMY Process Color Resolution 1600 dpi Print head length ‘Page-width’ (100 mm) Print speed 2 seconds per photo Optional Ink Pressure Controller (Not Shown) The function of the ink pressure controller depends upon the type of ink jet print head 44 incorporated in the Artcam. For some types of ink jet, the use of an ink pressure controller can be eliminated, as the ink pressure is simply atmospheric pressure. Other types of print head require a regulated positive ink pressure. In this case, the in pressure controller consists of a pump and pressure transducer. Other print heads may require an ultrasonic transducer to cause regular oscillations in the ink pressure, typically at frequencies around 100 KHz. In the case, the ACP 31 controls the frequency phase and amplitude of these oscillations. Paper Transport Motor 36 The paper transport motor 36 moves the paper from within the print roll 42 past the print head at a relatively constant rate. The motor 36 is a miniature motor geared down to an appropriate speed to drive rollers which move the paper. A high quality motor and mechanical gears are required to achieve high image quality, as mechanical rumble or other vibrations will affect the printed dot row spacing. Paper Transport Motor Driver 60 The motor driver 60 is a small circuit which amplifies the digital motor control signals from the APC 31 to levels suitable for driving the motor 36. Paper Pull Sensor A paper pull sensor 50 detects a user's attempt to pull a photo from the camera unit during the printing process. The APC 31 reads this sensor 50, and activates the guillotine 41 if the condition occurs. The paper pull sensor 50 is incorporated to make the camera more ‘foolproof’ in operation. Were the user to pull the paper out forcefully during printing, the print mechanism 44 or print roll 42 may (in extreme cases) be damaged. Since it is acceptable to pull out the ‘pod’ from a Polaroid type camera before it is fully ejected, the public has been ‘trained’ to do this. Therefore, they are unlikely to heed printed instructions not to pull the paper. The Artcam preferably restarts the photo print process after the guillotine 41 has cut the paper after pull sensing. The pull sensor can be implemented as a strain gauge sensor, or as an optical sensor detecting a small plastic flag which is deflected by the torque that occurs on the paper drive rollers when the paper is pulled. The latter implementation is recommendation for low cost Paper Guillotine Actuator 40 The paper guillotine actuator 40 is a small actuator which causes the guillotine 41 to cut the paper either at the end of a photograph, or when the paper pull sensor 50 is activated. The guillotine actuator 40 is a small circuit which amplifies a guillotine control signal from the APC tot the level required by the actuator 41. Artcard 9 The Artcard 9 is a program storage medium for the Artcam unit. As noted previously, the programs are in the form of Vark scripts. Vark is a powerful image processing language especially developed for the Artcam unit. Each Artcard 9 contains one Vark script, and thereby defines one image processing style. Preferably, the VARK language is highly image processing specific. By being highly image processing specific, the amount of storage required to store the details on the card are substantially reduced. Further, the ease with which new programs can be created, including enhanced effects, is also substantially increased. Preferably, the language includes facilities for handling many image processing functions including image warping via a warp map, convolution, color lookup tables, posterizing an image, adding noise to an image, image enhancement filters, painting algorithms, brush jittering and manipulation edge detection filters, tiling, illumination via light sources, bump maps, text, face detection and object detection attributes, fonts, including three dimensional fonts, and arbitrary complexity pre-rendered icons. Further details of the operation of the Vark language interpreter are contained hereinafter. Hence, by utilizing the language constructs as defined by the created language, new affects on arbitrary images can be created and constructed for inexpensive storage on Artcard and subsequent distribution to camera owners. Further, on one surface of the card can be provided an example illustrating the effect that a particular VARK script, stored on the other surface of the card, will have on an arbitrary captured image. By utilizing such a system, camera technology can be distributed without a great fear of obsolescence in that, provided a VARK interpreter is incorporated in the camera device, a device independent scenario is provided whereby the underlying technology can be completely varied over time. Further, the VARK scripts can be updated as new filters are created and distributed in an inexpensive manner, such as via simple cards for card reading. The Artcard 9 is a piece of thin white plastic with the same format as a credit card (86 mm long by 54 mm wide). The Artcard is printed on both sides using a high resolution ink jet printer. The inkjet printer technology is assumed to be the same as that used in the Artcam, with 1600 dpi (63 dpmm) resolution. A major feature of the Artcard 9 is low manufacturing cost. Artcards can be manufactured at high speeds as a wide web of plastic film. The plastic web is coated on both sides with a hydrophilic dye fixing layer. The web is printed simultaneously on both sides using a ‘pagewidth’ color ink jet printer. The web is then cut and punched into individual cards. On one face of the card is printed a human readable representation of the effect the Artcard 9 will have on the sensed image. This can be simply a standard image which has been processed using the Vark script stored on the back face of the card. On the back face of the card is printed an array of dots which can be decoded into the Vark script that defines the image processing sequence. The print area is 80 mm×50 mm, giving a total of 15,876,000 dots. This array of dots could represent at least 1.89 Mbytes of data. To achieve high reliability, extensive error detection and correction is incorporated in the array of dots. This allows a substantial portion of the card to be defaced, worn, creased, or dirty with no effect on data integrity. The data coding used is Reed-Solomon coding, with half of the data devoted to error correction. This allows the storage of 967 Kbytes of error corrected data on each Artcard 9. Linear Image Sensor 34 The Artcard linear sensor 34 converts the aforementioned Artcard data image to electrical signals. As with the area image sensor 2, 4, the linear image sensor can be fabricated using either CCD or APS CMOS technology. The active length of the image sensor 34 is 50 mm, equal to the width of the data array on the Artcard 9. To satisfy Nyquist's sampling theorem, the resolution of the linear image sensor 34 must be at least twice the highest spatial frequency of the Artcard optical image reaching the image sensor. In practice, data detection is easier if the image sensor resolution is substantially above this. A resolution of 4800 dpi (189 dpmm) is chosen, giving a total of 9,450 pixels. This resolution requires a pixel sensor pitch of 5.3 μm. This can readily be achieved by using four staggered rows of 20 μm pixel sensors. The linear image sensor is mounted in a special package which includes a LED 65 to illuminate the Artcard 9 via a light-pipe (not shown). The Artcard reader light-pipe can be a molded light-pipe which has several function: 1. It diffuses the light from the LED over the width of the card using total internal reflection facets. 2. It focuses the light onto a 16 μm wide strip of the Artcard 9 using an integrated cylindrical lens. 3. It focuses light reflected from the Artcard onto the linear image sensor pixels using a molded array of microlenses. The operation of the Artcard reader is explained further hereinafter. Artcard Reader Motor 37 The Artcard reader motor propels the Artcard past the linear image sensor 34 at a relatively constant rate. As it may not be cost effective to include extreme precision mechanical components in the Artcard reader, the motor 37 is a standard miniature motor geared down to an appropriate speed to drive a pair of rollers which move the Artcard 9. The speed variations, rumble, and other vibrations will affect the raw image data as circuitry within the APC 31 includes extensive compensation for these effects to reliably read the Artcard data. The motor 37 is driven in reverse when the Artcard is to be ejected. Artcard Motor Driver 61 The Artcard motor driver 61 is a small circuit which amplifies the digital motor control signals from the APC 31 to levels suitable for driving the motor 37. Card Insertion Sensor 49 The card insertion sensor 49 is an optical sensor which detects the presence of a card as it is being inserted in the card reader 34. Upon a signal from this sensor 49, the APC 31 initiates the card reading process, including the activation of the Artcard reader motor 37. Card Eject Button 16 A card eject button 16 (FIG. 1) is used by the user to eject the current Artcard, so that another Artcard can be inserted. The APC 31 detects the pressing of the button, and reverses the Artcard reader motor 37 to eject the card. Card Status Indicator 66 A card status indicator 66 is provided to signal the user as to the status of the Artcard reading process. This can be a standard bi-color (red/green) LED. When the card is successfully read, and data integrity has been verified, the LED lights up green continually. If the card is faulty, then the LED lights up red. If the camera is powered from a 1.5 V instead of 3V battery, then the power supply voltage is less than the forward voltage drop of the greed LED, and the LED will not light. In this case, red LEDs can be used, or the LED can be powered from a voltage pump which also powers other circuits in the Artcam which require higher voltage. 64 Mbit DRAM 33 To perform the wide variety of image processing effects, the camera utilizes 8 Mbytes of memory 33. This can be provided by a single 64 Mbit memory chip. Of course, with changing memory technology increased Dram storage sizes may be substituted High speed access to the memory chip is required. This can be achieved by using a Rambus DRAM (burst access rate of 500 Mbytes per second) or chips using the new open standards such as double data rate (DDR) SDRAM or Synclink DRAM. Camera Authentication Chip The camera authentication chip 54 is identical to the print roll authentication chip 53, except that it has different information stored in it The camera authentication chip 54 has three main purposes: 1. To provide a secure means of comparing authentication codes with the print roll authentication chip; 2. To provide storage for manufacturing information, such as the serial number of the camera; 3. To provide a small amount of non-volatile memory for storage of user information. Displays The Artcam includes an optional color display 5 and small status display 15. Lowest cost consumer cameras may include a color image display, such as a small TFT LCD 5 similar to those found on some digital cameras and camcorders. The color display 5 is a major cost element of these versions of Artcam, and the display 5 plus back light are a major power consumption drain. Status Display 15 The status display 15 is a small passive segment based LCD, similar to those currently provided on silver halide and digital cameras. Its main function is to show the number of prints remaining in the print roll 42 and icons for various standard camera features, such as flash and battery status. Color Display 5 The color display 5 is a full motion image display which operates as a viewfinder, as a verification of the image to be printed, and as a user interface display. The cost of the display 5 is approximately proportional to its area, so large displays (say 4″ diagonal) unit will be restricted to expensive versions of the Artcam unit. Smaller displays, such as color camcorder viewfinder TFT's at around 1″, may be effective for mid-range Artcams. Zoom Lens (Not Shown) The Artcam can include a zoom lens. This can be a standard electronically controlled zoom lens, identical to one which would be used on a standard electronic camera, and similar to pocket camera zoom lenses. A referred version of the Artcam unit may include standard interchangeable 35 mm SLR lenses. Autofocus Motor 39 The autofocus motor 39 changes the focus of the zoom lens. The motor is a miniature motor geared down to an appropriate speed to drive the autofocus mechanism. Autofocus Motor Driver 63 The autofocus motor driver 63 is a small circuit which amplifies the digital motor control signals from the APC 31 to levels suitable for driving the motor 39. Zoom Motor 38 The zoom motor 38 moves the zoom front lenses in and out. The motor is a miniature motor geared down to an appropriate speed to drive the zoom mechanism. Zoom Motor Driver 62 The zoom motor driver 62 is a small circuit which amplifies the digital motor control signals from the APC 31 to levels suitable for driving the motor. Communications The ACP 31 contains a universal serial bus (USB) interface 52 for communication with personal computers. Not all Artcam models are intended to include the USB connector. However, the silicon area required for a USB circuit 52 is small, so the interface can be included in the standard ACP. Optional Keyboard 57 The Artcam unit may include an optional miniature keyboard 57 for customizing text specified by the Artcard. Any text appearing in an Artcard image may be editable, even if it is in a complex metallic 3D font. The miniature keyboard includes a single line alphanumeric LCD to display the original text and edited text. The keyboard may be a standard accessory. The ACP 31 contains a serial communications circuit for transferring data to and from the miniature keyboard. Power Supply The Artcam unit uses a battery 48. Depending upon the Artcam options, this is either a 3V Lithium cell, 1.5 V AA alkaline cells, or other battery arrangement Power Management Unit 51 Power consumption is an important design constraint in the Artcam. It is desirable that either standard camera batteries (such as 3V lithium batters) or standard AA or AAA alkaline cells can be used. While the electronic complexity of the Artcam unit is dramatically higher than 35 mm photographic cameras, the power consumption need not be commensurately higher. Power in the Artcam can be carefully managed with all unit being turned off when not in use. The most significant current drains are the ACP 31, the area image sensors 2,4, the printer 44 various motors, the flash unit 56, and the optional color display 5 dealing with each part separately: 1. ACP: If fabricated using 0.25 μm CMOS, and running on 1.5V, the ACP power consumption can be quite low. Clocks to various parts of the ACP chip can be quite low. Clocks to various parts of the ACP chip can be turned off when not in use, virtually eliminating standby current consumption. The ACP will only fully used for approximately 4 seconds for each photograph printed. 2. Area image sensor: power is only supplied to the area image sensor when the user has their finger on the button. 3. The printer power is only supplied to the printer when actually printing. This is for around 2 seconds for each photograph. Even so, suitably lower power consumption printing should be used. 4. The motors required in the Artcam are all low power miniature motors, and are typically only activated for a few seconds per photo. 5. The flash unit 45 is only used for some photographs. Its power consumption can readily be provided by a 3V lithium battery for a reasonably battery life. 6. The optional color display 5 is a major current drain for two reasons: it must be on for the whole time that the camera is in use, and a backlight will be required if a liquid crystal display is used. Cameras which incorporate a color display will require a larger battery to achieve acceptable batter life. Flash Unit 56 The flash unit 56 can be a standard miniature electronic flash for consumer cameras. Overview of the ACP 31 FIG. 3 illustrates the Artcam Central Processor (ACP) 31 in more detail. The Artcam Central Processor provides all of the processing power for Artcam. It is designed for a 0.25 micron CMOS process, with approximately 1.5 million transistors and an area of around 50 mm2. The ACP 31 is a complex design, but design effort can be reduced by the use of datapath compilation techniques, macrocells, and IP cores. The ACP 31 contains: A RISC CPU core 72 A 4 way parallel VLIW Vector Processor 74 A Direct RAMbus interface 81 A CMOS image sensor interface 83 A CMOS linear image sensor interface 88 A USB serial interface 52 An infrared keyboard interface 55 A numeric LCD interface 84, and A color TFT LCD interface 88 A 4 Mbyte Flash memory 70 for program storage 70 The RISC CPU, Direct RAMbus interface 81, CMOS sensor interface 83 and USB serial interface 52 can be vendor supplied cores. The ACP 31 is intended to run at a clock speed of 200 MHz on 3V externally and 1.5V internally to minimize power consumption. The CPU core needs only to run at 100 MHz. The following two block diagrams give two views of the ACP 31: A View of the ACP 31 in Isolation An example Artcam showing a high-level view of the ACP 31 connected to the rest of the Artcam hardware. Image Access As stated previously, the DRAM Interface 81 is responsible for interfacing between other client portions of the ACP chip and the RAMBUS DRAM. In effect, each module within the DRAM Interface is an address generator. There are three logical types of images manipulated by the ACP. They are: CCD Image, which is the Input Image captured from the CCD. Internal Image format—the Image format utilised internally by the Artcam device. Print Image—the Output Image format printed by the Artcam These images are typically different in color space, resolution, and the output & input color spaces which can vary from camera to camera. For example, a CCD image on a low-end camera may be a different resolution, or have different color characteristics from that used in a high-end camera. However all internal image formats are the same format in terms of color space across all cameras. In addition, the three image types can vary with respect to which direction is ‘up’. The physical orientation of the camera causes the notion of a portrait or landscape image, and this must be maintained throughout processing. For this reason, the internal image is always oriented correctly, and rotation is performed on images obtained from the CCD and during the print operation. CPU Core (CPU) 72 The ACP 31 incorporates a 32 bit RISC CPU 72 to run the Vark image processing language interpreter and to perform Artcam's general operating system duties. A wide variety of CPU cores are suitable: it can be any processor core with sufficient processing power to perform the required core calculations and control functions fast enough to met consumer expectations. Examples of suitable cores are: MIPS R4000 core from LSI Logic, StrongARM core. There is no need to maintain instruction set continuity between different Artcam models. Artcard compatibility is maintained irrespective of future processor advances and changes, because the Vark interpreter is simply re-compiled for each new instruction set. The ACP 31 architecture is therefore also free to evolve. Different ACP 31 chip designs may be fabricated by different manufacturers, without requiring to license or port the CPU core. This device independence avoids the chip vendor lock-in such as has occurred in the PC market with Intel. The CPU operates at 100 MHz, with a single cycle time of 10 ns. It must be fast enough to run the Vark interpreter, although the VLIW Vector Processor 74 is responsible for most of the time-critical operations. Program Cache 72 Although the program code is stored in on-chip Flash memory 70, it is unlikely that well packed Flash memory 70 will be able to operate at the 10 ns cycle time required by the CPU. Consequently a small cache is required for good performance. 16 cache lines of 32 bytes each are sufficient, for a total of 512 bytes. The program cache 72 is defined in the chapter entitled Program cache 72. Data Cache 76 A small data cache 76 is required for good performance. This requirement is mostly due to the use of a RAMbus DRAM, which can provide high-speed data in bursts, but is inefficient for single byte accesses. The CPU has access to a memory caching system that allows flexible manipulation of CPU data cache 76 sizes. A minimum of 16 cache lines (512 bytes) is recommended for good performance. CPU Memory Model An Artcam's CPU memory model consists of a 32 MB area. It consists of 8 MB of physical RDRAM off-chip in the base model of Artcam, with provision for up to 16 MB of off-chip memory. There is a 4 MB Flash memory 70 on the ACP 31 for program storage, and finally a 4 MB address space mapped to the various registers and controls of the ACP 31. The memory map then, for an Artcam is as follows: Contents Size Base Artcam DRAM 8 MB Extended DRAM 8 MB Program memory (on ACP 31 in Flash memory 70) 4 MB Reserved for extension of program memory 4 MB ACP 31 registers and memory-mapped I/O 4 MB Reserved 4 MB TOTAL 32 MB A straightforward way of decoding addresses is to use address bits 23-24: If bit 24 is clear, the address is in the lower 16-MB range, and hence can be satisfied from DRAM and the Data cache 76. In most cases the DRAM will only be 8 MB, but 16 MB is allocated to cater for a higher memory model Artcams. If bit 24 is set, and bit 23 is clear, then the address represents the Flash memory 70 4 Mbyte range and is satisfied by the Program cache 72. If bit 24=1 and bit 23=1, the address is translated into an access over the low speed bus to the requested component in the AC by the CPU Memory Decoder 68. Flash Memory 70 The ACP 31 contains a 4 Mbyte Flash memory 70 for storing the Artcam program. It is envisaged that Flash memory 70 will have denser packing coefficients than masked ROM, and allows for greater flexibility for testing camera program code. The downside of the Flash memory 70 is the access time, which is unlikely to be fast enough for the 100 MHz operating speed (10 ns cycle time) of the CPU. A fast Program Instruction cache 77 therefore acts as the interface between the CPU and the slower Flash memory 70. Program Cache 72 A small cache is required for good CPU performance. This requirement is due to the slow speed Flash memory 70 which stores the Program code. 16 cache lines of 32 bytes each are sufficient, for a total of 512 bytes. The Program cache 72 is a read only cache. The data used by CPU programs comes through the CPU Memory Decoder 68 and if the address is in DRAM, through the general Data cache 76. The separation allows the CPU to operate independently of the VLIW Vector Processor 74. If the data requirements are low for a given process, it can consequently operate completely out of cache. Finally, the Program cache 72 can be read as data by the CPU rather than purely as program instructions. This allows tables, microcode for the VLIW etc to be loaded from the Flash memory 70. Addresses with bit 24 set and bit 23 clear are satisfied from the Program cache 72. CPU Memory Decoder 68 The CPU Memory Decoder 68 is a simple decoder for satisfying CPU data accesses. The Decoder translates data addresses into internal ACP register accesses over the internal low speed bus, and therefore allows for memory mapped I/O of ACP registers. The CPU Memory Decoder 68 only interprets addresses that have bit 24 set and bit 23 clear. There is no caching in the CPU Memory Decoder 68. DRAM Interface 81 The DRAM used by the Artcam is a single channel 64 Mbit (8 MB) RAMbus RDRAM operating at 1.6 GB/sec. RDRAM accesses are by a single channel (16-bit data path) controller. The RDRAM also has several useful operating modes for low power operation. Although the Rambus specification describes a system with random 32 byte transfers as capable of achieving a greater than 95% efficiency, this is not true if only part of the 32 bytes are used. Two reads followed by two writes to the same device yields over 86% efficiency. The primary latency is required for bus turn-around going from a Write to a Read, and since there is a Delayed Write mechanism, efficiency can be further improved. With regards to writes, Write Masks allow specific subsets of bytes to be written to. These write masks would be set via internal cache “dirty bits”. The upshot of the Rambus Direct RDRAM is a throughput of >1 GB/sec is easily achievable, and with multiple reads for every write (most processes) combined with intelligent algorithms making good use of 32 byte transfer knowledge, transfer rates of >1.3 GB/sec are expected. Every 10 ns, 16 bytes can be transferred to or from the core. DRAM Organization The DRAM organization for a base model (8 MB RDRAM) Artcam is as follows: Contents Size Program scratch RAM 0.50 MB Artcard data 1.00 MB Photo Image, captured from CMOS Sensor 0.50 MB Print Image (compressed) 2.25 MB 1 Channel of expanded Photo Image 1.50 MB 1 Image Pyramid of single channel 1.00 MB Intermediate Image Processing 1.25 MB TOTAL 8 MB Notes: Uncompressed, the Print Image requires 4.5 MB (1.5 MB per channel). To accommodate other objects in the 8 MB model, the Print Image needs to be compressed. If the chrominance channels are compressed by 4:1 they require only 0.375 MB each). The memory model described here assumes a single 8 MB RDRAM. Other models of the Artcam may have more memory, and thus not require compression of the Print Image. In addition, with more memory a larger part of the final image can be worked on at once, potentially giving a speed improvement. Note that ejecting or inserting an Artcard invalidates the 5.5 MB area holding the Print Image, 1 channel of expanded photo image, and the image pyramid. This space may be safely used by the Artcard Interface for decoding the Artcard data. Data Cache 76 The ACP 31 contains a dedicated CPU instruction cache 77 and a general data cache 76. The Data cache 76 handles all DRAM requests (reads and writes of data) from the CPU, the VLIW Vector Processor 74, and the Display Controller 88. These requests may have very different profiles in terms of memory usage and algorithmic timing requirements. For example, a VLIW process may be processing an image in linear memory, and lookup a value in a table for each value in the image. There is little need to cache much of the image, but it may be desirable to cache the entire lookup table so that no real memory access is required. Because of these differing requirements, the Data cache 76 allows for an intelligent definition of caching. Although the Rambus DRAM interface 81 is capable of very high-speed memory access (an average throughput of 32 bytes in 25 ns), it is not efficient dealing with single byte requests. In order to reduce effective memory latency, the ACP 31 contains 128 cache lines. Each cache line is 32 bytes wide. Thus the total amount of data cache 76 is 4096 bytes (4 KB). The 128 cache lines are configured into 16 programmable-sized groups. Each of the 16 groups must be a contiguous set of cache lines. The CPU is responsible for determining how many cache lines to allocate to each group. Within each group cache lines are filled according to a simple Least Recently Used algorithm. In terms of CPU data requests, the Data cache 76 handles memory access requests that have address bit 24 clear. If bit 24 is clear, the address is in the lower 16 MB range, and hence can be satisfied from DRAM and the Data cache 76. In most cases the DRAM will only be 8 MB, but 16 MB is allocated to cater for a higher memory model Artcam. If bit 24 is set, the address is ignored by the Data cache 76. All CPU data requests are satisfied from Cache Group 0. A minimum of 16 cache lines is recommended for good CPU performance, although the CPU can assign any number of cache lines (except none) to Cache Group 0. The remaining Cache Groups (1 to 15) are allocated according to the current requirements. This could mean allocation to a VLIW Vector Processor 74 program or the Display Controller 88. For example, a 256 byte lookup table required to be permanently available would require 8 cache lines. Writing out a sequential image would only require 2-4 cache lines (depending on the size of record being generated and whether write requests are being Write Delayed for a significant number of cycles). Associated with each cache line byte is a dirty bit, used for creating a Write Mask when writing memory to DRAM. Associated with each cache line is another dirty bit, which indicates whether any of the cache line bytes has been written to (and therefore the cache line must be written back to DRAM before it can be reused). Note that it is possible for two different Cache Groups to be accessing the same address in memory and to get out of sync. The VLIW program writer is responsible to ensure that this is not an issue. It could be perfectly reasonable, for example, to have a Cache Group responsible for reading an image, and another Cache Group responsible for writing the changed image back to memory again. If the images are read or written sequentially there may be advantages in allocating cache lines in this manner. A total of 8 buses 182 connect the VLIW Vector Processor 74 to the Data cache 76. Each bus is connected to an I/O Address Generator. (There are 2 I/O Address Generators 189, 190 per Processing Unit 178, and there are 4 Processing Units in the VLIW Vector Processor 74. The total number of buses is therefore 8.) In any given cycle, in addition to a single 32 bit (4 byte) access to the CPU's cache group (Group 0), 4 simultaneous accesses of 16 bits (2 bytes) to remaining cache groups are permitted on the 8 VLIW Vector Processor 74 buses. The Data cache 76 is responsible for fairly processing the requests. On a given cycle, no more than 1 request to a specific Cache Group will be processed. Given that there are 8 Address Generators 189, 190 in the VLIW Vector Processor 74, each one of these has the potential to refer to an individual Cache Group. However it is possible and occasionally reasonable for 2 or more Address Generators 189, 190 to access the same Cache Group. The CPU is responsible for ensuring that the Cache Groups have been allocated the correct number of cache lines, and that the various Address Generators 189, 190 in the VLIW Vector Processor 74 reference the specific Cache Groups correctly. The Data cache 76 as described allows for the Display Controller 88 and VLIW Vector Processor 74 to be active simultaneously. If the operation of these two components were deemed to never occur simultaneously, a total 9 Cache Groups would suffice. The CPU would use Cache Group 0, and the VLIW Vector Processor 74 and the Display Controller 88 would share the remaining 8 Cache Groups, requiring only 3 bits (rather than 4) to define which Cache Group would satisfy a particular request. JTAG Interface 85 A standard JTAG (Joint Test Action Group) Interface is included in the ACP 31 for testing purposes. Due to the complexity of the chip, a variety of testing techniques are required, including BIST (Built In Self Test) and functional block isolation. An overhead of 10% in chip area is assumed for overall chip testing circuitry. The test circuitry is beyond the scope of this document. Serial Interfaces USB Serial Port Interface 52 This is a standard USB serial port, which is connected to the internal chip low speed bus, thereby allowing the CPU to control it. Keyboard Interface 65 This is a standard low-speed serial port, which is connected to the internal chip low speed bus, thereby allowing the CPU to control it. It is designed to be optionally connected to a keyboard to allow simple data input to customize prints. Authentication Chip Serial Interfaces 64 These are 2 standard low-speed serial ports, which are connected to the internal chip low speed bus, thereby allowing the CPU to control them. The reason for having 2 ports is to connect to both the on-camera Authentication chip, and to the print-roll Authentication chip using separate lines. Only using 1 line may make it possible for a clone print-roll manufacturer to design a chip which, instead of generating an authentication code, tricks the camera into using the code generated by the authentication chip in the camera. Parallel Interface 67 The parallel interface connects the ACP 31 to individual static electrical signals. The CPU is able to control each of these connections as memory-mapped I/O via the low speed bus The following table is a list of connections to the parallel interface: Connection Direction Pins Paper transport stepper motor Out 4 Artcard stepper motor Out 4 Zoom stepper motor Out 4 Guillotine motor Out 1 Flash trigger Out 1 Status LCD segment drivers Out 7 Status LCD common drivers Out 4 Artcard illumination LED Out 1 Artcard status LED (red/green) In 2 Artcard sensor In 1 Paper pull sensor In 1 Orientation sensor In 2 Buttons In 4 TOTAL 36 VLIW Input and Output FIFOs 78, 79 The VLIW Input and Output FIFOs are 8 bit wide FIFOs used for communicating between processes and the VLIW Vector Processor 74. Both FIFOs are under the control of the VLIW Vector Processor 74, but can be cleared and queried (e.g. for status) etc by the CPU. VLIW Input FIFO 78 A client writes 8-bit data to the VLIW Input FIFO 78 in order to have the data processed by the VLIW Vector Processor 74. Clients include the Image Sensor Interface, Artcard Interface, and CPU. Each of these processes is able to offload processing by simply writing the data to the FIFO, and letting the VLIW Vector Processor 74 do all the hard work. An example of the use of a client's use of the VLIW Input FIFO 78 is the Image Sensor Interface (ISI 83). The ISI 83 takes data from the Image Sensor and writes it to the FIFO. A VLIW process takes it from the FIFO, transforming it into the correct image data format, and writing it out to DRAM. The ISI 83 becomes much simpler as a result. VLIW Output FIFO 79 The VLIW Vector Processor 74 writes 8-bit data to the VLIW Output FIFO 79 where clients can read it. Clients include the Print Head Interface and the CPU. Both of these clients is able to offload processing by simply reading the already processed data from the FIFO, and letting the VLIW Vector Processor 74 do all the hard work. The CPU can also be interrupted whenever data is placed into the VLIW Output FIFO 79, allowing it to only process the data as it becomes available rather than polling the FIFO continuously. An example of the use of a client's use of the VLIW Output FIFO 79 is the Print Head Interface (PHI 62). A VLIW process takes an image, rotates it to the correct orientation, color converts it, and dithers the resulting image according to the print head requirements. The PHI 62 reads the dithered formatted 8-bit data from the VLIW Output FIFO 79 and simply passes it on to the Print Head external to the ACP 31. The PHI 62 becomes much simpler as a result. VLIW Vector Processor 74 To achieve the high processing requirements of Artcam, the ACP 31 contains a VLIW (Very Long Instruction Word) Vector Processor. The VLIW processor is a set of 4 identical Processing Units (PU e.g 178) working in parallel, connected by a crossbar switch 183. Each PU e.g 178 can perform four 8-bit multiplications, eight 8-bit additions, three 32-bit additions, I/O processing, and various logical operations in each cycle. The PUs e.g 178 are microcoded, and each has two Address Generators 189, 190 to allow full use of available cycles for data processing. The four PUs e.g 178 are normally synchronized to provide a tightly interacting VLIW processor. Clocking at 200 MHz, the VLIW Vector Processor 74 runs at 12 Gops (12 billion operations per second). Instructions are tuned for image processing functions such as warping, artistic brushing, complex synthetic illumination, color transforms, image filtering, and compositing. These are accelerated by two orders of magnitude over desktop computers. As shown in more detail in FIG. 3(a), the VLIW Vector Processor 74 is 4 PUs e.g 178 connected by a crossbar switch 183 such that each PU e.g 178 provides two inputs to, and takes two outputs from, the crossbar switch 183. Two common registers form a control and synchronization mechanism for the PUs e.g 178. 8 Cache buses 182 allow connectivity to DRAM via the Data cache 76, with 2 buses going to each PU e.g 178 (1 bus per I/O Address Generator). Each PU e.g 178 consists of an ALU 188 (containing a number of registers & some arithmetic logic for processing data), some microcode RAM 196, and connections to the outside world (including other ALUs). A local PU state machine runs in microcode and is the means by which the PU e.g 178 is controlled. Each PU e.g 178 contains two I/O Address Generators 189, 190 controlling data flow between DRAM (via the Data cache 76) and the ALU 188 (via Input FIFO and Output FIFO). The address generator is able to read and write data (specifically images in a variety of formats) as well as tables and simulated FIFOs in DRAM. The formats are customizable under software control, but are not microcoded. Data taken from the Data cache 76 is transferred to the ALU 188 via the 16-bit wide Input FIFO. Output data is written to the 16-bit wide Output FIFO and from there to the Data cache 76. Finally, all PUs e.g 178 share a single 8-bit wide VLIW Input FIFO 78 and a single 8-bit wide VLIW Output FIFO 79. The low speed data bus connection allows the CPU to read and write registers in the PU e.g 178, update microcode, as well as the common registers shared by all PUs e.g 178 in the VLIW Vector Processor 74. Turning now to FIG. 4, a closer detail of the internals of a single PU e.g 178 can be seen, with components and control signals detailed in subsequent hereinafter: Microcode Each PU e.g 178 contains a microcode RAM 196 to hold the program for that particular PU e.g 178. Rather than have the microcode in ROM, the microcode is in RAM, with the CPU responsible for loading it up. For the same space on chip, this tradeoff reduces the maximum size of any one function to the size of the RAM, but allows an unlimited number of functions to be written in microcode. Functions implemented using microcode include Vark acceleration, Artcard reading, and Printing. The VLIW Vector Processor 74 scheme has several advantages for the case of the ACP 31: Hardware design complexity is reduced Hardware risk is reduced due to reduction in complexity Hardware design time does not depend on all Vark functionality being implemented in dedicated silicon Space on chip is reduced overall (due to large number of processes able to be implemented as microcode) Functionality can be added to Vark (via microcode) with no impact on hardware design time Size and Content The CPU loaded microcode RAM 196 for controlling each PU e.g 178 is 128 words, with each word being 96 bits wide. A summary of the microcode size for control of various units of the PU e.g 178 is listed in the following table: Process Block Size (bits) Status Output 3 Branching (microcode control) 11 In 8 Out 6 Registers 7 Read 10 Write 6 Barrel Shifter 12 Adder/Logical 14 Multiply/Interpolate 19 TOTAL 96 With 128 instruction words, the total microcode RAM 196 per PU e.g 178 is 12,288 bits, or 1.5 KB exactly. Since the VLIW Vector Processor 74 consists of 4 identical PUs e.g 178 this equates to 6,144 bytes, exactly 6 KB. Some of the bits in a microcode word are directly used as control bits, while others are decoded. See the various unit descriptions that detail the interpretation of each of the bits of the microcode word. Synchronization Between PUs e.g 178 Each PU e.g 178 contains a 4 bit Synchronization Register 197. It is a mask used to determine which PUs e.g 178 work together, and has one bit set for each of the corresponding PUs e.g 178 that are functioning as a single process. For example, if all of the PUs e.g 178 were functioning as a single process, each of the 4 Synchronization Register 197s would have all 4 bits set. If there were two asynchronous processes of 2 PUs e.g 178 each, two of the PUs e.g 178 would have 2 bits set in their Synchronization Register 197s (corresponding to themselves), and the other two would have the other 2 bits set in their Synchronization Register 197s (corresponding to themselves). The Synchronization Register 197 is used in two basic ways: Stopping and starting a given process in synchrony Suspending execution within a process Stopping and Starting Processes The CPU is responsible for loading the microcode RAM 196 and loading the execution address for the first instruction (usually 0). When the CPU starts executing microcode, it begins at the specified address. Execution of microcode only occurs when all the bits of the Synchronization Register 197 are also set in the Common Synchronization Register 197. The CPU therefore sets up all the PUs e.g 178 and then starts or stops processes with a single write to the Common Synchronization Register 197. This synchronization scheme allows multiple processes to be running asynchronously on the PUs e.g 178, being stopped and started as processes rather than one PU e.g 178 at a time. Suspending Execution Within a Process In a given cycle, a PU e.g 178 may need to read from or write to a FIFO (based on the opcode of the current microcode instruction). If the FIFO is empty on a read request, or full on a write request, the FIFO request cannot be completed. The PU e.g 178 will therefore assert its SuspendProcess control signal 198. The SuspendProcess signals from all PUs e.g 178 are fed back to all the PUs e.g 178. The Synchronization Register 197 is ANDed with the 4 SuspendProcess bits, and if the result is non-zero, none of the PU e.g 178's register WriteEnables or FIFO strobes will be set. Consequently none of the PUs e.g 178 that form the same process group as the PU e.g 178 that was unable to complete its task will have their registers or FIFOs updated during that cycle. This simple technique keeps a given process group in synchronization. Each subsequent cycle the PU e.g 178's state machine will attempt to re-execute the microcode instruction at the same address, and will continue to do so until successful. Of course the Common Synchronization Register 197 can be written to by the CPU to stop the entire process if necessary. This synchronization scheme allows any combinations of PUs e.g 178 to work together, each group only affecting its co-workers with regards to suspension due to data not being ready for reading or writing. Control and Branching During each cycle, each of the four basic input and calculation units within a PU e.g 178's ALU 188 (Read, Adder/Logic, Multiply/Interpolate, and Barrel Shifter) produces two status bits: a Zero flag and a Negative flag indicating whether the result of the operation during that cycle was 0 or negative. Each cycle one of those 4 status bits is chosen by microcode instructions to be output from the PU e.g 178. The 4 status bits (1 per PU e.g 178's ALU 188) are combined into a 4 bit Common Status Register 200. During the next cycle, each PU e.g 178's microcode program can select one of the bits from the Common Status Register 200, and branch to another microcode address dependant on the value of the status bit. Status Bit Each PU e.g 178's ALU 188 contains a number of input and calculation units. Each unit produces 2 status bits—a negative flag and a zero flag. One of these status bits is output from the PU e.g 178 when a particular unit asserts the value on the 1-bit tri-state status bit bus. The single status bit is output from the PU e.g 178, and then combined with the other PU e.g 178 status bits to update the Common Status Register 200. The microcode for determining the output status bit takes the following form: # Bits Description 2 Select unit whose status bit is to be output 00 = Adder unit 01 = Multiply/Logic unit 10 = Barrel Shift unit 11 = Reader unit 1 0 = Zero flag 1 = Negative flag 3 TOTAL Within the ALU 188, the 2-bit Select Processor Block value is decoded into four 1-bit enable bits, with a different enable bit sent to each processor unit block. The status select bit (choosing Zero or Negative) is passed into all units to determine which bit is to be output onto the status bit bus. Branching Within Microcode Each PU e.g 178 contains a 7 bit Program Counter (PC) that holds the current microcode address being executed. Normal program execution is linear, moving from address N in one cycle to address N+1 in the next cycle. Every cycle however, a microcode program has the ability to branch to a different location, or to test a status bit from the Common Status Register 200 and branch. The microcode for determining the next execution address takes the following form: # Bits Description 2 00 = NOP (PC = PC + 1) 01 = Branch always 10 = Branch if status bit clear 11 = Branch if status bit set 2 Select status bit from status word 7 Address to branch to (absolute address, 00-7F) 11 TOTAL ALU 188 FIG. 5 illustrates the ALU 188 in more detail. Inside the ALU 188 are a number of specialized processing blocks, controlled by a microcode program. The specialized processing blocks include: Read Block 202, for accepting data from the input FIFOs Write Block 203, for sending data out via the output FIFOs Adder/Logical block 204, for addition & subtraction, comparisons and logical operations Multiply/Interpolate block 205, for multiple types of interpolations and multiply/accumulates Barrel Shift block 206, for shifting data as required In block 207, for accepting data from the external crossbar switch 183 Out block 208, for sending data to the external crossbar switch 183 Registers block 215, for holding data in temporary storage Four specialized 32 bit registers hold the results of the 4 main processing blocks: M register 209 holds the result of the Multiply/Interpolate block L register 209 holds the result of the Adder/Logic block S register 209 holds the result of the Barrel Shifter block R register 209 holds the result of the Read Block 202 In addition there are two internal crossbar switches 213m 214 for data transport. The various process blocks are further expanded in the following sections, together with the microcode definitions that pertain to each block. Note that the microcode is decoded within a block to provide the control signals to the various units within. Data Transfers Between PUs e.g 178 Each PU e.g 178 is able to exchange data via the external crossbar. A PU e.g 178 takes two inputs and outputs two values to the external crossbar. In this way two operands for processing can be obtained in a single cycle, but cannot be actually used in an operation until the following cycle. In 207 This block is illustrated in FIG. 6 and contains two registers, In1 and In2 that accept data from the external crossbar. The registers can be loaded each cycle, or can remain unchanged. The selection bits for choosing from among the 8 inputs are output to the external crossbar switch 183. The microcode takes the following form: # Bits Description 1 0 = NOP 1 = Load In1 from crossbar 3 Select Input 1 from external crossbar 1 0 = NOP 1 = Load In2 from crossbar 3 Select Input 2 from external crossbar 8 TOTAL Out 208 Complementing In is Out 208. The Out block is illustrated in more detail in FIG. 7. Out contains two registers, Out1 and Out2, both of which are output to the external crossbar each cycle for use by other PUs e.g 178. The Write unit is also able to write one of Out1 or Out2 to one of the output FIFOs attached to the ALU 188. Finally, both registers are available as inputs to Crossbar1 213, which therefore makes the register values available as inputs to other units within the ALU 188. Each cycle either of the two registers can be updated according to microcode selection. The data loaded into the specified register can be one of D0-D3 (selected from Crossbar1 213) one of M, L, S, and R (selected from Crossbar2 214), one of 2 programmable constants, or the fixed values 0 or 1. The microcode for Out takes the following form: # Bits Description 1 0 = NOP 1 = Load Register 1 Select Register to load [Out1 or Out2] 4 Select input [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, 0, 1] 6 TOTAL Local Registers and Data Transfers Within ALU 188 As noted previously, the ALU 188 contains four specialized 32-bit registers to hold the results of the 4 main processing blocks: M register 209 holds the result of the Multiply/Interpolate block L register 209 holds the result of the Adder/Logic block S register 209 holds the result of the Barrel Shifter block R register 209 holds the result of the Read Block 202 The CPU has direct access to these registers, and other units can select them as inputs via Crossbar2 214. Sometimes it is necessary to delay an operation for one or more cycles. The Registers block contains four 32-bit registers D0-D3 to hold temporary variables during processing. Each cycle one of the registers can be updated, while all the registers are output for other units to use via Crossbar1 213 (which also includes Ins, In2, Out, and Out2). The CPU has direct access to these registers. The data loaded into the specified register can be one of D0-D3 (selected from Crossbar1 213) one of M, L, S, and R (selected from Crossbar2 214), one of 2 programmable constants, or the fixed values 0 or 1. The Registers block 215 is illustrated in more detail in FIG. 8. The microcode for Registers takes the following form: # Bits Description 1 0 = NOP 1 = Load Register 2 Select Register to load [D0-D3] 4 Select input [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, 0, 1] 7 TOTAL Crossbar1 213 Crossbar1 213 is illustrated in more detail in FIG. 9. Crossbar1 213 is used to select from inputs In1, In2, Out1, Out2, D0-D3. 7 outputs are generated from Crossbar1 213: 3 to the Multiply/Interpolate Unit, 2 to the Adder Unit, 1 to the Registers unit and 1 to the Out unit. The control signals for Crossbar1 213 come from the various units that use the Crossbar inputs. There is no specific microcode that is separate for Crossbar1 213. Crossbar2 214 Crossbar2 214 is illustrated in more detail in FIG. 10. Crossbar2 214 is used to select from the general ALU 188 registers M, L, S and R. 6 outputs are generated from Crossbar1 213: 2 to the Multiply/Interpolate Unit, 2 to the Adder Unit, 1 to the Registers unit and 1 to the Out unit. The control signals for Crossbar2 214 come from the various units that use the Crossbar inputs. There is no specific microcode that is separate for Crossbar2 214. Data Transfers Between PUs e.g 178 and DRAM or External Processes Returning to FIG. 4, PUs e.g 178 share data with each other directly via the external crossbar. They also transfer data to and from external processes as well as DRAM. Each PU e.g 178 has 2 I/O Address Generators 189, 190 for transferring data to and from DRAM. A PU e.g 178 can send data to DRAM via an I/O Address Generator's Output FIFO e.g. 186, or accept data from DRAM via an I/O Address Generator's Input FIFO 187. These FIFOs are local to the PU e.g 178. There is also a mechanism for transferring data to and from external processes in the form of a common VLIW Input FIFO 78 and a common VLIW Output FIFO 79, shared between all ALUs. The VLIW Input and Output FIFOs are only 8 bits wide, and are used for printing, Artcard reading, transferring data to the CPU etc. The local Input and Output FIFOs are 16 bits wide. Read The Read process block 202 of FIG. 5 is responsible for updating the ALU 188's R register 209, which represents the external input data to a VLIW microcoded process. Each cycle the Read Unit is able to read from either the common VLIW Input FIFO 78 (8 bits) or one of two local Input FIFOs (16 bits). A 32-bit value is generated, and then all or part of that data is transferred to the R register 209. The process can be seen in FIG. 11. The microcode for Read is described in the following table. Note that the interpretations of some bit patterns are deliberately chosen to aid decoding. # Bits Description 2 00 = NOP 01 = Read from VLIW Input FIFO 78 10 = Read from Local FIFO 1 11 = Read from Local FIFO 2 1 How many significant bits 0 = 8 bits (pad with 0 or sign extend) 1 = 16 bits (only valid for Local FIFO reads) 1 0 = Treat data as unsigned (pad with 0) 1 = Treat data as signed (sign extend when reading from FIFO)r 2 How much to shift data left by: 00 = 0 bits (no change) 01 = 8 bits 10 = 16 bits 11 = 24 bits 4 Which bytes of R to update (hi to lo order byte) Each of the 4 bits represents 1 byte WriteEnable on R 10 TOTAL Write The Write process block is able to write to either the common VLIW Output FIFO 79 or one of the two local Output FIFOs each cycle. Note that since only 1 FIFO is written to in a given cycle, only one 16-bit value is output to all FIFOs, with the low 8 bits going to the VLIW Output FIFO 79. The microcode controls which of the FIFOs gates in the value. The process of data selection can be seen in more detail in FIG. 12. The source values Out1 and Out2 come from the Out block. They are simply two registers. The microcode for Write takes the following form: # Bits Description 2 00 = NOP 01 = Write VLIW Output FIFO 79 10 = Write local Output FIFO 1 11 = Write local Output FIFO 2 1 Select Output Value [Out1 or Out2] 3 Select part of Output Value to write (32 bits = 4 bytes ABCD) 000 = 0D 001 = 0D 010 = 0B 011 = 0A 100 = CD 101 = BC 110 = AB 111 = 0 6 TOTAL Computational Blocks Each ALU 188 has two computational process blocks, namely an Adder/Logic process block 204, and a Multiply/Interpolate process block 205. In addition there is a Barrel Shifter block to provide help to these computational blocks. Registers from the Registers block 215 can be used for temporary storage during pipelined operations. Barrel Shifter The Barrel Shifter process block 206 is shown in more detail in FIG. 13 and takes its input from the output of Adder/Logic or Multiply/Interpolate process blocks or the previous cycle's results from those blocks (ALU registers L and M). The 32 bits selected are barrel shifted an arbitrary number of bits in either direction (with sign extension as necessary), and output to the ALU 188's S register 209. The microcode for the Barrel Shift process block is described in the following table. Note that the interpretations of some bit patterns are deliberately chosen to aid decoding. # Bits Description 3 000 = NOP 001 = Shift Left (unsigned) 010 = Reserved 011 = Shift Left (signed) 100 = Shift right (unsigned, no rounding) 101 = Shift right (unsigned, with rounding) 110 = Shift right (signed, no rounding) 111 = Shift right (signed, with rounding) 2 Select Input to barrel shift: 00 = Multiply/Interpolate result 01 = M 10 = Adder/Logic result 11 = L 5 # bits to shift 1 Ceiling of 255 1 Floor of 0 (signed data) 12 TOTAL Adder/Logic 204 The Adder/Logic process block is shown in more detail in FIG. 14 and is designed for simple 32-bit addition/subtraction, comparisons, and logical operations. In a single cycle a single addition, comparison, or logical operation can be performed, with the result stored in the ALU 188's L register 209. There are two primary operands, A and B, which are selected from either of the two crossbars or from the 4 constant registers. One crossbar selection allows the results of the previous cycle's arithmetic operation to be used while the second provides access to operands previously calculated by this or another ALU 188. The CPU is the only unit that has write access to the four constants (K1-K4). In cases where an operation such as (A+B)×4 is desired, the direct output from the adder can be used as input to the Barrel Shifter, and can thus be shifted left 2 places without needing to be latched into the L register 209 first. The output from the adder can also be made available to the multiply unit for a multiply-accumulate operation. The microcode for the Adder/Logic process block is described in the following table. The interpretations of some bit patterns are deliberately chosen to aid decoding. Microcode bit interpretation for Adder/Logic unit # Bits Description 4 0000 = A + B (carry in = 0) 0001 = A + B (carry in = carry out of previous operation) 0010 = A + B + 1 (carry in = 1) 0011 = A + 1 (increments A) 0100 = A − B − 1 (carry in = 0) 0101 = A − B (carry in = carry out of previous operation) 0110 = A − B (carry in = 1) 0111 = A − 1 (decrements A) 1000 = NOP 1001 = ABS(A − B) 1010 = MIN(A, B) 1011 = MAX(A, B) 1100 = A AND B (both A & B can be inverted, see below) 1101 = A OR B (both A & B can be inverted, see below) 1110 = A XOR B (both A & B can be inverted, see below) 1111 = A (A can be inverted, see below) 1 If logical operation: 0 = A = A 1 = A = NOT(A) If Adder operation: 0 = A is unsigned 1 = A is signed 1 If logical operation: 0 = B = B 1 = B = NOT(B) If Adder operation 0 = B is unsigned 1 = B is signed 4 Select A [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, K3, K4] 4 Select B [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, K3, K4] 14 TOTAL Multiply/Interpolate 205 The Multiply/Interpolate process block is shown in more detail in FIG. 15 and is a set of four 8×8 interpolator units that are capable of performing four individual 8×8 interpolates per cycle, or can be combined to perform a single 16×16 multiply. This gives the possibility to perform up to 4 linear interpolations, a single bi-linear interpolation, or half of a tri-linear interpolation in a single cycle. The result of the interpolations or multiplication is stored in the ALU 188's M register 209. There are two primary operands, A and B, which are selected from any of the general registers in the ALU 188 or from four programmable constants internal to the Multiply/Interpolate process block. Each interpolator block functions as a simple 8 bit interpolator [result=A+(B−A)f] or as a simple 8×8 multiply [result=A*B]. When the operation is interpolation, A and B are treated as four 8 bit numbers A0 thru A3 (A0 is the low order byte), and B0 thru B3. Agen, Bgen, and Fgen are responsible for ordering the inputs to the Interpolate units so that they match the operation being performed. For example, to perform bilinear interpolation, each of the 4 values must be multiplied by a different factor & the result summed, while a 16×16 bit multiplication requires the factors to be 0. The microcode for the Adder/Logic process block is described in the following table. Note that the interpretations of some bit patterns are deliberately chosen to aid decoding. # Bits Description 4 0000 = (A10 * B10) + V 0001 = (A0 * B0) + (A1 * B1) + V 0010 = (A10 * B10) − V 0011 = V − (A10 * B10) 0100 = Interpolate A0, B0 by f0 0101 = Interpolate A0, B0 by f0, A1, B1 by f1 0110 = Interpolate A0, B0 by f0, A1, B1 by f1, A2, B2 by f2 0111 = Interpolate A0, B0 by f0, A1, B1 by f1, A2, B2 by f2, A3, B3 by f3 1000 = Interpolate 16 bits stage 1 [M = A10 * f10] 1001 = Interpolate 16 bits stage 2 [M = M + (A10 * f10)] 1010 = Tri-linear interpolate A by f stage 1 [M = A0f0 + A1f1 + A2f2 + A3f3] 1011 = Tri-linear interpolate A by f stage 2 [M = M + A0f0 + A1f1 + A2f2 + A3f3] 1100 = Bi-linear interpolate A by f stage 1 [M = A0f0 + A1f1] 1101 = Bi-linear interpolate A by f stage 2 [M = M + A0f0 + A1f1] 1110 = Bi-linear interpolate A by f complete [M = A0f0 + A1f1 + A2f2 + A3f3] 1111 = NOP 4 Select A [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, K3, K4] 4 Select B [In1, In2, Out1, Out2, D0, D1, D2, D3, M, L, S, R, K1, K2, K3, K4] If Mult: 4 Select V [In1, In2, Out1, Out2, D0, D1, D2, D3, K1, K2, K3, K4, Adder result, M, 0, 1] 1 Treat A as signed 1 Treat B as signed 1 Treat V as signed If Interp: 4 Select basis for f [In1, In2, Out1, Out2, D0, D1, D2, D3, K1, K2, K3, K4, X, X, X, X] 1 Select interpolation f generation from P1 or P2 Pn is interpreted as # fractional bits in f If Pn = 0, f is range 0..255 representing 0..1 2 Reserved 19 TOTAL The same 4 bits are used for the selection of V and f, although the last 4 options for V don't generally make sense as f values. Interpolating with a factor of 1 or 0 is pointless, and the previous multiplication or current result is unlikely to be a meaningful value for f. I/O Address Generators 189, 190 The I/O Address Generators are shown in more detail in FIG. 16. A VLIW process does not access DRAM directly. Access is via 2 I/O Address Generators 189, 190, each with its own Input and Output FIFO. A PU e.g 178 reads data from one of two local Input FIFOs, and writes data to one of two local Output FIFOs. Each I/O Address Generator is responsible for reading data from DRAM and placing it into its Input FIFO, where it can be read by the PU e.g 178, and is responsible for taking the data from its Output FIFO (placed there by the PU e.g 178) and writing it to DRAM. The I/O Address Generator is a state machine responsible for generating addresses and control for data retrieval and storage in DRAM via the Data cache 76. It is customizable under CPU software control, but cannot be microcoded. The address generator produces addresses in two broad categories: Image Iterators, used to iterate (reading, writing or both) through pixels of an image in a variety of ways Table I/O, used to randomly access pixels in images, data in tables, and to simulate FIFOs in DRAM Each of the I/O Address Generators 189, 190 has its own bus connection to the Data cache 76, making 2 bus connections per PU e.g 178, and a total of 8 buses over the entire VLIW Vector Processor 74. The Data cache 76 is able to service 4 of the maximum 8 requests from the 4 PUs e.g 178 each cycle. The Input and Output FIFOs are 8 entry deep 16-bit wide FIFOs. The various types of address generation (Image Iterators and Table I/O) are described in the subsequent sections. Registers The I/O Address Generator has a set of registers for that are used to control address generation. The addressing mode also determines how the data is formatted and sent into the local Input FIFO, and how data is interpreted from the local Output FIFO. The CPU is able to access the registers of the I/O Address Generator via the low speed bus. The first set of registers define the housekeeping parameters for the I/O Generator: Register Name # bits Description Reset 0 A write to this register halts any operations, and writes 0s to all the data registers of the I/O Generator. The input and output FIFOs are not cleared. Go 0 A write to this register restarts the counters according to the current setup. For example, if the I/O Generator is a Read Iterator, and the Iterator is currently halfway through the image, a write to Go will cause the reading to begin at the start of the image again. While the I/O Generator is performing, the Active bit of the Status register will be set. Halt 0 A write to this register stops any current activity and clears the Active bit of the Status register. If the Active bit is already cleared, writing to this register has no effect. Continue 0 A write to this register continues the I/O Generator from the current setup. Counters are not reset, and FIFOs are not cleared. A write to this register while the I/O Generator is active has no effect. ClearFIFOsOnGo 1 0 = Don't clear FIFOs on a write to the Go bit. 1 = Do clear FIFOs on a write to the Go bit. Status 8 Status flags The Status register has the following values Register Name # bits Description Active 1 0 = Currently inactive 1 = Currently active Reserved 7 — Caching Several registers are used to control the caching mechanism, specifying which cache group to use for inputs, outputs etc. See the section on the Data cache 76 for more information about cache groups. Register Name # bits Description CacheGroup1 4 Defines cache group to read data from CacheGroup2 4 Defines which cache group to write data to, and in the case of the ImagePyramidLookup I/O mode, defines the cache to use for reading the Level Information Table. Image Iterators=Sequential Automatic Access to Pixels The primary image pixel access method for software and hardware algorithms is via Image Iterators. Image iterators perform all of the addressing and access to the caches of the pixels within an image channel and read, write or read & write pixels for their client. Read Iterators read pixels in a specific order for their clients, and Write Iterators write pixels in a specific order for their clients. Clients of Iterators read pixels from the local Input FIFO or write pixels via the local Output FIFO. Read Image Iterators read through an image in a specific order, placing the pixel data into the local Input FIFO. Every time a client reads a pixel from the Input FIFO, the Read Iterator places the next pixel from the image (via the Data cache 76) into the FIFO. Write Image Iterators write pixels in a specific order to write out the entire image. Clients write pixels to the Output FIFO that is in turn read by the Write Image Iterator and written to DRAM via the Data cache 76. Typically a VLIW process will have its input tied to a Read Iterator, and output tied to a corresponding Write Iterator. From the PU e.g 178 microcode program's perspective, the FIFO is the effective interface to DRAM. The actual method of carrying out the storage (apart from the logical ordering of the data) is not of concern. Although the FIFO is perceived to be effectively unlimited in length, in practice the FIFO is of limited length, and there can be delays storing and retrieving data, especially if several memory accesses are competing. A variety of Image Iterators exist to cope with the most common addressing requirements of image processing algorithms. In most cases there is a corresponding Write Iterator for each Read Iterator. The different Iterators are listed in the following table: Read Iterators Write Iterators Sequential Read Sequential Write Box Read — Vertical Strip Read Vertical Strip Write The 4 bit Address Mode Register is used to determine the Iterator type: Bit # Address Mode 3 0 = This addressing mode is an Iterator 2 to 0 Iterator Mode 001 = Sequential Iterator 010 = Box [read only] 100 = Vertical Strip remaining bit patterns are reserved The Access Specific registers are used as follows: Register Name LocalName Description AccessSpecific1 Flags Flags used for reading and writing AccessSpecific2 XBoxSize Determines the size in X of Box Read. Valid values are 3, 5, and 7. AccessSpecific3 YBoxSize Determines the size in Y of Box Read. Valid values are 3, 5, and 7. AccessSpecific4 BoxOffset Offset between one pixel center and the next during a Box Read only. Usual value is 1, but other useful values include 2, 4, 8 . . . See Box Read for more details. The Flags register (AccessSpecific1) contains a number of flags used to determine factors affecting the reading and writing of data. The Flags register has the following composition: Label #bits Description ReadEnable 1 Read data from DRAM WriteEnable 1 Write data to DRAM [not valid for Box mode] PassX 1 Pass X (pixel) ordinate back to Input FIFO PassY 1 Pass Y (row) ordinate back to Input FIFO Loop 1 0 = Do not loop through data 1 = Loop through data Reserved 11 Must be 0 Notes on ReadEnable and WriteEnable: When ReadEnable is set, the I/O Address Generator acts as a Read Iterator, and therefore reads the image in a particular order, placing the pixels into the Input FIFO. When WriteEnable is set, the I/O Address Generator acts as a Write Iterator, and therefore writes the image in a particular order, taking the pixels from the Output FIFO. When both ReadEnable and WriteEnable are set, the I/O Address Generator acts as a Read Iterator and as a Write Iterator, reading pixels into the Input FIFO, and writing pixels from the Output FIFO. Pixels are only written after they have been read—i.e. the Write Iterator will never go faster than the Read Iterator. Whenever this mode is used, care should be taken to ensure balance between in and out processing by the VLIW microcode. Note that separate cache groups can be specified on reads and writes by loading different values in CacheGroup1 and CacheGroup2. Notes on PassX and PassY: If PassX and PassY are both set, the Y ordinate is placed into the Input FIFO before the X ordinate. PassX and PassY are only intended to be set when the ReadEnable bit is clear. Instead of passing the ordinates to the address generator, the ordinates are placed directly into the Input FIFO. The ordinates advance as they are removed from the FIFO. If WriteEnable bit is set, the VLIW program must ensure that it balances reads of ordinates from the Input FIFO with writes to the Output FIFO, as writes will only occur up to the ordinates (see note on ReadEnable and WriteEnable above). Notes on Loop: If the Loop bit is set, reads will recommence at [StartPixel, StartRow] once it has reached [EndPixel, EndRow]. This is ideal for processing a structure such a convolution kernel or a dither cell matrix, where the data must be read repeatedly. Looping with ReadEnable and WriteEnable set can be useful in an environment keeping a single line history, but only where it is useful to have reading occur before writing. For a FIFO effect (where writing occurs before reading in a length constrained fashion), use an appropriate Table I/O addressing mode instead of an Image Iterator. Looping with only WriteEnable set creates a written window of the last N pixels. This can be used with an asynchronous process that reads the data from the window. The Artcard Reading algorithm makes use of this mode. Sequential Read and Write Iterators FIG. 17 illustrates the pixel data format. The simplest Image Iterators are the Sequential Read Iterator and corresponding Sequential Write Iterator. The Sequential Read Iterator presents the pixels from a channel one line at a time from top to bottom, and within a line, pixels are presented left to right. The padding bytes are not presented to the client. It is most useful for algorithms that must perform some process on each pixel from an image but don't care about the order of the pixels being processed, or want the data specifically in this order. Complementing the Sequential Read Iterator is the Sequential Write Iterator. Clients write pixels to the Output FIFO. A Sequential Write Iterator subsequently writes out a valid image using appropriate caching and appropriate padding bytes. Each Sequential Iterator requires access to 2 cache lines. When reading, while 32 pixels are presented from one cache line, the other cache line can be loaded from memory. When writing, while 32 pixels are being filled up in one cache line, the other can be being written to memory. A process that performs an operation on each pixel of an image independently would typically use a Sequential Read Iterator to obtain pixels, and a Sequential Write Iterator to write the new pixel values to their corresponding locations within the destination image. Such a process is shown in FIG. 18. In most cases, the source and destination images are different, and are represented by 2 I/O Address Generators 189, 190. However it can be valid to have the source image and destination image to be the same, since a given input pixel is not read more than once. In that case, then the same Iterator can be used for both input and output, with both the ReadEnable and WriteEnable registers set appropriately. For maximum efficiency, 2 different cache groups should be used—one for reading and the other for writing. If data is being created by a VLIW process to be written via a Sequential Write Iterator, the PassX and PassY flags can be used to generate coordinates that are then passed down the Input FIFO. The VLIW process can use these coordinates and create the output data appropriately. Box Read Iterator The Box Read Iterator is used to present pixels in an order most useful for performing operations such as general-purpose filters and convolve. The Iterator presents pixel values in a square box around the sequentially read pixels. The box is limited to being 1, 3, 5, or 7 pixels wide in X and Y (set XBoxSize and YBoxSize—they must be the same value or 1 in one dimension and 3, 5, or 7 in the other). The process is shown in FIG. 19: BoxOffset: This special purpose register is used to determine a sub-sampling in terms of which input pixels will be used as the center of the box. The usual value is 1, which means that each pixel is used as the center of the box. The value “2” would be useful in scaling an image down by 4:1 as in the case of building an image pyramid. Using pixel addresses from the previous diagram, the box would be centered on pixel 0, then 2, 8, and 10. The Box Read Iterator requires access to a maximum of 14 (2×7) cache lines. While pixels are presented from one set of 7 lines, the other cache lines can be loaded from memory. Box Write Iterator There is no corresponding Box Write Iterator, since the duplication of pixels is only required on input. A process that uses the Box Read Iterator for input would most likely use the Sequential Write Iterator for output since they are in sync. A good example is the convolver, where N input pixels are read to calculate 1 output pixel. The process flow is as illustrated in FIG. 20. The source and destination images should not occupy the same memory when using a Box Read Iterator, as subsequent lines of an image require the original (not newly calculated) values. Vertical-Strip Read and Write Iterators In some instances it is necessary to write an image in output pixel order, but there is no knowledge about the direction of coherence in input pixels in relation to output pixels. An example of this is rotation. If an image is rotated 90 degrees, and we process the output pixels horizontally, there is a complete loss of cache coherence. On the other hand, if we process the output image one cache line's width of pixels at a time and then advance to the next line (rather than advance to the next cache-line's worth of pixels on the same line), we will gain cache coherence for our input image pixels. It can also be the case that there is known ‘block’ coherence in the input pixels (such as color coherence), in which case the read governs the processing order, and the write, to be synchronized, must follow the same pixel order. The order of pixels presented as input (Vertical-Strip Read), or expected for output (Vertical-Strip Write) is the same. The order is pixels 0 to 31 from line 0, then pixels 0 to 31 of line 1 etc for all lines of the image, then pixels 32 to 63 of line 0, pixels 32 to 63 of line 1 etc. In the final vertical strip there may not be exactly 32 pixels wide. In this case only the actual pixels in the image are presented or expected as input. This process is illustrated in FIG. 21. process that requires only a Vertical-Strip Write Iterator will typically have a way of mapping input pixel coordinates given an output pixel coordinate. It would access the input image pixels according to this mapping, and coherence is determined by having sufficient cache lines on the ‘random-access’ reader for the input image. The coordinates will typically be generated by setting the PassX and PassY flags on the VerticalStripWrite Iterator, as shown in the process overview illustrated in FIG. 22. It is not meaningful to pair a Write Iterator with a Sequential Read Iterator or a Box read Iterator, but a Vertical-Strip Write Iterator does give significant improvements in performance when there is a non trivial mapping between input and output coordinates. It can be meaningful to pair a Vertical Strip Read Iterator and Vertical Strip Write Iterator. In this case it is possible to assign both to a single ALU 188 if input and output images are the same. If coordinates are required, a further Iterator must be used with PassX and PassY flags set. The Vertical Strip Read/Write Iterator presents pixels to the Input FIFO, and accepts output pixels from the Output FIFO. Appropriate padding bytes will be inserted on the write. Input and output require a minimum of 2 cache lines each for good performance. Table I/O Addressing Modes It is often necessary to lookup values in a table (such as an image). Table I/O addressing modes provide this functionality, requiring the client to place the index/es into the Output FIFO. The I/O Address Generator then processes the index/es, looks up the data appropriately, and returns the looked-up values in the Input FIFO for subsequent processing by the VLIW client. 1D, 2D and 3D tables are supported, with particular modes targeted at interpolation. To reduce complexity on the VLIW client side, the index values are treated as fixed-point numbers, with AccessSpecific registers defining the fixed point and therefore which bits should be treated as the integer portion of the index. Data formats are restricted forms of the general Image Characteristics in that the PixelOffset register is ignored, the data is assumed to be contiguous within a row, and can only be 8 or 16 bits (1 or 2 bytes) per data element. The 4 bit Address Mode Register is used to determine the I/O type: Bit # Address Mode 3 1 = This addressing mode is Table I/O 2 to 0 000 = 1D Direct Lookup 001 = 1D Interpolate (linear) 010 = DRAM FIFO 011 = Reserved 100 = 2D Interpolate (bi-linear) 101 = Reserved 110 = 3D Interpolate (tri-linear) 111 = Image Pyramid Lookup The access specific registers are: Register Name LocalName #bits Description AccessSpecific1 Flags 8 General flags for reading and writing. See below for more information. AccessSpecific2 FractX 8 Number of fractional bits in X index AccessSpecific3 FractY 8 Number of fractional bits in Y index AccessSpecific4 FractZ 8 Number of fractional bits in Z index (low 8 bits/next 12 or 24 ZOffset 12 or 24 See below bits)) FractX, FractY, and FractZ are used to generate addresses based on indexes, and interpret the format of the index in terms of significant bits and integer/fractional components. The various parameters are only defined as required by the number of dimensions in the table being indexed. A 1D table only needs FractX, a 2D table requires FractX and FractY. Each Fract_ value consists of the number of fractional bits in the corresponding index. For example, an X index may be in the format 5:3. This would indicate 5 bits of integer, and 3 bits of fraction. FractX would therefore be set to 3. A simple 1D lookup could have the format 8:0, i.e. no fractional component at all. FractX would therefore be 0. ZOffset is only required for 3D lookup and takes on two different interpretations. It is described more fully in the 3D-table lookup section. The Flags register (AccessSpecific1) contains a number of flags used to determine factors affecting the reading (and in one case, writing) of data. The Flags register has the following composition: Label #bits Description ReadEnable 1 Read data from DRAM WriteEnable 1 Write data to DRAM [only valid for 1D direct lookup] DataSize 1 0 = 8 bit data 1 = 16 bit data Reserved 5 Must be 0 With the exception of the 1D Direct Lookup and DRAM FIFO, all Table I/O modes only support reading, and not writing. Therefore the ReadEnable bit will be set and the WriteEnable bit will be clear for all I/O modes other than these two modes. The 1D Direct Lookup supports 3 modes: Read only, where the ReadEnable bit is set and the WriteEnable bit is clear Write only, where the ReadEnable bit is clear and the WriteEnable bit is clear Read-Modify-Write, where both ReadEnable and the WriteEnable bits are set The different modes are described in the 1D Direct Lookup section below. The DRAM FIFO mode supports only 1 mode: Write-Read mode, where both ReadEnable and the WriteEnable bits are set This mode is described in the DRAM FIFO section below. The DataSize flag determines whether the size of each data elements of the table is 8 or 16 bits. Only the two data sizes are supported. 32 bit elements can be created in either of 2 ways depending on the requirements of the process: Reading from 2 16-bit tables simultaneously and combining the result. This is convenient if timing is an issue, but has the disadvantage of consuming 2 I/O Address Generators 189, 190, and each 32-bit element is not readable by the CPU as a 32-bit entity. Reading from a 16-bit table twice and combining the result. This is convenient since only 1 lookup is used, although different indexes must be generated and passed into the lookup. 1 Dimensional Structures Direct Lookup A direct lookup is a simple indexing into a 1 dimensional lookup table. Clients can choose between 3 access modes by setting appropriate bits in the Flags register: Read only Write only Read-Modify-Write Read Only A client passes the fixed-point index X into the Output FIFO, and the 8 or 16-bit value at Table[Int(X)] is returned in the Input FIFO. The fractional component of the index is completely ignored. If the index is out of bounds, the DuplicateEdge flag determines whether the edge pixel or ConstantPixel is returned. The address generation is straightforward: If DataSize indicates 8 bits, X is barrel-shifted right FractX bits, and the result is added to the table's base address ImageStart. If DataSize indicates 16 bits, X is barrel-shifted right FractX bits, and the result shifted left 1 bit (bit 0 becomes 0) is added to the table's base address ImageStart. The 8 or 16-bit data value at the resultant address is placed into the Input FIFO. Address generation takes 1 cycle, and transferring the requested data from the cache to the Output FIFO also takes 1 cycle (assuming a cache hit). For example, assume we are looking up values in a 256-entry table, where each entry is 16 bits, and the index is a 12 bit fixed-point format of 8:4. FractX should be 4, and DataSize 1. When an index is passed to the lookup, we shift right 4 bits, then add the result shifted left 1 bit to ImageStart. Write Only A client passes the fixed-point index X into the Output FIFO followed by the 8 or 16-bit value that is to be written to the specified location in the table. A complete transfer takes a minimum of 2 cycles. 1 cycle for address generation, and 1 cycle to transfer the data from the FIFO to DRAM. There can be an arbitrary number of cycles between a VLIW process placing the index into the FIFO and placing the value to be written into the FIFO. Address generation occurs in the same way as Read Only mode, but instead of the data being read from the address, the data from the Output FIFO is written to the address. If the address is outside the table range, the data is removed from the FIFO but not written to DRAM. Read-Modify-Write A client passes the fixed-point index X into the Output FIFO, and the 8 or 16-bit value at Table[Int(X)] is returned in the Input FIFO. The next value placed into the Output FIFO is then written to Table[Int(X)], replacing the value that had been returned earlier. The general processing loop then, is that a process reads from a location, modifies the value, and writes it back. The overall time is 4 cycles: Generate address from index Return value from table Modify value in some way Write it back to the table There is no specific read/write mode where a client passes in a flag saying “read from X” or “write to X”. Clients can simulate a “read from X” by writing the original value, and a “write to X” by simply ignoring the returned value. However such use of the mode is not encouraged since each action consumes a minimum of 3 cycles (the modify is not required) and 2 data accesses instead of 1 access as provided by the specific Read and Write modes. Interpolate Table This is the same as a Direct Lookup in Read mode except that two values are returned for a given fixed-point index X instead of one. The values returned are Table[Int(X)], and Table[Int(X)+1]. If either index is out of bounds the DuplicateEdge flag determines whether the edge pixel or ConstantPixel is returned. Address generation is the same as Direct Lookup, with the exception that the second address is simply Address1+1 or 2 depending on 8 or 16 bit data. Transferring the requested data to the Output FIFO takes 2 cycles (assuming a cache hit), although two 8-bit values may actually be returned from the cache to the Address Generator in a single 16-bit fetch. DRAM FIFO A special case of a read/write 1D table is a DRAM FIFO. It is often necessary to have a simulated FIFO of a given length using DRAM and associated caches. With a DRAM FIFO, clients do not index explicitly into the table, but write to the Output FIFO as if it was one end of a FIFO and read from the Input FIFO as if it was the other end of the same logical FIFO. 2 counters keep track of input and output positions in the simulated FIFO, and cache to DRAM as needed. Clients need to set both ReadEnable and WriteEnable bits in the Flags register. An example use of a DRAM FIFO is keeping a single line history of some value. The initial history is written before processing begins. As the general process goes through a line, the previous line's value is retrieved from the FIFO, and this line's value is placed into the FIFO (this line will be the previous line when we process the next line). So long as input and outputs match each other on average, the Output FIFO should always be full. Consequently there is effectively no access delay for this kind of FIFO (unless the total FIFO length is very small—say 3 or 4 bytes, but that would defeat the purpose of the FIFO). 2 Dimensional Tables Direct Lookup A 2 dimensional direct lookup is not supported. Since all cases of 2D lookups are expected to be accessed for bi-linear interpolation, a special bi-linear lookup has been implemented. Bi-Linear Lookup This kind of lookup is necessary for bi-linear interpolation of data from a 2D table. Given fixed-point X and Y coordinates (placed into the Output FIFO in the order Y, X), 4 values are returned after lookup. The values (in order) are: Table[Int(X), Int(Y)] Table[Int(X)+1, Int(Y)] Table[Int(X), Int(Y)+1] Table[Int(X)+1, Int(Y)+1] The order of values returned gives the best cache coherence. If the data is 8-bit, 2 values are returned each cycle over 2 cycles with the low order byte being the first data element. If the data is 16-bit, the 4 values are returned in 4 cycles, 1 entry per cycle. Address generation takes 2 cycles. The first cycle has the index (Y) barrel-shifted right FractY bits being multiplied by RowOffset, with the result added to ImageStart. The second cycle shifts the X index right by FractX bits, and then either the result (in the case of 8 bit data) or the result shifted left 1 bit (in the case of 16 bit data) is added to the result from the first cycle. This gives us address Adr=address of Table[Int(X), Int(Y)]: Adr = ⁢ Image ⁢ Start + ⁢ ShiftRight ( Y , FractY ) * Row ⁢ Offset ) + ⁢ ShiftRight ( X , FractX ) We keep a copy of Adr in AdrOld for use fetching subsequent entries. If the data is 8 bits, the timing is 2 cycles of address generation, followed by 2 cycles of data being returned (2 table entries per cycle). If the data is 16 bits, the timing is 2 cycles of address generation, followed by 4 cycles of data being returned (1 entry per cycle) The following 2 tables show the method of address calculation for 8 and 16 bit data sizes: Calculation while fetching Cycle 2 × 8-bit data entries from Adr 1 Adr = Adr + RowOffset 2 <preparing next lookup> Calculation while fetching Cycle 1 × 16-bit data entry from Adr 1 Adr = Adr + 2 2 Adr = AdrOld + RowOffset 3 Adr = Adr + 2 4 <preparing next lookup> In both cases, the first cycle of address generation can overlap the insertion of the X index into the FIFO, so the effective timing can be as low as 1 cycle for address generation, and 4 cycles of return data. If the generation of indexes is 2 steps ahead of the results, then there is no effective address generation time, and the data is simply produced at the appropriate rate (2 or 4 cycles per set). 3 Dimensional Lookup Direct Lookup Since all cases of 2D lookups are expected to be accessed for tri-linear interpolation, two special tri-linear lookups have been implemented. The first is a straightforward lookup table, while the second is for tri-linear interpolation from an Image Pyramid. Tri-Linear Lookup This type of lookup is useful for 3D tables of data, such as color conversion tables. The standard image parameters define a single XY plane of the data—i.e. each plane consists of ImageHeight rows, each row containing RowOffset bytes. In most circumstances, assuming contiguous planes, one XY plane will be ImageHeight×RowOffset bytes after another. Rather than assume or calculate this offset, the software via the CPU must provide it in the form of a 12-bit ZOffset register. In this form of lookup, given 3 fixed-point indexes in the order Z, Y, X, 8 values are returned in order from the lookup table: Table[Int(X), Int(Y), Int(Z)] Table[Int(X)+1, Int(Y), Int(Z)] Table[Int(X), Int(Y)+1, Int(Z)] Table[Int(X)+1, Int(Y)+1, Int(Z)] Table[Int(X), Int(Y), Int(Z)+1] Table[Int(X)+1, Int(Y), Int(Z)+1] Table[Int(X), Int(Y)+1, Int(Z)+1] Table[Int(X)+1, Int(Y)+1, Int(Z)+1] The order of values returned gives the best cache coherence. If the data is 8-bit, 2 values are returned each cycle over 4 cycles with the low order byte being the first data element. If the data is 1 6-bit, the 4 values are returned in 8 cycles, 1 entry per cycle. Address generation takes 3 cycles. The first cycle has the index (Z) barrel-shifted right FractZ bits being multiplied by the 12-bit ZOffset and added to ImageStart. The second cycle has the index (Y) barrel-shifted right FractY bits being multiplied by RowOffset, with the result added to the result of the previous cycle. The second cycle shifts the X index right by FractX bits, and then either the result (in the case of 8 bit data) or the result shifted left 1 bit (in the case of 16 bit data) is added to the result from the second cycle. This gives us address Adr=address of Table[Int(X), Int(Y), Int(Z)]: Adr = ⁢ ImageStart + ⁢ ( ShiftRight ( Z , FractZ ) * ZOffset ) + ⁢ ( ShiftRight ( Y , FractY ) * RowOffset ) + ⁢ ShiftRight ⁡ ( X , FractX ) We keep a copy of Adr in AdrOld for use fetching subsequent entries. If the data is 8 bits, the timing is 2 cycles of address generation, followed by 2 cycles of data being returned (2 table entries per cycle). If the data is 16 bits, the timing is 2 cycles of address generation, followed by 4 cycles of data being returned (1 entry per cycle) The following 2 tables show the method of address calculation for 8 and 16 bit data sizes: Calculation while fetching Cycle 2 × 8-bit data entries from Adr 1 Adr = Adr + RowOffset 2 Adr = AdrOld + ZOffset 3 Adr = Adr + RowOffset 4 <preparing next lookup> Calculation while fetching Cycle 1 × 16-bit data entries from Adr 1 Adr = Adr + 2 2 Adr = AdrOld + RowOffset 3 Adr =Adr + 2 4 Adr, AdrOld = AdrOld + Zoffset 5 Adr = Adr + 2 6 Adr = AdrOld + RowOffset 7 Adr = Adr + 2 8 <preparing next lookup> In both cases, the cycles of address generation can overlap the insertion of the indexes into the FIFO, so the effective timing for a single one-off lookup can be as low as 1 cycle for address generation, and 4 cycles of return data. If the generation of indexes is 2 steps ahead of the results, then there is no effective address generation time, and the data is simply produced at the appropriate rate (4 or 8 cycles per set). Image Pyramid Lookup During brushing, tiling, and warping it is necessary to compute the average color of a particular area in an image. Rather than calculate the value for each area given, these functions make use of an image pyramid. The description and construction of an image pyramid is detailed in the section on Internal Image Formats in the DRAM interface 81 chapter of this document. This section is concerned with a method of addressing given pixels in the pyramid in terms of 3 fixed-point indexes ordered: level (Z), Y, and X. Note that Image Pyramid lookup assumes 8 bit data entries, so the DataSize flag is completely ignored. After specification of Z, Y, and X, the following 8 pixels are returned via the Input FIFO: The pixel at [Int(X), Int(Y)], level Int(Z) The pixel at [Int(X)+1, Int(Y)], level Int(Z) The pixel at [Int(X), Int(Y)+1], level Int(Z) The pixel at [Int(X)+1, Int(Y)+1], level Int(Z) The pixel at [Int(X), Int(Y)], level Int(Z)+1 The pixel at [Int(X)+1, Int(Y)], level Int(Z)+1 The pixel at [Int(X), Int(Y)+1], level Int(Z)+1 The pixel at [Int(X)+1, Int(Y)+1], level Int(Z)+1 The 8 pixels are returned as 4×16 bit entries, with X and X+1 entries combined hi/lo. For example, if the scaled (X, Y) coordinate was (10.4, 12.7) the first 4 pixels returned would be: (10, 12), (11, 12), (10, 13) and (11, 13). When a coordinate is outside the valid range, clients have the choice of edge pixel duplication or returning of a constant color value via the DuplicateEdgePixels and ConstantPixel registers (only the low 8 bits are used). When the Image Pyramid has been constructed, there is a simple mapping from level 0 coordinates to level Z coordinates. The method is simply to shift the X or Y coordinate right by Z bits. This must be done in addition to the number of bits already shifted to retrieve the integer portion of the coordinate (i.e. shifting right FractX and FractY bits for X and Y ordinates respectively). To find the ImageStart and RowOffset value for a given level of the image pyramid, the −24-bit ZOffset register is used as a pointer to a Level Information Table. The table is an array of records, each representing a given level of the pyramid, ordered by level number. Each record consists of a 16-bit offset ZOffset from ImageStart to that level of the pyramid (64-byte aligned address as lower 6 bits of the offset are not present), and a 12 bit ZRowOffset for that level. Element 0 of the table would contain a ZOffset of 0, and a ZRowOffset equal to the general register RowOffset, as it simply points to the full sized image. The ZOffset value at element N of the table should be added to ImageStart to yield the effective ImageStart of level N of the image pyramid. The RowOffset value in element N of the table contains the RowOffset value for level N. The software running on the CPU must set up the table appropriately before using this addressing mode. The actual address generation is outlined here in a cycle by cycle description: Load From Cycle Register Address Other Operations 0 — — ZAdr = ShiftRight(Z, FractZ) + ZOffset ZInt = ShiftRight(Z, FractZ) 1 ZOffset Zadr ZAdr += 2 YInt = ShiftRight(Y, FractY) 2 ZRowOffset ZAdr ZAdr += 2 YInt = ShiftRight(YInt, ZInt) Adr = ZOffset + ImageStart 3 ZOffset ZAdr ZAdr += 2 Adr += ZrowOffset * YInt XInt = ShiftRight(X, FractX) 4 ZAdr ZAdr Adr += ShiftRight(XInt, ZInt) ZOffset += ShiftRight(XInt, 1) 5 FIFO Adr Adr += ZrowOffset ZOffset += ImageStart 6 FIFO Adr Adr = (ZAdr * ShiftRight(Yint, 1)) + ZOffset 7 FIFO Adr Adr += Zadr 8 FIFO Adr <Cycle 0 for next retrieval> The address generation as described can be achieved using a single Barrel Shifter, 2 adders, and a single 16×16 multiply/add unit yielding 24 bits. Although some cycles have 2 shifts, they are either the same shift value (i.e. the output of the Barrel Shifter is used two times) or the shift is 1 bit, and can be hard wired. The following internal registers are required: ZAdr, Adr, ZInt, YInt, XInt, ZRowOffset, and ZImageStart. The _Int registers only need to be 8 bits maximum, while the others can be up to 24 bits. Since this access method only reads from, and does not write to image pyramids, the CacheGroup2 is used to lookup the Image Pyramid Address Table (via ZAdr). CacheGroup1 is used for lookups to the image pyramid itself (via Adr). The address table is around 22 entries (depending on original image size), each of 4 bytes. Therefore 3 or 4 cache lines should be allocated to CacheGroup2, while as many cache lines as possible should be allocated to CacheGroup1. The timing is 8 cycles for returning a set of data, assuming that Cycle 8 and Cycle 0 overlap in operation—i.e. the next request's Cycle 0 occurs during Cycle 8. This is acceptable since Cycle 0 has no memory access, and Cycle 8 has no specific operations. Generation of Coordinates using VLIW Vector Processor 74 Some functions that are linked to Write Iterators require the X and/or Y coordinates of the current pixel being processed in part of the processing pipeline. Particular processing may also need to take place at the end of each row, or column being processed. In most cases, the PassX and PassY flags should be sufficient to completely generate all coordinates. However, if there are special requirements, the following functions can be used. The calculation can be spread over a number of ALUs, for a single cycle generation, or be in a single ALU 188 for a multi-cycle generation. Generate Sequential [X, Y] When a process is processing pixels in sequential order according to the Sequential Read Iterator (or generating pixels and writing them out to a Sequential Write Iterator), the following process can be used to generate X, Y coordinates instead of PassX/PassY flags as shown in FIG. 23. The coordinate generator counts up to ImageWidth in the X ordinate, and once per ImageWidth pixels increments the Y ordinate. The actual process is illustrated in FIG. 24, where the following constants are set by software: Constant Value K1 ImageWidth K2 ImageHeight (optional) The following registers are used to hold temporary variables: Variable Value Reg1 X (starts at 0 each line) Reg2 Y (starts at 0) The requirements are summarized as follows: Requirements *+ + R K LU Iterators General 0 ¾ 2 ½ 0 0 TOTAL 0 ¾ 2 ½ 0 0 Generate Vertical Strip [X, Y] When a process is processing pixels in order to write them to a Vertical Strip Write Iterator, and for some reason cannot use the PassX/PassY flags, the process as illustrated in FIG. 25 can be used to generate X, Y coordinates. The coordinate generator simply counts up to ImageWidth in the X ordinate, and once per ImageWidth pixels increments the Y ordinate. The actual process is illustrated in FIG. 26, where the following constants are set by software: Constant Value K1 32 K2 ImageWidth K3 ImageHeight The following registers are used to hold temporary variables: Variable Value Reg1 StartX (starts at 0, and is incremented by 32 once per vertical strip) Reg2 X Reg3 EndX (starts at 32 and is incremented by 32 to a maximum of ImageWidth) once per vertical strip) Reg4 Y The requirements are summarized as follows: Requirements *+ + R K LU Iterators General 0 4 4 3 0 0 TOTAL 0 4 4 3 0 0 The calculations that occur once per vertical strip (2 additions, one of which has an associated MIN) are not included in the general timing statistics because they are not really part of the per pixel timing. However they do need to be taken into account for the programming of the microcode for the particular function. Image Sensor Interface (ISI 83) The Image Sensor Interface (ISI 83) takes data from the CMOS Image Sensor and makes it available for storage in DRAM. The image sensor has an aspect ratio of 3:2, with a typical resolution of 750×500 samples, yielding 375K (8 bits per pixel). Each 2×2 pixel block has the configuration as shown in FIG. 27. The ISI 83 is a state machine that sends control information to the Image Sensor, including frame sync pulses and pixel clock pulses in order to read the image. Pixels are read from the image sensor and placed into the VLIW Input FIFO 78. The VLIW is then able to process and/or store the pixels. This is illustrated further in FIG. 28. The ISI 83 is used in conjunction with a VLIW program that stores the sensed Photo Image in DRAM. Processing occurs in 2 steps: A small VLIW program reads the pixels from the FIFO and writes them to DRAM via a Sequential Write Iterator. The Photo Image in DRAM is rotated 90, 180 or 270 degrees according to the orientation of the camera when the photo was taken. If the rotation is 0 degrees, then step 1 merely writes the Photo Image out to the final Photo Image location and step 2 is not performed. If the rotation is other than 0 degrees, the image is written out to a temporary area (for example into the Print Image memory area), and then rotated during step 2 into the final Photo Image location. Step 1 is very simple microcode, taking data from the VLIW Input FIFO 78 and writing it to a Sequential Write Iterator. Step 2 's rotation is accomplished by using the accelerated Vark Affine Transform function. The processing is performed in 2 steps in order to reduce design complexity and to re-use the Vark affine transform rotate logic already required for images. This is acceptable since both steps are completed in approximately 0.03 seconds, a time imperceptible to the operator of the Artcam. Even so, the read process is sensor speed bound, taking 0.02 seconds to read the full frame, and approximately 0.01 seconds to rotate the image. The orientation is important for converting between the sensed Photo Image and the internal format image, since the relative positioning of R, G, and B pixels changes with orientation. The processed image may also have to be rotated during the Print process in order to be in the correct orientation for printing. The 3D model of the Artcam has 2 image sensors, with their inputs multiplexed to a single ISI 83 (different microcode, but same ACP 31). Since each sensor is a frame store, both images can be taken simultaneously, and then transferred to memory one at a time. Display Controller 88 When the “Take” button on an Artcam is half depressed, the TFT will display the current image from the image sensor (converted via a simple VLIW process). Once the Take button is fully depressed, the Taken Image is displayed. When the user presses the Print button and image processing begins, the TFT is turned off. Once the image has been printed the TFT is turned on again. The Display Controller 88 is used in those Artcam models that incorporate a flat panel display. An example display is a TFT LCD of resolution 240×160 pixels. The structure of the Display Controller 88 isl illustrated in FIG. 29. The Display Controller 88 State Machine contains registers that control the timing of the Sync Generation, where the display image is to be taken from (in DRAM via the Data cache 76 via a specific Cache Group), and whether the TFT should be active or not (via TFT Enable) at the moment. The CPU can write to these registers via the low speed bus. Displaying a 240×160 pixel image on an RGB TFT requires 3 components per pixel. The image taken from DRAM is displayed via 3 DACs, one for each of the R, G, and B output signals. At an image refresh rate of 30 frames per second (60 fields per second) the Display Controller 88 requires data transfer rates of: 240×160×3×30=3.5 MB per second This data rate is low compared to the rest of the system. However it is high enough to cause VLIW programs to slow down during the intensive image processing. The general principles of TFT operation should reflect this. Image Data Formats As stated previously, the DRAM Interface 81 is responsible for interfacing between other client portions of the ACP chip and the RAMBUS DRAM. In effect, each module within the DRAM Interface is an address generator. There are three logical types of images manipulated by the ACP. They are: CCD Image, which is the Input Image captured from the CCD. Internal Image format—the Image format utilised internally by the Artcam device. Print Image—the Output Image Format Printed by the Artcam These images are typically different in color space, resolution, and the output & input color spaces which can vary from camera to camera. For example, a CCD image on a low-end camera may be a different resolution, or have different color characteristics from that used in a high-end camera. However all internal image formats are the same format in terms of color space across all cameras. In addition, the three image types can vary with respect to which direction is ‘up’. The physical orientation of the camera causes the notion of a portrait or landscape image, and this must be maintained throughout processing. For this reason, the internal image is always oriented correctly, and rotation is performed on images obtained from the CCD and during the print operation. CCD Image Organization Although many different CCD image sensors could be utilised, it will be assumed that the CCD itself is a 750×500 image sensor, yielding 375,000 bytes (8 bits per pixel). Each 2×2 pixel block having the configuration as depicted in FIG. 30. A CCD Image as stored in DRAM has consecutive pixels with a given line contiguous in memory. Each line is stored one after the other. The image sensor Interface 83 is responsible for taking data from the CCD and storing it in the DRAM correctly oriented. Thus a CCD image with rotation 0 degrees has its first line G, R, G, R, G, R . . . and its second line as B, G, B, G, B, G . . . If the CCD image should be portrait, rotated 90 degrees, the first line will be R,G,R,G,R,G and the second line G, B, G, B, G, B . . . etc. Pixels are stored in an interleaved fashion since all color components are required in order to convert to the internal image format. It should be noted that the ACP 31 makes no assumptions about the CCD pixel format, since the actual CCDs for imaging may vary from Artcam to Artcam, and over time. All processing that takes place via the hardware is controlled by major microcode in an attempt to extend the usefulness of the ACP 31. Internal Image Organization Internal images typically consist of a number of channels. Vark images can include, but are not limited to: Lab Labα LabΔ αΔ L L, a and b correspond to components of the Lab color space, α is a matte channel (used for compositing), and Δ is a bump-map channel (used during brushing, tiling and illuminating). The VLIW processor 74 requires images to be organized in a planar configuration. Thus a Lab image would be stored as 3 separate blocks of memory: one block for the L channel, one block for the a channel, and one block for the b channel Within each channel block, pixels are stored contiguously for a given row (plus some optional padding bytes), and rows are stored one after the other. Turning to FIG. 31 there is illustrated an example form of storage of a logical image 100. The logical image 100 is stored in a planar fashion having L 101, a 102 and b 103 color components stored one after another. Alternatively, the logical image 100 can be stored in a compressed format having an uncompressed L component 101 and compressed A and B components 105, 106. Turning to FIG. 32, the pixels of for line n 110 are stored together before the pixels of for line and n+1 (111). With the image being stored in contiguous memory within a single channel. In the 8 MB-memory model, the final Print Image after all processing is finished, needs to be compressed in the chrominance channels. Compression of chrominance channels can be 4:1, causing an overall compression of 12:6, or 2:1. Other than the final Print Image, images in the Artcam are typically not compressed. Because of memory constraints, software may choose to compress the final Print Image in the chrominance channels by scaling each of these channels by 2:1. If this has been done, the PRINT Vark function call utilised to print an image must be told to treat the specified chrominance channels as compressed. The PRINT function is the only function that knows how to deal with compressed chrominance, and even so, it only deals with a fixed 2:1 compression ratio. Although it is possible to compress an image and then operate on the compressed image to create the final print image, it is not recommended due to a loss in resolution. In addition, an image should only be compressed once—as the final stage before printout. While one compression is virtually undetectable, multiple compressions may cause substantial image degradation Clip Image Organization Clip images stored on Artcards have no explicit support by the ACP 31. Software is responsible for taking any images from the current Artcard and organizing the data into a form known by the ACP. If images are stored compressed on an Artcard, software is responsible for decompressing them, as there is no specific hardware support for decompression of Artcard images. Image Pyramid Organization During brushing, tiling, and warping processes utilised to manipulate an image it is often necessary to compute the average color of a particular area in an image. Rather than calculate the value for each area given, these functions make use of an image pyramid. As illustrated in FIG. 33, an image pyramid is effectively a multi-resolutionpixel-map. The original image 115 is a 1:1 representation. Low-pass filtering and sub-sampling by 2:1 in each dimension produces an image 14 the original size 116. This process continues until the entire image is represented by a single pixel. An image pyramid is constructed from an original internal format image, and consumes ⅓ of the size taken up by the original image (¼+{fraction (1/16)}+{fraction (1/64)}+ . . . ). For an original image of 1500×1000 the corresponding image pyramid is approximately ½ MB. An image pyramid is constructed by a specific Vark function, and is used as a parameter to other Vark functions. Print Image Organization The entire processed image is required at the same time in order to print it However the Print Image output can comprise a CMY dithered image and is only a transient image format, used within the Print Image functionality. However, it should be noted that color conversion will need to take place from the internal color space to the print color space. In addition, color conversion can be tuned to be different for different print rolls in the camera with different ink characteristics e.g. Sepia output can be accomplished by using a specific sepia toning Artcard, or by using a sepia tone print-roll (so all Artcards will work in sepia tone). Color Spaces As noted previously there are 3 color spaces used in the Artcam, corresponding to the different image types. The ACP has no direct knowledge of specific color spaces. Instead, it relies on client color space conversion tables to convert between CCD, internal, and printer color spaces: CCD:RGB Internal:Lab Printer:CMY Removing the color space conversion from the ACP 31 allows: Different CCDs to be used in different cameras Different inks (in different print rolls over time) to be used in the same camera Separation of CCD selection from ACP design path A well defined internal color space for accurate color processing Artcard Interface 87 The Artcard Interface (AI) takes data from the linear image Sensor while an Artcard is passing under it, and makes that data available for storage in DRAM. The image sensor produces 11,000 8-bit samples per scanline, sampling the Artcard at 4800 dpi. The AI is a state machine that sends control information to the linear sensor, including LineSync pulses and PixelClock pulses in order to read the image. Pixels are read from the linear sensor and placed into the VLIW Input FIFO 78. The VLIW is then able to process and/or store the pixels. The AI has only a few registers: Description Register Name NumPixels The number of pixels in a sensor line (approx 11,000) Status The Print Head Interface's Status Register PixelsRemaining The number of bytes remaining in the current line Actions Reset A write to this register resets the AI, stops any scanning, and loads all registers with 0. Scan A write to this register with a non-zero value sets the Scanning bit of the Status register, and causes the Artcard Interface Scan cycle to start. A write to this register with 0 stops the scanning process and clears the Scanning bit in the Status register. The Scan cycle causes the AI to transfer NumPixels bytes from the sensor to the VLIW Input FIFO 78, producing the PixelClock signals appropriately. Upon completion of NumPixels bytes, a LineSync pulse is given and the Scan cycle restarts. The PixelsRemaining register holds the number of pixels remaining to be read on the current scanline. Note that the CPU should clear the VLIW Input FIFO 78 before initiating a Scan. The Status register has bit interpretations as follows: Bit Name Bits Description Scanning 1 If set, the AI is currently scanning, with the number of pixels remaining to be transferred from the current line recorded in PixelsRemaining. If clear, the AI is not currently scanning, so is not transferring pixels to the VLIW Input FIFO 78. Artcard Interface (AI) 87 The Artcard Interface (AI) 87 is responsible for taking an Artcard image from the Artcard Reader 34, and decoding it into the original data (usually a Vark script). Specifically, the AI 87 accepts signals from the Artcard scanner linear CCD 34, detects the bit pattern printed on the card, and converts the bit pattern into the original data, correcting read errors. With no Artcard 9 inserted, the image printed from an Artcam is simply the sensed Photo Image cleaned up by any standard image processing routines. The Artcard 9 is the means by which users are able to modify a photo before printing it out. By the simple task of inserting a specific Artcard 9 into an Artcam, a user is able to define complex image processing to be performed on the Photo Image. With no Artcard inserted the Photo Image is processed in a standard way to create the Print Image. When a single Artcard 9 is inserted into the Artcam, that Artcard's effect is applied to the Photo Image to generate the Print Image. When the Artcard 9 is removed (ejected), the printed image reverts to the Photo Image processed in a standard way. When the user presses the button to eject an Artcard, an event is placed in the event queue maintained by the operating system running on the Artcam Central Processor 31. When the event is processed (for example after the current Print has occurred), the following things occur: If the current Artcard is valid, then the Print Image is marked as invalid and a ‘Process Standard’ event is placed in the event queue. When the event is eventually processed it will perform the standard image processing operations on the Photo Image to produce the Print Image. The motor is started to eject the Artcard and a time-specific ‘Stop-Motor’ Event is added to the event queue. Inserting an Artcard When a user inserts an Artcard 9, the Artcard Sensor 49 detects it notifying the ACP72. This results in the software inserting an ‘Artcard Inserted’ event into the event queue. When the event is processed several things occur: The current Artcard is marked as invalid (as opposed to ‘none’). The Print Image is marked as invalid. The Artcard motor 37 is started up to load the Artcard The Artcard Interface 87 is instructed to read the Artcard The Artcard Interface 87 accepts signals from the Artcard scanner linear CCD 34, detects the bit pattern printed on the card, and corrects errors in the detected bit pattern, producing a valid Artcard data block in DRAM. Reading Data from the Artcard CCD—General Considerations As illustrated in FIG. 34, the Data Card reading process has 4 phases operated while the pixel data is read from the card. The phases are as follows: Phase 1. Detect data area on Artcard Phase 2. Detect bit pattern from Artcard based on CCD pixels, and write as bytes. Phase 3. Descramble and XOR the byte-pattern Phase 4. Decode data (Reed-Solomon decode) As illustrated in FIG. 35, the Artcard 9 must be sampled at least at double the printed resolution to satisfy Nyquist's Theorem. In practice it is better to sample at a higher rate than this. Preferably, the pixels are sampled 230 at 3 times the resolution of a printed dot in each dimension, requiring 9 pixels to define a single dot. Thus if the resolution of the Artcard 9 is 1600 dpi, and the resolution of the sensor 34 is 4800 dpi, then using a 50 mm CCD image sensor results in 9450 pixels per column. Therefore if we require 2 MB of dot data (at 9 pixels per dot) then this requires 2 MB*8*9/9450=15,978 columns=approximately 16,000 columns. Of course if a dot is not exactly aligned with the sampling CCD the worst and most likely case is that a dot will be sensed over a 16 pixel area (4×4) 231. An Artcard 9 may be slightly warped due to heat damage, slightly rotated (up to, say 1 degree) due to differences in insertion into an Artcard reader, and can have slight differences in true data rate due to fluctuations in the speed of the reader motor 37. These changes will cause columns of data from the card not to be read as corresponding columns of pixel data. As illustrated in FIG. 36, a 1 degree rotation in the Artcard 9 can cause the pixels from a column on the card to be read as pixels across 166 columns: Finally, the Artcard 9 should be read in a reasonable amount of time with respect to the human operator. The data on the Artcard covers most of the Artcard surface, so timing concerns can be limited to the Artcard data itself. A reading time of 1.5 seconds is adequate for Artcard reading. The Artcard should be loaded in 1.5 seconds. Therefore all 16,000 columns of pixel data must be read from the CCD 34 in 1.5 second, i.e. 10,667 columns per second. Therefore the time available to read one column is 1/10667 seconds, or 93,747 ns. Pixel data can be written to the DRAM one column at a time, completely independently from any processes that are reading the pixel data. The time to write one column of data (9450/2 bytes since the reading can be 4 bits per pixel giving 2×4 bit pixels per byte) to DRAM is reduced by using 8 cache lines. If 4 lines were written out at one time, the 4 banks can be written to independently, and thus overlap latency reduced. Thus the 4725 bytes can be written in 11,840 ns (4725/128*320 ns). Thus the time taken to write a given column's data to DRAM uses just under 13% of the available bandwidth. Decoding an Artcard A simple look at the data sizes shows the impossibility of fitting the process into the 8 MB of memory 33 if the entire Artcard pixel data (140 MB if each bit is read as a 3×3 array) as read by the linear CCD 34 is kept. For this reason, the reading of the linear CCD, decoding of the bitmap, and the un-bitmap process should take place in real-time (while the Artcard 9 is traveling past the linear CCD 34), and these processes must effectively work without having entire data stores available. When an Artcard 9 is inserted, the old stored Print Image and any expanded Photo Image becomes invalid. The new Artcard 9 can contain directions for creating a new image based on the currently captured Photo Image. The old Print Image is invalid, and the area holding expanded Photo Image data and image pyramid is invalid, leaving more than 5 MB that can be used as scratch memory during the read process. Strictly speaking, the 1 MB area where the Artcard raw data is to be written can also be used as scratch data during the Artcard read process as long as by the time the final Reed-Solomon decode is to occur, that 1 MB area is free again. The reading process described here does not make use of the extra 1 MB area (except as a final destination for the data). It should also be noted that the unscrambling process requires two sets of 2 MB areas of memory since unscrambling cannot occur in place. Fortunately the 5 MB scratch area contains enough space for this process. Turning now to FIG. 37, there is shown a flowchart 220 of the steps necessary to decode the Artcard data. These steps include reading in the Artcard 221, decoding the read data to produce corresponding encoded XORed scrambled bitmap data 223. Next a checkerboard XOR is applied to the data to produces encoded scrambled data 224. This data is then unscrambled 227 to produce data 225 before this data is subjected to Reed-Solomon decoding to produce the original raw data 226. Alternatively, unscrambling and XOR process can take place together, not requiring a separate pass of the data. Each of the above steps is discussed in further detail hereinafter. As noted previously with reference to FIG. 37, the Artcard Interface, therefore, has 4 phases, the first 2 of which are time-critical, and must take place while pixel data is being read from the CCD: Phase 1. Detect data area on Artcard Phase 2. Detect bit pattern from Artcard based on CCD pixels, and write as bytes. Phase 3. Descramble and XOR the byte-pattern Phase 4. Decode data (Reed-Solomon decode) The four phases are described in more detail as follows: Phase 1. As the Artcard 9 moves past the CCD 34 the AI must detect the start of the data area by robustly detecting special targets on the Artcard to the left of the data area. If these cannot be detected, the card is marked as invalid. The detection must occur in real-time, while the Artcard 9 is moving past the CCD 34. If necessary, rotation invariance can be provided. In this case, the targets are repeated on the right side of the Artcard, but relative to the bottom right corner instead of the top corner. In this way the targets end up in the correct orientation if the card is inserted the “wrong” way. Phase 3 below can be altered to detect the orientation of the data, and account for the potential rotation. Phase 2. Once the data area has been determined, the main read process begins, placing pixel data from the CCD into an ‘Artcard data window’, detecting bits from this window, assembling the detected bits into bytes, and constructing a byte-image in DRAM. This must all be done while the Artcard is moving past the CCD. Phase 3. Once all the pixels have been read from the Artcard data area, the Artcard motor 37 can be stopped, and the byte image descrambled and XORed. Although not requiring real-time performance, the process should be fast enough not to annoy the human operator. The process must take 2 MB of scrambled bit-image and write the unscrambled/XORed bit-image to a separate 2 MB image. Phase 4. The final phase in the Artcard read process is the Reed-Solomon decoding process, where the 2 MB bit-image is decoded into a 1 MB valid Artcard data area. Again, while not requiring real-time performance it is still necessary to decode quickly with regard to the human operator. If the decode process is valid, the card is marked as valid. If the decode failed, any duplicates of data in the bit-image are attempted to be decoded, a process that is repeated until success or until there are no more duplicate images of the data in the bit image. The four phase process described requires 4.5 MB of DRAM. 2 MB is reserved for Phase 2 output, and 0.5 MB is reserved for scratch data during phases 1 and 2. The remaining 2 MB of space can hold over 440 columns at 4725 byes per column. In practice, the pixel data being read is a few columns ahead of the phase 1 algorithm, and in the worst case, about 180 columns behind phase 2, comfortably inside the 440 column limit A description of the actual operation of each phase will now be provided in greater detail. Phase 1 —Detect Data Area on Artcard This phase is concerned with robustly detecting the left-hand side of the data area on the Artcard 9. Accurate detection of the data area is achieved by accurate detection of special targets printed on the left side of the card. These targets are especially designed to be easy to detect even if rotated up to 1 degree. Turning to FIG. 38, there is shown an enlargement of the left hand side of an Artcard 9. The side of the card is divided into 16 bands, 239 with a target eg. 241 located at the center of each band. The bands are logical in that there is no line drawn to separate bands. Turning to FIG. 39, there is shown a single target 241. The target 241, is a printed black square containing a single white dot. The idea is to detect firstly as many targets 241 as possible, and then to join at least 8 of the detected white-dot locations into a single logical straight line. If this can be done, the start of the data area 243 is a fixed distance from this logical line. If it cannot be done, then the card is rejected as invalid. As shown in FIG. 38, the height of the card 9 is 3150 dots. A target (Target0) 241 is placed a fixed distance of 24 dots away from the top left corner 244 of the data area so that it falls well within the first of 16 equal sized regions 239 of 192 dots (576 pixels) with no target in the final pixel region of the card. The target 241 must be big enough to be easy to detect, yet be small enough not to go outside the height of the region if the card is rotated 1 degree. A suitable size for the target is a 31×31 dot (93×93 sensed pixels) black square 241 with the white dot 242. At the worst rotation of 1 degree, a 1 column shift occurs every 57 pixels. Therefore in a 590 pixel sized band, we cannot place any part of our symbol in the top or bottom 12 pixels or so of the band or they could be detected in the wrong band at CCD read time if the card is worst case rotated. Therefore, if the black part of the rectangle is 57 pixels high (19 dots) we can be sure that at least 9.5 black pixels will be read in the same column by the CCD (worst case is half the pixels are in one column and half in the next). To be sure of reading at least 10 black dots in the same column, we must have a height of 20 dots. To give room for erroneous detection on the edge of the start of the black dots, we increase the number of dots to 31, giving us 15 on either side of the white dot at the target's local coordinate (15, 15). 31 dots is 91 pixels, which at most suffers a 3 pixel shift in column, easily within the 576 pixel band. Thus each target is a block of 31×31 dots (93×93 pixels) each with the composition: 15 columns of 31 black dots each (45 pixel width columns of 93 pixels). 1 column of 15 black dots (45 pixels) followed by 1 white dot (3 pixels) and then a further 15 black dots (45 pixels) 15 columns of 31 black dots each (45 pixel width columns of 93 pixels) Detect Targets Targets are detected by reading columns of pixels, one column at a time rather than by detecting dots. It is necessary to look within a given band for a number of columns consisting of large numbers of contiguous black pixels to build up the left side of a target. Next, it is expected to see a white region in the center of further black columns, and finally the black columns to the left of the target center. Eight cache lines are required for good cache performance on the reading of the pixels. Each logical read fills 4 cache lines via 4 sub-reads while the other 4 cache-lines are being used. This effectively uses up 13% of the available DRAM bandwidth. As illustrated in FIG. 40, the detection mechanism FIFO for detecting the targets uses a filter 245, run-length encoder 246, and a FIFO 247 that requires special wiring of the top 3 elements (S1, S2, and S3) for random access. The columns of input pixels are processed one at a time until either all the targets are found, or until a specified number of columns have been processed. To process a column, the pixels are read from DRAM, passed through a filter 245 to detect a 0 or 1, and then run length encoded 246. The bit value and the number of contiguous bits of the same value are placed in FIFO 247. Each entry of the FIFO 249 is in 8 bits, 7 bits 250 to hold the run-length, and 1 bit 249 to hold the value of the bit detected. The run-length encoder 246 only encodes contiguous pixels within a 576 pixel (192 dot) region. The top 3 elements in the FIFO 247 can be accessed 252 in any random order. The run lengths (in pixels) of these entries are filtered into 3 values: short, medium, and long in accordance with the following table: Short Used to detect white dot. RunLength < 16 Medium Used to detect runs of black above 16 <= RunLength < 48 or below the white dot in the center of the target. Long Used to detect run lengths of black to RunLength >= 48 the left and right of the center dot in the target. Looking at the top three entries in the FIFO 247 there are 3 specific cases of interest: Case 1 S1 = white long We have detected a black column of the target to S2 = black long the left of or to the right of the white center dot. S3 = white medium/long Case 2 S1 = white long If we've been processing a series of columns of S2 = black medium Case 1s, then we have probably detected the S3 = white short white dot in this column. We know that the next Previous 8 columns were Case 1 entry will be black (or it would have been included in the white S3 entry), but the number of black pixels is in question. Need to verify by checking after the next FIFO advance (see Case 3). Case 3 Prev = Case 2 We have detected part of the white dot. We S3 = black med expect around 3 of these, and then some more columns of Case 1. Preferably, the following information per region band is kept: TargetDetected 1 bit BlackDetectCount 4 bits WhiteDetectCount 3 bits PrevColumnStartPixel 15 bits TargetColumn ordinate 16 bits (15:1) TargetRow ordinate 16 bits (15:1) TOTAL 7 bytes (rounded to 8 bytes for easy addressing) Given a total of 7 bytes. It makes address generation easier if the total is assumed to be 8 bytes. Thus 16 entries requires 16*8=128 bytes, which fits in 4 cache lines. The address range should be inside the scratch 0.5 MB DRAM area since other phases make use of the remaining 4 MB data area. When beginning to process a given pixel column, the register value S2StartPixel 254 is reset to 0. As entries in the FIFO advance from S2 to S1, they are also added 255 to the existing S2StartPixel value, giving the exact pixel position of the run currently defined in S2. Looking at each of the 3 cases of interest in the FIFO, S2StartPixel can be used to determine the start of the black area of a target (Cases 1 and 2), and also the start of the white dot in the center of the target (Case 3). An algorithm for processing columns can be as follows: 1 TargetDetected[0-15] := 0 BlackDetectCount[0-15] := 0 WhiteDetectCount[0-15] := 0 TargetRow[0-15] := 0 TargetColumn[0-15] := 0 PrevColStartPixel[0-15] := 0 CurrentColumn := 0 2 Do ProcessColumn 3 CurrentColumn++ 4 If (CurrentColumn <= LastValidColumn) Goto 2 The steps involved in the processing a column (Process Column) are as follows: 1 S2StartPixel := 0 FIFO := 0 BlackDetectCount := 0 WhiteDetectCount := 0 ThisColumnDetected := FALSE PrevCaseWasCase2 := FALSE 2 If(! TargetDetected[Target]) & (! ColumnDetected[Target]) ProcessCases EndIf 3 PrevCaseWasCase2 := Case=2 4 Advance FIFO The processing for each of the 3 (Process Cases) cases is as follows: Case 1: BlackDetectCount[target] < 8 □ := ABS(S2StartPixel − PrevColStartPixel[Target]) OR If (0<=□< 2) WhiteDetectCount[Target] = 0 BlackDetectCount[Target]++ (max value =8) Else BlackDetectCount[Target] := 1 WhiteDetectCount[Target] := 0 EndIf PrevColStartPixel[Target] := S2StartPixel ColumnDetected[Target] := TRUE BitDetected = 1 BlackDetectCount[target] >= 8 PrevColStartPixel[Target] := S2StartPixel WhiteDetectCount[Target] != 0 ColumnDetected[Target] := TRUE BitDetected = 1 TargetDetected[Target] := TRUE TargetColumn[Target] := CurrentColumn − 8 − (WhiteDetectCount[Target]/2) Case 2: No special processing is recorded except for setting the ‘PrevCaseWasCase2’ flag for identifying Case 3 (see Step 3 of processing a column described above) Case 3: PrevCaseWasCase2 = TRUE If (WhiteDetectCount[Target] < 2) BlackDetectCount[Target] >= 8 TargetRow[Target] = S2StartPixel + (S2RunLength/2) WhiteDetectCount=1 EndIf □ := ABS(S2StartPixel − PrevColStartPixel[Target]) If (0<=□< 2) WhiteDetectCount[Target]++ Else WhiteDetectCount[Target] := 1 EndIf PrevColStartPixel[Target] := S2StartPixel ThisColumnDetected := TRUE BitDetected = 0 At the end of processing a given column, a comparison is made of the current column to the maximum number of columns for target detection. If the number of columns allowed has been exceeded, then it is necessary to check how many targets have been found. If fewer than 8 have been found, the card is considered invalid. Process Targets After the targets have been detected, they should be processed. All the targets may be available or merely some of them. Some targets may also have been erroneously detected. This phase of processing is to determine a mathematical line that passes through the center of as many targets as possible. The more targets that the line passes through, the more confident the target position has been found. The limit is set to be 8 targets. If a line passes through at least 8 targets, then it is taken to be the right one. It is all right to take a brute-force but straightforward approach since there is the time to do so (see below), and lowering complexity makes testing easier. It is necessary to determine the line between targets 0 and 1 (if both targets are considered valid) and then determine how many targets fall on this line. Then we determine the line between targets 0 and 2, and repeat the process. Eventually we do the same for the line between targets 1 and 2, 1 and 3 etc. and finally for the line between targets 14 and 15. Assuming all the targets have been found, we need to perform 15+14+13+ . . . =90 sets of calculations (with each set of calculations requiring 16 tests=1440 actual calculations), and choose the line which has the maximum number of targets found along the line. The algorithm for target location can be as follows: TargetA := 0 MaxFound := 0 BestLine := 0 While (TargetA < 15) If (TargetA is Valid) TargetB:= TargetA + 1 While (TargetB<= 15) If (TargetB is valid) CurrentLine := line between TargetA and TargetB TargetC := 0; While (TargetC <= 15) If (TargetC valid AND TargetC on line AB) TargetsHit++ EndIf If (TargetsHit > MaxFound) MaxFound := TargetsHit BestLine := CurrentLine EndIf TargetC++ EndWhile EndIf TargetB ++ EndWhile EndIf TargetA++ EndWhile If (MaxFound < 8) Card is Invalid Else Store expected centroids for rows based on BestLine EndIf As illustrated in FIG. 34, in the algorithm above, to determine a CurrentLine 260 from Target A 261 and target B, it is necessary to calculate Δrow (264) & Δcolumn (263) between targets 261, 262, and the location of Target A. It is then possible to move from Target 0 to Target 1 etc. by adding Δrow and Δcolumn. The found (if actually found) location of target N can be compared to the calculated expected position of Target N on the line, and if it falls within the tolerance, then Target N is determined to be on the line. To calculate Δrow & Δcolumn: Δrow=(rowTargetA−rowTargetB)/(B−A) Δcolumn=(columnTargetA−columnTargetB)/(B−A) Then we calculate the position of Target0: row=rowTargetA−(A*Δrow) column=columnTargetA−(A*Δcolumn) And compare (row, column) against the actual rowTarget0 and columnTarget0. To move from one expected target to the next (e.g. from Target0 to Target1), we simply add Δrow and Δcolumn to row and column respectively. To check if each target is on the line, we must calculate the expected position of Target0, and then perform one add and one comparison for each target ordinate. At the end of comparing all 16 targets against a maximum of 90 lines, the result is the best line through the valid targets. If that line passes through at least 8 targets (i.e. MaxFound >=8), it can be said that enough targets have been found to form a line, and thus the card can be processed. If the best line passes through fewer than 8, then the card is considered invalid. The resulting algorithm takes 180 divides to calculate Δrow and Δcolumn, 180 multiply/adds to calculate target0 position, and then 2880 adds/comparisons. The time we have to perform this processing is the time taken to read 36 columns of pixel data=3,374,892 ns. Not even accounting for the fact that an add takes less time than a divide, it is necessary to perform 3240 mathematical operations in 3,374,892 ns. That gives approximately 1040 ns per operation, or 104 cycles. The CPU can therefore safely perform the entire processing of targets, reducing complexity of design. Update Centroids Based on Data Edge Border and Clockmarks Step 0: Locate the Data Area From Target 0 (241 of FIG. 38) it is a predetermined fixed distance in rows and columns to the top left border 244 of the data area, and then a further 1 dot column to the vertical clock marks 276. So we use TargetA, Δrow and Δcolumn found in the previous stage (Δrow and Δcolumn refer to distances between targets) to calculate the centroid or expected location for Target0 as described previously. Since the fixed pixel offset from Target0 to the data area is related to the distance between targets (192 dots between targets, and 24 dots between Target0 and the data area 243), simply add Δrow/8 to Target0's centroid column coordinate (aspect ratio of dots is 1:1). Thus the top co-ordinate can be defined as: (columnDotColumnTop=columnTarget0+(Δrow/8) (rowDotColumnTop=rowTarget0+(Δcolumn/8) Next Δrow and Δcolumn are updated to give the number of pixels between dots in a single column (instead of between targets) by dividing them by the number of dots between targets: Δrow=Δrow/192 Δcolumn=Δcolumn/192 We also set the currentColumn register (see Phase 2) to be −1 so that after step 2, when phase 2 begins, the currentColumn register will increment from −1 to 0. Step 1: Write out the Initial Centroid Deltas (Δ) and Bit History This simply involves writing setup information required for Phase 2. This can be achieved by writing 0s to all the Δrow and Δcolumn entries for each row, and a bit history. The bit history is actually an expected bit history since it is known that to the left of the clock mark column 276 is a border column 277, and before that, a white area. The bit history therefore is 011, 010, 011, 010 etc. Step 2: Update the Centroids Based on Actual Pixels Read. The bit history is set up in Step 1 according to the expected clock marks and data border. The actual centroids for each dot row can now be more accurately set (they were initially 0) by comparing the expected data against the actual pixel values. The centroid updating mechanism is achieved by simply performing step 3 of Phase 2. Phase 2—Detect Bit Pattern from Artcard Based on Pixels Read, and Write as Bytes. Since a dot from the Artcard 9 requires a minimum of 9 sensed pixels over 3 columns to be represented, there is little point in performing dot detection calculations every sensed pixel column. It is better to average the time required for processing over the average dot occurrence, and thus make the most of the available processing time. This allows processing of a column of dots from an Artcard 9 in the time it takes to read 3 columns of data from the Artcard. Although the most likely case is that it takes 4 columns to represent a dot, the 4th column will be the last column of one dot and the first column of a next dot. Processing should therefore be limited to only 3 columns. As the pixels from the CCD are written to the DRAM in 13% of the time available, 83% of the time is available for processing of 1 column of dots i.e. 83% of (93,747*3)=83% of 281,241 ns=233,430 ns. In the available time, it is necessary to detect 3150 dots, and write their bit values into the raw data area of memory. The processing therefore requires the following steps: For each column of dots on the Artcard: Step 0: Advance to the next dot column Step 1: Detect the top and bottom of an Artcard dot column (check clock marks) Step 2: Process the dot column, detecting bits and storing them appropriately Step 3: Update the centroids Since we are processing the Artcard's logical dot columns, and these may shift over 165 pixels, the worst case is that we cannot process the first column until at least 165 columns have been read into DRAM. Phase 2 would therefore finish the same amount of time after the read process had terminated. The worst case time is: 165*93,747 ns=15,468,255 ns or 0.015 seconds. Step 0: Advance to the Next Dot Column In order to advance to the next column of dots we add Δrow and Δcolumn to the dotColumnTop to give us the centroid of the dot at the top of the column. The first time we do this, we are currently at the clock marks column 276 to the left of the bit image data area, and so we advance to the first column of data. Since Δrow and Δcolumn refer to distance between dots within a column, to move between dot columns it is necessary to add Δrow to columndotColumnTop and Δcolumn to rowdotColumnTop. To keep track of what column number is being processed, the column number is recorded in a register called CurrentColumn. Every time the sensor advances to the next dot column it is necessary to increment the CurrentColumn register. The first time it is incremented, it is incremented from −1 to 0 (see Step 0 Phase 1). The CurrentColumn register determines when to terminate the read process (when reaching maxColumns), and also is used to advance the DataOut Pointer to the next column of byte information once all 8 bits have been written to the byte (once every 8 dot columns). The lower 3 bits determine what bit we're up to within the current byte. It will be the same bit being written for the whole column. Step 1: Detect the Top and Bottom of an Artcard Dot Column. In order to process a dot column from an Artcard, it is necessary to detect the top and bottom of a column. The column should form a straight line between the top and bottom of the column (except for local warping etc.). Initially dotColumnTop points to the clock mark column 276. We simply toggle the expected value, write it out into the bit history, and move on to step 2, whose first task will be to add the Δrow and Δcolumn values to dotColumnTop to arrive at the first data dot of the column. Step 2: Process an Artcard's Dot Column Given the centroids of the top and bottom of a column in pixel coordinates the column should form a straight line between them, with possible minor variances due to warping etc. Assuming the processing is to start at the top of a column (at the top centroid coordinate) and move down to the bottom of the column, subsequent expected dot centroids are given as: rownext=row+Δrow columnnext=column+Δcolumn This gives us the address of the expected centroid for the next dot of the column. However to account for local warping and error we add another Δrow and Δcolumn based on the last time we found the dot in a given row. In this way we can account for small drifts that accumulate into a maximum drift of some percentage from the straight line joining the top of the column to the bottom. We therefore keep 2 values for each row, but store them in separate tables since the row history is used in step 3 of this phase. Δrow and Δcolumn (2 @ 4 bits each=1 byte) row history (3 bits per row, 2 rows are stored per byte) For each row we need to read a Δrow and Δcolumn to determine the change to the centroid. The read process takes 5% of the bandwidth and 2 cache lines: 76*(3150/32)+2*3150=13,824 ns=5% of bandwidth Once the centroid has been determined, the pixels around the centroid need to be examined to detect the status of the dot and hence the value of the bit. In the worst case a dot covers a 4×4 pixel area. However, thanks to the fact that we are sampling at 3 times the resolution of the dot, the number of pixels required to detect the status of the dot and hence the bit value is much less than this. We only require access to 3 columns of pixel columns at any one time. In the worst case of pixel drift due to a 1% rotation, centroids will shift 1 column every 57 pixel rows, but since a dot is 3 pixels in diameter, a given column will be valid for 171 pixel rows (3*57). As a byte contains 2 pixels, the number of bytes valid in each buffered read (4 cache lines) will be a worst case of 86 (out of 128 read). Once the bit has been detected it must be written out to DRAM. We store the bits from 8 columns as a set of contiguous bytes to minimize DRAM delay. Since all the bits from a given dot column will correspond to the next bit position in a data byte, we can read the old value for the byte, shift and OR in the new bit, and write the byte back. The read/shift&OR/write process requires 2 cache lines. We need to read and write the bit history for the given row as we update it We only require 3 bits of history per row, allowing the storage of 2 rows of history in a single byte. The read/shift&OR/write process requires 2 cache lines. The total bandwidth required for the bit detection and storage is summarised in the following table: Read centroid Δ 5% Read 3 columns of pixel data 19% Read/Write detected bits into byte buffer 10% Read/Write bit history 5% TOTAL 39% Detecting a Dot The process of detecting the value of a dot (and hence the value of a bit) given a centroid is accomplished by examining 3 pixel values and getting the result from a lookup table. The process is fairly simple and is illustrated in FIG. 42. A dot 290 has a radius of about 1.5 pixels. Therefore the pixel 291 that holds the centroid, regardless of the actual position of the centroid within that pixel, should be 100% of the dot's value. If the centroid is exactly in the center of the pixel 291, then the pixels above 292 & below 293 the centroid's pixel, as well as the pixels to the left 294 & right 295 of the centroid's pixel will contain a majority of the dot's value. The further a centroid is away from the exact center of the pixel 295, the more likely that more than the center pixel will have 100% coverage by the dot. Although FIG. 42 only shows centroids differing to the left and below the center, the same relationship obviously holds for centroids above and to the right of center. center. In Case 1, the centroid is exactly in the center of the middle pixel 295. The center pixel 295 is completely covered by the dot, and the pixels above, below, left, and right are also well covered by the dot. In Case 2, the centroid is to the left of the center of the middle pixel 291. The center pixel is still completely covered by the dot, and the pixel 294 to the left of the center is now completely covered by the dot. The pixels above 292 and below 293 are still well covered. In Case 3, the centroid is below the center of the middle pixel 291. The center pixel 291 is still completely covered by the dot 291, and the pixel below center is now completely covered by the dot The pixels left 294 and right 295 of center are still well covered. In Case 4, the centroid is left and below the center of the middle pixel. The center pixel 291 is still completely covered by the dot, and both the pixel to the left of center 294 and the pixel below center 293 are completely covered by the dot. The algorithm for updating the centroid uses the distance of the centroid from the center of the middle pixel 291 in order to select 3 representative pixels and thus decide the value of the dot: Pixel 1: the pixel containing the centroid Pixel 2: the pixel to the left of Pixel 1 if the centroid's X coordinate (column value) is <½, otherwise the pixel to the right of Pixel 1. Pixel 3: the pixel above pixel 1 if the centroid's Y coordinate (row value) is <½, otherwise the pixel below Pixel 1. As shown in FIG. 43, the value of each pixel is output to a pre-calculated lookup table 301. The 3 pixels are fed into a 12-bit lookup table, which outputs a single bit indicating the value of the dot—on or off. The lookup table 301 is constructed at chip definition time, and can be compiled into about 500 gates. The lookup table can be a simple threshold table, with the exception that the center pixel (Pixel 1) is weighted more heavily. Step 3: Update the Centroid Δs for each Row in the Column The idea of the Δs processing is to use the previous bit history to generate a ‘perfect’ dot at the expected centroid location for each row in a current column. The actual pixels (from the CCD) are compared with the expected ‘perfect’ pixels. If the two match, then the actual centroid location must be exactly in the expected position, so the centroid Δs must be valid and not need updating. Otherwise a process of changing the centroid Δs needs to occur in order to best fit the expected centroid location to the actual data. The new centroid Δs will be used for processing the dot in the next column. Updating the centroid Δs is done as a subsequent process from Step 2 for the following reasons: to reduce complexity in design, so that it can be performed as Step 2 of Phase 1 there is enough bandwidth remaining to allow it to allow reuse of DRAM buffers, and to ensure that all the data required for centroid updating is available at the start of the process without special pipelining. The centroid Δ are processed as Δcolumn Δrow respectively to reduce complexity. Although a given dot is 3 pixels in diameter, it is likely to occur in a 4×4 pixel area. However the edge of one dot will as a result be in the same pixel as the edge of the next dot. For this reason, centroid updating requires more than simply the information about a given single dot FIG. 44 shows a single dot 310 from the previous column with a given centroid 311. In this example, the dot 310 extend Δ over 4 pixel columns 312-315 and in fact, part of the previous dot column's dot (coordinate=(Prevcolumn, Current Row)) has entered the current column for the dot on the current row. If the dot in the current row and column was white, we would expect the rightmost pixel column 314 from the previous dot column to be a low value, since there is only the dot information from the previous column's dot (the current column's dot is white). From this we can see that the higher the pixel value is in this pixel column 315, the more the centroid should be to the right Of course, if the dot to the right was also black, we cannot adjust the centroid as we cannot get information sub-pixel. The same can be said for the dots to the left, above and below the dot at dot coordinates (PrevColumn, CurrentRow). From this we can say that a maximum of 5 pixel columns and rows are required. It is possible to simplify the situation by taking the cases of row and column centroid Δs separately, treating them as the same problem, only rotated 90 degrees. Taking the horizontal case first, it is necessary to change the column centroid Δs if the expected pixels don't match the detected pixels. From the bit history, the value of the bits found for the Current Row in the current dot column, the previous dot column, and the (previous-1)th dot column are known. The expected centroid location is also known. Using these two pieces of information, it is possible to generate a 20 bit expected bit pattern should the read be ‘perfect’. The 20 bit bit-pattern represents the expected Δ values for each of the 5 pixels across the horizontal dimension. The first nibble would represent the rightmost pixel of the leftmost dot. The next 3 nibbles represent the 3 pixels across the center of the dot 310 from the previous column, and the last nibble would be the leftmost pixel 317 of the rightmost dot (from the current column). If the expected centroid is in the center of the pixel, we would expect a 20 bit pattern based on the following table: Bit history Expected pixels 000 00000 001 0000D 010 0DFD0 011 0DFDD 100 D0000 101 D000D 110 DDFD0 111 DDFDD The pixels to the left and right of the center dot are either 0 or D depending on whether the bit was a 0 or 1 respectively. The center three pixels are either 000 or DFD depending on whether the bit was a 0 or 1 respectively. These values are based on the physical area taken by a dot for a given pixel. Depending on the distance of the centroid from the exact center of the pixel, we would expect data shifted slightly, which really only affects the pixels either side of the center pixel. Since there are 16 possibilities, it is possible to divide the distance from the center by 16 and use that amount to shift the expected pixels. Once the 20 bit 5 pixel expected value has been determined it can be compared against the actual pixels read. This can proceed by subtracting the expected pixels from the actual pixels read on a pixel by pixel basis, and finally adding the differences together to obtain a distance from the expected Δ values. FIG. 45 illustrates one form of implementation of the above algorithm which includes a look up table 320 which receives the bit history 322 and central fractional component 323 and outputs 324 the corresponding 20 bit number which is subtracted 321 from the central pixel input 326 to produce a pixel difference 327. This process is carried out for the expected centroid and once for a shift of the centroid left and right by 1 amount in Δcolumn. The centroid with the smallest difference from the actual pixels is considered to be the ‘winner’ and the Δcolumn updated accordingly (which hopefully is ‘no change’). As a result, a Δcolumn cannot change by more than 1 each dot column. The process is repeated for the vertical pixels, and Δrow is consequentially updated. There is a large amount of scope here for parallelism. Depending on the rate of the clock chosen for the ACP unit 31 these units can be placed in series (and thus the testing of 3 different Δ could occur in consecutive clock cycles), or in parallel where all 3 can be tested simultaneously. If the clock rate is fast enough, there is less need for parallelism. Bandwidth Utilization It is necessary to read the old Δ of the Δs, and to write them out again. This takes 10% of the bandwidth: 2*(76(3150/32)+2*3150)=27,648 ns=10% of bandwidth It is necessary to read the bit history for the given row as we update its Δs. Each byte contains 2 row's bit histories, thus taking 2.5% of the bandwidth: 76((3150/2)/32)+2*(3150/2)=4,085 ns=2.5% of bandwidth In the worst case of pixel drift due to a 1% rotation, centroids will shift 1 column every 57 pixel rows, but since a dot is 3 pixels in diameter, a given pixel column will be valid for 171 pixel rows (3*57). As a byte contains 2 pixels, the number of bytes valid in cached reads will be a worst case of 86 (out of 128 read). The worst case timing for 5 columns is therefore 31% bandwidth. 5*(((9450/(128*2))*320)*128/86)=88,112 ns=31% of bandwidth. The total bandwidth required for the updating the centroid Δ is summarised in the following table: Read/Write centroid Δ 10% Read bit history 2.5% Read 5 columns of pixel data 31% TOTAL 43.5% Memory Usage for Phase 2: The 2 MB bit-image DRAM area is read from and written to during Phase 2 processing. The 2 MB pixel-data DRAM area is read. The 0.5 MB scratch DRAM area is used for storing row data, namely: Centroid array 24 bits (16:8) * 2 * 3150 = 18,900 byes Bit History array 3 bits * 3150 entries (2 per byte) = 1575 bytes Phase 3 —Unscramble and XOR the Raw Data Returning to FIG. 37, the next step in decoding is to unscramble and XOR the raw data. The 2 MB byte image, as taken from the Artcard, is in a scrambled XORed form. It must be unscrambled and re-XORed to retrieve the bit image necessary for the Reed Solomon decoder in phase 4. Turning to FIG. 46, the unscrambling process 330 takes a 2 MB scrambled byte image 331 and writes an unscrambled 2 MB image 332. The process cannot reasonably be performed in-place, so 2 sets of 2 MB areas are utilised. The scrambled data 331 is in symbol block order arranged in a 16×16 array, with symbol block 0 (334) having all the symbol 0's from all the code words in random order. Symbol block 1 has all the symbol 1's from all the code words in random order etc. Since there are only 255 symbols, the 256th symbol block is currently unused. A linear feedback shift register is used to determine the relationship between the position within a symbol block eg. 334 and what code word eg. 355 it came from. This works as long as the same seed is used when generating the original Artcard images. The XOR of bytes from alternative source lines with 0×AA and 0x55 respectively is effectively free (in time) since the bottleneck of time is waiting for the DRAM to be ready to read/write to non-sequential addresses. The timing of the unscrambling XOR process is effectively 2 MB of random byte-reads, and 2 MB of random byte-writes i.e. 2*(2 MB*76 ns+2 MB*2 ns)=327,155,712 ns or approximately 0.33 seconds. This timing assumes no caching. Phase 4 —Reed Solomon Decode This phase is a loop, iterating through copies of the data in the bit image, passing them to the Reed-Solomon decode module until either a successful decode is made or until there are no more copies to attempt decode from. The Reed-Solomon decoder used can be the VLIW processor, suitably programmed or, alternatively, a separate hardwired core such as LSI Logic's L64712. The L64712 has a throughput of 50 Mbits per second (around 6.25 MB per second), so the time may be bound by the speed of the Reed-Solomon decoder rather than the 2 MB read and 1 MB write memory access time (500 MB/sec for sequential accesses). The time taken in the worst case is thus 2/6.25 s=approximately 0.32 seconds. Phase 5 Running the Vark Script The overall time taken to read the Artcard 9 and decode it is therefore approximately 2.15 seconds. The apparent delay to the user is actually only 0.65 seconds (the total of Phases 3 and 4), since the Artcard stops moving after 1.5 seconds. Once the Artcard is loaded, the Artvark script must be interpreted, Rather than run the script immediately, the script is only run upon the pressing of the ‘Print’ button 13 (FIG. 1). The taken to run the script will vary depending on the complexity of the script, and must be taken into account for the perceived delay between pressing the print button and the actual print button and the actual printing. Alternative Artcard Fomat Of course, other artcard formats are possible. There will now be described one such alternative artcard format with a number of preferable feature. Described hereinafter will be the alternative Artcard data format, a mechanism for mapping user data onto dots on an alternative Artcard, and a fast alternative Artcard reading algorithm for use in embedded systems where resources are scarce. Alternative Artcard Overview The Alternative Artcards can be used in both embedded and PC type applications, providing a user-friendly interface to large amounts of data or configuration information. While the back side of an alternative Artcard has the same visual appearance regardless of the application (since it stores the data), the front of an alternative Artcard can be application dependent. It must make sense to the user in the context of the application. Alternative Artcard technology can also be independent of the printing resolution. The notion of storing data as dots on a card simply means that if it is possible put more dots in the same space (by increasing resolution), then those dots can represent more data. The preferred embodiment assumes utilisation of 1600 dpi printing on a 86 mm×55 mm card as the sample Artcard, but it is simple to determine alternative equivalent layouts and data sizes for other card sizes and/or other print resolutions. Regardless of the print resolution, the reading technique remain the same. After all decoding and other overhead has been taken into account, alternative Artcards are capable of storing up to 1 Megabyte of data at print resolutions up to 1600 dpi. Alternative Artcards can store megabytes of data at print resolutions greater than 1600 dpi. The following two tables summarize the effective alternative Artcard data storage capacity for certain print resolutions: Format of an Alternative Artcard The structure of data on the alternative Artcard is therefore specifically designed to aid the recovery of data. This section describes the format of the data (back) side of an alternative Artcard. Dots The dots on the data side of an alternative Artcard can be monochrome. For example, black dots printed on a white background at a predetermined desired print resolution. Consequently a “black dot” is physically different from a “white dot”. FIG. 47 illustrates various examples of magnified views of black and white dots. The monochromatic scheme of black dots on a white background is preferably chosen to maximize dynamic range in blurry reading environments. Although the black dots are printed at a particular pitch (eg. 1600 dpi), the dots themselves are slightly larger in order to create continuous lines when dots are printed contiguously. In the example images of FIG. 47, the dots are not as merged as they may be in reality as a result of bleeding. There would be more smoothing out of the black indentations. Although the alternative Artcard system described in the preferred embodiment allows for flexibly different dot sizes, exact dot sizes and ink/printing behaviour for a particular printing technology should be studied in more detail in order to obtain best results. In describing this artcard embodiment, the term dot refers to a physical printed dot (ink, thermal, electro-photographic, silver-halide etc) on an alternative Artcard. When an alternative Artcard reader scans an alternative Artcard, the dots must be sampled at least double the printed resolution to satisfy Nyquist's Theorem. The term pixel refers to a sample value from an alternative Artcard reader device. For example, when 1600 dpi dots are scanned at 4800 dpi there are 3 pixels in each dimension of a dot, or 9 pixels per dot. The sampling process will be further explained hereinafter. Turning to FIG. 48, there is shown the data surface 1101 a sample of alternative Artcard. Each alternative Artcard consists of an “active” region 1102 surrounded by a white border region 1103. The white border 1103 contains no data information, but can be used by an alternative Artcard reader to calibrate white levels. The active region is an array of data blocks eg. 1104, with each data block separated from the next by a gap of 8 white dots eg. 1106. Depending on the print resolution, the number of data blocks on an alternative Artcard will vary. On a 1600 dpi alternative Artcard, the array can be 8×8. Each data block 1104 has dimensions of 627×394 dots. With an inter-block gap 1106 of 8 white dots, the active area of an alternative Artcard is therefore 5072×3208 dots (8.1 mm×5.1 mm at 1600 dpi). Data Blocks Turning now to FIG. 49, there is shown a single data block 1107. The active region of an alternative Artcard consists of an array of identically structured data blocks 1107. Each of the data blocks has the following structure: a data region 1108 surrounded by clock-marks 1109, borders 1110, and targets 1111. The data region holds the encoded data proper, while the clock-marks, borders and targets are present specifically to help locate the data region and ensure accurate recovery of data from within the region. Each data block 1107 has dimensions of 627×394 dots. Of this, the central area of 595×384 dots is the data region 1108. The surrounding dots are used to hold the clock-marks, borders, and targets. Borders and Clockmarks FIG. 50 illustrates a data block with FIG. 51 and FIG. 52 illustrating magnified edge portions thereof. As illustrated in FIG. 51 and FIG. 52, there are two 5 dot high border and clockmark regions 1170, 1177 in each data block: one above and one below the data region. For example, The top 5 dot high region consists of an outer black dot border line 1112 (which stretches the length of the data block), a white dot separator line 1113 (to ensure the border line is independent), and a 3 dot high set of clock marks 1114. The clock marks alternate between a white and black row, starting with a black clock mark at the 8th column from either end of the data block. There is no separation between clockmark dots and dots in the data region. The clock marks are symmetric in that if the alternative Artcard is inserted rotated 180 degrees, the same relative border/clockmark regions will be encountered. The border 1112, 1113 is intended for use by an alternative Artcard reader to keep vertical tracking as data is read from the data region. The clockmarks 1114 are intended to keep horizontal tracking as data is read from the data region. The separation between the border and clockmarks by a white line of dots is desirable as a result of blurring occurring during reading. The border thus becomes a black line with white on either side, making for a good frequency response on reading. The clockmarks alternating between white and black have a similar result, except in the horizontal rather than the vertical dimension. Any alternative Artcard reader must locate the clockmarks and border if it intends to use them for tracking. The next section deals with targets, which are designed to point the way to the clockmarks, border and data. Targets in the Target Region As shown in FIG. 54, there are two 15-dot wide target regions 1116, 1117 in each data block: one to the left and one to the right of the data region. The target regions are separated from the data region by a single column of dots used for orientation. The purpose of the Target Regions 1116, 1117 is to point the way to the clockmarks, border and data regions. Each Target Region contains 6 targets eg. 1118 that are designed to be easy to find by an alternative Artcard reader. Turning now to FIG. 53 there is shown the structure of a single target 1120. Each target 1120 is a 15×15 dot black square with a center structure 1121 and a run-length encoded target number 1122. The center structure 1121 is a simple white cross, and the target number component 1122 is simply two columns of white dots, each being 2 dots long for each part of the target number. Thus target number 1's target id 1122 is 2 dots long, target number 2's target id 1122 is 4 dots wide etc. As shown in FIG. 54, the targets are arranged so that they are rotation invariant with regards to card insertion. This means that the left targets and right targets are the same, except rotated 180 degrees. In the left Target Region 1116, the targets are arranged such that targets 1 to 6 are located top to bottom respectively. In the right Target Region, the targets are arranged so that target numbers 1 to 6 are located bottom to top. The target number id is always in the half closest to the data region. The magnified view portions of FIG. 54 reveals clearly the how the right targets are simply the same as the left targets, except rotated 180 degrees. As shown in FIG. 55, the targets 1124, 1125 are specifically placed within the Target Region with centers 55 dots apart. In addition, there is a distance of 55 dots from the center of target 1 (1124) to the first clockmark dot 1126 in the upper clockmark region, and a distance of 55 dots from the center of the target to the first clockmark dot in the lower clockmark region (not shown). The first black clockmark in both regions begins directly in line with the target center (the 8th dot position is the center of the 15 dot-wide target). The simplified schematic illustrations of FIG. 55 illustrates the distances between target centers as well as the distance from Target 1 (1124) to the first dot of the first black clockmark (1126) in the upper border/clockmark region. Since there is a distance of 55 dots to the clockmarks from both the upper and lower targets, and both sides of the alternative Artcard are symmetrical (rotated through 180 degrees), the card can be read left-to-right or right-to-left Regardless of reading direction, the orientation does need to be determined in order to extract the data from the data region. Orientation Columns As illustrated in FIG. 56, there are two 1 dot wide Orientation Columns 1127, 1128 in each data block: one directly to the left and one directly to the right of the data region. The Orientation Columns are present to give orientation information to an alternative Artcard reader: On the left side of the data region (to the right of the Left Targets) is a single column of white dots 1127. On the right side of the data region (to the left of the Right Targets) is a single column of black dots 1128. Since the targets are rotation invariant, these two columns of dots allow an alternative Artcard reader to determine the orientation of the alternative Artcard—has the card been inserted the right way, or back to front. From the alternative Artcard reader's point of view, assuming no degradation to the dots, there are two possibilities: If the column of dots to the left of the data region is white, and the column to the right of the data region is black, then the reader will know that the card has been inserted the same way as it was written. If the column of dots to the left of the data region is black, and the column to the right of the data region is white, then the reader will know that the card has been inserted backwards, and the data region is appropriately rotated. The reader must take appropriate action to correctly recover the information from the alternative Artcard. Data Region As shown in FIG. 57, the data region of a data block consists of 595 columns of 384 dots each, for a total of 228,480 dots. These dots must be interpreted and decoded to yield the original data. Each dot represents a single bit, so the 228,480 dots represent 228,480 bits, or 28,560 bytes. The interpretation of each dot can be as follows: Black 1 White 0 The actual interpretation of the bits derived from the dots, however, requires understanding of the mapping from the original data to the dots in the data regions of the alternative Artcard. Mapping Original Data to Data Region Dots There will now be described the process of taking an original data file of maximum size 910,082 bytes and mapping it to the dots in the data regions of the 64 data blocks on a 1600 dpi alternative Artcard. An alternative Artcard reader would reverse the process in order to extract the original data from the dots on an alternative Artcard. At first glance it seems trivial to map data onto dots: binary data is comprised of 1s and 0s, so it would be possible to simply write black and white dots onto the card. This scheme however, does not allow for the fact that ink can fade, parts of a card may be damaged with dirt, grime, or even scratches. Without error-detection encoding, there is no way to detect if the data retrieved from the card is correct. And without redundancy encoding, there is no way to correct the detected errors. The aim of the mapping process then, is to make the data recovery highly robust, and also give the alternative Artcard reader the ability to know it read the data correctly. There are three basic steps involved in mapping an original data file to data region dots: Redundancy encode the original data Shuffle the encoded data in a deterministic way to reduce the effect of localized alternative Artcard damage Write out the shuffled, encoded data as dots to the data blocks on the alternative Artcard Each of these steps is examined in detail in the following sections. Redundancy Encode using Reed-Solomon Encoding The mapping of data to alternative Artcard dots relies heavily on the method of redundancy encoding employed. Reed-Solomon encoding is preferably chosen for its ability to deal with burst errors and effectively detect and correct errors using a minimum of redundancy. Reed Solomon encoding is adequately discussed in the standard texts such as Wicker, S., and Bhargava, V., 1994, Reed-Solomon Codes and their Applications, IEEE Press. Rorabaugh, C, 1996, Error Coding Cookbook, McGraw-Hill. Lyppens, H., 1997, Reed-Solomon Error Correction, Dr. Dobb's Journal, January 1997 (Volume 22, Issue 1). A variety of different parameters for Reed-Solomon encoding can be used, including different symbol sizes and different levels of redundancy. Preferably, the following encoding parameters are used: m=8 t=64 Having m=8 means that the symbol size is 8 bits (1 byte). It also means that each Reed-Solomon encoded block size n is 255 bytes (28−1 symbols). In order to allow correction of up to t symbols, 2t symbols in the final block size must be taken up with redundancy symbols. Having t=64 means that 64 bytes (symbols) can be corrected per block if they are in error. Each 255 byte block therefore has 128 (2×64) redundancy bytes, and the remaining 127 bytes (k=127) are used to hold original data. Thus: n=255 k=127 The practical result is that 127 bytes of original data are encoded to become a 255-byte block of Reed-Solomon encoded data. The encoded 255-byte blocks are stored on the alternative Artcard and later decoded back to the original 127 bytes again by the alternative Artcard reader. The 384 dots in a single column of a data block's data region can hold 48 bytes (384/8). 595 of these columns can hold 28,560 bytes. This amounts to 112 Reed-Solomon blocks (each block having 255 bytes). The 64 data blocks of a complete alternative Artcard can hold a total of 7168 Reed-Solomon blocks (1,827,840 bytes, at 255 bytes per Reed-Solomon block). Two of the 7,168 Reed-Solomon blocks are reserved for control information, but the remaining 7166 are used to store data. Since each Reed-Solomon block holds 127 bytes of actual data, the total amount of data that can be stored on an alternative Artcard is 910,082 bytes (7166×127). If the original data is less than this amount, the data can be encoded to fit an exact number of Reed-Solomon blocks, and then the encoded blocks can be replicated until all 7,166 are used. FIG. 58 illustrates the overall form of encoding utilised. Each of the 2 Control blocks 1132, 1133 contain the same encoded information required for decoding the remaining 7,166 Reed-Solomon blocks: The number of Reed-Solomon blocks in a full message (16 bits stored lo/hi), and The number of data bytes in the last Reed-Solomon block of the message (8 bits) These two numbers are repeated 32 times (consuming. 96 bytes) with the remaining 31 bytes reserved and set to 0. Each control block is then Reed-Solomon encoded, turning the 127 bytes of control information into 255 bytes of Reed-Solomon encoded data. The Control Block is stored twice to give greater chance of it surviving. In addition, the repetition of the data within the Control Block has particular significance when using Reed-Solomon encoding. In an uncorrupted Reed-Solomon encoded block, the first 127 bytes of data are exactly the original data, and can be looked at in an attempt to recover the original message if the Control Block fails decoding (more than 64 symbols are corrupted). Thus, if a Control Block fails decoding, it is possible to examine sets of 3 bytes in an effort to determine the most likely values for the 2 decoding parameters. It is not guaranteed to be recoverable, but it has a better chance through redundancy. Say the last 159 bytes of the Control Block are destroyed, and the first 96 bytes are perfectly ok. Looking at the first 96 bytes will show a repeating set of numbers. These numbers can be sensibly used to decode the remainder of the message in the remaining 7,166 Reed-Solomon blocks. By way of example, assume a data file containing exactly 9,967 bytes of data. The number of Reed-Solomon blocks required is 79. The first 78 Reed-Solomon blocks are completely utilized, consuming 9,906 bytes (78×127). The 79th block has only 61 bytes of data (with the remaining 66 bytes all 0s). The alternative Artcard would consist of 7,168 Reed-Solomon blocks. The first 2 blocks would be Control Blocks, the next 79 would be the encoded data, the next 79 would be a duplicate of the encoded data, the next 79 would be another duplicate of the encoded data, and so on. After storing the 79 Reed-Solomon blocks 90 times, the remaining 56 Reed-Solomon blocks would be another duplicate of the first 56 blocks from the 79 blocks of encoded data (the final 23 blocks of encoded data would not be stored again as there is not enough room on the alternative Artcard). A hex representation of the 127 bytes in each Control Block data before being Reed-Solomon encoded would be as illustrated in FIG. 59. Scramble the Encoded Data Assuming all the encoded blocks have been stored contiguously in memory, a maximum 1,827,840 bytes of data can be stored on the alternative Artcard (2 Control Blocks and 7,166 information blocks, totalling 7,168 Reed-Solomon encoded blocks). Preferably, the data is not directly stored onto the alternative Artcard at this stage however, or all 255 bytes of one Reed-Solomon block will be physically together on the card. Any dirt, grime, or stain that causes physical damage to the card has the potential of damaging more than 64 bytes in a single Reed-Solomon block, which would make that block unrecoverable. If there are no duplicates of that Reed-Solomon block, then the entire alternative Artcard cannot be decoded. The solution is to take advantage of the fact that there are a large number of bytes on the alternative Artcard, and that the alternative Artcard has a reasonable physical size. The data can therefore be scrambled to ensure that symbols from a single Reed-Solomon block are not in close proximity to one another. Of course pathological cases of card degradation can cause Reed-Solomon blocks to be unrecoverable, but on average, the scrambling of data makes the card much more robust. The scrambling scheme chosen is simple and is illustrated schematically in FIG. 14. All the Byte 0s from each Reed-Solomon block are placed together 1136, then all the Byte 1s etc. There will therefore be 7,168 byte 0's, then 7,168 Byte 1's etc. Each data block on the alternative Artcard can store 28,560 bytes. Consequently there are approximately 4 bytes from each Reed-Solomon block in each of the 64 data blocks on the alternative Artcard. Under this scrambling scheme, complete damage to 16 entire data blocks on the alternative Artcard will result in 64 symbol errors per Reed-Solomon block. This means that if there is no other damage to the alternative Artcard, the entire data is completely recoverable, even if there is no data duplication. Write the Scrambled Encoded Data to the Alternative Artcard Once the original data has been Reed-Solomon encoded, duplicated, and scrambled, there are 1,827,840 bytes of data to be stored on the alternative Artcard. Each of the 64 data blocks on the alternative Artcard stores 28,560 bytes. The data is simply written out to the alternative Artcard data blocks so that the first data block contains the first 28,560 bytes of the scrambled data, the second data block contains the next 28,560 bytes etc. As illustrated in FIG. 61, within a data block, the data is written out column-wise left to right. Thus the left-most column within a data block contains the first 48 bytes of the 28,560 bytes of scrambled data, and the last column contains the last 48 bytes of the 28,560 bytes of scrambled data. Within a column, bytes are written out top to bottom, one bit at a time, starting from bit 7 and finishing with bit 0. If the bit is set (1), a black dot is placed on the alternative Artcard, if the bit is clear (0), no dot is placed, leaving it the white background color of the card. For example, a set of 1,827,840 bytes of data can be created by scrambling 7,168 Reed-Solomon encoded blocks to be stored onto an alternative Artcard. The first 28,560 bytes of data are written to the first data block. The first 48 bytes of the first 28,560 bytes are written to the first column of the data block, the next 48 bytes to the next column and so on. Suppose the first two bytes of the 28,560 bytes are hex D3 5F. Those first two bytes will be stored in column 0 of the data block. Bit 7 of byte 0 will be stored first, then bit 6 and so on. Then Bit 7 of byte 1 will be stored through to bit 0 of byte 1. Since each “1” is stored as a black dot, and each “0” as a white dot, these two bytes will be represented on the alternative Artcard as the following set of dots: D3 (1101 0011) becomes: black, black, white, black, white, white, black, black 5F (0101 1111) becomes: white, black, white, black, black, black, black, black Decoding an Alternative Artcard This section deals with extracting the original data from an alternative Artcard in an accurate and robust manner. Specifically, it assumes the alternative Artcard format as described in the previous chapter, and describes a method of extracting the original pre-encoded data from the alternative Artcard. There are a number of general considerations that are part of the assumptions for decoding an alternative Artcard. User The purpose of an alternative Artcard is to store data for use in different applications. A user inserts an alternative Artcard into an alternative Artcard reader, and expects the data to be loaded in a “reasonable time”. From the user's perspective, a motor transport moves the alternative Artcard into an alternative Artcard reader. This is not perceived as a problematic delay, since the alternative Artcard is in motion. Any time after the alternative Artcard has stopped is perceived as a delay, and should be minimized in any alternative Artcard reading scheme. Ideally, the entire alternative Artcard would be read while in motion, and thus there would be no perceived delay after the card had stopped moving. For the purpose of the preferred embodiment, a reasonable time for an alternative Artcard to be physically loaded is defined to be 1.5 seconds. There should be a minimization of time for additional decoding after the alternative Artcard has stopped moving. Since the Active region of an alternative Artcard covers most of the alternative Artcard surface we can limit our timing concerns to that region. Sampling Dots The dots on an alternative Artcard must be sampled by a CCD reader or the like at least at double the printed resolution to satisfy Nyquist's Theorem. In practice it is better to sample at a higher rate than this. In the alternative Artcard reader environment, dots are preferably sampled at 3 times their printed resolution in each dimension, requiring 9 pixels to define a single dot. If the resolution of the alternative Artcard dots is 1600 dpi, the alternative Artcard reader's image sensor must scan pixels at 4800 dpi. Of course if a dot is not exactly aligned with the sampling sensor, the worst and most likely case as illustrated in FIG. 62, is that a dot will be sensed over a 4×4 pixel area. Each sampled pixel is 1 byte (8 bits). The lowest 2 bits of each pixel can contain significant noise. Decoding algorithms must therefore be noise tolerant. Alignment/Rotation It is extremely unlikely that a user will insert an alternative Artcard into an alternative Artcard reader perfectly aligned with no rotation. Certain physical constraints at a reader entrance and motor transport grips will help ensure that once inserted, an alternative Artcard will stay at the original angle of insertion relative to the CCD. Preferably this angle of rotation, as illustrated in FIG. 63 is a maximum of 1 degree. There can be some slight aberrations in angle due to jitter and motor rumble during the reading process, but these are assumed to essentially stay within the 1-degree limit. The physical dimensions of an alternative Artcard are 86 mm×55 mm. A 1 degree rotation adds 1.5 mm to the effective height of the card as 86 mm passes under the CCD (86 sin 1°), which will affect the required CCD length. The effect of a 1 degree rotation on alternative Artcard reading is that a single scanline from the CCD will include a number of different columns of dots from the alternative Artcard. This is illustrated in an exaggerated form in FIG. 63 which shows the drift of dots across the columns of pixels. Although exaggerated in this diagram, the actual drift will be a maximum 1 pixel column shift every 57 pixels. When an alternative Artcard is not rotated, a single column of dots can be read over 3 pixel scanlines. The more an alternative Artcard is rotated, the greater the local effect. The more dots being read, the longer the rotation effect is applied. As either of these factors increase, the larger the number of pixel scanlines that are needed to be read to yield a given set of dots from a single column on an alternative Artcard. The following table shows how many pixel scanlines are required for a single column of dots in a particular alternative Artcard structure. Region Height 0° rotation 1° rotation Active region 3208 dots 3 pixel columns 168 pixel columns Data block 394 dots 3 pixel columns 21 pixel columns To read an entire alternative Artcard, we need to read 87 mm (86 mm+1 mm due to 1° rotation). At 4800 dpi this implies 16,252 pixel columns. CCD (or other Linear Image Sensor) Length The length of the CCD itself must accommodate: the physical height of the alternative Artcard (55 mm), vertical slop on physical alternative Artcard insertion (1 mm) insertion rotation of up to 1 degree (86 sin 1°=1.5 mm) These factors combine to form a total length of 57.5 mm. When the alternative Artcard Image sensor CCD in an alternative Artcard reader scans at 4800 dpi, a single scanline is 10,866 pixels. For simplicity, this figure has been rounded up to 11,000 pixels. The Active Region of an alternative Artcard has a height of 3208 dots, which implies 9,624 pixels. A Data Region has a height of 384 dots, which implies 1,152 pixels. DRAM Size The amount of memory required for alternative Artcard reading and decoding is ideally minimized. The typical placement of an alternative Artcard reader is an embedded system where memory resources are precious. This is made more problematic by the effects of rotation. As described above, the more an alternative Artcard is rotated, the more scanlines are required to effectively recover original dots. There is a trade-off between algorithmic complexity, user perceived delays, robustness, and memory usage. One of the simplest reader algorithms would be to simply scan the whole alternative Artcard, and then to process the whole data without real-time constraints. Not only would this require huge reserves of memory, it would take longer than a reader algorithm that occurred concurrently with the alternative Artcard reading process. The actual amount of memory required for reading and decoding an alternative Artcard is twice the amount of space required to hold the encoded data, together with a small amount of scratch space (1-2 KB). For the 1600 dpi alternative Artcard, this implies a 4 MB memory requirement. The actual usage of the memory is detailed in the following algorithm description. Transfer Rate DRAM bandwidth assumptions need to be made for timing considerations and to a certain extent affect algorithmic design, especially since alternative Artcard readers are typically part of an embedded system. A standard Rambus Direct RDRAM architecture is assumed, as defined in Rambus Inc, October 1997, Direct Rambus Technology Disclosure, with a peak data transfer rate of 1.6 GB/sec. Assuming 75% efficiency (easily achieved), we have an average of 1.2 GB/sec data transfer rate. The average time to access a block of 16 bytes is therefore 12 ns. Dirty Data Physically damaged alternative Artcards can be inserted into a reader. Alternative Artcards may be scratched, or be stained with grime or dirt. A alternative Artcard reader can't assume to read everything perfectly. The effect of dirty data is made worse by blurring, as the dirty data affects the surrounding clean dots. Blurry Environment There are two ways that blurring is introduced into the alternative Artcard reading environment: Natural blurring due to nature of the CCD's distance from the alternative Artcard. Warping of alternative Artcard Natural blurring of an alternative Artcard image occurs when there is overlap of sensed data from the CCD. Blurring can be useful, as the overlap ensures there are no high frequencies in the sensed data, and that there is no data missed by the CCD. However if the area covered by a CCD pixel is too large, there will be too much blurring and the sampling required to recover the data will not be met FIG. 64 is a schematic illustration of the overlapping of sensed data. Another form of blurring occurs when an alternative Artcard is slightly warped due to heat damage. When the warping is in the vertical dimension, the distance between the alternative Artcard and the CCD will not be constant, and the level of blurring will vary across those areas. Black and white dots were chosen for alternative Artcards to give the best dynamic range in blurry reading environments. Blurring can cause problems in attempting to determine whether a given dot is black or white. As the blurring increases, the more a given dot is influenced by the surrounding dots. Consequently the dynamic range for a particular dot decreases. Consider a white dot and a black dot, each surrounded by all possible sets of dots. The 9 dots are blurred, and the center dot sampled. FIG. 65 shows the distribution of resultant center dot values for black and white dots. The diagram is intended to be a representative blurring. The curve 1140 from 0 to around 180 shows the range of black dots. The curve 1141 from 75 to 250 shows the range of white dots. However the greater the blurring, the more the two curves shift towards the center of the range and therefore the greater the intersection area, which means the more difficult it is to determine whether a given dot is black or white. A pixel value at the center point of intersection is ambiguous —the dot is equally likely to be a black or a white. As the blurring increases, the likelihood of a read bit error increases. Fortunately, the Reed-Solomon decoding algorithm can cope with these gracefully up to t symbol errors. FIG. 65 is a graph of number predicted number of alternative Artcard Reed-Solomon blocks that cannot be recovered given a particular symbol error rate. Notice how the Reed-Solomon decoding scheme performs well and then substantially degrades. If there is no Reed-Solomon block duplication, then only 1 block needs to be in error for the data to be unrecoverable. Of course, with block duplication the chance of an alternative Artcard decoding increases. FIG. 66 only illustrates the symbol (byte) errors corresponding to the number of Reed-Solomon blocks in error. There is a trade-off between the amount of blurring that can be coped with, compared to the amount of damage that has been done to a card. Since all error detection and correction is performed by a Reed-Solomon decoder, there is a finite number of errors per Reed-Solomon data block that can be coped with. The more errors introduced through blurring, the fewer the number of errors that can be coped with due to alternative Artcard damage. Overview of Alternative Artcard Decoding As noted previously, when the user inserts an alternative Artcard into an alternative Artcard reading unit, a motor transport ideally carries the alternative Artcard past a monochrome linear CCD image sensor. The card is sampled in each dimension at three times the printed resolution. Alternative Artcard reading hardware and software compensate for rotation up to 1 degree, jitter and vibration due to the motor transport, and blurring due to variations in alternative Artcard to CCD distance. A digital bit image of the data is extracted from the sampled image by a complex method described here. Reed-Solomon decoding corrects arbitrarily distributed data corruption of up to 25% of the raw data on the alternative Artcard. Approximately 1 MB of corrected data is extracted from a 1600 dpi card. The steps involved in decoding are so as indicated in FIG. 67. The decoding process requires the following steps: Scan 1144 the alternative Artcard at three times printed resolution (eg scan 1600 dpi alternative Artcard at 4800 dpi) Extract 1145 the data bitmap from the scanned dots on the card. Reverse 1146 the bitmap if the alternative Artcard was inserted backwards. Unscramble 1147 the encoded data Reed-Solomon 1148 decode the data from the bitmap Algorithmic Overview Phase 1—Real Time Bit Image Extraction A simple comparison between the available memory (4 MB) and the memory required to hold all the scanned pixels for a 1600 dpi alternative Artcard (172.5 MB) shows that unless the card is read multiple times (not a realistic option), the extraction of the bitmap from the pixel data must be done on the fly, in real time, while the alternative Artcard is moving past the CCD. Two tasks must be accomplished in this phase: Scan the alternative Artcard at 4800 dpi Extract the data bitmap from the scanned dots on the card The rotation and unscrambling of the bit image cannot occur until the whole bit image has been extracted. It is therefore necessary to assign a memory region to hold the extracted bit image. The bit image fits easily within 2 MB, leaving 2 MB for use in the extraction process. Rather than extracting the bit image while looking only at the current scanline of pixels from the CCD, it is possible to allocate a buffer to act as a window onto the alternative Artcard, storing the last N scanlines read. Memory requirements do not allow the entire alternative Artcard to be stored this way (172.5 MB would be required), but allocating 2 MB to store 190 pixel columns (each scanline takes less than 11,000 bytes) makes the bit image extraction process simpler. The 4 MB memory is therefore used as follows: 2 MB for the extracted bit image ˜2 MB for the scanned pixels 1.5 KB for Phase 1 scratch data (as required by algorithm) The time taken for Phase 1 is 1.5 seconds, since this is the time taken for the alternative Artcard to travel past the CCD and physically load. Phase 2—Data Extraction from Bit Image Once the bit image has been extracted, it must be unscrambled and potentially rotated 180°. It must then be decoded. Phase 2 has no real-time requirements, in that the alternative Artcard has stopped moving, and we are only concerned with the user's perception of elapsed time. Phase 2 therefore involves the remaining tasks of decoding an alternative Artcard: Re-organize the bit image, reversing it if the alternative Artcard was inserted backwards Unscramble the encoded data Reed-Solomon decode the data from the bit image The input to Phase 2 is the 2 MB bit image buffer. Unscrambling and rotating cannot be performed in situ, so a second 2 MB buffer is required. The 2 MB buffer used to hold scanned pixels in Phase 1 is no longer required and can be used to store the rotated unscrambled data. The Reed-Solomon decoding task takes the unscrambled bit image and decodes it to 910,082 bytes. The decoding can be performed in situ, or to a specified location elsewhere. The decoding process does not require any additional memory buffers. The 4 MB memory is therefore used as follows: 2 MB for the extracted bit image (from Phase 1) ˜2 MB for the unscrambled, potentially rotated bit image <1 KB for Phase 2 scratch data (as required by algorithm) The time taken for Phase 2 is hardware dependent and is bound by the time taken for Reed-Solomon decoding. Using a dedicated core such as LSI Logic's L64712, or an equivalent CPU/DSP combination, it is estimated that Phase 2 would take 0.32 seconds. Phase 1—Extract Bit Image This is the real-time phase of the algorithm, and is concerned with extracting the bit image from the alternative Artcard as scanned by the CCD. As shown in FIG. 68 Phase 1 can be divided into 2 asynchronous process streams. The first of these streams is simply the real-time reader of alternative Artcard pixels from the CCD, writing the pixels to DRAM. The second stream involves looking at the pixels, and extracting the bits. The second process stream is itself divided into 2 processes. The first process is a global process, concerned with locating the start of the alternative Artcard. The second process is the bit image extraction proper. FIG. 69 illustrates the data flow from a data/process perspective. Timing For an entire 1600 dpi alternative Artcard, it is necessary to read a maximum of 16,252 pixel-columns. Given a total time of 1.5 seconds for the whole alternative Artcard, this implies a maximum time of 92,296 ns per pixel column during the course of the various processes. Process 1 —Read Pixels from CCD The CCD scans the alternative Artcard at 4800 dpi, and generates 11,000 1-byte pixel samples per column. This process simply takes the data from the CCD and writes it to DRAM, completely independently of any other process that is reading the pixel data from DRAM. FIG. 70 illustrates the steps involved. The pixels are written contiguously to a 2 MB buffer that can hold 190 full columns of pixels. The buffer always holds the 190 columns most recently read. Consequently, any process that wants to read the pixel data (such as Processes 2 and 3) must firstly know where to look for a given column, and secondly, be fast enough to ensure that the data required is actually in the buffer. Process 1 makes the current scanline number (CurrentScanLine) available to other processes so they can ensure they are not attempting to access pixels from scanlines that have not been read yet The time taken to write out a single column of data (11,000 bytes) to DRAM is: 11,000/16*12=8,256 ns Process 1 therefore uses just under 9% of the available DRAM bandwidth (8256/92296). Process 2 —Detect Start of Alternative Artcard This process is concerned with locating the Active Area on a scanned alternative Artcard. The input to this stage is the pixel data from DRAM (placed there by Process 1). The output is a set of bounds for the first 8 data blocks on the alternative Artcard, required as input to Process 3. A high level overview of the process can be seen in FIG. 71. An alternative Artcard can have vertical slop of 1 mm upon insertion. With a rotation of 1 degree there is further vertical slop of 1.5 mm (86 sin 1°). Consequently there is a total vertical slop of 2.5 mm. At 1600 dpi, this equates to a slop of approximately 160 dots. Since a single data block is only 394 dots high, the slop is just under half a data block. To get a better estimate of where the data blocks are located the alternative Artcard itself needs to be detected. Process 2 therefore consists of two parts: Locate the start of the alternative Artcard, and if found, Calculate the bounds of the first 8 data blocks based on the start of the alternative Artcard. Locate the Start of the Alternative Artcard The scanned pixels outside the alternative Artcard area are black (the surface can be black plastic or some other non-reflective surface). The border of the alternative Artcard area is white. If we process the pixel columns one by one, and filter the pixels to either black or white, the transition point from black to white will mark the start of the alternative Artcard. The highest level process is as follows: for (Column=0; Column < MAX_COLUMN; Column++) { Pixel = ProcessColumn(Column) if (Pixel) return (Pixel, Column) // success! } return failure // no alternative Artcard found The ProcessColumn function is simple. Pixels from two areas of the scanned column are passed through a threshold filter to determine if they are black or white. It is possible to then wait for a certain number of white pixels and announce the start of the alternative Artcard once the given number has been detected. The logic of processing a pixel column is shown in the following pseudocode. 0 is returned if the alternative Artcard has not been detected during the column. Otherwise the pixel number of the detected location is returned. //Try upper region first count = 0 for (i=0; i<UPPER_REGION_BOUND; i++) { if (GetPixel(column, i) < THRESHOLD) { count = 0 // pixel is black } else { count++ // pixel is white if (count > WHITE_ALTERNATIVE ARTCARD) return i } } //Try lower region next. Process pixels in reverse count = 0 for (i=MAX_PIXEL_BOUND; i>LOWER_REGION_BOUND; i--) { if(GetPixel(column, i) < THRESHOLD) { count = 0 // pixel is black } else { count++ // pixel is white if (count > WHITE_ALTERNATIVE ARTCARD) return i } } //Not in upper bound or in lower bound. Return failure return 0 Calculate Data Block Bounds At this stage, the alternative Artcard has been detected. Depending on the rotation of the alternative Artcard, either the top of the alternative Artcard has been detected or the lower part of the alternative Artcard has been detected. The second step of Process 2 determines which was detected and sets the data block bounds for Phase 3 appropriately. A look at Phase 3 reveals that it works on data block segment bounds: each data block has a StartPixel and an EndPixel to determine where to look for targets in order to locate the data block's data region. If the pixel value is in the upper half of the card, it is possible to simply use that as the first StartPixel bounds. If the pixel value is in the lower half of the card, it is possible to move back so that the pixel value is the last segment's EndPixel bounds. We step forwards or backwards by the alternative Artcard data size, and thus set up each segment with appropriate bounds. We are now ready to begin extracting data from the alternative Artcard. // Adjust to become first pixel if is lower pixel if (pixel > LOWER_REGION_BOUND) { pixel −= 6* 1152 if (pixel < 0) pixel = 0 } for (i=0; i<6; i++) { endPixel = pixel + 1152 segment[i].MaxPixel = MAX_PIXEL_BOUND segment[i].SetBounds(pixel, endPixel) pixel = endPixel } The MaxPixel value is defined in Process 3, and the SetBounds function simply sets StartPixel and EndPixel clipping with respect to 0 and MaxPixel. Process 3 —Extract Bit Data from Pixels This is the heart of the alternative Artcard Reader algorithm. This process is concerned with extracting the bit data from the CCD pixel data. The process essentially creates a bit-image from the pixel data, based on scratch information created by Process 2, and maintained by Process 3. A high level overview of the process can be seen in FIG. 72. Rather than simply read an alternative Artcard's pixel column and determine what pixels belong to what data block, Process 3 works the other way around. It knows where to look for the pixels of a given data block. It does this by dividing a logical alternative Artcard into 8 segments, each containing 8 data blocks as shown in FIG. 73. The segments as shown match the logical alternative Artcard. Physically, the alternative Artcard is likely to be rotated by some amount The segments remain locked to the logical alternative Artcard structure, and hence are rotation-independent. A given segment can have one of two states: LookingForTargets: where the exact data block position for this segment has not yet been determined. Targets are being located by scanning pixel column data in the bounds indicated by the segment bounds. Once the data block has been located via the targets, and bounds set for black & white, the state changes to ExtractingBitImage. ExtractingBitImage: where the data block has been accurately located, and bit data is being extracted one dot column at a time and written to the alternative Artcard bit image. The following of data block clockmarks gives accurate dot recovery regardless of rotation, and thus the segment bounds are ignored. Once the entire data block has been extracted, new segment bounds are calculated for the next data block based on the current position. The state changes to LookingForTargets. The process is complete when all 64 data blocks have been extracted, 8 from each region. Each data block consists of 595 columns of data, each with 48 bytes. Preferably, the 2 orientation columns for the data block are each extracted at 48 bytes each, giving a total of 28,656 bytes extracted per data block. For simplicity, it is possible to divide the 2 MB of memory into 64×32 k chunks. The nth data block for a given segment is stored at the location: StartBuffer+(256 k*n) Data Structure for Segments Each of the 8 segments has an associated data structure. The data structure defining each segment is stored in the scratch data area. The structure can be as set out in the following table: DataName Comment CurrentState Defines the current state of the segment. Can be one of: LookingForTargets ExtractingBitImage Initial value is LookingForTargets Used during LookingForTargets: StartPixel Upper pixel bound of segment. Initially set by Process 2. EndPixel Lower pixel bound of segment. Initially set by Process 2 MaxPixel The maximum pixel number for any scanline. It is set to the same value for each segment: 10,866. CurrentColumn Pixel column we're up to while looking for targets. FinalColumn Defines the last pixel column to look in for targets. LocatedTargets Points to a list of located Targets. PossibleTargets Points to a set of pointers to Target structures that represent currently investigated pixel shapes that may be targets AvailableTargets Points to a set of pointers to Target structures that are currently unused. TargetsFound The number of Targets found so far in this data block. PossibleTargetCount The number of elements in the PossibleTargets list AvailabletargetCount The number of elements in the AvailableTargets list Used during ExtractingBitImage: BitImage The start of the Bit Image data area in DRAM where to store the next data block: Segment 1 = X, Segment 2 = X + 32k etc Advances by 256k each time the state changes from ExtractingBitImageData to Looking ForTargets CurrentByte Offset within BitImage where to store next extracted byte CurrentDotColumn Holds current clockmark/dot column number. Set to −8 when transitioning from state LookingForTarget to ExtractingBitImage. UpperClock Coordinate (column/pixel) of current upper clockmark/border LowerClock Coordinate (column/pixel) of current lower clockmark/border CurrentDot The center of the current data dot for the current dot column. Initially set to the center of the first (topmost) dot of the data column. DataDelta What to add (column/pixel) to CurrentDot to advance to the center of the next dot. BlackMax Pixel value above which a dot is definitely white WhiteMin Pixel value below which a dot is definitely black MidRange The pixel value that has equal likelihood of coming from black or white. When all smarts have not determined the dot, this value is used to determine it. Pixels below this value are black, and above it are white. High Level of Process 3 Process 3 simply iterates through each of the segments, performing a single line of processing depending on the segment's current state. The pseudocode is straightforward: blockCount = 0 while (blockCount < 64) for (i=0; i<8; i++) { finishedBlock = segment[i].ProcessState( ) if (finishedBlock) blockCount++ } Process 3 must be halted by an external controlling process if it has not terminated after a specified amount of time. This will only be the case if the data cannot be extracted. A simple mechanism is to start a countdown after Process 1 has finished reading the alternative Artcard. If Process 3 has not finished by that time, the data from the alternative Artcard cannot be recovered. CurrentState=LookingForTargets Targets are detected by reading columns of pixels, one pixel-column at a time rather than by detecting dots within a given band of pixels (between StartPixel and EndPixel) certain patterns of pixels are detected. The pixel columns are processed one at a time until either all the targets are found, or until a specified number of columns have been processed. At that time the targets can be processed and the data area located via clockmarks. The state is changed to ExtractingBitImage to signify that the data is now to be extracted. If enough valid targets are not located, then the data block is ignored, skipping to a column definitely within the missed data block, and then beginning again the process of looking for the targets in the next data block. This can be seen in the following pseudocode: finishedBlock = FALSE if(CurrentColumn < Process1.CurrentScanLine) { ProcessPixelColumn( ) CurrentColumn++ } if ((TargetsFound == 6) ∥ (CurrentColumn > LastColumn)) { if (TargetsFound >= 2) ProcessTargets( ) if (TargetsFound >= 2) { BuildClockmarkEstimates( ) SetBlackAndWhiteBounds( ) CurrentState = ExtractingBitImage CurrentDotColumn = −8 } else { // data block cannot be recovered. Look for // next instead. Must adjust pixel bounds to // take account of possible 1 degree rotation. finishedBlock = TRUE SetBounds(StartPixel−12, EndPixel+12) BitImage += 256KB CurrentByte = 0 LastColumn += 1024 TargetsFound = 0 } } return finishedBlock ProcessPixelColumn Each pixel column is processed within the specified bounds (between StartPixel and EndPixel) to search for certain patterns of pixels which will identify the targets. The structure of a single target (target number 2) is as previously shown in FIG. 54: From a pixel point of view, a target can be identified by: Left black region, which is a number of pixel columns consisting of large numbers of contiguous black pixels to build up the first part of the target. Target center, which is a white region in the center of further black columns Second black region, which is the 2 black dot columns after the target center Target number, which is a black-surrounded white region that defines the target number by its length Third black region, which is the 2 black columns after the target number An overview of the required process is as shown in FIG. 74. Since identification only relies on black or white pixels, the pixels 1150 from each column are passed through a filter 1151 to detect black or white, and then run length encoded 1152. The run-lengths are then passed to a state machine 1153 that has access to the last 3 run lengths and the 4th last color. Based on these values, possible targets pass through each of the identification stages. The GatherMin&Max process 1155 simply keeps the minimum & maximum pixel values encountered during the processing of the segment. These are used once the targets have been located to set BlackMax, WhiteMin, and MidRange values. Each segment keeps a set of target structures in its search for targets. While the target structures themselves don't move around in memory, several segment variables point to lists of pointers to these target structures. The three pointer lists are repeated here: LocatedTargets Points to a set of Target structures that represent located targets. PossibleTargets Points to a set of pointers to Target structures that represent currently investigated pixel shapes that may be targets. AvailableTargets Points to a set of pointers to Target structures that are currently unused. There are counters associated with each of these list pointers: TargetsFound, PossibleTargetCount, and AvailableTargetCount respectively. Before the alternative Artcard is loaded, TargetsFound and PossibleTargetCount are set to 0, and AvailableTargetCount is set to 28 (the maximum number of target structures possible to have under investigation since the minimum size of a target border is 40 pixels, and the data area is approximately 1152 pixels). An example of the target pointer layout is as illustrated in FIG. 75. As potential new targets are found, they are taken from the AvailableTargets list 1157, the target data structure is updated, and the pointer to the structure is added to the PossibleTargets list 1158. When a target is completely verified, it is added to the LocatedTargets list 1159. If a possible target is found not to be a target after all, it is placed back onto the AvailableTargets list 1157. Consequently there are always 28 target pointers in circulation at any time, moving between the lists. The Target data structure 1160 can have the following form: DataName Comment CurrentState The current state of the target search DetectCount Counts how long a target has been in a given state StartPixel Where does the target start? All the lines of pixels in this target should start within a tolerance of this pixel value. TargetNumber Which target number is this (according to what was read) Column Best estimate of the target's center column ordinate Pixel Best estimate of the target's center pixel ordinate The ProcessPixelColumn function within the find targets module 1162 (FIG. 74) then, goes through all the run lengths one by one, comparing the runs against existing possible targets (via StartPixel), or creating new possible targets if a potential target is found where none was previously known. In all cases, the comparison is only made if S0.color is white and S1.color is black. The pseudocode for the ProcessPixelColumn set out hereinafter. When the first target is positively identified, the last column to be checked for targets can be determined as being within a maximum distance from it For 1° rotation, the maximum distance is 18 pixel columns. pixel = StartPixel t = 0 target=PossibleTarget[t] while ((pixel < EndPixel) && (TargetsFound < 6)) { if ((S0.Color == white) && (S1.Color == black)) { do { keepTrying = FALSE if ( (target != NULL) && (target->AddToTarget(Column, pixel, S1, S2, S3)) ) { if (target->CurrentState == IsATarget) { Remove target from PossibleTargets List Add target to LocatedTargets List TargetsFound++ if (TargetsFound == 1) FinalColumn = Column + MAX_TARGET_DELTA} } else if (target->CurrentState == NotATarget) { Remove target from PossibleTargets List Add target to AvailableTargets List keepTrying = TRUE } else { t++ // advance to next target } target = PossibleTarget[t] } else { tmp = AvailableTargets[0] if (tmp->AddToTarget(Column,pixel,S1,S2,S3) { Remove tmp from AvailableTargets list Add tmp to PossibleTargets list t++ // target t has been shifted right } } } while (keepTrying) } pixel += S1.RunLength Advance S0/S1/S2/S3 } AddToTarget is a function within the find targets module that determines whether it is possible or not to add the specific run to the given target: If the run is within the tolerance of target's starting position, the run is directly related to the current target, and can therefore be applied to it. If the run starts before the target, we assume that the existing target is still ok, but not relevant to the run. The target is therefore left unchanged, and a return value of FALSE tells the caller that the run was not applied. The caller can subsequently check the run to see if it starts a whole new target of its own. If the run starts after the target, we assume the target is no longer a possible target. The state is changed to be NotATarget, and a return value of TRUE is returned. If the run is to be applied to the target, a specific action is performed based on the current state and set of runs in S1, S2, and S3. The AddToTarget pseudocode is as follows: MAX_TARGET_DELTA = 1 if (CurrentState != NothingKnown) { if (pixel > StartPixel) // run starts after target { diff = pixel − StartPixel if (diff > MAX_TARGET_DELTA) { CurrentState = NotATarget return TRUE } } else { diff = StartPixel − pixel if (diff > MAX_TARGET_DELTA) return FALSE } } runType = DetermineRunType(S1, S2, S3) EvaluateState(runType) StartPixel = currentPixel return TRUE Types of pixel runs are identified in DetermineRunType is as follows: Types of Pixel Runs Type How identified (S1 is always black) TargetBorder S1 = 40 < RunLength < 50 S2 = white run TargetCenter S1 = 15 < RunLength < 26 S2 = white run with [RunLength < 12] S3 = black run with [15 < RunLength < 26] TargetNumber S2 = white run with [RunLength <= 40] The EvaluateState procedure takes action depending on the current state and the run type. The actions are shown as follows in tabular form: Type of CurrentState Pixel Run Action NothingKnown TargetBorder DetectCount = 1 CurrentState = LeftOfCenter LeftOfCenter TargetBorder DetectCount++ if (DetectCount > 24) CurrentState = NotATarget TargetCenter DetectCount = 1 CurrentState = InCenter Column = currentColumn Pixel = currentPixel + S1.RunLength CurrentState = NotATarget InCenter TargetCenter DetectCount++ tmp = currentPixel + S1.RunLength if (tmp < Pixel) Pixel = tmp if (DetectCount > 13) CurrentState = NotATarget TargetBorder DetectCount = 1 CurrentState = RightOfCenter CurrentState = NotATarget RightOfCenter TargetBorder DetectCount++ if (DetectCount >= 12) CurrentState = NotATarget TargetNumber DetectCount = 1 CurrentState = InTargetNumber TargetNumber = (S2.RunLength + 2)/6 CurrentState = NotATarget InTargetNumber TargetNumber tmp = (S2.RunLength + 2)/6 if (tmp > TargetNumber) TargetNumber = tmp DetectCount++ if (DetectCount >= 12) CurrentState = NotATarget TargetBorder if (DetectCount >= 3) CurrentState = IsATarget else CurrentState = NotATarget CurrentState = NotATarget IsATarget or — — NotATarget Processing Targets he located targets (in the LocatedTargets list) are stored in the order they were located. Depending on alternative Artcard rotation these targets will be in ascending pixel order or descending pixel order. In addition, the target numbers recovered from the targets may be in error. We may have also have recovered a false target. Before the clockmark estimates can be obtained, the targets need to be processed to ensure that invalid targets are discarded, and valid targets have target numbers fixed if in error (e.g. a damaged target number due to dirt). Two main steps are involved: Sort targets into ascending pixel order Locate and fix erroneous target numbers The first step is simple. The nature of the target retrieval means that the data should already be sorted in either ascending pixel or descending pixel. A simple swap sort ensures that if the 6 targets are already sorted correctly a maximum of 14 comparisons is made with no swaps. If the data is not sorted, 14 comparisons are made, with 3 swaps. The following pseudocode shows the sorting process: for (i = 0; i < TargetsFound−1; i++) { oldTarget = LocatedTargets[i] bestPixel = oldTarget->Pixel best = i j = i+1 while (j<TargetsFound) { if (LocatedTargets[j]-> Pixel < bestPixel) best = j j++ } if (best != i) // move only if necessary LocatedTargets[i] = LocatedTargets[best] LocatedTargets[best] = oldTarget } } Locating and fixing erroneous target numbers is only slightly more complex. One by one, each of the N targets found is assumed to be correct The other targets are compared to this “correct” target and the number of targets that require change should target N be correct is counted. If the number of changes is 0, then all the targets must already be correct. Otherwise the target that requires the fewest changes to the others is used as the base for change. A change is registered if a given target's target number and pixel position do not correlate when compared to the “correct” target's pixel position and target number. The change may mean updating a target's target number, or it may mean elimination of the target. It is possible to assume that ascending targets have pixels in ascending order (since they have already been sorted). kPixelFactor = 1/(55 * 3) bestTarget = 0 bestChanges = TargetsFound + 1 for (i=0; i< TotalTargetsFound; i++) { numberOfChanges = 0; fromPixel = (LocatedTargets[i])->Pixel fromTargetNumber = LocatedTargets[i].TargetNumber for (j=1; j< TotalTargetsFound; j++) { toPixel = LocatedTargets[j]->Pixel deltaPixel = toPixel − fromPixel if (deltaPixel >= 0) deltaPixel += PIXELS_BETWEEN_TARGET_CENTRES/2 else deltaPixel −= PIXELS_BETWEEN_TARGET_CENTRES/2 targetNumber =deltaPixel * kPixelFactor targetNumber += fromTargetNumber if ( (targetNumber < 1)∥(targetNumber > 6) ∥ (targetNumber != LocatedTargets[j]-> TargetNumber) ) numberOfChanges++ } if (numberOfChanges < bestChanges) { bestTarget = i bestChanges = numberOfChanges } if (bestChanges < 2) break; } In most cases this function will terminate with bestChanges=0, which means no changes are required. Otherwise the changes need to be applied. The functionality of applying the changes is identical to counting the changes (in the pseudocode above) until the comparison with targetNumber. The change application is: if ((targetNumber < 1)∥(targetNumber > TARGETS_PER_BLOCK)) { LocatedTargets[j] = NULL TargetsFound−− } else { LocatedTargets[j]-> TargetNumber = targetNumber } At the end of the change loop, the LocatedTargets list needs to be compacted and all NULL targets removed. At the end of this procedure, there may be fewer targets. Whatever targets remain may now be used (at least 2 targets are required) to locate the clockmarks and the data region. Building Clockmark Estimates from Targets As shown previously in FIG. 55, the upper region's first clockmark dot 1126 is 55 dots away from the center of the first target 1124 (which is the same as the distance between target centers). The center of the clockmark dots is a further 1 dot away, and the black border line 1123 is a further 4 dots away from the first clockmark dot. The lower region's first clockmark dot is exactly 7 targets-distance away (7×55 dots) from the upper region's first clockmark dot 1126. It cannot be assumed that Targets 1 and 6 have been located, so it is necessary to use the upper-most and lower-most targets, and use the target numbers to determine which targets are being used. It is necessary at least 2 targets at this point In addition, the target centers are only estimates of the actual target centers. It is to locate the target center more accurately. The center of a target is white, surrounded by black. We therefore want to find the local maximum in both pixel & column dimensions. This involves reconstructing the continuous image since the maximum is unlikely to be aligned exactly on an integer boundary (our estimate). Before the continuous image can be constructed around the target's center, it is necessary to create a better estimate of the 2 target centers. The existing target centers actually are the top left coordinate of the bounding box of the target center. It is a simple process to go through each of the pixels for the area defining the center of the target, and find the pixel with the highest value. There may be more than one pixel with the same maximum pixel value, but the estimate of the center value only requires one pixel. The pseudocode is straightforward, and is performed for each of the 2 targets: CENTER_WIDTH = CENTER_HEIGHT = 12 maxPixel = 0x00 for (i=0; i<CENTER_WIDTH; i++) for (j=0; j<CENTER_HEIGHT; j++) { p = GetPixel(column+i, pixel+j) if (p > maxPixel) { maxPixel = p centerColumn = column + i centerPixel = pixel + j } } Target.Column = centerColumn Target.Pixel = centerPixel At the end of this process the target center coordinates point to the whitest pixel of the target, which should be within one pixel of the actual center. The process of building a more accurate position for the target center involves reconstructing the continuous signal for 7 scanline slices of the target, 3 to either side of the estimated target center. The 7 maximum values found (one for each of these pixel dimension slices) are then used to reconstruct a continuous signal in the column dimension and thus to locate the maximum value in that dimension. // Given estimates column and pixel, determine a // betterColumn and betterPixel as the center of // the target for (y=0; y<7; y++) { for (x=0; x<7; x++) samples[x] = GetPixel(column−3+y, pixel−3+x) FindMax(samples, pos, maxVal) reSamples[y] = maxVal if (y == 3) betterPixel = pos + pixel } FindMax(reSamples, pos, maxVal) betterColumn = pos + column FindMax is a function that reconstructs the original 1 dimensional signal based sample points and returns the position of the maximum as well as the maximum value found. The method of signal reconstruction/resampling used is the Lanczos3 windowed sinc function as shown in FIG. 76. The Lanczos3 windowed sinc function takes 7 (pixel) samples from the dimension being reconstructed, centered around the estimated position x, i.e. at X−3, X−2, X−1, X, X+1, X+2, X+3. We reconstruct points from X−1 to X+1, each at an interval of 0.1, and determine which point is the maximum. The position that is the maximum value becomes the new center. Due to the nature of the kernel, only 6 entries are required in the convolution kernel for points between X and X+1. We use 6 points for X−1 to X and 6 points for X to X+1, requiring 7 points overall in order to get pixel values from X−1 to X+1 since some of the pixels required are the same. Given accurate estimates for the upper-most target from and lower-most target to, it is possible to calculate the position of the first clockmark dot for the upper and lower regions as follows: TARGETS_PER_BLOCK=6 numTargetsDiff=to.TargetNum−from.TargetNum deltaPixel=(to.Pixel−from.Pixel)/numTargetsDiff deltaColumn=(to.Column−from.Column)/numTargetsDiff UpperClock.pixel=from.Pixel−(from.TargetNum*deltaPixel) UpperClock.column=from.Column−(from.TargetNum*deltaColumn) // Given the first dot of the upper clockmark, the // first dot of the lower clockmark is straightforward. LowerClock.pixel = UpperClock.pixel + ((TARGETS_PER_BLOCK+1) * deltaPixel) LowerClock.column = UpperClock.column + ((TARGETS_PER_BLOCK+1) * deltaColumn) This gets us to the first clockmark dot. It is necessary move the column position a further 1 dot away from the data area to reach the center of the clockmark. It is necessary to also move the pixel position a further 4 dots away to reach the center of the border line. The pseudocode values for deltaColumn and deltaPixel are based on a 55 dot distance (the distance between targets), so these deltas must be scaled by {fraction (1/55)} and {fraction (4/55)} respectively before being applied to the clockmark coordinates. This is represented as: kDeltaDotFactor=1/DOTS_BETWEEN_TARGET_CENTRES deltaColumn*=kDeltaDotFactor deltapixel*=4*kDeltaDotFactor UpperClock.pixel−=deltapixel UpperClock.column−=deltaColumn LowerClock.pixel+=deltapixel LowerClock.column+=deltaColumn UpperClock and LowerClock are now valid clockmark estimates for the first clockmarks directly in line with the centers of the targets. Setting Black and White Pixel/Dot Ranges Before the data can be extracted from the data area, the pixel ranges for black and white dots needs to be ascertained. The minimum and maximum pixels encountered during the search for targets were stored in WhiteMin and BlackMax respectively, but these do not represent valid values for these variables with respect to data extraction. They are merely used for storage convenience. The following pseudocode shows the method of obtaining good values for WhiteMin and BlackMax based on the min & max pixels encountered: MinPixel=WhiteMin MaxPixel=BlackMax MidRange=(MinPixel+MaxPixel)/2 WhiteMin=MaxPixel−105 BlackMax=MinPixel+84 CurrentState=ExtractingBitImage The ExtractingBitImage state is one where the data block has already been accurately located via the targets, and bit data is currently being extracted one dot column at a time and written to the alternative Artcard bit image. The following of data block clockmarks/borders gives accurate dot recovery regardless of rotation, and thus the segment bounds are ignored. Once the entire data block has been extracted (597 columns of 48 bytes each; 595 columns of data+2 orientation columns), new segment bounds are calculated for the next data block based on the current position. The state is changed to LookingForTargets. Processing a given dot column involves two tasks: The first task is to locate the specific dot column of data via the clockmarks. The second task is to run down the dot column gathering the bit values, one bit per dot. These two tasks can only be undertaken if the data for the column has been read off the alternative Artcard and transferred to DRAM. This can be determined by checking what scanline Process 1 is up to, and comparing it to the clockmark columns. If the dot data is in DRAM we can update the clockmarks and then extract the data from the column before advancing the clockmarks to the estimated value for the next dot column. The process overview is given in the following pseudocode, with specific functions explained hereinafter. finishedBlock = FALSE if((UpperClock.column < Process1.CurrentScanLine) && (LowerClock.column < Process1.CurrentScanLine)) { DetermineAccurateClockMarks( ) DetermineDataInfo( ) if (CurrentDotColumn >= 0) ExtractDataFromColumn( ) AdvanceClockMarks( ) if (CurrentDotColumn == FINAL_COLUMN) { finishedBlock = TRUE currentState = LookingForTargets SetBounds(UpperClock.pixel, LowerClock.pixel) BitImage += 256KB CurrentByte = 0 TargetsFound = 0 } } return finishedBlock Locating the Dot Column A given dot column needs to be located before the dots can be read and the data extracted. This is accomplished by following the clockmarks/borderline along the upper and lower boundaries of the data block. A software equivalent of a phase-locked-loop is used to ensure that even if the clockmarks have been damaged, good estimations of clockmark positions will be made. FIG. 77 illustrates an example data block's top left which corner reveals that there are clockmarks 3 dots high 1166 extending out to the target area, a white row, and then a black border line. Initially, an estimation of the center of the first black clockmark position is provided (based on the target positions). We use the black border 1168 to achieve an accurate vertical position (pixel), and the clockmark eg. 1166 to get an accurate horizontal position (column). These are reflected in the UpperClock and LowerClock positions. The clockmark estimate is taken and by looking at the pixel data in its vicinity, the continuous signal is reconstructed and the exact center is determined. Since we have broken out the two dimensions into a clockmark and border, this is a simple one-dimensional process that needs to be performed twice. However, this is only done every second dot column, when there is a black clockmark to register against. For the white clockmarks we simply use the estimate and leave it at that. Alternatively, we could update the pixel coordinate based on the border each dot column (since it is always present). In practice it is sufficient to update both ordinates every other column (with the black clockmarks) since the resolution being worked at is so fine. The process therefore becomes: // Turn the estimates of the clockmarks into accurate // positions only when there is a black clockmark // (ie every 2nd dot column, starting from −8) if (Bit0(CurrentDotColumn) == 0) // even column { DetermineAccurateUpperDotCenter( ) DetermineAccurateLowerDotCenter( ) } If there is a deviation by more than a given tolerance (MAX_CLOCKMARK_DEVIATION), the found signal is ignored and only deviation from the estimate by the maximum tolerance is allowed. In this respect the functionality is similar to that of a phase-locked loop. Thus DetermineAccurateUpperDotCenter is implemented via the following pseudocode: // Use the estimated pixel position of // the border to determine where to look for // a more accurate clockmark center. The clockmark // is 3 dots high so even if the estimated position // of the border is wrong, it won't affect the // fixing of the clockmark position. MAX_CLOCKMARK_DEVIATION = 0.5 diff = GetAccurateColumn(UpperClock.column, UpperClock.pixel+(3*PIXELS_PER_DOT)) diff −= UpperClock.column if (diff > MAX_CLOCKMARK_DEVIATION) diff = MAX_CLOCKMARK_DEVIATION else if (diff < −MAX_CLOCKMARK_DEVIATION) diff = −MAX_CLOCKMARK_DEVIATION UpperClock.column += diff // Use the newly obtained clockmark center to // determine a more accurate border position. diff = GetAccuratePixel(UpperClock.column, UpperClock.pixel) diff −= UpperClock.pixel if (diff > MAX_CLOCKMARK_DEVIATION) diff = MAX_CLOCKMARK_DEVIATION else if (diff < −MAX_CLOCKMARK_DEVIATION) diff = −MAX_CLOCKMARK_DEVIATION UpperClock.pixel += diff DetermineAccurateLowerDotCenter is the same, except that the direction from the border to the clockmark is in the negative direction (−3 dots rather than +3 dots). GetAccuratePixel and GetAccurateColumn are functions that determine an accurate dot center given a coordinate, but only from the perspective of a single dimension. Determining accurate dot centers is a process of signal reconstruction and then finding the location where the minimum signal value is found (this is different to locating a target center, which is locating the maximum value of the signal since the target center is white, not black). The method chosen for signal reconstruction/resampling for this application is the Lanczos3 windowed sinc function as previously discussed with reference to FIG. 76. It may be that the clockmark or border has been damaged in some way—perhaps it has been scratched. If the new center value retrieved by the resampling differs from the estimate by more than a tolerance amount, the center value is only moved by the maximum tolerance. If it is an invalid position, it should be close enough to use for data retrieval, and future clockmarks will resynchronize the position. Determining the Center of the First Data Dot and the Deltas to Subsequent Dots Once an accurate UpperClock and LowerClock position has been determined, it is possible to calculate the center of the first data dot (CurrentDot), and the delta amounts to be added to that center position in order to advance to subsequent dots in the column (DataDelta). The first thing to do is calculate the deltas for the dot column. This is achieved simply by subtracting the UpperClock from the LowerClock, and then dividing by the number of dots between the two points. It is possible to actually multiply by the inverse of the number of dots since it is constant for an alternative Artcard, and multiplying is faster. It is possible to use different constants for obtaining the deltas in pixel and column dimensions. The delta in pixels is the distance between the two borders, while the delta in columns is between the centers of the two clockmarks. Thus the function DetermineDataInfo is two parts. The first is given by the pseudocode: kDeltaColumnFactor=1/(DOTS_PER_DATA_COLUMN+2+2−1) kDeltaPixelFactor=1/(DOTS_PER_DATA_COLUMN+5+5−1) delta=LowerClock.column−UpperClock.column DataDelta.column=delta*kDeltaColumnFactor delta=LowerClock.pixel−UpperClock.pixel DataDelta.pixel=delta*kDeltaPixelFactor It is now possible to determine the center of the first data dot of the column. There is a distance of 2 dots from the center of the clockmark to the center of the first data dot, and 5 dots from the center of the border to the center of the first data dot. Thus the second part of the function is given by the pseudocode: CurrentDot.column=UpperClock.column+(2*DataDelta.column) CurrentDot.pixel=UpperClock.pixel+(5*DataDelta.pixel) Running Down a Dot Column Since the dot column has been located from the phase-locked loop tracking the clockmarks, all that remains is to sample the dot column at the center of each dot down that column. The variable CurrentDot points is determined to the center of the first dot of the current column. We can get to the next dot of the column by simply adding DataDelta (2 additions: 1 for the column ordinate, the other for the pixel ordinate). A sample of the dot at the given coordinate (bi-linear interpolation) is taken, and a pixel value representing the center of the dot is determined. The pixel value is then used to determine the bit value for that dot. However it is possible to use the pixel value in context with the center value for the two surrounding dots on the same dot line to make a better bit judgement We can be assured that all the pixels for the dots in the dot column being extracted are currently loaded in DRAM, for if the two ends of the line (clockmarks) are in DRAM, then the dots between those two clockmarks must also be in DRAM. Additionally, the data block height is short enough (only 384 dots high) to ensure that simple deltas are enough to traverse the length of the line. One of the reasons the card is divided into 8 data blocks high is that we cannot make the same rigid guarantee across the entire height of the card that we can about a single data block. The high level process of extracting a single line of data (48 bytes) can be seen in the following pseudocode. The dataBuffer pointer increments as each byte is stored, ensuring that consecutive bytes and columns of data are stored consecutively. bitCount = 8 curr = 0x00 // definitely black next = GetPixel(CurrentDot) for (i=0; i < DOTS_PER_DATA_COLUMN; i++) { CurrentDot += DataDelta prev = curr curr = next next = GetPixel(CurrentDot) bit = DetermineCenterDot(prev, curr, next) byte = (byte << 1) | bit bitCount−− if (bitCount == 0) { *(BitImage | CurrentByte) = byte CurrentByte++ bitCount = 8 } } The GetPixel function takes a dot coordinate (fixed point) and samples 4 CCD pixels to arrive at a center pixel value via bilinear interpolation. The DetermineCenterDot function takes the pixel values representing the dot centers to either side of the dot whose bit value is being determined, and attempts to intelligently guess the value of that center dot's bit value. From the generalized blurring curve of FIG. 64 there are three common cases to consider: The dot's center pixel value is lower than WhiteMin, and is therefore definitely a black dot. The bit value is therefore definitely 1. The dot's center pixel value is higher than BlackMax, and is therefore definitely a white dot. The bit value is therefore definitely 0. The dot's center pixel value is somewhere between BlackMax and WhiteMin. The dot may be black, and it may be white. The value for the bit is therefore in question. A number of schemes can be devised to make a reasonable guess as to the value of the bit. These schemes must balance complexity against accuracy, and also take into account the fact that in some cases, there is no guaranteed solution. In those cases where we make a wrong bit decision, the bit's Reed-Solomon symbol will be in error, and must be corrected by the Reed-Solomon decoding stage in Phase 2. The scheme used to determine a dot's value if the pixel value is between BlackMax and WhiteMin is not too complex, but gives good results. It uses the pixel values of the dot centers to the left and right of the dot in question, using their values to help determine a more likely value for the center dot: If the two dots to either side are on the white side of MidRange (an average dot value), then we can guess that if the center dot were white, it would likely be a “definite” white. The fact that it is in the not-sure region would indicate that the dot was black, and had been affected by the surrounding white dots to make the value less sure. The dot value is therefore assumed to be black, and hence the bit value is 1. If the two dots to either side are on the black side of MidRange, then we can guess that if the center dot were black, it would likely be a “definite” black. The fact that it is in the not-sure region would indicate that the dot was white, and had been affected by the surrounding black dots to make the value less sure. The dot value is therefore assumed to be white, and hence the bit value is 0. If one dot is on the black side of MidRange, and the other dot is on the white side of MidRange, we simply use the center dot value to decide. If the center dot is on the black side of MidRange, we choose black (bit value 1). Otherwise we choose white (bit value 0). The logic is represented by the following: if (pixel < WhiteMin) // definitely black bit = 0x01 else if (pixel > BlackMax) // definitely white bit = 0x00 else if ((prev > MidRange) && (next> MidRange)) //prob black bit = 0x01 else if ((prev < MidRange) && (next < MidRange)) //prob white bit = 0x00 else if (pixel < MidRange) bit = 0x01 else bit = 0x00 From this one can see that using surrounding pixel values can give a good indication of the value of the center dot's state. The scheme described here only uses the dots from the same row, but using a single dot line history (the previous dot line) would also be straightforward as would be alternative arrangements. Updating Clockmarks for the Next Column Once the center of the first data dot for the column has been determined, the clockmark values are no longer needed. They are conveniently updated in readiness for the next column after the data has been retrieved for the column. Since the clockmark direction is perpendicular to the traversal of dots down the dot column, it is possible to use the pixel delta to update the column, and subtract the column delta to update the pixel for both clocks: UpperClock.column +=DataDelta.pixel LowerClock.column +=DataDelta.pixel UpperClock.pixel −=DataDelta.column LowerClock.pixel −=DataDelta.column These are now the estimates for the next dot column. Timing The timing requirement will be met as long as DRAM utilization does not exceed 100%, and the addition of parallel algorithm timing multiplied by the algorithm DRAM utilization does not exceed 100%. DRAM utilization is specified relative to Process 1, which writes each pixel once in a consecutive manner, consuming 9% of the DRAM bandwidth. The timing as described in this section, shows that the DRAM is easily able to cope with the demands of the alternative Artcard Reader algorithm. The timing bottleneck will therefore be the implementation of the algorithm in terms of logic speed, not DRAM access. The algorithms have been designed however, with simple architectures in mind, requiring a minimum number of logical operations for every memory cycle. From this point of view, as long as the implementation state machine or equivalent CPU/DSP architecture is able to perform as described in the following subsections, the target speed will be met. Locating the Targets Targets are located by reading pixels within the bounds of a pixel column. Each pixel is read once at most. Assuming a run-length encoder that operates fast enough, the bounds on the location of targets is memory access. The accesses will therefore be no worse than the timing for Process 1, which means a 9% utilization of the DRAM bandwidth. The total utilization of DRAM during target location (including Process 1) is therefore 18%, meaning that the target locator will always be catching up to the alternative Artcard image sensor pixel reader. Processing the Targets The timing for sorting and checking the target numbers is trivial. The finding of better estimates for each of the two target centers involves 12 sets of 12 pixel reads, taking a total of 144 reads. However the fixing of accurate target centers is not trivial, requiring 2 sets of evaluations. Adjusting each target center requires 8 sets of 20 different 6-entry convolution kernels. Thus this totals 8×20×6 multiply-accumulates=960. In addition, there are 7 sets of 7 pixels to be retrieved, requiring 49 memory accesses. The total number per target is therefore 144+960+49=1153, which is approximately the same number of pixels in a column of pixels (1152). Thus each target evaluation consumes the time taken by otherwise processing a row of pixels. For two targets we effectively consume the time for 2 columns of pixels. A target is positively identified on the first pixel column after the target number. Since there are 2 dot columns before the orientation column, there are 6 pixel columns. The Target Location process effectively uses up the first of the pixel columns, but the remaining 5 pixel columns are not processed at all. Therefore the data area can be located in ⅖ of the time available without impinging on any other process time. The remaining ⅗ of the time available is ample for the trivial task of assigning the ranges for black and white pixels, a task that may take a couple of machine cycles at most. Extracting Data There are two parts to consider in terms of timing: Getting accurate clockmarks and border values Extracting dot values Clockmarks and border values are only gathered every second dot column. However each time a clockmark estimate is updated to become more accurate, 20 different 6-entry convolution kernels must be evaluated. On average there are 2 of these per dot column (there are 4 every 2 dot-columns). Updating the pixel ordinate based on the border only requires 7 pixels from the same pixel scanline. Updating the column ordinate however, requires 7 pixels from different columns, hence different scanlines. Assuming worst case scenario of a cache miss for each scanline entry and 2 cache misses for the pixels in the same scanline, this totals 8 cache misses. Extracting the dot information involves only 4 pixel reads per dot (rather than the average 9 that define the dot). Considering the data area of 1152 pixels (384 dots), at best this will save 72 cache reads by only reading 4 pixel dots instead of 9. The worst case is a rotation of 10 which is a single pixel translation every 57 pixels, which gives only slightly worse savings. It can then be safely said that, at worst, we will be reading fewer cache lines less than that consumed by the pixels in the data area. The accesses will therefore be no worse than the timing for Process 1, which implies a 9% utilization of the DRAM bandwidth. The total utilization of DRAM during data extraction (including Process 1) is therefore 18%, meaning that the data extractor will always be catching up to the alternative Artcard image sensor pixel reader. This has implications for the Process Targets process in that the processing of targets can be performed by a relatively inefficient method if necessary, yet still catch up quickly during the extracting data process. Phase 2—Decode Bit Image Phase 2 is the non-real-time phase of alternative Artcard data recovery algorithm. At the start of Phase 2 a bit image has been extracted from the alternative Artcard. It represents the bits read from the data regions of the alternative Artcard. Some of the bits will be in error, and perhaps the entire data is rotated 180° because the alternative Artcard was rotated when inserted. Phase 2 is concerned with reliably extracting the original data from this encoded bit image. There are basically 3 steps to be carried out as illustrated in FIG. 79: Reorganize the bit image, reversing it if the alternative Artcard was inserted backwards Unscramble the encoded data Reed-Solomon decode the data from the bit image Each of the 3 steps is defined as a separate process, and performed consecutively, since the output of one is required as the input to the next It is straightforward to combine the first two steps into a single process, but for the purposes of clarity, they are treated separately here. From a data/process perspective, Phase 2 has the structure as illustrated in FIG. 80. The timing of Processes 1 and 2 are likely to be negligible, consuming less than {fraction (1/1000)}th of a second between them. Process 3 (Reed Solomon decode) consumes approximately 0.32 seconds, making this the total time required for Phase 2. Reorganize the bit image, reversing it if necessary The bit map in DRAM now represents the retrieved data from the alternative Artcard. However the bit image is not contiguous. It is broken into 64 32k chunks, one chunk for each data block. Each 32k chunk contains only 28,656 useful bytes: 48 bytes from the leftmost Orientation Column 28560 bytes from the data region proper 48 bytes from the rightmost Orientation Column 4112 unused bytes The 2 MB buffer used for pixel data (stored by Process 1 of Phase 1) can be used to hold the reorganized bit image, since pixel data is not required during Phase 2. At the end of the reorganization, a correctly oriented contiguous bit image will be in the 2 MB pixel buffer, ready for Reed-Solomon decoding. If the card is correctly oriented, the leftmost Orientation Column will be white and the rightmost Orientation Column will be black. If the card has been rotated 180°, then the leftmost Orientation Column will be black and the rightmost Orientation Column will be white. A simple method of determining whether the card is correctly oriented or not, is to go through each data block, checking the first and last 48 bytes of data until a block is found with an overwhelming ratio of black to white bits. The following pseudocode demonstrates this, returning TRUE if the card is correctly oriented, and FALSE if it is not: totalCountL = 0 totalCountR = 0 for (i=0; i<64; i++) { blackCountL = 0 blackCountR = 0 currBuff = dataBuffer for (j=0; j<48; j++) { blackCountL += CountBits(*currBuff) currBuff++ } currBuff += 28560 for (j=0; j<48; j++) { blackCountR += CountBits(*currBuff) currBuff++ } dataBuffer += 32k if (blackCountR > (blackCountL * 4)) return TRUE if (blackCountL > (blackCountR * 4)) return FALSE totalCountL += blackCountL totalCountR += blackCountR } return (totalCountR > totalCountL) The data must now be reorganized, based on whether the card was oriented correctly or not. The simplest case is that the card is correctly oriented. In this case the data only needs to be moved around a little to remove the orientation columns and to make the entire data contiguous. This is achieved very simply in situ, as described by the following pseudocode: DATA_BYTES_PER_DATA_BLOCK = 28560 to = dataBuffer from = dataBuffer + 48) // left orientation column for (i=0; i<64; i++) { BlockMove(from, to, DATA_BYTES_PER_DATA_BLOCK) from += 32k to += DATA_BYTES_PER_DATA_BLOCK } The other case is that the data actually needs to be reversed. The algorithm to reverse the data is quite simple, but for simplicity, requires a 256-byte table Reverse where the value of Reverse[N] is a bit-reversed N. DATA_BYTES_PER_DATA_BLOCK = 28560 to = outBuffer for (i=0; i<64; i++) { from = dataBuffer + (i * 32k) from += 48 // skip orientation column from += DATA_BYTES_PER_DATA_BLOCK − 1 // end of block for (j=0; j < DATA_BYTES_PER_DATA_BLOCK; j++) { *to++ = Reverse[*from] from−− } } The timing for either process is negligible, consuming less than {fraction (1/1000)}th of a second: 2 MB contiguous reads (2048/16×12 ns=1,536 ns) 2 MB effectively contiguous byte writes (2048/16×12 ns=1,536 ns) Unscramble the Encoded Image The bit image is now 1,827,840 contiguous, correctly oriented, but scrambled bytes. The bytes must be unscrambled to create the 7,168 Reed-Solomon blocks, each 255 bytes long. The unscrambling process is quite straightforward, but requires a separate output buffer since the unscrambling cannot be performed in situ. FIG. 80 illustrates the unscrambling process conducted memory The following pseudocode defines how to perform the unscrambling process: groupSize = 255 numBytes = 1827840; inBuffer = scrambledBuffer; outBuffer = unscrambledBuffer; for (i=0; i<groupSize; i++) for (j=i; j<numBytes; j+=groupSize) outBuffer[j] = *inBuffer++ The timing for this process is negligible, consuming less than {fraction (1/1000)}th of a second: 2 MB contiguous reads (2048/16×12 ns=1,536 ns) 2 MB non-contiguous byte writes (2048×12 ns=24,576 ns) At the end of this process the unscrambled data is ready for Reed-Solomon decoding. Reed Solomon Decode The final part of reading an alternative Artcard is the Reed-Solomon decode process, where approximately 2 MB of unscrambled data is decoded into approximately 1 MB of valid alternative Artcard data. The algorithm performs the decoding one Reed-Solomon block at a time, and can (if desired) be performed in situ, since the encoded block is larger than the decoded block, and the redundancy bytes are stored after the data bytes. The first 2 Reed-Solomon blocks are control blocks, containing information about the size of the data to be extracted from the bit image. This meta-information must be decoded fist, and the resultant information used to decode the data proper. The decoding of the data proper is simply a case of decoding the data blocks one at a time. Duplicate data blocks can be used if a particular block fails to decode. The highest level of the Reed-Solomon decode is set out in pseudocode: // Constants for Reed Solomon decode sourceBlockLength = 255; destBlockLength = 127; numControlBlocks = 2; // Decode the control information if (! GetControlData(source, destBlocks, lastBlock)) return error destBytes = ((destBlocks−1) * destBlockLength) + lastBlock offsetToNextDuplicate = destBlocks * sourceBlockLength // Skip the control blocks and position at data source += numControlBlocks * sourceBlockLength // Decode each of the data blocks, trying // duplicates as necessary blocksInError = 0; for (i=0; i<destBlocks; i++) { found = DecodeBlock(source, dest); if (! found) { duplicate = source + offsetToNextDuplicate while ((! found) && (duplicate<sourceEnd)) { found = DecodeBlock(duplicate, dest) duplicate += offsetToNextDuplicate } } if (! found) blocksInError++ source += sourceBlockLength dest += destBlockLength } return destBytes and blocksInError DecodeBlock is a standard Reed Solomon block decoder using m=8 and t=64. The GetControlData function is straightforward as long as there are no decoding errors. The function simply calls DecodeBlock to decode one control block at a time until successful. The control parameters can then be extracted from the first 3 bytes of the decoded data (destBlocks is stored in the bytes 0 and 1, and lastblock is stored in byte 2). If there are decoding errors the function must traverse the 32 sets of 3 bytes and decide which is the most likely set value to be correct. One simple method is to find 2 consecutive equal copies of the 3 bytes, and to declare those values the correct ones. An alternative method is to count occurrences of the different sets of 3 bytes, and announce the most common occurrence to be the correct one. The time taken to Reed-Solomon decode depends on the implementation. While it is possible to use a dedicated core to perform the Reed-Solomon decoding process (such as LSI Logic's L64712), it is preferable to select a CPU/DSP combination that can be more generally used throughout the embedded system (usually to do something with the decoded data) depending on the application. Of course decoding time must be fast enough with the CPU/DSP combination. The L64712 has a throughput of 50 Mbits per second (around 6.25 MB per second), so the time is bound by the speed of the Reed-Solomon decoder rather than the maximum 2 MB read and 1 MB write memory access time. The time taken in the worst case (all 2 MB requires decoding) is thus 2/6.25 s=approximately 0.32 seconds. Of course, many further refinements are possible including the following: The blurrier the reading environment, the more a given dot is influenced by the surrounding dots. The current reading algorithm of the preferred embodiment has the ability to use the surrounding dots in the same column in order to make a better decision about a dot's value. Since the previous column's dots have already been decoded, a previous column dot history could be useful in determining the value of those dots whose pixel values are in the not-sure range. A different possibility with regard to the initial stage is to remove it entirely, make the initial bounds of the data blocks larger than necessary and place greater intelligence into the ProcessingTargets functions. This may reduce overall complexity. Care must be taken to maintain data block independence. Further the control block mechanism can be made more robust: The control block could be the first and last blocks rather than make them contiguous (as is the case now). This may give greater protection against certain pathological damage scenarios. The second refinement is to place an additional level of redundancy/error detection into the control block structure to be used if the Reed-Solomon decode step fails. Something as simple as parity might improve the likelihood of control information if the Reed-Solomon stage fails. Phase 5 Running the Vark Script The overall time taken to read the Artcard 9 and decode it is therefore approximately 2.15 seconds. The apparent delay to the user is actually only 0.65 seconds (the total of Phases 3 and 4), since the Artcard stops moving after 1.5 seconds. Once the Artcard is loaded, the Artvark script must be interpreted, Rather than run the script immediately, the script is only run upon the pressing of the ‘Print’ button 13 (FIG. 1). The taken to run the script will vary depending on the complexity of the script, and must be taken into account for the perceived delay between pressing the print button and the actual print button and the actual printing. As noted previously, the VLIW processor 74 is a digital processing system that accelerates computationally expensive Vark functions. The balance of functions performed in software by the CPU core 72, and in hardware by the VLIW processor 74 will be implementation dependent. The goal of the VLIW processor 74 is to assist all Artcard styles to execute in a time that does not seem too slow to the user. As CPUs become faster and more powerful, the number of functions requiring hardware acceleration becomes less and less. The VLIW processor has a microcoded ALU sub-system that allows general hardware speed up of the following time-critical functions. 1) Image access mechanisms for general software processing 2) Image convolver. 3) Data driven image warper 4) Image scaling 5) Image tessellation 6) Affine transform 7) Image compositor 8) Color space transform 9) Histogram collector 10) Illumination of the Image 11) Brush stamper 12) Histogram collector 13) CCD image to internal image conversion 14) Construction of image pyramids (used by warper & for brushing) The following table summarizes the time taken for each Vark operation if implemented in the ALU model. The method of implementing the function using the ALU model is described hereinafter. 1500 * 1000 image Operation Speed of Operation 1 channel 3 channels Image composite 1 cycle per output pixel 0.015 s 0.045 s Image convolve k/3 cycles per output pixel (k = kernel size) 3 × 3 convolve 0.045 s 0.135 s 5 × 5 convolve 0.125 s 0.375 s 7 × 7 convolve 0.245 s 0.735 s Image warp 8 cycles per pixel 0.120 s 0.360 s Histogram collect 2 cycles per pixel 0.030 s 0.090 s Image Tessellate ⅓ cycle per pixel 0.005 s 0.015 s Image sub-pixel Translate 1 cycle per output pixel — — Color lookup replace ½ cycle per pixel 0.008 s 0.023 Color space transform 8 cycles per pixel 0.120 s 0.360 s Convert CCD image to 4 cycles per output pixel 0.06 s 0.18 s internal image (including color convert & scale) Construct image pyramid 1 cycle per input pixel 0.015 s 0.045 s Scale Maximum of: 0.015 s 0.045 s (minimum) 2 cycles per input pixel (minimum) 2 cycles per output pixel 2 cycles per output pixel (scaled in X only) Affine transform 2 cycles per output pixel 0.03 s 0.09 s Brush rotate/translate and ? composite Tile Image 4-8 cycles per output 0.015 s to 0.030 s 0.060 s to 0.120 s to for pixel 4 channels (Lab, texture) Illuminate image Cycles per pixel Ambient only ½ 0.008 s 0.023 s Directional light 1 0.015 s 0.045 s Directional (bm) 6 0.09 s 0.27 s Omni light 6 0.09 s 0.27 s Omni (bm) 9 0.137 s 0.41 s Spotlight 9 0.137 s 0.41 s Spotlight (bm) 12 0.18 s 0.54 s (bm) = bumpmap For example, to convert a CCD image, collect histogram & perform lookup-color replacement (for image enhancement) takes: 9+2+0.5 cycles per pixel, or 11.5 cycles. For a 1500×1000 image that is 172,500,000, or approximately 0.2 seconds per component, or 0.6 seconds for all 3 components. Add a simple warp, and the total comes to 0.6+0.36, almost 1 second. Image Convolver A convolve is a weighted average around a center pixel. The average may be a simple sum, a sum of absolute values, the absolute value of a sum, or sums truncated at 0. The image convolver is a general-purpose convolver, allowing a variety of functions to be implemented by varying the values within a variable-sized coefficient kernel. The kernel sizes supported are 3×3, 5×5 and 7×7 only. Turning now to FIG. 82, there is illustrated 340 an example of the convolution process. The pixel component values fed into the convolver process 341 come from a Box Read Iterator 342. The Iterator 342 provides the image data row by row, and within each row, pixel by pixel. The output from the convolver 341 is sent to a Sequential Write Iterator 344, which stores the resultant image in a valid image format. A Coefficient Kernel 346 is a lookup table in DRAM. The kernel is arranged with coefficients in the same order as the Box Read Iterator 342. Each coefficient entry is 8 bits. A simple Sequential Read Iterator can be used to index into the kernel 346 and thus provide the coefficients. It simulates an image with ImageWidth equal to the kernel size, and a Loop option is set so that the kernel would continuously be provided. One form of implementation of the convolve process on an ALU unit is as illustrated in FIG. 81. The following constants are set by software: Constant Value K1 Kernel size (9, 25, or 49) The control logic is used to count down the number of multiply/adds per pixel. When the count (accumulated in Latch2) reaches 0, the control signal generated is used to write out the current convolve value (from Latch1) and to reset the count. In this way, one control logic block can be used for a number of parallel convolve streams. Each cycle the multiply ALU can perform one multiply/add to incorporate the appropriate part of a pixel. The number of cycles taken to sum up all the values is therefore the number of entries in the kernel. Since this is compute bound, it is appropriate to divide the image into multiple sections and process them in parallel on different ALU units. On a 7×7 kernel, the time taken for each pixel is 49 cycles, or 490 ns. Since each cache line holds 32 pixels, the time available for memory access is 12,740 ns. ((32-7+1)×490 ns). The time taken to read 7 cache lines and write 1 is worse case 1,120 ns (8*140 ns, all accesses to same DRAM bank). Consequently it is possible to process up to 10 pixels in parallel given unlimited resources. Given a limited number of ALUs it is possible to do at best 4 in parallel. The time taken to therefore perform the convolution using a 7×7 kernel is 0.18375 seconds (1500*1000*490 ns/4=183,750,000 ns). On a 5×5 kernel, the time taken for each pixel is 25 cycles, or 250 ns. Since each cache line holds 32 pixels, the time available for memory access is 7,000 ns. ((32−5+1)×250 ns). The time taken to read 5 cache lines and write 1 is worse case 840 ns (6*140 ns, all accesses to same DRAM bank). Consequently it is possible to process up to 7 pixels in parallel given unlimited resources. Given a limited number of ALUs it is possible to do at best 4. The time taken to therefore perform the convolution using a 5×5 kernel is 0.09375 seconds (1500*1000*250 ns/4=93,750,000 ns). On a 3×3 kernel, the time taken for each pixel is 9 cycles, or 90 ns. Since each cache line holds 32 pixels, the time available for memory access is 2,700 ns. ((32−3+1)×90 ns). The time taken to read 3 cache lines and write 1 is worse case 560 ns (4*140 ns, all accesses to same DRAM bank). Consequently it is possible to process up to 4 pixels in parallel given unlimited resources. Given a limited number of ALUs and Read/Write Iterators it is possible to do at best 4. The time taken to therefore perform the convolution using a 3×3 kernel is 0.03375 seconds (1500*1000*90 ns/4=33,750,000 ns). Consequently each output pixel takes kernelsize/3 cycles to compute. The actual timings are summarised in the following table: Time taken Time to process Time to Process to calculate 1 channel at 3 channels at Kernel size output pixel 1500 × 1000 1500 × 1000 3 × 3 (9) 3 cycles 0.045 seconds 0.135 seconds 5 × 5 (25) 8⅓ cycles 0.125 seconds 0.375 seconds 7 × 7 (49) 16⅓ cycles 0.245 seconds 0.735 seconds Image Compositor Compositing is to add a foreground image to a background image using a matte or a channel to govern the appropriate proportions of background and foreground in the final image. Two styles of compositing are preferably supported, regular compositing and associated compositing. The rules for the two styles are: Regular composite: new Value=Foreground+(Background−Foreground)a Associated composite: new value=Foreground+(1−a)Background The difference then, is that with associated compositing, the foreground has been pre-multiplied with the matte, while in regular compositing it has not. An example of the compositing process is as illustrated in FIG. 83. The alpha channel has values from 0 to 255 corresponding to the range 0 to 1. Regular Composite A regular composite is implemented as: Foreground+(Background−Foreground)*□/255 The division by. X/255 is approximated by 257×/65536. An implementation of the compositing process is shown in more detail in FIG. 84, where the following constant is set by software: Constant Value K1 257 Since 4 Iterators are required, the composite process takes 1 cycle per pixel, with a utilization of only half of the ALUs. The composite process is only run on a single channel. To composite a 3-channel image with another, the compositor must be run 3 times, once for each channel. The time taken to composite a full size single channel is 0.015 s (1500*1000*1*10 ns), or 0.045 s to composite all 3 channels. To approximate a divide by 255 it is possible to multiply by 257 and then divide by 65536. It can also be achieved by a single add (256*x+x) and ignoring (except for rounding purposes) the final 16 bits of the result. As shown in FIG. 42, the compositor process requires 3 Sequential Read Iterators 351-353 and 1 Sequential Write Iterator 355, and is implemented as microcode using a Adder ALU in conjunction with a multiplier ALU. Composite time is 1 cycle (ions) per-pixel. Different microcode is required for associated and regular compositing, although the average time per pixel composite is the same. The composite process is only run on a single channel. To composite one 3-channel image with another, the compositor must be run 3 times, once for each channel. As the a channel is the same for each composite, it must be read each time. However it should be noted that to transfer (read or write) 4×32 byte cache-lines in the best case takes 320 ns. The pipeline gives an average of 1 cycle per pixel composite, taking 32 cycles or 320 ns (at 100 MHz) to composite the 32 pixels, so the a channel is effectively read for free. An entire channel can therefore be composited in: 1500/32*1000*320 ns=15,040,000 ns=0.015 seconds. The time taken to composite a full size 3 channel image is therefore 0.045 seconds. Construct Image Pyramid Several functions, such as warping, tiling and brushing, require the average value of a given area of pixels. Rather than calculate the value for each area given, these functions preferably make use of an image pyramid. As illustrated previously in FIG. 33, an image pyramid 360 is effectively a multi-resolution pixelmap. The original image is a 1:1 representation. Sub-sampling by 2:1 in each dimension produces an image ¼ the original size. This process continues until the entire image is represented by a single pixel. An image pyramid is constructed from an original image, and consumes ⅓ of the size taken up by the original image (¼+{fraction (1/16)}+{fraction (1/64)}+ . . . ). For an original image of 1500×1000 the corresponding image pyramid is approximately {fraction (1/2)} MB The image pyramid can be constructed via a 3×3 convolve performed on 1 in 4 input image pixels advancing the center of the convolve kernel by 2 pixels each dimension. A 3×3 convolve results in higher accuracy than simply averaging 4 pixels, and has the added advantage that coordinates on different pyramid levels differ only by shifting 1 bit per level. The construction of an entire pyramid relies on a software loop that calls the pyramid level construction function once for each level of the pyramid. The timing to produce 1 level of the pyramid is {fraction (9/4)}*¼ of the resolution of the input image since we are generating an image ¼ of the size of the original. Thus for a 1500×1000 image: Timing to produce level 1 of pyramid={fraction (9/4)}*750*500=843, 750 cycles Timing to produce level 2 of pyramid={fraction (9/4)}*375*250=210, 938 cycles Timing to produce level 3 of pyramid={fraction (9/4)}*188*125=52, 735 cycles Etc. The total time is ¾ cycle per original image pixel (image pyramid is ⅓ of original image size, and each pixel takes {fraction (9/4)} cycles to be calculated, i.e. ⅓*{fraction (9/4)}=¾). In the case of a 1500×1000 image is 1,125,000 cycles (at 100 MHz), or 0.011 seconds. This timing is for a single color channel, 3 color channels require 0.034 seconds processing time. General Data Driven Image Warper The ACP 31 is able to carry out image warping manipulations of the input image. The principles of image warping are well-known in theory. One thorough text book reference on the process of warping is “Digital Image Warping” by George Wolberg published in 1990 by the IEEE Computer Society Press, Los Alamitos, Calif. The warping process utilizes a warp map which forms part of the data fed in via Artcard 9. The warp map can be arbitrarily dimensioned in accordance with requirements and provides information of a mapping of input pixels to output pixels. Unfortunately, the utilization of arbitrarily sized warp maps presents a number of problems which must be solved by the image warper. Turning to FIG. 85, a warp map 365, having dimensions A×B comprises array values of a certain magnitude (for example 8 bit values from 0-255) which set out the coordinate of a theoretical input image which maps to the corresponding “theoretical” output image having the same array coordinate indices. Unfortunately, any output image eg. 366 will have its own dimensions C×D which may further be totally different from an input image which may have its own dimensions E×F. Hence, it is necessary to facilitate the remapping of the warp map 365 so that it can be utilised for output image 366 to determine, for each output pixel, the corresponding area or region of the input image 367 from which the output pixel color data is to be constructed. For each output pixel in output image 366 it is necessary to first determine a corresponding warp map value from warp map 365. This may include the need to bilinearly interpolate the surrounding warp map values when an output image pixel maps to a fractional position within warp map table 365. The result of this process will give the location of an input image pixel in a “theoretical” image which will be dimensioned by the size of each data value within the warp map 365. These values must be re-scaled so as to map the theoretical image to the corresponding actual input image 367. In order to determine the actual value and output image pixel should take so as to avoid aliasing effects, adjacent output image pixels should be examined to determine a region of input image pixels 367 which will contribute to the final output image pixel value. In this respect, the image pyramid is utilised as will become more apparent hereinafter. The image warper performs several tasks in order to warp an image. Scale the warp map to match the output image size. Determine the span of the region of input image pixels represented in each output pixel. Calculate the final output pixel value via tri-linear interpolation from the input image pyramid Scale Warp Map As noted previously, in a data driven warp, there is the need for a warp map that describes, for each output pixel, the center of a corresponding input image map. Instead of having a single warp map as previously described, containing interleaved x and y value information, it is possible to treat the X and Y coordinates as separate channels. Consequently, preferably there are two warp maps: an X warp map showing the warping of X coordinates, and a Y warp map, showing the warping of the Y coordinates. As noted previously, the warp map 365 can have a different spatial resolution than the image they being scaled (for example a 32×32 warp-map 365 may adequately describe a warp for a 1500×1000 image 366). In addition, the warp maps can be represented by 8 or 16 bit values that correspond to the size of the image being warped. There are several steps involved in producing points in the input image space from a given warp map: 1. Determining the corresponding position in the warp map for the output pixel 2. Fetch the values from the warp map for the next step (this can require scaling in the resolution domain if the warp map is only 8 bit values) 3. Bi-linear interpolation of the warp map to determine the actual value 4. Scaling the value to correspond to the input image domain The first step can be accomplished by multiplying the current X/Y coordinate in the output image by a scale factor (which can be different in X & Y). For example, if the output image was 1500×1000, and the warp map was 150×100, we scale both X & Y by {fraction (1/10)}. Fetching the values from the warp map requires access to 2 Lookup tables. One Lookup table indexes into the X warp-map, and the other indexes into the Y warp-map. The lookup table either reads 8 or 16 bit entries from the lookup table, but always returns 16 bit values (clearing the high 8 bits if the original values are only 8 bits). The next step in the pipeline is to bi-linearly interpolate the looked-up warp map values. Finally the result from the bi-linear interpolation is scaled to place it in the same domain as the image to be warped. Thus, if the warp map range was 0-255, we scale X by 1500/255, and Y by 1000/255. The interpolation process is as illustrated in FIG. 86 with the following constants set by software: Constant Value K1 Xscale (scales 0-ImageWidth to 0-WarpmapWidth) K2 Yscale (scales 0-ImageHeight to 0-WarpmapHeight) K3 XrangeScale (scales warpmap range (eg 0-255) to 0-ImageWidth) K4 YrangeScale (scales warpmap range (eg 0-255) to 0-ImageHeight) The following lookup table is used: Lookup Size Details LU1 and WarpmapWidth × Warpmap lookup. LU2 WarpmapHeight Given [X, Y] the 4 entries required for bi-linear interpolation are returned. Even if entries are only 8 bit, they are returned as 16 bit (high 8 bits 0). Transfer time is 4 entries at 2 bytes per entry. Total time is 8 cycles as 2 lookups are used. Span Calculation The points from the warp map 365 locate centers of pixel regions in the input image 367. The distance between input image pixels of adjacent output image pixels will indicate the size of the regions, and this distance can be approximated via a span calculation. Turning to FIG. 87, for a given current point in the warp map P1, the previous point on the same line is called P0, and the previous line's point at the same position is called P2. We determine the absolute distance in X & Y between P1 and P0, and between P1 and P2. The maximum distance in X or Y becomes the span which will be a square approximation of the actual shape. Preferably, the points are processed in a vertical strip output order, P0 is the previous point on the same line within a strip, and when P1 is the first point on line within a strip, then PO refers to the last point in the previous strip's corresponding line. P2 is the previous line's point in the same strip, so it can be kept in a 32-entry history buffer. The basic of the calculate span process are as illustrated in FIG. 88 with the details of the process as illustrated in FIG. 89. The following DRAM FIFO is used: Lookup Size Details FIFO1 8 ImageWidth bytes. P2 history/lookup (both X & Y in same [ImageWidth × FIFO) 2 entries at P1 is put into the FIFO and taken out 32 bits per entry] again at the same pixel on the following row as P2. Transfer time is 4 cycles (2 × 32 bits, with 1 cycle per 16 bits) Since a 32 bit precision span history is kept, in the case of a 1500 pixel wide image being warped 12,000 bytes temporary storage is required. Calculation of the span 364 uses 2 Adder ALUs (1 for span calculation, 1 for looping and counting for P0 and P2 histories) takes 7 cycles as follows: Cycle Action 1 A = ABS(P1x − P2x) Store P1x in P2x history 2 B = ABS(P1x − P0x) Store P1x in P0x history 3 A = MAX(A, B) 4 B = ABS(P1y − P2y) Store P1y in P2y history 5 A = MAX(A, B) 6 B = ABS(P1y − P0y) Store P1y in P0y history 7 A = MAX(A, B) The history buffers 365, 366 are cached DRAM. The ‘Previous Line’ (for P2 history) buffer 366 is 32 entries of span-precision. The ‘Previous Point’ (for P0 history). Buffer 365 requires 1 register that is used most of the time (for calculation of points 1 to 31 of a line in a strip), and a DRAM buffered set of history values to be used in the calculation of point 0 in a strip's line. 32 bit precision in span history requires 4 cache lines to hold P2 history, and 2 for P0 history. P0's history is only written and read out once every 8 lines of 32 pixels to a temporary storage space of (ImageHeight*4) bytes. Thus a 1500 pixel high image being warped requires 6000 bytes temporary storage, and a total of 6 cache lines. Tri-Linear Interpolation Having determined the center and span of the area from the input image to be averaged, the final part of the warp process is to determine the value of the output pixel. Since a single output pixel could theoretically be represented by the entire input image, it is potentially too time-consuming to actually read and average the specific area of the input image contributing to the output pixel. Instead, it is possible to approximate the pixel value by using an image pyramid of the input image. If the span is 1 or less, it is necessary only to read the original image's pixels around the given coordinate, and perform bi-linear interpolation. If the span is greater than 1, we must read two appropriate levels of the image pyramid and perform tri-linear interpolation. Performing linear interpolation between two levels of the image pyramid is not strictly correct, but gives acceptable results (it errs on the side of blurring the resultant image). Turning to FIG. 90, generally speaking, for a given span ‘s’, it is necessary to read image pyramid levels given by ln2s (370) and ln2s+1 (371). Ln2s is simply decoding the highest set bit of s. We must bi-linear interpolate to determine the value for the pixel value on each of the two levels 370, 371 of the pyramid, and then interpolate between levels. As shown in FIG. 91, it is necessary to first interpolate in X and Y for each pyramid level before interpolating between the pyramid levels to obtain a final output value 373. The image pyramid address mode issued to generate addresses for pixel coordinates at (x, y) on pyramid level s & s+1. Each level of the image pyramid contains pixels sequential in x. Hence, reads in x are likely to be cache hits. Reasonable cache coherence can be obtained as local regions in the output image are typically locally coherent in the input image (perhaps at a different scale however, but coherent within the scale). Since it is not possible to know the relationship between the input and output images, we ensure that output pixels are written in a vertical strip (via a Vertical-Strip Iterator) in order to best make use of cache coherence. Tri-linear interpolation can be completed in as few as 2 cycles on average using 4 multiply ALUs and all 4 adder ALUs as a pipeline and assuming no memory access required. But since all the interpolation values are derived from the image pyramids, interpolation speed is completely dependent on cache coherence (not to mention the other units are busy doing warp-map scaling and span calculations). As many cache lines as possible should therefore be available to the image-pyramid reading. The best speed will be 8 cycles, using 2 Multiply ALUs. The output pixels are written out to the DRAM via a Vertical-Strip Write Iterator that uses 2 cache lines. The speed is therefore limited to a minimum of 8 cycles per output pixel. If the scaling of the warp map requires 8 or fewer cycles, then the overall speed will be unchanged. Otherwise the throughput is the time taken to scale the warp map. In most cases the warp map will be scaled up to match the size of the photo. Assuming a warp map that requires 8 or fewer cycles per pixel to scale, the time taken to convert a single color component of image is therefore 0.12 s (1500*1000*8 cycles*10 ns per cycle). Histogram Collector The histogram collector is a microcode program that takes an image channel as input, and produces a histogram as output. Each of a channel's pixels has a value in the range 0-255. Consequently there are 256 entries in the histogram table, each entry 32 bits—large enough to contain a count of an entire 1500×1000 image. As shown in FIG. 92, since the histogram represents a summary of the entire image, a Sequential Read Iterator 378 is sufficient for the input. The histogram itself can be completely cached, requiring 32 cache lines (1 K). The microcode has two passes: an initialization pass which sets all the counts to zero, and then a “count” stage that increments the appropriate counter for each pixel read from the image. The first stage requires the Address Unit and a single Adder ALU, with the address of the histogram table 377 for initialising. Relative Microcode Address Unit Address A = Base address of histogram Adder Unit 1 0 Write 0 to Out1 = A A + (Adder1.Out1 << 2) A = A − 1 BNZ 0 1 Rest of processing Rest of processing The second stage processes the actual pixels from the image, and uses 4 Adder ALUs: Adder 1 Adder 2 Adder 3 Adder 4 Address Unit 1 A = 0 A = −1 2 Out1 = A A = Adder1.Out1 A = Adr.Out1 A = A + 1 Out1 = Read 4 bytes BZ2 A = pixel Z = pixel − Adder1.Out1 from: (A + (Adder1.Out1 << 2)) 3 Out1 = A Out1 = A Out1 = A Write Adder4.Out1 to: A = Adder3.Out1 (A + (Adder 2.Out << 2) 4 Write Adder4.Out1 to: (A + (Adder 2.Out << 2) Flush caches The Zero flag from Adder2 cycle 2 is used to stay at microcode address 2 for as long as the input pixel is the same. When it changes, the new count is written out in microcode address 3, and processing resumes at microcode address 2. Microcode address 4 is used at the end, when there are no more pixels to be read. Stage 1 takes 256 cycles, or 2560 ns. Stage 2 varies according to the values of the pixels. The worst case time for lookup table replacement is 2 cycles per image pixel if every pixel is not the same as its neighbor. The time taken for a single color lookup is 0.03 s (1500×1000×2 cycle per pixel×10 ns per cycle=30,000,000 ns). The time taken for 3 color components is 3 times this amount, or 0.09 s. Color Transform Color transformation is achieved in two main ways: Lookup table replacement Color space conversion Lookup Table Replacement As illustrated in FIG. 86, one of the simplest ways to transform the color of a pixel is to encode an arbitrarily complex transform function into a lookup table 380. The component color value of the pixel is used to lookup 381 the new component value of the pixel. For each pixel read from a Sequential Read Iterator, its new value is read from the New Color Table 380, and written to a Sequential Write Iterator 383. The input image can be processed simultaneously in two halves to make effective use of memory bandwidth. The following lookup table is used: Lookup Size Details LU1 256 entries Replacement[X] 8 bits per entry Table indexed by the 8 highest significant bits of X. Resultant 8 bits treated as fixed point 0:8 The total process requires 2 Sequential Read Iterators and 2 Sequential Write iterators. The 2 New Color Tables require 8 cache lines each to hold the 256 bytes (256 entries of 1 byte). The average time for lookup table replacement is therefore ½ cycle per image pixel. The time taken for a single color lookup is 0.0075 s (1500×1000×½ cycle per pixel×10 ns per cycle=7,500,000 ns). The time taken for 3 color components is 3 times this amount, or 0.0225 s. Each color component has to be processed one after the other under control of software. Color Space Conversion Color Space conversion is only required when moving between color spaces. The CCD images are captured in RGB color space, and printing occurs in CMY color space, while clients of the ACP 31 likely process images in the Lab color space. All of the input color space channels are typically required as input to determine each output channel's component value. Thus the logical process is as illustrated 385 in FIG. 94. Simply, conversion between Lab, RGB, and CMY is fairly straightforward. However the individual color profile of a particular device can vary considerably. Consequently, to allow future CCDs, inks, and printers, the ACP 31 performs color space conversion by means of tri-linear interpolation from color space conversion lookup tables. Color coherence tends to be area based rather than line based. To aid cache coherence during tri-linear interpolation lookups, it is best to process an image in vertical strips. Thus the read 386-388 and write 389 iterators would be Vertical-Strip Iterators. Tri-Linear Color Space Conversion For each output color component, a single 3D table mapping the input color space to the output color component is required. For example, to convert CCD images from RGB to Lab, 3 tables calibrated to the physical characteristics of the CCD are required: RGB->L RGB->a RGB->b To convert from Lab to CMY, 3 tables calibrated to the physical characteristics of the ink/printer are required: Lab->C Lab->M Lab->Y The 8-bit input color components are treated as fixed-point numbers (3:5) in order to index into the conversion tables. The 3 bits of integer give the index, and the 5 bits of fraction are used for interpolation. Since 3 bits gives 8 values, 3 dimensions gives 512 entries (8×8×8). The size of each entry is 1 byte, requiring 512 bytes per table. The Convert Color Space process can therefore be implemented as shown in FIG. 95 and the following lookup table is used: Lookup Size Details LU1 8 × 8 × 8 entries Convert[X, Y, Z] 512 entries Table indexed by the 3 highest bits of X, Y, and Z. 8 bits per entry 8 entries returned from Tri-linear index address unit Resultant 8 bits treated as fixed point 8:0 Transfer time is 8 entries at 1 byte per entry Tri-linear interpolation returns interpolation between 8 values. Each 8 bit value takes 1 cycle to be returned from the lookup, for a total of 8 cycles. The tri-linear interpolation also takes 8 cycles when 2 Multiply ALUs are used per cycle. General tri-linear interpolation information is given in the ALU section of this document. The 512 bytes for the lookup table fits in 16 cache lines. The time taken to convert a single color component of image is therefore 0.105 s (1500*1000*7 cycles*10 ns per cycle). To convert 3 components takes 0.415 s. Fortunately, the color space conversion for printout takes place on the fly during printout itself, so is not a perceived delay. If color components are converted separately, they must not overwrite their input color space components since all color components from the input color space are required for converting each component. Since only 1 multiply unit is used to perform the interpolation, it is alternatively possible to do the entire Lab->CMY conversion as a single pass. This would require 3 Vertical-Strip Read Iterators, 3 Vertical-Strip Write Iterators, and access to 3 conversion tables simultaneously. In that case, it is possible to write back onto the input image and thus use no extra memory. However, access to 3 conversion tables equals ⅓ of the caching for each, that could lead to high latency for the overall process. Affine Transform Prior to compositing an image with a photo, it may be necessary to rotate, scale and translate it. If the image is only being translated, it can be faster to use a direct sub-pixel translation function. However, rotation, scale-up and translation can all be incorporated into a single affine transform. A general affine transform can be included as an accelerated function. Affine transforms are limited to 2D, and if scaling down, input images should be pre-scaled via the Scale function. Having a general affine transform function allows an output image to be constructed one block at a time, and can reduce the time taken to perform a number of transformations on an image since all can be applied at the same time. A transformation matrix needs to be supplied by the client—the matrix should be the inverse matrix of the transformation desired i.e. applying the matrix to the output pixel coordinate will give the input coordinate. A 2D matrix is usually represented as a 3×3 array: [ a b 0 c d 0 e f 1 ] Since the 3rd column is always [0, 0, 1] clients do not need to specify it Clients instead specify a, b, c, d, e, and f. Given a coordinate in the output image (x, y) whose top left pixel coordinate is given as (0, 0), the input coordinate is specified by: (ax+cy+e, bx+dy+f). Once the input coordinate is determined, the input image is sampled to arrive at the pixel value. Bi-linear interpolation of input image pixels is used to determine the value of the pixel at the calculated coordinate. Since affine transforms preserve parallel lines, images are processed in output vertical strips of 32 pixels wide for best average input image cache coherence. Three Multiply ALUs are required to perform the bi-linear interpolation in 2 cycles. Multiply ALUs 1 and 2 do linear interpolation in X for lines Y and Y+1 respectively, and Multiply ALU 3 does linear interpolation in Y between the values output by Multiply ALUs 1 and 2. As we move to the right across an output line in X, 2 Adder ALUs calculate the actual input image coordinates by adding ‘a’ to the current X value, and ‘b’ to the current Y value respectively. When we advance to the next line (either the next line in a vertical strip after processing a maximum of 32 pixels, or to the first line in a new vertical strip) we update X and Y to pre-calculated start coordinate values constants for the given block The process for calculating an input coordinate is given in FIG. 96 where the following constants are set by software: Calculate Pixel Once we have the input image coordinates, the input image must be sampled. A lookup table is used to return the values at the specified coordinates in readiness for bilinear interpolation. The basic process is as indicated in FIG. 97 and the following lookup table is used: Lookup Size Details LU1 Image Bilinear Image lookup [X, Y] width by Table indexed by the integer part of X and Y. Image 4 entries returned from Bilinear index address unit, height 2 per cycle. 8 bits per Each 8 bit entry treated as fixed point 8:0 entry Transfer time is 2 cycles (2 16 bit entries in FIFO hold the 4 8 bit entries) The affine transform requires all 4 Multiply Units and all 4 Adder ALUs, and with good cache coherence can perform an affine transform with an average of 2 cycles per output pixel. This timing assumes good cache coherence, which is true for non-skewed images. Worst case timings are severely skewed images, which meaningful Vark scripts are unlikely to contain. The time taken to transform a 128×128 image is therefore 0.00033 seconds (32,768 cycles). If this is a clip image with 4 channels (including a channel), the total time taken is 0.00131 seconds (131,072 cycles). A Vertical-Strip Write Iterator is required to output the pixels. No Read Iterator is required. However, since the affine transform accelerator is bound by time taken to access input image pixels, as many cache lines as possible should be allocated to the read of pixels from the input image. At least 32 should be available, and preferably 64 or more. Scaling Scaling is essentially a re-sampling of an image. Scale up of an image can be performed using the Affine Transform function. Generalized scaling of an image, including scale down, is performed by the hardware accelerated Scale function. Scaling is performed independently in X and Y, so different scale factors can be used in each dimension. The generalized scale unit must match the Affine Transform scale function in terms of registration. The generalized scaling process is as illustrated in FIG. 98. The scale in X is accomplished by Fant's re-sampling algorithm as illustrated in FIG. 99. Where the following constants are set by software: Constant Value K1 Number of input pixels that contribute to an output pixel in X K2 {fraction (1/K)}1 The following registers are used to hold temporary variables: Variable Value Latch1 Amount of input pixel remaining unused (starts at 1 and decrements) Latch2 Amount of input pixels remaining to contribute to current output pixel (starts at K1 and decrements) Latch3 Next pixel (in X) Latch4 Current pixel Latch5 Accumulator for output pixel (unscaled) Latch6 Pixel Scaled in X (output) The Scale in Y process is illustrated in FIG. 100 and is also accomplished by a slightly altered version of Fant's re-sampling algorithm to account for processing in order of X pixels. Where the following constants are set by software: Constant Value K1 Number of input pixels that contribute to an output pixel in Y K2 1/K1 The following registers are used to hold temporary variables: Variable Value Latch1 Amount of input pixel remaining unused (starts at 1 and decrements) Latch2 Amount of input pixels remaining to contribute to current output pixel (starts at K1 and decrements) Latch3 Next pixel (in Y) Latch4 Current pixel Latch5 Pixel Scaled in Y (output) The following DRAM FIFOs are used: Lookup Size Details FIFO1 ImageWidthOUT 1 row of image pixels already scaled in X entries 8 bits 1 cycle transfer time per entry FIFO2 ImageWidthOUT 1 row of image pixels already scaled in X entries 16 bits 2 cycles transfer time (1 byte per cycle) per entry Tessellate Image Tessellation of an image is a form of tiling. It involves copying a specially designed “tile” multiple times horizontally and vertically into a second (usually larger) image space. When tessellated, the small tile forms a seamless picture. One example of this is a small tile of a section of a brick wall. It is designed so that when tessellated, it forms a full brick wall. Note that there is no scaling or sub-pixel translation involved in tessellation The most cache-coherent way to perform tessellation is to output the image sequentially line by line, and to repeat the same line of the input image for the duration of the line. When we finish the line, the input image must also advance to the next line (and repeat it multiple times across the output line). An overview of the tessellation function is illustrated 390 in FIG. 101. The Sequential Read Iterator 392 is set up to continuously read a single line of the input tile (StartLine would be 0 and EndLine would be 1). Each input pixel is written to all 3 of the Write Iterators 393-395. A counter 397 in an Adder ALU counts down the number of pixels in an output line, terminating the sequence at the end of the line. At the end of processing a line, a small software routine updates the Sequential Read Iterator's StartLine and EndLine registers before restarting the microcode and the Sequential Read Iterator (which clears the FIFO and repeats line 2 of the tile). The Write Iterators 393-395 are not updated, and simply keep on writing out to their respective parts of the output image. The net effect is that the tile has one line repeated across an output line, and then the tile is repeated vertically too. This process does not fully use the memory bandwidth since we get good cache coherence in the input image, but it does allow the tessellation to function with tiles of any size. The process uses 1 Adder ALU. If the 3 Write Iterators 393-395 each write to 1/3 of the image (breaking the image on tile sized boundaries), then the entire tessellation process takes place at an average speed of 1/3 cycle per output image pixel. For an image of 1500×1000, this equates to 0.005 seconds (5,000,000 ns). Sub-Pixel Translator Before compositing an image with a background, it may be necessary to translate it by a sub-pixel amount in both X and Y. Sub-pixel transforms can increase an image's size by 1 pixel in each dimension. The value of the region outside the image can be client determined, such as a constant value (e.g. black), or edge pixel replication. Typically it will be better to use black. The sub-pixel translation process is as illustrated in FIG. 102. Sub-pixel translation in a given dimension is defined by: Pixelout=Pixelin*(1−Translation)+Pixelin−1*Translation It can also be represented as a form of interpolation: Pixelout=Pixelin−1+(Pixelin−Pixelin−1)*Translation Implementation of a single (on average) cycle interpolation engine using a single Multiply ALU and a single Adder ALU in conjunction is straightforward. Sub-pixel translation in both X & Y requires 2 interpolation engines. In order to sub-pixel translate in Y, 2 Sequential Read Iterators 400, 401 are required (one is reading a line ahead of the other from the same image), and a single Sequential Write Iterator 403 is required. The first interpolation engine (interpolation in Y) accepts pairs of data from 2 streams, and linearly interpolates between them. The second interpolation engine (interpolation in X) accepts its data as a single 1 dimensional stream and linearly interpolates between values. Both engines interpolate in 1 cycle on average. Each interpolation engine 405, 406 is capable of performing the sub-pixel translation in 1 cycle per output pixel on average. The overall time is therefore 1 cycle per output pixel, with requirements of 2 Multiply ALUs and 2 Adder ALUs. The time taken to output 32 pixels from the sub-pixel translate function is on average 320 ns (32 cycles). This is enough time for 4 full cache-line accesses to DRAM, so the use of 3 Sequential Iterators is well within timing limits. The total time taken to sub-pixel translate an image is therefore 1 cycle per pixel of the output image. A typical image to be sub-pixel translated is a tile of size 128*128. The output image size is 129*129. The process takes 129*129*10 ns=166,410 ns. The Image Tiler function also makes use of the sub-pixel translation algorithm, but does not require the writing out of the sub-pixel-translated data, but rather processes it further. Image Tiler The high level algorithm for tiling an image is carried out in software. Once the placement of the tile has been determined, the appropriate colored tile must be composited. The actual compositing of each tile onto an image is carried out in hardware via the microcoded ALUs. Compositing a tile involves both a texture application and a color application to a background image. In some cases it is desirable to compare the actual amount of texture added to the background in relation to the intended amount of texture, and use this to scale the color being applied. In these cases the texture must be applied first Since color application functionality and texture application functionality are somewhat independent, they are separated into sub-functions. The number of cycles per 4-channel tile composite for the different texture styles and coloring styles is summarised in the following table: Constant Pixel color color Replace texture 4 4.75 25% background + tile texture 4 4.75 Average height algorithm 5 5.75 Average height algorithm with feedback 5.75 6.5 Tile Coloring and Compositing A tile is set to have either a constant color (for the whole tile), or takes each pixel value from an input image. Both of these cases may also have feedback from a texturing stage to scale the opacity (similar to thinning paint). The steps for the 4 cases can be summarised as: Sub-pixel translate the tile's opacity values, Optionally scale the tile's opacity (if feedback from texture application is enabled). Determine the color of the pixel (constant or from an image map). Composite the pixel onto the background image. Each of the 4 cases is treated separately, in order to minimize the time taken to perform the function. The summary of time per color compositing style for a single color channel is described in the following table: No feedback from Feedback from texture texture Tiling color style (cycles per pixel) (cycles per pixel) Tile has constant color per pixel 1 2 Tile has per pixel color from 1.25 2 input image Constant Color In this case, the tile has a constant color, determined by software. While the ACP 31 is placing down one tile, the software can be determining the placement and coloring of the next tile. The color of the tile can be determined by bi-linear interpolation into a scaled version of the image being tiled. The scaled version of the image can be created and stored in place of the image pyramid, and needs only to be performed once per entire tile operation. If the tile size is 128×128, then the image can be scaled down by 128:1 in each dimension. Without Feedback When there is no feedback from the texturing of a tile, the tile is simply placed at the specified coordinates. The tile color is used for each pixel's color, and the opacity for the composite comes from the tile's sub-pixel translated opacity channel. In this case color channels and the texture channel can be processed completely independently between tiling passes. The overview of the process is illustrated in FIG. 103. Sub-pixel translation 410 of a tile can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from the sub-pixel translation is the mask to be used in compositing 411 the constant tile color 412 with the background image from background sequential Read Iterator. Compositing can be performed using 1 Multiply ALU and 1 Adder ALU in an average time of 1 cycle per composite. Requirements are therefore 3 Multiply ALUs and 3 Adder ALUs. 4 Sequential Iterators 413-416 are required, taking 320 ns to read or write their contents. With an average number of cycles of 1 per pixel to sub-pixel translate and composite, there is sufficient time to read and write the buffers. With Feedback When there is feedback from the texturing of a tile, the tile is placed at the specified coordinates. The tile color is used for each pixel's color, and the opacity for the composite comes from the tile's sub-pixel translated opacity channel scaled by the feedback parameter. Thus the texture values must be calculated before the color value is applied. The overview of the process is illustrated in FIG. 97. Sub-pixel translation of a tile can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from the sub-pixel translation is the mask to be scaled according to the feedback read from the Feedback Sequential Read Iterator 420. The feedback is passed it to a Scaler (1 Multiply ALU) 421. Compositing 422 can be performed using 1 Multiply ALU and 1 Adder ALU in an average time of 1 cycle per composite. Requirements are therefore 4 Multiply ALUs and all 4 Adder ALUs. Although the entire process can be accomplished in 1 cycle on average, the bottleneck is the memory access, since 5 Sequential Iterators are required. With sufficient buffering, the average time is 1.25 cycles per pixel. Color from Input Image One way of coloring pixels in a tile is to take the color from pixels in an input image. Again, there are two possibilities for compositing: with and without feedback from the texturing. Without Feedback In this case, the tile color simply comes from the relative pixel in the input image. The opacity for compositing comes from the tile's opacity channel sub-pixel shifted. The overview of the process is illustrated in FIG. 105. Sub-pixel translation 425 of a tile can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from the sub-pixel translation is the mask to be used in compositing 426 the tile's pixel color (read from the input image 428) with the background image 429. Compositing 426 can be performed using 1 Multiply ALU and 1 Adder ALU in an average time of 1 cycle per composite. Requirements are therefore 3 Multiply ALUs and 3 Adder ALUs. Although the entire process can be accomplished in 1 cycle on average, the bottleneck is the memory access, since 5 Sequential Iterators are required. With sufficient buffering, the average time is 1.25 cycles per pixel. With Feedback In this case, the tile color still comes from the relative pixel in the input image, but the opacity for compositing is affected by the relative amount of texture height actually applied during the texturing pass. This process is as illustrated in FIG. 106. Sub-pixel translation 431 of a tile can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from the sub-pixel translation is the mask to be scaled 431 according to the feedback read from the Feedback Sequential Read Iterator 432. The feedback is passed to a Scaler (1 Multiply ALU) 431. Compositing 434 can be performed using 1 Multiply ALU and 1 Adder ALU in an average time of 1 cycle per composite. Requirements are therefore all 4 Multiply ALUs and 3 Adder ALUs. Although the entire process can be accomplished in 1 cycle on average, the bottleneck is the memory access, since 6 Sequential Iterators are required. With sufficient buffering, the average time is 1.5 cycles per pixel. Tile Texturing Each tile has a surface texture defined by its texture channel. The texture must be sub-pixel translated and then applied to the output image. There are 3 styles of texture compositing: Replace texture 25% background+tile's texture Average height algorithm In addition, the Average height algorithm can save feedback parameters for color compositing. The time taken per texture compositing style is summarised in the following table: Cycles per pixel Cycles per pixel (no feedback from (feedback from Tiling color style texture) texture) Replace texture 1 — 25% background + tile 1 — texture value Average height algorithm 2 2 Replace Texture In this instance, the texture from the tile replaces the texture channel of the image, as illustrated in FIG. 107. Sub-pixel translation 436 of a tile's texture can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from this sub-pixel translation is fed directly to the Sequential Write Iterator 437. The time taken for replace texture compositing is 1 cycle per pixel. There is no feedback, since 100% of the texture value is always applied to the background. There is therefore no requirement for processing the channels in any particular order. 25% Background+Tile's Texture In this instance, the texture from the tile is added to 25% of the existing texture value. The new value must be greater than or equal to the original value. In addition, the new texture value must be clipped at 255 since the texture channel is only 8 bits. The process utilised is illustrated in FIG. 108. Sub-pixel translation 440 of a tile's texture can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. The output from this sub-pixel translation 440 is fed to an adder 441 where it is added to ¼ 442 of the background texture value. Min and Max functions 444 are provided by the 2 adders not used for sub-pixel translation and the output written to a Sequential Write Iterator 445. The time taken for this style of texture compositing is 1 cycle per pixel. There is no feedback, since 100% of the texture value is considered to have been applied to the background (even if clipping at 255 occurred). There is therefore no requirement for processing the channels in any particular order. Average Height Algorithm In this texture application algorithm, the average height under the tile is computed, and each pixel's height is compared to the average height. If the pixel's height is less than the average, the stroke height is added to the background height. If the pixel's height is greater than or equal to the average, then the stroke height is added to the average height. Thus background peaks thin the stroke. The height is constrained to increase by a minimum amount to prevent the background from thinning the stroke application to 0 (the minimum amount can be 0 however). The height is also clipped at 255 due to the 8-bit resolution of the texture channel. There can be feedback of the difference in texture applied versus the expected amount applied. The feedback amount can be used as a scale factor in the application of the tile's color. In both cases, the average texture is provided by software, calculated by performing a bi-level interpolation on a scaled version of the texture map. Software determines the next tile's average texture height while the current tile is being applied. Software must also provide the minimum thickness for addition, which is typically constant for the entire tiling process. Without Feedback With no feedback, the texture is simply applied to the background texture, as shown in FIG. 109. 4 Sequential Iterators are required, which means that if the process can be pipelined for 1 cycle, the memory is fast enough to keep up. Sub-pixel translation 450 of a tile's texture can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. Each Min & Max function 451, 452 requires a separate Adder ALU in order to complete the entire operation in 1 cycle. Since 2 are already used by the sub-pixel translation of the texture, there are not enough remaining for a 1 cycle average time. The average time for processing 1 pixel's texture is therefore 2 cycles. Note that there is no feedback, and hence the color channel order of compositing is irrelevant With Feedback This is conceptually the same as the case without feedback, except that in addition to the standard processing of the texture application algorithm, it is necessary to also record the proportion of the texture actually applied The proportion can be used as a scale factor for subsequent compositing of the tile's color onto the background image. A flow diagram is illustrated in FIG. 110 and the following lookup table is used: Lookup Size Details LU1 256 entries 1/N 16 bits per entry Table indexed by N (range 0-255) Resultant 16 bits treated as fixed point 0:16 Each of the 256 entries in the software provided 1/N table 460 is 16 bits, thus requiring 16 cache lines to hold continuously. Sub-pixel translation 461 of a tile's texture can be accomplished using 2 Multiply ALUs and 2 Adder ALUs in an average time of 1 cycle per output pixel. Each Min 462 & Max 463 function requires a separate Adder ALU in order to complete the entire operation in 1 cycle. Since 2 are already used by the sub-pixel translation of the texture, there are not enough remaining for a 1 cycle average time. The average time for processing 1 pixel's texture is therefore 2 cycles. Sufficient space must be allocated for the feedback data area (a tile sized image channel). The texture must be applied before the tile's color is applied, since the feedback is used in scaling the tile's opacity. CCD Image Interpolator Images obtained from the CCD via the ISI 83 (FIG. 3) are 750×500 pixels. When the image is captured via the ISI, the orientation of the camera is used to rotate the pixels by 0, 90, 180, or 270 degrees so that the top of the image corresponds to ‘up’. Since every pixel only has an R, G, or B color component (rather than all 3), the fact that these have been rotated must be taken into account when interpreting the pixel values. Depending on the orientation of the camera, each 2×2 pixel block has one of the configurations illustrated in FIG. 111: Several processes need to be performed on the CCD captured image in order to transform it into a useful form for processing: Up-interpolation of low-sample rate color components in CCD image (interpreting correct orientation of pixels) Color conversion from RGB to the internal color space Scaling of the internal space image from 750×500 to 1500×1000. Writing out the image in a planar format The entire channel of an image is required to be available at the same time in order to allow warping. In a low memory model (8 MB), there is only enough space to hold a single channel at full resolution as a temporary object. Thus the color conversion is to a single color channel. The limiting factor on the process is the color conversion, as it involves tri-linear interpolation from RGB to the internal color space, a process that takes 0.026 ns per channel (750×500×7 cycles per pixel×10 ns per cycle=26,250,000 ns). It is important to perform the color conversion before scaling of the internal color space image as this reduces the number of pixels scaled (and hence the overall process time) by a factor of 4. The requirements for all of the transformations may not fit in the ALU scheme. The transformations are therefore broken into two phases: Phase 1: Up-interpolation of low-sample rate color components in CCD image (interpreting correct orientation of pixels) Color conversion from RGB to the internal color space Writing out the Image in a Planar Format Phase 2: Scaling of the Internal Space Image from 750×500 to 1500×1000 Separating out the scale function implies that the small color converted image must be in memory at the same time as the large one. The output from Phase 1 (0.5 MB) can be safely written to the memory area usually kept for the image pyramid (1 MB). The output from Phase 2 can be the general expanded CCD image. Separation of the scaling also allows the scaling to be accomplished by the Affine Transform, and also allows for a different CCD resolution that may not be a simple 1:2 expansion. Phase 1: Up-Interpolation of Low-Sample Rate Color Components. Each of the 3 color components (R, G, and B) needs to be up interpolated in order for color conversion to take place for a given pixel. We have 7 cycles to perform the interpolation per pixel since the color conversion takes 7 cycles. Interpolation of G is straightforward and is illustrated in FIG. 112. Depending on orientation, the actual pixel value G alternates between odd pixels on odd lines & even pixels on even lines, and odd pixels on even lines & even pixels on odd lines. In both cases, linear interpolation is all that is required. Interpolation of R and B components as illustrated in FIG. 113 and FIG. 113, is more complicated, since in the horizontal and vertical directions, as can be seen from the diagrams, access to 3 rows of pixels simultaneously is required, so 3 Sequential Read Iterators are required, each one offset by a single row. In addition, we have access to the previous pixel on the same row via a latch for each row. Each pixel therefore contains one component from the CCD, and the other 2 up-interpolated. When one component is being bi-linearly interpolated, the other is being linearly interpolated. Since the interpolation factor is a constant 0.5, interpolation can be calculated by an add and a shift 1 bit right (in 1 cycle), and bi-linear interpolation of factor 0.5 can be calculated by 3 adds and a shift 2 bits right (3 cycles). The total number of cycles required is therefore 4, using a single multiply ALU. FIG. 115 illustrates the case for rotation 0 even line even pixel (EL, EP), and odd line odd pixel (OL, OP) and FIG. 116 illustrates the case for rotation 0 even line odd pixel (EL, OP), and odd line even pixel (OL, EP). The other rotations are simply different forms of these two expressions. Color Conversion Color space conversion from RGB to Lab is achieved using the same method as that described in the general Color Space Convert function, a process that takes 8 cycles per pixel. Phase 1 processing can be described with reference to FIG. 117. The up-interpolate of the RGB takes 4 cycles (1 Multiply ALU), but the conversion of the color space takes 8 cycles per pixel (2 Multiply ALUs) due to the lookup transfer time. Phase 2 Scaling the Image This phase is concerned with up-interpolating the image from the CCD resolution (750×500) to the working photo resolution (1500×1000). Scaling is accomplished by running the Affine transform with a scale of 1:2. The timing of a general affine transform is 2 cycles per output pixel, which in this case means an elapsed scaling time of 0.03 seconds. Illuminate Image Once an image has been processed, it can be illuminated by one or more light sources. Light sources can be: 1. Directional—is infinitely distant so it casts parallel light in a single direction 2. Omni—casts unfocused lights in all directions. 3. Spot—casts a focused beam of light at a specific target point. There is a cone and penumbra associated with a spotlight. The scene may also have an associated bump-map to cause reflection angles to vary. Ambient light is also optionally present in an illuminated scene. In the process of accelerated illumination, we are concerned with illuminating one image channel by a single light source. Multiple light sources can be applied to a single image channel as multiple passes one pass per light source. Multiple channels can be processed one at a time with or without a bump-map. The normal surface vector (N) at a pixel is computed from the bump-map if present. The default normal vector, in the absence of a bump-map, is perpendicular to the image plane i.e. N=[0, 0, 1]. The viewing vector V is always perpendicular to the image plane i.e. V=[0, 0, 1]. For a directional light source, the light source vector (L) from a pixel to the light source is constant across the entire image, so is computed once for the entire image. For an omni light source (at a finite distance), the light source vector is computed independently for each pixel. A pixel's reflection of ambient light is computed according to: IakaOd A pixel's diffuse and specular reflection of a light source is computed according to the Phong model: fattIp[kdOd(N·L)+ksOs(R·V)n] When the light source is at infinity, the light source intensity is constant across the image. Each light source has three contributions per pixel Ambient Contribution Diffuse contribution Specular contribution The light source can be defined using the following variables: dL Distance from light source fatt Attenuation with distance [fatt = 1/dL2] R Normalised reflection vector [R = 2 N(N.L) − L] Ia Ambient light intensity Ip Diffuse light coefficient ka Ambient reflection coefficient kd Diffuse reflection coefficient ks Specular reflection coefficient ksc Specular color coefficient L Normalised light source vector N Normalised surface normal vector n Specular exponent Od Object's diffuse color (i.e. image pixel color) Os Object's specular color (kscOd + (1 − ksc)Ip) V Normalised viewing vector [V = [0, 0, 1]] The same reflection coefficients (ka, ks, kd) are used for each color component A given pixel's value will be equal to the ambient contribution plus the sun of each light's diffuse and specular contribution. Sub-Processes of Illumination Calculation In order to calculate diffuse and specular contributions, a variety of other calculations are required. These are calculations of: 1/{square root}X N L N·L R·V fatt fcp Sub-processes are also defined for calculating the contributions of: ambient diffuse specular The sub-processes can then be used to calculate the overall illumination of a light source. Since there are only 4 multiply ALUs, the microcode for a particular type of light source can have sub-processes intermingled appropriately for performance. Calculation of 1/{square root}X The Vark lighting model uses vectors. In many cases it is important to calculate the inverse of the length of the vector for normalization purposes. Calculating the inverse of the length requires the calculation of 1/SquareRoot[X]. Logically, the process can be represented as a process with inputs and outputs as shown in FIG. 118. Referring to FIG. 119, the calculation can be made via a lookup of the estimation, followed by a single iteration of the following function: Vn+1=½Vn(3−XVn2) The number of iterations depends on the accuracy required. In this case only 16 bits of precision are required. The table can therefore have 8 bits of precision, and only a single iteration is necessary. The following constant is set by software: Constant Value K1 3 The following lookup table is used: Lookup Size Details LU1 256 entries 1/SquareRoot[X] 8 bits per Table indexed by the 8 highest significant entry bits of X. Resultant 8 bits treated as fixed point 0:8 Calculation of N N is the surface normal vector. When there is no bump-map, N is constant. When a bump-map is present, N must be calculated for each pixel. No Bump-Map When there is no bump-map, there is a fixed normal N that has the following properties: N=[XN, YN, ZN]=[0, 0, 1] ∥N∥=1 1/∥N∥=1 normalized N=N These properties can be used instead of specifically calculating the normal vector and 1/∥N∥ and thus optimize other calculations. With Bump-Map As illustrated in FIG. 120, when a bump-map is present, N is calculated by comparing bump-map values in X and Y dimensions. FIG. 120 shows the calculation of N for pixel P1 in terms of the pixels in the same row and column, but not including the value at P1 itself. The calculation of N is made resolution independent by multiplying by a scale factor (same scale factor in X & Y). This process can be represented as a process having inputs and outputs (ZN is always 1) as illustrated in FIG. 121. As ZN is always 1. Consequently XN and YN are not normalized yet (since ZN=1). Normalization of N is delayed until after calculation of N.L so that there is only 1 multiply by 1/∥N∥ instead of 3. An actual process for calculating N is illustrated in FIG. 122. The following constant is set by software: Constant Value K1 ScaleFactor (to make N resolution independent) Calculation of L Directional lights When a light source is infinitely distant, it has an effective constant light vector L. L is normalized and calculated by software such that: L=[XL, YL, ZL] ∥L∥=1 1/∥L∥=1 These properties can be used instead of specifically calculating the L and 1/∥L∥ and thus optimize other calculations. This process is as illustrated in FIG. 123. Omni Lights and Spotlights When the light source is not infinitely distant, L is the vector from the current point P to the light source PL. Since P=[Xp, Yp, 0], L is given by: L=μXL, YL, ZL] XL=XP−XPL YL=YP−YPL ZL=−ZPL We normalize XL, YL and ZL by multiplying each by 1/∥L∥. The calculation of 1/∥L∥ (for later use in normalizing) is accomplished by calculating V=XL2+YL2+ZL2 and then calculating V−1/2 In this case, the calculation of L can be represented as a process with the inputs and outputs as indicated in FIG. 124. Xp and Yp are the coordinates of the pixel whose illumination is being calculated. Zp is always 0. The actual process for calculating L can be as set out in FIG. 125. Where the following constants are set by software: Constant Value K1 XPL K2 YPL K3 ZPL2 (as ZP is 0) K4 −ZPL Calculation of N.L Calculating the dot product of vectors N and L is defined as: XNXL+YNYL+ZNZL No Bump-Map When there is no bump-map N is a constant [0, 0, 1]. N.L therefore reduces to ZL. With Bump-Map When there is a bump-map, we must calculate the dot product directly. Rather than take in normalized N components, we normalize after taking the dot product of a non-normalized N to a normalized L. L is either normalized by software (if it is constant), or by the Calculate L process. This process is as illustrated in FIG. 126. Note that ZN is not required as input since it is defined to be 1. However 1/∥N∥ is required instead, in order to normalize the result. One actual process for calculating N.L is as illustrated in FIG. 127. Calculation of R·V R·V is required as input to specular contribution calculations. Since V=[0, 0, 1], only the Z components are required. R·V therefore reduces to: R·V=2ZN(N.L)−ZL In addition, since the un-normalized ZN=1, normalized ZN=1/∥N∥ No Bump-Map The simplest implementation is when N is constant (i.e. no bump-map). Since N and V are constant, N.L and R·V can be simplified: V=[0, 0, 1] N=[0, 0, 1] L=μXL, YL, ZL] N.L=ZL R · V = ⁢ 2 ⁢ Z N ⁡ ( N · L ) - Z L = ⁢ 2 ⁢ Z L - Z L = ⁢ Z L When L is constant (Directional light source), a normalized ZL can be supplied by software in the form of a constant whenever R·V is required. When L varies (Omni lights and Spotlights), normalized ZL must be calculated on the fly. It is obtained as output from the Calculate L process. With Bump-Map When N is not constant the process of calculating R·V is simply an implementation of the generalized formula: R·V=2ZN(N.L)−ZL The inputs and outputs are as shown in FIG. 128 with the an actual implementation as shown in FIG. 129. Calculation of Attenuation Factor Directional Lights When a light source is infinitely distant, the intensity of the light does not vary across the image. The attenuation factor fatt is therefore 1. This constant can be used to optimize illumination calculations for infinitely distant light sources. Omni Lights and Spotlights When a light source is not infinitely distant, the intensity of the light can vary according to the following formula: fatt=f0+f1/d+f2/d2 Appropriate settings of coefficients f0, f1, and f2 allow light intensity to be attenuated by a constant, linearly with distance, or by the square of the distance. Since d=∥L∥, the calculation of fatt can be represented as a process with the following inputs and outputs as illustrated in FIG. 130. The actual process for calculating fatt can be defined in FIG. 131. Where the following constants are set by software: Constant Value K1 F2 K2 f1 K3 F0 Calculation of Cone and Penumbra Factor Directional Lights and Omni Lights These two light sources are not focused, and therefore have no cone or penumbra. The cone-penumbra scaling factor fcp is therefore 1. This constant can be used to optimize illumination calculations for Directional and Omni light sources. Spotlights A spotlight focuses on a particular target point (PT). The intensity of the Spotlight varies according to whether the particular point of the image is in the cone, in the penumbra, or outside the cone/penumbra region. Turning now to FIG. 132, there is illustrated a graph of fcp with respect to the penumbra position. Inside the cone 470, fcp is 1, outside 471 the penumbra fcp is 0. From the edge of the cone through to the end of the penumbra, the light intensity varies according to a cubic function 472. The various vectors for penumbra 475 and cone 476 calculation are as illustrated in FIG. 133 and FIG. 134. Looking at the surface of the image in 1 dimension as shown in FIG. 134, 3 angles A, B, and C are defined. A is the angle between the target point 479, the light source 478, and the end of the cone 480. C is the angle between the target point 479, light source 478, and the end of the penumbra 481. Both are fixed for a given light source. B is the angle between the target point 479, the light source 478, and the position being calculated 482, and therefore changes with every point being calculated on the image. We normalize the range A to C to be 0 to 1, and find the distance that B is along that angle range by the formula: (B−A)/(C−A) The range is forced to be in the range 0 to 1 by truncation, and this value used as a lookup for the cubic approximation of fcp. The calculation of fatt can therefore be represented as a process with the inputs and outputs as illustrated in FIG. 135 with an actual process for calculating fcp is as shown in FIG. 136 where the following constants are set by software: Constant Value K1 XLT K2 YLT K3 ZLT K4 A K5 1/(C-A). [MAXNUM if no penumbra] The following lookup tables are used: Lookup Size Details LU1 64 entries Arcos(X) 16 bits Units are same as for constants K5 and K6 per entry Table indexed by highest 6 bits Result by linear interpolation of 2 entries Timing is 2 * 8 bits * 2 entries = 4 cycles LU2 64 entries Light Response function fcp 16 bits F(1) = 0, F(0) = 1, others are according to cubic per entry Table indexed by 6 bits (1:5) Result by linear interpolation of 2 entries Timing is 2 * 8 bits = 4 cycles Calculation of Ambient Contribution Regardless of the number of lights being applied to an image, the ambient light contribution is performed once for each pixel, and does not depend on the bump-map. The ambient calculation process can be represented as a process with the inputs and outputs as illustrated in FIG. 131. The implementation of the process requires multiplying each pixel from the input image (Od) by a constant value (Iaka), as shown in FIG. 138 where the following constant is set by software: Constant Value K1 Iaka Calculation of Diffuse Contribution Each light that is applied to a surface produces a diffuse illumination. The diffuse illumination is given by the formula: diffuse=kdOd(N.L) There are 2 different implementations to consider: Implementation 1—Constant N and L When N and L are both constant (Directional light and no bump-map): N.L=ZL Therefore: diffuse=kdOdZL Since Od is the only variable, the actual process for calculating the diffuse contribution is as illustrated in FIG. 139 where the following constant is set by software: Constant Value K1 kd(N.L) = kdZL Implementation 2—Non-Constant N & L When either N or L are non-constant (either a bump-map or illumination from an Omni light or a Spotlight), the diffuse calculation is performed directly according to the formula: diffuse=kdOd(N.L) The diffuse calculation process can be represented as a process with the inputs as illustrated in FIG. 140. N.L can either be calculated using the Calculate N.L Process, or is provided as a constant. An actual process for calculating the diffuse contribution is as shown in FIG. 141 where the following constants are set by software: Constant Value K1 kd Calculation of Specular Contribution Each light that is applied to a surface produces a specular illumination. The specular illumination is given by the formula: specular=ksOs(R·V)n where Os=kscOd+(1−ksc)Ip There are two implementations of the Calculate Specular process. Implementation 1—Constant N and L The first implementation is when both N and L are constant (Directional light and no bump-map). Since N, L and V are constant, N.L and R·V are also constant: V=[0, 0, 1] N=[0, 0, 1] L=[XL, YL, ZL] N.L=ZL R · V = ⁢ 2 ⁢ Z N ⁡ ( N · L ) - Z L = ⁢ 2 ⁢ Z L - Z L = ⁢ Z L The specular calculation can thus be reduced to: specular = ⁢ k s ⁢ O s ⁢ Z L n = ⁢ k s ⁢ Z L n ⁡ ( k sc ⁢ O d + ( 1 - k sc ) ⁢ I p ) = ⁢ k s ⁢ k sc ⁢ Z L n ⁢ O d + ( 1 - k sc ) ⁢ I p ⁢ k s ⁢ Z L n Since only Od is a variable in the specular calculation, the calculation of the specular contribution can therefore be represented as a process with the inputs and outputs as indicated in FIG. 142 and an actual process for calculating the specular contribution is illustrated in FIG. 143 where the following constants are set by software: Constant Value K1 kskscZLn K2 (1 − ksc)IpksZLn Implementation 2—Non Constant N and L This implementation is when either N or L are not constant (either a bump-map or illumination from an Omni light or a Spotlight). This implies that R·V must be supplied, and hence R·Vn must also be calculated. The specular calculation process can be represented as a process with the inputs and outputs as shown in FIG. 144. FIG. 145 shows an actual process for calculating the specular contribution where the following constants are set by software: Constant Value K1 ks K2 ksc K3 (1 − ksc)Ip The following lookup table is used: Lookup Size Details LU1 32 entries Xn 16 bits per Table indexed by 5 highest bits of integer R · V entry Result by linear interpolation of 2 entries using fraction of R · V. Interpolation by 2 Multiplies. The time taken to retrieve the data from the lookup is 2 * 8 bits * 2 entries = 4 cycles. When Ambient Light is the Only Illumination If the ambient contribution is the only light source, the process is very straightforward since it is not necessary to add the ambient light to anything with the overall process being as illustrated in FIG. 146. We can divide the image vertically into 2 sections, and process each half simultaneously by duplicating the ambient light logic (thus using a total of 2 Multiply ALUs and 4 Sequential Iterators). The timing is therefore ½ cycle per pixel for ambient light application. The typical illumination case is a scene lit by one or more lights. In these cases, because ambient light calculation is so cheap, the ambient calculation is included with the processing of each light source. The first light to be processed should have the correct Iaka setting, and subsequent lights should have an Iaka value of 0 (to prevent multiple ambient contributions). If the ambient light is processed as a separate pass (and not the first pass), it is necessary to add the ambient light to the current calculated value (requiring a read and write to the same address). The process overview is shown in FIG. 147. The process uses 3 Image Iterators, 1 Multiply ALU, and takes 1 cycle per pixel on average. Infinite Light Source In the case of the infinite light source, we have a constant light source intensity across the image. Thus both L and fatt are constant No Bump Map When there is no bump-map, there is a constant normal vector N [0, 0, 1]. The complexity of the illumination is greatly reduced by the constants of N, L, and fatt. The process of applying a single Directional light with no bump-map is as illustrated in FIG. 147 where the following constant is set by software: Constant Value K1 Ip For a single infinite light source we want to perform the logical operations as shown in FIG. 148 where K1 through K4 are constants with the following values: Constant Value K1 Kd(NsL) = Kd LZ K2 ksc K3 Ks(NsH)n = Ks HZ2 K4 Ip The process can be simplified since K2, K3, and K4 are constants. Since the complexity is essentially in the calculation of the specular and diffuse contributions (using 3 of the Multiply ALUs), it is possible to safely add an ambient calculation as the 4th Multiply ALU. The first infinite light source being processed can have the true ambient light parameter Iaka and all subsequent infinite lights can set Iaka to be 0. The ambient light calculation becomes effectively free. If the infinite light source is the first light being applied, there is no need to include the existing contributions made by other light sources and the situation is as illustrated in FIG. 149 where the constants have the following values: Constant Value K1 kd(LsN) = kdLZ K4 Ip K5 (1 − ks(NsH)n)Ip = (1 − ksHZn)Ip K6 kscks(NsH)n Ip = kscksHZnIp K7 Iaka If the infinite light source is not the first light being applied, the existing contribution made by previously processed lights must be included (the same constants apply) and the situation is as illustrated in FIG. 148. In the first case 2 Sequential Iterators 490, 491 are required, and in the second case, 3 Sequential Iterators 490, 491, 492 (the extra Iterator is required to read the previous light contributions). In both cases, the application of an infinite light source with no bump map takes 1 cycle per pixel, including optional application of the ambient light. With Bump Map When there is a bump-map, the normal vector N must be calculated per pixel and applied to the constant light source vector L. 1/∥N∥ is also used to calculate R·V, which is required as input to the Calculate Specular 2 process. The following constants are set by software: Constant Value K1 XL K2 YL K3 ZL K4 Ip Bump-map Sequential Read Iterator 490 is responsible for reading the current line of the bump-map. It provides the input for determining the slope in X. Bump-map Sequential Read Iterators 491, 492 and are responsible for reading the line above and below the current line. They provide the input for determining the slope in Y. Omni Lights In the case of the Omni light source, the lighting vector L and attenuation factor fatt change for each pixel across an image. Therefore both L and fatt must be calculated for each pixel. No Bump Map When there is no bump-map, there is a constant normal vector N [0, 0, 1]. Although L must be calculated for each pixel, both N.L and R·V are simplified to ZL. When there is no bump-map, the application of an Omni light can be calculated as shown in FIG. 149 where the following constants are set by software: Constant Value K1 XP K2 YP K3 Ip The algorithm optionally includes the contributions from previous light sources, and also includes an ambient light calculation. Ambient light needs only to be included once. For all other light passes, the appropriate constant in the Calculate Ambient process should be set to 0. The algorithm as shown requires a total of 19 multiply/accumulates. The times taken for the lookups are 1 cycle during the calculation of L, and 4 cycles during the specular contribution. The processing time of 5 cycles is therefore the best that can be accomplished. The time taken is increased to 6 cycles in case it is not possible to optimally microcode the ALUs for the function. The speed for applying an Omni light onto an image with no associated bump-map is 6 cycles per pixel. With Bump-Map When an Omni light is applied to an image with an associated a bump-map, calculation of N, L, N.L and R·V are all necessary. The process of applying an Omni light onto an image with an associated bump-map is as indicated in FIG. 150 where the following constants are set by software: Constant Value K1 XP K2 YP K3 Ip The algorithm optionally includes the contributions from previous light sources, and also includes an ambient light calculation. Ambient light needs only to be included once. For all other light passes, the appropriate constant in the Calculate Ambient process should be set to 0. The algorithm as shown requires a total of 32 multiply/accumulates. The times taken for the lookups are 1 cycle each during the calculation of both L and N, and 4 cycles for the specular contribution. However the lookup required for N and L are both the same (thus 2 LUs implement the 3 LUs). The processing time of 8 cycles is adequate. The time taken is extended to 9 cycles in case it is not possible to optimally microcode the ALUs for the function. The speed for applying an Omni light onto an image with an associated bump-map is 9 cycles per pixel. Spotlights Spotlights are similar to Omni lights except that the attenuation factor fatt is modified by a cone/penumbra factor fcp that effectively focuses the light around a target No Bump-Map When there is no bump-map, there is a constant normal vector N [0, 0, 1]. Although L must be calculated for each pixel, both N.L and R·V are simplified to ZL. FIG. 151 illustrates the application of a Spotlight to an image where the following constants are set by software: Constant Value K1 XP K2 YP K3 Ip The algorithm optionally includes the contributions from previous light sources, and also includes an ambient light calculation. Ambient light needs only to be included once. For all other light passes, the appropriate constant in the Calculate Ambient process should be set to 0. The algorithm as shown requires a total of 30 multiply/accumulates. The times taken for the lookups are 1 cycle during the calculation of L, 4 cycles for the specular contribution, and 2 sets of 4 cycle lookups in the cone/penumbra calculation. With Bump-Map When a Spotlight is applied to an image with an associated a bump-map, calculation of N, L, N.L and R·V are all necessary. The process of applying a single Spotlight onto an image with associated bump-map is illustrated in FIG. 152 where the following constants are set by software: The algorithm optionally includes the contributions from previous light sources, and also includes an ambient light calculation. Ambient light needs only to be included once. For all other light passes, the appropriate constant in the Calculate Ambient process should be set to 0. The algorithm as shown requires a total of 41 multiply/accumulates. Print Head 44 FIG. 153 illustrates the logical layout of a single print Head which logically consists of 8 segments, each printing bi-level cyan, magenta, and yellow onto a portion of the page. Loading a Segment for Printing Before anything can be printed, each of the 8 segments in the Print Head must be loaded with 6 rows of data corresponding to the following relative rows in the final output image: Row 0=Line N, Yellow, even dots 0, 2, 4, 6, 8, . . . Row 1=Line N+8, Yellow, odd dots 1, 3, 5, 7, . . . Row 2=Line N+10, Magenta, even dots 0, 2, 4, 6, 8, . . . Row 3=Line N+18, Magenta, odd dots 1, 3, 5, 7, . . . Row 4=Line N+20, Cyan, even dots 0, 2, 4, 6, 8, . . . Row 5=Line N+28, Cyan, odd dots 1, 3, 5, 7, . . . Each of the segments prints dots over different parts of the page. Each segment prints 750 dots of one color, 375 even dots on one row, and 375 odd dots on another. The 8 segments have dots corresponding to positions: Segment First dot Last dot 0 0 749 1 750 1499 2 1500 2249 3 2250 2999 4 3000 3749 5 3750 4499 6 4500 5249 7 5250 5999 Each dot is represented in the Print Head segment by a single bit. The data must be loaded 1 bit at a time by placing the data on the segment's BitValue pin, and clocked in to a shift register in the segment according to a BitClock. Since the data is loaded into a shift register, the order of loading bits must be correct. Data can be clocked in to the Print Head at a maximum rate of 10 MHz. Once all the bits have been loaded, they must be transferred in parallel to the Print Head output buffer, ready for printing. The transfer is accomplished by a single pulse on the segment's ParallelXferClock pin. Controlling the Print In order to conserve power, not all the dots of the Print Head have to be printed simultaneously. A set of control lines enables the printing of specific dots. An external controller, such as the ACP, can change the number of dots printed at once, as well as the duration of the print pulse in accordance with speed and/or power requirements. Each segment has 5 NozzleSelect lines, which are decoded to select 32 sets of nozzles per row. Since each row has 375 nozzles, each set contains 12 nozzles. There are also 2 BankEnable lines, one for each of the odd and even rows of color. Finally, each segment has 3 ColorEnable lines, one for each of C, M, and Y colors. A pulse on one of the ColorEnable lines causes the specified nozzles of the color's specified rows to be printed. A pulse is typically about 2 □s in duration. If all the segments are controlled by the same set of NozzleSelect, BankEnable and ColorEnable lines (wired externally to the print head), the following is true: If both odd and even banks print simultaneously (both BankEnable bits are set), 24 nozzles fire simultaneously per segment, 192 nozzles in all, consuming 5.7 Watts. If odd and even banks print independently, only 12 nozzles fire simultaneously per segment, 96 in all, consuming 2.85 Watts. Print Head Interface 62 The Print Head Interface 62 connects the ACP to the Print Head, providing both data and appropriate signals to the external Print Head. The Print Head Interface 62 works in conjunction with both a VLIW processor 74 and a software algorithm running on the CPU in order to print a photo in approximately 2 seconds. An overview of the inputs and outputs to the Print Head Interface is shown in FIG. 154. The Address and Data Buses are used by the CPU to address the various registers in the Print Head Interface. A single BitClock output line connects to all 8 segments on the print head. The 8 DataBits lines lead one to each segment, and are clocked in to the 8 segments on the print head simultaneously (on a BitClock pulse). For example, dot 0 is transferred to segments0, dot 750 is transferred to segment1, dot 1500 to segment2 etc. simultaneously. The VLIW Output FIFO contains the dithered bi-level C, M, and Y 6000×9000 resolution print image in the correct order for output to the 8 DataBits. The ParallelXferClock is connected to each of the 8 segments on the print head, so that on a single pulse, all segments transfer their bits at the same time. Finally, the NozzleSelect, BankEnable and ColorEnable lines are connected to each of the 8 segments, allowing the Print Head Interface to control the duration of the C, M, and Y drop pulses as well as how many drops are printed with each pulse. Registers in the Print Head Interface allow the specification of pulse durations between 0 and 6 □s, with a typical duration of 2 □s. Printing an Image There are 2 phases that must occur before an image is in the hand of the Artcam user: 1. Preparation of the image to be printed 2. Printing the prepared image Preparation of an image only needs to be performed once. Printing the image can be performed as many times as desired. Prepare the Image Preparing an image for printing involves: 1. Convert the Photo Image into a Print Image 2. Rotation of the Print Image (internal color space) to align the output for the orientation of the printer 3. Up-interpolation of compressed channels (if necessary) 4. Color conversion from the internal color space to the CMY color space appropriate to the specific printer and ink At the end of image preparation, a 4.5 MB correctly oriented 1000×1500 CMY image is ready to be printed. Convert Photo Image to Print Image The conversion of a Photo Image into a Print Image requires the execution of a Vark script to perform image processing. The script is either a default image enhancement script or a Vark script taken from the currently inserted Artcard. The Vark script is executed via the CPU, accelerated by functions performed by the VLIW Vector Processor. Rotate the Print Image The image in memory is originally oriented to be top upwards. This allows for straightforward Vark processing. Before the image is printed, it must be aligned with the print roll's orientation. The re-alignment only needs to be done once. Subsequent Prints of a Print Image will already have been rotated appropriately. The transformation to be applied is simply the inverse of that applied during capture from the CCD when the user pressed the “Image Capture” button on the Artcam. If the original rotation was 0, then no transformation needs to take place. If the original rotation was +90 degrees, then the rotation before printing needs to be −90 degrees (same as 270 degrees). The method used to apply the rotation is the Vark accelerated Affine Transform function. The Affine Transform engine can be called to rotate each color channel independently. Note that the color channels cannot be rotated in place. Instead, they can make use of the space previously used for the expanded single channel (1.5 MB). FIG. 155 shows an example of rotation of a Lab image where the a and b channels are compressed 4:1. The L channel is rotated into the space no longer required (the single channel area), then the a channel can be rotated into the space left vacant by L, and finally the b channel can be rotated. The total time to rotate the 3 channels is 0.09 seconds. It is an acceptable period of time to elapse before the first print image. Subsequent prints do not incur this overhead. Up Interpolate and Color Convert The Lab image must be converted to CMY before printing. Different processing occurs depending on whether the a and b channels of the Lab image is compressed. If the Lab image is compressed, the a and b channels must be decompressed before the color conversion occurs. If the Lab image is not compressed, the color conversion is the only necessary step. The Lab image must be up interpolated (if the a and b channels are compressed) and converted into a CMY image. A single VLIW process combining scale and color transform can be used. The method used to perform the color conversion is the Vark accelerated Color Convert function. The Affine Transform engine can be called to rotate each color channel independently. The color channels cannot be rotated in place. Instead, they can make use of the space previously used for the expanded single channel (1.5 MB). Print the Image Printing an image is concerned with taking a correctly oriented 1000×1500 CMY image, and generating data and signals to be sent to the external Print Head. The process involves the CPU working in conjunction with a VLIW process and the Print Head Interface. The resolution of the image in the Artcam is 1000×1500. The printed image has a resolution of 6000×9000 dots, which makes for a very straightforward relationship: 1 pixel=6×6=36 dots. As shown in FIG. 156 since each dot is 16.6 μm, the 6×6 dot square is 100 □m square. Since each of the dots is bi-level, the output must be dithered. The image should be printed in approximately 2 seconds. For 9000 rows of dots this implies a time of 222 □s time between printing each row. The Print Head Interface must generate the 6000 dots in this time, an average of 37 ns per dot. However, each dot comprises 3 colors, so the Print Head Interface must generate each color component in approximately 12 ns, or 1 clock cycle of the ACP (10 ns at 100 MHz). One VLIW process is responsible for calculating the next line of 6000 dots to be printed. The odd and even C, M, and Y dots are generated by dithering input from 6 different 1000×1500 CMY image lines. The second VLIW process is responsible for taking the previously calculated line of 6000 dots, and correctly generating the 8 bits of data for the 8 segments to be transferred by the Print Head Interface to the Print Head in a single transfer. A CPU process updates registers in the fist VLIW process 3 times per print line (once per color component=27000 times in 2 seconds0, and in the 2nd VLIW process once every print line (9000 times in 2 seconds). The CPU works one line ahead of the VLIW process in order to do this. Finally, the Print Head Interface takes the 8 bit data from the VLIW Output FIFO, and outputs it unchanged to the Print Head, producing the BitClock signals appropriately. Once all the data has been transferred a ParallelXferClock signal is generated to load the data for the next print line. In conjunction with transferring the data to the Print Head, a separate timer is generating the signals for the different print cycles of the Print Head using the NozzleSelect, ColorEnable, and BankEnable lines a specified by Print Head Interface internal registers. The CPU also controls the various motors and guillotine via the parallel interface during the print process. Generate C, M, and Y Dots The input to this process is a 1000×1500 CMY image correctly oriented for printing. The image is not compressed in any way. As illustrated in FIG. 157, a VLIW microcode program takes the CMY image, and generates the C, M, and Y pixels required by the Print Head Interface to be dithered. The process is run 3 times, once for each of the 3 color components. The process consists of 2 sub-processes run in parallel —one for producing even dots, and the other for producing odd dots. Each sub-process takes one pixel from the input image, and produces 3 output dots (since one pixel=6 output dots, and each sub-process is concerned with either even or odd dots). Thus one output dot is generated each cycle, but an input pixel is only read once every 3 cycles. The original dither cell is a 64×64 cell, with each entry 8 bits. This original cell is divided into an odd cell and an even cell, so that each is still 64 high, but only 32 entries wide. The even dither cell contains original dither cell pixels 0, 2, 4 etc., while the odd contains original dither cell pixels 1, 3, 5 etc. Since a dither cell repeats across a line, a single 32 byte line of each of the 2 dither cells is required during an entire line, and can therefore be completely cached. The odd and even lines of a single process line are staggered 8 dot lines apart, so it is convenient to rotate the odd dither cell's lines by 8 lines. Therefore the same offset into both odd and even dither cells can be used. Consequently the even dither cell's line corresponds to the even entries of line L in the original dither cell, and the even dither cell's line corresponds to the odd entries of line L+8 in the original dither cell. The process is run 3 times, once for each of the color components. The CPU software routine must ensure that the Sequential Read Iterators for odd and even lines are pointing to the correct image lines corresponding to the print heads. For example, to produce one set of 18,000 dots (3 sets of 6000 dots): Yellow even dot line =0, therefore input Yellow image line =0/6=0 Yellow odd dot line =8, therefore input Yellow image line =8/6=1 Magenta even line =10, therefore input Magenta image line =10/6=1 Magenta odd line =18, therefore input Magenta image line =18/6=3 Cyan even line =20, therefore input Cyan image line =20/6=3 Cyan odd line =28, therefore input Cyan image line =28/6=4 Subsequent sets of input image lines are: Y=[0, 1], M=[1, 3], C=[3, 4] Y=[0, 1], M=[1, 3], C=[3, 4] Y=[0, 1], M=[2, 3], C=[3, 5] Y=[0, 1], M=[2, 3], C=[3, 5] Y=[0, 2], M=[2, 3], C=[4, 5] The dither cell data however, does not need to be updated for each color component The dither cell for the 3 colors becomes the same, but offset by 2 dot lines for each component. The Dithered Output is written to a Sequential Write Iterator, with odd and even dithered dots written to 2 separate outputs. The same two Write Iterators are used for all 3 color components, so that they are contiguous within the break-up of odd and even dots. While one set of dots is being generated for a print line, the previously generated set of dots is being merged by a second VLIW process as described in the next section. Generate Merged 8 Bit Dot Output This process, as illustrated in FIG. 158, takes a single line of dithered dots and generates the 8 bit data stream for output to the Print Head Interface via the VLIW Output FIFO. The process requires the entire line to have been prepared, since it requires semi-random access to most of the dithered line at once. The following constant is set by software: Constant Value K1 375 The Sequential Read Iterators point to the line of previously generated dots, with the Iterator registers set up to limit access to a single color component. The distance between subsequent pixels is 375, and the distance between one line and the next is given to be 1 byte. Consequently 8 entries are read for each “line”. A single “line” corresponds to the 8 bits to be loaded on the print head. The total number of “lines” in the image is set to be 375. With at least 8 cache lines assigned to the Sequential Read Iterator, complete cache coherence is maintained. Instead of counting the 8 bits, 8 Microcode steps count implicitly. The generation process first reads all the entries from the even dots, combining 8 entries into a single byte which is then output to the VLIW Output FIFO. Once all 3000 even dots have been read, the 3000 odd dots are read and processed. A software routine must update the address of the dots in the odd and even Sequential Read Iterators once per color component, which equates to 3 times per line. The two VLIW processes require all 8 ALUs and the VLIW Output FIFO. As long as the CPU is able to update the registers as described in the two processes, the VLIW processor can generate the dithered image dots fast enough to keep up with the printer. Data Card Reader FIG. 159, there is illustrated on form of card reader 500 which allows for the insertion of Artcards 9 for reading. FIG. 158 shows an exploded perspective of the reader of FIG. 159. Cardreader is interconnected to a computer system and includes a CCD reading mechanism 35. The cardreader includes pinch rollers 506, 507 for pinching an inserted Artcard 9. One of the roller e.g. 506 is driven by an Artcard motor 37 for the advancement of the card 9 between the two rollers 506 and 507 at a uniformed speed. The Artcard 9 is passed over a series of LED lights 512 which are encased within a clear plastic mould 514 having a semi circular cross section. The cross section focuses the light from the LEDs eg 512 onto the surface of the card 9 as it passes by the LEDs 512. From the surface it is reflected to a high resolution linear CCD 34 which is constructed to a resolution of approximately 480 dpi. The surface of the Artcard 9 is encoded to the level of approximately 1600 dpi hence, the linear CCD 34 supersamples the Artcard surface with an approximately three times multiplier. The Artcard 9 is further driven at a speed such that the linear CCD 34 is able to supersample in the direction of Artcard movement at a rate of approximately 4800 readings per inch. The scanned Artcard CCD data is forwarded from the Artcard reader to ACP 31 for processing. A sensor 49, which can comprise a light sensor acts to detect of the presence of the card 13. The CCD reader includes a bottom substrate 516, a top substrate 514 which comprises a transparent molded plastic. In between the two substrates is inserted the linear CCD array 34 which comprises a thin long linear CCD array constructed by means of semi-conductor manufacturing processes. Turning to FIG. 160, there is illustrated a side perspective view, partly in section, of an example construction of the CCD reader unit The series of LEDs eg. 512 are operated to emit light when a card 9 is passing across the surface of the CCD reader 34. The emitted light is transmitted through a portion of the top substrate 523. The substrate includes a portion eg. 529 having a curved circumference so as to focus light emitted from LED 512 to a point eg. 532 on the surface of the card 9. The focused light is reflected from the point 532 towards the CCD array 34. A series of microlenses eg. 534, shown in exaggerated form, are formed on the surface of the top substrate 523. The microlenses 523 act to focus light received across the surface to the focused down to a point 536 which corresponds to point on the surface of the CCD reader 34 for sensing of light falling on the light sensing portion of the CCD array 34. A number of refinements of the above arrangement are possible. For example, the sensing devices on the linear CCD 34 may be staggered. The corresponding microlenses 34 can also be correspondingly formed as to focus light into a staggered series of spots so as to correspond to the staggered CCD sensors. To assist reading, the data surface area of the Artcard 9 is modulated with a checkerboard pattern as previously discussed with reference to FIG. 38. Other forms of high frequency modulation may be possible however. It will be evident that an Artcard printer can be provided as for the printing out of data on storage Artcard. Hence, the Artcard system can be utilized as a general form of information distribution outside of the Artcam device. An Artcard printer can prints out Artcards on high quality print surfaces and multiple Artcards can be printed on same sheets and later separated. On a second surface of the Artcard 9 can be printed information relating to the files etc. stored on the Artcard 9 for subsequent storage. Hence, the Artcard system allows for a simplified form of storage which is suitable for use in place of other forms of storage such as CD ROMs, magnetic disks etc. The Artcards 9 can also be mass produced and thereby produced in a substantially inexpensive form for redistribution. Print Rolls Turning to FIG. 162, there is illustrated the print roll 42 and print-head portions of the Artcam. The paper/film 611 is fed in a continuous “web-like” process to a printing mechanism 15 which includes further pinch rollers 616-619 and a print head 44 The pinch roller 613 is connected to a drive mechanism (not shown) and upon rotation of the print roller 613, “paper” in the form of film 611 is forced through the printing mechanism 615 and out of the picture output slot 6. A rotary guillotine mechanism (not shown) is utilised to cut the roll of paper 611 at required photo sizes. It is therefore evident that the printer roll 42 is responsible for supplying “paper” 611 to the print mechanism 615 for printing of photographically imaged pictures. In FIG. 163, there is shown an exploded perspective of the print roll 42. The printer roll 42 includes output printer paper 611 which is output under the operation of pinching rollers 612, 613. Referring now to FIG. 164, there is illustrated a more fully exploded perspective view, of the print roll 42 of FIG. 163 without the “paper” film roll. The print roll 42 includes three main parts comprising ink reservoir section 620, paper roll sections 622, 623 and outer casing sections 626, 627. Turning first to the ink reservoir section 620, which includes the ink reservoir or ink supply sections 633. The ink for printing is contained within three bladder type containers 630-632. The printer roll 42 is assumed to provide full color output inks. Hence, a first ink reservoir or bladder container 630 contains cyan colored ink. A second reservoir 631 contains magenta colored ink and a third reservoir 632 contains yellow ink. Each of the reservoirs 630-632, although having different volumetric dimensions, are designed to have substantially the same volumetric size. The ink reservoir sections 621, 633, in addition to cover 624 can be made of plastic sections and are designed to be mated together by means of heat sealing, ultra violet radiation, etc. Each of the equally sized ink reservoirs 630-632 is connected to a corresponding ink channel 639-641 for allowing the flow of ink from the reservoir 630-632 to a corresponding ink output port 635-637. The ink reservoir 632 having ink channel 641, and output port 637, the ink reservoir 631 having ink channel 640 and output port 636, and the ink reservoir 630 having ink channel 639 and output port 637. In operation, the ink reservoirs 630-632 can be filled with corresponding ink and the section 633 joined to the section 621. The ink reservoir sections 630-632, being collapsible bladders, allow for ink to traverse ink channels 639-641 and therefore be in fluid communication with the ink output ports 635-637. Further, if required, an air inlet port can also be provided to allow the pressure associated with ink channel reservoirs 630-632 to be maintained as required. The cap 624 can be joined to the ink reservoir section 620 so as to form a pressurized cavity, accessible by the air pressure inlet port. The ink reservoir sections 621, 633 and 624 are designed to be connected together as an integral unit and to be inserted inside printer roll sections 622, 623. The printer roll sections 622, 623 are designed to mate together by means of a snap fit by means of male portions 645-647 mating with corresponding female portions (not shown). Similarly, female portions 654-656 are designed to mate with corresponding male portions 660-662. The paper roll sections 622, 623 are therefore designed to be snapped together. One end of the film within the role is pinched between the two sections 622, 623 when they are joined together. The print film can then be rolled on the print roll sections 622, 625 as required. As noted previously, the ink reservoir sections 620, 621, 633, 624 are designed to be inserted inside the paper roll sections 622, 623. The printer roll sections 622, 623 are able to be rotatable around stationery ink reservoir sections 621, 633 and 624 to dispense film on demand. The outer casing sections 626 and 627 are further designed to be coupled around the print roller sections 622, 623. In addition to each end of pinch rollers eg 612, 613 is designed to clip in to a corresponding cavity eg 670 in cover 626, 627 with roller 613 being driven externally (not shown) to feed the print film and out of the print roll. Finally, a cavity 677 can be provided in the ink reservoir sections 620, 621 for the insertion and gluing of an silicon chip integrated circuit type device 53 for the storage of information associated with the print roll 42. As shown in FIG. 155 and FIG. 164, the print roll 42 is designed to be inserted into the Artcam camera device so as to couple with a coupling unit 680 which includes connector pads 681 for providing a connection with the silicon chip 53. Further, the connector 680 includes end connectors of four connecting with ink supply ports 635-637. The ink supply ports are in turn to connect to ink supply lines eg 682 which are in turn interconnected to printheads supply ports eg. 687 for the flow of ink to print-head 44 in accordance with requirements. The “media” 611 utilised to form the roll can comprise many different materials on which it is designed to print suitable images. For example, opaque rollable plastic material may be utilized, transparencies may be used by using transparent plastic sheets, metallic printing can take place via utilization of a metallic sheet film. Further, fabrics could be utilised within the printer roll 42 for printing images on fabric, although care must be taken that only fabrics having a suitable stiffness or suitable backing material are utilised. When the print media is plastic, it can be coated with a layer which fixes and absorbs the ink. Further, several types of print media may be used, for example, opaque white matte, opaque white gloss, transparent film, frosted transparent film, lenticular array film for stereoscopic 3D prints, metallised film, film with the embossed optical variable devices such as gratings or holograms, media which is pre-printed on the reverse side, and media which includes a magnetic recording layer. When utilising a metallic foil, the metallic foil can have a polymer base, coated with a thin (several micron) evaporated layer of aluminum or other metal and then coated with a clear protective layer adapted to receive the ink via the ink printer mechanism. In use the print roll 42 is obviously designed to be inserted inside a camera device so as to provide ink and paper for the printing of images on demand. The ink output ports 635-637 meet with corresponding ports within the camera device and the pinch rollers 672, 673 are operated to allow the supply of paper to the camera device under the control of the camera device. As illustrated in FIG. 164, a mounted silicon chip 53 is insert in one end of the print roll 42. In FIG. 165 the authentication chip 53 is shown in more detail and includes four communications leads 680-683 for communicating details from the chip 53 to the corresponding camera to which it is inserted. Turning to FIG. 165, the chip can be separately created by means of encasing a small integrated circuit 687 in epoxy and running bonding leads eg. 688 to the external communications leads 680-683. The integrated chip 687 being approximately 400 microns square with a 100 micron scribe boundary. Subsequently, the chip can be glued to an appropriate surface of the cavity of the print roll 42. In FIG. 166, there is illustrated the integrated circuit 687 interconnected to bonding pads 681, 682 in an exploded view of the arrangement of FIG. 165. Authentication Chip Authentication Chips 53 The authentication chip 53 of the preferred embodiment is responsible for ensuring that only correctly manufactured print rolls are utilized in the camera system. The authentication chip 53 utilizes technologies that are generally valuable when utilized with any consumables and are not restricted to print roll system. Manufacturers of other systems that require consumables (such as a laser printer that requires toner cartridges) have struggled with the problem of authenticating consumables, to varying levels of success. Most have resorted to specialized packaging. However this does not stop home refill operations or clone manufacture. The prevention of copying is important to prevent poorly manufactured substitute consumables from damaging the base system. For example, poorly filtered ink may clog print nozzles in an ink jet printer, causing the consumer to blame the system manufacturer and not admit the use of non-authorized consumables. To solve the authentication problem, the Authentication chip 53 contains an authentication code and circuit specially designed to prevent copying. The chip is manufactured using the standard Flash memory manufacturing process, and is low cost enough to be included in consumables such as ink and toner cartridges. Once programmed, the Authentication chips as described here are compliant with the NSA export guidelines. Authentication is an extremely large and constantly growing field. Here we are concerned with authenticating consumables only. Symbolic Nomenclature The following symbolic nomenclature is used throughout the discussion of this embodiment: Symbolic Nomenclature Description F[X] Function F, taking a single parameter X F[X, Y] Function F, taking two parameters, X and Y X | Y X concatenated with Y X Y Bitwise X AND Y X Y Bitwise X OR Y (inclusive-OR) X⊕Y Bitwise X XOR Y (exclusive-OR) ˜X Bitwise NOT X (complement) X Y X is assigned the value Y X {Y, Z} The domain of assignment inputs to X is Y and Z. X = Y X is equal to Y X ≠ Y X is not equal to Y X Decrement X by 1 (floor 0) □X Increment X by 1 (with wrapping based on register length) Erase X Erase Flash memory register X SetBits[X, Y] Set the bits of the Flash memory register X based on Y Z ShiftRight[X, Y] Shift register X right one bit position, taking input bit from Y and placing the output bit in Z Basic Terms A message, denoted by M, is plaintext. The process of transforming M into cyphertext C, where the substance of M is hidden, is called encryption. The process of transforming C back into M is called decryption. Referring to the encryption function as E, and the decryption function as D, we have the following identities: E[M]=C D[C]=M Therefore the following identity is true: D[E[M]]=M Symmetric Cryptography A symmetric encryption algorithm is one where: the encryption function E relies on key K1, the decryption function D relies on key K2, K2 can be derived from K1, and K1 can be derived from K2. In most symmetric algorithms, K1 usually equals K2. However, even if K1 does not equal K2, given that one key can be derived from the other, a single key K can suffice for the mathematical definition. Thus: EK[M]=C DK[C]=M An enormous variety of symmetric algorithms exist, from the textbooks of ancient history through to sophisticated modern algorithms. Many of these are insecure, in that modern cryptanalysis techniques can successfully attack the algorithm to the extent that K can be derived. The security of the particular symmetric algorithm is normally a function of two things: the strength of the algorithm and the length of the key. The following algorithms include suitable aspects for utilization in the authentication chip. DES Blowfish RC5 IDEA DES DES (Data Encryption Standard) is a US and international standard, where the same key is used to encrypt and decrypt. The key length is 56 bits. It has been implemented in hardware and software, although the original design was for hardware only. The original algorithm used in DES is described in U.S. Pat. No. 3,962,539. A variant of DES, called triple-DES is more secure, but requires 3 keys: K1, K2, and K3. The keys are used in the following manner: EK3[DK2[EK1[M]]]=C DK3[EK2[DK1[C]]]=M The main advantage of triple-DES is that existing DES implementations can be used to give more security than single key DES. Specifically, triple-DES gives protection of equivalent key length of 112 bits. Triple-DES does not give the equivalent protection of a 168-bit key (3×56) as one might naively expect. Equipment that performs triple-DES decoding and/or encoding cannot be exported from the United States. Blowfish Blowfish, is a symmetric block cipher first presented by Schneier in 1994. It takes a variable length key, from 32 bits to 448 bits. In addition, it is much faster than DES. The Blowfish algorithm consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network. All operations are XORs and additions on 32-bit words, with four index array lookups per round. It should be noted that decryption is the same as encryption except that the subkey arrays are used in the reverse order. Complexity of implementation is therefore reduced compared to other algorithms that do not have such symmetry. RC5 Designed by Ron Rivest in 1995, RC5 has a variable block size, key size, and number of rounds. Typically, however, it uses a 64-bit block size and a 128-bit key. The RC5 algorithm consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a key into 2r+2 subkeys (where r=the number of rounds), each subkey being w bits. For a 64-bit blocksize with 16 rounds (w=32, r=16), the subkey arrays total 136 bytes. Data encryption uses addition mod 2w, XOR and bitwise rotation. IDEA Developed in 1990 by Lai and Massey, the first incarnation of the IDEA cipher was called PES. After differential cryptanalysis was discovered by Biham and Shamir in 1991, the algorithm was strengthened, with the result being published in 1992 as IDEA. IDEA uses 128 bit-keys to operate on 64-bit plaintext blocks. The same algorithm is used for encryption and decryption. It is generally regarded to be the most secure block algorithm available today. It is described in U.S. Pat. No. 5,214,703, issued in 1993. Asymmetric Cryptography As alternative an asymmetric algorithm could be used. An asymmetric encryption algorithm is one where: the encryption function E relies on key Ki, the decryption function D relies on key K2, K2 cannot be derived from K1 in a reasonable amount of time, and K1 cannot be derived from K2 in a reasonable amount of time. Thus: EK1[M]=C DK2[C]=M These algorithms are also called public-key because one key K1 can be made public. Thus anyone can encrypt a message (using K1), but only the person with the corresponding decryption key (K2) can decrypt and thus read the message. In most cases, the following identity also holds: EK2[M]=C DK1[C]=M This identity is very important because it implies that anyone with the public key K1 can see M and know that it came from the owner of K2. No-one else could have generated C because to do so would imply knowledge of K2. The property of not being able to derive K1 from K2 and vice versa in a reasonable time is of course clouded by the concept of reasonable time. What has been demonstrated time after time, is that a calculation that was thought to require a long time has been made possible by the introduction of faster computers, new algorithms etc. The security of asymmetric algorithms is based on the difficulty of one of two problems: factoring large numbers (more specifically large numbers that are the product of two large primes), and the difficulty of calculating discrete logarithms in a finite field. Factoring large numbers is conjectured to be a hard problem given today's understanding of mathematics. The problem however, is that factoring is getting easier much faster than anticipated. Ron Rivest in 1977 said that factoring a 125-digit number would take 40 quadrillion years. In 1994 a 129-digit number was factored. According to Schneier, you need a 1024-bit number to get the level of security today that you got from a 512-bit number in the 1980's. If the key is to last for some years then 1024 bits may not even be enough. Rivest revised his key length estimates in 1990: he suggests 1628 bits for high security lasting until 2005, and 1884 bits for high security lasting until 2015. By contrast, Schneier suggests 2048 bits are required in order to protect against corporations and governments until 2015. A number of public key cryptographic algorithms exist. Most are impractical to implement, and many generate a very large C for a given M or require enormous keys. Still others, while secure, are far too slow to be practical for several years. Because of this, many public-key systems are hybrid—a public key mechanism is used to transmit a symmetric session key, and then the session key is used for the actual messages. All of the algorithms have a problem in terms of key selection. A random number is simply not secure enough. The two large primes p and q must be chosen carefully—there are certain weak combinations that can be factored more easily (some of the weak keys can be tested for). But nonetheless, key selection is not a simple matter of randomly selecting 1024 bits for example. Consequently the key selection process must also be secure. Of the practical algorithms in use under public scrutiny, the following may be suitable for utilization: RSA DSA ElGamal RSA The RSA cryptosystem, named after Rivest, Shamir, and Adleman, is the most widely used public-key cryptosystem, and is a de facto standard in much of the world. The security of RSA is conjectured to depend on the difficulty of factoring large numbers that are the product of two primes (p and q). There are a number of restrictions on the generation of p and q. They should both be large, with a similar number of bits, yet not be close to one another (otherwise pq≈{square root}pq). In addition, many authors have suggested that p and q should be strong primes. The RSA algorithm patent was issued in 1983 (U.S. Pat. No. 4,405,829). DSA DSA (Digital Signature Standard) is an algorithm designed as part of the Digital Signature Standard (DSS). As defined, it cannot be used for generalized encryption. In addition, compared to RSA, DSA is 10 to 40 times slower for signature verification. DSA explicitly uses the SHA-1 hashing algorithm (see definition in Error! Reference source not found. below). DSA key generation relies on finding two primes p and q such that q divides p−1. According to Schneier, a 1024-bit p value is required for long term DSA security. However the DSA standard does not permit values of p larger than 1024 bits (p must also be a multiple of 64 bits). The US Government owns the DSA algorithm and has at least one relevant patent (U.S. Pat. No. 5,231,688 granted in 1993). ElGamal The ElGamal scheme is used for both encryption and digital signatures. The security is based on the difficulty of calculating discrete logarithms in a finite field. Key selection involves the selection of a prime p, and two random numbers g and x such that both g and x are less than p. Then calculate y=gx mod p. The public key is y, g, and p. The private key is x. Cryptographic Challenge-Response Protocols and Zero Knowledge Proofs The general principle of a challenge-response protocol is to provide identity authentication adapted to a camera system. The simplest form of challenge-response takes the form of a secret password. A asks B for the secret password, and if B responds with the correct password, A declares B authentic. There are three main problems with this kind of simplistic protocol. Firstly, once B has given out the password, any observer C will know what the password is. Secondly, A must know the password in order to verify it. Thirdly, if C impersonates A, then B will give the password to C (thinking C was A), thus compromising B. Using a copyright text (such as a haiku) is a weaker alternative as we are assuming that anyone is able to copy the password (for example in a country where intellectual property is not respected). The idea of cryptographic challenge-response protocols is that one entity (the claimant) proves its identity to another (the verifier) by demonstrating knowledge of a secret known to be associated with that entity, without revealing the secret itself to the verifier during the protocol. In the generalized case of cryptographic challenge-response protocols, with some schemes the verifier knows the secret, while in others the secret is not even known by the verifier. Since the discussion of this embodiment specifically concerns Authentication, the actual cryptographic challenge-response protocols used for authentication are detailed in the appropriate sections. However the concept of Zero Knowledge Proofs will be discussed here. The Zero Knowledge Proof protocol, first described by Feige, Fiat and Shamir is extensively used in Smart Cards for the purpose of authentication. The protocol's effectiveness is based on the assumption that it is computationally infeasible to compute square roots modulo a large composite integer with unknown factorization. This is provably equivalent to the assumption that factoring large integers is difficult. It should be noted that there is no need for the claimant to have significant computing power. Smart cards implement this kind of authentication using only a few modular multiplications. The Zero Knowledge Proof protocol is described in U.S. Pat. No. 4,748,668. One-Way Functions A one-way function F operates on an input X, and returns F[X] such that X cannot be determined from F[X]. When there is no restriction on the format of X, and F[X] contains fewer bits than X, then collisions must exist. A collision is defined as two different X input values producing the same F[X] value—i.e. X1 and X2 exist such that X1≠X2 yet F[X1]=F[X2]. When X contains more bits than F[X], the input must be compressed in some way to create the output. In many cases, X is broken into blocks of a particular size, and compressed over a number of rounds, with the output of one round being the input to the next. The output of the hash function is the last output once X has been consumed. A pseudo-collision of the compression function CF is defined as two different initial values V1 and V2 and two inputs X1 and X2 (possibly identical) are given such that CF(V1, X1)=CF(V2, X2). Note that the existence of a pseudo-collision does not mean that it is easy to compute an X2 for a given X1. We are only interested in one-way functions that are fast to compute. In addition, we are only interested in deterministic one-way functions that are repeatable in different implementations. Consider an example F where F[X] is the time between calls to F. For a given F[X] X cannot be determined because X is not even used by F. However the output from F will be different for different implementations. This kind of F is therefore not of interest. In the scope of the discussion of the implementation of the authentication chip of this embodiment, we are interested in the following forms of one-way functions: Encryption using an unknown key Random number sequences Hash Functions Message Authentication Codes Encryption Using an Unknown Key When a message is encrypted using an unknown key K, the encryption function E is effectively one-way. Without the key, it is computationally infeasible to obtain M from EK[M] without K. An encryption function is only one-way for as long as the key remains hidden. An encryption algorithm does not create collisions, since E creates EK[M] such that it is possible to reconstruct M using function D. Consequently F[X] contains at least as many bits as X (no information is lost) if the one-way function F is E. Symmetric encryption algorithms (see above) have the advantage over Asymmetric algorithms for producing one-way functions based on encryption for the following reasons: The key for a given strength encryption algorithm is shorter for a symmetric algorithm than an asymmetric algorithm Symmetric algorithms are faster to compute and require less software/silicon The selection of a good key depends on the encryption algorithm chosen. Certain keys are not strong for particular encryption algorithms, so any key needs to be tested for strength. The more tests that need to be performed for key selection, the less likely the key will remain hidden. Random Number Sequences Consider a random number sequence R0, R1, . . . , Ri, Ri+1. We define the one-way function F such that F[X] returns the Xth random number in the random sequence. However we must ensure that F[X] is repeatable for a given X on different implementations. The random number sequence therefore cannot be truly random. Instead, it must be pseudo-random, with the generator making use of a specific seed. There are a large number of issues concerned with defining good random number generators. Knuth, describes what makes a generator “good” (including statistical tests), and the general problems associated with constructing them. The majority of random number generators produce the ith random number from the i−1th state—the only way to determine the ith number is to iterate from the 0th number to the ith. If i is large, it may not be practical to wait for i iterations. However there is a type of random number generator that does allow random access. Blum, Blum and Shub define the ideal generator as follows:” . . . we would like a pseudo-random sequence generator to quickly produce, from short seeds, long sequences (of bits) that appear in every way to be generated by successive flips of a fair coin”. They defined the x2 mod n generator, more commonly referred to as the BBS generator. They showed that given certain assumptions upon which modern cryptography relies, a BBS generator passes extremely stringent statistical tests. The BBS generator relies on selecting n which is a Blum integer (n=pq where p and q are large prime numbers, p≠q, p mod 4=3, and q mod 4=3). The initial state of the generator is given by x0 where x0=x2 mod n, and x is a random integer relatively prime to n. The ith pseudo-random bit is the least significant bit of xi where xi=xi−12 mod n. As an extra property, knowledge of p and q allows a direct calculation of the ith number in the sequence as follows: xi=x0y mod n, where y=2i mod ((p−1)(q−1)) Without knowledge of p and q, the generator must iterate (the security of calculation relies on the difficulty of factoring large numbers). When first defined, the primary problem with the BBS generator was the amount of work required for a single output bit. The algorithm was considered too slow for most applications. However the advent of Montgomery reduction arithmetic has given rise to more practical implementations. In addition, Vazirani and Vazirani have shown that depending on the size of n, more bits can safely be taken from xi without compromising the security of the generator. Assuming we only take 1 bit per xi, N bits (and hence N iterations of the bit generator function) are needed in order to generate an N-bit random number. To the outside observer, given a particular set of bits, there is no way to determine the next bit other than a 50/50 probability. If the x, p and q are hidden, they act as a key, and it is computationally unfeasible to take an output bit stream and compute x, p, and q. It is also computationally unfeasible to determine the value of i used to generate a given set of pseudo-random bits. This last feature makes the generator one-way. Different values of i can produce identical bit sequences of a given length (e.g. 32 bits of random bits). Even if x, p and q are known, for a given F[i], i can only be derived as a set of possibilities, not as a certain value (of course if the domain of i is known, then the set of possibilities is reduced further). However, there are problems in selecting a good p and q, and a good seed x. In particular, Ritter describes a problem in selecting x. The nature of the problem is that a BBS generator does not create a single cycle of known length. Instead, it creates cycles of various lengths, including degenerate (zero-length) cycles. Thus a BBS generator cannot be initialized with a random state—it might be on a short cycle. Hash Functions Special one-way functions, known as Hash functions map arbitrary length messages to fixed-length hash values. Hash functions are referred to as H[M]. Since the input is arbitrary length, a hash function has a compression component in order to produce a fixed length output. Hash functions also have an obfuscation component in order to make it difficult to find collisions and to determine information about M from H[M]. Because collisions do exist, most applications require that the hash algorithm is preimage resistant, in that for a given X1 it is difficult to find X2 such that H[X1]=H[X2]. In addition, most applications also require the hash algorithm to be collision resistant (i.e. it should be hard to find two messages X1 and X2 such that H[X1]=H[X2]). It is an open problem whether a collision-resistant hash function, in the idealist sense, can exist at all. The primary application for hash functions is in the reduction of an input message into a digital “fingerprint” before the application of a digital signature algorithm. One problem of collisions with digital signatures can be seen in the following example. A has a long message M1 that says “I owe B $10”. A signs H[M1] using his private key. B, being greedy, then searches for a collision message M2 where H[M2]=H[M1] but where M2 is favorable to B, for example “I owe B $1 million”. Clearly it is in A's interest to ensure that it is difficult to find such an M2. Examples of collision resistant one-way hash functions are SHA-1, MD5 and RIPEMD-160, all derived from MD4. MD4 Ron Rivest introduced MD4 in 1990. It is mentioned here because all other one-way hash functions are derived in some way from MD4. MD4 is now considered completely broken in that collisions can be calculated instead of searched for. In the example above, B could trivially generate a substitute message M2 with the same hash value as the original message M1. MD5 Ron Rivest introduced MD5 in 1991 as a more secure MD4. Like MD4, MD5 produces a 128-bit hash value. Dobbertin describes the status of MD5 after recent attacks. He describes how pseudo-collisions have been found in MD5, indicating a weakness in the compression function, and more recently, collisions have been found. This means that MD5 should not be used for compression in digital signature schemes where the existence of collisions may have dire consequences. However MD5 can still be used as a one-way function. In addition, the HMAC-MD5 construct is not affected by these recent attacks. SHA-1 SHA-1 is very similar to MD5, but has a 160-bit hash value (MD5 only has 128 bits of hash value). SHA-1 was designed and introduced by the NIST and NSA for use in the Digital Signature Standard (DSS). The original published description was called SHA, but very soon afterwards, was revised to become SHA-1, supposedly to correct a security flaw in SHA (although the NSA has not released the mathematical reasoning behind the change). There are no known cryptographic attacks against SHA-1. It is also more resistant to brute-force attacks than MD4 or MD5 simply because of the longer hash result. The US Government owns the SHA-1 and DSA algorithms (a digital signature authentication algorithm defined as part of DSS) and has at least one relevant patent (U.S. Pat. No. 5,231,688 granted in 1993). RIPEMD-160 RIPEMD-160 is a hash function derived from its predecessor RIPEMD (developed for the European Community's RIPE project in 1992). As its name suggests, RIPEMD-160 produces a 160-bit hash result. Tuned for software implementations on 32-bit architectures, RIPEMD-160 is intended to provide a high level of security for 10 years or more. Although there have been no successful attacks on RIPEMD-160, it is comparatively new and has not been extensively cryptanalyzed. The original RIPEMD algorithm was specifically designed to resist known cryptographic attacks on MD4. The recent attacks on MD5 showed similar weaknesses in the RIPEMD 128-bit hash function. Although the attacks showed only theoretical weaknesses, Dobbertin, Preneel and Bosselaers further strengthened RIPEMD into a new algorithm RIPEMD-160. Message Authentication Codes The problem of message authentication can be summed up as follows: How can A be sure that a message supposedly from B is in fact from B? Message authentication is different from entity authentication. With entity authentication, one entity (the claimant) proves its identity to another (the verifier). With message authentication, we are concerned with making sure that a given message is from who we think it is from i.e. it has not been tampered en route from the source to its destination. A one-way hash function is not sufficient protection for a message. Hash functions such as MD5 rely on generating a hash value that is representative of the original input, and the original input cannot be derived from the hash value. A simple attack by E, who is in-between A and B, is to intercept the message from B, and substitute his own. Even if A also sends a hash of the original message, E can simply substitute the hash of his new message. Using a one-way hash function alone, A has no way of knowing that B's message has been changed. One solution to the problem of message authentication is the Message Authentication Code, or MAC. When B sends message M, it also sends MAC[M] so that the receiver will know that M is actually from B. For this to be possible, only B must be able to produce a MAC of M, and in addition, A should be able to verify M against MAC[M]. Notice that this is different from encryption of M—MACs are useful when M does not have to be secret. The simplest method of constructing a MAC from a hash function is to encrypt the hash value with a symmetric algorithm: Hash the input message H[M] Encrypt the hash EK[H[M]] This is more secure than first encrypting the message and then hashing the encrypted message. Any symmetric or asymmetric cryptographic function can be used. However, there are advantages to using a key-dependant one-way hash function instead of techniques that use encryption (such as that shown above): Speed, because one-way hash functions in general work much faster than encryption; Message size, because EK[H[M]] is at least the same size as M, while H[M] is a fixed size (usually considerably smaller than M); Hardware/software requirements—keyed one-way hash functions are typically far less complexity than their encryption-based counterparts; and One-way hash function implementations are not considered to be encryption or decryption devices and therefore are not subject to US export controls. It should be noted that hash functions were never originally designed to contain a key or to support message authentication. As a result, some ad hoc methods of using hash functions to perform message authentication, including various functions that concatenate messages with secret prefixes, suffixes, or both have been proposed. Most of these ad hoc methods have been successfully attacked by sophisticated means. Additional MACs have been suggested based on XOR schemes and Toeplitz matricies (including the special case of LFSR-based constructions). HMAC The HMAC construction in particular is gaining acceptance as a solution for Internet message authentication security protocols. The HMAC construction acts as a wrapper, using the underlying hash function in a black-box way. Replacement of the hash function is straightforward if desired due to security or performance reasons. However, the major advantage of the HMAC construct is that it can be proven secure provided the underlying hash function has some reasonable cryptographic strengths—that is, HMAC's strengths are directly connected to the strength of the hash function. Since the HMAC construct is a wrapper, any iterative hash function can be used in an HMAC. Examples include HMAC-MD5, HMAC-SHA1, HMAC-RIPEMD160 etc. Given the following definitions: H=the hash function (e.g. MD5 or SHA-1) n=number of bits output from H (e.g. 160 for SHA-1, 128 bits for MD5) M=the data to which the MAC function is to be applied K=the secret key shared by the two parties ipad=0x36 repeated 64 times opad=0x5C repeated 64 times The HMAC algorithm is as follows: Extend K to 64 bytes by appending 0x00 bytes to the end of K XOR the 64 byte string created in (1) with ipad Append data stream M to the 64 byte string created in (2) Apply H to the stream generated in (3) XOR the 64 byte string created in (1) with opad Append the H result from (4) to the 64 byte string resulting from (5) Apply H to the output of (6) and output the result Thus: HMAC[M]=H[(K⊕opad)|H[(K⊕ipad)|M]] The recommended key length is at least n bits, although it should not be longer than 64 bytes (the length of the hashing block). A key longer than n bits does not add to the security of the function. HMAC optionally allows truncation of the final output e.g. truncation to 128 bits from 160 bits. The HMAC designers' Request for Comments was issued in 1997, one year after the algorithm was first introduced. The designers claimed that the strongest known attack against HMAC is based on the frequency of collisions for the hash function H and is totally impractical for minimally reasonable hash functions. More recently, HMAC protocols with replay prevention components have been defined in order to prevent the capture and replay of any M, HMAC[M] combination within a given time period. Random Numbers and Time Varying Messages The use of a random number generator as a one-way function has already been examined. However, random number generator theory is very much intertwined with cryptography, security, and authentication. There are a large number of issues concerned with defining good random number generators. Knuth, describes what makes a generator good (including statistical tests), and the general problems associated with constructing them. One of the uses for random numbers is to ensure that messages vary over time. Consider a system where A encrypts commands and sends them to B. If the encryption algorithm produces the same output for a given input, an attacker could simply record the messages and play them back to fool B. There is no need for the attacker to crack the encryption mechanism other than to know which message to play to B (while pretending to be A). Consequently messages often include a random number and a time stamp to ensure that the message (and hence its encrypted counterpart) varies each time. Random number generators are also often used to generate keys. It is therefore best to say at the moment, that all generators are insecure for this purpose. For example, the Berlekamp-Massey algorithm, is a classic attack on an LFSR random number generator. If the LFSR is of length n, then only 2n bits of the sequence suffice to determine the LFSR, compromising the key generator. If, however, the only role of the random number generator is to make sure that messages vary over time, the security of the generator and seed is not as important as it is for session key generation. If however, the random number seed generator is compromised, and an attacker is able to calculate future “random” numbers, it can leave some protocols open to attack. Any new protocol should be examined with respect to this situation. The actual type of random number generator required will depend upon the implementation and the purposes for which the generator is used. Generators include Blum, Blum, and Shub, stream ciphers such as RC4 by Ron Rivest, hash functions such as SHA-1 and RIPEMD-160, and traditional generators such LFSRs (Linear Feedback Shift Registers) and their more recent counterpart FCSRs (Feedback with Carry Shift Registers). Attacks This section describes the various types of attacks that can be undertaken to break an authentication cryptosystem such as the authentication chip. The attacks are grouped into physical and logical attacks. Physical attacks describe methods for breaking a physical implementation of a cryptosystem (for example, breaking open a chip to retrieve the key), while logical attacks involve attacks on the cryptosystem that are implementation independent. Logical types of attack work on the protocols or algorithms, and attempt to do one of three things: Bypass the authentication process altogether Obtain the secret key by force or deduction, so that any question can be answered Find enough about the nature of the authenticating questions and answers in order to, without the key, give the right answer to each question. The attack styles and the forms they take are detailed below. Regardless of the algorithms and protocol used by a security chip, the circuitry of the authentication part of the chip can come under physical attack. Physical attack comes in four main ways, although the form of the attack can vary: Bypassing the Authentication Chip altogether Physical examination of chip while in operation (destructive and non-destructive) Physical decomposition of chip Physical alteration of chip The attack styles and the forms they take are detailed below. This section does not suggest solutions to these attacks. It merely describes each attack type. The examination is restricted to the context of an Authentication chip 53 (as opposed to some other kind of system, such as Internet authentication) attached to some System. Logical Attacks These attacks are those which do not depend on the physical implementation of the cryptosystem. They work against the protocols and the security of the algorithms and random number generators. Ciphertext Only Attack This is where an attacker has one or more encrypted messages, all encrypted using the same algorithm. The aim of the attacker is to obtain the plaintext messages from the encrypted messages. Ideally, the key can be recovered so that all messages in the future can also be recovered. Known Plaintext Attack This is where an attacker has both the plaintext and the encrypted form of the plaintext. In the case of an Authentication Chip, a known-plaintext attack is one where the attacker can see the data flow between the System and the Authentication Chip. The inputs and outputs are observed (not chosen by the attacker), and can be analyzed for weaknesses (such as birthday attacks or by a search for differentially interesting input/output pairs). A known plaintext attack is a weaker type of attack than the chosen plaintext attack, since the attacker can only observe the data flow. A known plaintext attack can be carried out by connecting a logic analyzer to the connection between the System and the Authentication Chip. Chosen Plaintext Attacks A chosen plaintext attack describes one where a cryptanalyst has the ability to send any chosen message to the cryptosystem, and observe the response. If the cryptanalyst knows the algorithm, there may be a relationship between inputs and outputs that can be exploited by feeding a specific output to the input of another function. On a system using an embedded Authentication Chip, it is generally very difficult to prevent chosen plaintext attacks since the cryptanalyst can logically pretend he/she is the System, and thus send any chosen bit-pattern streams to the Authentication Chip. Adaptive Chosen Plaintext Attacks This type of attack is similar to the chosen plaintext attacks except that the attacker has the added ability to modify subsequent chosen plaintexts based upon the results of previous experiments. This is certainly the case with any System/Authentication Chip scenario described when utilized for consumables such as photocopiers and toner cartridges, especially since both Systems and Consumables are made available to the public. Brute Force Attack A guaranteed way to break any key-based cryptosystem algorithm is simply to try every key. Eventually the right one will be found. This is known as a Brute Force Attack. However, the more key possibilities there are, the more keys must be tried, and hence the longer it takes (on average) to find the right one. If there are N keys, it will take a maximum of N tries. If the key is N bits long, it will take a maximum of 2N tries, with a 50% chance of finding the key after only half the attempts (2N−1). The longer N becomes, the longer it will take to find the key, and hence the more secure the key is. Of course, an attack may guess the key on the first try, but this is more unlikely the longer the key is. Consider a key length of 56 bits. In the worst case, all 256 tests (7.2×1016 tests) must be made to find the key. In 1977, Diffie and Hellman described a specialized machine for cracking DES, consisting of one million processors, each capable of running one million tests per second. Such a machine would take 20 hours to break any DES code. Consider a key length of 128 bits. In the worst case, all 2128 tests (3.4×1038 tests) must be made to find the key. This would take ten billion years on an array of a trillion processors each running 1 billion tests per second. With a long enough key length, a Brute Force Attack takes too long to be worth the attacker's efforts. Guessing Attack This type of attack is where an attacker attempts to simply “guess” the key. As an attack it is identical to the Brute force attack, where the odds of success depend on the length of the key. Quantum Computer Attack To break an n-bit key, a quantum computer (NMR, Optical, or Caged Atom) containing n qubits embedded in an appropriate algorithm must be built. The quantum computer effectively exists in 2n simultaneous coherent states. The trick is to extract the right coherent state without causing any decoherence. To date this has been achieved with a 2 qubit system (which exists in 4 coherent states). It is thought possible to extend this to 6 qubits (with 64 simultaneous coherent states) within a few years. Unfortunately, every additional qubit halves the relative strength of the signal representing the key. This rapidly becomes a serious impediment to key retrieval, especially with the long keys used in cryptographically secure systems. As a result, attacks on a cryptographically secure key (e.g. 160 bits) using a Quantum Computer are likely not to be feasible and it is extremely unlikely that quantum computers will have achieved more than 50 or so qubits within the commercial lifetime of the Authentication Chips. Even using a 50 qubit quantum computer, 2110 tests are required to crack a 160 bit key. Purposeful Error Attack With certain algorithms, attackers can gather valuable information from the results of a bad input. This can range from the error message text to the time taken for the error to be generated. A simple example is that of a userid/password scheme. If the error message usually says “Bad userid”, then when an attacker gets a message saying “Bad password” instead, then they know that the userid is correct. If the message always says “Bad userid/password” then much less information is given to the attacker. A more complex example is that of the recent published method of cracking encryption codes from secure web sites. The attack involves sending particular messages to a server and observing the error message responses. The responses give enough information to learn the keys—even the lack of a response gives some information. An example of algorithmic time can be seen with an algorithm that returns an error as soon as an erroneous bit is detected in the input message. Depending on hardware implementation, it may be a simple method for the attacker to time the response and alter each bit one by one depending on the time taken for the error response, and thus obtain the key. Certainly in a chip implementation the time taken can be observed with far greater accuracy than over the Internet. Birthday Attack This attack is named after the famous “birthday paradox” (which is not actually a paradox at all). The odds of one person sharing a birthday with another, is 1 in 365 (not counting leap years). Therefore there must be 183 people in a room for the odds to be more than 50% that one of them shares your birthday. However, there only needs to be 23 people in a room for there to be more than a 50% chance that any two share a birthday. This is because 23 people yields 253 different pairs. Birthday attacks are common attacks against hashing algorithms, especially those algorithms that combine hashing with digital signatures. If a message has been generated and already signed, an attacker must search for a collision message that hashes to the same value (analogous to finding one person who shares your birthday). However, if the attacker can generate the message, the Birthday Attack comes into play. The attacker searches for two messages that share the same hash value (analogous to any two people sharing a birthday), only one message is acceptable to the person signing it, and the other is beneficial for the attacker. Once the person has signed the original message the attacker simply claims now that the person signed the alternative message—mathematically there is no way to tell which message was the original, since they both hash to the same value. Assuming a Brute Force Attack is the only way to determine a match, the weakening of an n-bit key by the birthday attack is 2n/2. A key length of 128 bits that is susceptible to the birthday attack has an effective length of only 64 bits. Chaining Attack These are attacks made against the chaining nature of hash functions. They focus on the compression function of a hash function. The idea is based on the fact that a hash function generally takes arbitrary length input and produces a constant length output by processing the input n bits at a time. The output from one block is used as the chaining variable set into the next block. Rather than finding a collision against an entire input, the idea is that given an input chaining variable set, to find a substitute block that will result in the same output chaining variables as the proper message. The number of choices for a particular block is based on the length of the block. If the chaining variable is c bits, the hashing function behaves like a random mapping, and the block length is b bits, the number of such b-bit blocks is approximately 2b/2c. The challenge for finding a substitution block is that such blocks are a sparse subset of all possible blocks. For SHA-1, the number of 512 bit blocks is approximately 2512/2160, or 2352. The chance of finding a block by brute force search is about 1 in 2160. Substitution with a Complete Lookup Table If the number of potential messages sent to the chip is small, then there is no need for a clone manufacturer to crack the key. Instead, the clone manufacturer could incorporate a ROM in their chip that had a record of all of the responses from a genuine chip to the codes sent by the system. The larger the key, and the larger the response, the more space is required for such a lookup table. Substitution with a Sparse Lookup Table If the messages sent to the chip are somehow predictable, rather than effectively random, then the clone manufacturer need not provide a complete lookup table. For example: If the message is simply a serial number, the clone manufacturer need simply provide a lookup table that contains values for past and predicted future serial numbers. There are unlikely to be more than 109 of these. If the test code is simply the date, then the clone manufacturer can produce a lookup table using the date as the address. If the test code is a pseudo-random number using either the serial number or the date as a seed, then the clone manufacturer just needs to crack the pseudo-random number generator in the System. This is probably not difficult, as they have access to the object code of the System. The clone manufacturer would then produce a content addressable memory (or other sparse array lookup) using these codes to access stored authentication codes. Differential Cryptanalysis Differential cryptanalysis describes an attack where pairs of input streams are generated with known differences, and the differences in the encoded streams are analyzed. Existing differential attacks are heavily dependent on the structure of S boxes, as used in DES and other similar algorithms. Although other algorithms such as HMAC-SHA1 have no S boxes, an attacker can undertake a differential-like attack by undertaking statistical analysis of: Minimal-difference inputs, and their corresponding outputs Minimal-difference outputs, and their corresponding inputs Most algorithms were strengthened against differential cryptanalysis once the process was described. This is covered in the specific sections devoted to each cryptographic algorithm. However some recent algorithms developed in secret have been broken because the developers had not considered certain styles of differential attacks and did not subject their algorithms to public scrutiny. Message Substitution Attacks In certain protocols, a man-in-the-middle can substitute part or all of a message. This is where a real Authentication Chip is plugged into a reusable clone chip within the consumable. The clone chip intercepts all messages between the System and the Authentication Chip, and can perform a number of substitution attacks. Consider a message containing a header followed by content. An attacker may not be able to generate a valid header, but may be able to substitute their own content, especially if the valid response is something along the lines of “Yes, I received your message”. Even if the return message is “Yes, I received the following message . . . ”, the attacker may be able to substitute the original message before sending the acknowledgement back to the original sender. Message Authentication Codes were developed to combat most message substitution attacks. Reverse Engineering the Key Generator If a pseudo-random number generator is used to generate keys, there is the potential for a clone manufacture to obtain the generator program or to deduce the random seed used. This was the way in which the Netscape security program was initially broken. Bypassing Authentication Altogether It may be that there are problems in the authentication protocols that can allow a bypass of the authentication process altogether. With these kinds of attacks the key is completely irrelevant, and the attacker has no need to recover it or deduce it. Consider an example of a system that Authenticates at power-up, but does not authenticate at any other time. A reusable consumable with a clone Authentication Chip may make use of a real Authentication Chip. The clone authentication chip 53 uses the real chip for the authentication call, and then simulates the real Authentication Chip's state data after that. Another example of bypassing authentication is if the System authenticates only after the consumable has been used. A clone Authentication Chip can accomplish a simple authentication bypass by simulating a loss of connection after the use of the consumable but before the authentication protocol has completed (or even started). One infamous attack known as the “Kentucky Fried Chip” hack involved replacing a microcontroller chip for a satellite TV system. When a subscriber stopped paying the subscription fee, the system would send out a “disable” message. However the new microcontroller would simply detect this message and not pass it on to the consumer's satellite TV system. Garrote/Bribe Attack If people know the key, there is the possibility that they could tell someone else. The telling may be due to coercion (bribe, garrote etc), revenge (e.g. a disgruntled employee), or simply for principle. These attacks are usually cheaper and easier than other efforts at deducing the key. As an example, a number of people claiming to be involved with the development of the Divx standard have recently (May/June 1998) been making noises on a variety of DVD newsgroups to the effect they would like to help develop Divx specific cracking devices—out of principle. Physical Attacks The following attacks assume implementation of an authentication mechanism in a silicon chip that the attacker has physical access to. The first attack, Reading ROM, describes an attack when keys are stored in ROM, while the remaining attacks assume that a secret key is stored in Flash memory. Reading ROM If a key is stored in ROM it can be read directly. A ROM can thus be safely used to hold a public key (for use in asymmetric cryptography), but not to hold a private key. In symmetric cryptography, a ROM is completely insecure. Using a copyright text (such as a haiku) as the key is not sufficient, because we are assuming that the cloning of the chip is occurring in a country where intellectual property is not respected. Reverse Engineering of Chip Reverse engineering of the chip is where an attacker opens the chip and analyzes the circuitry. Once the circuitry has been analyzed the inner workings of the chip's algorithm can be recovered. Lucent Technologies have developed an active method known as TOBIC (Two photon OBIC, where OBIC stands for Optical Beam Induced Current), to image circuits. Developed primarily for static RAM analysis, the process involves removing any back materials, polishing the back surface to a mirror finish, and then focusing light on the surface. The excitation wavelength is specifically chosen not to induce a current in the IC. A Kerckhoffs in the nineteenth century made a fundamental assumption about cryptanalysis: if the algorithm's inner workings are the sole secret of the scheme, the scheme is as good as broken. He stipulated that the secrecy must reside entirely in the key. As a result, the best way to protect against reverse engineering of the chip is to make the inner workings irrelevant. Usurping the Authentication Process It must be assumed that any clone manufacturer has access to both the System and consumable designs. If the same channel is used for communication between the System and a trusted System Authentication Chip, and a non-trusted consumable Authentication Chip, it may be possible for the non-trusted chip to interrogate a trusted Authentication Chip in order to obtain the “correct answer”. If this is so, a clone manufacturer would not have to determine the key. They would only have to trick the System into using the responses from the System Authentication Chip. The alternative method of usurping the authentication process follows the same method as the logical attack “Bypassing the Authentication Process”, involving simulated loss of contact with the System whenever authentication processes take place, simulating power-down etc. Modification of System This kind of attack is where the System itself is modified to accept clone consumables. The attack may be a change of System ROM, a rewiring of the consumable, or, taken to the extreme case, a completely clone System. This kind of attack requires each individual System to be modified, and would most likely require the owner's consent. There would usually have to be a clear advantage for the consumer to undertake such a modification, since it would typically void warranty and would most likely be costly. An example of such a modification with a clear advantage to the consumer is a software patch to change fixed-region DVD players into region-free DVD players. Direct Viewing of Chip Operation by Conventional Probing If chip operation could be directly viewed using an STM or an electron beam, the keys could be recorded as they are read from the internal non-volatile memory and loaded into work registers. These forms of conventional probing require direct access to the top or front sides of the IC while it is powered. Direct Viewing of the Non-Volatile Memory If the chip were sliced so that the floating gates of the Flash memory were exposed, without discharging them, then the key could probably be viewed directly using an STM or SKM (Scanning Kelvin Microscope). However, slicing the chip to this level without discharging the gates is probably impossible. Using wet etching, plasma etching, ion milling (focused ion beam etching), or chemical mechanical polishing will almost certainly discharge the small charges present on the floating gates. Viewing the Light Bursts Caused by State Changes Whenever a gate changes state, a small amount of infrared energy is emitted. Since silicon is transparent to infrared, these changes can be observed by looking at the circuitry from the underside of a chip. While the emission process is weak, it is bright enough to be detected by highly sensitive equipment developed for use in astronomy. The technique, developed by IBM, is called PICA (Picosecond Imaging Circuit Analyzer). If the state of a register is known at time t, then watching that register change over time will reveal the exact value at time t+n, and if the data is part of the key, then that part is compromised. Monitoring EMI Whenever electronic circuitry operates, faint electromagnetic signals are given off. Relatively inexpensive equipment (a few thousand dollars) can monitor these signals. This could give enough information to allow an attacker to deduce the keys. Viewing Idd Fluctuations Even if keys cannot be viewed, there is a fluctuation in current whenever registers change state. If there is a high enough signal to noise ratio, an attacker can monitor the difference in Idd that may occur when programming over either a high or a low bit. The change in Idd can reveal information about the key. Attacks such as these have already been used to break smart cards. Differential Fault Analysis This attack assumes introduction of a bit error by ionization, microwave radiation, or environmental stress. In most cases such an error is more likely to adversely affect the Chip (eg cause the program code to crash) rather than cause beneficial changes which would reveal the key. Targeted faults such as ROM overwrite, gate destruction etc are far more likely to produce useful results. Clock Glitch Attacks Chips are typically designed to properly operate within a certain clock speed range. Some attackers attempt to introduce faults in logic by running the chip at extremely high clock speeds or introduce a clock glitch at a particular time for a particular duration. The idea is to create race conditions where the circuitry does not function properly. An example could be an AND gate that (because of race conditions) gates through Input1 all the time instead of the AND of Input1 and Input2. If an attacker knows the internal structure of the chip, they can attempt to introduce race conditions at the correct moment in the algorithm execution, thereby revealing information about the key (or in the worst case, the key itself). Power Supply Attacks Instead of creating a glitch in the clock signal, attackers can also produce glitches in the power supply where the power is increased or decreased to be outside the working operating voltage range. The net effect is the same as a clock glitch—introduction of error in the execution of a particular instruction. The idea is to stop the CPU from XORing the key, or from shifting the data one bit-position etc. Specific instructions are targeted so that information about the key is revealed. Overwriting ROM Single bits in a ROM can be overwritten using a laser cutter microscope, to either 1 or 0 depending on the sense of the logic. With a given opcode/operand set, it may be a simple matter for an attacker to change a conditional jump to a non-conditional jump, or perhaps change the destination of a register transfer. If the target instruction is chosen carefully, it may result in the key being revealed. Modifying EEPROM/Flash EEPROM/Flash attacks are similar to ROM attacks except that the laser cutter microscope technique can be used to both set and reset individual bits. This gives much greater scope in terms of modification of algorithms. Gate Destruction Anderson and Kuhn described the rump session of the 1997 workshop on Fast Software Encryption, where Biham and Shamir presented an attack on DES. The attack was to use a laser cutter to destroy an individual gate in the hardware implementation of a known block cipher (DES). The net effect of the attack was to force a particular bit of a register to be “stuck”. Biham and Shamir described the effect of forcing a particular register to be affected in this way—the least significant bit of the output from the round function is set to 0. Comparing the 6 least significant bits of the left half and the right half can recover several bits of the key. Damaging a number of chips in this way can reveal enough information about the key to make complete key recovery easy. An encryption chip modified in this way will have the property that encryption and decryption will no longer be inverses. Overwrite Attacks Instead of trying to read the Flash memory, an attacker may simply set a single bit by use of a laser cutter microscope. Although the attacker doesn't know the previous value, they know the new value. If the chip still works, the bit's original state must be the same as the new state. If the chip doesn't work any longer, the bit's original state must be the logical NOT of the current state. An attacker can perform this attack on each bit of the key and obtain the n-bit key using at most n chips (if the new bit matched the old bit, a new chip is not required for determining the next bit). Test Circuitry Attack Most chips contain test circuitry specifically designed to check for manufacturing defects. This includes BIST (Built In Self Test) and scan paths. Quite often the scan paths and test circuitry includes access and readout mechanisms for all the embedded latches. In some cases the test circuitry could potentially be used to give information about the contents of particular registers. Test circuitry is often disabled once the chip has passed all manufacturing tests, in some cases by blowing a specific connection within the chip. A determined attacker, however, can reconnect the test circuitry and hence enable it. Memory Remanence Values remain in RAM long after the power has been removed, although they do not remain long enough to be considered non-volatile. An attacker can remove power once sensitive information has been moved into RAM (for example working registers), and then attempt to read the value from RAM. This attack is most useful against security systems that have regular RAM chips. A classic example is where a security system was designed with an automatic power-shut-off that is triggered when the computer case is opened. The attacker was able to simply open the case, remove the RAM chips, and retrieve the key because of memory remanence. Chip Theft Attack If there are a number of stages in the lifetime of an Authentication Chip, each of these stages must be examined in terms of ramifications for security should chips be stolen. For example, if information is programmed into the chip in stages, theft of a chip between stages may allow an attacker to have access to key information or reduced efforts for attack. Similarly, if a chip is stolen directly after manufacture but before programming, does it give an attacker any logical or physical advantage? Requirements Existing solutions to the problem of authenticating consumables have typically relied on physical patents on packaging. However this does not stop home refill operations or clone manufacture in countries with weak industrial property protection. Consequently a much higher level of protection is required. The authentication mechanism is therefore built into an Authentication chip 53 that allows a system to authenticate a consumable securely and easily. Limiting ourselves to the system authenticating consumables (we don't consider the consumable authenticating the system), two levels of protection can be considered: Presence Only Authentication This is where only the presence of an Authentication Chip is tested. The Authentication Chip can be reused in another consumable without being reprogrammed. Consumable Lifetime Authentication This is where not only is the presence of the Authentication Chip tested for, but also the Authentication chip 53 must only last the lifetime of the consumable. For the chip to be reused it must be completely erased and reprogrammed. The two levels of protection address different requirements. We are primarily concerned with Consumable Lifetime Authentication in order to prevent cloned versions of high volume consumables. In this case, each chip should hold secure state information about the consumable being authenticated. It should be noted that a Consumable Lifetime Authentication Chip could be used in any situation requiring a Presence Only Authentication Chip. The requirements for authentication, data storage integrity and manufacture should be considered separately. The following sections summarize requirements of each. Authentication The authentication requirements for both Presence Only Authentication and Consumable Lifetime Authentication are restricted to case of a system authenticating a consumable. For Presence Only Authentication, we must be assured that an Authentication Chip is physically present. For Consumable Lifetime Authentication we also need to be assured that state data actually came from the Authentication Chip, and that it has not been altered en route. These issues cannot be separated—data that has been altered has a new source, and if the source cannot be determined, the question of alteration cannot be settled. It is not enough to provide an authentication method that is secret, relying on a home-brew security method that has not been scrutinized by security experts. The primary requirement therefore is to provide authentication by means that have withstood the scrutiny of experts. The authentication scheme used by the Authentication chip 53 should be resistant to defeat by logical means. Logical types of attack are extensive, and attempt to do one of three things: Bypass the authentication process altogether Obtain the secret key by force or deduction, so that any question can be answered Find enough about the nature of the authenticating questions and answers in order to, without the key, give the right answer to each question. Data Storage Integrity Although Authentication protocols take care of ensuring data integrity in communicated messages, data storage integrity is also required. Two kinds of data must be stored within the Authentication Chip: Authentication data, such as secret keys Consumable state data, such as serial numbers, and media remaining etc. The access requirements of these two data types differ greatly. The Authentication chip 53 therefore requires a storage/access control mechanism that allows for the integrity requirements of each type. Authentication Data Authentication data must remain confidential. It needs to be stored in the chip during a manufacturing/programniing stage of the chip's life, but from then on must not be permitted to leave the chip. It must be resistant to being read from non-volatile memory. The authentication scheme is responsible for ensuring the key cannot be obtained by deduction, and the manufacturing process is responsible for ensuring that the key cannot be obtained by physical means. The size of the authentication data memory area must be large enough to hold the necessary keys and secret information as mandated by the authentication protocols. Consumable State Data Each Authentication chip 53 needs to be able to also store 256 bits (32 bytes) of consumable state data. Consumable state data can be divided into the following types. Depending on the application, there will be different numbers of each of these types of data items. A maximum number of 32 bits for a single data item is to be considered. Read Only ReadWrite Decrement Only Read Only data needs to be stored in the chip during a manufacturing/programming stage of the chip's life, but from then on should not be allowed to change. Examples of Read Only data items are consumable batch numbers and serial numbers. ReadWrite data is changeable state information, for example, the last time the particular consumable was used. ReadWrite data items can be read and written an unlimited number of times during the lifetime of the consumable. They can be used to store any state information about the consumable. The only requirement for this data is that it needs to be kept in non-volatile memory. Since an attacker can obtain access to a system (which can write to ReadWrite data), any attacker can potentially change data fields of this type. This data type should not be used for secret information, and must be considered insecure. Decrement Only data is used to count down the availability of consumable resources. A photocopier's toner cartridge, for example, may store the amount of toner remaining as a Decrement Only data item. An ink cartridge for a color printer may store the amount of each ink color as a Decrement Only data item, requiring 3 (one for each of Cyan, Magenta, and Yellow), or even as many as 5 or 6 Decrement Only data items. The requirement for this kind of data item is that once programmed with an initial value at the manufacturing/programming stage, it can only reduce in value. Once it reaches the minimum value, it cannot decrement any further. The Decrement Only data item is only required by Consumable Lifetime Authentication. Manufacture The Authentication chip 53 ideally must have a low manufacturing cost in order to be included as the authentication mechanism for low cost consumables. The Authentication chip 53 should use a standard manufacturing process, such as Flash. This is necessary to: Allow a great range of manufacturing location options Use well-defined and well-behaved technology Reduce cost Regardless of the authentication scheme used, the circuitry of the authentication part of the chip must be resistant to physical attack. Physical attack comes in four main ways, although the form of the attack can vary: Bypassing the Authentication Chip altogether Physical examination of chip while in operation (destructive and non-destructive) Physical decomposition of chip Physical alteration of chip Ideally, the chip should be exportable from the U.S., so it should not be possible to use an Authentication chip 53 as a secure encryption device. This is low priority requirement since there are many companies in other countries able to manufacture the Authentication chips. In any case, the export restrictions from the U.S. may change. Authentication Existing solutions to the problem of authenticating consumables have typically relied on physical patents on packaging. However this does not stop home refill operations or clone manufacture in countries with weak industrial property protection. Consequently a much higher level of protection is required. It is not enough to provide an authentication method that is secret, relying on a home-brew security method that has not been scrutinized by security experts. Security systems such as Netscape's original proprietary system and the GSM Fraud Prevention Network used by cellular phones are examples where design secrecy caused the vulnerability of the security. Both security systems were broken by conventional means that would have been detected if the companies had followed an open design process. The solution is to provide authentication by means that have withstood the scrutiny of experts. A number of protocols that can be used for consumables authentication. We only use security methods that are publicly described, using known behaviors in this new way. For all protocols, the security of the scheme relies on a secret key, not a secret algorithm. All the protocols rely on a time-variant challenge (i.e. the challenge is different each time), where the response depends on the challenge and the secret. The challenge involves a random number so that any observer will not be able to gather useful information about a subsequent identification. Two protocols are presented for each of Presence Only Authentication and Consumable Lifetime Authentication. Although the protocols differ in the number of Authentication Chips required for the authentication process, in all cases the System authenticates the consumable. Certain protocols will work with either one or two chips, while other protocols only work with two chips. Whether one chip or two Authentication Chips are used the System is still responsible for making the authentication decision. Single Chip Authentication When only one Authentication chip 53 is used for the authentication protocol, a single chip (referred to as ChipA) is responsible for proving to a system (referred to as System) that it is authentic. At the start of the protocol, System is unsure of ChipA's authenticity. System undertakes a challenge-response protocol with ChipA, and thus determines ChipA's authenticity. In all protocols the authenticity of the consumable is directly based on the authenticity of the chip, i.e. if ChipA is considered authentic, then the consumable is considered authentic. The data flow can be seen in FIG. 167. In single chip authentication protocols, System can be software, hardware or a combination of both. It is important to note that System is considered insecure—it can be easily reverse engineered by an attacker, either by examining the ROM or by examining circuitry. System is not specially engineered to be secure in itself. Double Chip Authentication In other protocols, two Authentication Chips are required as shown in FIG. 168. A single chip (referred to as ChipA) is responsible for proving to a system (referred to as System) that it is authentic. As part of the authentication process, System makes use of a trusted Authentication Chip (referred to as ChipT). In double chip authentication protocols, System can be software, hardware or a combination of both. However ChipT must be a physical Authentication Chip. In some protocols ChipT and ChipA have the same internal structure, while in others ChipT and ChipA have different internal structures. Presence Only Authentication (Insecure State Data) For this level of consumable authentication we are only concerned about validating the presence of the Authentication chip 53. Although the Authentication Chip can contain state information, the transmission of that state information would not be considered secure. Two protocols are presented. Protocol 1 requires 2 Authentication Chips, while Protocol 2 can be implemented using either 1 or 2 Authentication Chips. Protocol 1 Protocol 1 is a double chip protocol (two Authentication Chips are required). Each Authentication Chip contains the following values: K Key for FK[X]. Must be secret. R Current random number. Does not have to be secret, but must be seeded with a different initial value for each chip instance. Changes with each invocation of the Random function. Each Authentication Chip contains the following logical functions: Random[ ] Returns R, and advances R to next in sequence. F[X] Returns FK[X], the result of applying a one-way function F to X based upon the secret key K. The protocol is as follows: System requests Random[ ] from ChipT; ChipT returns R to System; System requests F[R] from both ChipT and ChipA; ChipT returns FKT[R] to System; ChipA returns FKA[R] to System; System compares FKT[R] with FKA[R]. If they are equal, then ChipA is considered valid. If not, then ChipA is considered invalid. The data flow can be seen in FIG. 169. The System does not have to comprehend FK[R] messages. It must merely check that the responses from ChipA and ChipT are the same. The System therefore does not require the key. The security of Protocol 1 lies in two places: The security of F[X]. Only Authentication chips contain the secret key, so anything that can produce an F[X] from an X that matches the F[X] generated by a trusted Authentication chip 53 (ChipT) must be authentic. The domain of R generated by all Authentication chips must be large and non-deterministic. If the domain of R generated by all Authentication chips is small, then there is no need for a clone manufacturer to crack the key. Instead, the clone manufacturer could incorporate a ROM in their chip that had a record of all of the responses from a genuine chip to the codes sent by the system. The Random function does not strictly have to be in the Authentication Chip, since System can potentially generate the same random number sequence. However it simplifies the design of System and ensures the security of the random number generator will be the same for all implementations that use the Authentication Chip, reducing possible error in system implementation. Protocol 1 has several advantages: K is not revealed during the authentication process Given X, a clone chip cannot generate FK[X] without K or access to a real Authentication Chip. System is easy to design, especially in low cost systems such as ink-jet printers, as no encryption or decryption is required by System itself. A wide range of keyed one-way functions exists, including symmetric cryptography, random number sequences, and message authentication codes. One-way functions require fewer gates and are easier to verify than asymmetric algorithms). Secure key size for a keyed one-way function does not have to be as large as for an asymmetric (public key) algorithm. A minimum of 128 bits can provide appropriate security if F[X] is a symmetric cryptographic function. However there are problems with this protocol: It is susceptible to chosen text attack. An attacker can plug the chip into their own system, generate chosen Rs, and observe the output. In order to find the key, an attacker can also search for an R that will generate a specific F[M] since multiple Authentication chips can be tested in parallel. Depending on the one-way function chosen, key generation can be complicated. The method of selecting a good key depends on the algorithm being used. Certain keys are weak for a given algorithm. The choice of the keyed one-way functions itself is non-trivial. Some require licensing due to patent protection. A man-in-the middle could take action on a plaintext message M before passing it on to ChipA—it would be preferable if the man-in-the-middle did not see M until after ChipA had seen it. It would be even more preferable if a man-in-the-middle didn't see M at all. If F is symmetric encryption, because of the key size needed for adequate security, the chips could not be exported from the USA since they could be used as strong encryption devices. If Protocol 1 is implemented with F as an asymmetric encryption algorithm, there is no advantage over the symmetric case—the keys needs to be longer and the encryption algorithm is more expensive in silicon. Protocol 1 must be implemented with 2 Authentication Chips in order to keep the key secure. This means that each System requires an Authentication Chip and each consumable requires an Authentication Chip. Protocol 2 In some cases, System may contain a large amount of processing power. Alternatively, for instances of systems that are manufactured in large quantities, integration of ChipT into System may be desirable. Use of an asymmetrical encryption algorithm allows the ChipT portion of System to be insecure. Protocol 2 therefore, uses asymmetric cryptography. For this protocol, each chip contains the following values: K Key for EK[X] and DK[X]. Must be secret in ChipA. Does not have to be secret in ChipT. R Current random number. Does not have to be secret, but must be seeded with a different initial value for each chip instance. Changes with each invocation of the Random function. The following functions are defined: E[X] ChipT only. Returns EK[X] where E is asymmetric encrypt function E. D[X] ChipA only. Returns DK[X] where D is asymmetric decrypt function D. Random[ ] ChipT only. Returns R | EK[R], where R is random number based on seed S. Advances R to next in random number sequence. The public key KT is in ChipT, while the secret key KA is in ChipA. Having KT in ChipT has the advantage that ChipT can be implemented in software or hardware (with the proviso that the seed for R is different for each chip or system). Protocol 2 therefore can be implemented as a Single Chip Protocol or as a Double Chip Protocol. The protocol for authentication is as follows: System calls ChipT's Random function; ChipT returns R|EKT [R] to System; System calls ChipA's D function, passing in EKT [R]; ChipA returns R, obtained by DKA [EKT [R]]; System compares R from ChipA to the original R generated by ChipT. If they are equal, then ChipA is considered valid. If not, ChipA is invalid. The data flow can be seen in FIG. 170. Protocol 2 has the following advantages: KA (the secret key) is not revealed during the authentication process Given EKT [X], a clone chip cannot generate X without KA or access to a real ChipA. Since KT≠KA, ChipT can be implemented completely in software or in insecure hardware or as part of System. Only ChipA (in the consumable) is required to be a secure Authentication Chip. If ChipT is a physical chip, System is easy to design. There are a number of well-documented and cryptanalyzed asymmetric algorithms to chose from for implementation, including patent-free and license-free solutions. However, Protocol 2 has a number of its own problems: For satisfactory security, each key needs to be 2048 bits (compared to minimum 128 bits for symmetric cryptography in Protocol 1). The associated intermediate memory used by the encryption and decryption algorithms is correspondingly larger. Key generation is non-trivial. Random numbers are not good keys. If ChipT is implemented as a core, there may be difficulties in linking it into a given System ASIC. If ChipT is implemented as software, not only is the implementation of System open to programming error and non-rigorous testing, but the integrity of the compiler and mathematics primitives must be rigorously checked for each implementation of System. This is more complicated and costly than simply using a well-tested chip. Although many symmetric algorithms are specifically strengthened to be resistant to differential cryptanalysis (which is based on chosen text attacks), the private key KA is susceptible to a chosen text attack If ChipA and ChipT are instances of the same Authentication Chip, each chip must contain both asymmetric encrypt and decrypt functionality. Consequently each chip is larger, more complex, and more expensive than the chip required for Protocol 1. If the Authentication Chip is broken into 2 chips to save cost and reduce complexity of design/test, two chips still need to be manufactured, reducing the economies of scale. This is offset by the relative numbers of systems to consumables, but must still be taken into account Protocol 2 Authentication Chips could not be exported from the USA, since they would be considered strong encryption devices. Even if the process of choosing a key for Protocol 2 was straightforward, Protocol 2 is impractical at the present time due to the high cost of silicon implementation (both key size and functional implementation). Therefore Protocol 1 is the protocol of choice for Presence Only Authentication. Clone Consumable using Real Authentication Chip Protocols 1 and 2 only check that ChipA is a real Authentication Chip. They do not check to see if the consumable itself is valid. The fundamental assumption for authentication is that if ChipA is valid, the consumable is valid. It is therefore possible for a clone manufacturer to insert a real Authentication Chip into a clone consumable. There are two cases to consider: In cases where state data is not written to the Authentication Chip, the chip is completely reusable. Clone manufacturers could therefore recycle a valid consumable into a clone consumable. This may be made more difficult by melding the Authentication Chip into the consumable's physical packaging, but it would not stop refill operators. In cases where state data is written to the Authentication Chip, the chip may be new, partially used up, or completely used up. However this does not stop a clone manufacturer from using the Piggyback attack, where the clone manufacturer builds a chip that has a real Authentication Chip as a piggyback. The Attacker's chip (ChipE) is therefore a man-in-the-middle. At power up, ChipE reads all the memory state values from the real Authentication chip 53 into its own memory. ChipE then examines requests from System, and takes different actions depending on the request. Authentication requests can be passed directly to the real Authentication chip 53, while read/write requests can be simulated by a memory that resembles real Authentication Chip behavior. In this way the Authentication chip 53 will always appear fresh at power-up. ChipE can do this because the data access is not authenticated. In order to fool System into thinking its data accesses were successful, ChipE still requires a real Authentication Chip, and in the second case, a clone chip is required in addition to a real Authentication Chip. Consequently Protocols 1 and 2 can be useful in situations where it is not cost effective for a clone manufacturer to embed a real Authentication chip 53 into the consumable. If the consumable cannot be recycled or refilled easily, it may be protection enough to use Protocols 1 or 2. For a clone operation to be successful each clone consumable must include a valid Authentication Chip. The chips would have to be stolen en masse, or taken from old consumables. The quantity of these reclaimed chips (as well as the effort in reclaiming them) should not be enough to base a business on, so the added protection of secure data transfer (see Protocols 3 and 4) may not be useful. Longevity of Key A general problem of these two protocols is that once the authentication key is chosen, it cannot easily be changed. In some instances a key-compromise is not a problem, while for others a key compromise is disastrous. For example, in a car/car-key System/Consumable scenario, the customer has only one set of car/car-keys. Each car has a different authentication key. Consequently the loss of a car-key only compromises the individual car. If the owner considers this a problem, they must get a new lock on the car by replacing the System chip inside the car's electronics. The owner's keys must be reprogrammed/replaced to work with the new car System Authentication Chip. By contrast, a compromise of a key for a high volume consumable market (for example ink cartridges in printers) would allow a clone ink cartridge manufacturer to make their own Authentication Chips. The only solution for existing systems is to update the System Authentication Chips, which is a costly and logistically difficult exercise. In any case, consumers' Systems already work—they have no incentive to hobble their existing equipment. Consumable Lifetime Authentication In this level of consumable authentication we are concerned with validating the existence of the Authentication Chip, as well as ensuring that the Authentication Chip lasts only as long as the consumable. In addition to validating that an Authentication Chip is present, writes and reads of the Authentication Chip's memory space must be authenticated as well. In this section we assume that the Authentication Chip's data storage integrity is secure—certain parts of memory are Read Only, others are Read/Write, while others are Decrement Only (see the chapter entitled Error! Reference source not found. for more information). Two protocols are presented. Protocol 3 requires 2 Authentication Chips, while Protocol 4 can be implemented using either 1 or 2 Authentication Chips. Protocol 3 This protocol is a double chip protocol (two Authentication Chips are required). For this protocol, each Authentication Chip contains the following values: K1 Key for calculating FK1[X]. Must be secret. K2 Key for calculating FK2[X]. Must be secret. R Current random number. Does not have to be secret, but must be seeded with a different initial value for each chip instance. Changes with each successful authentication as defined by the Test function. M Memory vector of Authentication chip 53. Part of this space should be different for each chip (does not have to be a random number). Each Authentication Chip contains the following logical functions: F[X] Internal function only. Returns FK[X], the result of applying a one-way function F to X based upon either key K1 or key K2 Random[ ] Returns R | FK1[R]. Test[X, Y] Returns 1 and advances R if FK2[R | X] = Y. Otherwise returns 0. The time taken to return 0 must be identical for all bad inputs. Read[X, Y] Returns M | FK2[X | M] if FK1[X] = Y. Otherwise returns 0. The time taken to return 0 must be identical for all bad inputs. Write[X] Writes X over those parts of M that can legitimately be written over. To authenticate ChipA and read ChipA's memory M: System calls ChipT's Random function; ChipT produces R|FK[R] and returns these to System; System calls ChipA's Read function, passing in R, FK[R]; ChipA returns M and FK[R|M]; System calls ChipT's Test function, passing in M and FK[R|M]; System checks response from ChipT. If the response is 1, then ChipA is considered authentic. If 0, ChipA is considered invalid. To authenticate a write of Mnew to ChipA's memory M: System calls ChipA's Write function, passing in Mnew; The authentication procedure for a Read is carried out; If ChipA is authentic and Mnew=M, the write succeeded. Otherwise it failed. The data flow for read authentication is shown in FIG. 171. The first thing to note about Protocol 3 is that FK[X] cannot be called directly. Instead FK[X] is called indirectly by Random, Test and Read: Random[ ] calls FK1[X] X is not chosen by the caller. It is chosen by the Random function. An attacker must perform a brute force search using multiple calls to Random, Read, and Test to obtain a desired X, FK1[X] pair. Test[X, Y] calls FK2[R | X] Does not return result directly, but compares the result to Y and then returns 1 or 0. Any attempt to deduce K2 by calling Test multiple times trying different values of FK2[R | X] for a given X is reduced to a brute force search where R cannot even be chosen by the attacker. Read[X, Y] calls FK1[X] X and FK1[X] must be supplied by caller, so the caller must already know the X, FK1[X] pair. Since the call returns 0 if Y ≠ FK1[X], a caller can use the Read function for a brute force attack on K1. Read[X, Y] calls FK2[X | M], X is supplied by caller, however X can only be those values already given out by the Random function (since X and Y are validated via K1). Thus a chosen text attack must first collect pairs from Random (effectively a brute force attack). In addition, only part of M can be used in a chosen text attack since some of M is constant (read-only) and the decrement-only part of M can only be used once per consumable. In the next consumable the read-only part of M will be different. Having FK [X] being called indirectly prevents chosen text attacks on the Authentication Chip. Since an attacker can only obtain a chosen R, FK1[R] pair by calling Random, Read, and Test multiple times until the desired R appears, a brute force attack on K1 is required in order to perform a limited chosen text attack on K2. Any attempt at a chosen text attack on K2 would be limited since the text cannot be completely chosen: parts of M are read-only, yet different for each Authentication Chip. The second thing to note is that two keys are used. Given the small size of M, two different keys K1 and K2 are used in order to ensure there is no correlation between F[R] and F[R|M]. K1 is therefore used to help protect K2 against differential attacks. It is not enough to use a single longer key since M is only 256 bits, and only part of M changes during the lifetime of the consumable. Otherwise it is potentially possible that an attacker via some as-yet undiscovered technique, could determine the effect of the limited changes in M to particular bit combinations in R and thus calculate FK2[X|M] based on FK1[X]. As an added precaution, the Random and Test functions in ChipA should be disabled so that in order to generate R, FK[R] pairs, an attacker must use instances of ChipT, each of which is more expensive than ChipA (since a system must be obtained for each ChipT). Similarly, there should be a minimum delay between calls to Random, Read and Test so that an attacker cannot call these functions at high speed. Thus each chip can only give a specific number of X, FK[X] pairs away in a certain time period. The only specific timing requirement of Protocol 3 is that the return value of 0 (indicating a bad input) must be produced in the same amount of time regardless of where the error is in the input. Attackers can therefore not learn anything about what was bad about the input value. This is true for both RD and TST functions. Another thing to note about Protocol 3 is that Reading data from ChipA also requires authentication of ChipA. The System can be sure that the contents of memory (M) is what ChipA claims it to be if FK2[R|M] is returned correctly. A clone chip may pretend that M is a certain value (for example it may pretend that the consumable is full), but it cannot return FK2[R|M] for any R passed in by System. Thus the effective signature FK2[R|M] assures System that not only did an authentic ChipA send M, but also that M was not altered in between ChipA and System. Finally, the Write function as defined does not authenticate the Write. To authenticate a write, the System must perform a Read after each Write. There are some basic advantages with Protocol 3: K1 and K2 are not revealed during the authentication process Given X, a clone chip cannot generate FK2[X|M] without the key or access to a real Authentication Chip. System is easy to design, especially in low cost systems such as ink-jet printers, as no encryption or decryption is required by System itself. A wide range of key based one-way functions exists, including symmetric cryptography, random number sequences, and message authentication codes. Keyed one-way functions require fewer gates and are easier to verify than asymmetric algorithms). Secure key size for a keyed one-way function does not have to be as large as for an asymmetric (public key) algorithm. A minimum of 128 bits can provide appropriate security if F[X] is a symmetric cryptographic function. Consequently, with Protocol 3, the only way to authenticate ChipA is to read the contents of ChipA's memory. The security of this protocol depends on the underlying FK[X] scheme and the domain of R over the set of all Systems. Although FK[X] can be any keyed one-way function, there is no advantage to implement it as asymmetric encryption. The keys need to be longer and the encryption algorithm is more expensive in silicon. This leads to a second protocol for use with asymmetric algorithms—Protocol 4. Protocol 3 must be implemented with 2 Authentication Chips in order to keep the keys secure. This means that each System requires an Authentication Chip and each consumable requires an Authentication Chip Protocol 4 In some cases, System may contain a large amount of processing power. Alternatively, for instances of systems that are manufactured in large quantities, integration of ChipT into System may be desirable. Use of an asymmetrical encryption algorithm can allow the ChipT portion of System to be insecure. Protocol 4 therefore, uses asymmetric cryptography. For this protocol, each chip contains the following values: K Key for EK[X] and DK[X]. Must be secret in ChipA. Does not have to be secret in ChipT. R Current random number. Does not have to be secret, but must be seeded with a different initial value for each chip instance. Changes with each successful authentication as defined by the Test function. M Memory vector of Authentication chip 53. Part of this space should be different for each chip, (does not have to be a random number). There is no point in verifying anything in the Read function, since anyone can encrypt using a public key. Consequently the following functions are defined: E[X] Internal function only. Returns EK[X] where E is asymmetric encrypt function E. D[X] Internal function only. Returns DK[X] where D is asymmetric decrypt function D. Random[ ] ChipT only. Returns EK[R]. Test[X, Y] Returns 1 and advances R if DK[R | X] = Y. Otherwise returns 0. The time taken to return 0 must be identical for all bad inputs. Read[X] Returns M | EK[R | M] where R = DK[X] (does not test input). Write[X] Writes X over those parts of M that can legitimately be written over. The public key KT is in ChipT, while the secret key KA is in ChipA. Having KT in ChipT has the advantage that ChipT can be implemented in software or hardware (with the proviso that R is seeded with a different random number for each system). To authenticate ChipA and read ChipA's memory M: System calls ChipT's Random function; ChipT produces ad returns EKT[R] to System; System calls ChipA's Read function, passing in EKT[R]; ChipA returns M|EKA[R|M], first obtaining R by DKA[EKT[R]]; System calls ChipT's Test function, passing in M and EKA[R|M]; ChipT calculates DKT[EKA[R|M]] and compares it to R|M. System checks response from ChipT. If the response is 1, then ChipA is considered authentic. If 0, ChipA is considered invalid. To authenticate a write of Mnew to ChipA's memory M: System calls ChipA's Write function, passing in Mnew; The authentication procedure for a Read is carried out; If ChipA is authentic and Mnew=M, the write succeeded. Otherwise it failed. The data flow for read authentication is shown in FIG. 172. Only a valid ChipA would know the value of R, since R is not passed into the Authenticate function (it is passed in as an encrypted value). R must be obtained by decrypting E[R], which can only be done using the secret key KA. Once obtained, R must be appended to M and then the result re-encoded. ChipT can then verify that the decoded form of EKA[R|M]=R|M and hence ChipA is valid. Since KT≠KA, EKT[R]≠EKA[R]. Protocol 4 has the following advantages: KA (the secret key) is not revealed during the authentication process Given EKT[X], a clone chip cannot generate X without KA or access to a real ChipA. Since KT≠KA, ChipT can be implemented completely in software or in insecure hardware or as part of System. Only ChipA is required to be a secure Authentication Chip. Since ChipT and ChipA contain different keys, intense testing of ChipT will reveal nothing about KA. If ChipT is a physical chip, System is easy to design. There are a number of well-documented and cryptanalyzed asymmetric algorithms to chose from for implementation, including patent-free and license-free solutions. Even if System could be rewired so that ChipA requests were directed to ChipT, ChipT could never answer for ChipA since KT≠KA. The attack would have to be directed at the System ROM itself to bypass the Authentication protocol. However, Protocol 4 has a number of disadvantages: All Authentication Chips need to contain both asymmetric encrypt and decrypt functionality. Consequently each chip is larger, more complex, and more expensive than the chip required for Protocol 3. For satisfactory security, each key needs to be 2048 bits (compared to a minimum of 128 bits for symmetric cryptography in Protocol 1). The associated intermediate memory used by the encryption and decryption algorithms is correspondingly larger. Key generation is non-trivial. Random numbers are not good keys. If ChipT is implemented as a core, there may be difficulties in linking it into a given System ASIC. If ChipT is implemented as software, not only is the implementation of System open to programming error and non-rigorous testing, but the integrity of the compiler and mathematics primitives must be rigorously checked for each implementation of System. This is more complicated and costly than simply using a well-tested chip. Although many symmetric algorithms are specifically strengthened to be resistant to differential cryptanalysis (which is based on chosen text attacks), the private key KA is susceptible to a chosen text attack Protocol 4 Authentication Chips could not be exported from the USA, since they would be considered strong encryption devices. As with Protocol 3, the only specific timing requirement of Protocol 4 is that the return value of 0 (indicating a bad input) must be produced in the same amount of time regardless of where the error is in the input. Attackers can therefore not learn anything about what was bad about the input value. This is true for both RD and TST functions. Variation on Call to TST If there are two Authentication Chips used, it is theoretically possible for a clone manufacturer to replace the System Authentication Chip with one that returns 1 (success) for each call to TST. The System can test for this by calling TST a number of times—N times with a wrong hash value, and expect the result to be 0. The final time that TST is called, the true returned value from ChipA is passed, and the return value is trusted. The question then arises of how many times to call TST. The number of calls must be random, so that a clone chip manufacturer cannot know the number ahead of time. If System has a clock, bits from the clock can be used to determine how many false calls to TST should be made. Otherwise the returned value from ChipA can be used. In the latter case, an attacker could still rewire the System to permit a clone ChipT to view the returned value from ChipA, and thus know which hash value is the correct one. The worst case of course, is that the System can be completely replaced by a clone System that does not require authenticated consumables—this is the limit case of rewiring and changing the System. For this reason, the variation on calls to TST is optional, depending on the System, the Consumable, and how likely modifications are to be made. Adding such logic to System (for example in the case of a small desktop printer) may be considered not worthwhile, as the System is made more complicated. By contrast, adding such logic to a camera may be considered worthwhile. Clone Consumable using Real Authentication Chip It is important to decrement the amount of consumable remaining before use that consumable portion. If the consumable is used first, a clone consumable could fake a loss of contact during a write to the special known address and then appear as a fresh new consumable. It is important to note that this attack still requires a real Authentication Chip in each consumable. Longevity of Key A general problem of these two protocols is that once the authentication keys are chosen, it cannot easily be changed. In some instances a key-compromise is not a problem, while for others a key compromise is disastrous. Choosing a Protocol Even if the choice of keys for Protocols 2 and 4 was straightforward, both protocols are impractical at the present time due to the high cost of silicon implementation (both due to key size and functional implementation). Therefore Protocols 1 and 3 are the two protocols of choice. However, Protocols 1 and 3 contain much of the same components: both require read and write access; both require implementation of a keyed one-way function; and both require random number generation functionality. Protocol 3 requires an additional key (K2), as well as some minimal state machine changes: a state machine alteration to enable FK1[X] to be called during Random; a Test function which calls FK2[X] a state machine alteration to the Read function to call FK1[X] and FK2[X] Protocol 3 only requires minimal changes over Protocol 1. It is more secure and can be used in all places where Presence Only Authentication is required (Protocol 1). It is therefore the protocol of choice. Given that Protocols 1 and 3 both make use of keyed one-way functions, the choice of one-way function is examined in more detail here. The following table outlines the attributes of the applicable choices. The attributes are worded so that the attribute is seen as an advantage. Triple DES Blowfish RC5 IDEA Random Sequences HMAC-MD5 HMAC-SHA1 HMAC-RIPEMD160 Free of patents • • • • • • Random key generation • • • Can be exported from the USA • • • • Fast • • • • Preferred Key Size (bits) for use in 168 128 128 128 512 128 160 160 this application Block size (bits) 64 64 64 64 256 512 512 512 Cryptanalysis Attack-Free • • • • • (apart from weak keys) Output size given input size N ≧N ≧N ≧N ≧N 128 128 160 160 Low storage requirements • • • • Low silicon complexity • • • • NSA designed • • An examination of the table shows that the choice is effectively between the 3 HMAC constructs and the Random Sequence. The problem of key size and key generation eliminates the Random Sequence. Given that a number of attacks have already been carried out on MD5 and since the hash result is only 128 bits, HMAC-MD5 is also eliminated. The choice is therefore between HMAC-SHA1 and HMAC-RIPEMD160. RIPEMD-160 is relatively new, and has not been as extensively cryptanalyzed as SHA1. However, SHA-1 was designed by the NSA, so this may be seen by some as a negative attribute. Given that there is not much between the two, SHA-1 will be used for the HMAC construct. Choosing a Random Number Generator Each of the protocols described (1-4) requires a random number generator. The generator must be “good” in the sense that the random numbers generated over the life of all Systems cannot be predicted. If the random numbers were the same for each System, an attacker could easily record the correct responses from a real Authentication Chip, and place the responses into a ROM lookup for a clone chip. With such an attack there is no need to obtain K1 or K2. Therefore the random numbers from each System must be different enough to be unpredictable, or non-deterministic. As such, the initial value for R (the random seed) should be programmed with a physically generated random number gathered from a physically random phenomenon, one where there is no information about whether a particular bit will be 1 or 0. The seed for R must NOT be generated with a computer-run random number generator. Otherwise the generator algorithm and seed may be compromised enabling an attacker to generate and therefore know the set of all R values in all Systems. Having a different R seed in each Authentication Chip means that the first R will be both random and unpredictable across all chips. The question therefore arises of how to generate subsequent R values in each chip. The base case is not to change R at all. Consequently R and FK1[R] will be the same for each call to Random[ ]. If they are the same, then FK1[R] can be a constant rather than calculated. An attacker could then use a single valid Authentication Chip to generate a valid lookup table, and then use that lookup table in a clone chip programmed especially for that System. A constant R is not secure. The simplest conceptual method of changing R is to increment it by 1. Since R is random to begin with, the values across differing systems are still likely to be random. However given an initial R, all subsequent R values can be determined directly (there is no need to iterate 10,000 times—R will take on values from R0 to R0+10000). An incrementing R is immune to the earlier attack on a constant R. Since R is always different, there is no way to construct a lookup table for the particular System without wasting as many real Authentication Chips as the clone chip will replace. Rather than increment using an adder, another way of changing R is to implement it as an LFSR (Linear Feedback Shift Register). This has the advantage of less silicon than an adder, but the advantage of an attacker not being able to directly determine the range of R for a particular System, since an LFSR value-domain is determined by sequential access. To determine which values an given initial R will generate, an attacker must iterate through the possibilities and enumerate them. The advantages of a changing R are also evident in the LFSR solution. Since R is always different, there is no way to construct a lookup table for the particular System without using-up as many real Authentication Chips as the clone chip will replace (and only for that System). There is therefore no advantage in having a more complex function to change R. Regardless of the function, it will always be possible for an attacker to iterate through the lifetime set of values in a simulation. The primary security lies in the initial randomness of R. Using an LFSR to change R (apart from using less silicon than an adder) simply has the advantage of not being restricted to a consecutive numeric range (i.e. knowing R, RN cannot be directly calculated; an attacker must iterate through the LFSR N times). The Random number generator within the Authentication Chip is therefore an LFSR with 160 bits. Tap selection of the 160 bits for a maximal-period LFSR (i.e. the LFSR will cycle through all 2160-1 states, 0 is not a valid state) yields bits 159, 4, 2, and 1, as shown in FIG. 173. The LFSR is sparse, in that not many bits are used for feedback (only 4 out of 160 bits are used). This is a problem for cryptographic applications, but not for this application of non-sequential number generation. The 160-bit seed value for R can be any random number except 0, since an LFSR filled with 0s will produce a never-ending stream of 0s. Since the LFSR described is a maximal period LFSR, all 160 bits can be used directly as R. There is no need to construct a number sequentially from output bits of b0. After each successful call to TST, the random number (R) must be advanced by XORing bits 1, 2, 4, and 159, and shifting the result into the high order bit. The new R and corresponding FK1[R] can be retrieved on the next call to Random. Holding out Against Logical Attacks Protocol 3 is the authentication scheme used by the Authentication Chip. As such, it should be resistant to defeat by logical means. While the effect of various types of attacks on Protocol 3 have been mentioned in discussion, this section details each type of attack in turn with reference to Protocol 3. Brute Force Attack A Brute Force attack is guaranteed to break Protocol 3. However the length of the key means that the time for an attacker to perform a brute force attack is too long to be worth the effort. An attacker only needs to break K2 to build a clone Authentication Chip. K1 is merely present to strengthen K2 against other forms of attack. A Brute Force Attack on K2 must therefore break a 160-bit key. An attack against K2 requires a maximum of 2160 attempts, with a 50% chance of finding the key after only 2159 attempts. Assuming an array of a trillion processors, each running one million tests per second, 2159 (7.3×1047) tests takes 2.3×1023 years, which is longer than the lifetime of the universe. There are only 100 million personal computers in the world. Even if these were all connected in an attack (e.g. via the Internet), this number is still 10,000 times smaller than the trillion-processor attack described. Further, if the manufacture of one trillion processors becomes a possibility in the age of nanocomputers, the time taken to obtain the key is longer than the lifetime of the universe. Guessing the Key Attack It is theoretically possible that an attacker can simply “guess the key”. In fact, given enough time, and trying every possible number, an attacker will obtain the key. This is identical to the Brute Force attack described above, where 2159 attempts must be made before a 50% chance of success is obtained. The chances of someone simply guessing the key on the first try is 2160. For comparison, the chance of someone winning the top prize in a U.S. state lottery and being killed by lightning in the same day is only 1 in 261. The chance of someone guessing the Authentication Chip key on the first go is 1 in 2160, which is comparative to two people choosing exactly the same atoms from a choice of all the atoms in the Earth i.e. extremely unlikely. Quantum Computer Attack To break K2, a quantum computer containing 160 qubits embedded in an appropriate algorithm must be built. An attack against a 160-bit key is not feasible. An outside estimate of the possibility of quantum computers is that 50 qubits may be achievable within 50 years. Even using a 50 qubit quantum computer, 2110 tests are required to crack a 160 bit key. Assuming an array of 1 billion 50 qubit quantum computers, each able to try 250 keys in 1 microsecond (beyond the current wildest estimates) finding the key would take an average of 18 billion years. Cyphertext Only Attack An attacker can launch a Cyphertext Only attack on K1 by calling monitoring calls to RND and RD, and on K2 by monitoring calls to RD and TST. However, given that all these calls also reveal the plaintext as well as the hashed form of the plaintext, the attack would be transformed into a stronger form of attack—a Known Plaintext attack. Known Plaintext Attack It is easy to connect a logic analyzer to the connection between the System and the Authentication Chip, and thereby monitor the flow of data. This flow of data results in known plaintext and the hashed form of the plaintext, which can therefore be used to launch a Known Plaintext attack against both K, and K2. To launch an attack against Ki, multiple calls to RND and TST must be made (with the call to TST being successful, and therefore requiring a call to RD on a valid chip). This is straightforward, requiring the attacker to have both a System Authentication Chip and a Consumable Authentication Chip. For each K1 X, HK1[X] pair revealed, a K2 Y, HK2[Y] pair is also revealed. The attacker must collect these pairs for further analysis. The question arises of how many pairs must be collected for a meaningful attack to be launched with this data. An example of an attack that requires collection of data for statistical analysis is Differential Cryptanalysis. However, there are no known attacks against SHA-1 or HMAC-SHA1, so there is no use for the collected data at this time. Chosen Plaintext Attacks Given that the cryptanalyst has the ability to modify subsequent chosen plaintexts based upon the results of previous experiments, K2 is open to a partial form of the Adaptive Chosen Plaintext attack, which is certainly a stronger form of attack than a simple Chosen Plaintext attack. A chosen plaintext attack is not possible against K1, since there is no way for a caller to modify R, which used as input to the RND function (the only function to provide the result of hashing with K1). Clearing R also has the effect of clearing the keys, so is not useful, and the SSI command calls CLR before storing the new R-value. Adaptive Chosen Plaintext Attacks This kind of attack is not possible against K1, since K1 is not susceptible to chosen plaintext attacks. However, a partial form of this attack is possible against K2, especially since both System and consumables are typically available to the attacker (the System may not be available to the attacker in some instances, such as a specific car). The HMAC construct provides security against all forms of chosen plaintext attacks. This is primarily because the HMAC construct has 2 secret input variables (the result of the original hash, and the secret key). Thus finding collisions in the hash function itself when the input variable is secret is even harder than finding collisions in the plain hash function. This is because the former requires direct access to SHA-1 (not permitted in Protocol 3) in order to generate pairs of input/output from SHA-1. The only values that can be collected by an attacker are HMAC[R] and HMAC[R|M]. These are not attacks against the SHA-1 hash function itself, and reduce the attack to a Differential Cryptanalysis attack, examining statistical differences between collected data. Given that there is no Differential Cryptanalysis attack known against SHA-1 or HMAC, Protocol 3 is resistant to the Adaptive Chosen Plaintext attacks. Purposeful Error Attack An attacker can only launch a Purposeful Error Attack on the TST and RD functions, since these are the only functions that validate input against the keys. With both the TST and RD functions, a 0 value is produced if an error is found in the input—no further information is given. In addition, the time taken to produce the 0 result is independent of the input, giving the attacker no information about which bit(s) were wrong. A Purposeful Error Attack is therefore fruitless. Chaining Attack Any form of chaining attack assumes that the message to be hashed is over several blocks, or the input variables can somehow be set. The HMAC-SHA1 algorithm used by Protocol 3 only ever hashes a single 512-bit block at a time. Consequently chaining attacks are not possible against Protocol 3. Birthday Attack The strongest attack known against HMAC is the birthday attack, based on the frequency of collisions for the hash function. However this is totally impractical for minimally reasonable hash functions such as SHA-1. And the birthday attack is only possible when the attacker has control over the message that is signed. Protocol 3 uses hashing as a form of digital signature. The System sends a number that must be incorporated into the response from a valid Authentication Chip. Since the Authentication Chip must respond with H[R|M], but has no control over the input value R, the birthday attack is not possible. This is because the message has effectively already been generated and signed. An attacker must instead search for a collision message that hashes to the same value (analogous to finding one person who shares your birthday). The clone chip must therefore attempt to find a new value R2 such that the hash of R2 and a chosen M2 yields the same hash value as H[R|M]. However the System Authentication Chip does not reveal the correct hash value (the TST function only returns 1 or 0 depending on whether the hash value is correct). Therefore the only way of finding out the correct hash value (in order to find a collision) is to interrogate a real Authentication Chip. But to find the correct value means to update M, and since the decrement-only parts of M are one-way, and the read-only parts of M cannot be changed, a clone consumable would have to update a real consumable before attempting to find a collision. The alternative is a Brute Force attack search on the TST function to find a success (requiring each clone consumable to have access to a System consumable). A Brute Force Search, as described above, takes longer than the lifetime of the universe, in this case, per authentication. Due to the fact that a timely gathering of a hash value implies a real consumable must be decremented, there is no point for a clone consumable to launch this kind of attack. Substitution with a Complete Lookup Table The random number seed in each System is 160 bits. The worst case situation for an Authentication Chip is that no state data is changed. Consequently there is a constant value returned as M. However a clone chip must still return FK2[R|M], which is a 160 bit value. Assuming a 160-bit lookup of a 160-bit result, this requires 7.3×1048 bytes, or 6.6×1036 terabytes, certainly more space than is feasible for the near future. This of course does not even take into account the method of collecting the values for the ROM. A complete lookup table is therefore completely impossible. Substitution with a Sparse Lookup Table A sparse lookup table is only feasible if the messages sent to the Authentication Chip are somehow predictable, rather than effectively random. The random number R is seeded with an unknown random number, gathered from a naturally random event. There is no possibility for a clone manufacturer to know what the possible range of R is for all Systems, since each bit has a 50% chance of being a 1 or a 0. Since the range of R in all systems is unknown, it is not possible to build a sparse lookup table that can be used in all systems. The general sparse lookup table is therefore not a possible attack. However, it is possible for a clone manufacturer to know what the range of R is for a given System. This can be accomplished by loading a LFSR with the current result from a call to a specific System Authentication Chip's RND function, and iterating some number of times into the future. If this is done, a special ROM can be built which will only contain the responses for that particular range of R, i.e. a ROM specifically for the consumables of that particular System. But the attacker still needs to place correct information in the ROM. The attacker will therefore need to find a valid Authentication Chip and call it for each of the values in R Suppose the clone Authentication Chip reports a full consumable, and then allows a single use before simulating loss of connection and insertion of a new full consumable. The clone consumable would therefore need to contain responses for authentication of a full consumable and authentication of a partially used consumable. The worst case ROM contains entries for full and partially used consumables for R over the lifetime of System. However, a valid Authentication Chip must be used to generate the information, and be partially used in the process. If a given System only produces about n R-values, the sparse lookup-ROM required is 10n bytes multiplied by the number of different values for M. The time taken to build the ROM depends on the amount of time enforced between calls to RD. After all this, the clone manufacturer must rely on the consumer returning for a refill, since the cost of building the ROM in the first place consumes a single consumable. The clone manufacturer's business in such a situation is consequently in the refills. The time and cost then, depends on the size of R and the number of different values for M that must be incorporated in the lookup. In addition, a custom clone consumable ROM must be built to match each and every System, and a different valid Authentication Chip must be used for each System (in order to provide the full and partially used data). The use of an Authentication Chip in a System must therefore be examined to determine whether or not this kind of attack is worthwhile for a clone manufacturer. As an example, of a camera system that has about 10,000 prints in its lifetime. Assume it has a single Decrement Only value (number of prints remaining), and a delay of 1 second between calls to RD. In such a system, the sparse table will take about 3 hours to build, and consumes 100K. Remember that the construction of the ROM requires the consumption of a valid Authentication Chip, so any money charged must be worth more than a single consumable and the clone consumable combined. Thus it is not cost effective to perform this function for a single consumable (unless the clone consumable somehow contained the equivalent of multiple authentic consumables). If a clone manufacturer is going to go to the trouble of building a custom ROM for each owner of a System, an easier approach would be to update System to completely ignore the Authentication Chip. Consequently, this attack is possible as a per-System attack, and a decision must be made about the chance of this occurring for a given System/Consumable combination. The chance will depend on the cost of the consumable and Authentication Chips, the longevity of the consumable, the profit margin on the consumable, the time taken to generate the ROM, the size of the resultant ROM, and whether customers will come back to the clone manufacturer for refills that use the same clone chip etc. Differential Cryptanalysis Existing differential attacks are heavily dependent on the structure of S boxes, as used in DES and other similar algorithms. Although other algorithms such as HMAC-SHA1 used in Protocol 3 have no S boxes, an attacker can undertake a differential-like attack by undertaking statistical analysis of: Minimal-difference inputs, and their corresponding outputs Minimal-difference outputs, and their corresponding inputs To launch an attack of this nature, sets of input/output pairs must be collected. The collection from Protocol 3 can be via Known Plaintext, or from a Partially Adaptive Chosen Plaintext attack. Obviously the latter, being chosen, will be more useful. Hashing algorithms in general are designed to be resistant to differential analysis. SHA-1 in particular has been specifically strengthened, especially by the 80 word expansion so that minimal differences in input produce will still produce outputs that vary in a larger number of bit positions (compared to 128 bit hash functions). In addition, the information collected is not a direct SHA-1 input/output set, due to the nature of the HMAC algorithm. The HMAC algorithm hashes a known value with an unknown value (the key), and the result of this hash is then rehashed with a separate unknown value. Since the attacker does not know the secret value, nor the result of the first hash, the inputs and outputs from SHA-1 are not known, making any differential attack extremely difficult. The following is a more detailed discussion of minimally different inputs and outputs from the Authentication Chip. Minimal Difference Inputs This is where an attacker takes a set of X, FK[X] values where the X values are minimally different, and examines the statistical differences between the outputs FK[X]. The attack relies on X values that only differ by a minimal number of bits. The question then arises as to how to obtain minimally different X values in order to compare the FK[X] values. K1:With K1, the attacker needs to statistically examine minimally different X, FK1[X] pairs. However the attacker cannot choose any X value and obtain a related FK1[X]value. Since X, FK1[X]pairs can only be generated by calling the RND function on a System Authentication Chip, the attacker must call RND multiple times, recording each observed pair in a table. A search must then be made through the observed values for enough minimally different X values to undertake a statistical analysis of the FK1[X]values. K2:With K2, the attacker needs to statistically examine minimally different X, FK2[X]pairs. The only way of generating X, FK2[X]pairs is via the RD function, which produces FK2[X]for a given Y, FK1[Y] pair, where X=Y|M. This means that Y and the changeable part of M can be chosen to a limited extent by an attacker. The amount of choice must therefore be limited as much as possible. The first way of limiting an attacker's choice is to limit Y, since RD requires an input of the format Y, FK1[Y]. Although a valid pair can be readily obtained from the RND function, it is a pair of RND's choosing. An attacker can only provide their own Y if they have obtained the appropriate pair from RND, or if they know K1. Obtaining the appropriate pair from RND requires a Brute Force search. Knowing K1 is only logically possible by performing cryptanalysis on pairs obtained from the RND function—effectively a known text attack. Although RND can only be called so many times per second, K1 is common across System chips. Therefore known pairs can be generated in parallel. The second way to limit an attacker's choice is to limit M, or at least the attacker's ability to choose M. The limiting of M is done by making some parts of M Read Only, yet different for each Authentication Chip, and other parts of M Decrement Only. The Read Only parts of M should ideally be different for each Authentication Chip, so could be information such as serial numbers, batch numbers, or random numbers. The Decrement Only parts of M mean that for an attacker to try a different M, they can only decrement those parts of M so many times—after the Decrement Only parts of M have been reduced to 0 those parts cannot be changed again. Obtaining a new Authentication chip 53 provides a new M, but the Read Only portions will be different from the previous Authentication Chip's Read Only portions, thus reducing an attacker's ability to choose M even further. Consequently an attacker can only gain a limited number of chances at choosing values for Y and M. Minimal Difference Outputs This is where an attacker takes a set of X, FK[X] values where the FK[X] values are minimally different, and examines the statistical differences between the X values. The attack relies on FK[X] values that only differ by a minimal number of bits. For both K1 and K2, there is no way for an attacker to generate an X value for a given FK[X]. To do so would violate the fact that F is a one-way function. Consequently the only way for an attacker to mount an attack of this nature is to record all observed X, FK[X] pairs in a table. A search must then be made through the observed values for enough minimally different FK [X] values to undertake a statistical analysis of the X values. Given that this requires more work than a minimally different input attack (which is extremely limited due to the restriction on M and the choice of R), this attack is not fruitful. Message Substitution Attacks In order for this kind of attack to be carried out, a clone consumable must contain a real Authentication chip 53, but one that is effectively reusable since it never gets decremented. The clone Authentication Chip would intercept messages, and substitute its own. However this attack does not give success to the attacker. A clone Authentication Chip may choose not to pass on a WR command to the real Authentication Chip. However the subsequent RD command must return the correct response (as if the WR had succeeded). To return the correct response, the hash value must be known for the specific R and M. As described in the Birthday Attack section, an attacker can only determine the hash value by actually updating M in a real Chip, which the attacker does not want to do. Even changing the R sent by System does not help since the System Authentication Chip must match the R during a subsequent TST. A Message substitution attack would therefore be unsuccessful. This is only true if System updates the amount of consumable remaining before it is used. Reverse Engineering the Key Generator If a pseudo-random number generator is used to generate keys, there is the potential for a clone manufacture to obtain the generator program or to deduce the random seed used. This was the way in which the Netscape security program was initially broken. Bypassing Authentication Altogether Protocol 3 requires the System to update the consumable state data before the consumable is used, and follow every write by a read (to authenticate the write). Thus each use of the consumable requires an authentication. If the System adheres to these two simple rules, a clone manufacturer will have to simulate authentication via a method above (such as sparse ROM lookup). Reuse of Authentication Chips As described above, Protocol 3 requires the System to update the consumable state data before the consumable is used, and follow every write by a read (to authenticate the write). Thus each use of the consumable requires an authentication. If a consumable has been used up, then its Authentication Chip will have had the appropriate state-data values decremented to 0. The chip can therefore not be used in another consumable. Note that this only holds true for Authentication Chips that hold Decrement-Only data items. If there is no state data decremented with each usage, there is nothing stopping the reuse of the chip. This is the basic difference between Presence-Only Authentication and Consumable Lifetime Authentication. Protocol 3 allows both. The bottom line is that if a consumable has Decrement Only data items that are used by the System, the Authentication Chip cannot be reused without being completely reprogrammed by a valid Programming Station that has knowledge of the secret key. Management Decision to Omit Authentication to Save Costs Although not strictly an external attack, a decision to omit authentication in future Systems in order to save costs will have widely varying effects on different markets. In the case of high volume consumables, it is essential to remember that it is very difficult to introduce authentication after the market has started, as systems requiring authenticated consumables will not work with older consumables still in circulation. Likewise, it is impractical to discontinue authentication at any stage, as older Systems will not work with the new, unauthenticated, consumables. In he second case, older Systems can be individually altered by replacing the System Authentication Chip by a simple chip that has the same programming interface, but whose TST function always succeeds. Of course the System may be programmed to test for an always-succeeding TST function, and shut down. In the case of a specialized pairing, such as a car/car-keys, or door/door-key, or some other similar situation, the omission of authentication in future systems is trivial and non-repercussive. This is because the consumer is sold the entire set of System and Consumable Authentication Chips at the one time. Garrote/Bribe Attack This form of attack is only successful in one of two circumstances: K1, K2, and R are already recorded by the chip-programmer, or the attacker can coerce future values of K1, K2, and R to be recorded. If humans or computer systems external to the Programming Station do not know the keys, there is no amount of force or bribery that can reveal them. The level of security against this kind of attack is ultimately a decision for the System/Consumable owner, to be made according to the desired level of service. For example, a car company may wish to keep a record of all keys manufactured, so that a person can request a new key to be made for their car. However this allows the potential compromise of the entire key database, allowing an attacker to make keys for any of the manufacturer's existing cars. It does not allow an attacker to make keys for any new cars. Of course, the key database itself may also be encrypted with a further key that requires a certain number of people to combine their key portions together for access. If no record is kept of which key is used in a particular car, there is no way to make additional keys should one become lost. Thus an owner will have to replace his car's Authentication Chip and all his car-keys. This is not necessarily a bad situation. By contrast, in a consumable such as a printer ink cartridge, the one key combination is used for all Systems and all consumables. Certainly if no backup of the keys is kept, there is no human with knowledge of the key, and therefore no attack is possible. However, a no-backup situation is not desirable for a consumable such as ink cartridges, since if the key is lost no more consumables can be made. The manufacturer should therefore keep a backup of the key information in several parts, where a certain number of people must together combine their portions to reveal the full key information. This may be required if case the chip programming station needs to be reloaded. In any case, none of these attacks are against Protocol 3 itself, since no humans are involved in the authentication process. Instead, it is an attack against the programming stage of the chips. HMAC-SHA1 The mechanism for authentication is the HMAC-SHA1 algorithm, acting on one of: HMAC-SHA1 (R, K1), or HMAC-SHA1 (R|M, K2) We will now examine the HMAC-SHA1 algorithm in greater detail than covered so far, and describes an optimization of the algorithm that requires fewer memory resources than the original definition. HMAC The HMAC algorithm proceeds, given the following definitions: H=the hash function (e.g. MD5 or SHA-1) n=number of bits output from H (e.g. 160 for SHA-1, 128 bits for MD5) M=the data to which the MAC function is to be applied K=the secret key shared by the two parties ipad=0x36 repeated 64 times opad =0x5C repeated 64 times The HMAC algorithm is as follows: Extend K to 64 bytes by appending 0x00 bytes to the end of K XOR the 64 byte string created in (1) with ipad Append data stream M to the 64 byte string created in (2) Apply H to the stream generated in (3) XOR the 64 byte string created in (1) with opad Append the H result from (4) to the 64 byte string resulting from (5) Apply H to the output of (6) and output the result Thus: HMAC[M]=H[(K⊕opad)|H[(K⊕ipad)|M]] HMAC-SHA1 algorithm is simply HMAC with H=SHA-1. SHA-1 The SHA1 hashing algorithm is defined in the algorithm as summarized here. Nine 32-bit constants are defined. There are 5 constants used to initialize the chaining variables, and there are 4 additive constants. Initial Chaining Values Additive Constants h1 0x67452301 y1 0x5A827999 h2 0xEFCDAB89 y2 0x6ED9EBA1 h3 0x98BADCFE y3 0x8F1BBCDC h4 0x10325476 y4 0xCA62C1D6 h5 0xC3D2E1F0 Non-optimized SHA-1 requires a total of 2912 bits of data storage: Five 32-bit chaining variables are defined: H1, H2, H3, H4 and H5. Five 32-bit working variables are defined: A, B, C, D, and E. One 32-bit temporary variable is defined: t. Eighty 32-bit temporary registers are defined: X0-79. The following functions are defined for SHA-1: Symbolic Nomenclature Description + Addition modulo 232 X□Y Result of rotating X left through Y bit positions f(X, Y, Z) (X Y) (˜X Z) g(X, Y, Z) (X Y) (X Z) (Y Z) h(X, Y, Z) X ⊕ Y ⊕ Z The hashing algorithm consists of firstly padding the input message to be a multiple of 512 bits and initializing the chaining variables H1-5 with h1-5. The padded message is then processed in 512-bit chunks, with the output hash value being the final 160-bit value given by the concatenation of the chaining variables: H1|H2 |H3|H4|H5. The steps of the SHA-1 algorithm are now examined in greater detail. Step 1. Preprocessing The first step of SHA-1 is to pad the input message to be a multiple of 512 bits as follows and to initialize the chaining variables. Steps to follow to preprocess the input message Pad the Append a 1 bit to the message input Append 0 bits such that the length of the padded message message is 64-bits short of a multiple of 512 bits. Append a 64-bit value containing the length in bits of the original input message. Store the length as most significant bit through to least significant bit. Initialize H1 h1, H2 h2, H3 h3, H4 h4, H5 h5 the chaining variables Step 2. Processing The padded input message can now be processed. We process the message in 512-bit blocks. Each 512-bit block is in the form of 16×32-bit words, referred to as InputWord0-15. Steps to follow for each 512 bit block (InputWord0-15) Copy the 512 input For j = 0 to 15 bits into X0-15 Xj = InputWordj Expand X0-15 into X16-79 For j = 16 to 79 Xj ((Xj-3 ⊕ Xj-8 ⊕ Xj-14 ⊕ Xj-16) 1) Initialize working A H1, B H2, C H3, D H4, variables E H5 Round 1 For j = 0 to 19 t ((A5) + f(B, C, D) + E + Xj + y1) E D, D C, C (B30), B A, A t Round 2 For j = 20 to 39 t = ((A5) + h(B, C, D) + E + Xj + y2) E D, D C, C (B30), B A, A t Round 3 For j = 40 to 59 t ((A5) + g(B, C, D) + E + Xj + y3) E D, D C, C (B30), B A, A t Round 4 For j = 60 to 79 t ((A5) + h(B, C, D) + E + Xj + y4) E D, D C, C (B30), B A, A t Update chaining H1 H1 + A, H2 H2 + B, variables H3 H3 + C, H4 H4 + D, H5 H5 + E Step 3. Completion After all the 512-bit blocks of the padded input message have been processed, the output hash value is the final 160-bit value given by: H1|H2|H3|H4|H5. Optimization for Hardware Implementation The SHA-1 Step 2 procedure is not optimized for hardware. In particular, the 80 temporary 32-bit registers use up valuable silicon on a hardware implementation. This section describes an optimization to the SHA-1 algorithm that only uses 16 temporary registers. The reduction in silicon is from 2560 bits down to 512 bits, a saving of over 2000 bits. It may not be important in some applications, but in the Authentication Chip storage space must be reduced where possible. The optimization is based on the fact that although the original 16-word message block is expanded into an 80-word message block, the 80 words are not updated during the algorithm. In addition, the words rely on the previous 16 words only, and hence the expanded words can be calculated on-the-fly during processing, as long as we keep 16 words for the backward references. We require rotating counters to keep track of which register we are up to using, but the effect is to save a large amount of storage. Rather than index X by a single value j, we use a 5 bit counter to count through the iterations. This can be achieved by initializing a 5-bit register with either 16 or 20, and decrementing it until it reaches 0. In order to update the 16 temporary variables as if they were 80, we require 4 indexes, each a 4-bit register. All 4 indexes increment (with wraparound) during the course of the algorithm. Steps to follow for each 512 bit block (InputWord0-15) Initialize working A H1, B H2, C H3, D H4, variables E H5 N1 13, N2 8, N3 2, N4 0 Round 0 Do 16 times: Copy the 512 input bits XN4 = InputWordN4 into X0-15 [N1, N2, N3]optional N4 Round 1A Do 16 times: t ((A5) + f(B, C, D) + E + XN4 + y1) [N1, N2, N3]optional N4 E D, D C, C (B□30), B A, A t Round 1B Do 4 times: XN4 ((XN1 ⊕ XN2 ⊕ XN3 ⊕ XN4) 1) t ((A5) + f(B, C, D) + E + XN4 + y1) N1, N2, N3, N4 E D, D C, C (B$$30), B A, A t Round 2 Do 20 times: XN4 ((XN1 ⊕ XN2 ⊕ XN3 ⊕ XN4) 1) t ((A5) + h(B, C, D) + E + XN4 + y2) N1, N2, N3, N4 E D, D C, C (B30), B A, A t Round 3 Do 20 times: XN4 ((XN1 ⊕ XN2 ⊕ XN3 ⊕ XN4) 1) t ((A5) + g(B, C, D) + E + XN4 + y3) N1, N2, N3, N4 E D, D C, C (B□30), B A, A t Round 4 Do 20 times: XN4 ((XN1 ⊕ XN2 ⊕ XN3 ⊕ XN4) 1) t ((A5) + h(B, C, D) + E + XN4 + y4) N1, N2, N3, N4 E D, D C, C (B30), B A, A t Update chaining H1 H1 + A, H2 H2 + B, variables H3 H3 + C, H4 H4 + D, H5 H5 + E The incrementing of N1, N2, and N3 during Rounds 0 and 1A is optional. A software implementation would not increment them, since it takes time, and at the end of the 16 times through the loop, all 4 counters will be their original values. Designers of hardware may wish to increment all 4 counters together to save on control logic. Round 0 can be completely omitted if the caller loads the 512 bits of X0-5. HMAC-SHA1 In the Authentication Chip implementation, the HMAC-SHA1 unit only ever performs hashing on two types of inputs: on R using K1 and on R|M using K2. Since the inputs are two constant lengths, rather than have HMAC and SHA-1 as separate entities on chip, they can be combined and the hardware optimized. The padding of messages in SHA-1 Step 1 (a 1 bit, a string of 0 bits, and the length of the message) is necessary to ensure that different messages will not look the same after padding. Since we only deal with 2 types of messages, our padding can be constant 0s. In addition, the optimized version of the SHA-1 algorithm is used, where only 16 32-bit words are used for temporary storage. These 16 registers are loaded directly by the optimized HMAC-SHA1 hardware. The Nine 32-bit constants h1-5 and y1-4 are still required, although the fact that they are constants is an advantage for hardware implementation. Hardware optimized HMAC-SHA-1 requires a total of 1024 bits of data storage: Five 32-bit chaining variables are defined: H1, H2, H3, H4 and H5. Five 32-bit working variables are defined: A, B, C, D, and E. Five 32-bit variables for temporary storage and final result: Buff1601-5 One 32 bit temporary variable is defined: t. Sixteen 32-bit temporary registers are defined: X0-15. The following two sections describe the steps for the two types of calls to HMAC-SHA1. H[R, K1] In the case of producing the keyed hash of R using K1, the original input message R is a constant length of 160 bits. We can therefore take advantage of this fact during processing. Rather than load X0-15 during the first part of the SHA-1 algorithm, we load X0-15 directly, and thereby omit Round 0 of the optimized Process Block (Step 2) of SHA-1. The pseudocode takes on the following steps: Step Description Action 1 Process K ⊕ ipad X0-4 K1 ⊕ 0x363636 . . . 2 X5-15 0x363636 . . . 3 H1-5 h1-5 4 Process Block 5 Process R X0-4 R 6 X5-15 0 7 Process Block 8 Buff1601-5 H1-5 9 Process K ⊕ opad X0-4 K1 ⊕0x5C5C5C . . . 10 X5-15 0x5C5C5C . . . 11 H1-5 h1-5 12 Process Block 13 Process previous H[x] X0-4 Result 14 X5-15 0 15 Process Block 16 Get results Buff1601-5 H1-5 H[R|M, K2] In the case of producing the keyed hash of R|M using K2, the original input message is a constant length of 416(256+160) bits. We can therefore take advantage of this fact during processing. Rather than load X0-15 during the first part of the SHA-1 algorithm, we load X0-15 directly, and thereby omit Round 0 of the optimized Process Block (Step 2) of SHA-1. The pseudocode takes on the following steps: Step Description Action 1 Process K ⊕ ipad X0-4 K2 ⊕ 0x363636 . . . 2 X5-15 0x363636 . . . 3 H1-5 h1-5 4 Process Block 5 Process R | M X0-4 R 6 X5-12 M 7 X13-15 0 8 Process Block 9 Temp H1-5 10 Process K ⊕ opad X0-4 K2 ⊕ 0x5C5C5C . . . 11 X5-15 0x5C5C5C . . . 12 H1-5 h1-5 13 Process Block 14 Process previous H[x] X0-4 Temp 15 X5-15 0 16 Process Block 17 Get results Result H1-5 Data Storage Integrity Each Authentication Chip contains some non-volatile memory in order to hold the variables required by Authentication Protocol 3. The following non-volatile variables are defined: Variable Name Size (in bits) Description M[0 . . . 15] 256 16 words (each 16 bits) containing state data such as serial numbers, media remaining etc. K1 160 Key used to transform R during authentication. K2 160 Key used to transform M during authentication. R 160 Current random number AccessMode[0 . . . 15] 32 The 16 sets of 2-bit AccessMode values for M[n]. MinTicks 32 The minimum number of clock ticks between calls to key-based functions SIWritten 1 If set, the secret key information (K1, K2, and R) has been written to the chip. If clear, the secret information has not been written yet. IsTrusted 1 If set, the RND and TST functions can be called, but RD and WR functions cannot be called. If clear, the RND and TST functions cannot be called, but RD and WR functions can be called. Total bits 802 Note that if these variables are in Flash memory, it is not a simple matter to write a new value to replace the old. The memory must be erased first, and then the appropriate bits set. This has an effect on the algorithms used to change Flash memory based variables. For example, Flash memory cannot easily be used as shift registers. To update a Flash memory variable by a general operation, it is necessary to follow these steps: Read the entire N bit value into a general purpose register; Perform the operation on the general purpose register; Erase the Flash memory corresponding to the variable; and Set the bits of the Flash memory location based on the bits set in the general-purpose register. A RESET of the Authentication Chip has no effect on these non-volatile variables. M and AccessMode Variables M[0] through M[15] are used to hold consumable state data, such as serial numbers, batch numbers, and amount of consumable remaining. Each M[n] register is 16 bits, making the entire M vector 256 bits (32 bytes). Clients cannot read from or written to individual M[n] variables. Instead, the entire vector, referred to as M, is read or written in a single logical access. M can be read using the RD (read) command, and written to via the WR (write) command. The commands only succeed if K1 and K2 are both defined (SIWritten =1) and the Authentication Chip is a consumable non-trusted chip (IsTrusted =0). Although M may contain a number of different data types, they differ only in their write permissions. Each data type can always be read. Once in client memory, the 256 bits can be interpreted in any way chosen by the client. The entire 256 bits of M are read at one time instead of in smaller amounts for reasons of security, as described in the chapter entitled Authentication. The different write permissions are outlined in the following table: Data Type Access Note Read Only Can never be written to ReadWrite Can always be written to Decrement Only Can only be written to if the new value is less than the old value. Decrement Only values are typically 16-bit or 32-bit values, but can be any multiple of 16 bits. To accomplish the protection required for writing, a 2-bit access mode value is defined for each M[n]. The following table defines the interpretation of the 2-bit access mode bit-pattern: Bits Op Interpretation Action taken during Write command 00 RW ReadWrite The new 16-bit value is always written to M[n]. 01 MSR Decrement Only The new 16-bit value is only written to M[n] if it is (Most Significant less than the value currently in M[n]. This is used for Region) access to the Most Significant 16 bits of a Decrement Only number. 10 NMSR Decrement Only The new 16-bit value is only written to M[n] if (Not the Most M[n + 1] can also be written. The NMSR access mode Significant Region) allows multiple precision values of 32 bits and more (multiples of 16 bits) to decrement. 11 RO Read Only The new 16-bit value is ignored. M[n] is left unchanged. The 16 sets of access mode bits for the 16 M[n] registers are gathered together in a single 32-bit AccessMode register. The 32 bits of the AccessMode register correspond to M[n] with n as follows: MSB LSB 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 Each 2-bit value is stored in hi/lo format. Consequently, if M[0-5] were access mode MSR, with M[6-15] access mode RO, the 32-bit AccessMode register would be: 11-11-11-11-11-11-11-11-11-11-01-01-01-01-01-01 During execution of a WR (write) command, AccessMode[n] is examined for each M[n], and a decision made as to whether the new M[n] value will replace the old. The AccessMode register is set using the Authentication Chip's SAM (Set Access Mode) command. Note that the Decrement Only comparison is unsigned, so any Decrement Only values that require negative ranges must be shifted into a positive range. For example, a consumable with a Decrement Only data item range of −50 to 50 must have the range shifted to be 0 to 100. The System must then interpret the range 0 to 100 as being −50 to 50. Note that most instances of Decrement Only ranges are N to 0, so there is no range shift required. For Decrement Only data items, arrange the data in order from most significant to least significant 16-bit quantities from M[n] onward. The access mode for the most significant 16 bits (stored in M[n]) should be set to MSR The remaining registers (M[n+1], M[n+2] etc) should have their access modes set to NMSR. If erroneously set to NMSR, with no associated MSR region, each NMSR region will be considered independently instead of being a multi-precision comparison. K1 K1 is the 160-bit secret key used to transform R during the authentication protocol. K1 is programmed along with K2 and R with the SSI (Set Secret Information) command. Since K1 must be kept secret, clients cannot directly read Ki. The commands that make use of K1 are RND and RD. RND returns a pair R, FK1[R] where R is a random number, while RD requires an X, FK1[X]pair as input. K1 is used in the keyed one-way hash function HMAC-SHA1. As such it should be programmed with a physically generated random number, gathered from a physically random phenomenon. K1 must NOT be generated with a computer-run random number generator. The security of the Authentication chips depends on K1, K2 and R being generated in a way that is not deterministic. For example, to set Ki, a person can toss a fair coin 160 times, recording heads as 1, and tails as 0. K1 is automatically cleared to 0 upon execution of a CLR command. It can only be programmed to a non-zero value by the SSI command. K2 K2 is the 160-bit secret key used to transform M|R during the authentication protocol. K2 is programmed along with K1 and R with the SSI (Set Secret Information) command. Since K2 must be kept secret, clients cannot directly read K2. The commands that make use of K2 are RD and TST. RD returns a pair M, FK2[M X] where X was passed in as one of the parameters to the RD function. TST requires an M, FK2[M|R] pair as input, where R was obtained from the Authentication Chip's RND function. K2 is used in the keyed one-way hash function HMAC-SHA1. As such it should be programmed with a physically generated random number, gathered from a physically random phenomenon. K2 must NOT be generated with a computer-run random number generator. The security of the Authentication chips depends on K1, K2 and R being generated in a way that is not deterministic. For example, to set K2, a person can toss a fair coin 160 times, recording heads as 1, and tails as 0. K2 is automatically cleared to 0 upon execution of a CLR command. It can only be programmed to a non-zero value by the SSI command. R and IsTrusted R is a 160-bit random number seed that is programmed along with K1 and K2 with the SSI (Set Secret Information) command. R does not have to be kept secret, since it is given freely to callers via the RND command. However R must be changed only by the Authentication Chip, and not set to any chosen value by a caller. R is used during the TST command to ensure that the R from the previous call to RND was used to generate the FK2[M|R] value in the non-trusted Authentication Chip (ChipA). Both RND and TST are only used in trusted Authentication Chips (ChipT). IsTrusted is a 1-bit flag register that determines whether or not the Authentication Chip is a trusted chip (ChipT): If the IsTrusted bit is set, the chip is considered to be a trusted chip, and hence clients can call RND and TST functions (but not RD or WR). If the IsTrusted bit is clear, the chip is not considered to be trusted. Therefore RND and TST functions cannot be called (but RD and WR functions can be called instead). System never needs to call RND or TST on the consumable (since a clone chip would simply return 1 to a function such as TST, and a constant value for RND). The IsTrusted bit has the added advantage of reducing the number of available R, FK1[R] pairs obtainable by an attacker, yet still maintain the integrity of the Authentication protocol. To obtain valid R, FK1[R] pairs, an attacker requires a System Authentication Chip, which is more expensive and less readily available than the consumables. Both R and the IsTrusted bit are cleared to 0 by the CLR command. They are both written to by the issuing of the SSI command. The IsTrusted bit can only set by storing a non-zero seed value in R via the SSI command (R must be non-zero to be a valid LFSR state, so this is quite reasonable). R is changed via a 160-bit maximal period LFSR with taps on bits 1, 2, 4, and 159, and is changed only by a successful call to TST (where 1 is returned). Authentication Chips destined to be trusted Chips used in Systems (ChipT) should have their IsTrusted bit set during programming, and Authentication Chips used in Consumables (ChipA) should have their IsTrusted bit kept clear (by storing 0 in R via the SSI command during programming). There is no command to read or write the IsTrusted bit directly. The security of the Authentication Chip does not only rely upon the randomness of K1 and K2 and the strength of the HMAC-SHA1 algorithm. To prevent an attacker from building a sparse lookup table, the security of the Authentication Chip also depends on the range of R over the lifetime of all Systems. What this means is that an attacker must not be able to deduce what values of R there are in produced and future Systems. As such R should be programmed with a physically generated random number, gathered from a physically random phenomenon. R must NOT be generated with a computer-run random number generator. The generation of R must not be deterministic. For example, to generate an R for use in a trusted System chip, a person can toss a fair coin 160 times, recording heads as 1, and tails as 0. 0 is the only non-valid initial value for a trusted R is 0 (or the IsTrusted bit will not be set). SIWritten The SIWritten (Secret Information Written) 1-bit register holds the status of the secret information stored within the Authentication Chip. The secret information is K1, K2 and R. A client cannot directly access the SIWritten bit. Instead, it is cleared via the CLR command (which also clears K1, K2 and R). When the Authentication Chip is programmed with secret keys and random number seed using the SSI command (regardless of the value written), the SIWritten bit is set automatically. Although R is strictly not secret, it must be written together with K1 and K2 to ensure that an attacker cannot generate their own random number seed in order to obtain chosen R, FK1[R] pairs. The SIWritten status bit is used by all functions that access K1, K2, or R. If the SIWritten bit is clear, then calls to RD, WR, RND, and TST are interpreted as calls to CLR. MinTicks There are two mechanisms for preventing an attacker from generating multiple calls to TST and RD functions in a short period of time. The first is a clock limiting hardware component that prevents the internal clock from operating at a speed more than a particular maximum (e.g. 10 MHz). The second mechanism is the 32-bit MinTicks register, which is used to specify the minimum number of clock ticks that must elapse between calls to key-based functions. The MinTicks variable is cleared to 0 via the CLR command. Bits can then be set via the SMT (Set MinTicks) command. The input parameter to SMT contains the bit pattern that represents which bits of MinTicks are to be set. The practical effect is that an attacker can only increase the value in MinTicks (since the SMT function only sets bits). In addition, there is no function provided to allow a caller to read the current value of this register. The value of MinTicks depends on the operating clock speed and the notion of what constitutes a reasonable time between key-based function calls (application specific). The duration of a single tick depends on the operating clock speed. This is the maximum of the input clock speed and the Authentication Chip's clock-limiting hardware. For example, the Authentication Chip's clock-limiting hardware may be set at 10 MHz (it is not changeable), but the input clock is 1 MHz. In this case, the value of 1 tick is based on 1 MHz, not 10 MHz. If the input clock was 20 MHz instead of 1 MHz, the value of 1 tick is based on 10 MHz (since the clock speed is limited to 10 MHz). Once the duration of a tick is known, the MinTicks value can to be set. The value for MinTicks is the minimum number of ticks required to pass between calls to the key-based RD and TST functions. The value is a real-time number, and divided by the length of an operating tick. Suppose the input clock speed matches the maximum clock speed of 10 MHz. If we want a minimum of 1 second between calls to key based functions, the value for MinTicks is set to 10,000,000. Consider an attacker attempting to collect X, FK1[X]pairs by calling RND, RD and TST multiple times. If the MinTicks value is set such that the amount of time between calls to TST is 1 second, then each pair requires 1 second to generate. To generate 225 pairs (only requiring 1.25 GB of storage), an attacker requires more than 1 year. An attack requiring 264 pairs would require 5.84×1011 years using a single chip, or 584 years if 1 billion chips were used, making such an attack completely impractical in terms of time (not to mention the storage requirements!). With regards to K1, it should be noted that the MinTicks variable only slows down an attacker and causes the attack to cost more since it does not stop an attacker using multiple System chips in parallel. However MinTicks does make an attack on K2 more difficult, since each consumable has a different M (part of M is random read-only data). In order to launch a differential attack, minimally different inputs are required, and this can only be achieved with a single consumable (containing an effectively constant part of M). Minimally different inputs require the attacker to use a single chip, and MinTicks causes the use of a single chip to be slowed down. If it takes a year just to get the data to start searching for values to begin a differential attack this increases the cost of attack and reduces the effective market time of a clone consumable. Authentication Chip Commands The System communicates with the Authentication Chips via a simple operation command set. This section details the actual commands and parameters necessary for implementation of Protocol 3. The Authentication Chip is defined here as communicating to System via a serial interface as a minimum implementation. It is a trivial matter to define an equivalent chip that operates over a wider interface (such as 8, 16 or 32 bits). Each command is defined by 3-bit opcode. The interpretation of the opcode can depend on the current value of the IsTrusted bit and the current value of the IsWritten bit. The following operations are defined: Op T W Mn Input Output Description 000 — — CLR — — Clear 001 0 0 SSI [160, 160, 160] — Set Secret Information 010 0 1 RD [160, 160] [256, 160] Read M securely 010 1 1 RND — [160, 160] Random 011 0 1 WR [256] — Write M 011 1 1 TST [256, 160] [1] Test 100 0 1 SAM [32] [32] Set Access Mode 101 — 1 GIT — [1] Get Is Trusted 110 — 1 SMT [32] — Set MinTicks Op = Opcode, T = IsTrusted value, W = IsWritten value, Mn = Mnemonic, [n] = number of bits required for parameter Any command not defined in this table is interpreted as NOP (No Operation). Examples include opcodes 110 and 111 (regardless of IsTrusted or IsWritten values), and any opcode other than SSI when IsWritten=0. Note that the opcodes for RD and RND are the same, as are the opcodes for WR and TST. The actual command run upon receipt of the opcode will depend on the current value of the IsTrusted bit (as long as IsWritten is 1). Where the IsTrusted bit is clear, RD and WR functions will be called. Where the IsTrusted bit is set, RND and TST functions will be called. The two sets of commands are mutually exclusive between trusted and non-trusted Authentication Chips, and the same opcodes enforces this relationship. Each of the commands is examined in detail in the subsequent sections. Note that some algorithms are specifically designed because Flash memory is assumed for the implementation of non-volatile variables. CLR Clear Input None Output None Changes All The CLR (Clear) Command is designed to completely erase the contents of all Authentication Chip memory. This includes all keys and secret information, access mode bits, and state data. After the execution of the CLR command, an Authentication Chip will be in a programmable state, just as if it had been freshly manufactured. It can be reprogrammed with a new key and reused. A CLR command consists of simply the CLR command opcode. Since the Authentication Chip is serial, this must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A CLR command is therefore sent as bits 0-2 of the CLR opcode. A total of 3 bits are transferred. The CLR command can be called directly at any time. The order of erasure is important. SIWritten must be cleared first, to disable further calls to key access functions (such as RND, TST, RD and WR). If the AccessMode bits are cleared before SIWritten, an attacker could remove power at some point after they have been cleared, and manipulate M, thereby have a better chance of retrieving the secret information with a partial chosen text attack. The CLR command is implemented with the following steps: Step Action 1 Erase SIWritten Erase IsTrusted Erase K1 Erase K2 Erase R Erase M 2 Erase AccessMode Erase MinTicks Once the chip has been cleared it is ready for reprogramming and reuse. A blank chip is of no use to an attacker, since although they can create any value for M (M can be read from and written to), key-based functions will not provide any information as K1 and K2 will be incorrect. It is not necessary to consume any input parameter bits if CLR is called for any opcode other than CLR. An attacker will simply have to RESET the chip. The reason for calling CLR is to ensure that all secret information has been destroyed, making the chip useless to an attacker. SSI—Set Secret Information Input: K1, K2, R=[160 bits, 160 bits, 160 bits] Output: None Changes: K1, K2, R, SIWritten, IsTrusted The SSI (Set Secret Information) command is used to load the K1, K2 and R variables, and to set SIWritten and IsTrusted flags for later calls to RND, TST, RD and WR commands. An SSI command consists of the SSI command opcode followed by the secret information to be stored in the K1, K2 and R registers. Since the Authentication Chip is serial, this must be transferred one bit at a time. The bit order is LSB to MSB for each command component. An SSI command is therefore sent as: bits 0-2 of the SSI opcode, followed by bits 0-159 of the new value for K1, bits 0-159 of the new value for K2, and finally bits 0-159 of the seed value for R A total of 483 bits are transferred. The K1, K2, R, SIWritten, and IsTrusted registers are all cleared to 0 with a CLR command. They can only be set using the SSI command. The SSI command uses the flag SIWritten to store the fact that data has been loaded into K1, K2, and R. If the SIWritten and IsTrusted flags are clear (this is the case after a CLR instruction), then K1, K2 and R are loaded with the new values. If either flag is set, an attempted call to SSI results in a CLR command being executed, since only an attacker or an erroneous client would attempt to change keys or the random seed without calling CLR first. The SSI command also sets the IsTrusted flag depending on the value for R. If R=0, then the chip is considered untrustworthy, and therefore IsTrusted remains at 0. If R≠0, then the chip is considered trustworthy, and therefore IsTrusted is set to 1. Note that the setting of the IsTrusted bit only occurs during the SSI command. If an Authentication Chip is to be reused, the CLR command must be called first. The keys can then be safely reprogrammed with an SSI command, and fresh state information loaded into M using the SAM and WR commands. The SSI command is implemented with the following steps: Step Action 1 CLR 2 K1 Read 160 bits from client 3 K2 Read 160 bits from client 4 R Read 160 bits from client 5 IF (R ≠ 0) IsTrusted 1 6 SIWritten 1 RD—Read Input: X, FK1[X]=[160 bits, 160 bits] Output: M, FK2[X|M]=[256 bits, 160 bits] Changes: R The RD (Read) command is used to securely read the entire 256 bits of state data (M) from a non-trusted Authentication Chip. Only a valid Authentication Chip will respond correctly to the RD request. The output bits from the RD command can be fed as the input bits to the TST command on a trusted Authentication Chip for verification, with the first 256 bits (M) stored for later use if (as we hope) TST returns 1. Since the Authentication Chip is serial, the command and input parameters must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A RD command is therefore: bits 0-2 of the RD opcode, followed by bits 0-159 of X, and bits 0-159 of FK1[X]. 323 bits are transferred in total. X and FK1[X]are obtained by calling the trusted Authentication Chip's RND command. The 320 bits output by the trusted chip's RND command can therefore be fed directly into the non-trusted chip's RD command, with no need for these bits to be stored by System. The RD command can only be used when the following conditions have been met: SIWritten = 1 indicating that K1, K2 and R have been set up via the SSI command; and IsTrusted = 0 indicating the chip is not trusted since it is not permitted to generate random number sequences; In addition, calls to RD must wait for the MinTicksRemaining register to reach 0. Once it has done so, the register is reloaded with MinTicks to ensure that a minimum time will elapse between calls to RD. Once MinTicksRemaining has been reloaded with MinTicks, the RD command verifies that the input parameters are valid. This is accomplished by internally generating FK1[X]for the input X, and then comparing the result against the input FK1[X]. This generation and comparison must take the same amount of time regardless of whether the input parameters are correct or not. If the times are not the same, an attacker can gain information about which bits of FK1[X]are incorrect. The only way for the input parameters to be invalid is an erroneous System (passing the wrong bits), a case of the wrong consumable in the wrong System, a bad trusted chip (generating bad pairs), or an attack on the Authentication Chip. A constant value of 0 is returned when the input parameters are wrong. The time taken for 0 to be returned must be the same for all bad inputs so that attackers can learn nothing about what was invalid. Once the input parameters have been verified the output values are calculated. The 256 bit content of M are transferred in the following order: bits 0-15 of M[0], bits 0-15 of M[l], through to bits 0-15 of M[15]. FK2[X|M] is calculated and output as bits 0-159. The R register is used to store the X value during the validation of the X, FK1[X] pair. This is because RND and RD are mutually exclusive. The RD command is implemented with the following steps: Step Action 1 IF (MinTicksRemaining ≠ 0 GOTO 1 2 MinTicksRemaining MinTicks 3 R Read 160 bits from client 4 Hash Calculate FK1[R] 5 OK (Hash = next 160 bits from client) Note that this operation must take constant time so an attacker cannot determine how much of their guess is correct. 6 IF (OK) Output 256 bits of M to client ELSE Output 256 bits of 0 to client 7 Hash Calculate FK2[R | M] 8 IF (OK) Output 160 bits of Hash to client ELSE Output 160 bits of 0 to client RND—Random Input: None Output: R, FK1[R]=[160 bits, 160 bits] Changes: None The RND (Random) command is used by a client to obtain a valid R, FK1[R] pair for use in a subsequent authentication via the RD and TST commands. Since there are no input parameters, an RND command is therefore simply bits 0-2 of the RND opcode. The RND command can only be used when the following conditions have been met: SIWritten = 1 indicating K1 and R have been set up via the SSI command; IsTrusted = 1 indicating the chip is permitted to generate random number sequences; RND returns both R and FK1[R] to the caller. The 288-bit output of the RND command can be fed straight into the non-trusted chip's RD command as the input parameters. There is no need for the client to store them at all, since they are not required again. However the TST command will only succeed if the random number passed into the RD command was obtained first from the RND command. If a caller only calls RND multiple times, the same R, FK1[R] pair will be returned each time. R will only advance to the next random number in the sequence after a successful call to TST. See TST for more information. The RND command is implemented with the following steps: Step Action 1 Output 160 bits of R to client 2 Hash Calculate FK1[R] 3 Output 160 bits of Hash to client TST—Test Input: X, FK2[R|X]=[256 bits, 160 bits] Output: 1 or 0=[1 bit] Changes: M, R and MinTicksRemaining (or all registers if attack detected) The TST (Test) command is used to authenticate a read of M from a non-trusted Authentication Chip. The TST (Test) command consists of the TST command opcode followed by input parameters: X and FK2[R|X]. Since the Authentication Chip is serial, this must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A TST command is therefore: bits 0-2 of the TST opcode, followed by bits 0-255 of M, bits 0-159 of FK2[R|M]. 419 bits are transferred in total. Since the last 416 input bits are obtained as the output bits from a RD command to a non-trusted Authentication Chip, the entire data does not even have to be stored by the client. Instead, the bits can be passed directly to the trusted Authentication Chip's TST command. Only the 256 bits of M should be kept from a RD command. The TST command can only be used when the following conditions have been met: SIWritten = 1 indicating K2 and R have been set up via the SSI command; IsTrusted = 1 indicating the chip is permitted to generate random number sequences; In addition, calls to TST must wait for the MinTicksRemaining register to reach 0. Once it has done so, the register is reloaded with MinTicks to ensure that a minimum time will elapse between calls to TST. TST causes the internal M value to be replaced by the input M value. FK2[M|R] is then calculated, and compared against the 160 bit input hash value. A single output bit is produced: 1 if they are the same, and 0 if they are different. The use of the internal M value is to save space on chip, and is the reason why RD and TST are mutually exclusive commands. If the output bit is 1, R is updated to be the next random number in the sequence. This forces the caller to use a new random number each time RD and TST are called. The resultant output bit is not output until the entire input string has been compared, so that the time to evaluate the comparison in the TST function is always the same. Thus no attacker can compare execution times or number of bits processed before an output is given. The next random number is generated from R using a 160-bit maximal period LFSR (tap selections on bits 159, 4, 2, and 1). The initial 160-bit value for R is set up via the SSI command, and can be any random number except 0 (an LFSR filled with 0s will produce a never-ending stream of 0s). R is transformed by XORing bits 1, 2, 4, and 159 together, and shifting all 160 bits right 1 bit using the XOR result as the input bit to b159. The new R will be returned on the next call to RND. Note that the time taken for 0 to be returned from TST must be the same for all bad inputs so that attackers can learn nothing about what was invalid about the input. The TST command is implemented with the following steps: Step Action 1 IF (MinTicksRemaining ≠ 0 GOTO 1 2 MinTicksRemaining MinTicks 3 M Read 256 bits from client 4 IF (R = 0) GOTO CLR 5 Hash Calculate FK2[R | M] 6 OK (Hash = next 160 bits from client) Note that this operation must take constant time so an attacker cannot determine how much of their guess is correct. 7 IF (OK) Temp R Erase R Advance TEMP via LFSR R TEMP 8 Output 1 bit of OK to client Note that we can't simply advance R directly in Step 7 since R is Flash memory, and must be erased in order for any set bit to become 0. If power is removed from the Authentication Chip during Step 7 after erasing the old value of R, but before the new value for R has been written, then R will be erased but not reprogrammed. We therefore have the situation of IsTrusted=1, yet R=0, a situation only possible due to an attacker. Step 4 detects this event, and takes action if the attack is detected. This problem can be avoided by having a second 160-bit Flash register for R and a Validity Bit, toggled after the new value has been loaded. It has not been included in this implementation for reasons of space, but if chip space allows it, an extra 160-bit Flash register would be useful for this purpose. WR—Write Input: Mnew=[256 bits] Output: None Changes: M A WR (Write) command is used to update the writeable parts of M containing Authentication Chip state data. The WR command by itself is not secure. It must be followed by an authenticated read of M (via a RD command) to ensure that the change was made as specified. The WR command is called by passing the WR command opcode followed by the new 256 bits of data to be written to M. Since the Authentication Chip is serial, the new value for M must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A WR command is therefore: bits 0-2 of the WR opcode, followed by bits 0-15 of M[0], bits 0-15 of M[1], through to bits 0-15 of M[15]. 259 bits are transferred in total. The WR command can only be used when SIWritten=1, indicating that K1, K2 and R have been set up via the SSI command (if SIWritten is 0, then K1, K2 and R have not been setup yet, and the CLR command is called instead). The ability to write to a specific M[n] is governed by the corresponding Access Mode bits as stored in the AccessMode register. The AccessMode bits can be set using the SAM command. When writing the new value to M[n] the fact that M[n] is Flash memory must be taken into account. All the bits of M[n] must be erased, and then the appropriate bits set. Since these two steps occur on different cycles, it leaves the possibility of attack open. An attacker can remove power after erasure, but before programming with the new value. However, there is no advantage to an attacker in doing this: A Read/Write M[n] changed to 0 by this means is of no advantage since the attacker could have written any value using the WR command anyway. A Read Only M[n] changed to 0 by this means allows an additional known text pair (where the M[n] is 0 instead of the original value). For future use M[n] values, they are already 0, so no information is given. A Decrement Only M[n] changed to 0 simply speeds up the time in which the consumable is used up. It does not give any new information to an attacker that using the consumable would give. The WR command is implemented with the following steps: Step Action 1 DecEncountered 0 EqEncountered 0 n 15 2 Temp Read 16 bits from client 3 AM = AccessMode[˜n] Compare to the previous value 5 LT (Temp < M[˜n]) [comparison is unsigned] EQ (Temp = M[˜n]) 6 WE (AM = RW) ((AM = MSR) LT) ((AM = NMSR) (DecEncountered LT)) 7 DecEncountered ((AM = MSR) LT) ((AM = NMSR) DecEncountered) ((AM = NMSR) EqEncountered LT) EqEncountered ((AM = MSR) EQ) ((AM = NMSR) EqEncountered EQ) Advance to the next Access Mode set and write the new M[˜n] if applicable 8 IF (WE) Erase M[˜n] M[˜n] Temp 10 n 11 IF (n ≠ 0) GOTO 2 SAM—Set AccessMode Input: AccessModenew=[32 bits] Output: AccessMode=[32 bits] Changes: AccessMode The SAM (Set Access Mode) command is used to set the 32 bits of the AccessMode register, and is only available for use in consumable Authentication Chips (where the IsTrusted flag =0). The SAM command is called by passing the SAM command opcode followed by a 32-bit value that is used to set bits in the AccessMode register. Since the Authentication Chip is serial, the data must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A SAM command is therefore: bits 0-2 of the SAM opcode, followed by bits 0-31 of bits to be set in AccessMode. 35 bits are transferred in total. The AccessMode register is only cleared to 0 upon execution of a CLR command. Since an access mode of 00 indicates an access mode of RW (read/write), not setting any AccessMode bits after a CLR means that all of M can be read from and written to. The SAM command only sets bits in the AccessMode register. Consequently a client can change the access mode bits for M[n] from RW to RO (read only) by setting the appropriate bits in a 32-bit word, and calling SAM with that 32-bit value as the input parameter. This allows the programming of the access mode bits at different times, perhaps at different stages of the manufacturing process. For example, the read only random data can be written to during the initial key programming stage, while allowing a second programming stage for items such as consumable serial numbers. Since the SAM command only sets bits, the effect is to allow the access mode bits corresponding to M[n] to progress from RW to either MSR, NMSR, or RO. It should be noted that an access mode of MSR can be changed to RO, but this would not help an attacker, since the authentication of M after a write to a doctored Authentication Chip would detect that the write was not successful and hence abort the operation. The setting of bits corresponds to the way that Flash memory works best. The only way to clear bits in the AccessMode register, for example to change a Decrement Only M[n] to be Read/Write, is to use the CLR command. The CLR command not only erases (clears) the AccessMode register, but also clears the keys and all of M. Thus the AccessMode[n] bits corresponding to M[n] can only usefully be changed once between CLR commands. The SAM command returns the new value of the AccessMode register (after the appropriate bits have been set due to the input parameter). By calling SAM with an input parameter of 0, AccessMode will not be changed, and therefore the current value of AccessMode will be returned to the caller. The SAM command is implemented with the following steps: Step Action 1 Temp Read 32 bits from client 2 SetBits(AccessMode, Temp) 3 Output 32 bits of AccessMode to client GIT—Get is Trusted Input: None Output: IsTrusted=[1 bit] Changes: None The GIT (Get Is Trusted) command is used to read the current value of the IsTrusted bit on the Authentication Chip. If the bit returned is 1, the Authentication Chip is a trusted System Authentication Chip. If the bit returned is 0, the Authentication Chip is a consumable Authentication Chip. A GIT command consists of simply the GIT command opcode. Since the Authentication Chip is serial, this must be transferred one bit at a time. The bit order is LSB to MSB for each command component. A GIT command is therefore sent as bits 0-2 of the GIT opcode. A total of 3 bits are transferred. The GIT command is implemented with the following steps: Step Action 1 Output IsTrusted bit to client SMT—SET MinTicks Input: MinTicksnew=[32 bits] Output: None Changes: MinTicks The SMT (Set MinTicks) command is used to set bits in the MinTicks register and hence define the minimum number of ticks that must pass in between calls to TST and RD. The SMT command is called by passing the SMT command opcode followed by a 32-bit value that is used to set bits in the MinTicks register. Since the Authentication Chip is serial, the data must be transferred one bit at a time. The bit order is LSB to MSB for each command component. An SMT command is therefore: bits 0-2 of the SMT opcode, followed by bits 0-31 of bits to be set in MinTicks. 35 bits are transferred in total. The MinTicks register is only cleared to 0 upon execution of a CLR command. A value of 0 indicates that no ticks need to pass between calls to key-based functions. The functions may therefore be called as frequently as the clock speed limiting hardware allows the chip to run. Since the SMT command only sets bits, the effect is to allow a client to set a value, and only increase the time delay if further calls are made. Setting a bit that is already set has no effect, and setting a bit that is clear only serves to slow the chip down further. The setting of bits corresponds to the way that Flash memory works best. The only way to clear bits in the MinTicks register, for example to change a value of 10 ticks to a value of 4 ticks, is to use the CLR command. However the CLR command clears the MinTicks register to 0 as well as clearing all keys and M. It is therefore useless for an attacker. Thus the MinTicks register can only usefully be changed once between CLR commands. The SMT command is implemented with the following steps: Step Action 1 Temp Read 32 bits from client 2 SetBits(MinTicks, Temp) Programming Authentication Chips Authentication Chips must be programmed with logically secure information in a physically secure environment. Consequently the programming procedures cover both logical and physical security. Logical security is the process of ensuring that K1, K2, R, and the random M[n] values are generated by a physically random process, and not by a computer. It is also the process of ensuring that the order in which parts of the chip are programmed is the most logically secure. Physical security is the process of ensuring that the programming station is physically secure, so that K1 and K2 remain secret, both during the key generation stage and during the lifetime of the storage of the keys. In addition, the programming station must be resistant to physical attempts to obtain or destroy the keys. The Authentication Chip has its own security mechanisms for ensuring that K1 and K2 are kept secret, but the Programming Station must also keep K1 and K2 safe. Overview After manufacture, an Authentication Chip must be programmed before it can be used. In all chips values for K1 and K2 must be established. If the chip is destined to be a System Authentication Chip, the initial value for R must be determined. If the chip is destined to be a consumable Authentication Chip, R must be set to 0, and initial values for M and AccessMode must be set up. The following stages are therefore identified: Determine Interaction between Systems and Consumables Determine Keys for Systems and Consumables Determine MinTicks for Systems and Consumables Program Keys, Random Seed, MinTicks and Unused M Program State Data and Access Modes Once the consumable or system is no longer required, the attached Authentication Chip can be reused. This is easily accomplished by reprogrammed the chip starting at Stage 4 again. Each of the stages is examined in the subsequent sections. Stage 0: Manufacture The manufacture of Authentication Chips does not require any special security. There is no secret information programmed into the chips at manufacturing stage. The algorithms and chip process is not special. Standard Flash processes are used. A theft of Authentication Chips between the chip manufacturer and programming station would only provide the clone manufacturer with blank chips. This merely compromises the sale of Authentication chips, not anything authenticated by Authentication Chips. Since the programming station is the only mechanism with consumable and system product keys, a clone manufacturer would not be able to program the chips with the correct key. Clone manufacturers would be able to program the blank chips for their own systems and consumables, but it would be difficult to place these items on the market without detection. In addition, a single theft would be difficult to base a business around. Stage 1: Determine Interaction Between Systems and Consumables The decision of what is a System and what is a Consumable needs to be determined before any Authentication Chips can be programmed. A decision needs to be made about which Consumables can be used in which Systems, since all connected Systems and Consumables must share the same key information. They also need to share state-data usage mechanisms even if some of the interpretations of that data have not yet been determined. A simple example is that of a car and car-keys. The car itself is the System, and the car-keys are the consumables. There are several car-keys for each car, each containing the same key information as the specific car. However each car (System) would contain a different key (shared by its car-keys), since we don't want car-keys from one car working in another. Another example is that of a photocopier that requires a particular toner cartridge. In simple terms the photocopier is the System, and the toner cartridge is the consumable. However the decision must be made as to what compatibility there is to be between cartridges and photocopiers. The decision has historically been made in terms of the physical packaging of the toner cartridge: certain cartridges will or won't fit in a new model photocopier based on the design decisions for that copier. When Authentication Chips are used, the components that must work together must share the same key information. In addition, each type of consumable requires a different way of dividing M (the state data). Although the way in which M is used will vary from application to application, the method of allocating M[n] and AccessMode[n] will be the same: Define the consumable state data for specific use Set some M[n] registers aside for future use (if required). Set these to be 0 and Read Only. The value can be tested for in Systems to maintain compatibility. Set the remaining M[n] registers (at least one, but it does not have to be M[15]) to be Read Only, with the contents of each M[n] completely random. This is to make it more difficult for a clone manufacturer to attack the authentication keys. The following examples show ways in which the state data may be organized. EXAMPLE 1 Suppose we have a car with associated car-keys. A 16-bit key number is more than enough to uniquely identify each car-key for a given car. The 256 bits of M could be divided up as follows: M[n] Access Description 0 RO Key number (16 bits) 1-4 RO Car engine number (64 bits) 5-8 RO For future expansion = 0 (64 bits) 8-15 RO Random bit data (128 bits) If the car manufacturer keeps all logical keys for all cars, it is a trivial matter to manufacture a new physical car-key for a given car should one be lost. The new car-key would contain a new Key Number in M[0], but have the same K1 and K2 as the car's Authentication Chip. Car Systems could allow specific key numbers to be invalidated (for example if a key is lost). Such a system might require Key 0 (the master key) to be inserted first, then all valid keys, then Key 0 again. Only those valid keys would now work with the car. In the worst case, for example if all car-keys are lost, then a new set of logical keys could be generated for the car and its associated physical car-keys if desired. The Car engine number would be used to tie the key to the particular car. Future use data may include such things as rental information, such as driver/renter details. EXAMPLE 2 Suppose we have a photocopier image unit which should be replaced every 100,000 copies. 32 bits are required to store the number of pages remaining. The 256 bits of M could be divided up as follows: M[n] Access Description 0 RO Serial number (16 bits) 1 RO Batch number (16 bits) 2 MSR Page Count Remaining (32 bits, hi/lo) 3 NMSR 4-7 RO For future expansion = 0 (64 bits) 8-15 RO Random bit data (128 bits) If a lower quality image unit is made that must be replaced after only 10,000 copies, the 32-bit page count can still be used for compatibility with existing photocopiers. This allows several consumable types to be used with the same system. EXAMPLE 3 Consider a Polaroid camera consumable containing 25 photos. A 16-bit countdown is all that is required to store the number of photos remaining. The 256 bits of M could be divided up as follows: M[n] Access Description 0 RO Serial number (16 bits) 1 RO Batch number (16 bits) 2 MSR Photos Remaining (16 bits) 3-6 RO For future expansion = 0 (64 bits) 7-15 RO Random bit data (144 bits) The Photos Remaining value at M[2] allows a number of consumable types to be built for use with the same camera System. For example, a new consumable with 36 photos is trivial to program. Suppose 2 years after the introduction of the camera, a new type of camera was introduced. It is able to use the old consumable, but also can process a new film type. M[3] can be used to define Film Type. Old film types would be 0, and the new film types would be some new value. New Systems can take advantage of this. Original systems would detect a non-zero value at M[3] and realize incompatibility with new film types. New Systems would understand the value of M[3] and so react appropriately. To maintain compatibility with the old consumable, the new consumable and System needs to have the same key information as the old one. To make a clean break with a new System and its own special consumables, a new key set would be required. EXAMPLE 4 Consider a printer consumable containing 3 inks: cyan, magenta, and yellow. Each ink amount can be decremented separately. The 256 bits of M could be divided up as follows: M[n] Access Description 0 RO Serial number (16 bits) 1 RO Batch number (16 bits) 2 MSR Cyan Remaining (32 bits, hi/lo) 3 NMSR 4 MSR Magenta Remaining (32 bits, hi/lo) 5 NMSR 6 MSR Yellow Remaining (32 bits, hi/lo) 7 NMSR 8-11 RO For future expansion = 0 (64 bits) 12-15 RO Random bit data (64 bits) Stage 2: Determine Keys for Systems and Consumables Once the decision has been made as to which Systems and consumables are to share the same keys, those keys must be defined. The values for K1 and K2 must therefore be determined. In most cases, K1 and K2 will be generated once for all time. All Systems and consumables that have to work together (both now and in the future) need to have the same K1 and K2 values. K1 and K2 must therefore be kept secret since the entire security mechanism for the System/Consumable combination is made void if the keys are compromised. If the keys are compromised, the damage depends on the number of systems and consumables, and the ease to which they can be reprogrammed with new non-compromised keys: In the case of a photocopier with toner cartridges, the worst case is that a clone manufacturer could then manufacture their own Authentication Chips (or worse, buy them), program the chips with the known keys, and then insert them into their own consumables. In the case of a car with car-keys, each car has a different set of keys. This leads to two possible general scenarios. The first is that after the car and car-keys are programmed with the keys, K1 and K2 are deleted so no record of their values are kept, meaning that there is no way to compromise K1 and K2. However no more car-keys can be made for that car without reprogramming the car's Authentication Chip. The second scenario is that the car manufacturer keeps K1 and K2, and new keys can be made for the car. A compromise of K1 and K2 means that someone could make a car-key specifically for a particular car. The keys and random data used in the Authentication Chips must therefore be generated by a means that is non-deterministic (a completely computer generated pseudo-random number cannot be used because it is deterministic—knowledge of the generator's seed gives all future numbers). K1 and K2 should be generated by a physically random process, and not by a computer. However, random bit generators based on natural sources of randomness are subject to influence by external factors and also to malfunction. It is imperative that such devices be tested periodically for statistical randomness. A simple yet useful source of random numbers is the Lavarand® system from SGI. This generator uses a digital camera to photograph six lava lamps every few minutes. Lava lamps contain chaotic turbulent systems. The resultant digital images are fed into an SHA-1 implementation that produces a 7-way hash, resulting in a 160-bit value from every 7th bye from the digitized image. These 7 sets of 160 bits total 140 bytes. The 140 byte value is fed into a BBS generator to position the start of the output bitstream. The output 160 bits from the BBS would be the key or the Authentication chip 53. An extreme example of a non-deterministic random process is someone flipping a coin 160 times for K1, and 160 times for K2 in a clean room. With each head or tail, a 1 or 0 is entered on a panel of a Key Programmer Device. The process must be undertaken with several observers (for verification) in silence (someone may have a hidden microphone). The point to be made is that secure data entry and storage is not as simple as it sounds. The physical security of the Key Programmer Device and accompanying Programming Station requires an entire document of its own. Once keys K1 and K2 have been determined, they must be kept for as long as Authentication Chips need to be made that use the key. In the first car/car-key scenario K1 and K2 are destroyed after a single System chip and a few consumable chips have been programmed. In the case of the photocopier/toner cartridge, K1 and K2 must be retained for as long as the toner-cartridges are being made for the photocopiers. The keys must be kept securely. Stage 3: Determine MinTicks for Systems and Consumables The value of MinTicks depends on the operating clock speed of the Authentication Chip (System specific) and the notion of what constitutes a reasonable time between RD or TST function calls (application specific). The duration of a single tick depends on the operating clock speed. This is the maximum of the input clock speed and the Authentication Chip's clock-limiting hardware. For example, the Authentication Chip's clock-limiting hardware may be set at 10 MHz (it is not changeable), but the input clock is 1 MHz. In this case, the value of 1 tick is based on 1 MHz, not 10 MHz. If the input clock was 20 MHz instead of 1 MHz, the value of 1 tick is based on 10 MHz (since the clock speed is limited to 10 MHz). Once the duration of a tick is known, the MinTicks value can be set. The value for MinTicks is the minimum number of ticks required to pass between calls to RD or RND key-based functions. Suppose the input clock speed matches the maximum clock speed of 10 MHz. If we want a minimum of 1 second between calls to TST, the value for MinTicks is set to 10,000,000. Even a value such as 2 seconds might be a completely reasonable value for a System such as a printer (one authentication per page, and one page produced every 2 or 3 seconds). Stage 4: Program Keys, Random Seed, MinTicks and Unused M Authentication Chips are in an unknown state after manufacture. Alternatively, they have already been used in one consumable, and must be reprogrammed for use in another. Each Authentication Chip must be cleared and programmed with new keys and new state data. Clearing and subsequent programming of Authentication Chips must take place in a secure Programming Station environment. Programming a Trusted System Authentication Chip If the chip is to be a trusted System chip, a seed value for R must be generated. It must be a random number derived from a physically random process, and must not be 0. The following tasks must be undertaken, in the following order, and in a secure programming environment: RESET the chip CLR[ ] Load R (160 bit register) with physically random data SSI[K1, K2, R] SMT[MinTicksSystem] The Authentication Chip is now ready for insertion into a System. It has been completely programmed. If the System Authentication Chips are stolen at this point, a clone manufacturer could use them to generate R, FK1[R] pairs in order to launch a known text attack on K1, or to use for launching a partially chosen-text attack on K2. This is no different to the purchase of a number of Systems, each containing a trusted Authentication Chip. The security relies on the strength of the Authentication protocols and the randomness of K1 and K2. Programming a Non-Trusted Consumable Authentication Chip If the chip is to be a non-trusted Consumable Authentication Chip, the programming is slightly different to that of the trusted System Authentication Chip. Firstly, the seed value for R must be 0. It must have additional programming for M and the AccessMode values. The future use M[n] must be programmed with 0, and the random M[n] must be programmed with random data. The following tasks must be undertaken, in the following order, and in a secure programming environment: RESET the chip CLR[ ] Load R (160 bit register) with 0 SSI[K1, K2, R] Load X (256 bit register) with 0 Set bits in X corresponding to appropriate M[n] with physically random data WR[X] Load Y (32 bit register) with 0 Set bits in Y corresponding to appropriate M[n] with Read Only Access Modes SAM[Y] SMT[MinTicksConsumable] The non-trusted consumable chip is now ready to be programmed with the general state data. If the Authentication Chips are stolen at this point, an attacker could perform a limited chosen text attack. In the best situation, parts of M are Read Only (0 and random data), with the remainder of M completely chosen by an attacker (via the WR command). A number of RD calls by an attacker obtains FK2[M|R] for a limited M. In the worst situation, M can be completely chosen by an attacker (since all 256 bits are used for state data). In both cases however, the attacker cannot choose any value for R since it is supplied by calls to RND from a System Authentication Chip. The only way to obtain a chosen R is by a Brute Force attack. It should be noted that if Stages 4 and 5 are carried out on the same Programming Station (the preferred and ideal situation), Authentication Chips cannot be removed in between the stages. Hence there is no possibility of the Authentication Chips being stolen at this point. The decision to program the Authentication Chips at one or two times depends on the requirements of the System/Consumable manufacturer. Stage 5: Program State Data and Access Modes This stage is only required for consumable Authentication Chips, since M and AccessMode registers cannot be altered on System Authentication Chips. The future use and random values of M[n] have already been programmed in Stage 4. The remaining state data values need to be programmed and the associated Access Mode values need to be set. Bear in mind that the speed of this stage will be limited by the value stored in the MinTicks register. This stage is separated from Stage 4 on account of the differences either in physical location or in time between where/when Stage 4 is performed, and where/when Stage 5 is performed. Ideally, Stages 4 and 5 are performed at the same time in the same Programming Station. Stage 4 produces valid Authentication Chips, but does not load them with initial state values (other than 0). This is to allow the programming of the chips to coincide with production line runs of consumables. Although Stage 5 can be run multiple times, each time setting a different state data value and Access Mode value, it is more likely to be run a single time, setting all the remaining state data values and setting all the remaining Access Mode values. For example, a production line can be set up where the batch number and serial number of the Authentication Chip is produced according to the physical consumable being produced. This is much harder to match if the state data is loaded at a physically different factory. The Stage 5 process involves first checking to ensure the chip is a valid consumable chip, which includes a RD to gather the data from the Authentication Chip, followed by a WR of the initial data values, and then a SAM to permanently set the new data values. The steps are outlined here: IsTrusted=GIT[ ] If (IsTrusted), exit with error (wrong kind of chip!) Call RND on a valid System chip to get a valid input pair Call RD on chip to be programmed, passing in valid input pair Load X (256 bit register) with results from a RD of Authentication Chip Call TST on valid System chip to ensure X and consumable chip are valid If (TST returns 0), exit with error (wrong consumable chip for system) Set bits of X to initial state values WR[X] Load Y (32 bit register) with 0 Set bits of Y corresponding to Access Modes for new state values SAM[Y] Of course the validation (Steps 1 to 7) does not have to occur if Stage 4 and 5 follow on from one another on the same Programming Station. But it should occur in all other situations where Stage 5 is run as a separate programming process from Stage 4. If these Authentication Chips are now stolen, they are already programmed for use in a particular consumable. An attacker could place the stolen chips into a clone consumable. Such a theft would limit the number of cloned products to the number of chips stolen. A single theft should not create a supply constant enough to provide clone manufacturers with a cost-effective business. The alternative use for the chips is to save the attacker from purchasing the same number of consumables, each with an Authentication Chip, in order to launch a partially chosen text attack or brute force attack. There is no special security breach of the keys if such an attack were to occur. Manufacture The circuitry of the Authentication Chip must be resistant to physical attack. A summary of manufacturing implementation guidelines is presented, followed by specification of the chip's physical defenses (ordered by attack). Guidelines for Manufacturing The following are general guidelines for implementation of an Authentication Chip in terms of manufacture: Standard process Minimum size (if possible) Clock Filter Noise Generator Tamper Prevention and Detection circuitry Protected memory with tamper detection Boot circuitry for loading program code Special implementation of FETs for key data paths Data connections in polysilicon layers where possible OverUnderPower Detection Unit No test circuitry Standard Process The Authentication Chip should be implemented with a standard manufacturing process (such as Flash). This is necessary to: Allow a great range of manufacturing location options Take advantage of well-defined and well-known technology Reduce cost Note that the standard process still allows physical protection mechanisms. Minimum Size The Authentication chip 53 must have a low manufacturing cost in order to be included as the authentication mechanism for low cost consumables. It is therefore desirable to keep the chip size as low as reasonably possible. Each Authentication Chip requires 802 bits of non-volatile memory. In addition, the storage required for optimized HMAC-SHA1 is 1024 bits. The remainder of the chip (state machine, processor, CPU or whatever is chosen to implement Protocol 3) must be kept to a minimum in order that the number of transistors is minimized and thus the cost per chip is minimized. The circuit areas that process the secret key information or could reveal information about the key should also be minimized (see Non-Flashing CMOS below for special data paths). Clock Filter The Authentication Chip circuitry is designed to operate within a specific clock speed range. Since the user directly supplies the clock signal, it is possible for an attacker to attempt to introduce race-conditions in the circuitry at specific times during processing. An example of this is where a high clock speed (higher than the circuitry is designed for) may prevent an XOR from working properly, and of the two inputs, the first may always be returned. These styles of transient fault attacks can be very efficient at recovering secret key information. The lesson to be learned from this is that the input clock signal cannot be trusted. Since the input clock signal cannot be trusted, it must be limited to operate up to a maximum frequency. This can be achieved a number of ways. One way to filter the clock signal is to use an edge detect unit passing the edge on to a delay, which in turn enables the input clock signal to pass through. FIG. 174 shows clock signal flow within the Clock Filter. The delay should be set so that the maximum clock speed is a particular frequency (e.g. about 4 MHz). Note that this delay is not programmable—it is fixed. The filtered clock signal would be further divided internally as required. Noise Generator Each Authentication Chip should contain a noise generator that generates continuous circuit noise. The noise will interfere with other electromagnetic emissions from the chip's regular activities and add noise to the Idd signal. Placement of the noise generator is not an issue on an Authentication Chip due to the length of the emission wavelengths. The noise generator is used to generate electronic noise, multiple state changes each clock cycle, and as a source of pseudo-random bits for the Tamper Prevention and Detection circuitry. A simple implementation of a noise generator is a 64-bit LFSR seeded with a non-zero number. The clock used for the noise generator should be running at the maximum clock rate for the chip in order to generate as much noise as possible. Tamper Prevention and Detection Circuitry A set of circuits is required to test for and prevent physical attacks on the Authentication Chip. However what is actually detected as an attack may not be an intentional physical attack. It is therefore important to distinguish between these two types of attacks in an Authentication Chip: where you can be certain that a physical attack has occurred. where you cannot be certain that a physical attack has occurred. The two types of detection differ in what is performed as a result of the detection. In the first case, where the circuitry can be certain that a true physical attack has occurred, erasure of Flash memory key information is a sensible action. In the second case, where the circuitry cannot be sure if an attack has occurred, there is still certainly something wrong. Action must be taken, but the action should not be the erasure of secret key information. A suitable action to take in the second case is a chip RESET. If what was detected was an attack that has permanently damaged the chip, the same conditions will occur next time and the chip will RESET again. If, on the other hand, what was detected was part of the normal operating environment of the chip, a RESET will not harm the key. A good example of an event that circuitry cannot have knowledge about, is a power glitch. The glitch may be an intentional attack, attempting to reveal information about the key. It may, however, be the result of a faulty connection, or simply the start of a power-down sequence. It is therefore best to only RESET the chip, and not erase the key. If the chip was powering down, nothing is lost. If the System is faulty, repeated RESETs will cause the consumer to get the System repaired. In both cases the consumable is still intact. A good example of an event that circuitry can have knowledge about, is the cutting of a data line within the chip. If this attack is somehow detected, it could only be a result of a faulty chip (manufacturing defect) or an attack. In either case, the erasure of the secret information is a sensible step to take. Consequently each Authentication Chip should have 2 Tamper Detection Lines as illustrated in Fig.—one for definite attacks, and one for possible attacks. Connected to these Tamper Detection Lines would be a number of Tamper Detection test units, each testing for different forms of tampering. In addition, we want to ensure that the Tamper Detection Lines and Circuits themselves cannot also be tampered with. At one end of the Tamper Detection Line is a source of pseudo-random bits (clocking at high speed compared to the general operating circuitry). The Noise Generator circuit described above is an adequate source. The generated bits pass through two different paths—one carries the original data, and the other carries the inverse of the data. The wires carrying these bits are in the layer above the general chip circuitry (for example, the memory, the key manipulation circuitry etc). The wires must also cover the random bit generator. The bits are recombined at a number of places via an XOR gate. If the bits are different (they should be), a 1 is output, and used by the particular unit (for example, each output bit from a memory read should be ANDed with this bit value). The lines finally come together at the Flash memory Erase circuit, where a complete erasure is triggered by a 0 from the XOR. Attached to the line is a number of triggers, each detecting a physical attack on the chip. Each trigger has an oversize NMOS transistor attached to GND. The Tamper Detection Line physically goes through this nMOS transistor. If the test fails, the trigger causes the Tamper Detect Line to become 0. The XOR test will therefore fail on either this clock cycle or the next one (on average), thus RESETing or erasing the chip. FIG. 175 illustrates the basic principle of a Tamper Detection Line in terms of tests and the XOR connected to either the Erase or RESET circuitry. The Tamper Detection Line must go through the drain of an output transistor for each test, as illustrated by the oversize nMOS transistor layout of FIG. 176. It is not possible to break the Tamper Detect Line since this would stop the flow of 1s and 0s from the random source. The XOR tests would therefore fail. As the Tamper Detect Line physically passes through each test, it is not possible to eliminate any particular test without breaking the Tamper Detect Line. It is important that the XORs take values from a variety of places along the Tamper Detect Lines in order to reduce the chances of an attack. FIG. 177 illustrates the taking of multiple XORs from the Tamper Detect Line to be used in the different parts of the chip. Each of these XORs can be considered to be generating a ChipOK bit that can be used within each unit or sub-unit. A sample usage would be to have an OK bit in each unit that is ANDed with a given ChipOK bit each cycle. The OK bit is loaded with 1 on a RESET. If OK is 0, that unit will fail until the next RESET. If the Tamper Detect Line is functioning correctly, the chip will either RESET or erase all key information. If the RESET or erase circuitry has been destroyed, then this unit will not function, thus thwarting an attacker. The destination of the RESET and Erase line and associated circuitry is very context sensitive. It needs to be protected in much the same way as the individual tamper tests. There is no point generating a RESET pulse if the attacker can simply cut the wire leading to the RESET circuitry. The actual implementation will depend very much on what is to be cleared at RESET, and how those items are cleared. Finally, FIG. 178 shows how the Tamper Lines cover the noise generator circuitry of the chip. The generator and NOT gate are on one level, while the Tamper Detect Lines run on a level above the generator. Protected Memory with Tamper Detection It is not enough to simply store secret information or program code in Flash memory. The Flash memory and RAM must be protected from an attacker who would attempt to modify (or set) a particular bit of program code or key information. The mechanism used must conform to being used in the Tamper Detection Circuitry (described above). The first part of the solution is to ensure that the Tamper Detection Line passes directly above each Flash or RAM bit. This ensures that an attacker cannot probe the contents of Flash or RAM. A breach of the covering wire is a break in the Tamper Detection Line. The breach causes the Erase signal to be set, thus deleting any contents of the memory. The high frequency noise on the Tamper Detection Line also obscures passive observation. The second part of the solution for Flash is to use multi-level data storage, but only to use a subset of those multiple levels for valid bit representations. Normally, when multi-level Flash storage is used, a single floating gate holds more than one bit. For example, a 4-voltage-state transistor can represent two bits. Assuming a minimum and maximum voltage representing 00 and 11 respectively, the two middle voltages represent 01 and 10. In the Authentication Chip, we can use the two middle voltages to represent a single bit, and consider the two extremes to be invalid states. If an attacker attempts to force the state of a bit one way or the other by closing or cutting the gate's circuit, an invalid voltage (and hence invalid state) results. The second part of the solution for RAM is to use a parity bit. The data part of the register can be checked against the parity bit (which will not match after an attack). The bits coming from Flash and RAM can therefore be validated by a number of test units (one per bit) connected to the common Tamper Detection Line. The Tamper Detection circuitry would be the first circuitry the data passes through (thus stopping an attacker from cutting the data lines). Boot Circuitry for Loading Program Code Program code should be kept in multi-level Flash instead of ROM, since ROM is subject to being altered in a non-testable way. A boot mechanism is therefore required to load the program code into Flash memory (Flash memory is in an indeterminate state after manufacture). The boot circuitry must not be in ROM—a small state-machine would suffice. Otherwise the boot code could be modified in an undetectable way. The boot circuitry must erase all Flash memory, check to ensure the erasure worked, and then load the program code. Flash memory must be erased before loading the program code. Otherwise an attacker could put the chip into the boot state, and then load program code that simply extracted the existing keys. The state machine must also check to ensure that all Flash memory has been cleared (to ensure that an attacker has not cut the Erase line) before loading the new program code. The loading of program code must be undertaken by the secure Programming Station before secret information (such as keys) can be loaded. Special Implementation of FETs for Key Data Paths The normal situation for FET implementation for the case of a CMOS Inverter (which involves a pMOS transistor combined with an NMOS transistor) is shown in FIG. 179. During the transition, there is a small period of time where both the nMOS transistor and the pMOS transistor have an intermediate resistance. The resultant power-ground short circuit causes a temporary increase in the current, and in fact accounts for the majority of current consumed by a CMOS device. A small amount of infrared light is emitted during the short circuit, and can be viewed through the silicon substrate (silicon is transparent to infrared light). A small amount of light is also emitted during the charging and discharging of the transistor gate capacitance and transmission line capacitance. For circuitry that manipulates secret key information, such information must be kept hidden. An alternative non-flashing CMOS implementation should therefore be used for all data paths that manipulate the key or a partially calculated value that is based on the key. The use of two non-overlapping clocks φ1 and φ2 can provide a non-flashing mechanism. φ1 is connected to a second gate of all NMOS transistors, and φ2 is connected to a second gate of all pMOS transistors. The transition can only take place in combination with the clock. Since φ1 and φ2 are non-overlapping, the pMOS and NMOS transistors will not have a simultaneous intermediate resistance. The setup is shown in FIG. 180. Finally, regular CMOS inverters can be positioned near critical non-Flashing CMOS components. These inverters should take their input signal from the Tamper Detection Line above. Since the Tamper Detection Line operates multiple times faster than the regular operating circuitry, the net effect will be a high rate of light-bursts next to each non-Flashing CMOS component. Since a bright light overwhelms observation of a nearby faint light, an observer will not be able to detect what switching operations are occurring in the chip proper. These regular CMOS inverters will also effectively increase the amount of circuit noise, reducing the SNR and obscuring useful EMI. There are a number of side effects due to the use of non-Flashing CMOS: The effective speed of the chip is reduced by twice the rise time of the clock per clock cycle. This is not a problem for an Authentication Chip. The amount of current drawn by the non-Flashing CMOS is reduced (since the short circuits do not occur). However, this is offset by the use of regular CMOS inverters. Routing of the clocks increases chip area, especially since multiple versions of φ1 and φ2 are required to cater for different levels of propagation. The estimation of chip area is double that of a regular implementation. Design of the non-Flashing areas of the Authentication Chip are slightly more complex than to do the same with a with a regular CMOS design. In particular, standard cell components cannot be used, making these areas full custom. This is not a problem for something as small as an Authentication Chip, particularly when the entire chip does not have to be protected in this manner. Connections in Polysilicon Layers Where Possible Wherever possible, the connections along which the key or secret data flows, should be made in the polysilicon layers. Where necessary, they can be in metal 1, but must never be in the top metal layer (containing the Tamper Detection Lines). OverUnderPower Detection Unit Each Authentication Chip requires an OverUnderPower Detection Unit to prevent Power Supply Attacks. An OverUnderPower Detection Unit detects power glitches and tests the power level against a Voltage Reference to ensure it is within a certain tolerance. The Unit contains a single Voltage Reference and two comparators. The OverUnderPower Detection Unit would be connected into the RESET Tamper Detection Line, thus causing a RESET when triggered. A side effect of the OverUnderPower Detection Unit is that as the voltage drops during a power-down, a RESET is triggered, thus erasing any work registers. No Test Circuitry Test hardware on an Authentication Chip could very easily introduce vulnerabilities. As a result, the Authentication Chip should not contain any BIST or scan paths. The Authentication Chip must therefore be testable with external test vectors. This should be possible since the Authentication Chip is not complex. Reading ROM This attack depends on the key being stored in an addressable ROM. Since each Authentication Chip stores its authentication keys in internal Flash memory and not in an addressable ROM, this attack is irrelevant. Reverse Engineering the Chip Reverse engineering a chip is only useful when the security of authentication lies in the algorithm alone. However our Authentication Chips rely on a secret key, and not in the secrecy of the algorithm. Our authentication algorithm is, by contrast, public, and in any case, an attacker of a high volume consumable is assumed to have been able to obtain detailed plans of the internals of the chip. In light of these factors, reverse engineering the chip itself, as opposed to the stored data, poses no threat. Usurping the Authentication Process There are several forms this attack can take, each with varying degrees of success. In all cases, it is assumed that a clone manufacturer will have access to both the System and the consumable designs. An attacker may attempt to build a chip that tricks the System into returning a valid code instead of generating an authentication code. This attack is not possible for two reasons. The first reason is that System Authentication chips and Consumable Authentication Chips, although physically identical, are programmed differently. In particular, the RD opcode and the RND opcode are the same, as are the WR and TST opcodes. A System authentication Chip cannot perform a RD command since every call is interpreted as a call to RND instead. The second reason this attack would fail is that separate serial data lines are provided from the System to the System and Consumable Authentication Chips. Consequently neither chip can see what is being transmitted to or received from the other. If the attacker builds a clone chip that ignores WR commands (which decrement the consumable remaining), Protocol 3 ensures that the subsequent RD will detect that the WR did not occur. The System will therefore not go ahead with the use of the consumable, thus thwarting the attacker. The same is true if an attacker simulates loss of contact before authentication—since the authentication does not take place, the use of the consumable doesn't occur. An attacker is therefore limited to modifying each System in order for clone consumables to be accepted Modification of System The simplest method of modification is to replace the System's Authentication Chip with one that simply reports success for each call to TST. This can be thwarted by System calling TST several times for each authentication, with the first few times providing false values, and expecting a fail from TST. The final call to TST would be expected to succeed. The number of false calls to TST could be determined by some part of the returned result from RD or from the system clock. Unfortunately an attacker could simply rewire System so that the new System clone authentication chip 53 can monitor the returned result from the consumable chip or clock. The clone System Authentication Chip would only return success when that monitored value is presented to its TST function. Clone consumables could then return any value as the hash result for RD, as the clone System chip would declare that value valid. There is therefore no point for the System to call the System Authentication Chip multiple times, since a rewiring attack will only work for the System that has been rewired, and not for all Systems. A similar form of attack on a System is a replacement of the System ROM. The ROM program code can be altered so that the Authentication never occurs. There is nothing that can be done about this, since the System remains in the hands of a consumer. Of course this would void any warranty, but the consumer may consider the alteration worthwhile if the clone consumable were extremely cheap and more readily available than the original item. The System/consumable manufacturer must therefore determine how likely an attack of this nature is. Such a study must include given the pricing structure of Systems and Consumables, frequency of System service, advantage to the consumer of having a physical modification performed, and where consumers would go to get the modification performed. The limit case of modifying a system is for a clone manufacturer to provide a completely clone System which takes clone consumables. This may be simple competition or violation of patents. Either way, it is beyond the scope of the Authentication Chip and depends on the technology or service being cloned. Direct Viewing of Chip Operation by Conventional Probing In order to view the chip operation, the chip must be operating. However, the Tamper Prevention and Detection circuitry covers those sections of the chip that process or hold the key. It is not possible to view those sections through the Tamper Prevention lines. An attacker cannot simply slice the chip past the Tamper Prevention layer, for this will break the Tamper Detection Lines and cause an erasure of all keys at power-up. Simply destroying the erasure circuitry is not sufficient, since the multiple ChipOK bits (now all 0) feeding into multiple units within the Authentication Chip will cause the chip's regular operating circuitry to stop functioning. To set up the chip for an attack, then, requires the attacker to delete the Tamper Detection lines, stop the Erasure of Flash memory, and somehow rewire the components that relied on the ChipOK lines. Even if all this could be done, the act of slicing the chip to this level will most likely destroy the charge patterns in the non-volatile memory that holds the keys, making the process fruitless. Direct Viewing of the Non-Volatile Memory If the Authentication Chip were sliced so that the floating gates of the Flash memory were exposed, without discharging them, then the keys could probably be viewed directly using an STM or SKM. However, slicing the chip to this level without discharging the gates is probably impossible. Using wet etching, plasma etching, ion milling, or chemical mechanical polishing will almost certainly discharge the small charges present on the floating gates. This is true of regular Flash memory, but even more so of multi-level Flash memory. Viewing the Light Bursts Caused by State Changes All sections of circuitry that manipulate secret key information are implemented in the non-Flashing CMOS described above. This prevents the emission of the majority of light bursts. Regular CMOS inverters placed in close proximity to the non-Flashing CMOS will hide any faint emissions caused by capacitor charge and discharge. The inverters are connected to the Tamper Detection circuitry, so they change state many times (at the high clock rate) for each non-Flashing CMOS state change. Monitoring EMI The Noise Generator described above will cause circuit noise. The noise will interfere with other electromagnetic emissions from the chip's regular activities and thus obscure any meaningful reading of internal data transfers. Viewing Idd Fluctuations The solution against this kind of attack is to decrease the SNR in the Idd signal. This is accomplished by increasing the amount of circuit noise and decreasing the amount of signal. The Noise Generator circuit (which also acts as a defense against EMI attacks) will also cause enough state changes each cycle to obscure any meaningful information in the Idd signal. In addition, the special Non-Flashing CMOS implementation of the key-carrying data paths of the chip prevents current from flowing when state changes occur. This has the benefit of reducing the amount of signal. Differential Fault Analysis Differential fault bit errors are introduced in a non-targeted fashion by ionization, microwave radiation, and environmental stress. The most likely effect of an attack of this nature is a change in Flash memory (causing an invalid state) or RAM (bad parity). Invalid states and bad parity are detected by the Tamper Detection Circuitry, and cause an erasure of the key. Since the Tamper Detection Lines cover the key manipulation circuitry, any error introduced in the key manipulation circuitry will be mirrored by an error in a Tamper Detection Line. If the Tamper Detection Line is affected, the chip will either continually RESET or simply erase the key upon a power-up, rendering the attack fruitless. Rather than relying on a non-targeted attack and hoping that “just the right part of the chip is affected in just the right way”, an attacker is better off trying to introduce a targeted fault (such as overwrite attacks, gate destruction etc). For information on these targeted fault attacks, see the relevant sections below. Clock Glitch Attacks The Clock Filter (described above) eliminates the possibility of clock glitch attacks. Power Supply Attacks The OverUnderPower Detection Unit (described above) eliminates the possibility of power supply attacks. Overwriting ROM Authentication Chips store Program code, keys and secret information in Flash memory, and not in ROM. This attack is therefore not possible. Modifying EEPROM/Flash Authentication Chips store Program code, keys and secret information in Flash memory. However, Flash memory is covered by two Tamper Prevention and Detection Lines. If either of these lines is broken (in the process of destroying a gate) the attack will be detected on power-up, and the chip will either RESET (continually) or erase the keys from Flash memory. However, even if the attacker is able to somehow access the bits of Flash and destroy or short out the gate holding a particular bit, this will force the bit to have no charge or a full charge. These are both invalid states for the Authentication Chip's usage of the multi-level Flash memory (only the two middle states are valid). When that data value is transferred from Flash, detection circuitry will cause the Erasure Tamper Detection Line to be triggered—thereby erasing the remainder of Flash memory and RESETing the chip. A Modify EEPROM/Flash Attack is therefore fruitless. Gate Destruction Attacks Gate Destruction Attacks rely on the ability of an attacker to modify a single gate to cause the chip to reveal information during operation. However any circuitry that manipulates secret information is covered by one of the two Tamper Prevention and Detection lines. If either of these lines is broken (in the process of destroying a gate) the attack will be detected on power-up, and the chip will either RESET (continually) or erase the keys from Flash memory. To launch this kind of attack, an attacker must first reverse-engineer the chip to determine which gate(s) should be targeted. Once the location of the target gates has been determined, the attacker must break the covering Tamper Detection line, stop the Erasure of Flash memory, and somehow rewire the components that rely on the ChipOK lines. Rewiring the circuitry cannot be done without slicing the chip, and even if it could be done, the act of slicing the chip to this level will most likely destroy the charge patterns in the non-volatile memory that holds the keys, making the process fruitless. Overwrite Attacks An Overwrite Attack relies on being able to set individual bits of the key without knowing the previous value. It relies on probing the chip, as in the Conventional Probing Attack and destroying gates as in the Gate Destruction Attack. Both of these attacks (as explained in their respective sections), will not succeed due to the use of the Tamper Prevention and Detection Circuitry and ChipOK lines. However, even if the attacker is able to somehow access the bits of Flash and destroy or short out the gate holding a particular bit, this will force the bit to have no charge or a full charge. These are both invalid states for the Authentication Chip's usage of the multi-level Flash memory (only the two middle states are valid). When that data value is transferred from Flash detection circuitry will cause the Erasure Tamper Detection Line to be triggered—thereby erasing the remainder of Flash memory and RESETing the chip. In the same way, a parity check on tampered values read from RAM will cause the Erasure Tamper Detection Line to be triggered. An Overwrite Attack is therefore fruitless. Memory Remanence Attack Any working registers or RAM within the Authentication Chip may be holding part of the authentication keys when power is removed. The working registers and RAM would continue to hold the information for some time after the removal of power. If the chip were sliced so that the gates of the registers/RAM were exposed, without discharging them, then the data could probably be viewed directly using an STM. The first defense can be found above, in the description of defense against Power Glitch Attacks. When power is removed, all registers and RAM are cleared, just as the RESET condition causes a clearing of memory. The chances then, are less for this attack to succeed than for a reading of the Flash memory. RAM charges (by nature) are more easily lost than Flash memory. The slicing of the chip to reveal the RAM will certainly cause the charges to be lost (if they haven't been lost simply due to the memory not being refreshed and the time taken to perform the slicing). This attack is therefore fruitless. Chip Theft Attack There are distinct phases in the lifetime of an Authentication Chip. Chips can be stolen when at any of these stages: After manufacture, but before programming of key After programming of key, but before programming of state data After programming of state data, but before insertion into the consumable or system After insertion into the system or consumable A theft in between the chip manufacturer and programming station would only provide the clone manufacturer with blank chips. This merely compromises the sale of Authentication chips, not anything authenticated by the Authentication chips. Since the programming station is the only mechanism with consumable and system product keys, a clone manufacturer would not be able to program the chips with the correct key. Clone manufacturers would be able to program the blank chips for their own Systems and Consumables, but it would be difficult to place these items on the market without detection. The second form of theft can only happen in a situation where an Authentication Chip passes through two or more distinct programming phases. This is possible, but unlikely. In any case, the worst situation is where no state data has been programmed, so all of M is read/write. If this were the case, an attacker could attempt to launch an Adaptive Chosen Text Attack on the chip. The HMAC-SHA1 algorithm is resistant to such attacks. The third form of theft would have to take place in between the programming station and the installation factory. The Authentication chips would already be programmed for use in a particular system or for use in a particular consumable. The only use these chips have to a thief is to place them into a clone System or clone Consumable. Clone systems are irrelevant—a cloned System would not even require an authentication chip 53. For clone Consumables, such a theft would limit the number of cloned products to the number of chips stolen. A single theft should not create a supply constant enough to provide clone manufacturers with a cost-effective business. The final form of theft is where the System or Consumable itself is stolen. When the theft occurs at the manufacturer, physical security protocols must be enhanced. If the theft occurs anywhere else, it is a matter of concern only for the owner of the item and the police or insurance company. The security mechanisms that the Authentication Chip uses assume that the consumables and systems are in the hands of the public. Consequently, having them stolen makes no difference to the security of the keys. Authentication Chip Design The Authentication Chip has a physical and a logical external interface. The physical interface defines how the Authentication Chip can be connected to a physical System, and the logical interface determines how that System can communicate with the Authentication Chip. Physical Interface The Authentication Chip is a small 4-pin CMOS package (actual internal size is approximately 0.30 mm2 using 0.25 μm Flash process). The 4 pins are GND, CLK, Power, and Data. Power is a nominal voltage. If the voltage deviates from this by more than a fixed amount, the chip will RESET. The recommended clock speed is 4-10 MHz. Internal circuitry filters the clock signal to ensure that a safe maximum clock speed is not exceeded. Data is transmitted and received one bit at a time along the serial data line. The chip performs a RESET upon power-up, power-down. In addition, tamper detection and prevention circuitry in the chip will cause the chip to either RESET or erase Flash memory (depending on the attack detected) if an attack is detected. A special Programming Mode is enabled by holding the CLK voltage at a particular level. This is defined further in the next section. Logical Interface The Authentication Chip has two operating modes—a Normal Mode and a Programming Mode. The two modes are required because the operating program code is stored in Flash memory instead of ROM (for security reasons). The Programming mode is used for testing purposes after manufacture and to load up the operating program code, while the normal mode is used for all subsequent usage of the chip. Programming Mode The Programming Mode is enabled by holding a specific voltage on the CLK line for a given amount of time. When the chip enters Programming Mode, all Flash memory is erased (including all secret key information and any program code). The Authentication Chip then validates the erasure. If the erasure was successful, the Authentication Chip receives 384 bytes of data corresponding to the new program code. The bytes are transferred in order byte0 to byte383. The bits are transferred from bit0 to bit7. Once all 384 bytes of program code have been loaded, the Authentication Chip hangs. If the erasure was not successful, the Authentication Chip will hang without loading any data into the Flash memory. After the chip has been programmed, it can be restarted. When the chip is RESET with a normal voltage on the CLK line, Normal Mode is entered. Normal Mode Whenever the Authentication Chip is not in Programming Mode, it is in Normal Mode. When the Authentication Chip starts up in Normal Mode (for example a power-up RESET), it executes the program currently stored in the program code region of Flash memory. The program code implements a communication mechanism between the System and Authentication Chip, accepting commands and data from the System and producing output values. Since the Authentication Chip communicates serially, bits are transferred one at a time. The System communicates with the Authentication Chips via a simple operation command set. Each command is defined by 3-bit opcode. The interpretation of the opcode depends on the current value of the IsTrusted bit and the IsWritten bit. The following operations are defined: Op T W Mn Input Output Description 000 — — CLR — — Clear 001 0 0 SSI [160, 160, 160] — Set Secret Information 010 0 1 RD [160, 160] [256, 160] Read M securely 010 1 1 RND — [160, 160] Random 011 0 1 WR [256] — Write M 011 1 1 TST [256, 160] [1] Test 100 0 1 SAM [32] [32] Set Access Mode 101 — 1 GIT — [1] Get Is Trusted 110 — 1 SMT [32] — Set MinTicks Op = Opcode, T = IsTrusted value, W = IsWritten value, Mn = Mnemonic, [n] = number of bits required for parameter Any command not defined in this table is interpreted as NOP (No operation). Examples include opcodes 110 and 111 (regardless of IsTrusted or IsWritten values), and any opcode other than SSI when IsWritten =0. Note that the opcodes for RD and RND are the same, as are the opcodes for WR and TST. The actual command run upon receipt of the opcode will depend on the current value of the IsTrusted bit (as long as IsWritten is 1). Where the IsTrusted bit is clear, RD and WR functions will be called. Where the IsTrusted bit is set, RND and TST functions will be called. The two sets of commands are mutually exclusive between trusted and non-trusted Authentication Chips. In order to execute a command on an Authentication Chip, a client (such as System) sends the command opcode followed by the required input parameters for that opcode. The opcode is sent least significant bit through to most significant bit. For example, to send the SSI command, the bits 1, 0, and 0 would be sent in that order. Each input parameter is sent in the same way, least significant bit first through to most significant bit last. Return values are read in the same way—least significant bit first and most significant bit last. The client must know how many bits to retrieve. In some cases, the output bits from one chip's command can be fed directly as the input bits to another chip's command. An example of this is the RND and RD commands. The output bits from a call to RND on a trusted Authentication Chip do not have to be kept by System. Instead, System can transfer the output bits directly to the input of the non-trusted Authentication Chip's RD command. The description of each command points out where this is so. Each of the commands is examined in detail in the subsequent sections. Note that some algorithms are specifically designed because the permanent registers are kept in Flash memory. Registers The memory within the Authentication Chip contains some non-volatile memory to store the variables required by the Authentication Protocol. The following non-volatile (Flash) variables are defined: Size Variable Name (in bits) Description M[0 . . . 15] 256 16 words (each 16 bits) containing state data such as serial numbers, media remaining etc. K1 160 Key used to transform R during authentication. K2 160 Key used to transform M during authentication. R 160 Current random number AccessMode[0 . . . 15] 32 The 16 sets of 2-bit AccessMode values for M[n]. MinTicks 32 The minimum number of clock ticks between calls to key- based functions SIWritten 1 If set, the secret key information (K1, K2, and R) has been written to the chip. If clear, the secret information has not been written yet. IsTrusted 1 If set, the RND and TST functions can be called, but RD and WR functions cannot be called. If clear, the RND and TST functions cannot be called, but RD and WR functions can be called. Total bits 802 Architecture Overview This section chapter provides the high-level definition of a purpose-built CPU capable of implementing the functionality required of an Authentication Chip. Note that this CPU is not a general purpose CPU. It is tailor-made for implementing the Authentication logic. The authentication commands that a user of an Authentication Chip sees, such as WRITE, TST, RND etc are all implemented as small programs written in the CPU instruction set. The CPU contains a 32-bit Accumulator (which is used in most operations), and a number of registers. The CPU operates on 8-bit instructions specifically tailored to implementing authentication logic. Each 8-bit instruction typically consists of a 4-bit opcode, and a 4-bit operand. Operating Speed An internal Clock Frequency Limiter Unit prevents the chip from operating at speeds any faster than a predetermined frequency. The frequency is built into the chip during manufacture, and cannot be changed. The frequency is recommended to be about 4-10 MHz. Composition and Block Diagram The Authentication Chip contains the following components: Unit Name CMOS Type Description Clock Frequency Normal Ensures the operating frequency of the Authentication Limiter Chip does not exceed a specific maximum frequency. OverUnderPower Normal Ensures that the power supply remains in a valid Detection Unit operating range. Programming Mode Normal Allows users to enter Programming Mode. Detection Unit Noise Generator Normal For generating Idd noise and for use in the Tamper Prevention and Detection circuitry. State Machine Normal for controlling the two operating modes of the chip (Programming Mode and Normal Mode). This includes generating the two operating cycles of the CPU, stalling during long command operations, and storing the op-code and operand during operating cycles. I/O Unit Normal Responsible for communicating serially with the outside world. ALU Non-flashing Contains the 32-bit accumulator as well as the general mathematical and logical operators. MinTicks Unit Normal (99%), Responsible for a programmable minimum delay (via a Non-flashing (1%) countdown) between certain key-based operations. Address Generator Normal (99%), Generates direct, indirect, and indexed addresses as Unit Non-flashing (1%) required by specific operands. Program Counter Unit Normal Includes the 9 bit PC (program counter), as well as logic for branching and subroutine control Memory Unit Non-flashing Addressed by 9 bits of address. It contains an 8-bit wide program Flash memory, and 32-bit wide Flash memory, RAM, and look-up tables. Also contains Programming Mode circuitry to enable loading of program code. FIG. 181 illustrates a schematic block diagram of the Authentication Chip. The tamper prevention and Detection Circuitry is not shown: The Noise Generator, OverUnderPower Detection Unit, and ProgrammingMode Detection Unit are connected to the Tamper Prevention and Detection Circuitry and not to the remaining units. Memory Map FIG. 182 illustrates an example memory map. Although the Authentication Chip does not have external memory, it does have internal memory. The internal memory is addressed by 9 bits, and is either 32-bits wide or 8-bits wide (depending on address). The 32-bit wide memory is used to hold the non-volatile data, the variables used for HMAC-SHA1, and constants. The 8-bit wide memory is used to hold the program and the various jump tables used by the program. The address breakup (including reserved memory ranges) is designed to optimize address generation and decoding. Constants FIG. 183 illustrates an example of the constants memory map. The Constants region consists of 32-bit constants. These are the simple constants (such as 32-bits of all 0 and 32-bits of all 1), the constants used by the HMAC algorithm, and the constants y0-3 and h0-4 required for use in the SHA-1 algorithm. None of these values are affected by a RESET. The only opcode that makes use of constants is LDK. In this case, the operands and the memory placement are closely linked, in order to minimize the address generation and decoding. RAM FIG. 184 illustrates an example of the RAM memory map. The RAM region consists of the 32 parity-checked 32-bit registers required for the general functioning of the Authentication Chip, but only during the operation of the chip. RAM is volatile memory, which means that once power is removed, the values are lost. Note that in actual fact, memory retains its value for some period of time after power-down (due to memory remnance), but cannot be considered to be available upon power-up. This has issues for security that are addressed in other sections of this document. RAM contains the variables used for the HMAC-SHA1 algorithm, namely: A-E, the temporary variable T, space for the 160-bit working hash value H, space for temporary storage of a hash result (required by HMAC) B160, and the space for the 512 bits of expanded hashing memory X. All RAM values are cleared to 0 upon a RESET, although any program code should not take this for granted. Opcodes that make use of RAM addresses are LD, ST, ADD, LOG, XOR, and RPL. In all cases, the operands and the memory placement are closely linked, in order to minimize the address generation and decoding (multiword variables are stored most significant word first). Flash Memory—Variables FIG. 185 illustrates an example of the Flash memory variables memory map. The Flash memory region contains the non-volatile information in the Authentication Chip. Flash memory retains its value after power is removed, and can be expected to be unchanged when the power is next turned on. The non-volatile information kept in multi-state Flash memory includes the two 160-bit keys (K1 and K2), the current random number value (R), the state data (M), the MinTicks value (MT), the AccessMode value (AM), and the IsWritten (ISW) and IsTrusted (IST) flags. Flash values are unchanged by a RESET, but are cleared (to 0) upon entering Programming Mode. Operations that make use of Flash addresses are LD, ST, ADD, RPL, ROR, CLR, and SET. In all cases, the operands and the memory placement are closely linked, in order to minimize the address generation and decoding. Multiword variables K1, K2, and M are stored most significant word first due to addressing requirements. The addressing scheme used is a base address offset by an index that starts at N and ends at 0. Thus MN is the first word accessed, and M0 is the last 32-bit word accessed in loop processing. Multiword variable R is stored least significant word first for ease of LFSR generation using the same indexing scheme. Flash Memory—Program FIG. 186 illustrates an example of the Flash memory program memory map. The second multi-state Flash memory region is 384×8-bits. The region contains the address tables for the JSR, JSI and TBR instructions, the offsets for the DBR commands, constants and the program itself. The Flash memory is unaffected by a RESET, but is cleared (to 0) upon entering Programming Mode. Once Programming Mode has been entered, the 8-bit Flash memory can be loaded with a new set of 384 bytes. Once this has been done, the chip can be RESET and the normal chip operations can occur. Registers A number of registers are defined in the Authentication Chip. They are used for temporary storage during function execution. Some are used for arithmetic functions, others are used for counting and indexing, and others are used for serial I/O. These registers do not need to be kept in non-volatile (Flash) memory. They can be read or written without the need for an erase cycle (unlike Flash memory). Temporary storage registers that contain secret information still need to be protected from physical attack by Tamper Prevention and Detection circuitry and parity checks. All registers are cleared to 0 on a RESET. However, program code should not assume any particular state, and set up register values appropriately. Note that these registers do not include the various OK bits defined for the Tamper Prevention and Detection circuitry. The OK bits are scattered throughout the various units and are set to 1 upon a RESET. Cycle The 1-bit Cycle value determines whether the CPU is in a Fetch cycle (0) or an Execute cycle (1). Cycle is actually derived from a 1-bit register that holds the previous Cycle value. Cycle is not directly accessible from the instruction set. It is an internal register only. Program Counter A 6-level deep 9-bit Program Counter Array (PCA) is defined. It is indexed by a 3-bit Stack Pointer (SP). The current Program Counter (PC), containing the address of the currently executing instruction, is effectively PCA[SP]. In addition, a 9-bit Adr register is defined, containing the resolved address of the current memory reference (for indexed or indirect memory accesses). The PCA, SP, and Adr registers are not directly accessible from the instruction set. They are internal registers only CMD The 8-bit CMD register is used to hold the currently executing command. While the CMD register is not directly accessible from the instruction set, and is an internal register only. Accumulator and Z flag The Accumulator is a 32-bit general-purpose register. It is used as one of the inputs to all arithmetic operations, and is the register used for transferring information between memory registers. The Z register is a 1-bit flag, and is updated each time the Accumulator is written to. The Z register contains the zero-ness of the Accumulator. Z=1 if the last value written to the Accumulator was 0, and 0 if the last value written was non-0. Both the Accumulator and Z registers are directly accessible from the instruction set. Counters A number of special purpose counters/index registers are defined: Register Name Size Bits Description C1 1 × 3 3 Counter used to index arrays: AE, B160, M, H, y, and h. C2 1 × 5 5 General purpose counter N1-4 4 × 4 16 Used to index array X All these counter registers are directly accessible from the instruction set. Special instructions exist to load them with specific values, and other instructions exist to decrement or increment them, or to branch depending on the whether or not the specific counter is zero. There are also 2 special flags (not registers) associated with C1 and C2, and these flags hold the zero-ness of C1 or C2. The flags are used for loop control, and are listed here, for although they are not registers, they can be tested like registers. Name Description C1Z 1 = C1 is current zero, 0 = C1 is currently non-zero. C2Z 1 = C2 is current zero, 0 = C2 is currently non-zero. Flags A number of 1-bit flags, corresponding to CPU operating modes, are defined: Name Bits Description WE 1 WriteEnable for X register array: 0 = Writes to X registers become no-ops 1 = Writes to X registers are carried out K2MX 1 0 = K1 is accessed during K references. Reads from M are interpreted as reads of 0 1 = K2 is accessed during K references. Reads from M succeed. All these 1-bit flags are directly accessible from the instruction set Special instructions exist to set and clear these flags. Registers used for Write Integrity Name Bits Description EE 1 Corresponds to the EqEncountered variable in the WR command pseudocode. Used during the writing of multi-precision data values to determine whether all more significant components have been equal to their previous values. DE 1 Corresponds to the DecEncountered variable in the WR command pseudocode. Used during the writing of multi-precision data values to determine whether a more significant components has been decremented already. Registers used for I/O Four 1-bit registers are defined for communication between the client (System) and the Authentication Chip. These registers are InBit, InBitValid, OutBit, and OutBitValid. InBit and InBitValid provide the means for clients to pass commands and data to the Authentication Chip. OutBit and OutBitValid provide the means for clients to get information from the Authentication Chip. A client sends commands and parameter bits to the Authentication Chip one bit at a time. Since the Authentication Chip is a slave device, from the Authentication Chip's point of view: Reads from InBit will hang while InBitValid is clear. InBitValid will remain clear until the client has written the next input bit to InBit. Reading InBit clears the InBitValid bit to allow the next InBit to be read from the client A client cannot write a bit to the Authentication Chip unless the InBitValid bit is clear. Writes to OutBit will hang while OutBitValid is set. OutBitValid will remain set until the client has read the bit from OutBit. Writing OutBit sets the OutBitValid bit to allow the next OutBit to be read by the client. A client cannot read a bit from the Authentication Chip unless the OutBitValid bit is set. Registers Used for Timing Access A single 32-bit register is defined for use as a timer. The MTR (MinTicksRemaining) register decrements every time an instruction is executed. Once the MTR register gets to 0, it stays at zero. Associated with MTR is a 1-bit flag MTRZ, which contains the zero-ness of the MTR register. If MTRZ is 1, then the MTR register is zero. If MTRZ is 0, then the MTR register is not zero yet. MTR always starts off at the MinTicks value (after a RESET or a specific key-accessing function), and eventually decrements to 0. While MTR can be set and MTRZ tested by specific instructions, the value of MTR cannot be directly read by any instruction. Register Summary The following table summarizes all temporary registers (ordered by register name). Its lists register names, size (in bits), as well as where the specified register can be found. Register Name Bits Parity Where Found Acc 32 1 Arithmetic Logic Unit Adr 9 1 Address Generator Unit AMT 32 Arithmetic Logic Unit C1 3 1 Address Generator Unit C2 5 1 Address Generator Unit CMD 8 1 State Machine Cycle (Old = prev 1 State Machine Cycle) DE 1 Arithmetic Logic Unit EE 1 Arithmetic Logic Unit InBit 1 Input Output Unit InBitValid 1 Input Output Unit K2MX 1 Address Generator Unit MTR 32 1 MinTicks Unit MTRZ 1 MinTicks Unit N[1-4] 16 4 Address Generator Unit OutBit 1 Input Output Unit OutBitValid 1 Input Output Unit PCA 54 6 Program Counter Unit RTMP 1 Arithmetic Logic Unit SP 3 1 Program Counter Unit WE 1 Memory Unit Z 1 Arithmetic Logic Unit Total bits 206 17 Instruction Set The CPU operates on 8-bit instructions specifically tailored to implementing authentication logic. The majority of 8-bit instruction consists of a 4-bit opcode, and a 4-bit operand. The high-order 4 bits contains the opcode, and the low-order 4 bits contains the operand. Opcodes and Operands (Summary) The opcodes are summarized in the following table: Opcode Mnemonic Simple Description 0000 TBR Test and branch. 0001 DBR Decrement and branch 001 JSR Jump subroutine via table 01000 RTS Return from subroutine 01001 JSI Jump subroutine indirect 0101 SC Set counter 0110 CLR Clear specific flash registers 0111 SET Set bits in specific flash register 1000 ADD Add a 32 bit value to the Accumulator 1001 LOG Logical operation (AND, and OR) 1010 XOR Exclusive-OR Accumulator with some value 1011 LD Load Accumulator from specified location 1100 ROR Rotate Accumulator right 1101 RPL Replace bits 1110 LDK Load Accumulator with a constant 1111 ST Store Accumulator in specified location The following table is a summary of which operands can be used with which opcodes. The table is ordered alphabetically by opcode mnemonic. The binary value for each operand can be found in the subsequent tables. Opcode Valid Operand ADD {A, B, C, D, E, T, MT, AM, AE[C1], B160[C1], H[C1], M[C1], K[C1], R[C1], X[N4]} CLR {WE, K2MX, M[C1], Group1, Group2} DBR {C1, C2}, Offset into DBR Table JSI {} JSR Offset into Table 1 LD {A, B, C, D, E, T, MT, AM, AE[C1], B160[C1], H[C1], M[C1], K[C1], R[C1], X[N4]} LDK {0x0000..., 0x3636..., 0x5C5C..., 0xFFFF, h[C1], y[C1]} LOG {AND, OR}, {A, B, C, D, E, T, MT, AM} ROR {InBit, OutBit, LFSR, RLFSR, IST, ISW, MTRZ, 1, 2, 27, 31} RPL {Init, MHI, MLO} RTS {} SC {C1, C2}, Offset into counter list SET {WE, K2MX, Nx, MTR, IST, ISW} ST {A, B, C, D, E, T, MT, AM, AE[C1], B160[C1], H[C1], M[C1], K[C1], R[C1], X[N4]} TBR {0, 1 }, Offset into Table 1 XOR {A, B, C, D, E, T, MT, AM, X[N1], X[N2], X[N3], X[N4]} The following operand table shows the interpretation of the 4-bit operands where all 4 bits are used for direct interpretation. Operand ADD, LD, ST XOR ROR LDK RPL SET CLR 0000 E E InBit 0x00 . . . Init WE WE 0001 D D OutBit 0x36 . . . — K2MX K2MX 0010 C C RB 0x5C . . . — Nx — 0011 B B XRB 0xFF . . . — — — 0100 A A IST y[C1] — IST — 0101 T T ISW — — ISW — 0110 MT MT MTRZ — — MTR — 0111 AM AM 1 — — — — 1000 AE[C1] — — h[C1] — — — 1001 B160[C1] — 2 — — — — 1010 H[C1] — 27 — — — — 1011 — — — — — — — 1100 R[C1] X[N1] 31 — — — R 1101 K[C1] X[N2] — — — — Group1 1110 M[C1] X[N3] — — MLO — M[C1] 1111 X[N4] X[N4] — — MHI — Group2 The following instructions make a selection based upon the highest bit of the operand: Which Counter? Which operation? Which Value? Operand3 (DBR, SC) (LOG) (TBR) 0 C1 AND Zero 1 C2 OR Non-zero The lowest 3 bits of the operand are either offsets (DBR, TBR), values from a special table (SC) or as in the case of LOG, they select the second input for the logical operation. The interpretation matches the interpretation for the ADD, LD, and ST opcodes: Operand2-0 LOG Input2 SC Value 000 E 2 001 D 3 010 C 4 011 B 7 100 A 10 101 T 15 110 MT 19 111 AM 31 ADD—Add to Accumulator Mnemonic: ADD Opcode: 1000 Usage: ADD Value The ADD instruction adds the specified operand to the Accumulator via modulo 232 addition. The operand is one of A, B, C, D, E, T, AM, MT, AE[C1], H[C1], B160[C1], R[C1], K[C1], M[C1], or X[N4]. The Z flag is also set during this operation, depending on whether the value loaded is zero or not. CLR—Clear Bits Mnemonic: CLR Opcode: 0110 Usage: CLR Flag/Register The CLR instruction causes the specified internal flag or Flash memory registers to be cleared. In the case of Flash memory, although the CLR instruction takes some time the next instruction is stalled until the erasure of Flash memory has finished. The registers that can be cleared are WE and K2MX. The Flash memory that can be cleared are: R, M[C1], Group1, and Group2. Group1 is the IST and ISW flags. If these are cleared, then the only valid high level command is the SSI instruction. Group2 is the MT, AM, K1 and K2 registers. R is erased separately since it must be updated after each call to TST. M is also erased via an index mechanism to allow individual parts of M to be updated. There is also a corresponding SET instruction. DBR—Decrement and Branch Mnemonic: DBR Opcode: 0001 Usage: DBR Counter, Offset This instruction provides the mechanism for building simple loops. The high hit of the operand selects between testing C1 or C2 (the two counters). If the specified counter is non-zero, then the counter is decremented and the value at the given offset (sign extended) is added to the PC. If the specified counter is zero, it is decremented and processing continues at PC+1. The 8-entry offset table is stored at address 0 1100 0000 (the 64th entry of the program memory). The 8 bits of offset are treated as a signed number. Thus 0xFF is treated as −1, and 0x01 is treated as +1. Typically the value will be negative for use in loops. JSI—Jump Subroutine Indirect Mnemonic: JSI Opcode: 01001 Usage: JSI (Acc) The JSI instruction allows the jumping to a subroutine dependant on the value currently in the Accumulator. The instruction pushes the current PC onto the stack, and loads the PC with a new value. The upper 8 bits of the new PC are loaded from Jump Table 2 (offset given by the lower 5 bits of the Accumulator), and the lowest bit of the PC is cleared to 0. Thus all subroutines must start at even addresses. The stack provides for 6 levels of execution (5 subroutines deep). It is the responsibility of the programmer to ensure that this depth is not exceeded or the return value will be overwritten (since the stack wraps). JSR—Jump Subroutine Mnemonic: JSR Opcode: 001 Usage: JSR Offset The JSR instruction provides for the most common usage of the subroutine construct. The instruction pushes the current PC onto the stack, and loads the PC with a new value. The upper 8 bits of the new PC value comes from Address Table 1, with the offset into the table provided by the 5-bit operand (32 possible addresses). The lowest bit of the new PC is cleared to 0. Thus all subroutines must start at even addresses. The stack provides for 6 levels of execution (5 subroutines deep). It is the responsibility of the programmer to ensure that this depth is not exceeded or the return value will be overwritten (since the stack wraps). LD—Load Accumulator Mnemonic: LD Opcode: 1011 Usage: LD Value The LD instruction loads the Accumulator from the specified operand. The operand is one of A, B, C, D, E, T, AM, MT, AE[C1], H[C1], B160[C1], R[C1], K[C1], M[C1], or X[N4]. The Z flag is also set during this operation, depending on whether the value loaded is zero or not. LDK—Load Constant Mnemonic: LDK Opcode: 1110 Usage: LDK Constant The LDK instruction loads the Accumulator with the specified constant. The constants are those 32-bit values required for HMAC-SHA1 and all 0s and all 1s as most useful for general purpose processing. Consequently they are a choice of: 0x00000000 0x36363636 0x5C5C5C5C 0xFFFFFFFF or from the h and y constant tables, indexed by C1. The h and y constant tables hold the 32-bit tabular constants required for HMAC-SHA1. The Z flag is also set during this operation, depending on whether the constant loaded is zero or not. LOG—Logical Operation Mnemonic: LOG Opcode: 1001 Usage: LOG Operation Value The LOG instruction performs 32-bit bitwise logical operations on the Accumulator and a specified value. The two operations supported by the LOG instruction are AND and OR. Bitwise NOT and XOR operations are supported by the XOR instruction. The 32-bit value to be ANDed or ORed with the accumulator is one of the following: A, B, C, D, E, T, MT and AM. The Z flag is also set during this operation, depending on whether resultant 32-bit value (loaded into the Accumulator) is zero or not. ROR—Rotate Right Mnemonic: ROR Opcode: 1100 Usage: ROR Value The ROR instruction provides a way of rotating the Accumulator right a set number of bits. The bit coming in at the top of the Accumulator (to become bit 31) can either come from the previous bit 0 of the Accumulator, or from an external 1-bit flag (such as a flag, or the serial input connection). The bit rotated out can also be output from the serial connection, or combined with an external flag. The allowed operands are: InBit, OutBit, LFSR, RLFSR, IST, ISW, MTRZ, 1, 2, 27, and 31. The Z flag is also set during this operation, depending on whether resultant 32-bit value (loaded into the Accumulator) is zero or not. In its simplest form, the operand for the ROR instruction is one of 1, 2, 27, 31, indicating how many bit positions the Accumulator should be rotated. For these operands, there is no external input or output—the bits of the Accumulator are merely rotated right. With operands IST, ISW, and MTRZ, the appropriate flag is transferred to the highest bit of the Accumulator. The remainder of the Accumulator is shifted right one bit position (bit 31 becomes bit 30 etc), with lowest bit of the Accumulator shifted out. With operand InBit, the next serial input bit is transferred to the highest bit of the Accumulator. The InBitValid bit is then cleared. If there is no input bit available from the client yet, execution is suspended until there is one. The remainder of the Accumulator is shifted right one bit position (bit 31 becomes bit 30 etc), with lowest bit of the Accumulator shifted out. With operand OutBit, the Accumulator is shifted right one bit position. The bit shifted out from bit 0 is stored in the OutBit flag and the OutBitValid flag is set. It is therefore ready for a client to read. If the OutBitValid flag is already set, execution of the instruction stalls until the OutBit bit has been read by the client (and the OutBitValid flag cleared). The new bit shifted in to bit 31 should be considered garbage (actually the value currently in the InBit register). Finally, the RB and XRB operands allow the implementation of LFSRs and multiple precision shift registers. With RB, the bit shifted out (formally bit 0) is written to the RTMP register. The register currently in the RTMP register becomes the new bit 31 of the Accumulator. Performing multiple ROR RB commands over several 32-bit values implements a multiple precision rotate/shift right. The XRB operates in the same way as RB, in that the current value in the RTMP register becomes the new bit 31 of the Accumulator. However with the XRB instruction the bit formally known as bit 0 does not simply replace RTMP (as in the RB instruction). Instead, it is XORed with RTMP, and the result stored in RTMP. This allows the implementation of long LFSRs, as required by the Authentication protocol. RPL—Replace Bits Mnemonic: RPL Opcode: 1101 Usage: ROR Value The RPL instruction is designed for implementing the high level WRITE command in the Authentication Chip. The instruction is designed to replace the upper 16 bits of the Accumulator by the value that will eventually be written to the M array (dependant on the Access Mode value). The instruction takes 3 operands: Init, MHI, and MLO. The Init operand sets all internal flags and prepares the RPL unit within the ALU for subsequent processing. The Accumulator is transferred to an internal AccessMode register. The Accumulator should have been loaded from the AM Flash memory location before the call to RPL Init in the case of implementing the WRITE command, or with 0 in the case of implementing the TST command. The Accumulator is left unchanged. The MHI and MLO operands refer to whether the upper or lower 16 bits of M[C1] will be used in the comparison against the (always) upper 16 bits of the Accumulator. Each MHI and MLO instruction executed uses the subsequent 2 bits from the initialized AccessMode value. The first execution of MHI or MLO uses the lowest 2 bits, the next uses the second two bits etc. RTS—Return From Subroutine Mnemonic: RTS Opcode: 01000 Usage: RTS The RTS instruction causes execution to resume at the instruction after the most recently executed JSR or JSI instruction. Hence the term: returning from the subroutine. In actuality, the instruction pulls the saved PC from the stack, adds 1, and resumes execution at the resultant address. Although 6 levels of execution are provided for (5 subroutines), it is the responsibility of the programmer to balance each JSR and JSI instruction with an RTS. An RTS executed with no previous JSR will cause execution to begin at whatever address happens to be pulled from the stack. SC—Set Counter Mnemonic: SC Opcode: 0101 Usage: SC Counter Value The SC instruction is used to load a counter with a particular value. The operand determines which of counters C1 and C2 is to be loaded. The Value to be loaded is one of 2, 3, 4, 7, 10, 15, 19, and 31. The counter values are used for looping and indexing. Both C1 and C2 can be used for looping constructs (when combined with the DBR instruction), while only C1 can be used for indexing 32-bit parts of multi-precision variables. SET—Set Bits Mnemonic: SET Opcode: 0111 Usage: SET FlagRegister The SET instruction allows the setting of particular flags or flash memory. There is also a corresponding CLR instruction. The WE and K2MX operands each set the specified flag for later processing. The IST and ISW operands each set the appropriate bit in Flash memory, while the MTR operand transfers the current value in the Accumulator into the MTR register. The SET Nx command loads N1-N4 with the following constants: Index Constant Loaded Initial X[N] referred to N1 2 X[13] N2 7 X[8] N3 13 X[2] N4 15 X[0] Note that each initial X[Nn] referred to matches the optimized SHA-1 algorithm initial states for indexes N1-N4. When each index value Nn decrements, the effective X[N] increments. This is because the X words are stored in memory with most significant word first. ST—Store Accumulator Mnemonic: ST Opcode: 1111 Usage: ST Location The ST instruction is stores the current value of the Accumulator in the specified location. The location is one of A, B, C, D, E, T, AM, MT, AE[C1], H[C1], B160[C1], R[C1], K[C1], M[C1], or X[N4]. The X[N4] operand has the side effect of advancing the N4 index. After the store has taken place, N4 will be pointing to the next element in the X array. N4 decrements by 1, but since the X array is ordered from high to low, to decrement the index advances to the next element in the array. If the destination is in Flash memory, the effect of the ST instruction is to set the bits in the Flash memory corresponding to the bits in the Accumulator. To ensure a store of the exact value from the Accumulator, be sure to use the CLR instruction to erase the appropriate memory location first. TBR—Test and Branch Mnemonic: TBR Opcode: 0000 Usage: TBR Value Index The Test and Branch instruction tests whether the Accumulator is zero or non-zero, and then branches to the given address if the Accumulator's current state matches that being tested for. If the Z flag matches the TRB test, replace the PC by 9 bit value where bit 0 =0 and upper 8 bits come from MU. Otherwise increment current PC by 1. The Value operand is either 0 or 1. A 0 indicates the test is for the Accumulator to be zero. A 1 indicates the test is for the Accumulator to be non-zero. The Index operand indicates where execution is to jump to should the test succeed. The remaining 3 bits of operand index into the lowest 8 entries of Jump Table 1. The upper 8 bits are taken from the table, and the lowest bit (bit 0) is cleared to 0. CMD is cleared to 0 upon a RESET. 0 is translated as TBR 0, which means branch to the address stored in address offset 0 if the Accumulator =0. Since the Accumulator and Z flag are also cleared to 0 on a RESET, the test will be true, so the net effect is a jump to the address stored in the 0th entry in the jump table. XOR—Exclusive OR Mnemonic: XOR Opcode: 1010 Usage: XOR Value The XOR instruction performs a 32-bit bitwise XOR with the Accumulator, and stores the result in the Accumulator. The operand is one of A, B, C, D, E, T, AM, MT, X[N1], X[N2], X[N3], or X[N4]. The Z flag is also set during this operation, depending on the result (i.e. what value is loaded into the Accumulator). A bitwise NOT operation can be performed by XORing the Accumulator with 0xFFFFFFFF (via the LDK instruction). The X[N] operands have a side effect of advancing the appropriate index to the next value (after the operation). After the XOR has taken place, the index will be pointing to the next element in the X array. N4 is also advanced by the ST X[N4] instruction. The index decrements by 1, but since the X array is ordered from high to low, to decrement the index advances to the next element in the array. ProgrammingMode Detection Unit The ProgrammingMode Detection Unit monitors the input clock voltage. If the clock voltage is a particular value the Erase Tamper Detection Line is triggered to erase all keys, program code, secret information etc and enter Program Mode. The ProgrammingMode Detection Unit can be implemented with regular CMOS, since the key does not pass through this unit. It does not have to be implemented with non-flashing CMOS. There is no particular need to cover the ProgrammingMode Detection Unit by the Tamper Detection Lines, since an attacker can always place the chip in ProgrammingMode via the CLK input. The use of the Erase Tamper Detection Line as the signal for entering Programming Mode means that if an attacker wants to use Programming Mode as part of an attack, the Erase Tamper Detection Lines must be active and functional. This makes an attack on the Authentication Chip far more difficult. Noise Generator The Noise Generator can be implemented with regular CMOS, since the key does not pass through this unit. It does not have to be implemented with non-flashing CMOS. However, the Noise Generator must be protected by both Tamper Detection and Prevention lines so that if an attacker attempts to tamper with the unit, the chip will either RESET or erase all secret information. In addition, the bits in the LFSR must be validated to ensure they have not been tampered with (i.e. a parity check). If the parity check fails, the Erase Tamper Detection Line is triggered. Finally, all 64 bits of the Noise Generator are ORed into a single bit. If this bit is 0, the Erase Tamper Detection Line is triggered. This is because 0 is an invalid state for an LFSR. There is no point in using an OK bit setup since the Noise Generator bits are only used by the Tamper Detection and Prevention circuitry. State Machine The State Machine is responsible for generating the two operating cycles of the CPU, stalling during long command operations, and storing the op-code and operand during operating cycles. The State Machine can be implemented with regular CMOS, since the key does not pass through this unit. It does not have to be implemented with non-flashing CMOS. However, the opcode/operand latch needs to be parity-checked. The logic and registers contained in the State Machine must be covered by both Tamper Detection Lines. This is to ensure that the instructions to be executed are not changed by an attacker. The Authentication Chip does not require the high speeds and throughput of a general purpose CPU. It must operate fast enough to perform the authentication protocols, but not faster. Rather than have specialized circuitry for optimizing branch control or executing opcodes while fetching the next one (and all the complexity associated with that), the state machine adopts a simplistic view of the world. This helps to minimize design time as well as reducing the possibility of error in implementation. The general operation of the state machine is to generate sets of cycles: Cycle 0: Fetch cycle. This is where the opcode is fetched from the program memory, and the effective address from the fetched opcode is generated. Cycle 1: Execute cycle. This is where the operand is (potentially) looked up via the generated effective address (from Cycle 0) and the operation itself is executed. Under normal conditions, the state machine generates cycles: 0, 1, 0, 1, 0, 1, 0, 1 . . . However, in some cases, the state machine stalls, generating Cycle 0 each clock tick until the stall condition finishes. Stall conditions include waiting for erase cycles of Flash memory, waiting for clients to read or write serial information, or an invalid opcode (due to tampering). If the Flash memory is currently being erased, the next instruction cannot execute until the Flash memory has finished being erased. This is determined by the Wait signal coming from the Memory Unit. If Wait =1, the State Machine must only generate Cycle 0s. There are also two cases for stalling due to serial I/O operations: The opcode is ROR OutBit, and OutBitValid already =1. This means that the current operation requires outputting a bit to the client, but the client hasn't read the last bit yet. The operation is ROR InBit, and InBitValid =0. This means that the current operation requires reading a bit from the client, but the client hasn't supplied the bit yet. In both these cases, the state machine must stall until the stalling condition has finished. The next “cycle” therefore depends on the old or previous cycle, and the current values of CMD, Wait, OutBitValid, and InBitValid. Wait comes from the MU, and OutBitValid and InBitValid come from the I/O Unit. When Cycle is 0, the 8-bit op-code is fetched from the memory unit and placed in the 8-bit CMD register. The write enable for the CMD register is therefore ˜Cycle. There are two outputs from this unit: Cycle and CMD. Both of these values are passed into all the other processing units within the Authentication Chip. The 1-bit Cycle value lets each unit know whether a fetch or execute cycle is taking place, while the 8-bit CMD value allows each unit to take appropriate action for commands related to the specific unit. FIG. 187 shows the data flow and relationship between components of the State Machine where: Logic1: Wait OR ˜(Old OR ((CMD = ROR) & ((CMD = InBit AND ˜InBitValid) OR (CMD = OutBit AND OutBitValid)))) Old and CMD are both cleared to 0 upon a RESET. This results in the first cycle being 1, which causes the 0 CMD to be executed. 0 is translated as TBR 0, which means branch to the address stored in address offset 0 if the Accumulator=0. Since the Accumulator is also cleared to 0 on a RESET, the test will be true, so the net effect is a jump to the address stored in the 0th entry in the jump table. The two VAL units are designed to validate the data that passes through them. Each contains an OK bit connected to both Tamper Prevention and Detection Lines. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. In the case of VAL1, the effective Cycle will always be 0 if the chip has been tampered with. Thus no program code will execute since there will never be a Cycle 1. There is no need to check if Old has been tampered with, for if an attacker freezes the Old state, the chip will not execute any further instructions. In the case of VAL2, the effective 8-bit CMD value will always be 0 if the chip has been tampered with, which is the TBR 0 instruction. This will stop execution of any program code. VAL2 also performs a parity check on the bits from CMD to ensure that CMD has not been tampered with. If the parity check fails, the Erase Tamper Detection Line is triggered. I/O UNIT The I/O Unit is responsible for communicating serially with the outside world. The Authentication Chip acts as a slave serial device, accepting serial data from a client, processing the command, and sending the resultant data to the client serially. The I/O Unit can be implemented with regular CMOS, since the key does not pass through this unit. It does not have to be implemented with non-flashing CMOS. In addition, none of the latches need to be parity checked since there is no advantage for an attacker to destroy or modify them. The I/O Unit outputs 0s and inputs 0s if either of the Tamper Detection Lines is broken. This will only come into effect if an attacker has disabled the RESET and/or erase circuitry, since breaking either Tamper Detection Lines should result in a RESET or the erasure of all Flash memory The InBit, InBitValid, OutBit, and OutBitValid 1 bit registers are used for communication between the client (System) and the Authentication Chip. InBit and InBitValid provide the means for clients to pass commands and data to the Authentication Chip. OutBit and OutBitValid provide the means for clients to get information from the Authentication Chip. When the chip is RESET, InBitValid and OutBitValid are both cleared. A client sends commands and parameter bits to the Authentication Chip one bit at a time. From the Authentication Chip's point of view: Reads from InBit will hang while InBitValid is clear. InBitValid will remain clear until the client has written the next input bit to InBit. Reading InBit clears the InBitValid bit to allow the next InBit to be read from the client A client cannot write a bit to the Authentication Chip unless the InBitValid bit is clear. Writes to OutBit will hang while OutBitValid is set OutBitValid will remain set until the client has read the bit from OutBit. Writing OutBit sets the OutBitValid bit to allow the next OutBit to be read by the client. A client cannot read a bit from the Authentication Chip unless the OutBitValid bit is set. The actual stalling of commands is taken care of by the State Machine, but the various communication registers and the communication circuitry is found in the I/O Unit. FIG. 188 shows the data flow and relationship between components of the I/O Unit where: Logic1: Cycle AND (CMD = ROR OutBit) The Serial I/O unit contains the circuitry for communicating externally with the external world via the Data pin. The InBitUsed control signal must be set by whichever unit consumes the InBit during a given clock cycle (which can be any state of Cycle). The two VAL units are validation units connected to the Tamper Prevention and Detection circuitry, each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. In the case of VAL1, the effective bit output from the chip will always be 0 if the chip has been tampered with. Thus no useful output can be generated by an attacker. In the case of VAL2, the effective bit input to the chip will always be 0 if the chip has been tampered with. Thus no useful input can be chosen by an attacker. There is no need to verify the registers in the I/O Unit since an attacker does not gain anything by destroying or modifying them. ALU FIG. 189 illustrates a schematic block diagram of the Arithmetic Logic Unit. The Arithmetic Logic Unit (ALU) contains a 32-bit Acc (Accumulator) register as well as the circuitry for simple arithmetic and logical operations. The ALU and all sub-units must be implemented with non-flashing CMOS since the key passes through it. In addition, the Accumulator must be parity-checked. The logic and registers contained in the ALU must be covered by both Tamper Detection Lines. This is to ensure that keys and intermediate calculation values cannot be changed by an attacker. A 1-bit Z register contains the state of zero-ness of the Accumulator. Both the Z and Accumulator registers are cleared to 0 upon a RESET. The Z register is updated whenever the Accumulator is updated, and the Accumulator is updated for any of the commands: LD, LDK, LOG, XOR, ROR, RPL, and ADD. Each arithmetic and logical block operates on two 32-bit inputs: the current value of the Accumulator, and the current 32-bit output of the MU. Where: Logic1: Cycle AND CMD7 AND (CMD6-4 ≠ ST) Since the WriteEnables of Acc and Z takes CMD7 and Cycle into account (due to Logic1), these two bits are not required by the multiplexor MX1 in order to select the output. The output selection for MX1 only requires bits 6-3 of CMD and is therefore simpler as a result. Output CMD6-3 MX1 ADD ADD AND LOG AND OR LOG OR XOR XOR RPL RPL ROR ROR From MU LD or LDK The two VAL units are validation units connected to the Tamper Prevention and Detection circuitry, each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. In the case of VAL1, the effective bit output from the Accumulator will always be 0 if the chip has been tampered with. This prevents an attacker from processing anything involving the Accumulator. VAL1 also performs a parity check on the Accumulator, setting the Erase Tamper Detection Line if the check fails. In the case of VAL2, the effective Z status of the Accumulator will always be true if the chip has been tampered with. Thus no looping constructs can be created by an attacker. The remaining function blocks in the ALU are described as follows. All must be implemented in non-flashing CMOS. Block Description OR Takes the 32-bit output from the multiplexor MX1, ORs all 32 bits together to get 1 bit. ADD Outputs the result of the addition of its two inputs, modulo 232. AND Outputs the 32-bit result of a parallel bitwise AND of its two 32-bit inputs. OR Outputs the 32-bit result of a parallel bitwise OR of its two 32-bit inputs. XOR Outputs the 32-bit result of a parallel bitwise XOR of its two 32-bit inputs. RPL Examined in further detail below. ROR Examined in further detail below. RPL FIG. 190 illustrates a schematic block diagram of the RPL unit. The RPL unit is a component within the ALU. It is designed to implement the RPLCMP functionality of the Authentication Chip. The RPLCMP command is specifically designed for use in secure writing to Flash memory M, based upon the values in AccessMode. The RPL unit contains a 32-bit shift register called AMT (AccessModeTemp), which shifts right two bits each shift pulse, and two 1-bit registers called EE and DE, directly based upon the WR pseudocode's EqEncountered and DecEncountered flags. All registers are cleared to 0 upon a RESET. AMT is loaded with the 32 bit AM value (via the Accumulator) with a RPL INIT command, and EE and DE are set according to the general write algorithm via calls to RPL MHI and RPL MLO. The EQ and LT blocks have functionality exactly as documented in the WR command pseudocode. The EQ block outputs 1 if the 2 16-bit inputs are bit-identical and 0 if they are not. The LT block outputs 1 if the upper 16-bit input from the Accumulator is less than the 16-bit value selected from the MU via MX2. The comparison is unsigned. The bit patterns for the operands are specifically chosen to make the combinatorial logic simpler. The bit patterns for the operands are listed again here since we will make use of the patterns: Operand CMD3-0 Init 0000 MLO 1110 MHI 1111 The MHI and MLO have the hi bit set to easily differentiate them from the Init bit pattern, and the lowest bit can be used to differentiate between MHI and MLO. The EE and DE flags must be updated each time the RPL command is issued. For the Init stage, we need to setup the two values with 0, and for MHI and MLO, we need to update the values of EE and DE appropriately. The WriteEnable for EE and DE is therefore: Logic1: Cycle AND (CMD7-4 = RPL) With the 32 bit AMT register, we want to load the register with the contents of AM (read from the MU) upon an RPL Init command, and to shift the AMT register right two bit positions for the RPL MLO and RPL MHI commands. This can be simply tested for with the highest bit of the RPL operand (CMD3). The WriteEnable and ShiftEnable for the AMT register is therefore: Logic2 Logic1 AND CMD3 Logic3 Logic1 AND ˜CMD3 The output from Logic3 is also useful as input to multiplexor MX1, since it can be used to gate through either the current 2 access mode bits or 00 (which results in a reset of the DE and EE registers since it represents the access mode RW). Consequently MX1 is: Output Logic3 MX1 AMT output 0 00 1 The RPL logic only replaces the upper 16 bits of the Accumulator. The lower 16 bits pass through untouched. However, of the 32 bits from the MU (corresponding to one of M[0-15]), only the upper or lower 16 bits are used. Thus MX2 tests CMD0 to distinguish between MHI and MLO. Output CMD0 MX2 Lower 16 bits 0 Upper 16 bits 1 The logic for updating the DE and EE registers matches the pseudocode of the WR command. Note that an input of an AccessMode value of 00 (=RW which occurs during an RPL INIT) causes both DE and EE to be loaded with 0 (the correct initialization value). EE is loaded with the result from Logic4, and DE is loaded with the result fromLogic5. Logic4 (((AccessMode = MSR) AND EQ) OR ((AccessMode = NMSR) AND EE AND EQ)) Logic5 (((AccessMode = MSR) AND LT) OR ((AccessMode = NMSR) AND DE) OR ((AccessMode = NMSR) AND EQ AND LT)) The upper 16 bits of the Accumulator must be replaced with the value that is to be written to M. Consequently Logic6 matches the WE flag from the WR command pseudocode. Logic6 ((AccessMode = RW) OR ((AccessMode = MSR) AND LT) OR ((AccessMode = NMSR) AND (DE OR LT))) The output from Logic6 is used directly to drive the selection between the original 16 bits from the Accumulator and the value from M[0-15] via multiplexor MX3. If the 16 bits from the Accumulator are selected (leaving the Accumulator unchanged), this signifies that the Accumulator value can be written to M[n]. If the 16-bit value from M is selected (changing the upper 16 bits of the Accumulator), this signifies that the 16-bit value in M will be unchanged. MX3 therefore takes the following form: Output Logic6 MX3 16 bits from MU 0 16 bits from Acc 1 There is no point parity checking AMT as an attacker is better off forcing the input to MX3 to be 0 (thereby enabling an attacker to write any value to M). However, if an attacker is going to go to the trouble of laser-cutting the chip (including all Tamper Detection tests and circuitry), there are better targets than allowing the possibility of a limited chosen-text attack by fixing the input of Mx3. ROR FIG. 191 illustrates a schematic block diagram of the ROR block of the ALU. The ROR unit is a component within the ALU. It is designed to implement the ROR functionality of the Authentication Chip. A 1-bit register named RTMP is contained within the ROR unit. RTMP is cleared to 0 on a RESET, and set during the ROR RB and ROR XRB commands. The RTMP register allows implementation of Linear Feedback Shift Registers with any tap configuration. The XOR block is a 2 single-bit input, 1-bit out XOR. The RORn, blocks are shown for clarity, but in fact would be hardwired into multiplexor MX3, since each block is simply a rewiring of the 32-bits, rotated right N bits. All 3 multiplexors (Mx1, MX2, and Mx3) depend upon the 8-bit CMD value. However, the bit patterns for the ROR op-code are arranged for logic optimization purposes. The bit patterns for the operands are listed again here since we will make use of the patterns: Operand CMD3-0 InBit 0000 OutBit 0001 RB 0010 XRB 0011 IST 0100 ISW 0101 MTRZ 0110 1 0111 2 1001 27 1010 31 1100 Logic1 is used to provide the WriteEnable signal to RTMP. The RTMP register should only be written to during ROR RB and ROR XRB commands. Logic2 is used to provide the control signal whenever the InBit is consumed. The two combinatorial logic blocks are: Logic1: Cycle AND (CMD7-4 = ROR) AND (CMD3-1 = 001) Logic2: Cycle AND (CMD7-0 = ROR InBit) With multiplexor MX1, we are selecting the bit to be stored in RTMP. Logic1 already narrows down the CMD inputs to one of RB and XRB. We can therefore simply test CMD0 to differentiate between the two. The following table expresses the relationship between CMD0 and the value output from MX1. Output CMD0 MX1 Acc0 0 XOR output 1 With multiplexor MX2, we are selecting which input bit is going to replace bit 0 of the Accumulator input. We can only perform a small amount of optimization here, since each different input bit typically relates to a specific operand. The following table expresses the relationship between CMD3-0 and the value output from MX2. Output CMD3-0 Comment MX2 Acc0 1xxx OR 111 1, 2, 27, 31 RTMP 001x RB, XRB InBit 000x InBit, OutBit MU0 010x IST, ISW MTRZ 110 MTRZ The final multiplexor, MX3, does the final rotating of the 32-bit value. Again, the bit patterns of the CMD operand are taken advantage of: Output CMD3-0 Comment MX3 ROR 1 0xxx All except 2, 27, and 31 ROR 2 1xx1 2 ROR 27 1x1x 27 ROR 31 11xx 31 MinTicks Unit FIG. 192 shows the data flow and relationship between components of the MinTicks Unit. The MinTicks Unit is responsible for a programmable minimum delay (via a countdown) between key-based operations within the Authentication Chip. The logic and registers contained in the MinTicksUnit must be covered by both Tamper Detection Lines. This is to ensure that an attacker cannot change the time between calls to key-based functions. Nearly all of the MinTicks Unit can be implemented with regular CMOS, since the key does not pass through most of this unit. However the Accumulator is used in the SET MTR instruction. Consequently this tiny section of circuitry must be implemented in non-flashing CMOS. The remainder of the MinTicks Unit does not have to be implemented with non-flashing CMOS. However, the MTRZ latch (see below) needs to be parity checked. The MinTicks Unit contains a 32-bit register named MTR (MinTicksRemaining). The MTR register contains the number of clock ticks remaining before the next key-based function can be called. Each cycle, the value in MTR is decremented by 1 until the value is 0. Once MTR hits 0, it does not decrement any further. An additional one-bit register named MTRZ (MinTicksRegisterZero) reflects the current zero-ness of the MTR register. MTRZ is 1 if the MTRZ register is 0, and MTRZ is 0 if the MTRZ register is not 0. The MTR register is cleared by a RESET, and set to a new count via the SET MTR command, which transfers the current value in the Accumulator into the MTR register. Where: Logic1 CMD = SET MTR And: Output Logic1 MTRZ MX1 Acc 1 — MTR-1 0 0 0 0 1 Since Cycle is connected to the WriteEnables of MTR and MTRZ, these registers only update during the Execute cycle, i.e. when Cycle =1. The two VAL units are validation units connected to the Tamper Prevention and Detection circuitry, each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. In the case of VAL1, the effective output from MTR is 0, which means that the output from the decrementor unit is all 1s, thereby causing MTRZ to remain 0, thereby preventing an attacker from using the key-based functions. VAL1 also validates the parity of the MTR register. If the parity check fails, the Erase Tamper Detection Line is triggered. In the case of VAL2, if the chip has been tampered with, the effective output from MTRZ will be 0, indicating that the MinTicksRemaining register has not yet reached 0, thereby preventing an attacker from using the key-based functions. Program Counter Unit FIG. 192 is a block diagram of the Program Counter Unit. The Program Counter Unit (PCU) includes the 9 bit PC (Program Counter), as well as logic for branching and subroutine control. The Program Counter Unit can be implemented with regular CMOS, since the key does not pass through this unit. It does not have to be implemented with non-flashing CMOS. However, the latches need to be parity-checked. In addition, the logic and registers contained in the Memory Unit must be covered by both Tamper Detection Lines to ensure that the PC cannot be changed by an attacker. The PC is actually implemented as a 6-level by 9-bit PCA (PC Array), indexed by the 3-bit SP (Stack Pointer) register. The PC and SP registers are all cleared to 0 on a RESET, and updated during the flow of program control according to the opcodes. The current value for the PC is output to the MU during Cycle 0 (the Fetch cycle). The PC is updated during Cycle 1 (the Execute cycle) according on the command being executed. In most cases, the PC simply increments by 1. However, when branching occurs (due to subroutine or some other form of jump), the PC is replaced by a new value. The mechanism for calculating the new PC value depends upon the opcode being processed. The ADD block is a simple adder modulo 29. The inputs are the PC value and either 1 (for incrementing the PC by 1) or a 9 bit offset (with hi bit set and lower 8 bits from the MU). The “+1” block takes a 3-bit input and increments it by 1 (with wrap). The “−1” block takes a 3-bit input and decrements it by 1 (with wrap). The different forms of PC control are as follows: Command Action JSR, Save old value of PC onto stack for later. JSI (ACC) New PC is 9 bit value where bit0 = 0 (subroutines must therefore start at an even address), and upper 8 bits of address come from MU (MU 8-bit value is Jump Table 1 for JSR, and Jump Table 2 for JSI) JSI RTS Pop old value of PC from stack and increment by 1 to get new PC. TBR If the Z flag matches the TRB test, replace PC by 9 bit value where bit0 = 0 and upper 8 bits come from MU. Otherwise increment current PC by 1. DBR C1, Add 9 bit offset (8 bit value from MU and hi bit = 1) to DBR C2 current PC only if the C1Z or C2Z is set (C1Z for DBR C1, C2Z for DBR C2). Otherwise increment current PC by 1. All others Increment current PC by 1. Since the same action takes place for JSR, and JSI (ACC), we specifically detect that case in Logic1. By the same concept, we can specifically test for the JSI RTS case in Logic2. Logic1 (CMD7-5 = 001) OR (CMD7-3 = 01001) Logic2 CMD7-3 = 01000 When updating the PC, we must decide if the PC is to be replaced by a completely new item, or by the result of the adder. This is the case for JSR and JSI (ACC), as well as TBR as long as the test bit matches the state of the Accumulator. All but TBR is tested for by Logic1, so Logic3 also includes the output of Logic1 as its input. The output from Logic3 is then used by multiplexors MX2 to obtain the new PC value. Logic3 Logic1 OR ((CMD7-4 = TBR) AND (CMD3 XOR Z)) Output Logic3 MX2 Output from Adder 0 Replacement value 1 The input to the 9-bit adder depends on whether we are incrementing by 1 (the usual case), or adding the offset as read from the MU (the DBR command). Logic4 generates the test. The output from Logic4 is then directly used by multiplexor MX3 accordingly. Logic4 ((CMD7-3 = DBR C1) AND C1Z) OR (CMD7-3 = DBR C2) AND C2Z)) Output Logic4 MX3 Output from Adder 0 Replacement value 1 Finally, the selection of which PC entry to use depends on the current value for SP. As we enter a subroutine, the SP index value must increment, and as we return from a subroutine, the SP index value must decrement. In all other cases, and when we want to fetch a command (Cycle 0), the current value for the SP must be used. Logic1 tells us when a subroutine is being entered, and Logic2 tells us when the subroutine is being returned from. The multiplexor selection is therefore defined as follows: Output Cycle/Logic1/Logic2 MX1 SP − 1 1x1 SP + 1 11x SP 0xx OR 00 The two VAL units are validation units connected to the Tamper Prevention and Detection circuitry), each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. Both VAL units also parity-check the data bits to ensure that they are valid. If the parity-check fails, the Erase Tamper Detection Line is triggered. In the case of VAL1, the effective output from the SP register will always be 0. If the chip has been tampered with. This prevents an attacker from executing any subroutines. In the case of VAL2, the effective PC output will always be 0 if the chip has been tampered with. This prevents an attacker from executing any program code. Memory Unit The Memory Unit (MU) contains the internal memory of the Authentication Chip. The internal memory is addressed by 9 bits of address, which is passed in from the Address Generator Unit. The Memory Unit outputs the appropriate 32-bit and 8-bit values according to the address. The Memory Unit is also responsible for the special Programming Mode, which allows input of the program Flash memory. The contents of the entire Memory Unit must be protected from tampering. Therefore the logic and registers contained in the Memory Unit must be covered by both Tamper Detection Lines. This is to ensure that program code, keys, and intermediate data values cannot be changed by an attacker. All Flash memory needs to be multi-state, and must be checked upon being read for invalid voltages. The 32-bit RAM also needs to be parity-checked. The 32-bit data paths through the Memory Unit must be implemented with non-flashing CMOS since the key passes along them. The 8-bit data paths can be implemented in regular CMOS since the key does not pass along them. Constants The Constants memory region has address range: 000000000-000001111. It is therefore the range 00000xxxx. However, given that the next 48 addresses are reserved, this can be taken advantage of during decoding. The Constants memory region can therefore be selected by the upper 3 bits of the address (Adr8-6=000), with the lower 4 bits fed into combinatorial logic, with the 4 bits mapping to 32-bit output values as follows: Adr3-0 Output Value 0000 0x00000000 0001 0x36363636 0010 0x5C5C5C5C 0011 0xFFFFFFFF 0100 0x5A827999 0101 0x6ED9EBA1 0110 0x8F1BBCDC 0111 0xCA62C1D6 1000 0x67452301 1001 0xEFCDAB89 1010 0x98BADCFE 1011 0x10325476 11xx 0xC3D2E1F0 RAM The address space for the 32 entry 32-bit RAM is 001000000-001011111. It is therefore the range 0010xxxxx. The RAM memory region can therefore be selected by the upper 4 bits of the address (Adr8-5=0010), with the lower 5 bits selecting which of the 32 values to address. Given the contiguous 32-entry address space, the RAM can easily be implemented as a simple 32×32-bit RAM. Although the CPU treats each address from the range 00000-11111 in special ways, the RAM address decoder itself treats no address specially. All RAM values are cleared to 0 upon a RESET, although any program code should not take this for granted. Flash Memory—Variables The address space for the 32-bit wide Flash memory is 001100000-001111111. It is therefore the range 0011xxxxx. The Flash memory region can therefore be selected by the upper 4 bits of the address (Adr8-5=0111), with the lower 5 bits selecting which value to address. The Flash memory has special requirements for erasure. It takes quite some time for the erasure of Flash memory to complete. The Wait signal is therefore set inside the Flash controller upon receipt of a CLR command, and is only cleared once the requested memory has been erased. Internally, the erase lines of particular memory ranges are tied together, so that only 2 bits are required as indicated by the following table: Adr4-3 Erases range 00 R0-4 01 MT, AM, K10-4, K20-4 10 Individual M address (Adr) 11 IST, ISW Flash values are unchanged by a RESET, although program code should not take the initial values for Flash (after manufacture) other than garbage. Operations that make use of Flash addresses are LD, ST, ADD, RPL, ROR, CLR, and SET. In all cases, the operands and the memory placement are closely linked, in order to minimize the address generation and decoding. The entire variable section of Flash memory is also erased upon entering Programming Mode, and upon detection of a definite physical Attack. Flash Memory—Program The address range for the 384 entry 8-bit wide program Flash memory is 010000000-111111111. It is therefore the range 01xxxxxxx-11xxxxxxx. Decoding is straightforward given the ROM start address and address range. Although the CPU treats parts of the address range in special ways, the address decoder itself treats no address specially. Flash values are unchanged by a RESET, and are cleared only by entering Programming Mode. After manufacture, the Flash contents must be considered to be garbage. The 384 bytes can only be loaded by the State machine when in Programming Mode. Block Diagram of MU FIG. 193 is a block diagram of the Memory Unit. The logic shown takes advantage of the fact that 32-bit data and 8-bit data are required by separate commands, and therefore fewer bits are required for decoding. As shown, 32-bit output and 8-bit output are always generated. The appropriate components within the remainder of the Authentication Chip simply use the 32-bit or 8-bit value depending on the command being executed. Multiplexor MX1, selects the 32-bit output from a choice of Truth Table constants, RAM, and Flash memory. Only 2 bits are required to select between these 3 outputs, namely Adr6 and Adr5. Thus MX2 takes the following form: Output Adr6-5 MX2 Output from 32-bit Truth Table 00 Output from 32-bit Flash memory 10 Output from 32-bit RAM 11 The logic for erasing a particular part of the 32-bit Flash memory is satisfied by Logic1. The Erase Part control signal should only be set during a CLR command to the correct part of memory while Cycle=1. Note that a single CLR command may clear a range of Flash memory. Adr6 is sufficient as an address range for CLR since the range will always be within Flash for valid operands, and 0 for non-valid operands. The entire range of 32-bit wide Flash memory is erased when the Erase Detection Lines is triggered (either by an attacker, or by deliberately entering Programming Mode). Logic1 Cycle AND (CMD7-4 = CLR) AND Adr6 The logic for writing to a particular part of Flash memory is satisfied by Logic2. The WriteEnable control signal should only be set during an appropriate ST command to a Flash memory range while Cycle=1. Testing only Adr6-5 is acceptable since the ST command only validly writes to Flash or RAM (if Adr6-5 is 00, K2MX must be 0). Logic2 Cycle AND (CMD7-4 = ST) AND (Adr6-5 = 10) The WE (WriteEnable) flag is set during execution of the SET WE and CLR WE commands. Logic3 tests for these two cases. The actual bit written to WE is CMD4. Logic3 Cycle AND (CMD7-5 = 011) AND (CMD3-0 = 0000) The logic for writing to the RAM region of memory is satisfied by Logic4. The WriteEnable control signal should only be set during an appropriate ST command to a RAM memory range while Cycle=1. However this is tempered by the WE flag, which governs whether writes to X[N] are permitted. The X[N] range is the upper half of the RAM, so this can be tested for using Adr4. Testing only Adr6-5 as the full address range of RAM is acceptable since the ST command only writes to Flash or RAM. Logic4 Cycle AND (CMD7-4 = ST) AND (Adr6-5 = 11) AND ((Adr4 AND WE) OR (˜Adr4)) The three VAL units are validation units connected to the Tamper Prevention and Detection circuitry, each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. The VAL units also check the data bits to ensure that they are valid. VAL1 and VAL2 validate by checking the state of each data bit, and VAL3 performs a parity check. If any validity test fails, the Erase Tamper Detection Line is triggered. In the case of VAL2, the effective output from the program Flash will always be 0 (interpreted as TBR 0) if the chip has been tampered with. This prevents an attacker from executing any useful instructions. In the case of VAL2, the effective 32-bit output will always be 0 if the chip has been tampered with. Thus no key or intermediate storage value is available to an attacker. The 8-bit Flash memory is used to hold the program code, jump tables and other program information. The 384 bytes of Program Flash memory are selected by the full 9 bits of address (using address range 01xxxxxxx-11xxxxxxx). The Program Flash memory is erased only when the Erase Detection Lines is triggered (either by an attacker, or by entering Programming Mode due to the Programming Mode Detection Unit). When the Erase Detection Line is triggered, a small state machine in the Program Flash Memory Unit erases the 8-bit Flash memory, validates the erasure, and loads in the new contents (384 bytes) from the serial input. The following pseudocode illustrates the state machine logic that is executed when the Erase Detection line is triggered: Set WAIT output bit to prevent the remainder of the chip from functioning Fix 8-bit output to be 0 Erase all 8-bit Flash memory Temp 0 For Adr = 0 to 383 Temp Temp OR FlashAdr IF (Temp ≠ 0) Hang For Adr = 0 to 383 Do 8 times Wait for InBitValid to be set ShiftRight[Temp, InBit] Set InBitUsed control signal FlashAdr Temp Hang During the Programming Mode state machine execution, 0 must be placed onto the 8-bit output. A 0 command causes the remainder of the Authentication chip to interpret the command as a TBR 0. When the chip has read all 384 bytes into the Program Flash Memory, it hangs (loops indefinitely). The Authentication Chip can then be reset and the program used normally. Note that the erasure is validated by the same 8-bit register that is used to load the new contents of the 8-bit program Flash memory. This helps to reduce the chances of a successful attack, since program code can't be loaded properly if the register used to validate the erasure is destroyed by an attacker. In addition, the entire state machine is protected by both Tamper Detection lines. Address Generator Unit The Address Generator Unit generates effective addresses for accessing the Memory Unit (MU). In Cycle 0, the PC is passed through to the MU in order to fetch the next opcode. The Address Generator interprets the returned opcode in order to generate the effective address for Cycle 1. In Cycle 1, the generated address is passed to the MU. The logic and registers contained in the Address Generator Unit must be covered by both Tamper Detection Lines. This is to ensure that an attacker cannot alter any generated address. Nearly all of the Address Generator Unit can be implemented with regular CMOS, since the key does not pass through most of this unit. However 5 bits of the Accumulator are used in the JSI Address generation. Consequently this tiny section of circuitry must be implemented in non-flashing CMOS. The remainder of the Address Generator Unit does not have to be implemented with non-flashing CMOS. However, the latches for the counters and calculated address should be parity-checked. If either of the Tamper Detection Lines is broken, the Address Generator Unit will generate address 0 each cycle and all counters will be fixed at 0. This will only come into effect if an attacker has disabled the RESET and/or erase circuitry, since under normal circumstances, breaking a Tamper Detection Line will result in a RESET or the erasure of all Flash memory. Background to Address Generation The logic for address generation requires an examination of the various opcodes and operand combinations. The relationship between opcode/operand and address is examined in this section, and is used as the basis for the Address Generator Unit. Constants The lower 4 entries are the simple constants for general-purpose use as well as the HMAC algorithm. The lower 4 bits of the LDK operand directly correspond to the lower 3 bits of the address in memory for these 4 values, i.e. 0000, 0001, 0010, and 0011 respectively. The y constants and the h constants are also addressed by the LDK command. However the address is generated by ORing the lower 3 bits of the operand with the inverse of the C1 counter value, and keeping the 4th bit of the operand intact. Thus for LDK y, the y operand is 0100, and with LDK h, the h operand is 1000. Since the inverted C1 value takes on the range 000-011 for y, and 000-100 for h, the ORed result gives the exact address. For all constants, the upper 5 bits of the final address are always 00000. RAM Variables A-T have addresses directly related to the lower 3 bits of their operand values. That is, for operand values 0000-0101 of the LD, ST, ADD, LOG, and XOR commands, as well as operand vales 1000-1101 of the LOG command, the lower 3 operand address bits can be used together with a constant high 6-bit address of 001000 to generate the final address. The remaining register values can only be accessed via an indexed mechanism. Variables A-E, B160, and H are only accessible as indexed by the C1 counter value, while X is indexed by N1, N2, N3, and N4. With the LD, ST and ADD commands, the address for AE as indexed by C1 can be generated by taking the lower 3 bits of the operand (000) and ORing them with the C1 counter value. However, H and B160 addresses cannot be generated in this way, (otherwise the RAM address space would be non-contiguous). Therefore simple combinatorial logic must convert AE into 0000, H into 0110, and B160 into 1011. The final address can be obtained by adding C1 to the 4-bit value (yielding a 4-bit result), and prepending the constant high 5-bit address of 00100. Finally, the X range of registers is only accessed as indexed by N1, N2, N3, and N4. With the XOR command, any of N1-4 can be used to index, while with LD, ST, and ADD, only N4 can be used. Since the operand of X in LD, ST, and ADD is the same as the XN4 operand, the lower 2 bits of the operand selects which N to use. The address can thus be generated as a constant high 5-bit value of 00101, with the lower 4 bits coming from by the selected N counter. Flash Memory—Variables The addresses for variables MT and AM can be generated from the operands of associated commands. The 4 bits of operand can be used directly (0110 and 0111), and prepending the constant high 5-bit address of 00110. Variables R1-5, K11-5, K21-5, and M0-7 are only accessible as indexed by the inverse of the C1 counter value (and additionally in the case of R, by the actual C1 value). Simple combinatorial logic must convert R and RF into 00000, K into 01000 or 1000 depending on whether K1 or K2 is being addressed, and M (including MHI and MLO) into 10000. The final address can be obtained by ORing (or adding) C1 (or in the case of RF, using C1 directly) with the 5-bit value, and prepending the constant high 4-bit address of 0011. Variables IST and ISW are each only 1 bit of value, but can be implemented by any number of bits. Data is read and written as either 0x00000000 or 0xFFFFFFFF. They are addressed only by ROR, CLR and SET commands. In the case of ROR, the low bit of the operand is combined with a constant upper 8-bits value of 00111111, yielding 001111110 and 001111111 for IST and ISW respectively. This is because none of the other ROR operands make use of memory, so in cases other than IST and ISW, the value returned can be ignored. With SET and CLR, IST and ISW are addressed by combining a constant upper 4-bits of 0011 with a mapping from IST (0100) to 11110 and from ISW (0101) to 11111. Since IST and ISW share the same operand values with E and T from RAM, the same decoding logic can be used for the lower 5 bits. The final address requires bits 4, 3, and 1 to be set (this can be done by ORing in the result of testing for operand values 010x). Flash Memory—Program The address to lookup in program Flash memory comes directly from the 9-bit PC (in Cycle 0) or the 9-bit Adr register (in Cycle 1). Commands such as TBR, DBR, JSR and JSI modify the PC according to data stored in tables at specific addresses in the program memory. As a result, address generation makes use of some constant address components, with the command operand (or the Accumulator) forming the lower bits of the effective address: Constant (upper) Variable (lower) Command Address Range part of address part of address TBR 010000xxx 010000 CMD2-0 JSR 0100xxxxx 0100 CMD4-0 JSI ACC 0101xxxxx 0101 Acc4-0 DBR 011000xxx 011000 CMD2-0 Block Diagram of Address Generator Unit FIG. 194 shows a schematic block diagram for the Address Generator Unit. The primary output from the Address Generator Unit is selected by multiplexor MX1, as shown in the following table: Output Cycle MX1 PC 0 Adr 1 It is important to distinguish between the CMD data and the 8-bit data from the MU: In Cycle 0, the 8-bit data line holds the next instruction to be executed in the following Cycle 1. This 8-bit command value is used to decode the effective address. By contrast, the CMD 8-bit data holds the previous instruction, so should be ignored. In Cycle 1, the CMD line holds the currently executing instruction (which was in the 8-bit data line during Cycle 0), while the 8-bit data line holds the data at the effective address from the instruction. The CMD data must be executed during Cycle 1. Consequently, the choice of 9-bit data from the MU or the CMD value is made by multiplexor MX3, as shown in the following table: Output Cycle MX3 8-bit data from MU 0 CMD 1 Since the 9-bit Adr register is updated every Cycle 0, the WriteEnable of Adr is connected to ˜Cycle. The Counter Unit generates counters C1, C2 (used internally) and the selected N index. In addition, the Counter Unit outputs flags C1 Z and C2 Z for use by the Program Counter Unit. The various *GEN units generate addresses for particular command types during Cycle 0, and multiplexor MX2 selects between them based on the command as read from program memory via the PC (i.e. the 8-bit data line). The generated values are as follows: Block Commands for which address is generated JSIGEN JSI ACC JSRGEN JSR, TBR DBRGEN DBR LDKGEN LDK RPLGEN RPL VARGEN LD, ST, ADD, LOG, XOR BITGEN ROR, SET CLRGEN CLR Multiplexor MX2 has the following selection criteria: Output 8-bit data value from MU MX2 9-bit value from JSIGEN 01001xxx 9-bit value from JSRGEN 001xxxxx OR 0000xxxx 9-bit value from DBRGEN 0001xxxx 9-bit value from LDKGEN 1110xxxx 9 bit value from RPLGEN 1101xxxx 9-bit value from VARGEN 10xxxxxx OR 1x11xxxx 9-bit value from BITGEN 0111xxxx OR 1100xxxx 9 bit value from CLRGEN 0110xxxx The VAL1 unit is a validation unit connected to the Tamper Prevention and Detection circuitry. It contains an OK bit that is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with the 9 bits of Effective Address before they can be used. If the chip has been tampered with, the address output will be always 0, thereby preventing an attacker from accessing other parts of memory. The VAL1 unit also performs a parity check on the Effective Address bits to ensure it has not been tampered with. If the parity-check fails, the Erase Tamper Detection Line is triggered. JSIGEN FIG. 195 shows a schematic block diagram for the JSIGEN Unit. The JSIGEN Unit generates addresses for the JSI ACC instruction. The effective address is simply the concatenation of: the 4-bit high part of the address for the JSI Table (0101) and the lower 5 bits of the Accumulator value. Since the Accumulator may hold the key at other times (when a jump address is not being generated), the value must be hidden from sight. Consequently this unit must be implemented with non-flashing CMOS. The multiplexor MX1 simply chooses between the lower 5 bits from Accumulator or 0, based upon whether the command is JSIGEN. Multiplexor MX1 has the following selection criteria: Output CMD7-0 MX1 Accumulator4-0 JSI ACC 00000 ˜(JSI ACC) JSRGEN FIG. 196 shows a schematic block diagram for the JSRGEN Unit. The JSRGEN Unit generates addresses for the JSR and TBR instructions. The effective address comes from the concatenation of: the 4-bit high part of the address for the JSR table (0100), the offset within the table from the operand (5 bits for JSR commands, and 3 bits plus a constant 0 bit for TBR). where Logic1 produces bit 3 of the effective address. This bit should be bit 3 in the case of JSR, and 0 in the case of TBR: Logic1 bit5 AND bit3 Since the JSR instruction has a 1 in bit 5, (while TBR is 0 for this bit) ANDing this with bit 3 will produce bit 3 in the case of JSR, and 0 in the case of TBR. DBRGEN FIG. 197 shows a schematic block diagram for the DBRGEN Unit. The DBRGEN Unit generates addresses for the DBR instructions. The effective address comes from the concatenation of: the 6-bit high part of the address for the DBR table (011000), and the lower 3 bits of the operand LDKGEN FIG. 198 shows a schematic block diagram for the LDKGEN Unit. The LDKGEN Unit generates addresses for the LDK instructions. The effective address comes from the concatenation of: the 5-bit high part of the address for the LDK table (00000), the high bit of the operand, and the lower 3 bits of the operand (in the case of the lower constants), or the lower 3 bits of the operand ORed with C1 (in the case of indexed constants). The OR2 block simply ORs the 3 bits of C1 with the 3 lowest bits from the 8-bit data output from the MU. The multiplexor MX1 simply chooses between the actual data bits and the data bits ORed with C1, based upon whether the upper bits of the operand are set or not. The selector input to the multiplexor is a simple OR gate, ORing bit2 with bit3. Multiplexor MX1 has the following selection criteria: Output bit3 OR bit2 MX1 bit2-0 0 Output from OR block 1 RPLGEN FIG. 199 shows a schematic block diagram for the RPLGEN Unit. The RPLGEN Unit generates addresses for the RPL instructions. When K2MX is 0, the effective address is a constant 000000000. When K2MX is 1 (indicating reads from M return valid values), the effective address comes from the concatenation of: the 6-bit high part of the address for M (001110), and the 3 bits of the current value for C1 The multiplexor MX1 chooses between the two addresses, depending on the current value of K2MX. Multiplexor MX1 therefore has the following selection criteria: Output K2MX MX1 000000000 0 001110|C1 1 VARGEN FIG. 200 shows a schematic block diagram for the VARGEN Unit. The VARGEN Unit generates addresses for the LD, ST, ADD, LOG, and XOR instructions. The K2MX 1-bit flag is used to determine whether reads from M are mapped to the constant 0 address (which returns 0 and cannot be written to), and which of K1 and K2 is accessed when the operand specifies K. The 4-bit Adder block takes 2 sets of 4-bit inputs, and produces a 4-bit output via addition modulo 24. The single bit register K2MX is only ever written to during execution of a CLR K2MX or a SET K2MX instruction. Logic1 sets the K2MX WriteEnable based on these conditions: Logic1 Cycle AND bit7-0 = 011x0001 The bit written to the K2MX variable is 1 during a SET instruction, and 0 during a CLR instruction. It is convenient to use the low order bit of the opcode (bit4) as the source for the input bit. During address generation, a Truth Table implemented as combinatorial logic determines part of the base address as follows: bit7-4 bit3-0 Description Output Value LOG x A, B, C, D, E, T, MT, AM 00000 ≠ LOG 0xxx OR 1x00 A, B, C, D, E, T, MT, AM, 00000 AE[C1], R[C1] ≠ LOG 1001 B160 01011 ≠ LOG 1010 H 00110 ≠ LOG 111x X, M 10000 ≠ LOG 1101 K K2MX|1000 Although the Truth Table produces 5 bits of output, the lower 4 bits are passed to the 4-bit Adder, where they are added to the index value (C1, N or the lower 3 bits of the operand itself). The highest bit passes the adder, and is prepended to the 4-bit result from the adder result in order to produce a 5-bit result. The second input to the adder comes from multiplexor MX1, which chooses the index value from C1, N, and the lower 3 bits of the operand itself). Although C1 is only 3 bits, the fourth bit is a constant 0. Multiplexor MX1 has the following selection criteria: Output bit7-0 MX1 Data2-0 (bit3 = 0) OR (bit7-4 = LOG) C1 (bit3 = 1) AND (bit2-0 ≠ 111) AND ((bit7-4 = 1x11) OR (bit7-4 = ADD)) N ((bit3 = 1) AND (bit7-4 = XOR)) OR (((bit7-4 = 1x11) OR (bit7-4 = ADD)) AND (bit3-0 = 1111)) The 6th bit (bit5) of the effective address is 0 for RAM addresses, and 1 for Flash memory addresses. The Flash memory addresses are MT, AM, R, K, and M. The computation for bit5 is provided by Logic2: Logic2 ((bit3-0 = 110) OR (bit3-0 = 011x) OR (bit3-0 = 110x)) AND ((bit7-4 = 1x11) OR (bit7-4 = ADD)) A constant 1 bit is prepended, making a total of 7 bits of effective address. These bits will form the effective address unless K2MX is 0 and the instruction is LD, ADD or ST M[C1]. In the latter case, the effective address is the constant address of 0000000. In both cases, two 0 bits are prepended to form the final 9-bit address. The computation is shown here, provided by Logic3 and multiplexor MX2. Logic3 ˜ K2MX AND (bit3-0 = 1110) AND ((bit7-4 = 1x11) OR (bit7-4 = ADD)) Output Logic3 MX2 Calculated bits 0 0000000 1 CLRGEN. FIG. 201 shows a schematic block diagram for the CLRGEN Unit. The CLRGEN Unit generates addresses for the CLR instruction. The effective address is always in Flash memory for valid memory accessing operands, and is 0 for invalid operands. The CLR M[C1] instruction always erases M[C1], regardless of the status of the K2MX flag (kept in the VARGEN Unit). The Truth Table is simple combinatorial logic that implements the following relationship: Input Value (bit3-0) Output Value 1100 00 1100 000 1101 00 1101 000 1110 00 1110|C1 1111 00 1111 110 ˜(11xx) 000000000 It is a simple matter to reduce the logic required for the Truth Table since in all 4 main cases, the first 6 bits of the effective address are 00 followed by the operand (bits3-0). BITGEN FIG. 202 shows a schematic block diagram for the BITGEN Unit. The BITGEN Unit generates addresses for the ROR and SET instructions. The effective address is always in Flash memory for valid memory accessing operands, and is 0 for invalid operands. Since ROR and SET instructions only access the IST and ISW Flash memory addresses (the remainder of the operands access registers), a simple combinatorial logic Truth Table suffices for address generation: Input Value (bit3-0) Output Value 010x 00111111|bit0 ˜(010x) 000000000 Counter Unit Fig. Y37 shows a schematic block diagram for the Counter Unit. The Counter Unit generates counters C1, C2 (used internally) and the selected N index. In addition, the Counter Unit outputs flags C1 Z and C2 Z for use externally. Registers C1 and C2 are updated when they are the targets of a DBR or SC instruction. The high bit of the operand (bit3 of the effective command) gives the selection between C1 and C2. Logic1 and Logic2 determine the WriteEnables for C1 and C2 respectively. Logic1 Cycle AND (bit7-3 = 0x010) Logic2 Cycle AND (bit7-3 = 0x011) The single bit flags C1Z and C2 Z are produced by the NOR of their multibit C1 and C2 counterparts. Thus C1Z is 1 if C1=0, and C2 Z is 1 if C2=0. During a DBR instruction, the value of either C1 or C2 is decremented by 1 (with wrap). The input to the Decrementor unit is selected by multiplexor MX2 as follows: Output bit3 MX2 C1 0 C2 1 The actual value written to C1 or C2 depends on whether the DBR or SC instruction is being executed. Multiplexor MX1 selects between the output from the Decrementor (for a DBR instruction), and the output from the Truth Table (for a SC instruction). Note that only the lowest 3 bits of the 5-bit output are written to C1. Multiplexor MX1 therefore has the following selection criteria: Output bit6 MX1 Output from Truth Table 0 Output from Decrementor 1 The Truth Table holds the values to be loaded by C1 and C2 via the SC instruction. The Truth Table is simple combinatorial logic that implements the following relationship: Input Output Value (bit2-0) Value 000 00010 001 00011 010 00100 011 00111 100 01010 101 01111 110 10011 111 11111 Registers N1, N2, N3, and N4 are updated by their next value—1 (with wrap) when they are referred to by the XOR instruction. Register N4 is also updated when a ST X[N4] instruction is executed. LD and ADD instructions do not update N4. In addition, all 4 registers are updated during a SET Nx command. Logic4-7 generate the WriteEnables for registers N1-N4. All use Logic3, which produces a 1 if the command is SET Nx, or 0 otherwise. Logic3 bit7-0 = 01110010 Logic4 Cycle AND ((bit7-0 = 10101000) OR Logic3) Logic5 Cycle AND ((bit7-0 = 10101001) OR Logic3) Logic6 Cycle AND ((bit7-0 = 10101010) OR Logic3) Logic7 Cycle AND ((bit7-0 = 11111011) OR (bit7-0 = 10101011) OR Logic3) The actual N index value passed out, or used as the input to the Decrementor, is simply selected by multiplexor MX4 using the lower 2 bits of the operand: Output bit1-0 MX4 N1 00 N2 01 N3 10 N4 11 The Incrementor takes 4 bits of input value (selected by multiplexor MX4) and adds 1, producing a 4-bit result (due to addition modulo 24). Finally, four instances of multiplexor MX3 select between a constant value (different for each N, and to be loaded during the SET Nx command), and the result of the Decrementor (during XOR or ST instructions). The value will only be written if the appropriate WriteEnable flag is set (see Logic4-Logic7), so Logic3 can safely be used for the multiplexor. Output Logic3 MX3 Output from Decrementor 0 Constant value 1 The SET Nx command loads N1-N4 with the following constants: Constant Initial X[N] Index Loaded referred to N1 2 X[13] N2 7 X[8] N3 13 X[2] N4 15 X[0] Note that each initial X[Nn] referred to matches the optimized SHA-1 algorithm initial states for indexes N1-N4. When each index value Nn decrements, the effective X[N] increments. This is because the X words are stored in memory with most significant word first. The three VAL units are validation units connected to the Tamper Prevention and Detection circuitry, each with an OK bit. The OK bit is set to 1 on RESET, and ORed with the ChipOK values from both Tamper Detection Lines each cycle. The OK bit is ANDed with each data bit that passes through the unit. All VAL units also parity check the data to ensure the counters have not been tampered with. If a parity check fails, the Erase Tamper Detection Line is triggered. In the case of VAL1, the effective output from the counter C1 will always be 0 if the chip has been tampered with. This prevents an attacker from executing any looping constructs that index through the keys. In the case of VAL2, the effective output from the counter C2 will always be 0 if the chip has been tampered with. This prevents an attacker from executing any looping constructs. In the case of VAL3, the effective output from any N counter (N1-N4) will always be 0 if the chip has been tampered with. This prevents an attacker from executing any looping constructs that index through X. Turning now to FIG. 203, there is illustrated 705 the information stored within the flash memory store 701. This data can include the following: Factory Code The factory code is a 16 bit code indicating the factory at which the print roll was manufactured. This identifies factories belonging to the owner of the print roll technology, or factories making print rolls under license. The purpose of this number is to allow the tracking of factory that a print roll came from, in case there are quality problems. Batch Number The batch number is a 32 bit number indicating the manufacturing batch of the print roll. The purpose of this number is to track the batch that a print roll came from, in case there are quality problems. Serial Number A 48 bit serial number is provided to allow unique identification of each print roll up to a maximum of 280 trillion print rolls. Manufacturing Date A 16 bit manufacturing date is included for tracking the age of print rolls, in case the shelf life is limited. Media Length The length of print media remaining on the roll is represented by this number. This length is represented in small units such as millimeters or the smallest dot pitch of printer devices using the print roll and to allow the calculation of the number of remaining photos in each of the well known C, H, and P formats, as well as other formats which may be printed. The use of small units also ensures a high resolution can be used to maintain synchronization with pre-printed media. Media Type The media type datum enumerates the media contained in the print roll. (1) Transparent (2) Opaque white (3) Opaque tinted (4) 3D lenticular (5) Pre-printed: length specific (6) Pre-printed: not length specific (7) Metallic foil (8) Holographic/optically variable device foil Pre-Printed Media Length The length of the repeat pattern of any pre-printed media contained, for example on the back surface of the print roll is stored here. Ink Viscosity The viscosity of each ink color is included as an 8 bit number. the ink viscosity numbers can be used to adjust the print head actuator characteristics to compensate for viscosity (typically, a higher viscosity will require a longer actuator pulse to achieve the same drop volume). Recommended Drop Volume for 1200 dpi The recommended drop volume of each ink color is included as an 8 bit number. The most appropriate drop volume will be dependent upon the ink and print media characteristics. For example, the required drop volume will decrease with increasing dye concentration or absorptivity. Also, transparent media require around twice the drop volume as opaque white media, as light only passes through the dye layer once for transparent media. As the print roll contains both ink and media, a custom match can be obtained. The drop volume is only the recommended drop volume, as the printer may be other than 1200 dpi, or the printer may be adjusted for lighter or darker printing. Ink Color The color of each of the dye colors is included and can be used to “fine tune” the digital half toning that is applied to any image before printing. Remaining Media Length Indicator The length of print media remaining on the roll is represented by this number and is updatable by the camera device. The length is represented in small units (eg. 1200 dpi pixels) to allow calculation of the number of remaining photos in each of C, H, and P formats, as well as other formats which may be printed. The high resolution can also be used to maintain synchronization with pre-printed media. Copyright or Bit Pattern This 512 bit pattern represents an ASCII character sequence sufficient to allow the contents of the flash memory store to be copyrightable. Turning now to FIG. 204, there is illustrated the storage table 730 of the Artcam authorization chip. The table includes manufacturing code, batch number and serial number and date which have an identical format to that previously described. The table 730 also includes information 731 on the print engine within the Artcam device. The information stored can include a print engine type, the DPI resolution of the printer and a printer count of the number of prints produced by the printer device. Further, an authentication test key 710 is provided which can randomly vary from chip to chip and is utilised as the Artcam random identification code in the previously described algorithm. The 128 bit print roll authentication key 713 is also provided and is equivalent to the key stored within the print rolls. Next, the 512 bit pattern is stored followed by a 120 bit spare area suitable for Artcam use. As noted previously, the Artcam preferably includes a liquid crystal display 15 which indicates the number of prints left on the print roll stored within the Artcam. Further, the Artcam also includes a three state switch 17 which allows a user to switch between three standard formats C H and P (classic, HDTV and panoramic). Upon switching between the three states, the liquid crystal display 15 is updated to reflect the number of images left on the print roll if the particular format selected is used In order to correctly operate the liquid crystal display, the Artcam processor, upon the insertion of a print roll and the passing of the authentication test reads the from the flash memory store of the print roll chip 53 and determines the amount of paper left. Next, the value of the output format selection switch 17 is determined by the Artcam processor. Dividing the print length by the corresponding length of the selected output format the Artcam processor determines the number of possible prints and updates the liquid crystal display 15 with the number of prints left. Upon a user changing the output format selection switch 17 the Artcam processor 31 re-calculates the number of output pictures in accordance with that format and again updates the LCD display 15. The storage of process information in the printer roll table 705 (FIG. 165) also allows the Artcam device to take advantage of changes in process and print characteristics of the print roll. In particular, the pulse characteristics applied to each nozzle within the print head can be altered to take into account of changes in the process characteristics. Turning now to FIG. 205, the Artcam Processor can be adapted to run a software program stored in an ancillary memory ROM chip. The software program, a pulse profile characteriser 771 is able to read a number of variables from the printer roll. These variables include the remaining roll media on printer roll 772, the printer media type 773, the ink color viscosity 774, the ink color drop volume 775 and the ink color 776. Each of these variables are read by the pulse profile characteriser and a corresponding, most suitable pulse profile is determined in accordance with prior trial and experiment. The parameters alters the printer pulse received by each printer nozzle so as to improve the stability of ink output. It will be evident that the authorization chip includes significant advances in that important and valuable information is stored on the printer chip with the print roll. This information can include process characteristics of the print roll in question in addition to information on the type of print roll and the amount of paper left in the print roll. Additionally, the print roll interface chip can provide valuable authentication information and can be constructed in a tamper proof manner. Further, a tamper resistant method of utilising the chip has been provided. The utilization of the print roll chip also allows a convenient and effective user interface to be provided for an immediate output form of Artcam device able to output multiple photographic formats whilst simultaneously able to provide an indicator of the number of photographs left in the printing device. Print Head Unit Turning now to FIG. 206, there is illustrated an exploded perspective view, partly in section, of the print head unit 615 of FIG. 162. The print head unit 615 is based around the print-head 44 which ejects ink drops on demand on to print media 611 so as to form an image. The print media 611 is pinched between two set of rollers comprising a first set 618, 616 and second set 617, 619. The print-head 44 operates under the control of power, ground and signal lines 810 which provides power and control for the print-head 44 and are bonded by means of Tape Automated Bonding (TAB) to the surface of the print-head 44. Importantly, the print-head 44 which can be constructed from a silicon wafer device suitably separated, relies upon a series of anisotropic etches 812 through the wafer having near vertical side walls. The through wafer etches 812 allow for the direct supply of ink to the print-head surface from the back of the wafer for subsequent ejection. The ink is supplied to the back of the inkjet print-head 44 by means of ink-head supply unit 814. The inkjet print-head 44 has three separate rows along its surface for the supply of separate colors of ink. The ink-head supply unit 814 also includes a lid 815 for the sealing of ink channels. In FIG. 207 to FIG. 210, there is illustrated various perspective views of the ink-head supply unit 814. Each of FIG. 207 to FIG. 210 illustrate only a portion of the ink head supply unit which can be constructed of indefinite length, the portions shown so as to provide exemplary details. In FIG. 207 there is illustrated a bottom perspective view, FIG. 148 illustrates a top perspective view, FIG. 209 illustrates a close up bottom perspective view, partly in section, FIG. 210 illustrates a top side perspective view showing details of the ink channels, and FIG. 211 illustrates a top side perspective view as does FIG. 212. There is considerable cost advantage in forming ink-head supply unit 814 from injection molded plastic instead of, say, micromachined silicon. The manufacturing cost of a plastic ink channel will be considerably less in volume and manufacturing is substantially easier. The design illustrated in the accompanying Figures assumes a 1600 dpi three color monolithic print head, of a predetermined length. The provided flow rate calculations are for a 100 mm photo printer. The ink-head supply unit 814 contains all of the required fine details. The lid 815 (FIG. 206) is permanently glued or ultrasonically welded to the ink-head supply unit 814 and provides a seal for the ink channels. Turning to FIG. 209, the cyan, magenta and yellow ink flows in through ink inlets 820-822, the magenta ink flows through the throughholes 824, 825 and along the magenta main channels 826, 827 (FIG. 141). The cyan ink flows along cyan main channel 830 and the yellow ink flows along the yellow main channel 831. As best seen from FIG. 209, the cyan ink in the cyan main channels then flows into a cyan sub-channel 833. The yellow subchannel 834 similarly receiving yellow ink from the yellow main channel 831. As best seen in FIG. 210, the magenta ink also flows from magenta main channels 826, 827 through magenta throughholes 836, 837. Returning again to FIG. 209, the magenta ink flows out of the throughholes 836, 837. The magenta ink flows along first magenta subchannel e.g. 838 and then along second magenta subchannel e.g. 839 before flowing into a magenta trough 840. The magenta ink then flows through magenta vias e.g. 842 which are aligned with corresponding inkjet head throughholes (e.g. 812 of FIG. 166) wherein they subsequently supply ink to inkjet nozzles for printing out. Similarly, the cyan ink within the cyan subchannel 833 flows into a cyan pit area 849 which supplies ink two cyan vias 843, 844. Similarly, the yellow subchannel 834 supplies yellow pit area 46 which in turn supplies yellow vias 847, 848. As seen in FIG. 210, the print-head is designed to be received within print-head slot 850 with the various vias e.g. 851 aligned with corresponding through holes eg. 851 in the print-head wafer. Returning to FIG. 206, care must be taken to provide adequate ink flow to the entire print-head chip 44, while satisfying the constraints of an injection moulding process. The size of the ink through wafer holes 812 at the back of the print head chip is approximately 100 μm×50 μm, and the spacing between through holes carrying different colors of ink is approximately 170 μm. While features of this size can readily be molded in plastic (compact discs have micron sized features), ideally the wall height must not exceed a few times the wall thickness so as to maintain adequate stiffness. The preferred embodiment overcomes these problems by using hierarchy of progressively smaller ink channels. In FIG. 211, there is illustrated a small portion 870 of the surface of the print-head 44. The surface is divided into 3 series of nozzles comprising the cyan series 871, the magenta series 872 and the yellow series 873. Each series of nozzles is further divided into two rows eg. 875, 876 with the print-head 44 having a series of bond pads 878 for bonding of power and control signals. The print head is preferably constructed in accordance with a large number of different forms of ink jet invented for uses including Artcam devices. These inkjet devices are discussed in further detail hereinafter. The print-head nozzles include the ink supply channels 880, equivalent to anisotropic etch hole 812 of FIG. 206. The ink flows from the back of the wafer through supply channel 881 and in turn through the filter grill 882 to ink nozzle chambers eg. 883. The operation of the nozzle chamber 883 and print-head 44 (FIG. 1) is, as mentioned previously, described in the abovementioned patent specification. Ink Channel Fluid Flow Analysis Turning now to an analysis of the ink flow, the main ink channels 826, 827, 830, 831 (FIG. 207, FIG. 141) are around 1 mm×1 mm, and supply all of the nozzles of one color. The sub-channels 833, 834, 838, 839 (FIG. 209) are around 200 m×100 μm and supply about 25 inkjet nozzles each. The print head through holes 843, 844, 847, 848 and wafer through holes eg. 881 (FIG. 211) are 100 μm×50 μm and, supply 3 nozzles at each side of the print head through holes. Each nozzle filter 882 has 8 slits, each with an area of 20 μm×2 μm and supplies a single nozzle. An analysis has been conducted of the pressure requirements of an ink jet printer constructed as described. The analysis is for a 1,600 dpi three color process print head for photograph printing. The print width was 100 mm which gives 6,250 nozzles for each color, giving a total of 18,750 nozzles. The maximum ink flow rate required in various channels for full black printing is important. It determines the pressure drop along the ink channels, and therefore whether the print head will stay filled by the surface tension forces alone, or, if not, the ink pressure that is required to keep the print head full. To calculate the pressure drop, a drop volume of 2.5 pl for 1,600 dpi operation was utilized. While the nozzles may be capable of operating at a higher rate, the chosen drop repetition rate is 5 kHz which is suitable to print a 150 mm long photograph in an little under 2 seconds. Thus, the print head, in the extreme case, has a 18,750 nozzles, all printing a maximum of 5,000 drops per second. This ink flow is distributed over the hierarchy of ink channels. Each ink channel effectively supplies a fixed number of nozzles when all nozzles are printing. The pressure drop Δρ was calculated according to the Darcy-Weisbach formula: Δ ⁢ ρ = ρ ⁢ ⁢ U 2 ⁢ f ⁢ ⁢ L 2 ⁢ D Where ρ is the density of the ink U is the average flow velocity, L is the length, D is the hydraulic diameter, and f is a dimensionless friction factor calculated as follows: f = k Re Where Re is the Reynolds number and k is a dimensionless friction coefficient dependent upon the cross section of the channel calculated as follows: Re = UD v Where v is the kinematic viscosity of the ink. For a rectangular cross section, k can be approximated by: k = 64 2 3 + 11 ⁢ b 24 ⁢ a ⁢ 11 ⁢ b 24 ⁢ a ⁢ ( 2 - b / a ) Where a is the longest side of the rectangular cross section, and b is the shortest side. The hydraulic diameter D for a rectangular cross section is given by: D = 2 ⁢ a ⁢ ⁢ b a + b Ink is drawn off the main ink channels at 250 points along the length of the channels. The ink velocity falls linearly from the start of the channel to zero at the end of the channel, so the average flow velocity U is half of the maximum flow velocity. Therefore, the pressure drop along the main ink channels is half of that calculated using the maximum flow velocity Utilizing these formulas, the pressure drops can be calculated in accordance with the following tables: Table of Ink Channel Dimensions and Pressure Drops Max. ink # of Nozzles flow at Pressure Items Length Width Depth supplied 5 KHz(U) drop Δρ Central Moulding 1 106 mm 6.4 mm 1.4 mm 18,750 0.23 ml/s NA Cyan main channel 1 100 mm 1 mm 1 mm 6,250 0.16 μl/μs 111 Pa (830) Magenta main 2 100 mm 700 μm 700 μm 3,125 0.16 μl/μs 231 Pa channel (826) Yellow main 1 100 mm 1 mm 1 mm 6,250 0.16 μl/μs 111 Pa channel (831) Cyan sub-channel 250 1.5 mm 200 μm 100 μm 25 0.16 μl/μs 41.7 Pa (833) Magenta sub- 500 200 μm 50 μm 100 μm 12.5 0.031 μl/μs 44.5 Pa channel (834)(a) Magenta sub- 500 400 μm 100 μm 200 μm 12.5 0.031 μl/μs 5.6 Pa channel (838)(b) Yellow sub- 250 1.5 mm 200 μm 100 μm 25 0.016 μl/μs 41.7 Pa channel (834) Cyan pit (842) 250 200 μm 100 μm 300 μm 25 0.010 μl/μs 3.2 Pa Magenta through 500 200 μm 50 μm 200 μm 12.5 0.016 μl/μs 18.0 Pa (840) Yellow pit (846) 250 200 μm 100 μm 300 μm 25 0.010 μl/μs 3.2 Pa Cyan via (843) 500 100 μm 50 μm 100 μm 12.5 0.031 μl/μs 22.3 Pa Magenta via (842) 500 100 μm 50 μm 100 μm 12.5 0.031 μl/μs 22.3 Pa Yellow via 500 100 μm 50 μm 100 μm 12.5 0.031 μl/μs 22.3 Pa Magenta through 500 200 μm 500 μm 100 μm 12.5 0.003 μl/μs 0.87 Pa hole (837) Chip slot 1 100 mm 730 μm 625 18,750 NA NA Print head 1500 600 μ 100 μm 50 μm 12.5 0.052 μl/μs 133 Pa through holes (881)(in the chip substrate) Print head 1,000/ 50 μm 60 μm 20 μm 3.125 0.049 μl/μs 62.8 Pa channel segments color (on chip front) Filter Slits (on 8 per 2 μm 2 μm 20 μm 0.125 0.039 μl/μs 251 Pa entrance to nozzle nozzle chamber (882) Nozzle chamber (on 1 per 70 μm 30 μm 20 μm 1 0.021 μl/μs 75.4 Pa chip front)(883) nozzle The total pressure drop from the ink inlet to the nozzle is therefore approximately 701 Pa for cyan and yellow, and 845 Pa for magenta. This is less than 1% of atmospheric pressure. Of course, when the image printed is less than full black, the ink flow (and therefore the pressure drop) is reduced from these values. Making the Mould for the Ink-head Supply Unit The ink head supply unit 14 (FIG. 1) has features as small as 50 μl and a length of 106 mm. It is impractical to machine the injection moulding tools in the conventional manner. However, even though the overall shape may be complex, there are no complex curves required. The injection moulding tools can be made using conventional milling for the main ink channels and other millimeter scale features, with a lithographically fabricated inset for the fine features. A LIGA process can be used for the inset A single injection moulding tool could readily have 50 or more cavities. Most of the tool complexity is in the inset. Turning to FIG. 206, the printing system is constructed via moulding ink supply unit 814 and lid 815 together and sealing them together as previously described. Subsequently print-head 44 is placed in its corresponding slot 850. Adhesive sealing strips 852, 853 are placed over the magenta main channels so to ensure they are properly sealed. The Tape Automated Bonding (TAB) strip 810 is then connected to the ink-jet print-head 44 with the tab bonding wires running in the cavity 855. As can best be seen from FIG. 206, FIG. 207 and FIG. 212, aperture slots 855-862 are provided for the snap in insertion of rollers. The slots provided for the “clipping in” of the rollers with a small degree of play subsequently being provided for simple rotation of the rollers. In FIG. 213 to FIG. 217, there are illustrated various perspective views of the internal portions of a finally assembled Artcam device with devices appropriately numbered. FIG. 213 illustrates a top side perspective view of the internal portions of an Artcam camera, showing the parts flattened out; FIG. 214 illustrates a bottom side perspective view of the internal portions of an Artcam camera, showing the parts flattened out; FIG. 215 illustrates a first top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; FIG. 216 illustrates a second top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; FIG. 217 illustrates a second top side perspective view of the internal portions of an Artcam camera, showing the parts as encased in an Artcam; Postcard Print Rolls Turning now to FIG. 218, in one form of the preferred embodiment, the output printer paper 11 can, on the side that is not to receive the printed image, contain a number of pre-printed “postcard” formatted backing portions 885. The postcard formatted sections 885 can include prepaid postage “stamps” 886 which can comprise a printed authorization from the relevant postage authority within whose jurisdiction the print roll is to be sold or utilised. By agreement with the relevant jurisdictional postal authority, the print rolls can be made available having different postages. This is especially convenient where overseas travelers are in a local jurisdiction and wishing to send a number of postcards to their home country. Further, an address format portion 887 is provided for the writing of address dispatch details in the usual form of a postcard Finally, a message area 887 is provided for the writing of a personalized information. Turning now to FIG. 218 and FIG. 219, the operation of the camera device is such that when a series of images 890-892 is printed on a first surface of the print roll, the corresponding backing surface is that illustrated in FIG. 218. Hence, as each image eg. 891 is printed by the camera, the back of the image has a ready made postcard 885 which can be immediately dispatched at the nearest post office box within the jurisdiction. In this way, personalized postcards can be created. It would be evident that when utilising the postcard system as illustrated in FIG. 219 and FIG. 220 only predetermined image sizes are possible as the synchronization between the backing postcard portion 885 and the front image 891 must be maintained. This can be achieved by utilising the memory portions of the authentication chip stored within the print roll to store details of the length of each postcard backing format sheet 885. This can be achieved by either having each postcard the same size or by storing each size within the print rolls on-board print chip memory. The Artcam camera control system can ensure that, when utilising a print roll having pre-formatted postcards, that the printer roll is utilised only to print images such that each image will be on a postcard boundary. Of course, a degree of “play” can be provided by providing border regions at the edges of each photograph which can account for slight misalignment. Turning now to FIG. 220, it will be evident that postcard rolls can be pre-purchased by a camera user when traveling within a particular jurisdiction where they are available. The postcard roll can, on its external surface, have printed information including country of purchase, the amount of postage on each postcard, the format of each postcard (for example being C, H or P or a combination of these image modes), the countries that it is suitable for use with and the postage expiry date after which the postage is no longer guaranteed to be sufficient can also be provided. Hence, a user of the camera device can produce a postcard for dispatch in the mail by utilising their hand held camera to point at a relevant scene and taking a picture having the image on one surface and the pre-paid postcard details on the other. Subsequently, the postcard can be addressed and a short message written on the postcard before its immediate dispatch in the mail. In respect of the software operation of the Artcam device, although many different software designs are possible, in one design, each Artcam device can consist of a set of loosely coupled functional modules utilised in a coordinated way by a single embedded application to serve the core purpose of the device. While the functional modules are reused in different combinations in various classes of Artcam device, the application is specific to the class of Artcam device. Most functional modules contain both software and hardware components. The software is shielded from details of the hardware by a hardware abstraction layer, while users of a module are shielded from its software implementation by an abstract software interface. Because the system as a whole is driven by user-initiated and hardware-initiated events, most modules can run one or more asynchronous event-driven processes. The most important modules which comprise the generic Artcam device are shown in FIG. 221. In this and subsequent diagrams, software components are shown on the left separated by a vertical dashed line 901 from hardware components on the right The software aspects of these modules are described below: Software Modules—Artcam Application 902 The Artcam Application implements the high-level functionality of the Artcam device. This normally involves capturing an image, applying an artistic effect to the image, and then printing the image. In a camera-oriented Artcam device, the image is captured via the Camera Manager 903. In a printer-oriented Artcam device, the image is captured via the Network Manager 904, perhaps as the result of the image being “squirted” by another device. Artistic effects are found within the unified file system managed by the File Manager 905. An artistic effect consist of a script file and a set of resources. The script is interpreted and applied to the image via the Image Processing Manager 906. Scripts are normally shipped on ArtCards known as Artcards. By default the application uses the script contained on the currently mounted Artcard. The image is printed via the Printer Manager 908. When the Artcam device starts up, the bootstrap process starts the various manager processes before starting the application. This allows the application to immediately request services from the various managers when it starts. On initialization the application 902 registers itself as the handler for the events listed below. When it receives an event, it performs the action described in the table. User interface event Action Lock Focus Perform any automatic pre-capture setup via the Camera Manager. This includes auto-focussing, auto-adjusting exposure, and charging the flash. This is normally initiated by the user pressing the Take button halfway. Take Capture an image via the Camera Manager. Self-Timer Capture an image in self-timed mode via the Camera Manager. Flash Mode Update the Camera Manager to use the next flash mode. Update the Status Display to show the new flash mode. Print Print the current image via the Printer Manager. Apply an artistic effect to the image via the Image Processing Manager if there is a current script. Update the remaining prints count on the Status Display (see Print Roll Inserted below). Hold Apply an artistic effect to the current image via the Image Processing Manager if there is a current script, but don't print the image. Eject ArtCards Eject the currently inserted ArtCards via the File Manager. Print Roll Inserted Calculate the number of prints remaining based on the Print Manager's remaining media length and the Camera Manager's aspect ratio. Update the remaining prints count on the Status display. Print Roll Removed Update the Status Display to indicate there is no print roll present. Where the camera includes a display, the application also constructs a graphical user interface via the User Interface Manager 910 which allows the user to edit the current date and tine, and other editable camera parameters. The application saves all persistent parameters in flash memory. Real-Time Microkernel 911 The Real-Time Microkernel schedules processes preemptively on the basis of interrupts and process priority. It provides integrated inter-process communication and timer services, as these are closely tied to process scheduling. All other operating system functions are implemented outside the microkernel. Camera Manager 903 The Camera Manager provides image capture services. It controls the camera hardware embedded in the Artcam. It provides an abstract camera control interface which allows camera parameters to be queried and set, and images captured. This abstract interface decouples the application from details of camera implementation. The Camera Manager utilizes the following input/output parameters and commands: output parameters domains focus range real, real zoom range real, real aperture range real, real shutter speed range real, real input parameters domains focus real zoom real aperture real shutter speed real aspect ratio classic, HDTV, panoramic focus control mode multi-point auto, single-point auto, manual exposure control mode auto, aperture priority, shutter priority, manual flash mode auto, auto with red-eye removal, fill, off view scene mode on, off commands return value domains Lock Focus none Self-Timed Capture Raw Image Capture Image Raw Image The Camera Manager runs as an asynchronous event-driven process. It contains a set of linked state machines, one for each asynchronous operation. These include auto focussing, charging the flash, counting down the self-timer, and capturing the image. On initialization the Camera Manager sets the camera hardware to a known state. This includes setting a normal focal distance and retracting the zoom. The software structure of the Camera Manager is illustrated in FIG. 222. The software components are described in the following subsections: Lock Focus 913 Lock Focus automatically adjusts focus and exposure for the current scene, and enables the flash if necessary, depending on the focus control mode, exposure control mode and flash mode. Lock Focus is normally initiated in response to the user pressing the Take button halfway. It is part of the normal image capture sequence, but may be separated in time from the actual capture of the image, if the user holds the take button halfway depressed. This allows the user to do spot focusing and spot metering. Capture Image 914 Capture Image captures an image of the current scene. It lights a red-eye lamp if the flash mode includes red-eye removal, controls the shutter, triggers the flash if enabled, and senses the image through the image sensor. It determines the orientation of the camera, and hence the captured image, so that the image can be properly oriented during later image processing. It also determines the presence of camera motion during image capture, to trigger deblurring during later image processing. Self-Timed Capture 915 Self-Timed Capture captures an image of the current scene after counting down a 20s timer. It gives the user feedback during the countdown via the self-timer LED. During the first 15 s it can light the LED. During the last 5 s it flashes the LED. View Scene 917 View Scene periodically senses the current scene through the image sensor and displays it on the color LCD, giving the user an LCD-based viewfinder. Auto Focus 918 Auto Focus changes the focal length until selected regions of the image are sufficiently sharp to signify that they are in focus. It assumes the regions are in focus if an image sharpness metric derived from specified regions of the image sensor is above a fixed threshold. It finds the optimal focal length by performing a gradient descent on the derivative of sharpness by focal length, changing direction and stepsize as required. If the focus control mode is multi-point auto, then three regions are used, arranged horizontally across the field of view. If the focus control mode is single-point auto, then one region is used, in the center of the field of view. Auto Focus works within the available focal length range as indicated by the focus controller. In fixed-focus devices it is therefore effectively disabled. Auto Flash 919 Auto Flash determines if scene lighting is dim enough to require the flash. It assumes the lighting is dim enough if the scene lighting is below a fixed threshold. The scene lighting is obtained from the lighting sensor, which derives a lighting metric from a central region of the image sensor. If the flash is required, then it charges the flash. Auto Exposure 920 The combination of scene lighting, aperture, and shutter speed determine the exposure of the captured image. The desired exposure is a fixed value. If the exposure control mode is auto, Auto Exposure determines a combined aperture and shutter speed which yields the desired exposure for the given scene lighting. If the exposure control mode is aperture priority, Auto Exposure determines a shutter speed which yields the desired exposure for the given scene lighting and current aperture. If the exposure control mode is shutter priority, Auto Exposure determines an aperture which yields the desired exposure for the given scene lighting and current shutter speed. The scene lighting is obtained from the lighting sensor, which derives a lighting metric from a central region of the image sensor. Auto Exposure works within the available aperture range and shutter speed range as indicated by the aperture controller and shutter speed controller. The shutter speed controller and shutter controller hide the absence of a mechanical shutter in most Artcam devices. If the flash is enabled, either manually or by Auto Flash, then the effective shutter speed is the duration of the flash, which is typically in the range {fraction (1/1000)} s to {fraction (1/10000)} s. Image Processing Manager 906 (FIG. 221) The Image Processing Manager provides image processing and artistic effects services. It utilises the VLIW Vector Processor embedded in the Artcam to perform high-speed image processing. The Image Processing Manager contains an interpreter for scripts written in the Vark image processing language. An artistic effect therefore consists of a Vark script file and related resources such as fonts, clip images etc. The software structure of the Image Processing Manager is illustrated in more detail in FIG. 223 and include the following modules: Convert and Enhance Image 921 The Image Processing Manager performs image processing in the device-independent CIE LAB color space, at a resolution which suits the reproduction capabilities of the Artcam printer hardware. The captured image is first enhanced by filtering out noise. It is optionally processed to remove motion-induced blur. The image is then converted from its device-dependent RGB color space to the CIE LAB color space. It is also rotated to undo the effect of any camera rotation at the time of image capture, and scaled to the working image resolution. The image is further enhanced by scaling its dynamic range to the available dynamic range. Detect Faces 923 Faces are detected in the captured image based on hue and local feature analysis. The list of detected face regions is used by the Vark script for applying face-specific effects such as warping and positioning speech balloons. Vark Image Processing Language Interpreter 924 Vark consists of a general-purpose programming language with a rich set of image processing extensions. It provides a range of primitive data types (integer, real, boolean, character), a range of aggregate data types for constructing more complex types (array, string, record), a rich set of arithmetic and relational operators, conditional and iterative control flow (if-then-else, while-do), and recursive functions and procedures. It also provides a range of image-processing data types (image, clip image, matte, color, color lookup table, palette, dither matrix, convolution kernel, etc.), graphics data types (font, text, path), a set of image-processing functions (color transformations, compositing, filtering, spatial transformations and warping, illumination, text setting and rendering), and a set of higher-level artistic functions (tiling, painting and stroking). A Vark program is portable in two senses. Because it is interpreted, it is independent of the CPU and image processing engines of its host Because it uses a device-independent model space and a device-independent color space, it is independent of the input color characteristics and resolution of the host input device, and the output color characteristics and resolution of the host output device. The Vark Interpreter 924 parses the source statements which make up the Vark script and produces a parse tree which represents the semantics of the script Nodes in the parse tree correspond to statements, expressions, sub-expressions, variables and constants in the program. The root node corresponds to the main procedure statement list. The interpreter executes the program by executing the root statement in the parse tree. Each node of the parse tree asks its children to evaluate or execute themselves appropriately. An if statement node, for example, has three children—a condition expression node, a then statement node, and an else statement node. The if statement asks the condition expression node to evaluate itself, and depending on the boolean value returned asks the then statement or the else statement to execute itself. It knows nothing about the actual condition expression or the actual statements. While operations on most data types are executed during execution of the parse tree, operations on image data types are deferred until after execution of the parse tree. This allows imaging operations to be optimized so that only those intermediate pixels which contribute to the final image are computed. It also allows the final image to be computed in multiple passes by spatial subdivision, to reduce the amount of memory required. During execution of the parse tree, each imaging function simply returns an imaging graph—a graph whose nodes are imaging operators and whose leaves are images—constructed with its corresponding imaging operator as the root and its image parameters as the root's children. The image parameters are of course themselves image graphs. Thus each successive imaging function returns a deeper imaging graph. After execution of the parse tree, an imaging graph is obtained which corresponds to the final image. This imaging graph is then executed in a depth-first manner (like any expression tree), with the following two optimizations: (1) only those pixels which contribute to the final image are computed at a given node, and (2) the children of a node are executed in the order which minimizes the amount of memory required. The imaging operators in the imaging graph are executed in the optimized order to produce the final image. Compute-intensive imaging operators are accelerated using the VLIW Processor embedded in the Artcam device. If the amount of memory required to execute the imaging graph exceeds available memory, then the final image region is subdivided until the required memory no longer exceeds available memory. For a well-constructed Vark program the first optimization is unlikely to provide much benefit per se. However, if the final image region is subdivided, then the optimization is likely to provide considerable benefit. It is precisely this optimization, then, that allows subdivision to be used as an effective technique for reducing memory requirements. One of the consequences of deferred execution of imaging operations is that program control flow cannot depend on image content, since image content is not known during parse tree execution. In practice this is not a severe restriction, but nonetheless must be borne in mind during language design. The notion of deferred execution (or lazy evaluation) of imaging operations is described by Guibas and Stolfi (Guibas, L. J., and J. Stolfi, “A Language for Bitmap Manipulation”, ACM Transactions on Graphics, Vol. 1, No. 3, July 1982, pp. 191-214). They likewise construct an imaging graph during the execution of a program, and during subsequent graph evaluation propagate the result region backwards to avoid computing pixels which do not contribute to the final image. Shantzis additionally propagates regions of available pixels forwards during imaging graph evaluation (Shantzis, M. A., “A Model for Efficient and Flexible Image Computing”, Computer Graphics Proceedings, Annual Conference Series, 1994, pp. 147-154). The Vark Interpreter uses the more sophisticated multi-pass bi-directional region propagation scheme described by Cameron (Cameron, S., “Efficient Bounds in Constructive Solid Geometry”, IEEE Computer Graphics & Applications, Vol. 11, No. 3, May 1991, pp. 68-74). The optimization of execution order to minimise memory usage is due to Shantzis, but is based on standard compiler theory (Aho, A. V., R Sethi, and J. D. Ullman, “Generating Code from DAGs”, in Compilers: Principles, Techniques, and Tools, Addison-Wesley, 1986, pp. 557-567,). The Vark Interpreter uses a more sophisticated scheme than Shantzis, however, to support variable-sized image buffers. The subdivision of the result region in conjunction with region propagation to reduce memory usage is also due to Shantzis. Printer Manager 908 (FIG. 221) The Printer Manager provides image printing services. It controls the Ink Jet printer hardware embedded in the Artcam. It provides an abstract printer control interface which allows printer parameters to be queried and set, and images printed. This abstract interface decouples the application from details of printer implementation and includes the following variables: output parameters domains media is present bool media has fixed page size bool media width real remaining media length real fixed page size real, real input parameters domains page size real, real commands return value domains Print Image none output events invalid media media exhausted media inserted media removed The Printer Manager runs as an asynchronous event-driven process. It contains a set of linked state machines, one for each asynchronous operation. These include printing the image and auto mounting the print roll. The software structure of the Printer Manager is illustrated in FIG. 224. The software components are described in the following description: Print Image 930 Print Image prints the supplied image. It uses the VLIW Processor to prepare the image for printing. This includes converting the image color space to device-specific CMY and producing half-toned bi-level data in the format expected by the print head. Between prints, the paper is retracted to the lip of the print roll to allow print roll removal, and the nozzles can be capped to prevent ink leakage and drying. Before actual printing starts, therefore, the nozzles are uncapped and cleared, and the paper is advanced to the print head. Printing itself consists of transferring line data from the VLIW processor, printing the line data, and advancing the paper, until the image is completely printed. After printing is complete, the paper is cut with the guillotine and retracted to the print roll, and the nozzles are capped. The remaining media length is then updated in the print roll. Auto Mount Print Roll 131 Auto Mount Print Roll responds to the insertion and removal of the print roll. It generates print roll insertion and removal events which are handled by the application and used to update the status display. The print roll is authenticated according to a protocol between the authentication chip embedded in the print roll and the authentication chip embedded in Artcam. If the print roll fails authentication then it is rejected. Various information is extracted from the print roll. Paper and ink characteristics are used during the printing process. The remaining media length and the fixed page size of the media, if any, are published by the Print Manager and are used by the application. User Interface Manager 910 (FIG. 221) The User Interface Manager is illustrated in more detail if FIG. 225 and provides user interface management services. It consists of a Physical User Interface Manager 911, which controls status display and input hardware, and a Graphical User Interface Manager 912, which manages a virtual graphical user interface on the color display. The User Interface Manager translates virtual and physical inputs into events. Each event is placed in the event queue of the process registered for that event File Manager 905 (FIG. 222) The File Manager provides file management services. It provides a unified hierarchical file system within which the file systems of all mounted volumes appear. The primary removable storage medium used in the Artcam is the ArtCards. A ArtCards is printed at high resolution with blocks of bi-level dots which directly representserror-tolerant Reed-Solomon-encoded binary data. The block structure supports append and append-rewrite in suitable read-write ArtCards devices (not initially used in Artcam). At a higher level a ArtCards can contain an extended append-rewriteable ISO9660 CD-ROM file system. The software structure of the File Manager, and the ArtCards Device Controller in particular, can be as illustrated in FIG. 226. Network Manager 904 (FIG. 222) The Network Manager provides “appliance” networking services across various interfaces including infra-red (IrDA) and universal serial bus (USB). This allows the Artcam to share captured images, and receive images for printing. Clock Manager 907 (FIG. 222) The Clock Manager provides date and time-of-day clock services. It utilises the battery-backed real-time clock embedded in the Artcam, and controls it to the extent that it automatically adjusts for clock drift, based on auto-calibration carried out when the user sets the time. Power Management When the system is idle it enters a quiescent power state during which only periodic scanning for input events occurs. Input events include the press of a button or the insertion of a ArtCards. As soon as an input event is detected the Artcam device re-enters an active power state. The system then handles the input event in the usual way. Even when the system is in an active power state, the hardware associated with individual modules is typically in a quiescent power state. This reduces overall power consumption, and allows particularly draining hardware components such as the printer's paper cutting guillotine to monopolise the power source when they are operating. A camera-oriented Artcam device is, by default, in image capture mode. This means that the camera is active, and other modules, such as the printer, are quiescent. This means that when non-camera functions are initiated, the application must explicitly suspend the camera module. Other modules naturally suspend themselves when they become idle. Watchdog Timer The system generates a periodic high-priority watchdog timer interrupt. The interrupt handler resets the system if it concludes that the system has not progressed since the last interrupt, i.e. that it has crashed. Alternative Print Roll In an alternative embodiment, there is provided a modified form of print roll which can be constructed mostly from injection moulded plastic pieces suitably snapped fitted together. The modified form of print roll has a high ink storage capacity in addition to a somewhat simplified construction. The print media onto which the image is to be printed is wrapped around a plastic sleeve former for simplified construction. The ink media reservoir has a series of air vents which are constructed so as to minimise the opportunities for the ink flow out of the air vents. Further, a rubber seal is provided for the ink outlet holes with the rubber seal being pierced on insertion of the print roll into a camera system. Further, the print roll includes a print media ejection slot and the ejection slot includes a surrounding moulded surface which provides and assists in the accurate positioning of the print media ejection slot relative to the printhead within the printing or camera system. Turning to FIG. 227 to FIG. 231, in FIG. 227 there is illustrated a single point roll unit 1001 in an assembled form with a partial cutaway showing internal portions of the printroll. FIG. 228 and FIG. 229 illustrate left and right side exploded perspective views respectively. FIG. 230 and FIG. 231 are exploded perspective's of the internal core portion 1007 of FIG. 227 to FIG. 229. The print roll 1001 is constructed around the internal core portion 1007 which contains an internal ink supply. Outside of the core portion 1007 is provided a former 1008 around which is wrapped a paper or film supply 1009. Around the paper supply it is constructed two cover pieces 1010, 1011 which snap together around the print roll so as to form a covering unit as illustrated in FIG. 227. The bottom cover piece 1011 includes a slot 1012 through which the output of the print media 1004 for interconnection with the camera system. Two pinch rollers 1038, 1039 are provided to pinch the paper against a drive pinch roller 1040 so they together provide for a decurling of the paper around the roller 1040. The decurling acts to negate the strong curl that may be imparted to the paper from being stored in the form of print roll for an extended period of time. The rollers 1038, 1039 are provided to form a snap fit with end portions of the cover base portion 1077 and the roller 1040 which includes a cogged end 1043 for driving, snap fits into the upper cover piece 1010 so as to pinch the paper 1004 firmly between. The cover pieces 1011 includes an end protuberance or lip 1042. The end lip 1042 is provided for accurately alignment of the exit hole of the paper with a corresponding printing heat platen structure within the camera system. In this way, accurate alignment or positioning of the exiting paper relative to an adjacent printhead is provided for full guidance of the paper to the printhead. Turning now to FIG. 230 and FIG. 231, there is illustrated exploded perspectives of the internal core portion which can be formed from an injection moulded part and is based around 3 core ink cylinders having internal sponge portions 1034-1036. At one end of the core portion there is provided a series of air breathing channels eg. 1014-1016. Each air breathing channel 1014-1016 interconnects a first hole eg. 1018 with an external contact point 1019 which is interconnected to the ambient atmosphere. The path followed by the air breathing channel eg. 1014 is preferably of a winding nature, winding back and forth. The air breathing channel is sealed by a portion of sealing tape 1020 which is placed over the end of the core portion. The surface of the sealing tape 1020 is preferably hydrophobically treated to make it highly hydrophobic and to therefore resist the entry of any fluid portions into the air breathing channels. At a second end of the core portion 1007 there is provided a rubber sealing cap 1023 which includes three thickened portions 1024, 1025 and 1026 with each thickened portion having a series of thinned holes. For example, the portion 1024 has thinned holes 1029, 1030 and 1031. The thinned holes are arranged such that one hole from each of the separate thickened portions is arranged in a single line. For example, the thinned holes 1031, 1032 and 1033 (FIG. 230) are all arranged in a single line with each hole coming from a different thinned portion. Each of the thickened portions corresponds to a corresponding ink supply reservoir such that when the three holes are pierced, fluid communication is made with a corresponding reservoir. An end cap unit 1044 is provided for attachment to the core portion 1007. The end cap 1044 includes an aperture 1046 for the insertion of an authentication chip 1033 in addition to a pronged adaptor (not shown) which includes three prongs which are inserted through corresponding holes (e.g., 1048), piercing a thinned portion (e.g., 1033) of seal 1023 and interconnecting to a corresponding ink chamber (e.g., 1035). Also inserted in the end portion 1044 is an authentication chip 1033, the authentication chip being provided to authenticate access of the print roll to the camera system. This core portion is therefore divided into three separate chambers with each containing a separate color of ink and internal sponge. Each chamber includes an ink outlet in a first end and an air breathing hole in the second end. A cover of the sealing tape 1020 is provided for covering the air breathing channels and the rubber seal 1023 is provided for sealing the second end of the ink chamber. The internal ink chamber sponges and the hydrophobic channel allow the print roll to be utilized in a mobile environment and with many different orientations. Further, the sponge can itself be hydrophobically treated so as to force the ink out of the core portion in an orderly manner. A series of ribs (e.g., 1027) can be provided on the surface of the core portion so as to allow for minimal frictional contact between the core portion 1007 and the printroll former 1008. Most of the portions of the print roll can be constructed from ejection moulded plastic and the print roll includes a high internal ink storage capacity. The simplified construction also includes a paper decurling mechanism in addition to ink chamber air vents which provide for minimal leaking. The rubber seal provides for effective communication with an ink supply chambers so as to provide for high operational capabilities. Artcards can, of course, be used in many other environments. For example ArtCards can be used in both embedded and personal computer (PC) applications, providing a user-friendly interface to large amounts of data or configuration information. This leads to a large number of possible applications. For example, a ArtCards reader can be attached to a PC. The applications for PCs are many and varied. The simplest application is as a low cost read-only distribution medium. Since ArtCards are printed, they provide an audit trail if used for data distribution within a company. Further, many times a PC is used as the basis for a closed system, yet a number of configuration options may exist. Rather than rely on a complex operating system interface for users, the simple insertion of a ArtCards into the ArtCards reader can provide all the configuration requirements. While the back side of a ArtCards has the same visual appearance regardless of the application (since it stores the data), the front of a ArtCards is application dependent. It must make sense to the user in the context of the application. It can therefore be seen that the arrangement of Fig. Z35 provides for an efficient distribution of information in the forms of books, newspapers, magazines, technical manuals, etc. In a further application, as illustrated in Fig. Z36, the front side of a ArtCards 80 can show an image that includes an artistic effect to be applied to a sampled image. A camera system 81 can be provided which includes a cardreader 82 for reading the programmed data on the back of the card 80 and applying the algorithmic data to a sampled image 83 so as to produce an output image 84. The camera unit 81 including an on board inkjet printer and sufficient processing means for processing the sampled image data. A further application of the ArtCards concept, hereinafter called “BizCard” is to store company information on business cards. BizCard is a new concept in company information. The front side of a bizCard as illustrated in Fig. Z37 and looks and functions exactly as today's normal business card. It includes a photograph and contact information, with as many varied card styles as there are business cards. However, the back of each bizCard contains a printed array of black and white dots that holds 1-2 megabytes of data about the company. The result is similar to having the storage of a 3.5″ disk attached to each business card. The information could be company information, specific product sheets, web-site pointers, e-mail addresses, a resume . . . in short, whatever the bizCard holder wants it to. BizCards can be read by any ArtCards reader such as an attached PC card reader, which can be connected to a standard PC by a USB port. BizCards can also be displayed as documents on specific embedded devices. In the case of a PC, a user simply inserts the bizCard into their reader. The bizCard is then preferably navigated just like a web-site using a regular web browser. Simply by containing the owner's photograph and digital signature as well as a pointer to the company's public key, each bizCard can be used to electronically verify that the person is in fact who they claim to be and does actually work for the specified company. In addition by pointing to the company's public key, a bizCard permits simple initiation of secure communications. A further application, hereinafter known as “TourCard” is an application of the ArtCards which contains information for tourists and visitors to a city. When a tourCard is inserted into the ArtCards book reader, information can be in the form of: Maps Public Transport Timetables Places of Interest Local history Events and Exhibitions Restaurant locations Shopping Centres TourCard is a low cost alternative to tourist brochures, guide books and street directories. With a manufacturing cost of just one cent per card, tourCards could be distributed at tourist information centres, hotels and tourist attractions, at a minimum cost, or free if sponsored by advertising. The portability of the bookreader makes it the perfect solution for tourists. TourCards can also be used at information kiosk's, where a computer equipped with the ArtCards reader can decode the information encoded into the tourCard on any web browser. It is interactivity of the bookreader that makes the tourCard so versatile. For example, Hypertext links contained on the map can be selected to show historical narratives of the feature buildings. In this way the tourist can embark on a guided tour of the city, with relevant transportation routes and timetables available at any time. The tourCard eliminates the need for separate maps, guide books, timetables and restaurant guides and creates a simple solution for the independent traveller. Of course, many other utilizations of the data cards are possible. For example, newspapers, study guides, pop group cards, baseball cards, timetables, music data files, product parts, advertising, TV guides, movie guides, trade show information, tear off cards in magazines, recipes, classified ads, medical information, programmes and software, horse racing form guides, electronic forms, annual reports, restaurant, hotel and vacation guides, translation programmes, golf course information, news broadcast, comics, weather details etc. For example, the ArtCards could include a book's contents or a newspaper's contents. An example of such a system is as illustrated in Fig. Z35 wherein the ArtCards 70 includes a book title on one surface with the second surface having the encoded contents of the book printed thereon. The card 70 is inserted in the reader 72 which can include a flexible display 73 which allows for the folding up of card reader 72. The card reader 72 can include display controls 74 which allow for paging forward and back and other controls of the card reader 72. Ink Jet Technologies The embodiments of the invention use an ink jet printer type device. Of course many different devices could be used. However presently popular ink jet printing technologies are unlikely to be suitable. The most significant problem with thermal ink jet is power consumption. This is approximately 100 times that required for high speed, and stems from the energy-inefficient means of drop ejection. This involves the rapid boiling of water to produce a vapor bubble which expels the ink. Water has a very high heat capacity, and must be superheated in thermal ink jet applications. This leads to an efficiency of around 0.02%, from electricity input to drop momentum (and increased surface area) out. The most significant problem with piezoelectric ink jet is size and cost. Piezoelectric crystals have a very small deflection at reasonable drive voltages, and therefore require a large area for each nozzle. Also, each piezoelectric actuator must be connected to its drive circuit on a separate substrate. This is not a significant problem at the current limit of around 300 nozzles per print head, but is a major impediment to the fabrication of pagewidth print heads with 19,200 nozzles. Ideally, the ink jet technologies used meet the stringent requirements of in-camera digital color printing and other high quality, high speed, low cost printing applications. To meet the requirements of digital photography, new ink jet technologies have been created. The target features include: low power (less than 10 Watts) high resolution capability (1,600 dpi or more) photographic quality output low manufacturing cost small size (pagewidth times minimum cross section) high speed (<2 seconds per page). All of these features can be met or exceeded by the ink jet systems described below with differing levels of difficulty. Forty-five different ink jet technologies have been developed by the Assignee to give a wide range of choices for high volume manufacture. These technologies form part of separate applications assigned to the present Assignee as set out in the list under the heading Cross References to Related Applications. The ink jet designs shown here are suitable for a wide range of digital printing systems, from battery powered one-time use digital cameras, through to desktop and network printers, and through to commercial printing systems For ease of manufacture using standard process equipment, the print head is designed to be a monolithic 0.5 micron CMOS chip with MEMS post processing. For color photographic applications, the print head is 100 mm long, with a width which depends upon the ink jet type. The smallest print head designed is covered in U.S. patent application Ser. No. 09/112,764, which is 0.35 mm wide, giving a chip area of 35 square mm. The print heads each contain 19,200 nozzles plus data and control circuitry. Ink is supplied to the back of the print head by injection molded plastic ink channels. The molding requires 50 micron features, which can be created using a lithographically micromachined insert in a standard injection molding tool. Ink flows through holes etched through the wafer to the nozzle chambers fabricated on the front surface of the wafer. The print head is connected to the camera circuitry by tape automated bonding. Tables of Drop-on-Demand Ink Jets Eleven important characteristics of the fundamental operation of individual ink jet nozzles have been identified. These characteristics are largely orthogonal, and so can be elucidated as an eleven dimensional matrix. Most of the eleven axes of this matrix include entries developed by the present assignee. The following tables form the axes of an eleven dimensional table of ink jet types. Actuator mechanism (18 types) Basic operation mode (7 types) Auxiliary mechanism (8 types) Actuator amplification or modification method (17 types) Actuator motion (19 types) Nozzle refill method (4 types) Method of restricting back-flow through inlet (10 types) Nozzle clearing method (9 types) Nozzle plate construction (9 types) Drop ejection direction (5 types) Ink type (7 types) The complete eleven dimensional table represented by these axes contains 36.9 billion possible configurations of ink jet nozzle. While not all of the possible combinations result in a viable ink jet technology, many million configurations are viable. It is clearly impractical to elucidate all of the possible configurations. Instead, certain ink jet types have been investigated in detail. Forty-five such inkjet types were filed simultaneously to the present application. Other ink jet configurations can readily be derived from these forty-five examples by substituting alternative configurations along one or more of the 11 axes. Most of the forty-five examples can be made into ink jet print heads with characteristics superior to any currently available ink jet technology. Where there are prior art examples known to the inventor, one or more of these examples are listed in the examples column of the tables below. The simultaneously filed patent applications by the present applicant are listed by USSN numbers. In some cases, a print technology may be listed more than once in a table, where it shares characteristics with more than one entry. Suitable applications for the ink jet technologies include: Home printers, Office network printers, Short run digital printers, Commercial print systems, Fabric printers, Pocket printers, Internet WWW printers, Video printers, Medical imaging, Wide format printers, Notebook PC printers, Fax machines, Industrial printing systems, Photocopiers, Photographic minilabs etc. The information associated with the aforementioned 11 dimensional matrix are set out in the following tables. ACTUATOR MECHANISM (APPLIED ONLY TO SELECTED INK DROPS) Description Advantages Disadvantages Examples Thermal An electrothermal Large force generated High power Canon Bubblejet 1979 bubble heater heats the ink to Simple construction Ink carrier limited to Endo et al GB above boiling point, No moving parts water patent 2,007,162 transferring significant Fast operation Low efficiency Xerox heater-in-pit heat to the aqueous Small chip area High temperatures 1990 Hawkins et al ink. A bubble required for actuator required U.S. Pat. No. 4,899,181 nucleates and quickly High mechanical Hewlett-Packard TIJ forms, expelling the stress 1982 Vaught et al ink. Unusual materials U.S. Pat. No. 4,490,728 The efficiency of the required process is low, with Large drive transistors typically less than Cavitation causes 0.05% of the electrical actuator failure energy being Kogation reduces transformed into bubble formation kinetic energy of the Large print heads are drop. difficult to fabricate Piezoelectric A piezoelectric crystal Low power Very large area Kyser et al U.S. Pat. No. such as lead consumption required for actuator 3,946,398 lanthanum zirconate Many ink types can be Difficult to integrate Zoltan U.S. Pat. No. 3,683,212 (PZT) is electrically used with electronics 1973 Stemme U.S. Pat. No. activated, and either Fast operation High voltage drive 3,747,120 expands, shears, or High efficiency transistors required Epson Stylus bends to apply Full pagewidth print Tektronix pressure to the ink, heads impractical IJ04 ejecting drops. due to actuator size Requires electrical poling in high field strengths during manufacture Electrostrictive An electric field is Low power Low maximum strain Seiko Epson, Usui et used to activate consumption (approx. 0.01%) all JP 253401/96 electrostriction in Many ink types can be Large area required IJ04 relaxor materials such used for actuator due to as lead lanthanum Low thermal low strain zirconate titanate expansion Response speed is (PLZT) or lead Electric field strength marginal (˜10 μs) magnesium niobate required (approx. High voltage drive (PMN). 3.5 V/μm) can be transistors required generated without Full pagewidth print difficulty heads impractical Does not require due to actuator size electrical poling Ferroelectric An electric field is Low power Difficult to integrate IJ04 used to induce a phase consumption with electronics transition between the Many ink types can be Unusual materials antiferroelectric (AFE) used such as PLZSnT are and ferroelectric (FE) Fast operation (<1 μs) required phase. Perovskite Relatively high Actuators require a materials such as tin longitudinal strain large area modified lead High efficiency lanthanum zirconate Electric field strength titanate (PLZSnT) of around 3 V/μm exhibit large strains of can be readily up to 1% associated provided with the AFE to FE phase transition. Electrostatic Conductive plates are Low power Difficult to operate IJ02, IJ04 plates separated by a consumption electrostatic devices compressible or fluid Many ink types can be in an aqueous dielectric (usually air). used environment Upon application of a Fast operation The electrostatic voltage, the plates actuator will attract each other and normally need to be displace ink, causing separated from the drop ejection. The ink conductive plates may Very large area be in a comb or required to achieve honeycomb structure, high forces or stacked to increase High voltage drive the surface area and transistors may be therefore the force. required Full pagewidth print heads are not competitive due to actuator size Electrostatic A strong electric field Low current High voltage required 1989 Saito et al, U.S. Pat. No. pull is applied to the ink, consumption May be damaged by 4,799,068 on ink whereupon Low temperature sparks due to air 1989 Miura et al, U.S. Pat. No. electrostatic attraction breakdown 4,810,954 accelerates the ink Required field Tone-jet towards the print strength increases as medium. the drop size decreases High voltage drive transistors required Electrostatic field attracts dust Permanent An electromagnet Low power Complex fabrication IJ07, IJ10 magnet directly attracts a consumption Permanent magnetic electromagnetic permanent magnet, Many ink types can be material such as displacing ink and used Neodymium Iron causing drop ejection. Fast operation Boron (NdFeB) Rare earth magnets High efficiency required. with a field strength Easy extension from High local currents around 1 Tesla can be single nozzles to required used. Examples are: pagewidth print Copper metalization Samarium Cobalt heads should be used for (SaCo) and magnetic long materials in the electromigration neodymium iron boron lifetime and low family (NdFeB, resistivity NdDyFeBNb, Pigmented inks are NdDyFeB, etc) usually infeasible Operating temperature limited to the Curie temperature (around 540 K) Soft A solenoid induced a Low power Complex fabrication IJ01, IJ05, IJ08, IJ10, magnetic magnetic field in a soft consumption Materials not usually IJ12, IJ14, IJ15, core electromagnetic magnetic core or yoke Many ink types can be present in a CMOS IJ17 fabricated from a used fab such as NiFe, ferrous material such Fast operation CoNiFe, or CoFe as electroplated iron High efficiency are required alloys such as CoNiFe Easy extension from High local currents [1], CoFe, or NiFe single nozzles to required alloys. Typically, the pagewidth print Copper metalization soft magnetic material heads should be used for is in two parts, which long are normally held electromigration apart by a spring. lifetime and low When the solenoid is resistivity actuated, the two parts Electroplating is attract, displacing the required ink. High saturation flux density is required (2.0-2.1 T is achievable with CoNiFe [1]) Lorenz The Lorenz force Low power Force acts as a IJ06, IJ11, IJ13, IJ16 force acting on a current consumption twisting motion carrying wire in a Many ink types can be Typically, only a magnetic field is used quarter of the utilized. Fast operation solenoid length This allows the High efficiency provides force in a magnetic field to be Easy extension from useful direction supplied externally to single nozzles to High local currents the print head, for pagewidth print required example with rare heads Copper metalization earth permanent should be used for magnets. long Only the current electromigration carrying wire need be lifetime and low fabricated on the print- resistivity head, simplifying Pigmented inks are materials usually infeasible requirements. Magnetostriction The actuator uses the Many ink types can be Force acts as a Fischenbeck, U.S. Pat. No. giant magnetostrictive used twisting motion 4,032,929 effect of materials Fast operation Unusual materials IJ25 such as Terfenol-D (an Easy extension from such as Terfenol-D alloy of terbium, single nozzles to are required dysprosium and iron pagewidth print High local currents developed at the Naval heads required Ordnance Laboratory, High force is available Copper metalization hence Ter-Fe-NOL). should be used for For best efficiency, the long actuator should be pre- electromigration stressed to approx. 8 MPa. lifetime and low resistivity Pre-stressing may be required Surface Ink under positive Low power Requires Silverbrook, EP 0771 tension pressure is held in a consumption supplementary force 658 A2 and related reduction nozzle by surface Simple construction to effect drop patent applications tension. The surface No unusual materials separation tension of the ink is required in Requires special ink reduced below the fabrication surfactants bubble threshold, High efficiency Speed may be limited causing the ink to Easy extension from by surfactant egress from the single nozzles to properties nozzle. pagewidth print heads Viscosity The ink viscosity is Simple construction Requires Silverbrook, EP 0771 reduction locally reduced to No unusual materials supplementary force 658 A2 and related select which drops are required in to effect drop patent applications to be ejected. A fabrication separation viscosity reduction can Easy extension from Requires special ink be achieved single nozzles to viscosity properties electrothermally with pagewidth print High speed is difficult most inks, but special heads to achieve inks can be engineered Requires oscillating for a 100:1 viscosity ink pressure reduction. A high temperature difference (typically 80 degrees) is required Acoustic An acoustic wave is Can operate without a Complex drive 1993 Hadimioglu et generated and nozzle plate circuitry al, EUP 550,192 focussed upon the Complex fabrication 1993 Elrod et al, EUP drop ejection region. Low efficiency 572,220 Poor control of drop position Poor control of drop volume Thermoelastic An actuator which Low power Efficient aqueous IJ03, IJ09, IJ17, IJ18, bend relies upon differential consumption operation requires a IJ19, IJ20, IJ21, actuator thermal expansion Many ink types can be thermal insulator on IJ22, IJ23, IJ24, upon Joule heating is used the hot side IJ27, IJ28, 1129, used. Simple planar Corrosion prevention IJ30, IJ31, IJ32, fabrication can be difficult IJ33, IJ34, IJ35, Small chip area Pigmented inks may IJ36, IJ37, IJ38, required for each be infeasible, as IJ39, IJ40, IJ41 actuator pigment particles Fast operation may jam the bend High efficiency actuator CMOS compatible voltages and currents Standard MEMS processes can be used Easy extension from single nozzles to pagewidth print heads High CTE A material with a very High force can be Requires special IJ09, IJ17, IJ18, IJ20, thermoelastic high coefficient of generated material (e.g. PTFE) IJ21, IJ22, IJ23, actuator thermal expansion Three methods of Requires a PTFE IJ24, IJ27, IJ28, (CTE) such as PTFE deposition are deposition process, IJ29, IJ30, IJ31, polytetrafluoroethylene under development: which is not yet IJ42, IJ43, IJ44 (PTFE) is used. As chemical vapor standard in ULSI high CTE materials deposition (CVD), fabs are usually non- spin coating, and PTFE deposition conductive, a heater evaporation cannot be followed fabricated from a PTFE is a candidate with high conductive material is for low dielectric temperature (above incorporated. A 50 μm constant insulation 350° C.) processing long PTFE bend in ULSI Pigmented inks may actuator with Very low power be infeasible, as polysilicon heater and consumption pigment particles 15 mW power input Many ink types can be may jam the bend can provide 180 μN used actuator force and 10 μm Simple planar deflection. Actuator fabrication motions include: Small chip area Bend required for each Push actuator Buckle Fast operation Rotate High efficiency CMOS compatible voltages and currents Easy extension from single nozzles to pagewidth print heads Conduct-ive A polymer with a high High force can be Requires special IJ24 polymer coefficient of thermal generated materials thermoelastic expansion (such as Very low power development (High actuator PTFE) is doped with consumption CTE conductive conducting substances Many ink types can be polymer) to increase its used Requires a PTFE conductivity to about 3 Simple planar deposition process, orders of magnitude fabrication which is not yet below that of copper. Small chip area standard in ULSI The conducting required for each fabs polymer expands actuator PTFE deposition when resistively Fast operation cannot be followed heated. High efficiency with high Examples of CMOS compatible temperature (above conducting dopants voltages and 350° C.) processing include: currents Evaporation and CVD Carbon nanotubes Easy extension from deposition Metal fibers single nozzles to techniques cannot Conductive polymers pagewidth print be used such as doped heads Pigmented inks may polythiophene be infeasible, as Carbon granules pigment particles may jam the bend actuator Shape A shape memory alloy High force is available Fatigue limits IJ26 memory such as TiNi (also (stresses of maximum number alloy known as Nitinol — hundreds of MPa) of cycles Nickel Titanium alloy Large strain is Low strain (1%) is developed at the Naval available (more than required to extend Ordnance Laboratory) 3%) fatigue resistance is thermally switched High corrosion Cycle rate limited by between its weak resistance heat removal martensitic state and Simple construction Requires unusual its high stiffness Easy extension from materials (TiNi) austenic state. The single nozzles to The latent heat of shape of the actuator pagewidth print transformation must in its martensitic state heads be provided is deformed relative to Low voltage operation High current operation the austenic shape. Requires pre-stressing The shape change to distort the causes ejection of a martensitic state drop. Linear Linear magnetic Linear Magnetic Requires unusual IJ12 Magnetic actuators include the actuators can be semiconductor Actuator Linear Induction constructed with materials such as Actuator (LIA), Linear high thrust, long soft magnetic alloys Permanent Magnet travel, and high (e.g. CoNiFe) Synchronous Actuator efficiency using Some varieties also (LPMSA), Linear planar require permanent Reluctance semiconductor magnetic materials Synchronous Actuator fabrication such as Neodymium (LRSA), Linear techniques iron boron (NdFeB) Switched Reluctance Long actuator travel is Requires complex Actuator (LSRA), and available multi-phase drive the Linear Stepper Medium force is circuitry Actuator (LSA). available High current operation Low voltage operation BASIC OPERATION MODE Description Advantages Disadvantages Examples Actuator This is the simplest Simple operation Drop repetition rate is Thermal ink jet directly mode of operation: the No external fields usually limited to Piezoelectric ink jet pushes ink actuator directly required around 10 kHz. IJ01, IJ02, IJ03, IJ04, supplies sufficient Satellite drops can be However, this is not IJ05, IJ06, IJ07, kinetic energy to expel avoided if drop fundamental to the IJ09, IJ11, IJ12, the drop. The drop velocity is less than method, but is IJ14, IJ16, IJ20, must have a sufficient 4 m/s related to the refill IJ22, IJ23, IJ24, velocity to overcome Can be efficient, method normally IJ25, IJ26, IJ27, the surface tension. depending upon the used IJ28, IJ29, IJ30, actuator used All of the drop kinetic IJ31, IJ32, IJ33, energy must be IJ34, IJ35, IJ36, provided by the IJ37, IJ38, IJ39, actuator IJ40, IJ41, IJ42, Satellite drops usually IJ43, IJ44 form if drop velocity is greater than 4.5 m/s Proximity The drops to be Very simple print head Requires close Silverbrook, EP 0771 printed are selected by fabrication can be proximity between 658 A2 and related some manner (e.g. used the print head and patent applications thermally induced The drop selection the print media or surface tension means does not need transfer roller reduction of to provide the May require two print pressurized ink). energy required to heads printing Selected drops are separate the drop alternate rows of the separated from the ink from the nozzle image in the nozzle by Monolithic color print contact with the print heads are difficult medium or a transfer roller. Electrostatic The drops to be Very simple print head Requires very high Silverbrook, EP 0771 pull printed are selected by fabrication can be electrostatic field 658 A2 and related on ink some manner (e.g. used Electrostatic field for patent applications thermally induced The drop selection small nozzle sizes is Tone-Jet surface tension means does not need above air reduction of to provide the breakdown pressurized ink). energy required to Electrostatic field may Selected drops are separate the drop attract dust separated from the ink from the nozzle in the nozzle by a strong electric field. Magnetic The drops to be Very simple print head Requires magnetic ink Silverbrook, EP 0771 pull on ink printed are selected by fabrication can be Ink colors other than 658 A2 and related some manner (e.g. used black are difficult patent applications thermally induced The drop selection Requires very high surface tension means does not need magnetic fields reduction of to provide the pressurized ink). energy required to Selected drops are separate the drop separated from the ink from the nozzle in the nozzle by a strong magnetic field acting on the magnetic ink. Shutter The actuator moves a High speed (>50 kHz) Moving parts are IJ13, IJ17, IJ21 shutter to block ink operation can be required flow to the nozzle. The achieved due to Requires ink pressure ink pressure is pulsed reduced refill time modulator at a multiple of the Drop timing can be Friction and wear drop ejection very accurate must be considered frequency. The actuator energy Stiction is possible can be very low Shuttered The actuator moves a Actuators with small Moving parts are IJ08, IJ15, IJ18, IJ19 grill shutter to block ink travel can be used required flow through a grill to Actuators with small Requires ink pressure the nozzle. The shutter force can be used modulator movement need only High speed (>50 kHz) Friction and wear be equal to the width operation can be must be considered of the grill holes, achieved Stiction is possible Pulsed A pulsed magnetic Extremely low energy Requires an external IJ10 magnetic field attracts an ‘ink operation is possible pulsed magnetic pull on ink pusher’ at the drop No heat dissipation field pusher ejection frequency. An problems Requires special actuator controls a materials for both catch, which prevents the actuator and the the ink pusher from ink pusher moving when a drop is Complex construction not to be ejected. AUXILIARY MECHANISM (APPLIED TO ALL NOZZLES) Description Advantages Disadvantages Examples None The actuator directly Simplicity of Drop ejection energy Most ink jets, fires the ink drop, and construction must be supplied by including there is no external Simplicity of individual nozzle piezoelectric and field or other operation actuator thermal bubble. mechanism required. Small physical size IJ01, IJ02, IJ03, IJ04, IJ05, IJ07, IJ09, IJ11, IJ12, IJ14, IJ20, IJ22, IJ23, IJ24, IJ25, IJ26, IJ27, IJ28, IJ29, IJ30, IJ31, IJ32, IJ33, IJ34, IJ35, IJ36, IJ37, IJ38, IJ39, IJ40, IJ41, IJ42, IJ43, IJ44 Oscillating The ink pressure Oscillating ink Requires external ink Silverbrook, EP 0771 ink pressure oscillates, providing pressure can provide pressure oscillator 658 A2 and related (including much of the drop a refill pulse, Ink pressure phase and patent applications acoustic ejection energy. The allowing higher amplitude must be IJ08, IJ13, IJ15, IJ17, stimulation) actuator selects which operating speed carefully controlled IJ18, IJ19, IJ21 drops are to be fired The actuators may Acoustic reflections in by selectively operate with much the ink chamber blocking or enabling lower energy must be designed nozzles. The ink Acoustic lenses can be for pressure oscillation used to focus the may be achieved by sound on the vibrating the print nozzles head, or preferably by an actuator in the ink supply. Media The print head is Low power Precision assembly Silverbrook, EP 0771 proximity placed in close High accuracy required 658 A2 and related proximity to the print Simple print head Paper fibers may patent applications medium. Selected construction cause problems drops protrude from Cannot print on rough the print head further substrates than unselected drops, and contact the print medium. The drop soaks into the medium fast enough to cause drop separation. Transfer Drops are printed to a High accuracy Bulky Silverbrook, EP 0771 roller transfer roller instead Wide range of print Expensive 658 A2 and related of straight to the print substrates can be Complex construction patent applications medium. A transfer used Tektronix hot melt roller can also be used Ink can be dried on the piezoelectric ink jet for proximity drop transfer roller Any of the IJ series separation. Electrostatic An electric field is Low power Field strength required Silverbrook, EP 0771 used to accelerate Simple print head for separation of 658 A2 and related selected drops towards construction small drops is near patent applications the print medium. or above air Tone-Jet breakdown Direct A magnetic field is Low power Requires magnetic ink Silverbrook, EP 0771 magnetic used to accelerate Simple print head Requires strong 658 A2 and related field selected drops of construction magnetic field patent applications magnetic ink towards the print medium. Cross The print head is Does not require Requires external IJ06, IJ16 magnetic placed in a constant magnetic materials magnet field magnetic field. The to be integrated in Current densities may Lorenz force in a the print head be high, resulting in current carrying wire manufacturing electromigration is used to move the process problems actuator. Pulsed A pulsed magnetic Very low power Complex print head IJ10 magnetic field is used to operation is possible construction field cyclically attract a Small print head size Magnetic materials paddle, which pushes required in print on the ink. A small head actuator moves a catch, which selectively prevents the paddle from moving. ACTUATOR AMPLIFICATION OR MODIFICATION METHOD Description Advantages Disadvantages Examples None No actuator Operational simplicity Many actuator Thermal Bubble Ink mechanical mechanisms have jet amplification is used. insufficient travel, IJ01, IJ02, IJ06, IJ07, The actuator directly or insufficient force, IJ16, IJ25, IJ26 drives the drop to efficiently drive ejection process. the drop ejection process Differential An actuator material Provides greater travel High stresses are Piezoelectric expansion expands more on one in a reduced print involved IJ03, IJ09, IJ17, IJ18, bend side than on the other. head area Care must be taken IJ19, IJ20, IJ21, actuator The expansion may be that the materials do IJ22, IJ23, IJ24, thermal, piezoelectric, not delaminate IJ27, IJ29, IJ30, magnetostrictive, or Residual bend IJ31, IJ32, IJ33, other mechanism. The resulting from high IJ34, IJ35, IJ36, bend actuator converts temperature or high IJ37, IJ38, IJ39, a high force low travel stress during IJ42, IJ43, IJ44 actuator mechanism to formation high travel, lower force mechanism. Transient A trilayer bend Very good High stresses are IJ40, IJ41 bend actuator where the two temperature stability involved actuator outside layers are High speed, as a new Care must be taken identical. This cancels drop can be fired that the materials do bend due to ambient before heat not delaminate temperature and dissipates residual stress. The Cancels residual stress actuator only responds of formation to transient heating of one side or the other. Reverse The actuator loads a Better coupling to the Fabrication IJ05, IJ11 spring spring. When the ink complexity actuator is turned off, High stress in the the spring releases. spring This can reverse the force/distance curve of the actuator to make it compatible with the force/time requirements of the drop ejection. Actuator A series of thin Increased travel Increased fabrication Some piezoelectric ink stack actuators are stacked. Reduced drive voltage complexity jets This can be Increased possibility IJ04 appropriate where of short circuits due actuators require high to pinholes electric field strength, such as electrostatic and piezoelectric actuators. Multiple Multiple smaller Increases the force Actuator forces may IJ12, IJI3, IJ18, IJ20, actuators actuators are used available from an not add linearly, IJ22, IJ28, IJ42, simultaneously to actuator reducing efficiency IJ43 move the ink. Each Multiple actuators can actuator need provide be positioned to only a portion of the control ink flow force required. accurately Linear A linear spring is used Matches low travel Requires print head IJ15 Spring to transform a motion actuator with higher area for the spring with small travel and travel requirements high force into a Non-contact method longer travel, lower of motion force motion. transformation Coiled A bend actuator is Increases travel Generally restricted to IJ17, IJ21, IJ34, IJ35 actuator coiled to provide Reduces chip area planar greater travel in a Planar implementations reduced chip area. implementations are due to extreme relatively easy to fabrication difficulty fabricate. in other orientations. Flexure A bend actuator has a Simple means of Care must be taken IJ10, IJ19, IJ33 bend small region near the increasing travel of not to exceed the actuator fixture point, which a bend actuator elastic limit in the flexes much more flexure area readily than the Stress distribution is remainder of the very uneven actuator. The actuator Difficult to accurately flexing is effectively model with finite converted from an element analysis even coiling to an angular bend, resulting in greater travel of the actuator tip. Catch The actuator controls a Very low actuator Complex construction IJ10 small catch. The catch energy Requires external either enables or Very small actuator force disables movement of size Unsuitable for an ink pusher that is pigmented inks controlled in a bulk manner. Gears Gears can be used to Low force, low travel Moving parts are IJ13 increase travel at the actuators can be required expense of duration. used Several actuator Circular gears, rack Can be fabricated cycles are required and pinion, ratchets, using standard More complex drive and other gearing surface MEMS electronics methods can be used. processes Complex construction Friction, friction, and wear are possible Buckle plate A buckle plate can be Very fast movement Must stay within S. Hirata et al, “An used to change a slow achievable elastic limits of the Ink-jet Head Using actuator into a fast materials for long Diaphragm motion. It can also device life Microactuator”, convert a high force, High stresses involved Proc. IEEE MEMS, low travel actuator Generally high power Feb. 1996, pp 418-423. into a high travel, requirement IJ18, IJ27 medium force motion. Tapered A tapered magnetic Linearizes the Complex construction IJ14 magnetic pole can increase magnetic pole travel at the expense force/distance curve of force. Lever A lever and fulcrum is Matches low travel High stress around the IJ32, IJ36, IJ37 used to transform a actuator with higher fulcrum motion with small travel requirements travel and high force Fulcrum area has no into a motion with linear movement, longer travel and and can be used for lower force. The lever a fluid seal can also reverse the direction of travel. Rotary The actuator is High mechanical Complex construction IJ28 impeller connected to a rotary advantage Unsuitable for impeller. A small The ratio of force to pigmented inks angular deflection of travel of the actuator the actuator results in can be matched to a rotation of the the nozzle impeller vanes, which requirements by push the ink against varying the number stationary vanes and of impeller vanes out of the nozzle. Acoustic A refractive or No moving parts Large area required 1993 Hadimioglu et lens diffractive (e.g. zone Only relevant for al, EUP 550,192 plate) acoustic lens is acoustic ink jets 1993 Elrod et al, EUP used to concentrate 572,220 sound waves. Sharp A sharp point is used Simple construction Difficult to fabricate Tone-jet conductive to concentrate an using standard VLSI point electrostatic field, processes for a surface ejecting ink- jet Only relevant for electrostatic ink jets ACTUATOR MOTION Description Advantages Disadvantages Examples Volume The volume of the Simple construction in High energy is Hewlett-Packard expansion actuator changes, the case of thermal typically required to Thermal Ink jet pushing the ink in all ink jet achieve volume Canon Bubblejet directions. expansion. This leads to thermal stress, cavitation, and kogation in thermal ink jet implementations Linear, The actuator moves in Efficient coupling to High fabrication IJ01, IJ02, IJ04, IJ07, normal to a direction normal to ink drops ejected complexity may be IJ11, IJ14 chip surface the print head surface. normal to the required to achieve The nozzle is typically surface perpendicular in the line of motion movement. Parallel to The actuator moves Suitable for planar Fabrication IJ12, IJ13, IJ15, IJ33, , chip surface parallel to the print fabrication complexity IJ34, IJ35, IJ36 head surface. Drop Friction ejection may still be Stiction normal to the surface. Membrane An actuator with a The effective area of Fabrication 1982 Howkins U.S. Pat. No. push high force but small the actuator complexity 4,459,601 area is used to push a becomes the Actuator size stiff membrane that is membrane area Difficulty of in contact with the ink. integration in a VLSI process Rotary The actuator causes Rotary levers may be Device complexity IJ05, IJ08, IJ13, IJ28 the rotation of some used to increase May have friction at a element, such a grill or travel pivot point impeller Small chip area requirements Bend The actuator bends A very small change Requires the actuator 1970 Kyser et al U.S. Pat. No. when energized. This in dimensions can to be made from at 3,946,398 may be due to be converted to a least two distinct 1973 Stemme U.S. Pat. No. differential thermal large motion. layers, or to have a 3,747,120 expansion, thermal difference IJ03, IJ09, IJ10, IJ19, piezoelectric across the actuator IJ23, IJ24, IJ25, expansion, IJ29, IJ30, IJ31, magnetostriction, or IJ33, IJ34, IJ35 other form of relative dimensional change. Swivel The actuator swivels Allows operation Inefficient coupling to IJ06 around a central pivot. where the net linear the ink motion This motion is suitable force on the paddle where there are is zero opposite forces Small chip area applied to opposite requirements sides of the paddle, e.g. Lorenz force. Straighten The actuator is Can be used with Requires careful IJ26, IJ32 normally bent, and shape memory balance of stresses straightens when alloys where the to ensure that the energized. austenic phase is quiescent bend is planar accurate Double The actuator bends in One actuator can be Difficult to make the IJ36, IJ37, IJ38 bend one direction when used to power two drops ejected by one element is nozzles. both bend directions energized, and bends Reduced chip size. identical. the other way when Not sensitive to A small efficiency loss another element is ambient temperature compared to energized. equivalent single bend actuators. Shear Energizing the Can increase the Not readily applicable 1985 Fishbeck U.S. Pat. No. actuator causes a shear effective travel of to other actuator 4,584,590 motion in the actuator piezoelectric mechanisms material. actuators Radial constriction The actuator squeezes Relatively easy to High force required 1970 Zoltan U.S. Pat. No. an ink reservoir, fabricate single Inefficient 3,683,212 forcing ink from a nozzles from glass Difficult to integrate constricted nozzle. tubing as with VLSI macroscopic processes structures Coil/uncoil A coiled actuator Easy to fabricate as a Difficult to fabricate IJ17, IJ21, IJ34, IJ35 uncoils or coils more planar VLSI process for non-planar tightly. The motion of Small area required, devices the free end of the therefore low cost Poor out-of-plane actuator ejects the ink. stiffness Bow The actuator bows (or Can increase the speed Maximum travel is IJ16, IJ18, IJ27 buckles) in the middle of travel constrained when energized. Mechanically rigid High force required Push-Pull Two actuators control The structure is pinned Not readily suitable IJ18 a shutter. One actuator at both ends, so has for ink jets which pulls the shutter, and a high out-of-plane directly push the ink the other pushes it. rigidity Curl A set of actuators curl Good fluid flow to the Design complexity IJ20, IJ42 inwards inwards to reduce the region behind the volume of ink that actuator increases they enclose. efficiency Curl A set of actuators curl Relatively simple Relatively large chip IJ43 outwards outwards, pressurizing construction area ink in a chamber surrounding the actuators, and expelling ink from a nozzle in the chamber. Iris Multiple vanes enclose High efficiency High fabrication IJ22 a volume of ink. These Small chip area complexity simultaneously rotate, Not suitable for reducing the volume pigmented inks between the vanes. Acoustic The actuator vibrates The actuator can be Large area required 1993 Hadimioglu et vibration at a high frequency. physically distant for efficient al, EUP 550,192 from the ink operation at useful 1993 Elrod et al, EUP frequencies 572,220 Acoustic coupling and crosstalk Complex drive circuitry Poor control of drop volume and position None In various ink jet No moving parts Various other Silverbrook, EP 0771 designs the actuator tradeoffs are 658 A2 and related does not move. required to patent applications eliminate moving Tone-jet parts NOZZLE REFILL METHOD Description Advantages Disadvantages Examples Surface This is the normal way Fabrication simplicity Low speed Thermal ink jet tension that ink jets are Operational simplicity Surface tension force Piezoelectric ink jet refilled. After the relatively small IJ01-IJ07, IJ10-IJ14, actuator is energized, compared to IJ16, IJ20, IJ22-IJ45 it typically returns actuator force rapidly to its normal Long refill time position. This rapid usually dominates return sucks in air the total repetition through the nozzle rate opening. The ink surface tension at the nozzle then exerts a small force restoring the meniscus to a minimum area. This force refills the nozzle. Shuttered Ink to the nozzle High speed Requires common ink IJ08, IJ13, IJ15, IJ17, oscillating chamber is provided at Low actuator energy, pressure oscillator IJ18, IJ19, IJ21 ink pressure a pressure that as the actuator need May not be suitable oscillates at twice the only open or close for pigmented inks drop ejection the shutter, instead frequency. When a of ejecting the ink drop is to be ejected, drop the shutter is opened for 3 half cycles: drop ejection, actuator return, and refill. The shutter is then closed to prevent the nozzle chamber emptying during the next negative pressure cycle. Refill After the main High speed, as the Requires two IJ09 actuator actuator has ejected a nozzle is actively independent drop a second (refill) refilled actuators per nozzle actuator is energized. The refill actuator pushes ink into the nozzle chamber. The refill actuator returns slowly, to prevent its return from emptying the chamber again. Positive ink The ink is held a slight High refill rate, Surface spill must be Silverbrook, EP 0771 pressure positive pressure. therefore a high prevented 658 A2 and related After the ink drop is drop repetition rate Highly hydrophobic patent applications ejected, the nozzle is possible print head surfaces Alternative for:, IJ01-IJ07, chamber fills quickly are required IJ10-IJ14, as surface tension and IJ16, IJ20, IJ22-IJ45 ink pressure both operate to refill the nozzle. METHOD OF RESTRICTING BACK-FLOW THROUGH INLET Description Advantages Disadvantages Examples Long inlet The ink inlet channel Design simplicity Restricts refill rate Thermal ink jet channel to the nozzle chamber Operational simplicity May result in a Piezoelectric ink jet is made long and Reduces crosstalk relatively large chip IJ42, IJ43 relatively narrow, area relying on viscous Only partially drag to reduce inlet effective back-flow. Positive ink The ink is under a Drop selection and Requires a method Silverbrook, EP 0771 pressure positive pressure, so separation forces (such as a nozzle 658 A2 and related that in the quiescent can be reduced rim or effective patent applications state some of the ink Fast refill time hydrophobizing, or Possible operation of drop already protrudes both) to prevent the following: IJ01-IJ07, from the nozzle. flooding of the IJ09-IJ12, This reduces the ejection surface of IJ14, IJ16, IJ20, pressure in the nozzle the print head. IJ22, , 1J23-IJ34, chamber which is 1J36-IJ41, IJ44 required to eject a certain volume of ink. The reduction in chamber pressure results in a reduction in ink pushed out through the inlet. Baffle One or more baffles The refill rate is not as Design complexity HP Thermal Ink Jet are placed in the inlet restricted as the long May increase Tektronix ink flow. When the inlet method. fabrication piezoelectric ink jet actuator is energized, Reduces crosstalk complexity (e.g. the rapid ink Tektronix hot melt movement creates Piezoelectric print eddies which restrict heads). the flow through the inlet. The slower refill process is unrestricted, and does not result in eddies. Flexible flap In this method recently Significantly reduces Not applicable to most Canon restricts disclosed by Canon, back-flow for edge- ink jet inlet the expanding actuator shooter thermal ink configurations (bubble) pushes on a jet devices Increased fabrication flexible flap that complexity restricts the inlet. Inelastic deformation of polymer flap results in creep over extended use Inlet filter A filter is located Additional advantage Restricts refill rate IJ04, IJ12, IJ24, IJ27, between the ink inlet of ink filtration May result in complex IJ29, IJ30 and the nozzle Ink filter may be construction chamber. The filter fabricated with no has a multitude of additional process small holes or slots, steps restricting ink flow. The filter also removes particles which may block the nozzle. Small inlet The ink inlet channel Design simplicity Restricts refill rate IJ02, IJ37, IJ44 compared to the nozzle chamber May result in a to nozzle has a substantially relatively large chip smaller cross section area than that of the nozzle, Only partially resulting in easier ink effective egress out of the nozzle than out of the inlet. Inlet shutter A secondary actuator Increases speed of the Requires separate IJ09 controls the position of ink-jet print head refill actuator and a shutter, closing off operation drive circuit the ink inlet when the main actuator is energized. The inlet is The method avoids the Back-flow problem is Requires careful IJ01, IJ03, IJ05, IJ06, located problem of inlet back- eliminated design to minimize IJ07, IJ10, IJ11, behind the flow by arranging the the negative IJ14, IJ16, IJ22, ink-pushing ink-pushing surface of pressure behind the IJ23, IJ25, IJ28, surface the actuator between paddle IJ31, IJ32, IJ33, the inlet and the IJ34, IJ35, IJ36, nozzle. IJ39, IJ40, IJ41 Part of the The actuator and a Significant reductions Small increase in IJ07, IJ20, IJ26, IJ38 actuator wall of the ink in back-flow can be fabrication moves to chamber are arranged achieved complexity shut off the so that the motion of Compact designs inlet the actuator closes off possible the inlet. Nozzle In some configurations Ink back-flow None related to ink Silverbrook, EP 0771 actuator of ink jet, there is no problem is back-flow on 658 A2 and related does not expansion or eliminated actuation patent applications result in ink movement of an Valve-jet back-flow actuator which may Tone-jet cause ink back-flow through the inlet. NOZZLE CLEARING METHOD Description Advantages Disadvantages Examples Normal All of the nozzles are No added complexity May not be sufficient Most ink jet systems nozzle firing fired periodically, on the print head to displace dried ink IJ01, IJ02, IJ03, IJ04, before the ink has a IJ05, IJ06, IJ07, chance to dry. When IJ09, IJ10, IJ11, not in use the nozzles IJ12, IJ14, IJ16, are sealed (capped) IJ20, IJ22, IJ23, against air. IJ24, IJ25, IJ26, The nozzle firing is IJ27, IJ28, IJ29, usually performed IJ30, IJ31, IJ32, during a special IJ33, IJ34, IJ36, clearing cycle, after IJ37, IJ38, IJ39, first moving the print IJ40,, IJ41, IJ42, head to a cleaning IJ43, IJ44,, IJ45 station. Extra In systems which heat Can be highly Requires higher drive Silverbrook, EP 0771 power to the ink, but do not boil effective if the voltage for clearing 658 A2 and related ink heater it under normal heater is adjacent to May require larger patent applications situations, nozzle the nozzle drive transistors clearing can be achieved by over- powering the heater and boiling ink at the nozzle. Rapid The actuator is fired in Does not require extra Effectiveness depends May be used with: success-ion rapid succession. In drive circuits on the substantially upon IJ01, IJ02, IJ03, of actuator some configurations, print head the configuration of IJ04, IJ05, IJ06, pulses this may cause heat Can be readily the ink jet nozzle IJ07, IJ09, IJ10, build-up at he nozzle controlled and IJ11, IJ14, IJ16, which boils the ink, initiated by digital IJ20, IJ22, IJ23, clearing the nozzle. In logic IJ24, IJ25, IJ27, other situations, it may IJ28, IJ29, IJ30, cause sufficient IJ31, IJ32, IJ33, vibrations to dislodge IJ34, IJ36, IJ37, clogged nozzles. IJ38, IJ39, IJ40, IJ41, IJ42, IJ43, IJ44, IJ45 Extra Where an actuator is A simple solution Not suitable where May be used with: power to not normally driven to where applicable there is a hard limit IJ03, IJ09, IJ16, ink pushing the limit of its motion, to actuator IJ20, IJ23, IJ24, actuator nozzle clearing may be movement IJ25, IJ27, IJ29, assisted by providing IJ30, IJ31, IJ32, an enhanced drive IJ39, IJ40, IJ41, signal to the actuator. IJ42, IJ43, IJ44, IJ45 Acoustic An ultrasonic wave is A high nozzle clearing High implementation IJ08, IJ13, IJ15, IJ17, resonance applied to the ink capability can be cost if system does IJ18, IJ19, IJ21 chamber. This wave is achieved not already include of an appropriate May be implemented an acoustic actuator amplitude and at very low cost in frequency to cause systems which sufficient force at the already include nozzle to clear acoustic actuators blockages. This is easiest to achieve if the ultrasonic wave is at a resonant frequency of the ink cavity. Nozzle A microfabricated Can clear severely Accurate mechanical Silverbrook, EP 0771 clearing plate is pushed against clogged nozzles alignment is 658 A2 and related plate the nozzles. The plate required patent applications has a post for every Moving parts are nozzle. A post moves required through each nozzle, There is risk of displacing dried ink, damage to the nozzles Accurate fabrication is required Ink The pressure of the ink May be effective Requires pressure May be used with all pressure is temporarily where other pump or other IJ series ink jets pulse increased so that ink methods cannot be pressure actuator streams from all of the used Expensive nozzles. This may be Wasteful of ink used in conjunction with actuator energizing. Print head A flexible ‘blade’ is Effective for planar Difficult to use if print Many ink jet systems wiper wiped across the print print head surfaces head surface is non- head surface. The Low cost planar or very blade is usually fragile fabricated from a Requires mechanical flexible polymer, e.g. parts rubber or synthetic Blade can wear out in elastomer. high volume print systems Separate A separate heater is Can be effective Fabrication Can be used with ink boiling provided at the nozzle where other nozzle complexity many IJ series ink heater although the normal clearing methods jets drop e-ection cannot be used mechanism does not Can be implemented require it. The heaters at no additional cost do not require in some ink jet individual drive configurations circuits, as many nozzles can be cleared simultaneously, and no imaging is required. NOZZLE PLATE CONSTRUCTION Description Advantages Disadvantages Examples Electroformed A nozzle plate is Fabrication simplicity High temperatures and Hewlett Packard nickel separately fabricated pressures are Thermal Ink jet from electroformed required to bond nickel, and bonded to nozzle plate the print head chip. Minimum thickness constraints Differential thermal expansion Laser Individual nozzle No masks required Each hole must be Canon Bubblejet ablated or holes are ablated by an Can be quite fast individually formed 1988 Sercel et al., drilled intense UV laser in a Some control over Special equipment SPIE, Vol. 998 polymer nozzle plate, which is nozzle profile is required Excimer Beam typically a polymer possible Slow where there are Applications, pp. such as polyimide or Equipment required is many thousands of 76-83 polysulphone relatively low cost nozzles per print 1993 Watanabe et al., head U.S. Pat. No. 5,208,604 May produce thin burrs at exit holes Silicon A separate nozzle High accuracy is Two part construction K. Bean, IEEE micromachined plate is attainable High cost Transactions on micromachined from Requires precision Electron Devices, single crystal silicon, alignment Vol. ED-25, No. 10, and bonded to the Nozzles may be 1978, pp 1185-1195 print head wafer. clogged by adhesive Xerox 1990 Hawkins et al., U.S. Pat. No. 4,899,181 Glass Fine glass capillaries No expensive Very small nozzle 1970 Zoltan U.S. Pat. No. capillaries are drawn from glass equipment required sizes are difficult to 3,683,212 tubing. This method Simple to make single form has been used for nozzles Not suited for mass making individual production nozzles, but is difficult to use for bulk manufacturing of print heads with thousands of nozzles. Monolithic, The nozzle plate is High accuracy (<1 μm) Requires sacrificial Silverbrook, EP 0771 surface deposited as a layer Monolithic layer under the 658 A2 and related micromachined using standard VLSI Low cost nozzle plate to form patent applications using VLSI deposition techniques. Existing processes can the nozzle chamber IJ01, IJ02, IJ04, IJ11, lithographic Nozzles are etched in be used Surface may be fragile IJ12, IJ17, IJ18, processes the nozzle plate using to the touch IJ20, IJ22, IJ24, VLSI lithography and IJ27, IJ28, IJ29, etching. IJ30, IJ31, IJ32, IJ33, IJ34, IJ36, IJ37, IJ38, IJ39, IJ40, IJ41, IJ42, IJ43, IJ44 Monolithic, The nozzle plate is a High accuracy (<1 μm) Requires long etch IJ03, IJ05, IJ06, IJ07, etched buried etch stop in the Monolithic times IJ08, IJ09, IJ10, through wafer. Nozzle Low cost Requires a support IJ13, IJ14, IJ15, substrate chambers are etched in No differential wafer IJ16, IJ19, IJ21, the front of the wafer, expansion IJ23, IJ25, IJ26 and the wafer is thinned from the back side. Nozzles are then etched in the etch stop layer. No nozzle Various methods have No nozzles to become Difficult to control Ricoh 1995 Sekiya et plate been tried to eliminate clogged drop position al U.S. Pat. No. 5,412,413 the nozzles entirely, to accurately 1993 Hadimioglu et al prevent nozzle Crosstalk problems EUP 550,192 clogging. These 1993 Elrod et al EUP include thermal bubble 572,220 mechanisms and acoustic lens mechanisms Trough Each drop ejector has Reduced Drop firing direction IJ35 a trough through manufacturing is sensitive to which a paddle moves. complexity wicking. There is no nozzle Monolithic plate. Nozzle slit The elimination of No nozzles to become Difficult to control 1989 Saito et al U.S. Pat. No. instead of nozzle holes and clogged drop position 4,799,068 individual replacement by a slit accurately nozzles encompassing many Crosstalk problems actuator positions reduces nozzle clogging, but increases crosstalk due to ink surface waves DROP EJECTION DIRECTION Description Advantages Disadvantages Examples Edge Ink flow is along the Simple construction Nozzles limited to Canon Bubblejet 1979 (‘edge surface of the chip, No silicon etching edge Endo et al GB shooter’) and ink drops are required High resolution is patent 2,007,162 ejected from the chip Good heat sinking via difficult Xerox heater-in-pit edge. substrate Fast color printing 1990 Hawkins et al Mechanically strong requires one print U.S. Pat. No. 4,899,181 Ease of chip handing head per color Tone-jet Surface Ink flow is along the No bulk silicon Maximum ink flow is Hewlett-Packard TIJ (‘roof surface of the chip, etching required severely restricted 1982 Vaught et al shooter’) and ink drops are Silicon can make an U.S. Pat. No. 4,490,728 ejected from the chip effective heat sink IJ02, IJ11, IJ12, IJ20, surface, normal to the Mechanical strength IJ22 plane of the chip. Through Ink flow is through the High ink flow Requires bulk silicon Silverbrook, EP 0771 chip, chip, and ink drops are Suitable for pagewidth etching 658 A2 and related forward ejected from the front print heads patent applications (‘up surface of the chip. High nozzle packing IJ04, IJ17, IJ18, IJ24, shooter’) density therefore IJ27-IJ45 low manufacturing cost Through Ink flow is through the High ink flow Requires wafer IJ01, IJ03, IJ05, IJ06, chip, chip, and ink drops are Suitable for pagewidth thinning IJ07, IJ08, IJ09, reverse ejected from the rear print heads Requires special IJ10, IJ13, IJ14, (‘down surface of the chip. High nozzle packing handling during IJ15, IJ16, IJ19, shooter’) density therefore manufacture IJ21, IJ23, IJ25, low manufacturing IJ26 cost Through Ink flow is through the Suitable for Pagewidth print heads Epson Stylus actuator actuator, which is not piezoelectric print require several Tektronix hot melt fabricated as part of heads thousand piezoelectric ink jets the same substrate as connections to drive the drive transistors. circuits Cannot be manufactured in standard CMOS fabs Complex assembly required INK TYPE Description Advantages Disadvantages Examples Aqueous, Water based ink which Environmentally Slow drying Most existing ink jets dye typically contains: friendly Corrosive All IJ series ink jets water, dye, surfactant, No odor Bleeds on paper Silverbrook, EP 0771 humectant, and May strikethrough 658 A2 and related biocide. Cockles paper patent applications Modern ink dyes have high water-fastness, light fastness Aqueous, Water based ink which Environmentally Slow drying IJ02, IJ04, IJ21, IJ26, pigment typically contains: friendly Corrosive IJ27, IJ30 water, pigment, No odor Pigment may clog Silverbrook, EP 0771 surfactant, humectant, Reduced bleed nozzles 658 A2 and related and biocide. Reduced wicking Pigment may clog patent applications Pigments have an Reduced strikethrough actuator Piezoelectric ink-jets advantage in reduced mechanisms Thermal ink jets (with bleed, wicking and Cockles paper significant strikethrough. restrictions) Methyl MEK is a highly Very fast drying Odorous All IJ series ink jets Ethyl volatile solvent used Prints on various Flammable Ketone for industrial printing substrates such as (MEK) on difficult surfaces metals and plastics such as aluminum cans. Alcohol Alcohol based inks Fast drying Slight odor All IJ series ink jets (ethanol, 2- can be used where the Operates at sub- Flammable butanol, printer must operate at freezing and others) temperatures below temperatures the freezing point of Reduced paper cockle water. An example of Low cost this is in-camera consumer photographic printing. Phase The ink is solid at No drying time- ink High viscosity Tektronix hot melt change room temperature, and instantly freezes on Printed ink typically piezoelectric ink jets (hot melt) is melted in the print the print medium has a ‘waxy’ feel 1989 Nowak U.S. Pat. No. head before jetting. Almost any print Printed pages may 4,820,346 Hot melt inks are medium can be used ‘block’ All IJ series ink jets usually wax based, No paper cockle Ink temperature may with a melting point occurs be above the curie around 80° C. After No wicking occurs point of permanent jetting the ink freezes No bleed occurs magnets almost instantly upon No strikethrough Ink heaters consume contacting the print occurs power medium or a transfer Long warm-up time roller. Oil Oil based inks are High solubility High viscosity: this is All IJ series ink jets extensively used in medium for some a significant offset printing. They dyes limitation for use in have advantages in Does not cockle paper ink jets, which improved Does not wick through usually require a characteristics on paper low viscosity. Some paper (especially no short chain and wicking or cockle). multi-branched oils Oil soluble dies and have a sufficiently pigments are required. low viscosity. Slow drying Micro- A microemulsion is a Stops ink bleed Viscosity higher than All IJ series ink jets emulsion stable, self forming High dye solubility water emulsion of oil, water, Water, oil, and Cost is slightly higher and surfactant. The amphiphilic soluble than water based ink characteristic drop size dies can be used High surfactant is less than 100 nm, Can stabilize pigment concentration and is determined by suspensions required (around the preferred curvature 5%) of the surfactant.
<SOH> BACKGROUND OF THE INVENTION <EOH>Recently, digital camera technology has become increasingly popular. In this form of technology, an image is normally imaged by CCD array. Subsequently, the images are stored on the camera on storage media such as a semiconductor memory array. At a later stage, the images are downloaded from the CCD camera device to a computer or the like where upon they go subsequent manipulation and printing in the course of requirements. The printing normally includes various image processing steps to enhance certain aspects of the image. For details on the operation of CCD devices and cameras, reference is made to a standard text in this field such as “CCD arrays, cameras and displays” by Gerald C Holst, published 1996 by SPIE Optical Engineering Press Bellingham, Wash., USA. Recently, there has been proposed by the present applicant, a camera system having a integral inbuilt printer that is able to produce full colour, high quality output images. Further, it is known to apply a filter to a digital image to produce various effects. The number of filters able to be utilized being totally arbitrary with the expectation that further filters will be discovered or created in future. Unfortunately, changing digital imaging technologies and changing filter technologies result in onerous system requirements in that cameras produced today obviously are unable to take advantages of technologies not yet available nor are they able to take advantage of filters which have not, as yet, been created or conceived.
<SOH> SUMMARY OF THE INVENTION <EOH>It is an object of the present invention to provide a system which readily is able to take advantage of updated technologies in addition to taking advantage of new filters being created and, in addition, providing a readily adaptable form of image processing of digitally captured images for printing out. According to the invention there is provided a portable camera with inbuilt printer device, and input means for uploading software, said camera including: (a) digital image capture device for the capturing of digital images; (b) an inbuilt programming language interpreter means internally connected to said digital image capture device for the manipulation of a digital image captured by said capture device; (c) a script input means for inputting a self documenting program script for the manipulation and filtering of said captured digital image to produce visual alterations thereof, said script input means comprising a card reader for optically reading a script printed as an array of dots on one surface of a portable card, there being a visual example of the likely effect of said script on a second surface of the card; wherein said script is interpreted and executed by said interpreter means to modify said captured digital image in accordance with said script to produce a digital image modified from said captured digital image, in the manner visually exemplified on said second surface of said card, and to provide a printout of said image on said inbuilt printer device.
20040319
20090331
20050609
67887.0
0
CUTLER, ALBERT H
PORTABLE CAMERA WITH INBUILT PRINTER DEVICE
UNDISCOUNTED
1
CONT-ACCEPTED
2,004
10,804,506
ACCEPTED
Rotary press
A rotary press is provided that prevents a print from contamination with a color different from a printing color. The rotary press comprising a printing unit made of a set of printing cylinders such as plate and blanket cylinders or plate and impression cylinders for printing paper; and a dryer disposed downstream of the printing unit for drying the paper printed, has a guide roller included therein for guiding the printed paper from the printing unit into the dryer wherein the guide roller has a diameter which is equal to, or a an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated.
1. A rotary press comprising a printing unit made of a set of printing cylinders such as plate and blanket cylinders or plate and impression cylinders for printing paper; and a dryer disposed downstream of the printing unit for drying the paper printed, characterized in that a guide roller is included therein for guiding the printed paper from the printing unit into the dryer wherein the guide roller has a diameter which is equal to, or an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated. 2. A rotary press as set forth in claim 1, comprising a plurality of paper feeders, a plurality of such printing units as aforesaid and the dryer which together form a multiweb rotary press wherein the paper feeders for supplying a plurality of webs, respectively, are disposed in line in a direction generally in which the webs are supplied individually therefrom and the printing units for printing the webs, respectively, are disposed in line in a direction generally in which the webs from the paper feeders are to travel therethrough individually whereby the webs are printed in parallel with one another, and the printed webs are then dried and thereafter placed one on top of another to form a product therefrom, characterized in that the web printed through the printing unit that is the downstreammost is passed directly into the drier and that said guide roller is disposed downstream of each of the other printing units for guiding each of the other webs printed by them respectively so as to bypass those printing units or unit located downstream of them respectively and then to travel into the dryer. 3. A rotary press as set forth in claim 1, characterized in that the printing cylinder in a said printing unit and the guide roller are each made replaceable so that there is a replacement guide roller that can be replaced with in confirmation of a diameter of a replacement printing cylinder when replaced with. 4. A rotary press as set forth in claim 1, characterized in that a said printing unit is constituted with a perfecting printer. 5. A rotary press as set forth in claim 2, characterized in that the printing cylinder in a said printing unit and the guide roller are each made replaceable so that there is a replacement guide roller that can be replaced with in confirmation of a diameter of a replacement printing cylinder when replaced with. 6. A rotary press as set forth in any one of claim 2, characterized in that a said printing unit is constituted with a perfecting printer. 7. A rotary press as set forth in any one of claim 3, characterized in that a said printing unit is constituted with a perfecting printer.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a rotary press having a guide roller or rollers for guiding paper from a printing section into a drier disposed downstream of it, and in particular is applicable to such a rotary press that performs perfect printing. The invention is further applicable to a multiweb type rotary press in which a plurality of continuous papers or webs are printed in parallel to one another with a plurality of printers and the printed papers or webs are then laid one on top of another to form a product from them. 2. Description of the Prior Art A continuous paper or web printed by a rotary press cannot be wound onto a guide roller or the like before the printing ink on it is dried through a dryer to prevent ink transfer. For this reason, it has been customary that such a drier is disposed directly downstream of a printing unit in the rotary press. In a rotary press that performs perfect printing, e.g., a vertical offset rotary press having a plurality of groups of B-B (blanket-blanket) printing cylinders vertically disposed, however, where the dryer is mounted horizontally on a floor surface for the convenience' sake of the space in which it is disposed, there arises the need to guide each printed paper to the inlet of the drier by means of a guide roller or the like. But it could then be unavoidable that a printed paper surface which remains undried may come into contact with a guide roller surface, causing the ink from a print to adhere on the guide roller and then to remove or transfer back to a paper surface, thereby contaminating the printed paper or print. Therefore, a means is made necessary that prevents ink from transferring from the undried printed paper surface onto a surface of the guide roller disposed downstream of the printing section. The conventional ink transfer preventing measure of this type is to have an ink transfer preventive sheet wound on the surface of such a guide roller (see, e.g., JP S53-7841 B and JP H11-20134 A) or to cool ink on the paper surface with a roller whose surface is cooled (see, e.g., JP H06-182963 A). To prevent ink transfer, a measure has also been known that guides the printed paper non-contactually while blowing air from the guide surface of a guide bar such as a non-rotating turn-bar (see, e.g., JP H08-245028 A). While the conventional guide roller having the ink transfer preventive sheet wound thereon is capable of limiting the ink transfer onto the guide roller surface, it cannot eliminate the same completely and requires the guide roller surface to be washed periodically. Also, the means that cool the undried ink on the paper surface for preventing the ink from transferring to a downstream roller requires a special makeup for cooling the roller, and hence become costly. Further, the aforementioned measure of guiding the paper non-contactually requires a special makeup for blowing air, and here again becomes costly. Furthermore, with the paper surface floated by air, this measure presents the problem that the paper fluctuates in tension and its registration is not steadied. That a drier is disposed immediately downstream of a printing unit is true for a multiweb type rotary press system as well in which a plurality of continuous papers or webs are printed side by side with a plurality of printers and after they are printed are laid one on top of another to form a product from them. In such a rotary press system as shown in FIG. 1, rotary presses 5a, 5b each of which comprises a paper feeder 1, a printing unit 2, a drier 3 and a cooler 4, and whose number corresponds to the number of webs 6 are disposed in parallel with one another. The webs 6 printed are laid one on top of another with an inverting unit 7a, 7b using a plurality of guide rollers and turn-bars each disposed downstream of the cooler 4 in each of the rotary press 5a, 5b, and thereafter are allowed to travel via various guide rollers into a working and a processing section comprising a cutting and a folding unit and so on. In order to circumvent the problem that not only is a large space required but also both the operability and controllability of the system become poor if the rotary presses 5a, 5b are disposed in parallel on a floor as mentioned above, JP H07-227952 A describes a rotary press as shown in FIG. 2 in which in conjunction with a plurality of paper feeders 1a, 1b disposed in series with one another a plurality of printing units 2a are disposed one above another. Disposed downstream of these printing units 2a, 2b are a dryer 8 through which webs 6, 6 printed through the respective printing units 2a, 2b are passed in parallel to dry the printing ink thereon simultaneously and a cooler 9 through which the webs 6, 6 with the ink dried are cooled. While the abovementioned makeup having a plurality of printing units disposed one above another is less disadvantageous than that of the horizontal parallel type not only in terms of the space of its installation on the floor but also in its workability and operability, there is presented the problem anew that the size is enlarged vertically. Further, where printing units placed one above another comprise printing cylinders to be exchanged to meet with a change in printing size, it becomes troublesome to make an exchange for an upper printing cylinder because of a raised position of its exchange and an increased distance from its storage position to the raised position where it is worked on for replacement. BRIEF SUMMARY OF THE INVENTION Made to solve the problems mentioned above, the present invention has for its object to provide a rotary press which with no substantial rise in cost and without entailing unsteadiness in registration is capable of preventing a print from contamination with any color different from a printing color. It is also an object of the present invention to provide a multiweb rotary press which without widening or vertically increasing the space for its installation is capable of preventing a print from contamination with any color different from a printing color. The present invention provides in a form of implementation thereof a rotary press which comprises a printing unit made of a set of printing cylinders such as plate and blanket cylinders or plate and impression cylinders for printing paper; and a dryer disposed downstream of the printing unit for drying the paper printed, characterized in that a guide roller is included therein for guiding the printed paper from the printing unit into the dryer wherein the guide roller has a diameter which is equal to, or an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated. According to this makeup, the paper printed by the printing unit is guide by the guide roller in a paper path between the printing unit and the drier. Then, by virtue of the fact that the guide roller has a diameter which is equal to, or an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated, the guide roller is always contacted by an identical portion of a image printed onto the paper and a print on the paper is thus prevented from being contaminated with any color other than a printing color. Also, the makeup described above which gives rise to the advantage that the paper can be guided without causing a print thereon to be contaminated with any color other than a printing color at the downstream of the printing section is advantageously applicable to a vertical offset rotary press in which a plurality of printing sections are vertically arranged one above another. Then, the drier need not be set up above the printer as at a position downstream of the printing section but on a floor surface away from the downstreammost printing section. As a result, the height of the vertical offset rotary press can be lowered. Also, applied to a horizontal rotary press in which a plurality of printing sections are horizontally arranged side by side, the makeup allows a paper path to be provided at need between the hindmost printing section and the dryer where the paper can be guide by the guide roller. Further, the guide roller may have its surface processed unevenly with a ceramic material having a special coating to prevent ink from adhering or depositing thereon. The present invention also provides in another form of implementation thereof a rotary press which has the makeup mentioned above and comprises a plurality of paper feeders, a plurality of such printing units as aforesaid and the dryer which together form a multiweb rotary press wherein the paper feeders for supplying a plurality of webs, respectively, are disposed in line in a direction generally in which the webs are supplied individually therefrom and the printing units for printing the webs, respectively, are disposed in line in a direction generally in which the webs from the paper feeders are to travel therethrough individually whereby the webs are printed in parallel with one another, and the printed webs are then dried and thereafter placed one on top of another to form a product therefrom, characterized in that the web printed through the printing unit that is the downstreammost is passed directly into the drier and that the said guide roller is disposed downstream of each of the other printing units for guiding each of the other webs printed by them respectively so as to bypass those printing units or unit located downstream of them respectively and then to travel into the dryer. Requiring the printing units to be disposed in line in a direction generally in which the webs are to travel therethrough, this further makeup makes the rotary press longer horizontally by the number of the printing units, but this does not go beyond the length of an ordinary multicolor rotary press and thus allows it to be installed without the need to extraordinarily widen the space for its installation and to make its height equal to that of an ordinary rotary press. And, in the arrangement that the printing units are disposed in line in a direction generally in which the webs are to travel therethrough, the webs printed by the printing units other than the downstreammost can be guided by the respective guide rollers or guide roller sets to bypass those printing units or unit located downstream of them respectively and then to travel into the dryer. Then, a print on each printed web is prevented from being contaminated with any color other than a printing color. Also, in the arrangement that a plurality of printing units are disposed in line in a direction generally in which the webs are to travel therethrough, this rotary press when a single web is to be passed through these printing units successively can be used as a conventional multicolor rotary press and thus is available for both multiweb printing and multicolor printing. Also, in the rotary press of any makeup as mentioned above, the printing cylinder in a said printing unit and the guide roller may each be made replaceable so that there is a replacement guide roller that can be replaced with in confirmation of a diameter of a replacement printing cylinder when replaced with. With this feature, the present invention is advantageously applicable to a rotary press in which a printing unit comprises a replaceable cylinder unit. Another feature of the present invention is characterized in that a said printing unit may be constituted with a duplex printer. BRIEF DESCRIPTION OF THE DRAWINGS These and other objects, features and advantages of the present invention as well as other manners of its implementation will become more readily apparent, and the invention itself will also be better understood, from the following detailed description when taken with reference to the drawings attached hereto showing certain illustrative forms of implementation of the present invention. In the drawings: FIG. 1 is a top plan view illustrating an example of the conventional multiweb type rotary press; FIG. 2 is a side elevational view illustrating another example of the conventional multiweb type rotary press; FIG. 3 is a diagrammatic front view illustrating a vertical offset rotary press representing a first form of implementation of the present invention; FIG. 4 is an explanatory view illustrating a perfect printing cylinder unit; FIG. 5 is a side elevational view illustrating a multiweb type rotary press representing a second form of implementation of the present invention; and FIG. 6 is a side elevational view illustrating a multiweb type rotary press representing a third form of implementation of the present invention. DETAILED DESCRIPTION Referring to FIGS. 3 and 4, an explanation is given in respect of a first form of implementation of the present invention. FIG. 3 shows a vertical B-B offset rotary press. There are shown a printing section (printing unit) 1, a paper feeder 12 that supplies and feeds a continuous paper or web 13 into the printing section 11, a dryer 14 disposed downstream of the printing section 11 and mounted horizontally on the floor surface, and a working section 15. The printing section 11 may include, for example, four (4) perfect printing cylinder units 18a, 18b, 18c and 18d as shown in FIG. 3, each of which as shown in FIG. 4 comprises a pair of blanket cylinders 16a and 16b rotationally engaged with each other and a pair of plate cylinders 17a and 17b rotationally engaged with the blanket cylinders 16a and 16b, respectively. In the printing section 11, the web 13 is designed to travel from lower to upwards while it is printed in four colors on its both sides by the first to fourth perfect printing cylinder units 18a to 18d. And, the web 13 passed out of the uppermost perfect printing cylinder unit 18d is passed through the drier 14 where images of ink on the web surfaces are dried. The drier 14 may be any suitable conventional drier using hot air or UV rays. Then, with the drier 14 mounted horizontally on the floor surface downstream of the printing section 11, a nonlinear web path of a length from the downstreammost perfect printing cylinder unit 18d down to an inlet of the drier 14 is needed in which a plurality guide rollers 19a, 19b, 19c and 19d are arranged to guide the undried web 13 from the printing section. Here, each of the guide rollers 19a, 19b, 19c and 19d is designed to have a peripheral length (or a diameter) that is equal to the peripheral length (or the diameter) of the blanket cylinder 6a, 6b and at the same time is designed to be driven by a drive unit (not shown) to rotate at a peripheral speed equal to that at which the blanket cylinder 16a, 16b is driven to rotate, namely to rotate synchronously with the latter, so that the web 13 is guided and fed by each of them. Further, so as to prevent ink from adhering or depositing up thereon, each of the guide rollers 19a, 19b and 19c is fitted on its surface with a ceramic jacket, which in turn has a special coating applied to its surface. With the vertical B-B offset rotary press constructed as mentioned above, while the web 13 printed at the printing section 11 comes into contact with the guide rollers 19a, 19b and 19c successively before it reaches the drier 14, identical portions of the printed images are always allowed to come in contact with the guide rollers 19a, 19b and 19c by virtue of the fact that each of these guide rollers 19a, 19b and 19c is identical in peripheral length to each of the blanket cylinders 16a and 16b and is mechanically driven to rotate at a peripheral speed that is identical to that of the blanket cylinder 16a, 16b. If a printing image on the web 13 is copied onto a guide roller, then the copied image on the guide roller comes into contact with no region on the web 13 other than an area where the same image is printed on the moving web 13. Thus, the possibility that the printed surface may be contaminated by a color other than a printed color is prevented and eliminated. Further, this advantage is even more assured when each of the guide rollers 19a, 19b, 19c and 19d is fitted on its surface with a ceramic jacket, which in turn has a special coating applied to its surface, or alternatively when each of these guide rollers is directly formed on its surface with such a special coating applied by thermally spraying ceramic onto the surface to prevent ink from adhering or depositing thereon. Although the first form of implementation of the present invention is mentioned above as applied to a vertical offset rotary press, it should be noted that this form of implementation of the invention is equally applicable to a horizontal offset rotary press as well in which a plurality offset printing units are arranged horizontally side by side. In this case, too, a plurality of guide rollers are arranged in a web path between the final printing unit in the printing section and the dryer such that each of these guide rollers is made identical in peripheral length to each of the blanket rollers and is driven to rotate at a peripheral speed identical to that at which each of the blanket rollers is driven to rotate. In the case of a horizontal offset rotary press, a web path between the final printing unit in the printing section and the dryer is not provided according to the conventional practice. That is, if such a web path is provided, then arranging guide rollers there gives rise to the problem of ink transfer or transfer. With the abovementioned guide rollers included according to the present invention, however, it becomes possible to provide, as occasion demands, a web path at the upstream side of the dryer, e.g., for processing the web further there in any way as desired. Also, the guide rollers 19a, 19b and 19c may, respectively, be made identical in peripheral length to the plate cylinders 17a and 17b in contact to the blanket cylinders 16a and 16b to achieve the same advantage. It should further be noted that the rotary press according to the present invention is applicable not only to an offset preess but also to a perfecting relief rotary press. In this latter case as well, the guide rollers are made identical in peripheral length to a plate cylinder or impression cylinder and designed to be driven to rotate at a peripheral speed identical to that at which it is driven to rotate. Referring next to FIG. 5, an explanation is further given in respect of a second form of implementation of the present invention as applied to a multiweb rotary press. Paper feeders corresponding in number to multiple webs, e.g., a first and a second paper feeder 101a and 101b for supplying a first and a second web 106a and 106b, respectively, are arranged in line in the direction in which the webs are driven to travel. And, downstream of the paper feeders 101a and 101b, printing units corresponding in number to the paper feeders 101a and 101b, e.g., a first and a second printing unit 102a and 102b for printing images on the first and second webs 106a and 106b, respectively, are arranged in line in the direction in which the webs are driven to travel. Further, downstream of the printing units 102a and 102b, a dryer 108 and a cooler 109 are arranged in line in the direction of travel of the webs 106a and 106b so that in the dryer 108 and cooler 109 the webs 106a and 106b are passed with a vertical space between them and in parallel to dry ink thereon and are then cooled. Disposed downstream of the dryer 109 across a web path 111 of a suitable length is a superposing section 110 in which the multiple webs 106a and 106b past the dryer 109 are placed one on top of another so as to coincide with one another and are then folded and so on. The web 106a supplied from the first paper feeder 101 disposed upstream of the second paper feeder 101b is directed to bypass the latter above it and led onto an inlet roller 112a in the first, upstream printing unit 102a. The web 106b supplied from the second, downstream paper feeder 101b is directed through a plurality of paper guiding rollers to bypass the first, upstream printing unit 102a below it and led onto an inlet roller 112b in the second, downstream printing unit 102b. Downstream of the printing unit 102a immediately upstream of the printing unit 102b that is the most downstream of the multiple printing units 102, there are provided a plurality of guide rollers, e.g., a first and a second guide rollers 113a and 113b, for directing the web 106a past that upstream printing unit 102a to travel into the dryer 108 while bypassing that downstreammost printing unit 102b wherein the guide rollers are as shown supported from a frame of that downstreammost printing unit 102b although they may be supported from any other frame separately provided. Each of the first and second printing units 102a and 102b as in e. g., a B-B offset printer comprises a pair of blanket cylinders 114a and 114b of an identical diameter rotationally engaged with each other, a pair of plate cylinders 115a and 115b rotationally engaged with the blanket cylinders 114a and 114b, respectively, and having a diameter identical to that of these blanket cylinders 114a and 114b, and an ink furnishing unit (not shown) for supplying ink onto printing plates attached to the plate cylinders 115a and 115b, respectively. The first and second guide rollers 113a and 113b for guiding the web 106a past the first printing unit 102a to travel into the dryer 108 while bypassing the second printing unit 102b downstream of it are identical in diameter, namely in peripheral length to the blanket cylinders 114a and 114b in the first printing unit 102a. And, these guide rollers 113a and 113b are coupled to a drive unit (not shown) so that they are rotated synchronously with the blanket cylinders 114a and 114b at an identical peripheral speed each in a direction in which to cause the web 106a to travel. The guide rollers 113a and 113b have their surfaces processed so as to prevent ink from adhering or depositing thereon. As an example, these guide rollers are each fitted with a ceramic jacket having a special coating applied thereto. In the abovementioned makeup, the web 106a supplied from the first paper feeder 101a is fed onto the inlet roller 112a of the first printing unit 102a by bypassing above the second paper feeder 101b so that its both sides are offset-printed with the blanket cylinders 114a and 114b in the first printing unit 102a. The web 106a past the first printing unit 102a is guided by the first and second guide rollers 113a and 113b to travel into the dryer 108 by bypassing above the second printing unit 102b. Then, with the first and second guide rollers 113a and 113b being identical in diameter to the blanket cylinders 114a and 114b and rotated at a peripheral speed identical to that at which they are rotated, each of the guide rollers 113a and 113b is always contacted by an identical part of a image that is printed by the first printing unit 102a, namely that is transferred from each of the blanket cylinders 114a and 114b onto the web 106a. Thus, even if a certain part of a printed image on the web 106a is copied onto surfaces of the first and second guide rollers 113a and 113b, then those surfaces of the first and second guide rollers 113a and 113b onto which that part of the image is copied are contacted repeatedly by an identical part of such a printed image on the traveling web 106a and as a result a printed surface or a print on the web 106a is prevented from being contaminated by any color other than a printing color. Furthermore, with the guide rollers 113a and 113b having their surfaces processed so as to prevent ink from adhering or depositing thereon, it is possible to minimize the transfer of ink onto those surfaces. On the other hand, the web 106b supplied from the second paper feeder 101b is fed onto the inlet roller 112b of the second printing unit 102b by bypassing the first printing unit 102a, and is printed by the second printing unit 102b. And, since this second printing unit 102b is the most downstream, the web 106b past it need not bypass any other printing unit and can thus be led directly into the drier 108 without being guide by any such guide roll. For each of the printing units 102a and 102b in the form of implementation illustrated, use may be made of one with replaceable cylinders. Then, a replacement cylinder unit in each printing unit 102a, 102b is used that meets with a printing size required. In such a makeup, the first and second guide rollers 113a and 113b need be replaced with those which are identical in diameter to the blanket cylinders replaced with. Accordingly, the first guide roller 113a relatively low in vertical position is made replaceable. On the other hand, the second guide roller 113b higher in vertical position is cumbersome to replace, and hence a third guide roller 113c that is identical in diameter to the blanket cylinders in another replacement cylinder unit is provided beforehand as positioned at this same height. In such a form of implementation as described, when the replacement cylinder units in the printing units 102a and 102b are replaced, the first guide roller 113a is replaced and one of the second and third guide rollers 113b and 113c is selected for use, according to the blanket cylinders in the replacement cylinder units after replacement, and then the webs are passed therethrough. To mention further, it is also possible to replace the upper guide rollers 113a and 113b altogether. Although in the form of implementation described above the paper feeders and the printing units are each shown to be two in number, they may each be three or more in number in implementing the present invention. For example, as in a third form of implementation of the invention as shown in FIG. 6 four (4) paper feeders and four (4) printing units may be used. Then, a web 106a supplied from a first, upstreammost paper feeder 101a is allowed to bypass above a second, a third and a fourth paper feeder 101b, 101c and 101d lying downstream thereof and is then passed into a first, upstreammost printing unit 102a. A web 106b from the second paper feeder 101b is allowed to bypass below the third and fourth paper feeders 101c and 101d and the first printing unit 102a and is then passed into a second printing unit 102b. Likewise, a web 106c from the third paper feeder 101c bypasses below the fourth paper feeder 101d and the first printing unit 102a and above the second printing unit 102b and is passed into a third printing unit 102c whereas a web 106d from the fourth paper feeder bypasses below the first printing unit 102a and above the second and third printing units 102b and 102c and is passed into the fourth printing unit 102d. On the other hand, guide rollers 113a and 113b are provided downstream of each of the printing units upstream of the downstreammost printing unit to guide each of the webs past the corresponding printing unit to bypass above or below the printing units or unit located downstream thereof and then to travel into the dryer 108. Although in each of the forms of implementation described above each of the printing units is shown to comprise a B-B offset printer, the present invention is also applicable to the use of a half-deck offset printer, namely using a single side printer. In this case, only a guide roller that contacts a print side is made identical in diameter to a blanket cylinder. Furthermore, the present invention is not limited to the use of an offset printer but may make use of a printer in which a web contacts a printing or plate cylinder wherein a guide roller is made identical in diameter to a printing plate of the printing or plate cylinder. What is essential here is that the guide roller 113a, 113b be rotationally engaged with the web 106a, 106b, 106c and the guide roller 113a, 113b be identical in diameter to a printing cylinder for printing the web and be rotated synchronously therewith and at a peripheral speed identical to that at which it is rotated. Also, while the forms of implementation illustrated above require that the guide roller 113a, 113b be identical in diameter to a printing cylinder and be rotated at a peripheral speed identical to that at which the printing cylinder is rotated, such a guide roller when the present invention is implemented may more generally have a diameter that is equal to, or is given by an integral multiple of, a diameter of a printing cylinder and be rotated at a peripheral speed that is identical to that at which the printing cylinder is rotated. Further, in the forms of implementations of the invention described above, a plurality of printing units 102a, 102b, . . . are arranged in series with one another in a direction in which a web is to travel. Thus, a rotary press with this arrangement when a web 106a from a first, upstreammost paper feeder 101a is allowed to bypass the other paper feeders and is then passed into the first printing unit 102a and then into the other printing units successively without intervention of a guide roller, can also be used as a usual rotary press as well for printing the web with multiple colors corresponding in number to the number of the printing units. Also, although in the forms of implementation of the invention illustrated above a plurality of paper feeders 101a, 101b, . . . are shown to lie in line with the direction in which webs 106a, 106b, . . . are allowed to travel into a plurality of printing units 102a, 102b, . . . , these paper feeders 101a, 101b, . . . may be disposed to lie in line with a direction that is perpendicular to the direction in which the webs are led into the printing units 102a, 102b, . . . so that the respective webs 106a, 106b, . . . supplied from the paper feeders 101a, 101b, . . . are redirected by a turn-bar arrangement or the like to travel towards the printing units 102a, 102b, . . . Although the present invention has hereinbefore been set forth with respect to certain illustrative embodiments thereof, it will readily be appreciated to be obvious to those skilled in the art that many alterations thereof, omissions therefrom and additions thereto can be made without departing from the essences and scope of the present invention. Accordingly, it should be understood that the invention is not intended to be limited to the specific embodiments thereof set forth above, but to include all possible embodiments that can be made within the scope with respect to the features specifically set forth in the appended claims and to encompass all the equivalents thereof.
<SOH> BACKGROUND OF THE INVENTION <EOH>1. Field of the Invention The present invention relates to a rotary press having a guide roller or rollers for guiding paper from a printing section into a drier disposed downstream of it, and in particular is applicable to such a rotary press that performs perfect printing. The invention is further applicable to a multiweb type rotary press in which a plurality of continuous papers or webs are printed in parallel to one another with a plurality of printers and the printed papers or webs are then laid one on top of another to form a product from them. 2. Description of the Prior Art A continuous paper or web printed by a rotary press cannot be wound onto a guide roller or the like before the printing ink on it is dried through a dryer to prevent ink transfer. For this reason, it has been customary that such a drier is disposed directly downstream of a printing unit in the rotary press. In a rotary press that performs perfect printing, e.g., a vertical offset rotary press having a plurality of groups of B-B (blanket-blanket) printing cylinders vertically disposed, however, where the dryer is mounted horizontally on a floor surface for the convenience' sake of the space in which it is disposed, there arises the need to guide each printed paper to the inlet of the drier by means of a guide roller or the like. But it could then be unavoidable that a printed paper surface which remains undried may come into contact with a guide roller surface, causing the ink from a print to adhere on the guide roller and then to remove or transfer back to a paper surface, thereby contaminating the printed paper or print. Therefore, a means is made necessary that prevents ink from transferring from the undried printed paper surface onto a surface of the guide roller disposed downstream of the printing section. The conventional ink transfer preventing measure of this type is to have an ink transfer preventive sheet wound on the surface of such a guide roller (see, e.g., JP S53-7841 B and JP H11-20134 A) or to cool ink on the paper surface with a roller whose surface is cooled (see, e.g., JP H06-182963 A). To prevent ink transfer, a measure has also been known that guides the printed paper non-contactually while blowing air from the guide surface of a guide bar such as a non-rotating turn-bar (see, e.g., JP H08-245028 A). While the conventional guide roller having the ink transfer preventive sheet wound thereon is capable of limiting the ink transfer onto the guide roller surface, it cannot eliminate the same completely and requires the guide roller surface to be washed periodically. Also, the means that cool the undried ink on the paper surface for preventing the ink from transferring to a downstream roller requires a special makeup for cooling the roller, and hence become costly. Further, the aforementioned measure of guiding the paper non-contactually requires a special makeup for blowing air, and here again becomes costly. Furthermore, with the paper surface floated by air, this measure presents the problem that the paper fluctuates in tension and its registration is not steadied. That a drier is disposed immediately downstream of a printing unit is true for a multiweb type rotary press system as well in which a plurality of continuous papers or webs are printed side by side with a plurality of printers and after they are printed are laid one on top of another to form a product from them. In such a rotary press system as shown in FIG. 1 , rotary presses 5 a , 5 b each of which comprises a paper feeder 1 , a printing unit 2 , a drier 3 and a cooler 4 , and whose number corresponds to the number of webs 6 are disposed in parallel with one another. The webs 6 printed are laid one on top of another with an inverting unit 7 a , 7 b using a plurality of guide rollers and turn-bars each disposed downstream of the cooler 4 in each of the rotary press 5 a , 5 b , and thereafter are allowed to travel via various guide rollers into a working and a processing section comprising a cutting and a folding unit and so on. In order to circumvent the problem that not only is a large space required but also both the operability and controllability of the system become poor if the rotary presses 5 a , 5 b are disposed in parallel on a floor as mentioned above, JP H07-227952 A describes a rotary press as shown in FIG. 2 in which in conjunction with a plurality of paper feeders 1 a , 1 b disposed in series with one another a plurality of printing units 2 a are disposed one above another. Disposed downstream of these printing units 2 a , 2 b are a dryer 8 through which webs 6 , 6 printed through the respective printing units 2 a , 2 b are passed in parallel to dry the printing ink thereon simultaneously and a cooler 9 through which the webs 6 , 6 with the ink dried are cooled. While the abovementioned makeup having a plurality of printing units disposed one above another is less disadvantageous than that of the horizontal parallel type not only in terms of the space of its installation on the floor but also in its workability and operability, there is presented the problem anew that the size is enlarged vertically. Further, where printing units placed one above another comprise printing cylinders to be exchanged to meet with a change in printing size, it becomes troublesome to make an exchange for an upper printing cylinder because of a raised position of its exchange and an increased distance from its storage position to the raised position where it is worked on for replacement.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>Made to solve the problems mentioned above, the present invention has for its object to provide a rotary press which with no substantial rise in cost and without entailing unsteadiness in registration is capable of preventing a print from contamination with any color different from a printing color. It is also an object of the present invention to provide a multiweb rotary press which without widening or vertically increasing the space for its installation is capable of preventing a print from contamination with any color different from a printing color. The present invention provides in a form of implementation thereof a rotary press which comprises a printing unit made of a set of printing cylinders such as plate and blanket cylinders or plate and impression cylinders for printing paper; and a dryer disposed downstream of the printing unit for drying the paper printed, characterized in that a guide roller is included therein for guiding the printed paper from the printing unit into the dryer wherein the guide roller has a diameter which is equal to, or an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated. According to this makeup, the paper printed by the printing unit is guide by the guide roller in a paper path between the printing unit and the drier. Then, by virtue of the fact that the guide roller has a diameter which is equal to, or an integral multiple of, a diameter of a printing cylinder in the printing unit and is adapted to rotate synchronously with the printing cylinder and at a peripheral speed that is identical to that at which the printing cylinder is rotated, the guide roller is always contacted by an identical portion of a image printed onto the paper and a print on the paper is thus prevented from being contaminated with any color other than a printing color. Also, the makeup described above which gives rise to the advantage that the paper can be guided without causing a print thereon to be contaminated with any color other than a printing color at the downstream of the printing section is advantageously applicable to a vertical offset rotary press in which a plurality of printing sections are vertically arranged one above another. Then, the drier need not be set up above the printer as at a position downstream of the printing section but on a floor surface away from the downstreammost printing section. As a result, the height of the vertical offset rotary press can be lowered. Also, applied to a horizontal rotary press in which a plurality of printing sections are horizontally arranged side by side, the makeup allows a paper path to be provided at need between the hindmost printing section and the dryer where the paper can be guide by the guide roller. Further, the guide roller may have its surface processed unevenly with a ceramic material having a special coating to prevent ink from adhering or depositing thereon. The present invention also provides in another form of implementation thereof a rotary press which has the makeup mentioned above and comprises a plurality of paper feeders, a plurality of such printing units as aforesaid and the dryer which together form a multiweb rotary press wherein the paper feeders for supplying a plurality of webs, respectively, are disposed in line in a direction generally in which the webs are supplied individually therefrom and the printing units for printing the webs, respectively, are disposed in line in a direction generally in which the webs from the paper feeders are to travel therethrough individually whereby the webs are printed in parallel with one another, and the printed webs are then dried and thereafter placed one on top of another to form a product therefrom, characterized in that the web printed through the printing unit that is the downstreammost is passed directly into the drier and that the said guide roller is disposed downstream of each of the other printing units for guiding each of the other webs printed by them respectively so as to bypass those printing units or unit located downstream of them respectively and then to travel into the dryer. Requiring the printing units to be disposed in line in a direction generally in which the webs are to travel therethrough, this further makeup makes the rotary press longer horizontally by the number of the printing units, but this does not go beyond the length of an ordinary multicolor rotary press and thus allows it to be installed without the need to extraordinarily widen the space for its installation and to make its height equal to that of an ordinary rotary press. And, in the arrangement that the printing units are disposed in line in a direction generally in which the webs are to travel therethrough, the webs printed by the printing units other than the downstreammost can be guided by the respective guide rollers or guide roller sets to bypass those printing units or unit located downstream of them respectively and then to travel into the dryer. Then, a print on each printed web is prevented from being contaminated with any color other than a printing color. Also, in the arrangement that a plurality of printing units are disposed in line in a direction generally in which the webs are to travel therethrough, this rotary press when a single web is to be passed through these printing units successively can be used as a conventional multicolor rotary press and thus is available for both multiweb printing and multicolor printing. Also, in the rotary press of any makeup as mentioned above, the printing cylinder in a said printing unit and the guide roller may each be made replaceable so that there is a replacement guide roller that can be replaced with in confirmation of a diameter of a replacement printing cylinder when replaced with. With this feature, the present invention is advantageously applicable to a rotary press in which a printing unit comprises a replaceable cylinder unit. Another feature of the present invention is characterized in that a said printing unit may be constituted with a duplex printer.
20040319
20060711
20050127
62730.0
0
NGUYEN, ANTHONY H
ROTARY PRESS
UNDISCOUNTED
0
ACCEPTED
2,004
10,804,745
ACCEPTED
Automatic lateral acceleration limiting and non threat target rejection
The present invention provides a system and method for enabling a vehicle having adaptive cruise control to reduce its speed in a turn according to the vehicle's position within the turn as well as ignoring objects detected during the turn that are not in the vehicle's path. The method of the present invention includes the steps of operating the vehicle in an adaptive cruise control mode such that the vehicle is traveling at a set speed; determining whether the vehicle is in a turn in the vehicle's path by detecting change in the vehicle's lateral acceleration; and when the vehicle is determined to be in the turn, reducing the vehicle's speed according to the vehicle's position in the turn, monitoring for objects and maintaining the vehicle's speed if an object is positioned out of the path of the vehicle.
1. A method of controlling a vehicle having an adaptive cruise control system capable of obtaining the vehicle's lateral acceleration, said method comprising the steps of: determining when the vehicle is in a turn based on a detected change in the vehicle's lateral acceleration; and reducing the vehicle's speed according to the vehicle's position in the turn. 2. The method of claim 1 wherein said step of determining includes steps of measuring the vehicle's speed; measuring the vehicle's yaw rate; and measuring the rate of change in the vehicle's yaw rate. 3. The method of claim 2 wherein said step of determining further includes a step of utilizing speed data corresponding to the vehicle's speed, yaw rate data corresponding to the vehicle's yaw rate, and yaw rate of change data corresponding to the rate of change in the vehicle's yaw rate, to calculate lateral acceleration data, said lateral acceleration data corresponding to the vehicle's lateral acceleration. 4. The method of claim 3 wherein said step of determining includes a step of filtering the lateral acceleration data to detect change in the vehicle's lateral acceleration. 5. The method of claim 4 wherein said step of determining further includes a step of processing the filtered lateral acceleration data to determine whether the vehicle is turning. 6. The method of claim 1 further comprising a step of determining the vehicle's position within the turn. 7. The method of claim 1 wherein said step of reducing the vehicle's speed includes a step of reducing the speed until the vehicle's lateral acceleration exceeds a predetermined limit. 8. The method of claim 1 further comprising the steps of: detecting an object; determining whether the object is in the vehicle's path during the turn; and ignoring the object for braking purposes if the object is determined not to be in the vehicle's path during the turn. 9. The method of claim 8 wherein said step of determining whether the object is in the vehicle's path includes steps of: measuring an object range; measuring an object range rate; measuring an object angle; and determining the vehicle path's radius of curvature. 10. The method of claim 8 wherein said step of determining whether the object is in the vehicle's path includes a step of verifying whether the object is in the vehicle's path, said step of verifying including a step of using the yaw rate data, the yaw rate of change data, the speed data, range data corresponding to a distance between the vehicle and the object, range rate data corresponding to a rate that the distance between the vehicle and the object is changing, angle data corresponding to the object's angle in relation to the vehicle, and road curvature data corresponding to the vehicle path's radius of curvature. 11. A method of controlling a vehicle, said method comprising the steps of: operating the vehicle in an adaptive cruise control mode such that the vehicle is traveling at a set speed; determining whether the vehicle is in a turn in the vehicle's path by detecting change in the vehicle's lateral acceleration; and when the vehicle is determined to be in the turn, reducing the vehicle's speed according to the vehicle's position in the turn, monitoring for objects and maintaining the vehicle's speed if an object is positioned out of the path of the vehicle. 12. The method of claim 11 wherein said step of determining whether the vehicle is in a turn includes steps of measuring the vehicle's speed; measuring the vehicle's yaw rate; and measuring change in the vehicle's yaw rate. 13. The method of claim 12 wherein said step of determining whether the vehicle is in a turn further includes a step of using the vehicle's speed, the vehicle's yaw rate and a change in the vehicle's yaw rate to calculate the vehicle's lateral acceleration. 14. The method of claim 11 further comprising a step of determining the vehicle's position within the turn. 15. The method of claim 14 wherein said step of reducing the vehicle's speed includes a step of reducing the vehicle's speed until the vehicle's lateral acceleration exceeds a predetermined limit. 16. The method of claim 11 wherein said step of monitoring includes a step of detecting an object. 17. The method of claim 16 wherein said step of detecting an object includes steps of: measuring object range; measuring object range rate, said object range rate corresponding to a rate that the distance between the vehicle and the object is changing; measuring object angle; and determining the radius of curvature of the vehicle's path. 18. The method claim of 17 wherein said step of monitoring includes a step of determining whether the detected object is in the vehicle's path. 19. The method of claim 18 wherein said step of monitoring includes a step of verifying that the object is in the vehicle's path. 20. A method of controlling a vehicle operating in an adaptive cruise control mode and traveling at a set speed, said method comprising the steps of: estimating a path for the vehicle in a turn; associating the vehicle path with a first zone area, the first zone area including the turn; and reducing the vehicle's speed when a detected object is determined to be in the first zone area and maintaining the vehicle's speed when the detected object is determined to be outside of the first zone area. 21. The method of claim 20 further comprising the steps of: defining a second zone area outside of the first zone area; detecting an object; and determining whether the object is in one of the first and the second zone areas. 22. The method of claim 21 wherein said step of reducing includes a step of reducing the vehicle's speed when a detected object is determined to be within at least one of the first and the second zone areas and maintaining the vehicle's speed when a detected object is determined to be outside of both the first and the second zone areas. 23. The method of claim 20 further including steps of: determining the vehicle's lateral acceleration; detecting change in the vehicle's lateral acceleration to determine when the vehicle is in the turn; and reducing the vehicle's speed according to the vehicle's position in the turn when the vehicle is determined to be in the turn. 24. The method of claim 23 wherein said step of determining the vehicle's lateral acceleration includes steps of: measuring the vehicle's speed; measuring the vehicle's yaw rate; and measuring the rate of change in the vehicle's yaw rate. 25. The method of claim 24 wherein said step of determining the vehicle's lateral acceleration further includes a step of utilizing speed data corresponding to the vehicle's speed, yaw rate data corresponding to the vehicle's yaw rate, and yaw rate of change data corresponding to rate of change in the vehicle's yaw rate, to calculate lateral acceleration data, said lateral acceleration data corresponding to the vehicle's lateral acceleration. 26. The method of claim 25 wherein said step of detecting change in the vehicle's lateral acceleration includes a step of filtering the lateral acceleration data to detect the change. 27. The method of claim 24 wherein said step of detecting change in the vehicle's lateral acceleration further includes a step of evaluating the filtered lateral acceleration data to determine whether the vehicle is turning. 28. The method of claim 24 further comprising a step of determining the vehicle's position within the turn. 29. The method of claim 23 wherein said step of reducing the vehicle's speed includes a step of reducing the speed until the vehicle's lateral acceleration exceeds a predetermined limit. 30. The method of claim 21 wherein said step of determining whether the object is in one of the first and the second zone areas includes steps of: measuring an object range corresponding to a distance between the vehicle and the object; measuring an object range rate corresponding to a rate that the distance between the vehicle and the object is changing; measuring an object angle corresponding to the object's angle in relation to the vehicle; and determining road curvature corresponding to the vehicle path's radius of curvature. 31. The method of claim 30 further comprising a step of verifying that the object is in one of the first and second zone areas. 32. The method of claim 30 wherein said step of verifying includes a step of using the yaw rate data, the yaw rate of change data, the speed data, range data corresponding to the object range, range rate data corresponding to the object range rate, angle data corresponding to the object angle, and road curvature data corresponding to the road curvature to verify that the object is in one of the first and second zone areas. 33. A system for use in controlling a vehicle, said system including: an adaptive cruise control system; a controller in communication with said adaptive cruise control system and capable of determining when the vehicle is in a turn, said controller operative to reduce the vehicle's speed according to the vehicle's position in the turn; at least one lateral acceleration sensor for generating a signal corresponding to the vehicle's lateral acceleration, said lateral acceleration sensor in electrical communication with said controller and operative to detect a change in the vehicle's lateral acceleration; and at least one object detection sensor for detecting an object in the path of the vehicle during the turn, said object detection sensor in electrical communication with said controller, wherein said controller includes control logic operative to determine whether the object is in the vehicle's path during the turn and ignoring the object for braking purposes when the object is not determined to be in the vehicle's path. 34. The system of claim 33 wherein said object detection sensor includes means for generating an object range signal corresponding to a distance between the vehicle and the object; and an object angle signal corresponding to the object's angle in relation to the vehicle. 35. The system of claim 34 wherein said controller includes both means for measuring an object range rate corresponding to the rate in which the distance between the vehicle and the object is changing, and means for determining a curvature corresponding to the radius of curvature of the vehicle's path, said curvature corresponding to road curvature data. 36. The system of claim 35 further comprising means for measuring the vehicle's speed; measuring the vehicle's yaw rate; and measuring the rate of change in the vehicle's yaw rate. 37. The system of claim 36 wherein, upon said controller's determination that the object is in the vehicle's path, said controller uses yaw rate data corresponding to the vehicle's yaw rate, yaw rate of change data corresponding to the change in the vehicle's yaw rate, speed data corresponding to the vehicle's speed, range data corresponding to the object range signal, range rate data corresponding to the object range rate, angle data corresponding to the object angle signal, and road curvature data, to verify that the object is in the vehicle's path. 38. A method of controlling a vehicle in a turn, said method comprising the steps of: measuring the vehicle's speed; measuring the vehicle's lateral acceleration; estimating the radius of curvature of the vehicle's path based on the vehicle's speed and lateral acceleration; and when the combination of the vehicle's speed and the vehicle path's radius of curvature exceeds a predetermined maximum lateral acceleration limit, reducing the vehicle's speed. 39. The method of claim 1 further comprising a step of measuring the vehicle's lateral acceleration. 40. The method of claim 16 further comprising a step of measuring the vehicle's lateral acceleration.
TECHNICAL BACKGROUND The present invention generally relates to a vehicle which contains an adaptive cruise control (“ACC”) system. Specifically, this invention relates to a method and system for controlling a vehicle having an ACC system. BACKGROUND OF THE INVENTION Cruise control systems for automotive vehicles are widely known in the art. In basic systems, the driver of a vehicle attains a desired vehicle speed and initiates the cruise control system at a set speed. The vehicle then travels at the set speed until the driver applies the brakes or turns off the system. Advances in vehicle electronics and sensory technology have provided for cruise control systems that go a step beyond the system described above. ACC systems are not only capable of maintaining a set vehicle speed, but they also include object sensing technology, such as radar, laser, or other types of sensing systems, that will detect a vehicle in the path of the vehicle that contains the ACC (or other form of cruise control) system (i.e., “host vehicle”). Accordingly, ACC is an enhancement to traditional cruise control by automatically adjusting a set speed to allow a vehicle to adapt to moving traffic. Under normal driving conditions the ACC system is engaged with a set speed equal to a maximum speed that is desired by the vehicle driver, and the ACC system operates in a conventional cruise control mode. If the host vehicle is following too closely behind a vehicle in the path of the host vehicle (“in-path vehicle”), the ACC system automatically reduces the host vehicle's speed by reducing the throttle and/or applying the brakes to obtain a predetermined safe following interval. When the in-path vehicle approaches slow traffic and the ACC system reduces the speed of the host vehicle below a minimum speed for ACC operation, the ACC automatically disengages and the driver manually follows slower in-path vehicles in the slow traffic. When the slow traffic is no longer in front of the host-vehicle, the driver must manually accelerate the host vehicle to a speed above the minimum speed for ACC operation before the ACC system is able to resume acceleration to the set speed. In typical ACC systems, objects moving at approximately 30% (thirty percent) or less of the host vehicle's speed are disregarded for braking purposes (i.e., the vehicle's brakes are not applied, the throttle is not reduced, and no other action is taken to slow down the host vehicle). Traditional ACC systems were designed to enable a vehicle to react to moving targets presented by normal traffic conditions under extended cruise control operation and when the vehicle is traveling at speeds above forty (40) kilometers per hour (KPH). “Stop-and-go” ACC systems are an enhanced form of ACC that overcome some of the shortcomings of ACC systems. Stop-and-go ACC systems enable the host vehicle to follow an in-path vehicle in slower traffic conditions such as stop and go traffic. Therefore, while ACC stop-and-go systems improve the performance of traditional ACC systems, both ACC and ACC stop-and-go systems still provide problems for the driver of the vehicle. A first problem presented by ACC and ACC stop-and-go systems is that because there may be an abundance of out-of-path stationary targets encountered by a vehicle during a turn, braking for each of these targets can cause driver discomfort. Current ACC and ACC stop-and-go systems are not capable of disregarding the stationary targets not within the vehicle's path (i.e., “out-of-path” targets). An example is shown in FIG. 1, in which vehicle 102 utilizes a prior art ACC or ACC stop-and-go system. Vehicle 102 is shown at three (4) different times—time one (“T1”), time two (“T2”), time three (“T3”) and time four (“T4”). At T1, vehicle 102 is shown traveling in the direction of arrow 109 at a cruise speed on road 104. In-path indicator 103 highlights objects that are in the path of vehicle 102 as vehicle 102 travels. As vehicle 102 enters a left turn at T2, which is illustrated by arrow 106 (“turn 106”), in-path indicator 103 illustrates that stationary object 110 is within vehicle's 102 path. Object 110 may be any stationary object, for example, a traffic light, a stopped vehicle, construction equipment, a person, an animal, a sign, or any other object. Since object 110 is in the path of vehicle 102, the ACC or ACC stop-and-go system contained by vehicle 102 appropriately instructs vehicle 102 to either brake or reduce its speed in some fashion. This situation, however, is an unnecessary braking situation because vehicle 110 is not a threat to vehicle 102 at T2. As vehicle 102 is midway through turn 106 at T3, vehicle 102 detects stationary object 112, as highlighted by in-path indicator 103. Because object 112 is in the path of vehicle 102, vehicle's 102 ACC or ACC stop-and-go system brakes and reduces vehicle's 102 speed. Object 112, however, like object 110, is non-threatening to vehicle 102. Therefore, in making turn 106, vehicle's 102 ACC or ACC stop-and-go system unnecessarily reduces the speed of vehicle 102. This excessive braking may annoy and provide discomfort to the driver of vehicle 102. Another problem presented by current ACC and ACC stop-and-go systems is that the systems' maintenance of a set cruise speed in turning situations may cause excessive lateral acceleration and the possible loss of control of the host vehicle. An example is shown in FIG. 1. As vehicle 102 enters turn 106, maintaining the cruise speed may cause excessive lateral acceleration. Vehicle 102, shown at T4, illustrates how the excessive lateral acceleration can cause vehicle's 102 tail to careen out of vehicle's 102 desired turn 106. Excessive lateral acceleration such as that described in this example may result in injury to the driver of vehicle 102 as well as to nearby vehicle drivers or pedestrians. SUMMARY OF THE INVENTION The method and system of the present invention provides smooth vehicle control in turning situations both by limiting lateral acceleration during the vehicle turn and by eliminating braking for out-of-path targets. In one form of the present invention, a method of controlling a vehicle having an adaptive cruise control system capable of obtaining the vehicle's lateral acceleration is provided, the method including the steps of determining when the vehicle is in a turn based on a detected change in the vehicle's lateral acceleration; and reducing the vehicle's speed according to the vehicle's position in the turn. In another form of the present invention, a method of controlling a vehicle is provided, the method including the steps of operating the vehicle in an adaptive cruise control mode such that the vehicle is traveling at a set speed; determining whether the vehicle is in a turn in the vehicle's path by detecting change in the vehicle's lateral acceleration; and when the vehicle is determined to be in the turn, reducing the vehicle's speed according to the vehicle's position in the turn, monitoring for objects and maintaining the vehicle's speed if an object is positioned out of the path of the vehicle. In still another form, the present invention provides a method of controlling a vehicle operating in an adaptive cruise control mode and traveling at a set speed, the method including the steps of estimating a path for the vehicle in a turn; associating the vehicle path with a first zone area, the first zone area including the turn; and reducing the vehicle's speed when a detected object is determined to be in the first zone area and maintaining the vehicle's speed when a detected object is determined to be outside of the first zone area. In yet another form of the present invention, a system is provided for use in controlling a vehicle, the system including an adaptive cruise control system; a controller in communication with the adaptive cruise control system and capable of determining when the vehicle is in a turn, the controller operative to reduce the vehicle's speed according to the vehicle's position in the turn; at least one lateral acceleration sensor for generating a signal corresponding to the vehicle's lateral acceleration, the lateral acceleration sensor in electrical communication with the controller and operative to detect a change in the vehicle's lateral acceleration; and at least one object detection sensor for detecting an object in the path of the vehicle during the turn, the object detection sensor in electrical communication with the controller, wherein the controller includes control logic operative to determine whether the object is in the vehicle's path during the turn and ignoring the object for braking purposes when the object is not determined to be in the vehicle's path. In another form of the present invention, a method of controlling a vehicle in a turn is provided, the method including the steps of measuring the vehicle's speed; measuring the vehicle's lateral acceleration; estimating the radius of curvature of the vehicle's path based on the vehicle's speed and lateral acceleration; and when the combination of the vehicle's speed and the vehicle path's radius of curvature exceeds a predetermined maximum lateral acceleration limit, reducing the vehicle's speed. BRIEF DESCRIPTION OF THE DRAWINGS The above-mentioned and other features and objects of this invention, and the manner of attaining them, will become more apparent and the invention itself will be better understood by reference to the following description of embodiments of the invention taken in conjunction with the accompanying drawings, wherein: FIG. 1 is a diagrammatic view of a vehicle having a prior art ACC or ACC stop-and-go ACC system in a turn situation; FIG. 2 is a schematic view of a vehicle including the system of the present invention; FIG. 3 is a diagrammatic view of a vehicle having the inventive system in a turn situation; FIG. 4 is a illustrative view of the method of the present invention; and FIG. 5 charts the lateral acceleration of a vehicle in a turn situation. Corresponding reference characters indicate corresponding parts throughout the several views. Although the drawings represent embodiments of the present invention, the drawings are not necessarily to scale and certain features may be exaggerated in order to better illustrate and explain the present invention. The exemplifications set out herein illustrate embodiments of the invention in several forms and such exemplification is not to be construed as limiting the scope of the invention in any manner. DESCRIPTION OF INVENTION The embodiments disclosed below are not intended to be exhaustive or limit the invention to the precise forms disclosed in the following detailed description. Rather, the embodiments are chosen and described so that others skilled in the art may utilize their teachings. FIG. 2 shows the inventive stop-and-go adaptive cruise control (ACC) system 210 of the present invention. While system 210 is described within the context of an ACC stop-and-go system, it is contemplated that system 210 may also be used in a traditional ACC system. System 210 is implemented in host vehicle 200 that has braking system 212 and engine management system 214. System 210 includes vehicle speed sensor 215 for measuring vehicle's 200 speed, lateral acceleration sensor 216 for measuring the acceleration of vehicle 200 in the direction of vehicle's 200 lateral axis in a turn, and yaw rate sensor 218 for measuring the rate that vehicle 200 is rotating about its vertical axis. System 210 also includes sensor 220 for generating a range signal corresponding to a distance between host vehicle 200 and a target, and a target range rate signal corresponding to a rate that the distance between host vehicle 200 and the target is changing. Controller 222 is in electronic communication with sensors 215, 216, 218, 220 over communication bus 224. Braking system 212 may include any braking system that is capable of reducing the speed of vehicle 200. Such braking mechanisms include a transmission controller that is capable of downshifting a transmission of vehicle 200, a throttle that may be reduced to decrease the speed of vehicle 200, a brake booster controller equivalent to the vehicle's driver applying the brakes, etc. Engine management system 214 may include any known vehicle component or system that may be used to adjust the acceleration of vehicle 200. Such components and/or systems may include a vehicle accelerator, a fuel and air intake control system, or an engine timing controller. Sensor 220 may include any object detecting sensor known in the art, including a radar sensor (e.g., doppler or microwave radar), a laser radar (LIDAR) sensor, an ultrasonic radar, a forward looking IR (FLIR), a stereo imaging system, or a combination of a radar sensor and a camera system. Sensor 220 functions to detect objects positioned in the path of vehicle 200. For example, shown in FIGS. 1 and 3, in-path indicators 103, 303 depict sensor's 220 capability to detect an object in the path of vehicles 103, 303, respectively. Sensor 220 may be used alone or in combination with other sensors, and depending on the type of sensor 220 used, sensor 220 may also be mounted alone or in multiples. In an exemplary embodiment of the present invention, sensor 220 is front mounted so as to provide a wide sensor field of view (FOV) covering a minimum turn radius of ten (10) meters. Sensor 220 may also be used in some embodiments of system 210 to gather additional information useful to controller 222 in determining the threat of the object to vehicle 200 and the appropriate actions to carry out. This additional information includes the target angle of the object relative to vehicle 200 and the yaw rate of the object relative to vehicle 200. In other embodiments of system 210, sensors other than sensor 220 may be provided to measure both the target angle and the yaw rate of the object (i.e., target). Controller 222 may be a microprocessor-based controller such as a computer having a central processing unit, random access and/or read-only memory, and associated input and output busses. Controller 222 may be a portion of a main control unit such as vehicle's 200 main controller, or controller 222 may be a stand-alone controller. Controller 222 contains logic for enabling vehicle 200 to reduce its speed in a turn as well as to ignore objects positioned outside of a specific zone area, as will be described in further detail below with regards to FIGS. 3 and 4. FIGS. 3 and 4 will now be used in conjunction to describe the method and system of the present invention. Shown in FIG. 3 is vehicle 302 implementing system 210 (FIG. 2) of the present invention. Vehicle 302 is shown in FIG. 3 at T1, T2, T3 and T4. At T1, vehicle 302 is displayed traveling at a cruise speed in the direction of arrow 309 on road 304. As vehicle 302 enters the turn at T2, controller 222 executes the logic steps illustrated in FIG. 4. In an exemplary embodiment of system 210, controller 222 stores the logic steps in memory as instructions to be executed by a processor. As indicated by steps 402-408, controller 222 continuously monitors vehicle's 302 speed, lateral acceleration and yaw rate, each of which is provided to controller 222 as signals from sensors 215, 216, 218 (FIG. 2). At step 402, controller 222 obtains and stores vehicle's 302 lateral acceleration data, yaw rate data and vehicle speed data. At step 404, controller 222 uses a time lag filter to filter the raw lateral acceleration, yaw rate and vehicle speed data, and at step 406, controller 222 processes this filtered data. Charted in FIG. 5 is the lateral acceleration of a vehicle in a turn versus the time it takes for the vehicle to complete the turn. The X axis denotes the duration of time it takes the vehicle to complete the turn. The Y axis denotes the lateral acceleration of the vehicle during the turn. The actual path of a vehicle in the turn is illustrated as curve 500. Curve 500 exhibits the path that a vehicle follows in a turn. Curve 500 may be broken into three (3) sections—entry section 502, middle section 504 and exit section 506. At entry section 502 of turn 500, a vehicle enters the turn. At midsection 504 of turn 500, the vehicle completes the middle of the turn, and at exit section 506, the vehicle completes the turn. Controller 222 (FIG. 2) may contain logic enabling it to use known characteristics of curve 500 to predict not only whether vehicle 302 is in a turn, but also to determine the position in which vehicle 302 is located in the turn, e.g., in the entry of a turn, in the middle of a turn, or in the exit of a turn. Curve 520 depicts a vehicle's lateral acceleration during the turn illustrated by curve 500. At entry section 522 of curve 520, the vehicle's lateral acceleration increases from zero (0) Gs to about 0.15 Gs at a steady rate. At midsection 504 of curve 520, the lateral acceleration of the vehicle increases less over time and, when charted, has close to a constant curve. The lateral acceleration of the vehicle reaches its maximum value, 0.20 Gs, during midsection 524 of curve 520. At exit section 526, the lateral acceleration becomes nearly constant before decreasing back to zero (0) as the turn is completed. Based on curve 520 or other curves derived by the performance of testing, the following characteristics of a vehicle's lateral acceleration in a turn may be derived: 1) in the entry of a turn, the lateral acceleration of a vehicle is likely to rapidly increase from zero (0) Gs over time; 2) in the middle of a turn, the lateral acceleration of a vehicle is likely to show a constant increase before reaching a maximum value; and 3) in the exit of a turn, the lateral acceleration of a vehicle is likely to remain steady for a short period of time before decreasing. These characteristics may be used to program controller 222 both to deduce when a vehicle is in a turning situation and to determine at what position the vehicle is in within the turn. Controller 222 also uses other data obtained from vehicle 302 to predict whether vehicle 302 is in a turn. This data includes vehicle's 302 yaw rate, which is obtained from yaw rate sensor 218; vehicle's 302 yaw rate of change, which controller 222 calculates based on the yaw rate; and vehicle's 302 speed, which is obtained from vehicle speed sensor 215. Yaw rate basically indicates that vehicle 302 is turning on the axis that runs vertically through the center of the vehicle. Vehicle speed data may be combined with lateral acceleration data to indicate the radius of curvature (ROC) or a road, i.e., how tight the turn is. Referring back to FIGS. 3 and 4, if controller 222 determines at step 408 that vehicle 302 is not turning, then controller 222 continues to monitor vehicle's 302 lateral acceleration, yaw rate and vehicle speed by obtaining lateral acceleration, yaw rate and vehicle speed data at step 402. However, if controller 222 determines that vehicle 302 is turning, at step 410 controller 222 determines the position of vehicle 302 in the turn. As explained above, controller 222 determines vehicle's 302 position within the turn by using programmed instructions that recognize patterns exhibited in lateral acceleration data when a vehicle is in the entry of a turn, in the middle of a turn, or exiting a turn. After controller 222 determines at step 410 where in turn 306 vehicle 302 is positioned, controller 222 then instructs braking system 212 at step 412 to preemptively reduce vehicle's 302 speed so that vehicle's 302 lateral acceleration speed is reduced o a predetermined maximum limit according to vehicle's 302 position in the turn. For example, vehicle 302 may have been set at a cruise speed of fifty (50) miles per hour (MPH) at T2. However, controller 222 may contain program instructions that indicate that when vehicle 302 is in the entry of a turn, vehicle's 302 speed should be reduced inversely as the ROC of the turn is reduced. For the same speed, a tighter turn increases the lateral acceleration. For a constant curve, an increase in speed increases the lateral acceleration. By estimating the ROC continuously, when the combination of vehicle's 302 speed and the turn's ROC exceeds the predetermined maximum lateral acceleration limit, controller 222 reduces the speed of vehicle 302. The formula to find lateral acceleration is LA=v2/ROC (where LA is lateral acceleration and v is speed), so both speed and ROC affect lateral acceleration. Upon reducing vehicle's 302 speed, controller 222 may use vehicle's 302 lateral acceleration, yaw rate, yaw rate of change and speed data to estimate the path of vehicle 302 in turn 306 at step 414. Path estimation is a projection of where vehicle 302 will be at the next sample time. Vehicle's 302 path estimation is a vector whose longitudinal component is based on vehicle's 302 current speed plus the change in vehicle's 302 speed (delta speed). The angle component of vehicle's 302 path estimation is based on vehicle's 302 lateral acceleration, lateral acceleration rate of change, yaw rate and yaw rate of change. The net result is an estimate of the new position of vehicle 302 at time zero (0) plus the change in time (delta time). Referring to FIG. 3, the projected path of vehicle 302 in turn 306 is marked by boundaries 308a, 308b. Controller 222 does not instruct braking system 212 to brake or reduce vehicle's 302 speed in turn 306 when an object detected by sensor 220 (FIG. 2) is outside of projected path boundaries 308a, 308b. Further, in the case that the projected path of vehicle 302 is not accurate and boundaries 308a, 308b are incorrectly determined, controller 222 may also determine a safety zone outside of path boundaries 308a, 308b. The safety zone, bounded by safety zone boundaries 310a, 310b, is similar to boundaries 308a, 308b in that controller 222 does not instruct braking system 212 to brake or reduce vehicle's 302 speed based upon sensor's 220 detection of an object outside of safety zone boundaries 310a, 310b. After controller projects the path of vehicle 302 at step 414, controller 222 obtains sensor data from sensor 220 at step 416 to determine whether stationary object 310 has been detected. As stated above, in-path indicator 303 depicts what, if anything, is detected by sensor 220 as being in the path of vehicle 302. As vehicle 302 enters turn 306, in-path indicator 303 highlights stopped vehicle 302, thus indicating at step 418 that vehicle's sensor 220 detects vehicle 302 as being in vehicle's 302 path. If sensor 220 does not detect target 310, then controller 222 re-executes the logic steps of FIG. 4 beginning at step 402. Upon detecting target 310, controller 222 verifies at step 420 that stopped vehicle 302 is valid by subjecting target 310 to persistence filtering. The persistence filtering includes using vehicle's 302 yaw rate, yaw rate of change, speed, range (i.e., signal corresponding to a distance between vehicle 302 and target 310), range rate (i.e., signal corresponding to a rate that the distance between vehicle 302 and target 310 is changing), the angle of target 310 and the ROC of turn 306 to verify target 310. Target 310 has a range rate equal to but opposite vehicle's 302 speed. By subtracting the range and angle data from vehicle's 302 speed, controller 222 can determine the actual speed and location of target 310. If the range decreases and the range rate changes inversely to vehicle's 302 delta speed, then target 310 is stationary. If controller 222 determines that target 310 is stationary multiple times, then target 310 is considered to be verified. If target 310 is not directly in front of vehicle 302, e.g., in a curve, then controller 222 performs the same verification test using vector geometry. When controller 222 has verified that stopped vehicle 302 is a valid target, controller 222 next determines at step 422 whether vehicle 302 out-of-path. Because vehicle 302 is neither within projected path boundaries 308a, 308b nor within safety zone boundaries 310a, 310b, controller 222 determines that vehicle 302 is out-of-path. Accordingly, whereas a prior art ACC or ACC stop-and-go system would cause vehicle 302 to reduce its speed because of detected vehicle 302, controller 222 eliminates system's 210 braking system at step 424 because stopped vehicle 302 is outside of both projected path boundaries 308a, 308b and safety zone boundaries 310a, 310b. A similar situation is presented at T3. Controller 222 determines at step 410 that vehicle 302 is midway through turn 306 and adjusts vehicle's 302 speed according to programmed instructions that provide a predetermined lateral acceleration limit for vehicle 302 midway through its turn. After projecting vehicle's 302 path at step 414, controller 222 then obtains sensor signal data from sensor 220 at step 416. In-path indicator 303 highlights a corner of target 312, thus indicating that target 312 has been detected at step 418. Once controller 222 verifies at step 420 that target 312 is a valid target, controller 222 determines at step 422 whether target 312 is out-of-path. Since target 312 is positioned outside of both projected path boundaries 308a, 308b and safety zone boundaries 310a, 310b, while prior art ACC or ACC stop-and-go systems would have caused vehicle 302 to once again reduce its speed due to the detection of target 312 during turn 306, inventive system 210 does not instruct braking system 212 to brake or otherwise reduce vehicle's 302 speed because target 312 is out-of-path. If controller 222 had determined that target 312 was in path, it would have instructed braking system 212 to initiate its brake routine. While this invention has been described as having an exemplary design, the present invention may be further modified within the spirit and scope of this disclosure. This application is therefore intended to cover any variations, uses, or adaptations of the invention using its general principles. Further, this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains.
<SOH> TECHNICAL BACKGROUND <EOH>The present invention generally relates to a vehicle which contains an adaptive cruise control (“ACC”) system. Specifically, this invention relates to a method and system for controlling a vehicle having an ACC system.
<SOH> SUMMARY OF THE INVENTION <EOH>The method and system of the present invention provides smooth vehicle control in turning situations both by limiting lateral acceleration during the vehicle turn and by eliminating braking for out-of-path targets. In one form of the present invention, a method of controlling a vehicle having an adaptive cruise control system capable of obtaining the vehicle's lateral acceleration is provided, the method including the steps of determining when the vehicle is in a turn based on a detected change in the vehicle's lateral acceleration; and reducing the vehicle's speed according to the vehicle's position in the turn. In another form of the present invention, a method of controlling a vehicle is provided, the method including the steps of operating the vehicle in an adaptive cruise control mode such that the vehicle is traveling at a set speed; determining whether the vehicle is in a turn in the vehicle's path by detecting change in the vehicle's lateral acceleration; and when the vehicle is determined to be in the turn, reducing the vehicle's speed according to the vehicle's position in the turn, monitoring for objects and maintaining the vehicle's speed if an object is positioned out of the path of the vehicle. In still another form, the present invention provides a method of controlling a vehicle operating in an adaptive cruise control mode and traveling at a set speed, the method including the steps of estimating a path for the vehicle in a turn; associating the vehicle path with a first zone area, the first zone area including the turn; and reducing the vehicle's speed when a detected object is determined to be in the first zone area and maintaining the vehicle's speed when a detected object is determined to be outside of the first zone area. In yet another form of the present invention, a system is provided for use in controlling a vehicle, the system including an adaptive cruise control system; a controller in communication with the adaptive cruise control system and capable of determining when the vehicle is in a turn, the controller operative to reduce the vehicle's speed according to the vehicle's position in the turn; at least one lateral acceleration sensor for generating a signal corresponding to the vehicle's lateral acceleration, the lateral acceleration sensor in electrical communication with the controller and operative to detect a change in the vehicle's lateral acceleration; and at least one object detection sensor for detecting an object in the path of the vehicle during the turn, the object detection sensor in electrical communication with the controller, wherein the controller includes control logic operative to determine whether the object is in the vehicle's path during the turn and ignoring the object for braking purposes when the object is not determined to be in the vehicle's path. In another form of the present invention, a method of controlling a vehicle in a turn is provided, the method including the steps of measuring the vehicle's speed; measuring the vehicle's lateral acceleration; estimating the radius of curvature of the vehicle's path based on the vehicle's speed and lateral acceleration; and when the combination of the vehicle's speed and the vehicle path's radius of curvature exceeds a predetermined maximum lateral acceleration limit, reducing the vehicle's speed.
20040319
20090331
20050922
72745.0
3
NGUYEN, TAN QUANG
AUTOMATIC LATERAL ACCELERATION LIMITING AND NON THREAT TARGET REJECTION
SMALL
0
ACCEPTED
2,004
10,804,808
ACCEPTED
Sanitized dispensing mechanism
A sanitized dispensing mechanism mounted to a vending machine includes a receptacle, a barrier and an actuating device. The receptacle has an interior chamber and a rear opening behind the interior chamber through which an item discharged from an exterior opening of the vending machine is received into the interior chamber. The barrier is mounted across the receptacle above a bottom opening below the interior chamber and, in response to a user moving the actuating device between first and second positions, is moved between receiving and dispensing positions. In the receiving position, the barrier receives and retains the item in the interior chamber blocking it from dropping through the bottom opening. In the dispensing position, the barrier releases the item from the interior chamber allowing it to drop through the bottom opening onto a user's hand.
1. A sanitized dispensing mechanism for a vending machine, comprising: (a) a receptacle attached to a vending machine adjacent to an exterior opening thereof and defining an interior chamber and a rear opening behind said interior chamber contiguous with the exterior opening of the vending machine through which rear opening an item discharged from the exterior opening of the vending machine is received into said interior chamber, said receptacle having a bottom opening below said interior chamber; (b) a barrier mounted across said receptacle between said interior chamber and said bottom opening thereof and adjacent to said rear opening thereof and the exterior opening of the vending machine and adapted to undergo movement between receiving and dispensing positions such that at said receiving position said barrier receives the item from the vending machine through the exterior opening thereof and said rear opening of said receptacle and retains the item in said interior chamber blocking the item from dropping through said bottom opening of said receptacle whereas at said dispensing position said barrier releases the item from said interior chamber allowing the item to drop through said bottom opening of said receptacle onto a hand of a user of the vending machine; and (c) an actuating device mounted adjacent to said receptacle and coupled to said barrier, said actuating device including an operating lever extending to exteriorly of said receptacle and the vending machine and adapted to be gripped and moved by the user between first and second positions to cause said barrier to move between said receiving and dispensing positions and the item to drop from said interior chamber of said receptacle onto the hand of the user. 2. The mechanism of claim 1 wherein said receptacle includes: a pair of side walls laterally spaced apart from one another, said side walls defining therebetween at lower edges thereof said bottom opening of said receptacle, said side walls defining therebetween at rear edges thereof said rear opening of said receptacle; a front wall extending between and interconnecting said side walls at front edges thereof and being disposed opposite from said rear opening of said receptacle; and a top wall extending between and interconnecting said side walls at upper edges thereof and being disposed opposite from said bottom opening of said receptacle, said side walls, front wall and top wall together defining said interior chamber of said receptacle. 3. The mechanism of claim 2 wherein said receptacle further includes a pair of mounting flanges attached to and extending in opposite directions away from one another and away from said rear edges of said side walls, said mounting flanges being adapted to receive fasteners for attaching said receptacle to the vending machine such that said rear opening of said receptacle is disposed contiguous with the exterior opening of the vending machine. 4. The mechanism of claim 2 wherein said side walls, front wall and top wall of said receptacle are made of a transparent material. 5. The mechanism of claim 1 wherein said actuating device further includes a pair of tracks laterally spaced apart from one another and mounted to the vending machine below said bottom opening of said receptacle and extending into the vending machine below the exterior opening thereof, each of said tracks having an elongated guide element formed thereon at an inner side thereof facing toward one another, said barrier disposed between said tracks and having a pair of opposite edges slidably supported by said guide elements of said tracks such that said barrier is movable along said tracks between said receiving and dispensing positions, one of said tracks disposed adjacent to said operating lever and having an elongated slot formed through said one track and receiving through said slot a link element that couples said operating lever to said barrier. 6. The mechanism of claim 5 wherein said barrier is a door of substantially planar configuration constituting a false floor for said receptacle extending across said bottom opening thereof when said barrier is disposed at said receiving position. 7. The mechanism of claim 5 wherein said actuating device further includes an elongated rail attached to said one track and having an elongated guide channel extending parallel to said guide elements of said tracks and receiving an elongated rib rigidly attached to and extending laterally from said operating lever such that said operating lever is moved between said first and second positions thereof along a path disposed parallel to a path along which said barrier is moved between said receiving and dispensing positions thereof. 8. The mechanism of claim 7 wherein said actuating device further includes an elongated coiled spring encircling a portion of said operating lever and engaged therewith so as to bias said operating lever to said first position and said door toward said receiving position. 9. The mechanism of claim 1 wherein said barrier includes: a stationary ledge fixedly mounted to said receptacle and extending across a portion of said bottom opening thereof; and a movable door pivotally mounted to said receptacle adjacent to said stationary ledge and extending across a remainder of said bottom opening thereof when said barrier is disposed at said receiving position. 10. The mechanism of claim 9 wherein said operating lever of said actuating device is attached to one of a pair of opposite sides of said door. 11. The mechanism of claim 10 wherein said receptacle is made of a transparent material. 12. The mechanism of claim 10 wherein said receptacle includes: a pair of side walls laterally spaced apart from one another, said side walls defining therebetween at lower edges thereof said bottom opening of said receptacle, said side walls defining therebetween at rear edges thereof said rear opening of said receptacle, one of said side walls having an arcuate-shaped slot defined therethrough and disposed adjacent to said one of said sides of said door such that said operating lever extends through said slot in said one side wall; and a front wall extending between and interconnecting said side walls at front edges thereof and being disposed opposite from said rear opening of said receptacle, said stationary ledge mounted to one of said front wall and said opposite side walls. 13. The mechanism of claim 12 wherein said barrier also includes a shaft supporting said door and pivotally mounting said door to said side walls of said receptacle, said actuating device further including a coiled spring encircling said shaft and engaged with said front wall and said door so as to bias said door toward said receiving position. 14. The mechanism of claim 12 wherein said receptacle further includes a pair of mounting flanges attached to and extending in opposite directions away from one another and away from said rear edges of said side walls, said mounting flanges being adapted to receive fasteners for attaching said receptacle to the vending machine such that said rear opening of said receptacle is disposed contiguous with the exterior opening of the vending machine. 15. The mechanism of claim 1 wherein said barrier is a door having a pair of opposite end portions disposed in planes substantially parallel to one another and a semi-cylindrical portion extending between and interconnecting said opposite end portions so as to form a cavity into which an item is received. 16. The mechanism of claim 15 wherein said operating lever of said actuating device is attached to one of said opposite end portions of said door. 17. The mechanism of claim 16 wherein said receptacle is made of a transparent material. 18. The mechanism of claim 16 wherein said receptacle includes a pair of side walls laterally spaced apart from one another, said side walls defining therebetween at lower edges thereof said bottom opening of said receptacle, said side walls defining therebetween at rear edges thereof said rear opening of said receptacle, one of said side walls having an arcuate-shaped slot defined therethrough and disposed adjacent to said one opposite end portion of said door such that said operating lever extends through said slot in said one side wall. 19. The mechanism of claim 18 wherein said barrier also includes a pair of stub shafts supporting said door at said opposite end portions thereof and pivotally mounting said door to said side walls of said receptacle, said actuating device further including a coiled spring encircling one of said stub shafts and engaged with said one side wall and said door so as to bias said door toward said receiving position. 20. The mechanism of claim 18 wherein said receptacle further includes a pair of mounting flanges attached to and extending in opposite directions away from one another and away from said rear edges of said side walls, said mounting flanges being adapted to receive fasteners for attaching said receptacle to the vending machine such that said rear opening of said receptacle is disposed contiguous with the exterior opening of the vending machine.
TECHNICAL FIELD The present invention generally relates to coin-operated vending machines and, more particularly, is concerned with a sanitized dispensing mechanism for a vending machine. BACKGROUND ART Most prior art vending machines dispense their items, such as candy or gum, into a cup on the machine which can be contacted and thus potentially contaminated by a user's hand. Some prior art machines employing such cups are disclosed in U.S. Pat. Nos. 5,452,822, 5,782,378, 5,833,117 and 5,897,022. The inventor herein has discerned that likely there are many potential users who would prefer an alternative way for items to be dispensed from vending machines, such as having the item dropped directly into a user's hand and not into a cup, so that the dispensed item cannot be contaminated through contact with parts of the vending machines which also can be contaminated by users. Consequently, a need exists for an innovation which will provide a solution to the aforementioned problem of prior art vending machines without introducing any new problems in place thereof. DISCLOSURE OF INVENTION The present invention provides a sanitized dispensing mechanism designed to satisfy the aforementioned need. The sanitized dispensing mechanism of the present invention receives an item from an interior discharge chute of a vending machine which is not accessible to a contaminated contact from the exterior of the machine and in response to actuation by a user drops the item into the user's hand such that the item does not contact, and thus cannot become contaminated by, parts of the vending machine vulnerable to contaminated contact by other users. Accordingly, the present invention is directed to a sanitized dispensing mechanism for a vending machine, comprising: (a) a receptacle attached to a vending machine adjacent to an exterior opening thereof and defining an interior chamber and a rear opening behind the interior chamber contiguous with the exterior opening of the vending machine through which rear opening an item discharged from the exterior opening of the vending machine is received into the interior chamber, the receptacle also defining a bottom opening below the interior chamber; (b) a barrier mounted across the receptacle between the interior chamber and bottom opening thereof and adjacent to the rear opening thereof and the exterior opening of the vending machine and adapted to undergo movement between receiving and dispensing positions such that at the receiving position the barrier receives the item from the vending machine through the exterior opening thereof and the rear opening of the receptacle and retains the item in the interior chamber blocking the item from dropping through the bottom opening of the receptacle whereas at the dispensing position the barrier releases the item from the interior chamber allowing the item to drop through the bottom opening of the receptacle onto a hand of a user of the vending machine; and (c) an actuating device mounted adjacent to the receptacle and coupled to the barrier, the actuating device including an operating lever extending to exteriorly of the receptacle and the vending machine and adapted to be gripped and moved by the user between first and second positions to cause the barrier to move between the receiving and dispensing positions and the item to drop from the interior chamber of the receptacle onto the hand of the user. Multiple embodiments of the sanitized dispensing mechanism are disclosed. These and other features and advantages of the present invention will become apparent to those skilled in the art upon a reading of the following detailed description when taken in conjunction with the drawings wherein there is shown and described an illustrative embodiment of the invention. BRIEF DESCRIPTION OF THE DRAWINGS In the following detailed description, reference will be made to the attached drawings in which: FIG. 1 is a front elevational view of a vending machine incorporating a sanitized dispensing mechanism of the present invention. FIG. 2 is an enlarged fragmentary sectional view of the vending machine taken along line 2—2 of FIG. 1 showing a first embodiment of the sanitized dispensing mechanism of the present invention. FIG. 3 is a front elevational view of the first embodiment of the sanitized dispensing mechanism as seen along line 3—3 of FIG. 2. FIG. 4 is a bottom plan view of the first embodiment of the sanitized dispensing mechanism as seen along line 4—4 of FIG. 3. FIG. 5 is another enlarged fragmentary sectional view of the vending machine similar to that of FIG. 2 now showing a second embodiment of the sanitized dispensing mechanism of the present invention. FIG. 6 is a front elevational view of the second embodiment of the sanitized dispensing mechanism as seen along line 6—6 of FIG. 5. FIG. 7 is a side elevational view of the second embodiment of the sanitized dispensing mechanism as seen along line 7—7 of FIG. 6. FIG. 8 is a still another enlarged fragmentary sectional view of the vending machine similar to that of FIGS. 2 and 5 now showing a third embodiment of the sanitized dispensing mechanism of the present invention. FIG. 9 is a front elevational view of the third embodiment of the sanitized dispensing mechanism as seen along line 9—9 of FIG. 8. FIG. 10 is a side elevational view of the third embodiment of the sanitized dispensing mechanism as seen along line 10—10 of FIG. 9. BEST MODE FOR CARRYING OUT THE INVENTION Referring to the drawings, and particularly to FIG. 1, there is illustrated a conventional coin-operated vending machine 10 incorporating a sanitized dispensing mechanism of the present invention, generally designated 12. As is well-known, the conventional vending machine 10 has a large transparent globe 14 within which items I, such as candy or gum, are stored and displayed, a pedestal-like base 16 supporting the globe 14, and an actuation mechanism 18 mounted in the base 16 below the globe 14. The actuation mechanism 18 has an external coin slot 20 and a handle or knob 22 adapted to be turned by a user, after depositing a coin in the slot 20, to cause the remainder of the actuation mechanism (not shown) inside of the base 16 to discharge a predetermined quantity of the items I from the globe 14 down a discharge chute 24 in the base 16 to an end 24A of the discharge chute 24 taking the form of a cup (not shown) disposed at an exterior opening 16A in the base 16 which would normally be externally accessible by lifting a pivotal door (not shown) mounted on the exterior of the base 16 so as to overlie the cup. Concurrently, the deposited coin falls into a collection box (not shown) located in the base 16 behind the discharge chute 24. The cup and door of the vending machine 10 have portions that come in contact with the items being dispensed and also are exposed to contaminating contact by hands of users which can result potentially in contaminating items that are later dispensed via the cup and door to later users. The sanitized dispensing mechanism 12 of the present invention avoids this source of potential contamination by replacing the cup and door of the conventional vending machine 10. Referring now to FIGS. 2-4, there is illustrated a first embodiment 26 of the sanitized dispensing mechanism 12. The first embodiment 26 of the sanitized dispensing mechanism basically includes a receptacle 28, a barrier 30 and an actuating device 32. The receptacle 28 is attached to and extends forwardly from the base 16 of the vending machine 10 adjacent to the exterior opening 16A in the base 16. The receptacle 28 defines an interior chamber 34, a bottom opening 36 below the interior chamber 34, and a rear opening 38 behind the interior chamber 34. The rear opening 38 of the receptacle 28 is disposed contiguous with the exterior opening 16A of the base 16. The interior chamber 34 of the receptacle 28, so disposed, can receive through its rear opening 38 an item I discharged via the discharge chute 24 of the base 16 through its exterior opening 16A. More particularly, the receptacle 28 includes a pair of side walls 40, a front wall 42 and a top wall 44, all being planar in shape and made of a transparent material, such as a suitable rigid plastic. The side walls 40 are laterally spaced apart from one another and at their lower edges 40A define therebetween the bottom opening 36 of the receptacle 28. Also, the side walls 40 at their rear edges 40B define therebetween the rear opening 38 of the receptacle 28. The front wall 42 extends between and interconnects the side walls 40 at their front edges 40C and is disposed opposite from the rear opening 38 of the receptacle 28. The top wall 44 extends between and interconnects the side walls 40 at their upper edges 40D and is disposed opposite from the bottom opening 36 of the receptacle 28. The side walls 40, front wall 42 and top wall 44 together define the interior chamber 34 of the receptacle 28. Also, the receptacle 28 includes a pair of mounting flanges 46 of planar shape attached to and extending in opposite directions away from one another and away from the rear edges 40B of the side walls 40. The mounting flanges 46 have pairs of holes (not shown) adapted to receive fasteners 48 for attaching the receptacle 28 to the base 16 of the vending machine 10 such that the rear opening 38 of the receptacle 28 is disposed contiguous with the exterior opening 16A of the vending machine 10. The barrier 30 is mounted across the receptacle 28 between its interior chamber 34 and bottom opening 36 and adjacent to its rear opening 38 and the exterior opening 16A of the base 16 of the vending machine 10. The barrier 30 is mounted to the base 16 so as to adapt it to undergo movement between receiving and dispensing positions, as seen in FIG. 4, At its receiving position, the barrier 30 receives the item I from the vending machine 10 through the exterior opening 16A of the base 16 thereof and the rear opening 38 of the receptacle 28 and retains the item I in the interior chamber 34 blocking the item I from dropping through the bottom opening 36 of the receptacle 28. At its dispensing position, the barrier 30 releases the item I from the interior chamber 34 allowing the item I to drop through the bottom opening 36 of the receptacle 28 onto a hand of a user of the vending machine 10. In the first embodiment 26 of the sanitized dispensing mechanism 12, the barrier 30 specifically takes the form of a door 50 of substantially planar shape constituting a false floor for the receptacle 28 which extends across the bottom opening 36 thereof when the barrier 30 is disposed at its receiving position. The actuating device 32 is mounted adjacent to the receptacle 28 and coupled to the barrier 30. The actuating device 32 includes an operating lever 52 extending to exteriorly of the receptacle 28 and the vending machine 10 and adapted to be gripped and moved by the user between first and second positions, as seen in solid and dashed line forms in FIG. 4, to cause the barrier 30 to move between the receiving and dispensing positions, also seen in solid and dashed line forms in FIG. 4, and the item to drop from the interior chamber 34 of the receptacle 28 onto the hand of the user. The actuating device 32 also includes a pair of straight tracks 54 laterally spaced apart from one another and mounted via struts 56 to the vending machine 10 below and extending rearwardly of the bottom opening 36 of the receptacle 28 such that the tracks 54 extend into the vending machine 10 below the exterior opening 16A of the base 16. Each of the tracks 54 has an elongated guide element 58, such as being in the form of a recess or groove, formed thereon at an inner side 54A of each track 54 and facing toward the other track 54. The barrier 30 is disposed between the tracks 54 and has a pair of opposite edges 30A slidably supported by the guide elements 58 of the tracks 54 such that the barrier 30 is slidably movable in a rectilinear path along the tracks 54 between the receiving and dispensing positions. Pairs of rollers 59 are rotatably mounted to the underside of the barrier 30 along the respective opposite edges 30A thereof and adapted to make rolling contact with the tracks 54 so as to prevent binding of the barrier 30 with the tracks 54 during the rectilinear movement of the barrier 30. One of the tracks 54 is disposed adjacent to the operating lever 52 and has an elongated slot 60 formed through the one track 54 below and along part of the length of the guide element 58. The actuating device 32 also has a link element 62 extending through the slot 60 and into a notch 30B formed in the one edge 30A of the barrier 30 so as to thereby couple the operating lever 52 to the barrier 30 such that linear movement of the operating lever 52 will cause the rectilinear movement of the barrier 30. The actuating device 32 further includes an elongated rail 64 attached to the one track 54. The rail 64 defines an elongated guide channel 66 extending parallel to the guide elements 58 of the tracks 54. The guide channel 66 of the rail 64 receives an elongated rib 68 rigidly attached to and extending laterally from the operating lever 52 such that the linear movement of the operating lever 52 between its first and second positions without binding thereof is facilitated by the sliding movement of the rib 68 in the channel 66 of the rail 64 along a path disposed substantially parallel to a path along which the barrier 30 is moved between its receiving and dispensing positions. The actuating device 32 further includes a coiled spring 69 encircling the operating lever 52 so as to bias the operating lever 52 from its second position, as seen in broken line form in FIG. 4, back to its first position, as shown in solid line form in FIG. 4, and thus bias the door 50 to move from the dispensing position, as shown in broken line form in FIG. 4, to the receiving position, as seen in solid line form in FIG. 4. Referring now to FIGS. 5-7, there is illustrated a second embodiment 70 of the sanitized dispensing mechanism 12. The second embodiment 70 of the mechanism 12 includes a receptacle 28 having substantially the same construction as the receptacle 28 in the first embodiment 26. The second embodiment 70 of the mechanism 12 also includes a barrier 72 and an actuating device 74 which, however, are different from their counterparts in the first embodiment 26. The barrier 72 includes a stationary ledge 76 fixedly mounted to the receptacle 28 and extending across a portion of the bottom opening 36 thereof. The stationary ledge 76 is mounted to one of the front wall 42 and the opposite side walls 40. The barrier 72 also includes a movable door 78 pivotally mounted to the receptacle 28 by a shaft 79 disposed below the stationary ledge 76 and mounted at its opposite ends 79A to the side walls 40 of the receptacle 28 such that the movable door 78 extends across a remainder of the bottom opening 36 thereof when the barrier 72 is disposed at its receiving position. The actuating device 74 has an operating lever 80 attached to one of a pair of opposite sides 78A of the movable door 78. The one side wall 40 has an arcuate-shaped slot 82 defined therethrough and disposed adjacent to the one side 78A of the door 78 such that the operating lever 80 extends through the slot 82 in the one side wall 40. The actuating device 74 further includes a coiled spring 83 encircling one of the opposite ends 79A of the shaft 79 and engaged with the one side wall 40 and the movable door 78 so as to bias the movable door 78 to move from the dispensing position, as shown in broken line form in FIG. 7, to the receiving position, as seen in solid line form in FIG. 7. Referring now to FIGS. 8-10, there is illustrated a third embodiment 84 of the sanitized dispensing mechanism 12. The third embodiment 84 of the mechanism 12 includes a receptacle 28 having substantially the same construction as the receptacle 28 in the first and second embodiments 26, 70. The third embodiment 84 of the mechanism 12 also includes a barrier 86 and an actuating device 88 which, however, are different from their counterparts in the first and second embodiments 26, 70. The barrier 86 is a door 90 of semi-cylindrical shape having a pair of opposite end portions 92 disposed in planes substantially parallel to one another and a semi-cylindrical portion 94 which extends between and interconnects the opposite end portions 92 so as to form a cavity 96 into which an item I is received. The barrier 86 also includes a pair of stub shafts 98 supporting the door 90 at its opposite end portions 92 and pivotally mounting the door 90 to the side walls 40 of the receptacle 28. The actuating device 88 further includes a coiled spring 100 encircling one of the stub shafts 98 and engaged with the one side wall 40 and the door 90 so as to bias the door 90 to the receiving position, as shown in solid line form in FIG. 7, in which the cavity 96 opens in an upward direction. The side wall 40 of the receptacle 28 has an arcuate-shaped slot 102 defined therethrough and is disposed adjacent to the one end portion 92 of the door 90 such that an operating lever 104 is attached to the one end portion 92 of the door 90 and extends through the slot 102 in the one side wall 40 where it can be gripped by a user to rotate the door 90 to the dispensing position, as seen in broken line form in FIG. 7. Thus, as described above, until it is actuated the barrier 30, 72, 86 in each embodiment 26, 70, 84 of the sanitized dispensing mechanism 12 prevents the item I from dropping from the receptacle 28 into the user's hand and also retains the item I so as to prevent it from being reached by the user's hand. The operating lever 52, 80, 104 accessible at the exterior of the vending machine 10 must be actuated by the user in order to cause the barrier 30, 72, 86 to release the item so as to allow it to drop from the receptacle 28 into the user's hand. The result is that the item is dropped from an interior chamber 34 of the receptacle 28 which is not accessible by a contaminated contact from the exterior of the vending machine 10 so that the item dropping into the user's hand cannot become contaminated through contact with exterior machine parts which may have been contaminated by other users. It is thought that the present invention and its advantages will be understood from the foregoing description and it will be apparent that various changes may be made thereto without departing from the spirit and scope of the invention or sacrificing all of its material advantages, the form hereinbefore described being merely preferred or exemplary embodiment thereof.
<SOH> BACKGROUND ART <EOH>Most prior art vending machines dispense their items, such as candy or gum, into a cup on the machine which can be contacted and thus potentially contaminated by a user's hand. Some prior art machines employing such cups are disclosed in U.S. Pat. Nos. 5,452,822, 5,782,378, 5,833,117 and 5,897,022. The inventor herein has discerned that likely there are many potential users who would prefer an alternative way for items to be dispensed from vending machines, such as having the item dropped directly into a user's hand and not into a cup, so that the dispensed item cannot be contaminated through contact with parts of the vending machines which also can be contaminated by users. Consequently, a need exists for an innovation which will provide a solution to the aforementioned problem of prior art vending machines without introducing any new problems in place thereof.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>In the following detailed description, reference will be made to the attached drawings in which: FIG. 1 is a front elevational view of a vending machine incorporating a sanitized dispensing mechanism of the present invention. FIG. 2 is an enlarged fragmentary sectional view of the vending machine taken along line 2 — 2 of FIG. 1 showing a first embodiment of the sanitized dispensing mechanism of the present invention. FIG. 3 is a front elevational view of the first embodiment of the sanitized dispensing mechanism as seen along line 3 — 3 of FIG. 2 . FIG. 4 is a bottom plan view of the first embodiment of the sanitized dispensing mechanism as seen along line 4 — 4 of FIG. 3 . FIG. 5 is another enlarged fragmentary sectional view of the vending machine similar to that of FIG. 2 now showing a second embodiment of the sanitized dispensing mechanism of the present invention. FIG. 6 is a front elevational view of the second embodiment of the sanitized dispensing mechanism as seen along line 6 — 6 of FIG. 5 . FIG. 7 is a side elevational view of the second embodiment of the sanitized dispensing mechanism as seen along line 7 — 7 of FIG. 6 . FIG. 8 is a still another enlarged fragmentary sectional view of the vending machine similar to that of FIGS. 2 and 5 now showing a third embodiment of the sanitized dispensing mechanism of the present invention. FIG. 9 is a front elevational view of the third embodiment of the sanitized dispensing mechanism as seen along line 9 — 9 of FIG. 8 . FIG. 10 is a side elevational view of the third embodiment of the sanitized dispensing mechanism as seen along line 10 — 10 of FIG. 9 . detailed-description description="Detailed Description" end="lead"?
20040319
20060627
20050922
67116.0
0
WAGGONER, TIMOTHY R
SANITIZED DISPENSING MECHANISM
SMALL
0
ACCEPTED
2,004
10,804,892
ACCEPTED
DISPENSING DEVICE AND METHOD
A dispensing device and method, especially adapted for use in sealing high pressure fluid leaks, is disclosed. Such use requires high pressure dispensing of sealant. Such sealants are formed by an exothermic reaction of at least two liquid substances that generates high pressures within the dispensing device. Such pressures could potentially harm the feeding system of the device due to pressure backflow. This problem is solved by providing a check valve in the mixing and reaction chamber of the device to protect the feeding system. A static mixer is disposed within the chamber to enhance mixing and reaction of the substances.
1. A device for dispensing a product resulting from mixing at least two liquid substances that react with each other upon contact to create gas and to thereby create a pressure that would cause a gas backflow pressure capable of causing damage to a portion of said device, said device comprising: (a) an elongated sheath forming an essentially closed mixing and reaction chamber; (b) a dispensing orifice located at an end of said sheath for dispensing said product; (c) a check valve in essentially sealed relationship with said sheath, being secured to said sheath, and located at an end of said sheath opposite to said dispensing orifice for preventing backflow of said gas, said check valve having at least two admitting openings to admit said liquid substances from a feeding system, an open interior portion for passing said substances through said check valve, and at least one exit opening to permit said substances to pass into said chamber, said check valve further comprising a closing element to close said exit opening upon creation of backflow pressure within said chamber thereby preventing damage to said feeding system, said closing element comprising a rod having a shaft and closing end, said rod capable of axial movement due to pressure created within said check valve whereby said closing end is capable of being moved to close said check valve against back pressure created within said mixing and reaction chamber; (d) a static mixer for mixing said substances and located within said chamber between said dispensing orifice and said check valve; and (e) a feeding system connected to said check valve for feeding said substances into said check valve. 2. The device of claim 1, wherein said check valve has a round cross section and is dimensioned so that an interference fit is obtained when said check valve is inserted into said elongated sheath and secured to said elongated sheath. 3. (canceled) 4. A method of dispensing a reaction product comprising cured polyurethane formed from reaction of least two liquid substances, said liquid substances comprising polymethylene polyphenyl isocyanate and 4,4 diphenymethane diisocyanate as a curing agent, comprising: (a) feeding at least said two liquid substances from a feeding system into a check valve located at an end of a mixing and reaction chamber of a dispensing device, said device comprising: (i) an elongated sheath forming an essentially closed mixing and reaction chamber; (ii) a dispensing orifice located at an end of said sheath for dispensing said product; (iii) a check valve in essentially sealed relationship with said sheath, being secured to said sheath, and located at an end of said sheath opposite to said dispensing orifice for preventing backflow of said gas, said check valve having at least two admitting openings to admit said substances from a feeding system, an open interior portion for passing said substances through said check valve, and at least one exit opening to permit said substances to pass into said chamber, said check valve further comprising a closing element to close said exit opening upon creation of backflow pressure within said chamber thereby preventing damage to said feeding system, said closing element comprising a rod having a shaft and closing end, said rod capable of axial movement due to pressure created within said check valve whereby said closing end is capable of being moved to close said check valve against back pressure created within said mixing and reaction chamber; and (iv) a static mixer for mixing said substances and located within said chamber between said dispensing orifice and said check valve; (b) passing said liquid substances through said check valve and into said chamber where said substances are mixed and react with each other to form said polyurethane and including a gas, thereby creating an internal pressure on the order of 45 psi and higher within said chamber; (c) dispensing said product from said device; (d) ceasing feeding said substances into said check valve and said chamber, whereby a back pressure is created in said chamber; (e) preventing said back pressure from entering into said feeding system, and thereby avoiding damaging said system by closing said check valve, said check valve being closed due to said back pressure; and (f) continuing to dispense said reaction product. 5. (canceled) 6. (canceled) 7. The method of claim 4 further comprising dispensing said cured polyurethane into a water leak to seal said leak. 8. The method of claim 7, wherein said leak is up to about 150 gallons per minute or higher. 9. The method of claim 8, wherein said leak is from about 5 to about 150 gallons per minute. 10. The method of claim 4, wherein said check valve has a round cross section and is dimensioned so that an interference fit is obtained when said check valve is inserted into said elongated sheath and secured to said elongated sheath. 11. The method of claim 4, wherein said check valve is secured by an adhesive. 12. The device of claim 1, wherein said check valve is secured by an adhesive. 13. The method of claim 4, wherein said check valve is secured by crimping a back portion of said elongated sheath. 14. The device of claim 1, wherein said check valve is secured by crimping a back portion of said elongated sheath.
FIELD OF INVENTION This invention relates to a dispensing device and method for dispensing a reaction product formed through reaction of at least two substances that generates a gas, which is capable of creating sufficiently high pressure to damage the device. The use of a check valve located at the end of the mixing and reaction chamber opposite to the dispensing end of such chamber, serves to prevent backflow pressure from damaging the device. The device and its method of operation are especially adapted for use for severe dispensing and sealing applications where high dispensing pressures are required. Such severe applications include, but are not limited to, sealing pressurized gas and water leaks. BACKGROUND OF THE INVENTION Dispensing devices requiring mixing of at least two substances prior to dispensing are known in the art. These devices dispense a variety of pasty or highly viscious products including adhesives, joint fillers, foams, sealants, grouts, molding compounds, etc. The dispensed products are typically formed by mixing at least two previously separated substances to form a reaction product which is then dispensed from the device. The respective substances may be passed or pushed through a static mixer located within the device to facilitate mixing and thereby reaction. The reaction product is then dispensed through the dispensing end of the device to accomplish a desired application. Typical of such prior art devices is that illustrated in U.S. Pat. No. 5,333,760. This patent discloses a cartridge mixing and dispensing device that is widely used. However, this device is not suitable for use when high-pressure build-up and pressure backflow occurs in the device due to gas generation during the reaction of the respective substances. Such build-up and backflow may result in bending or other types of damage to the dispensing device. When a desired dispensing application requires the use of a reaction product that is produced by a reaction that creates high pressures in the device, i.e., on the order of 45 psi or higher, the device may be damaged. Pressure build-up occurs once the reaction product commences exit from the device because the product exit seals the dispensing means or exit orifice. Such pressure build-up can then result in undesirable pressure backflow into the feeding system of the dispensing device once feeding ceases. The present invention solves the above problem in an efficient and effective manner by providing a check valve at the end of the mixing and reaction chamber opposite the dispensing end of the chamber. A check valve affords a convenient mode of preventing back pressure that could damage the feeding system of the device. U.S. Pat. No. 6,241,125 discloses an overall system of variable connections for the application of several materials. A check valve is indicated in FIG. 3 of the patent as a component of the packer assembly. Such check valves are common for such assemblies. However, no check valve is used within the mixing and reaction portion of the assembly. U.S. Pat. No. 5,477,987 illustrates a pump system that incorporates check valves in its output side. These valves function to prevent the respective materials from cross contamination. Again, such check valves are not associated with the mixing and reaction portion of the device. SUMMARY OF THE INVENTION The present invention relates to a dispensing device for products resulting from mixing and reacting at least two liquid substances with each other. One of the reaction products is a gas that causes potentially harmful pressures within the device that could create a backflow pressure capable of causing damage to a portion of the device. The device comprises an elongated sheath, which forms an essentially closed mixing, and reaction chamber, a dispensing orifice located at one end of the sheath, and a check valve located at an end of the sheath opposite to the dispensing orifice. The check valve is in an essentially sealed relationship with the sheath and serves to prevent backflow from the gas and chemical mixture into a feeding system. The check valve has at least one opening to admit the substances from the feeding system. The substances pass through an interior portion of the check valve and then through an exit opening into a mixing and reaction chamber of the device. The check valve utilizes a closing element to close the exit opening upon ceasing of feeding the substances and the creation of backflow pressure within the chamber, thereby preventing damage to the feeding system and cross contamination of the contents remaining in the tubes. A static mixer located in the chamber between the dispensing orifice and check valve is used to mix and enhance the reaction of the substances. A feeding system is connected to the check valve for feeding the substances into the outer end of the check valve. The present invention also involves a method for dispensing a reaction product formed from the reaction of at least two substances. The method involves feeding the substances from a feeding system into a check valve which is located at an end of a mixing and reaction chamber of a dispensing device. The substances then pass through the check valve and enter the chamber where the substances become mixed by a static mixer and react with each other to form a reaction product which includes a gas. Gas product creates a pressure within the chamber upon dispensing of the product from the device. Once feeding of the substances ceases, the pressure created within the reaction chamber causes the check valve to close and thereby prevents backpressure from damaging the feeding system of the device. A prime application for the invention is utilizing the device and method for difficult sealing processes where high-pressure fluid leaks occur, such as gas or water leaks. Once the check valve closes, the dispensing pressure is maintained, or even increased, thereby further assisting the sealing operation. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a cross-sectional view of a portion of the dispensing device that does not include the feeding system. FIG. 2 is an end view of a check valve. Such view illustrates the end of the check valve furthest removed from the interior of the mixing and reaction chamber of the device. FIG. 3 is a cross-sectional view of the check valve illustrating the exit opening in the valve, which permits passage of the substances into the mixing and reaction chamber of the device. FIG. 4 generally illustrates the check valve being connected to a feeding system. DETAILED DESCRIPTION OF THE INVENTION A portion of the dispensing device of the invention is illustrated in cross-section in FIG. 1. Sheath 11 forms an essentially sealed cylindrical mixing and reaction chamber to receive at least two substances, to mix the substances, to permit reaction of the substances, and to dispense the reaction product through dispensing orifice 12 for a given application. Static mixing element 13 is contained within the chamber. Plug-like check valve 14 is contained within and located at the end of the chamber opposite to the chamber end having dispensing orifice 12. In operation, at least two substances are fed into, pass through, and exit from check valve 14 into the chamber. While passing through the chamber, the substances are mixed by static mixing element 13 and react to form reaction products; for example, cured polyurethane and a carbon dioxide gas. The product is dispensed from dispensing orifice 12, and the gas builds pressure within the chamber once initial passage of the product seals dispensing orifice 12. Once feeding of the substances is completed, the gas, because of backpressure created by the reaction and sealing of the dispensing orifice 12, would back flow into the feeding system and cause damage and cross contamination to such system unless otherwise prevented. However, check valve 14 closes due to such backflow and thus protects the feeding system from potential damage and cross contamination. FIG. 2 illustrates the end of the check valve. Holes 21 and 22 permit entry of substances from the feeding system (not shown in this Figure) into the check valve where the substances pass through the check valve and exit into the chamber of the device. FIG. 3 is a cross-sectional view of a check valve suitable for use in the invention. The substances are admitted into opening 31 of the check valve and pass into the reaction chamber through exit opening 32. The check valve is in the closed position. During operation of the device and while the check valve is in the open position and secured to the ends of the two tubes by a nut (not shown), two liquids are expelled from the feeding tubes (not shown) and are forced into the rear portion 37 of check valve 30. The liquids push valve stem 35 forward in the direction of flow. Check valve 30 may be held in place in the mixing and reaction chamber by crimping the back portion of the mixing and reaction chamber. Rather than crimping the back portion of the mixing and reaction chamber, the check valve may be dimensioned so that an interference fit is obtained when the check valve is inserted into the interior of the mixing and reaction chamber. An adhesive between the respective members may be used to further secure the check valve in the mixing and reaction chamber. Such action compresses spring 33 and unseats captive O-ring 36, simultaneously as the forward portion of stem 35 moves in the direction of flow, the orifice positioned immediately behind O-ring 36. This permits the liquid substances to flow into and through the static mixer assembly toward the dispensing end. The check valve remains in its open position as long as the flow of the substances continues. When the dispension of the reacted substances ceases, residual substances in the mixer begin to react. Such reaction commences at the output end of the mixer, where the substances have become the most thoroughly mixed. Because flow from the tubes has ceased, the spring 33 in the check valve has returned valve stem 35 and captive O-ring 36 to their original closed positions, thereby closing the orifice and sealing any return flow with O-ring 36). As the reaction of the residual substances continues, pressurized gas (CO2, for example) exerts further pressure against valve stem 35 to hold it in the closed position. This operation effectively protects the gun mechanism from reverse motion and thus prevents damage to the mechanism and also prevents backflow of mixed substances into the separate feed tubes and prevents cross contamination of the materials contained in the feed tubes. The check valve illustrated in FIG. 3 corresponds to Model 130-140 of a cartridge check valve, which is commercially available from Smart Products Incorporated, 1710 Ringwood Avenue, San Jose, Calif. As would be understood by one skilled in the art, other cartridge check valves, including Model 110-120 of Smart Products Incorporated, could be used in the invention. Also, other types of check valves, such as swing check valves, lift check valves, tilting-disk check valves, and the like, could be employed in the present invention. FIG. 4 is a schematic illustration of check valve 41 connected to a feed system. The feed system cartridges 42 and 43, which contain the substances to be mixed and reacted in the chamber of the device. The respective substances may be conveniently expelled or pushed from cartridges 42 and 43 with piston-like elements 44 and 45 into feed lines 46 and 47 and then into check valve 41. The feeding device is not illustrated in further detail because it is conventional. Moreover, there are a variety of other conventional systems that would be understood by one skilled in the art to be useful for the dispensing device of the invention. Such systems include, but are not limited to, piston pump systems, pressurized vessel systems, gravity feed tank systems, and hand pump systems. The method of operation of the dispensing device of the invention has been described in connection with the above discussion of FIGS. 1-4. Cured polyurethane reaction products are an example of a dispensed product that is capable of sealing high-pressure fluid leaks, such as gas or water. Such materials have been utilized previously for foamed roofing systems, but to Applicant's knowledge, not for this specific application of the present invention. In this instance, polymethylene polyphenyl isocyanates and a curing agent, 4,4diphenymethane diisocyanate, are fed into a check valve, passed into a mixing and reaction chamber, and dispensed as cured polyurethane into a crack, crevice, hole, void, separation, etc., where the leak occurs. The high-pressure dispension serves to block or seal the leak. The reaction is highly explosive and generates (due to CO2 formation) internal pressures on the device on the order of 45 psi and higher. Other substances that may be used in the invention include, but are not limited to single component systems such as prepolymeric polyurethanes with a combined catalyst. The invention is especially suitable for use in leaks that are difficult, if not impossible, to seal with other types of devices. Examples of such difficult sealing applications are water leaks up to about 150 gallons per minute or higher. Typically, the invention is useful for sealing leakages from about 5 to about 150 gallons per minute. Such leaks are typically encountered in manhole repairs; “cold” joints in concrete; cement-to-rubber gaskets; cracks in cement foundations and slurry walls; failed water stop joints in dams, tunnels, subways, etc.; mining roof support bolts; failed joints in intake towers on reservoirs; leaking concrete bulkheads; basements; and rock interfaces, and the like.
<SOH> BACKGROUND OF THE INVENTION <EOH>Dispensing devices requiring mixing of at least two substances prior to dispensing are known in the art. These devices dispense a variety of pasty or highly viscious products including adhesives, joint fillers, foams, sealants, grouts, molding compounds, etc. The dispensed products are typically formed by mixing at least two previously separated substances to form a reaction product which is then dispensed from the device. The respective substances may be passed or pushed through a static mixer located within the device to facilitate mixing and thereby reaction. The reaction product is then dispensed through the dispensing end of the device to accomplish a desired application. Typical of such prior art devices is that illustrated in U.S. Pat. No. 5,333,760. This patent discloses a cartridge mixing and dispensing device that is widely used. However, this device is not suitable for use when high-pressure build-up and pressure backflow occurs in the device due to gas generation during the reaction of the respective substances. Such build-up and backflow may result in bending or other types of damage to the dispensing device. When a desired dispensing application requires the use of a reaction product that is produced by a reaction that creates high pressures in the device, i.e., on the order of 45 psi or higher, the device may be damaged. Pressure build-up occurs once the reaction product commences exit from the device because the product exit seals the dispensing means or exit orifice. Such pressure build-up can then result in undesirable pressure backflow into the feeding system of the dispensing device once feeding ceases. The present invention solves the above problem in an efficient and effective manner by providing a check valve at the end of the mixing and reaction chamber opposite the dispensing end of the chamber. A check valve affords a convenient mode of preventing back pressure that could damage the feeding system of the device. U.S. Pat. No. 6,241,125 discloses an overall system of variable connections for the application of several materials. A check valve is indicated in FIG. 3 of the patent as a component of the packer assembly. Such check valves are common for such assemblies. However, no check valve is used within the mixing and reaction portion of the assembly. U.S. Pat. No. 5,477,987 illustrates a pump system that incorporates check valves in its output side. These valves function to prevent the respective materials from cross contamination. Again, such check valves are not associated with the mixing and reaction portion of the device.
<SOH> SUMMARY OF THE INVENTION <EOH>The present invention relates to a dispensing device for products resulting from mixing and reacting at least two liquid substances with each other. One of the reaction products is a gas that causes potentially harmful pressures within the device that could create a backflow pressure capable of causing damage to a portion of the device. The device comprises an elongated sheath, which forms an essentially closed mixing, and reaction chamber, a dispensing orifice located at one end of the sheath, and a check valve located at an end of the sheath opposite to the dispensing orifice. The check valve is in an essentially sealed relationship with the sheath and serves to prevent backflow from the gas and chemical mixture into a feeding system. The check valve has at least one opening to admit the substances from the feeding system. The substances pass through an interior portion of the check valve and then through an exit opening into a mixing and reaction chamber of the device. The check valve utilizes a closing element to close the exit opening upon ceasing of feeding the substances and the creation of backflow pressure within the chamber, thereby preventing damage to the feeding system and cross contamination of the contents remaining in the tubes. A static mixer located in the chamber between the dispensing orifice and check valve is used to mix and enhance the reaction of the substances. A feeding system is connected to the check valve for feeding the substances into the outer end of the check valve. The present invention also involves a method for dispensing a reaction product formed from the reaction of at least two substances. The method involves feeding the substances from a feeding system into a check valve which is located at an end of a mixing and reaction chamber of a dispensing device. The substances then pass through the check valve and enter the chamber where the substances become mixed by a static mixer and react with each other to form a reaction product which includes a gas. Gas product creates a pressure within the chamber upon dispensing of the product from the device. Once feeding of the substances ceases, the pressure created within the reaction chamber causes the check valve to close and thereby prevents backpressure from damaging the feeding system of the device. A prime application for the invention is utilizing the device and method for difficult sealing processes where high-pressure fluid leaks occur, such as gas or water leaks. Once the check valve closes, the dispensing pressure is maintained, or even increased, thereby further assisting the sealing operation.
20040319
20051018
20050922
99781.0
0
NICOLAS, FREDERICK C
DISPENSING DEVICE AND METHOD
SMALL
0
ACCEPTED
2,004
10,804,953
ACCEPTED
Columnar adhesive label roll
A label roll includes a web having front and back surfaces wound in a roll. The back surface includes adhesive patches aligned in a column along the running axis of the web. The front surface includes a release strip behind the column of patches and laminated thereto in successive layers in the roll.
1. A label roll comprising: a web having a front surface and an opposite back surface wound in a roll; said back surface including a plurality of adhesive patches aligned in a column along a running axis of said web in a minor area of said back surface, with the remaining area of said back surface being devoid of adhesive; and said front surface including a release strip extending along said running axis behind said column of adhesive patches, and laminated to said patches in successive layers in said roll. 2. A roll according to claim 1 wherein said patches are aligned along one edge of said web, and closer thereto than to an opposite edge of said web. 3. A roll according to claim 2 wherein said web is continuous along said running axis, and imperforate. 4. A roll according to claim 2 wherein said patches have straight edges aligned parallel with said running axis. 5. A roll according to claim 2 wherein said patches have straight edges extending transversely with said running axis. 6. A roll according to claim 2 wherein said patches are rectangular. 7. A roll according to claim 6 wherein said patches are elongate along said running axis. 8. A roll according to claim 7 wherein said web further includes corresponding index marks between adjacent patches to define corresponding labels, each label having a single adhesive patch. 9. A roll according to claim 6 wherein said patches are elongate transverse to said running axis. 10. A roll according to claim 9 wherein said web is devoid of index marks between said patches. 11. A roll according to claim 9 wherein said web includes a plurality of labels, each having a plurality of said adhesive patches. 12. A roll according to claim 2 wherein said patches have arcuate edges extending transversely with said running axis. 13. A roll according to claim 2 wherein said patches have convex leading edges, convex trailing edges, and straight side edges extending therebetween. 14. A roll according to claim 2 wherein said patches are oval, with major axes disposed parallel to said running axis. 15. A roll according to claim 14 wherein said web further includes corresponding index marks between adjacent patches to define corresponding labels, each label having a single adhesive patch. 16. A roll according to claim 2 wherein said release strip covers said web front side in full. 17. A roll according to claim 2 wherein said release strip is narrow and conforms in width with said column of adhesive patches, leaving the remainder of said web front side devoid thereof. 18. A roll according to claim 2 wherein said release strip comprises silicone coating said web front surface. 19. A label roll comprising: an imperforate web having a front surface and an opposite back surface wound in a roll; said back surface including a plurality of adhesive patches aligned in a column along a running axis of said web closer to one edge of said web than to an opposite edge of said web; and said front surface including a release strip extending along said running axis behind said column of adhesive patches, and laminated to said patches in successive layers in said roll. 20. A roll according to claim 19 wherein said patches are oval, with major axes disposed parallel to said running axis. 21. A roll according to claim 20 wherein said web further includes corresponding index marks between adjacent patches to define corresponding labels, each label having a single adhesive patch. 22. A roll according to claim 21 wherein said release strip is narrow and conforms in width with said column of adhesive patches, leaving the remainder of said web front side devoid thereof. 23. A roll according to claim 19 wherein said patches are rectangular. 24. A roll according to claim 23 wherein said patches are elongate along said running axis. 25. A roll according to claim 24 wherein said web further includes corresponding index marks between adjacent patches to define corresponding labels, each label having a single adhesive patch. 26. A roll according to claim 25 wherein said release strip covers said web front side in full. 27. A roll according to claim 23 wherein said patches are elongate transverse to said running axis. 28. A roll according to claim 27 wherein said web includes a plurality of labels, each having a plurality of said adhesive patches. 29. A roll according to claim 28 wherein said release strip is narrow and conforms in width with said column of adhesive patches, leaving the remainder of said web front side devoid thereof. 30. A roll according to claim 29 wherein said web is devoid of index marks between said patches.
BACKGROUND OF THE INVENTION The present invention relates generally to stationery products, and, more specifically, to adhesive labels. The ubiquitous adhesive label is available in a myriad of configurations for use in various applications, including specialty applications. The typical adhesive label includes pressure sensitive adhesive on its back side initially laminated to an underlying release liner. The release liner is typically coated with silicone to provide a weak bond with the adhesive for permitting the individual removal of labels from the liner when desired. Adhesive labels may be found in individual sheets, or joined together in a fan-fold stack, or in a continuous roll. Label rolls are typically used in commercial applications requiring high volume use of labels. More specifically, in the fast food industry specialty labels may be used in identifying individual food products in typical sales transactions. The label roll may be formed of thermal paper for sequential printing of individual labels in a direct thermal printer. Or, a thermal transfer printer may also be used. The typical pressure sensitive adhesive label includes full surface adhesive on its back side which may interfere with the handling thereof during the food preparation process. An individual label identifying the corresponding food product is removed from the printer by the user who typically wears sanitary gloves. The label may inadvertently bond to the gloves, and this increases the difficulty of placing the label on the packaging for the intended food product. Furthermore, the liner material used in the label roll results in waste, and correspondingly affects the cost of the roll. Linerless label rolls are conventionally known in which the front surface of the label web may be coated with a suitable release material, such as silicone, for providing an integrated liner in the web itself without the need for an additional liner sheet. However, as the linerless web is unwound in the printer, the back side adhesive is exposed to the various parts of the printer and can inadvertently bond thereto leading to undesirable jamming of the printer. Furthermore, the printer may include a typical cutting knife or cutting bar for cutting individual labels from the continuous web. The exposed adhesive on the linerless label roll therefore permits adhesive buildup on these cutting elements during prolonged operation of the printer. Adhesive buildup on any of the various components of the printer contacting the adhesive side of the label is undesirable because it requires periodic cleaning or other maintenance to avoid printer jamming, which may nevertheless occur. Accordingly, it is desired to provide an improved linerless label roll. BRIEF SUMMARY OF THE INVENTION A label roll includes a web having front and back surfaces wound in a roll. The back surface includes adhesive patches aligned in a column along the running axis of the web. The front surface includes a release strip behind the column of patches and laminated thereto in successive layers in the roll. BRIEF DESCRIPTION OF THE DRAWINGS The invention, in accordance with preferred and exemplary embodiments, together with further objects and advantages thereof, is more particularly described in the following detailed description taken in conjunction with the accompanying drawings in which: FIG. 1 is an isometric view of a thermal printer dispensing pressure sensitive labels in an exemplary application. FIG. 2 is a side elevational internal view of the printer shown in FIG. 1 illustrating exemplary components along the feedpath of the label roll mounted therein. FIG. 3 is a top view inside the printer illustrated in FIG. 2 showing dispensing of the label roll therethrough. FIG. 4 is a isometric view of the label roll illustrated in FIGS. 1-3 in accordance with an exemplary embodiment. FIG. 5 is a back side view of the label roll illustrated in FIG. 4 in more detail. FIG. 6 is a back side view of a portion of the label roll in accordance with an alternate embodiment. FIG. 7 is a front side view of a portion of the label roll in accordance with an alternate embodiment. FIG. 8 is a back side view of a portion of the label roll in accordance with an alternate embodiment. DETAILED DESCRIPTION OF THE INVENTION Illustrated in FIG. 1 is a conventional printer 10 configured for printing in sequence individual labels 12 for use in an exemplary fast food application. For example, food may be placed in a suitable food package 14 such as the paper box illustrated, or simple wrapping paper (not illustrated). Print or identifying indicia 16 is printed on the label in the printer for identifying the contents of the package, for example. The individual printed label may then be removed from the printer and applied to the food package 14 as illustrated in the exemplary method shown in FIG. 1. FIG. 2 illustrates certain elements along the feedpath of the printer 10, which may otherwise have any conventional configuration, such as a direct thermal printer, or alternatively a thermal transfer printer. A label roll 18 is suitably mounted inside the printer either in a tray therefor, or on a support spindle extending through the center core thereof. The roll includes a continuous, elongate web 20 spiral wound in a multitude of overlapping layers or laminations. The web 20 is dispensed from the roll inside the printer illustrated in FIGS. 2 and 3 along a suitable feedpath. The feedpath may include a pair of web guides 22 aligned transversely with each other on opposite sides of the web for guiding the web as it is dispensed through the printer. A platen roller 24 is disposed downstream of the guides and suitably engages the web for pulling the web forward through the printer for dispensing. Disposed above the platen roller 24 is the printing head 26 which may have any conventional configuration, such as a thermal head assembly for use in direct thermal printing of the web which may be formed of suitable thermal paper. Alternatively, a thermal transfer ribbon ((not shown) may be used with ordinary printing paper for the web. Disposed at the outlet end of the printer illustrated in FIGS. 2 and 3 is a suitable cutting blade 28 which may have any conventional configuration. In the exemplary embodiment illustrated in these Figures, the cutting blade 28 is rotatably mounted on a roller for suitably cutting the web along a straight line across its full width during operation. In an alternate embodiment, the cutting blade may be stationary, with the user simply tearing or cutting the dispensed label along the blade in a typical manner. The exemplary printer illustrated in FIG. 3 also includes an index sensor 30 for sensing a suitable index mark contained on the web, if desired. Index sensors are conventional, and typically are optical components which detect a suitable mark on the web for permitting precise cutting of the individual labels 12 for the intended size. The cutting blade 28 is typically indexed with the platen roller 24 for coordinating the operation thereof. In this way, the distance between the cutting blade and the index sensor 30 is known and permits precise cutting of the web along the longitudinal or running axis 32 thereof during operation. The label roll 18 in the printer shown in FIGS. 1-3 is illustrated in more particularity in isolation in FIG. 4. The web 20 is preferably a single ply sheet of suitable label material, such as thermal paper. The web includes a front or top surface 34 which is mounted in the printer illustrated in FIG. 2 facing upwardly for being printed by the printing head 26. The web also includes an opposite back or bottom surface 36. The web is wound in the roll 18 in a spiral having a multitude of overlapping layers or laminations in which the back surface 36 is laminated against the front surface 34 of the upstream portions or inner layers of the web. The back surface 36 illustrated in FIG. 4 includes a plurality of repeating adhesive spots or patches 38 aligned in, and spaced apart along, a column extending along the longitudinal running axis 32 of the web. The adhesive patches 38 may have any conventional composition such as the typical pressure sensitive adhesive which may be formulated for permanent bonding or temporary bonding to the intended surface, such as the package 14 illustrated in FIG. 1. In the preferred embodiment, the adhesive patches 38 effect weak bonds with the food package 14 to permit the repositioning of the individual labels without tearing of the label upon being removed from a surface. Instead of providing full surface coverage of the adhesive on the back surface 36 illustrated in FIG. 4, the adhesive is provided solely in small patches in a relatively minor area of the back surface, with the remaining major area of the back surface being devoid of adhesive. In this way, the substantial reduction in surface area of the adhesive correspondingly decreases the buildup of adhesive inside the printer illustrated in FIG. 2 for increasing the time between any maintenance required therefor. As further illustrated in FIG. 4, the front surface 34 of the roll includes a release strip 40 which extends along the running axis directly behind the column of adhesive patches 38. The release strip may be formed of any suitable releasing material, such as cured silicone or acrylic suitably coating or impregnating the web front surface. In this way, the column of adhesive patches 38 may be laminated to the release strip 40 in the successive layers of the roll illustrated in FIG. 4 without the need for a separate liner. The single ply web wound in the roll 18 is therefore linerless. Accordingly, when the linerless roll is mounted in the printer illustrated in FIG. 2, the adhesive-less front surface 34 preferably faces upwardly to engage the web guides 22 and the printing head 26 for preventing adhesive contact therewith. The adhesive back surface 36 faces downwardly and is suitably spaced from adjacent portions of the feedpath for preventing inadvertent bonding therewith. The platen roller 24 is preferably coated with a suitable non-stick material such as polytetrafluoroethylene, typically known by the Teflon trademark brand material. The non-stick platen roller 24 will therefore suitably drive or pull the web along its feedpath in the printer to permit individual labels 12 to be cut therefrom at the cutting blade 28 disposed immediately downstream from the platen roller. Since the adhesive patches 38 cover a relatively small portion of the area of the back surface 36, buildup of adhesive on the cutting blade 28 is correspondingly reduced, and limited to the small region aligned with the adhesive patches. Periodic maintenance for removing any adhesive buildup is therefore made easier, or adhesive accumulation may be insignificant within the life of the printer itself. As shown in FIG. 4, the adhesive patches 38 are preferably aligned parallel along one lateral edge of the web 20, and closer thereto than to the opposite lateral edge of the web. In this way, the adhesive is isolated along only one edge of the web, with the remainder of the back surface 36 being devoid of the adhesive. A particular advantage of the this columnar adhesive configuration is that most of the individual label 12 as illustrated in FIG. 1 is without adhesive and permits ready handling thereof, even by users wearing gloves, with little chance of grabbing the adhesive patch itself. The isolated adhesive patch may then be used for bonding the entire label to the package 14, in a cantilever fashion for example, for permitting grasping thereof for removal and repositioning of the label if desired. In the preferred embodiment illustrated in FIGS. 3 and 4 for example, the web 20 is continuous along the running axis, and imperforate without perforations or die cuts. The individual labels 12 may then be defined by the configurations of the adhesive patches 38 and corresponding cutting of the labels by the cutting blade 28 illustrated in FIG. 2. In the preferred embodiment illustrated in FIGS. 4 and 5, the patches 38 are oval, with major axes disposed parallel to the running axis 32. The patches are identical to each other and repeat along the column thereof. The individual patches have convex leading edges, convex trailing edges, and straight side edges extending therebetween. A particular advantage of this configuration is the smooth transitioning of the adhesive patches as they travel over the rotating platen roller 24 illustrated in FIG. 3 during operation. The adhesive on the convex leading edge of the patches transitions onto the roller with increasing width, and then leaves the roller with decreasing width for distributing the adhesive forces therebetween during operation. In the preferred embodiment illustrated in FIGS. 4 and 5, the web 20 further includes a plurality of repeating index or sensor marks 42 disposed between corresponding ones of the adhesive patches 38 to define corresponding labels 12 each having a single adhesive patch. The index mark 42 may have various configurations, such as the black line which extends across the full width of the web in FIGS. 4 and 5. During operation, the index mark 42 illustrated in FIG. 4 is disposed on the web back surface 36 and faces downwardly in FIG. 3 toward the index sensor 30. As each index mark passes over the index sensor 30 during operation, it is detected thereby. The computer controller of the printer then ensures that the cutting blade 28 is coordinated with the transport of the platen roller 24 for precisely cutting the web longitudinally between successive adhesive patches 38 in this exemplary configuration. The index marks 42 may be located at any longitudinal position on the web such as between the adjacent adhesive patches, which permits the line marks 42 to provide the top and bottom edges of the individual labels once they have been cut from the web. FIG. 6 illustrates an alternate embodiment of the label roll in which the adhesive patches 38B are rectangular instead of oval. In this embodiment, the rectangular patches have straight side edges aligned parallel with the running axis 32, and are closely adjacent to one edge of the web. The rectangular patches also have straight leading edges and trailing edges extending transversely or perpendicular to the running axis 32 of the web. The rectangular adhesive patches 38B illustrated in FIG. 6 are preferably elongate along the running axis 32 and are taller or longer along that axis than they are wide transverse thereto. In this embodiment, the corresponding index marks 42 are also used between the adjacent rectangular patches 38B to define the corresponding labels 12, with each label having a single rectangular patch. Like the oval patch 38 illustrated in FIG. 5, the rectangular patch 38B is aligned closely along only one edge of the web leaving the majority of the remaining web adhesive-free. In both embodiments illustrated in FIGS. 5 and 6, the release strip 40 is the same and covers completely the web front side 34 in full. The silicone release coating of the full area strip 40 protects the underlying printing formed in the thermal paper in the thermal printing process. FIG. 7 illustrates an alternate embodiment for the release strip, designated 40B, which is narrow and conforms in width slightly wider than the column of the adhesive patches 38 illustrated in FIG. 5, or with the column of rectangular patches 38B illustrated in FIG. 6 if desired. This leaves the remainder of the web front side 34 devoid or free of any release material. This embodiment may be useful for thermal transfer printing in which a transfer ribbon is suitably provided between the printing head and the exposed front surface 34 of the web to the side of the narrow release strip 40B. FIG. 8 illustrates yet another embodiment in which rectangular adhesive patches 38C are elongate transverse to the running axis 32 and are shorter in height along the running axis than they are wide transverse to the running axis. In this way, a column of relatively small rectangular patches may be used instead of the larger rectangular patches 38B illustrated in FIG. 6. The embodiment illustrated in FIG. 8 is preferably devoid of the index marks between the small patches 38C for permitting variable label size if desired. For example, the web 20 may include a plurality of the labels 12 defined therein, with each label having a plurality of the small adhesive patches 38C. The small patches increase the number of adhesive-free spaces between the patches in which the web may be cut for defining the size of the individual labels 12. Preferably the web is cut in the areas devoid of adhesive to reduce buildup of adhesive on the cutting blade. In the various embodiments disclosed above, the small adhesive patches reduce the area of adhesive, and correspondingly reduce the associated problems of the adhesive during installation and operation of the linerless label roll in the printer. Reduced area adhesive correspondingly reduces the portions of the printer subject to adhesive buildup. The columnar alignment of the adhesive patches isolates any adhesive buildup to a minor portion of the printer feedpath, and correspondingly reduces the required maintenance therefor. The train of separated adhesive patches permits cutting of the labels in the adhesive-free spaces for reducing adhesive buildup. And, if individual labels are cut along the adhesive patches themselves, subsequent cutting of labels in the adhesive-free zones provides a form of self-cleaning of the cutting blade. While there have been described herein what are considered to be preferred and exemplary embodiments of the present invention, other modifications of the invention shall be apparent to those skilled in the art from the teachings herein, and it is, therefore, desired to be secured in the appended claims all such modifications as fall within the true spirit and scope of the invention. Accordingly, what is desired to be secured by Letters Patent of the United States is the invention as defined and differentiated in the following claims in which we claim:
<SOH> BACKGROUND OF THE INVENTION <EOH>The present invention relates generally to stationery products, and, more specifically, to adhesive labels. The ubiquitous adhesive label is available in a myriad of configurations for use in various applications, including specialty applications. The typical adhesive label includes pressure sensitive adhesive on its back side initially laminated to an underlying release liner. The release liner is typically coated with silicone to provide a weak bond with the adhesive for permitting the individual removal of labels from the liner when desired. Adhesive labels may be found in individual sheets, or joined together in a fan-fold stack, or in a continuous roll. Label rolls are typically used in commercial applications requiring high volume use of labels. More specifically, in the fast food industry specialty labels may be used in identifying individual food products in typical sales transactions. The label roll may be formed of thermal paper for sequential printing of individual labels in a direct thermal printer. Or, a thermal transfer printer may also be used. The typical pressure sensitive adhesive label includes full surface adhesive on its back side which may interfere with the handling thereof during the food preparation process. An individual label identifying the corresponding food product is removed from the printer by the user who typically wears sanitary gloves. The label may inadvertently bond to the gloves, and this increases the difficulty of placing the label on the packaging for the intended food product. Furthermore, the liner material used in the label roll results in waste, and correspondingly affects the cost of the roll. Linerless label rolls are conventionally known in which the front surface of the label web may be coated with a suitable release material, such as silicone, for providing an integrated liner in the web itself without the need for an additional liner sheet. However, as the linerless web is unwound in the printer, the back side adhesive is exposed to the various parts of the printer and can inadvertently bond thereto leading to undesirable jamming of the printer. Furthermore, the printer may include a typical cutting knife or cutting bar for cutting individual labels from the continuous web. The exposed adhesive on the linerless label roll therefore permits adhesive buildup on these cutting elements during prolonged operation of the printer. Adhesive buildup on any of the various components of the printer contacting the adhesive side of the label is undesirable because it requires periodic cleaning or other maintenance to avoid printer jamming, which may nevertheless occur. Accordingly, it is desired to provide an improved linerless label roll.
<SOH> BRIEF SUMMARY OF THE INVENTION <EOH>A label roll includes a web having front and back surfaces wound in a roll. The back surface includes adhesive patches aligned in a column along the running axis of the web. The front surface includes a release strip behind the column of patches and laminated thereto in successive layers in the roll.
20040319
20090915
20050922
91354.0
2
NORDMEYER, PATRICIA L
COLUMNAR ADHESIVE LABEL ROLL
UNDISCOUNTED
0
ACCEPTED
2,004
10,805,176
ACCEPTED
System and method for remediating contaminated soil and groundwater in situ
A system and method for the in-situ removal or remediation of contaminants in a soil formation containing a subsurface groundwater aquifer, the method comprising the steps of: injecting a first oxidant into the aquifer at an injection point to create a volume of influence of the first oxidant in the aquifer thereby treating the contaminants contained within the volume of influence; and injecting a compressed gas into the aquifer to increase the size of the volume of influence of the first oxidant. The injection of the compressed gas into the aquifer can also force the groundwater in the aquifer away from the injection point into a surrounding area to transport the first oxidant into the surrounding area thereby extracting contaminants from soil adjacent to the surrounding area.
1. A method for the in-situ removal or remediation of contaminants in a soil formation containing a subsurface groundwater aquifer, the method comprising the steps of: injecting a first oxidant into the aquifer at an injection point to create a volume of influence of the first oxidant in the aquifer thereby treating the contaminants contained within the volume of influence; and injecting a compressed gas into the aquifer to increase the size of the volume of influence of the first oxidant. 2. The method of claim 1, wherein the injection of the compressed gas into the aquifer also forces the groundwater in the aquifer away from the injection point into a surrounding area thereby transporting the first oxidant into the surrounding area. 3. The method of claim 2, wherein the surrounding area includes the saturated zone. 4. The method of claim 2, wherein the surrounding area includes the smear zone. 5. The method of claim 3, wherein the injection of the compressed gas into the aquifer forces the groundwater into the surrounding area thereby extracting contaminants from soil adjacent to the surrounding area. 6. The method of claim 5, further comprising the step of: after the compressed gas injection step, allowing the groundwater to return to the volume of influence of the first oxidant from the surrounding area by discontinuing injection of the compressed gas, thereby returning the contaminants extracted from the soil to the volume of influence of the first oxidant. 7. The method of claim 1, wherein the first oxidant is selected from the group consisting of a hydrogen peroxide solution, an ozone/air mixture, an ozone/oxygen mixture, and combinations thereof. 8. The method of claim 1, further comprising the step of: injecting a second oxidant into the aquifer to treat the contaminants contained within the aquifer. 9. The method of claim 8, wherein the first oxidant is a hydrogen peroxide solution and the second oxidant is an ozone/oxygen mixture. 10. The method of claim 8, wherein the concentration of hydrogen peroxide in the hydrogen peroxide solution is less than about 70% by weight in water. 11. The method of claim 8, wherein the first and second oxidants chemically react with each other to form hydroxyl radicals. 12. The method of claim 1, further comprising the step of: injecting a second oxidant in combination with compressed gas into the aquifer to treat the contaminants contained within the aquifer. 13. The method of claim 1, wherein the injection of the compressed gas into the aquifer occurs after the conclusion of the injection of the oxidant into the aquifer. 14. The method of claim 1, wherein the compressed gas is selected from the group consisting of air, nitrogen, oxygen, carbon dioxide, and any combination thereof. 15. The method of claim 1, wherein the injection of the compressed gas is periodically cycled. 16. A method for the in-situ removal or remediation of contaminants in a soil formation containing a subsurface groundwater aquifer, wherein the contaminants are spread out by diffusion, movement of the groundwater, and other mechanisms to form a contaminant plume, the method comprising the steps of: alternately injecting, in any order, a hydrogen peroxide solution, an ozone/oxygen mixture, and compressed gas into the aquifer at an injection point to treat the contaminants contained within the groundwater, wherein the injection of the compressed gas forces the groundwater away from the injection point into a saturated zone or smear zone of the contaminant plume thereby transporting the hydrogen peroxide solution and the ozone/oxygen mixture into the saturated zone or smear zone of the contaminant plume. 17. The method of claim 16, wherein the groundwater transported into the saturated zone or smear zone of the contaminant plume desorbs contaminants from soil adjacent to the saturated zone or smear zone of the contaminant plume thereby bringing such contaminants into solution to be subsequently treated. 18. The method of claim 17, further comprising the step of: after the compressed gas injection step, allowing the groundwater to return to the injection point from the saturated zone or smear zone of the contaminant plume thereby returning the contaminants desorbed from the soil to an area adjacent to the injection point. 19. The method of claim 18, wherein the injection of the compressed gas is periodically cycled to agitate the contaminants to bring them into solution with the groundwater. 20. The method of claim 17, wherein a second oxidant in combination with the compressed gas can be alternately injected into the aquifer to treat the contaminants contained within the aquifer. 21. The method of claim 17, further comprising the step of: alternately injecting, in any order, one or more oxidants and compressed gas into the aquifer at multiple injection points to optimize the direction and movement of the oxidants within the contaminant plume. 22. The method of claim 21, wherein the alternating injection of one or more oxidants and compressed gas into the aquifer at multiple injection points increases the desorption and agitation of the contaminants into the groundwater. 23. A method for the in-situ removal or remediation of contaminants in a soil formation containing a subsurface groundwater aquifer, the method comprising the steps of: intermittently introducing, individually and in any order, a first oxidant, a second oxidant, and compressed gas into the groundwater to treat the contaminants contained within the aquifer, wherein the introduction of each oxidant creates a volume of influence of each oxidant, wherein the introduction of the compressed gas increases the size of each volume of influence of each oxidant. 24. The method of claim 23, wherein a second oxidant in combination with the compressed gas can be alternately injected into the aquifer to treat the contaminants contained within the aquifer.
CROSS-REFERENCE TO RELATED APPLICATIONS This application claims the benefit of priority of U.S. Provisional Application No. 60/456,085, filed on Mar. 19, 2003, the disclosure of which is herein incorporated by reference in its entirety. BACKGROUND Groundwater, a valuable and limited natural resource, can become contaminated by volatile organic compounds (VOC) and semi volatile organic compounds (SVOC) by: (i) leaking underground storage tanks and associated piping (e.g., gasoline stations); (ii) leaking/ruptured pipelines; (iii) chemical spills along roadways, at chemical plants, or manufacturing operations; and (iv) leaching of chemicals disposed of in landfills. Chemicals spilled as described above, if not immediately cleaned up, can be absorbed into the soil, subsequently transported (depending on the solubility of the contaminant) via rainwater to underground aquifers. Once in the aquifer, the contaminants spread and are carried down gradient. This spreading and movement of the contaminants is known as a “plume”. Drinking water wells, buildings, wetlands, etc. which are down gradient of the spill site can be negatively impacted by the contaminant plume, posing health risks to wildlife and to humans. The treatment of contaminated soils and groundwater has gained increased attention over the past few years because of uncontrolled hazardous waste disposal sites. It is well documented that the most common means of site remediation has been excavation and landfill disposal. While these procedures remove contaminants, they are extremely costly and in some cases difficult if not impossible to perform. More recently, research has focused on the conversion of contaminants contained in soil and groundwater based on the development of on-site and in situ treatment technologies. One such treatment has been the incineration of contaminated soils. The disadvantage of this system is in the possible formation of harmful by products including polychlorinated dibenzo-p-dioxins (PCDD) and polychlorinated dibenzofurans (PCDF). In situ biological soil treatment and groundwater treatment is another such system that has been reviewed in recent years. So-called bioremediation systems, however, have limited utility for treating waste components that are biorefractory or toxic to microorganisms. Such bioremediation systems were the first to investigate the practical and efficient injection of hydrogen peroxide into groundwater and/or soils. These investigations revealed that the overriding issue affecting the use of hydrogen peroxide in situ was the instability of the hydrogen peroxide downgradient from the injection point. The presence of minerals and enzymes such as catalase and peroxidase in the subsurface catalyzed the disproportionation of hydrogen peroxide near the injection point, with rapid evolution and loss of molecular oxygen, leading to the investigation of stabilizers as well as biological nutrients. During the early biological studies from the 1980's, some investigators recognized the potential for competing reactions, such as the direct oxidation of the substrate by hydrogen peroxide. Certain researchers also hypothesized that an unwanted in situ Fenton's-like reaction under native conditions in the soil was reducing yields of oxygen through the production of hydroxyl radicals, a powerful oxidizing species. Such a mechanism of contaminant reduction was not unexpected, since Fenton's-type systems have been used in ex situ systems to treat soil and groundwater contamination. Other investigators concomitantly extended the use of Fenton's-type systems to the remediation of in situ soil systems. These studies attempted to correlate variable parameters such as hydrogen peroxide, iron, phosphate, pH, and temperature with the efficiency of remediation. As with bioremediation systems, in situ Fenton's systems were often limited by instability of the hydrogen peroxide in situ and by the lack of spatial and temporal control in the formation of the oxidizing agent (i.e. hydroxyl radical) from the hydrogen peroxide. In particular, aggressive/violent reactions often occurred at or near the point where the source of the oxidizing agent (the hydrogen peroxide) and the catalyst were injected. As a consequence, a significant amount of reagents including the source of the oxidizing agent (hydrogen peroxide) was wasted because activity was confined to a very limited area around the injection point. In addition, these in situ Fenton's systems often required the aggressive adjustment of groundwater pH to acidic conditions, which is not desirable in a minimally invasive treatment system. Finally, such systems also resulted in the mineralization of the subsurface, resulting in impermeable soil and groundwater phases due to the deleterious effects of the reagents on the subsurface soils. Other researchers have investigated the use of ozone, either alone or in combination with hydrogen peroxide, in ex situ advanced oxidation processes (AOPs) wherein ozone (O3) and hydrogen peroxide (H2O2) introduced into water react with each other to form the hydroxyl radical (HO*). The hydroxyl radical formation reaction is as follows: H2O2+2O3→2OH*+3O2 (1) Hydrogen peroxide, ozone, and hydroxyl radical then come into contact with and oxidize contaminants, destroying them. Glaze and Kang, J. Amer. Water Works Assoc., 80, 51 (1988), is hereby incorporated by reference in its entirety, describes an advanced oxidation process wherein ozone (O3) and hydrogen peroxide (H2O2) are introduced into contaminated water at atmospheric pressure. Known AOP decontamination systems suffer from a number of disadvantages. A first disadvantage of known AOP decontamination systems is formation of unwanted disinfection byproducts. For example, bromide ions (Br−), naturally present in the water, can undergo a series of reactions to produce bromate (BrO3−): 3Br−+O3(only)→3BrO− (2) BrO+(O3 or HO*)→BrO3− (3) Bromate has recently been designated as a suspected carcinogen, and the U.S.E.P.A. has established a maximum level for drinking water of 10 μg/L. It is thus important to prevent or minimize bromate formation during decontamination of potable water. In reaction (2) above, neither the hydroxyl radical (HO*) nor hydrogen peroxide alone oxidize bromide to form hypobromite (BrO−). Moreover, reaction (3) must compete with the conversion of hypobromite back to bromide that occurs in the presence of hydrogen peroxide: BrO−+H2O2→Br− (4) Thus when hydrogen peroxide concentration is greater, reaction (4) is favored and the formation of bromate is discouraged. See U. von Gunten and Y. Oliveras, Envir. Sci. and Tech., 32, 63 (1998); U. von Gunten, Y. Oliveras, Wat. Res., 31, 900 (1997); W. R. Haag, and J. Hoigne, Envir. Sci. and Tech., 17, 261(1983); U. von Gunten, J. Hoigne and A. Bruchet, Water Supply, 13, 45 which are all hereby incorporated by reference in their entireties. A second disadvantage of conventional ozone decontamination systems is the limited solubility of ozone in water at atmospheric pressure. FIG. 1 shows that the solubility of ozone in water increases with higher pressure. However, conventional oxidation decontamination systems introduce ozone at only atmospheric pressure, limiting the amount of ozone that can be dissolved in the water. A third disadvantage is the limited concentration of ozone normally present in the reactant gas stream that is mixed with the water. FIG. 2 shows that ozone solubility in water increases with increasing ozone in the gas phase. Conventional oxidation systems utilize gas streams containing only about 1-4% ozone by weight in air, effectively limiting the amount of ozone soluble in water. Finally, these AOP decontamination systems suffer from a similar limitation as all ex situ systems; namely, the necessity to pump contaminants from the in situ media to an external reaction vessel, a requirement which is both expensive and inefficient. BRIEF DESCRIPTION OF THE DRAWINGS These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where: FIG. 1 plots overall pressure versus the concentration of ozone dissolved in water, based upon a 10% (v) concentration of ozone in the gas phase for conventional oxidation decontamination; FIG. 2 plots the concentration of ozone in the gas phase versus the resulting concentration of ozone dissolved in water for conventional oxidation decontamination; FIG. 3 illustrates a cross-sectional view of a representative remediation site where an underground storage tank (UST) 10 has leaked an organic contaminant into the surrounding soils and groundwater and formed a large contaminant plume; FIG. 4 illustrates a simplified, overhead plan view of the remediation site shown in FIG. 3, where a UST has leaked an organic contaminant into the surrounding soils and the extent of the resulting contaminant plume migration is shown relative to the depth from the surface; FIG. 5 is a cross sectional view of a typical remediation site showing a leaking UST, the resultant contaminant plume, an injector assembly, and the general characteristics of the soils at such a site; FIG. 6 is a detailed, cross-sectional view of one embodiment of an injection well 65 for treating a remediation site; and FIG. 7 illustrates one embodiment of a component diagram of oxidant/compressed gas delivery and control system 98. DETAILED DESCRIPTION OF THE INVENTION In the description that follows, like parts/components are indicated throughout the specification and drawings with the same reference numerals, respectively. The figures are not drawn to scale and the proportions of certain parts have been exaggerated for convenience of illustration. A system and method is provided for the remediation of contaminated soil and groundwater in situ by injecting oxidants and a compressed gas into a region containing contaminated water to oxidize the contaminates present in the contaminated water to thereby decontaminate the region. This remediation system and process can be useful in (i) maximizing destruction of oxidizable contaminants; (ii) minimizing costs associated with the consumption of expensive oxidants; and (iii) controlling quantities of bromate formed as a result of oxidation. FIG. 3 is a representative cross-section of a typical remediation site. An underground storage tank (UST) 10 is shown discharging contaminants 15 into the surrounding soils and/or groundwater creating a contaminated region. The discharge can impact three separate areas beneath a ground-level surface 20. The discharge can contaminate soils 25, cause free floating or sinking contaminant on or beneath groundwater 30, and may partially dissolve contaminants into the groundwater 30. As shown in FIG. 3, the soils in which the contaminant comes in contact may be comprised of several different types of soils (e.g., sand 35, silt 40, or clay 45). These different soil structures define the strata of a given region. Frequently, these different types of soils can occur at different depths from the ground-level surface 20. Additionally, representative remediation sites may include one or more underground strata, formed by natural causes, which act as a natural barrier to the unconfined migration of the contaminants 15. While such strata may be impervious to the contaminant 15 migration, if the strata remains intact, fissures or cracks 50 that naturally occur in the strata may provide a conduit through which a contaminated plume 15a may extend. The contaminant plume 15a can include a saturated zone, a smear zone, and an unsaturated zone. In a typical in situ remediation process, the process can begin with a characterization of the discharged substance(s). Substances which have been discharged to the soil and groundwater can be chemically characterized by a variety of analytical methods, most of which are known in the art. Commonly used analytical methods for chemical characterization of contaminant 15 may include conventional volatile organic analysis (VOA) or BTEX testing, which provides a quantitative determination of benzene, toluene, ethyl benzene, and xylene. Referring again to FIG. 3, a monitoring well 55 can be bored beneath the ground-level surface 20 for the purpose of extracting a sample of groundwater 30 in an attempt to chemically characterize contaminant 15. Samples of soil 25 and/or groundwater 30 can be taken from a number of locations throughout contaminant plume 15a from which the nature of the discharged substance is determined by an appropriate analytical method. In those instances where the location of the UST 10 acts as the source of the contaminant plume 15a is known beforehand, a contaminant sample may be made directly from the UST 10, if that UST 10 still contains a sufficient volume of the contaminant. Once the contaminants 15 have been defined, a three-dimensional study can be conducted to determine the volumetric quantities of the impacted area. The shape and size of the contaminant plume 15a can be determined by a number of factors: 1) the size of the UST 10 and the volume of the contaminant that it contained at the time the leak arose; 2) the nature of the contaminant (e.g., heavy, viscous substances such as hydrocarbon based lubricants); and 3) the geological characteristics of the soils and water surrounding the UST 10 (e.g., loose, permeable or tightly-packed soils or fast-moving or stagnant aquifer). Utilizing the volumetric quantities of the contaminant plume 15a and the composition and concentration(s) of the contaminants, an absolute quantity of contaminant to be treated can be determined. The calculations required for this step are generally known by those skilled in the art. A quantity of hydrogen peroxide and ozone can be empirically determined for effective oxidative treatment of the contaminant mass (oxidant mass/contaminant mass is the oxidant ratio). Factors impacting the oxidant ratio include groundwater characteristics (i.e pH, alkalinity, COD, radical scavengers, metals, etc.). The control of bromate formation can be determined by the mole ratio of hydrogen peroxide to ozone. The mole ratio can range from between about 0.5 to about 20. Factors impacting the mole ratio include groundwater characteristics (i.e. bromide concentration, pH, alkalinity, dissolved organic carbon (DOC), metals, etc.). In one embodiment, the contaminant plume 15a can be delineated by boring a number of sentinel wells 60 in an area just outside the contaminant plume 15a and then subsequently performing an analytical characterization of samples taken from these wells. By inspection of FIG. 4, it can be seen that the sentinel wells 60 lie outside of the contaminant plume 15a while the monitoring wells 55 lie within the containment plume 15a. Samples taken from the monitoring wells 55 and the sentinel wells 60 will therefore differ in composition and/or concentration as determined through subsequent analytical testing. After boring a number of the monitoring wells 55 and the sentinel wells 60 and performing an analytical characterization of samples taken from these wells, a delineation of contaminant plume 15a can be determined. The delineation of the contaminant plume 15a is not limited to just two dimensions as one may perceive from a casual inspection of FIG. 4. For example, a determination of the volume of the contaminant plume 15a is made by analyzing samples from the monitoring wells 55 and the sentinel wells 60 where the samples can be analytically characterized according to the sample depth in the particular well. The data produced from this analysis may not only characterize the distance that the contaminant plume 15a has migrated, but also can characterize at what depth from the ground-level surface 20 that migration has taken place. Such a characterization is well known in the art as vertical delineation. Next, the hydrological and geological attributes of the contaminated region can be characterized to assist in the determination of the number and position of the injection wells 65 that are required for installation within the contaminated region. These attributes can include: groundwater flow direction and gradient, groundwater characteristics (e.g., mineral content, alkalinity, pH, hardness, and salinity), soil characteristics (e.g., composition of the soil, mineral content, alkalinity, pH, and salinity), soil transmissivity (e.g., soil porosity and soil permeability), and the profile of the geological strata in the contaminated region. Once the hydrological and geological attributes of the contaminated region are characterized, trials can be conducted to determine the radius of influence (ROI) of a compressed gas continuously sparged into the contaminant plume 15a using standard equipment known in the art. Understanding the ROI provides information useful in determining the placement of multiple injection wells in order to effectively treat the contaminated region. Additionally, trials can be conducted to measure the movement of groundwater in response to pulses of compressed gas in the contaminated plume 15a (“dynamic response”) using standard equipment known in the art. Understanding the dynamic response (DR) permits the present remediation system and made to be optimized for pulse duration and frequency. Based on the hydrological and geological attributes of the contaminated region and once the ROI and DR have been determined, a matrix of injection wells 65 can be mapped out in the contaminant plume 15a such that there is overlap of the ROI appropriate for the contaminant plume 15a and soil conditions. The injection wells 65 may be arranged in a matrix following any arrangement or pattern depending on the shape of the contaminant plume 15a. Depending on the size and characteristics of the contaminant plume 15a, as little as one injection well may be used while as many as 100 or more injection wells may be used for larger contaminant plumes. One non-limiting example of a matrix of injection wells mapped out in contaminant plume 15a is illustrated in FIG. 4. In this example, the injection wells 65a-f are spaced about 20 feet apart from each other in a substantially linear pattern within the contaminant plume 15a. The monitoring well 55a is provided within the contaminant plume 15a about 15 feet up gradient from the substantially linear pattern of the injection wells 65a-f, while the monitoring well 55b is provided within the contaminant plume 15a about 35 feet down gradient from the substantially linear pattern of the injection wells 65a-f. The monitoring wells 55a-b are capable of measuring groundwater characteristics (e.g., pH, dissolved oxygen, dissolved CO2, oxidative/reductive potential (ORP), and temperature) and contaminant levels. FIG. 5 is a cross sectional view of a typical remediation site showing a leaking UST, the resultant contaminant plume, an injector assembly, and the general characteristics of the soils at such a site; FIG. 6 is a detailed, cross-sectional view of one embodiment of an injection well 65 for treating a remediation site. As shown in FIG. 5, each injection well 65 can include at least one injector 70 to inject oxidants and a compressed gas at an injection point into the contaminant plume 15a to oxidize and treat the contaminants. As shown in FIG. 6, the injection well 65 can be a bore hole 75 that extends downwardly from the ground-level surface 20 of the surrounding earth and includes a bottom portion 80 that extends into or below the contaminant plume 15a. The bottom portion 80 of the bore hole 75 can include a highly porous media layer 85 disposed therein to permit the oxidants and/or compressed gas exiting the injector 70 to permeate into the contaminated plume 15a. For example, the highly porous media layer 85 may include sand, gravel, or crushed glass. Alternatively, the injection well 65 may be a screened well casing that extends into or below the contaminant plume 15a. Like the bore hole 75, the screened well casing can include a bottom portion containing a highly porous media layer such as sand, gravel, or crushed glass. In one embodiment, the injector 70 can include an elongated tube 90 that is placed within and can extend downwardly within the borehole 75. The tube 90 can include a bottom portion 92 that can be connected to an injection diffuser 94 and a top portion 96 that can be connected to an oxidant/compressed gas delivery and control system 98. For example, the injection diffuser 94 may include a mesh screen, sparging tube, or other diffuser known in the art. As illustrated in FIG. 6, the highly porous media layer 85 can surround the injection diffuser 94 and fill a resulting void between the injection diffuser 94 the and bottom portion 80 of the bore hole 75. The injection diffuser 94 can also prevent the highly porous media layer 85 from occluding the tube 90 at the bottom portion 80 of the bore hole 75 thereby permitting dispersion of the oxidants and/or compressed gas throughout the contaminated plume 15a. To establish a liquid-tight seal around the exterior surface of tube the 90 within the bore hole 75 in order to prevent fluids from flowing in and filling the bore hole 75 around the tube 90, a sealing layer 99 can be provided above the layer of the highly porous media layer 85. In one embodiment, the Sealing layer 99 can be formed of water-swellable bentonite material positioned within the bore hole 75 such that the bentonite material contacts the walls of the bore hole 75 and surrounds the tube 90. The bentonite material completely fills the void between the tube 90 and the bore hole 75 when the bentonite material contacts water thereby forming a seal. In this manner, the portion of the injector 70 located below the sealing layer 99 is completely and effectively sealed from the upper portion of the bore hole 75. As shown, FIG. 7 illustrates one embodiment of a component diagram of oxidant/compressed gas delivery and control system 98. As shown in FIG. 7, oxidant/compressed gas delivery and control system 98 is illustrated in a component diagram where the solid lines indicate a hard connection via conduit, tubing, or the like and the dashed lines indicate that the components are in signal communication with each other. In one embodiment, the system 98 can include an injection panel 100 that includes compressed gas and oxidant manifolds and injection valves, flow meters, and pressure gages. The system 98 can further include an ozone generator device 105 configured to generate ozone from oxygen and an ozone delivery device 110 configured to deliver ozone to the injector 70 via the injection panel 100. In one embodiment, the oxygen may be supplied to the ozone generator device 105 via an oxygen generator device 115 or a supply of oxygen tanks. Although it is preferable to utilize ozone generated from oxygen because generation of ozone in this manner results in a supply of gas containing substantial concentrations of ozone, it is possible to use ozone generated from air yielding lower concentrations of ozone. Thus, the term “ozone” as used herein can refer to an ozone/oxygen mixture and an ozone/air mixture. As shown in FIG. 2, these elevated gas phase ozone concentrations lead to larger quantities of ozone being dissolved in the contaminated water flow. An additional benefit of utilizing ozone generated from oxygen is that oxygen is itself an oxidant. Because contaminated groundwater is typically devoid of oxygen, the introduction of oxygen along with ozone can replenish the oxygen content of the groundwater and may oxidize contaminants, as well as promote biological elements that may further reduce contaminant levels. In one embodiment, the ozone generator device 105 can be an ASTeX Model 8403 modified to maintain a pressure in the generator higher than that of the contaminated water flow. Generation of ozone from oxygen in this manner can produce an ozone/oxygen mixture stream having ozone concentrations between about 1 and about 14% by weight in oxygen, with most typical ozone concentrations between about 5% and about 10% by weight in oxygen. With continued reference to FIG. 7, the system 98 can further include a hydrogen peroxide reservoir 120 and a hydrogen peroxide delivery device 125 configured to deliver a hydrogen peroxide solution to the injector 70 via the injection panel 100. In general, the hydrogen peroxide reservoir 120 can be commercially supplied. In one embodiment, the hydrogen peroxide solution can include hydrogen peroxide in concentrations up to 70% by weight in water. As used herein, the term “hydrogen peroxide” can also refer to a hydrogen peroxide solution. In another embodiment, the hydrogen peroxide solution can include hydrogen peroxide in concentrations up to 35% by weight in water. Furthermore, the system 98 can further include a gas compressor 130 and a gas delivery device 135 configured to deliver a compressed gas to the injector 70 via the injection panel 100. In one embodiment, the compressed gas can be air. Alternatively, the compressed gas may be nitrogen, oxygen, or carbon dioxide. If the compressed gas is not air, then the system 98 may further include a gas source (e.g., nitrogen, oxygen, or carbon-dioxide) to supply the gas to gas compressor 130. Optionally, the system 98 may further include acid and biological nutrient reservoirs (not shown) and respective delivery devices (not shown) to deliver acids such as acetic acid, phosphoric, or sulfuric acid in conjunction with hydrogen peroxide to enhance a Fenton's type reaction and to deliver biological nutrients to enhance biological degradation of the organic contaminates. To control the timing (duration and frequency) and order of delivery of the oxidants/compressed gas to each injector 70, a central controller 140 can be provided in signal communication with the injection panel 100. In one embodiment, the central controller 140 can include a microprocessor, a programmable logic controller (PLC), analog and digital interface modules, and customized software. The central controller 140 may further include a user interface 145 for operator control and may optionally include a modem or other device to transmit and receive data from a remote location. In one embodiment, the system 98 can be configured to deliver ozone, hydrogen peroxide, and compressed gas alone or in any combination to the contaminant plume 15a via the injector 70. In other words, ozone may be delivered to the contaminant plume 15a via the injector 70 alone or in combination with compressed air and hydrogen peroxide. Likewise, compressed gas may be delivered to the contaminant plume 15a via the injector 70 alone in combination with ozone and hydrogen peroxide. Similarly, hydrogen peroxide can be delivered to the contaminant plume 15a via the injector 70 alone or in combination with ozone and compressed gas. Although a single injection point may be used, it will be appreciated that more than one injection point can be used to deliver the oxidants and compressed gas. For example, multiple injectors can be used to separately deliver the ozone, hydrogen peroxide, and compressed gas to the contaminant plume 15a. Examples of possible injection combinations of ozone, hydrogen peroxide, compressed gas, and a combination of ozone/compressed gas that can be delivered to the contaminant plume 15a via the injector 70 (hereinafter referred to as “injection sequences”) are illustrated in Table I. For example, as shown in injection sequence number 1, hydrogen peroxide (at a particular concentration, pressure, and flow rate) can be first injected into the contaminant plume 15a for 10 minutes, creating a sphere of influence of the hydrogen peroxide followed by an injection of compressed gas (at a particular concentration, pressure, and flow rate) for 10 minutes to increase the size of the sphere of influence of the hydrogen peroxide, followed by a status quo period (indicated as nothing in Table I) for 10 minutes, and followed by an injection of ozone and compressed air combined (at a particular concentration, pressure, and flow rate) for five minutes. As used herein, although the term “sphere of influence” has meaning to one skilled in the art, the term “volume of influence” can also be used to represent the fact that the injected hydrogen peroxide or any other oxidant does not create a perfect sphere shape. Although only four injection sequences are illustrated in Table I, it is understood that there are numerous possible injection combinations that may be employed. TABLE I Sequence No. Injection 1 Injection 2 Injection 3 Injection 4 1 hydrogen compressed gas nothing ozone/compressed peroxide (10 minutes) (10 minutes) gas combined (10 minutes) (5 minutes) 2 hydrogen compressed gas ozone nothing peroxide (10 minutes) (5 minutes) (10 minutes) (10 minutes) 3 hydrogen ozone/compressed nothing compressed gas peroxide gas combined (10 minutes) (5 minutes) (10 minutes) (5 minutes) 4 hydrogen nothing ozone/compressed compressed gas peroxide (10 minutes) gas combined minutes) (5 minutes) (5 minutes) Furthermore, the system 98 can be configured to deliver the same or different injection sequences at different injection wells 65 situated in the contaminant plume 15a. For example, while the injector in injector well 65a is performing injection sequence 1 illustrated above, the injector in injector well 2 can be performing the same injection sequence 1 or can be performing other injector sequences (e.g., injection sequence 2-4 or other sequences). As stated above, the central controller 140 can be configured to control the amount, pressure, and concentration (in the case of ozone) of the oxidants and compressed gas delivered to contaminant plume via injector 70. The allocation (or amount) of the oxidants delivered to each injection well 65 can be determined based on the characteristics of the contaminant plume 15a. The allocation of compressed gas to each injection well 65 can be determined based on the oxidant allocation and DR. The time constants for the injection sequences, injection pulsation frequencies, and magnitude (i.e., pressure and/or flow rate) can then be empirically determined and programmed into the user interface 145 of the central controller 140. Once all of the injection parameters for the oxidants and compressed gas (e.g., timing (i.e., duration and frequency), amount, pressure, flow rate, oxidant ratio, and mole ratio) have been determined and stored into the central controller 140, a user can then program the injection sequences for each injection well 65 as shown above in Table I. At this time, the remediation system can then be operated to inject the oxidants and compressed gas into the contaminant plume 15a according to the programmed injection sequences. The injection sequences include injecting the oxidants and other chemicals into a well or series of wells and forcing the migration of the oxidants into the contaminated area by pulsed injections of compressed gas. In one embodiment, the injection of compressed gas following the injection of one or more oxidants can increase the sphere or volume of influence of the oxidant(s) in the aquifer. By increasing the sphere of influence of the oxidant(s) in the aquifer, the oxidant(s) can destroy more contaminants present in the groundwater or saturated zone of the contaminant plume 15a. In another embodiment, the injection of compressed gas can also force the contaminated groundwater away from the injection well or injection point into a surrounding area (e.g., the saturated, smear, or unsaturated zones of the contaminate plume 15a) and transport the oxidants and other chemicals into the area surrounding the injection well(s). When the groundwater is forced into the surrounding area, the groundwater can extract or desorb contaminants from soil adjacent to the surrounding area. When the injection of the compressed gas is discontinued, the groundwater can return to an over adjacent to the well(s) thereby returning the contaminants extracted from the soil to the area adjacent to the injection well(s). In one embodiment, the flow and pressure of compressed gas and the periodic cycling of injections can be regulated to optimize the transport of the oxidants into the contaminated area surrounding the injection well(s). The pulsed injection of compressed gas can act to agitate the soil/groundwater matrix and desorb organic contaminants from the soil thereby bringing them into solution by forced turbulence in the contaminant plume 15a. The movement of water or the displacement of water can help to mix the oxidants to produce more hydroxyl radicals. Because the remediation system described herein can inject a gas (i.e., ozone, compressed air, or combination of both) and a liquid (i.e., hydrogen peroxide) through the same injector, the gas and liquid can readily and intimately mix in the soil in the correct proportions, facilitating the desirable hydroxyl radical reaction. Of course, many other combinations of liquids including a variety of dissolved gases, chemicals such as acids, and/or biological agents such as biological nutrients can also be employed. Examples of acids that could be injected include acetic acid, phosphoric, or sulfuric acid. The injection of an acid in conjunction with hydrogen peroxide can enhance a Fenton's reaction. Examples of biological nutrients that can be utilized include ammonium phosphate or propane. The injection of a biological nutrient can also enhance the biological degradation of the organic contaminates. If air or another gas is also injected into the soil, it can help to cause microfractures, facilitating dispersion of the liquids and, if air or other oxygen-containing gas is used, can also supply oxygen for biological agents. During operation of the remediation system described herein, real-time measurements of dissolved oxygen (DO), oxidation/reduction potential (ORP), and temperature at monitoring wells 55a, 55b may be taken to re-allocate the injection of hydrogen peroxide and ozone-containing gas in each of injection wells 65a-65f so as to maintain constant, optimum levels of DO, ORP, and temperature. Furthermore, real-time measurements of dissolved CO2 at monitoring wells 55a, 55b may be taken to re-allocate the injection of hydrogen peroxide and ozone-containing gas in the event that CO2 declines significantly, indicating a reduction in contaminants. Optionally, the re-allocation of ozone-containing gas may be accomplished by the reduction of the ozone concentration in the ozone containing gas. The invention can be illustrated further by the following examples, which are not to be construed as limiting its scope. EXAMPLE 1 Utilizing a single injection well to deliver oxidants and compressed air to a contaminated region containing contaminated groundwater, the following injection sequence is used. Step Duration H2O2 Ozone Air 1 10 min yes no no 2 10 min no no yes 3 20 min no no no 4 10 min no yes yes 5 10 min no no no As shown above, H2O2 can be first injected into the contaminated region for 10 minutes to form a pool of H2O2 into the immediate area of the injection point (i.e., sphere of influence). Compressed air can then be injected into the contaminated region for 10 minutes to mix the H2O2 with the groundwater and agitate the contaminants to bring them into solution. The addition of the compressed air can also serve to de-water the area around the injection point. Following the injection of the compressed air for 10 minutes, no action is taken for 20 minutes to allow the de-watered area to collapse such that the H2O2 and groundwater that were driven out of the area around the injection point will return to the area thereby further mixing and agitating the area. Diluted ozone can then be injected into the H2O2 and groundwater solution for 10 minutes thereby creating OH* radicals, which will oxidize the aqueous contaminants and will also further agitate the soil and groundwater. Following the injection of ozone for 10 minutes, no action can be taken for 10 minutes to allow the groundwater to collapse again. This five step injection sequence may repeated until the contaminated region is remediated. EXAMPLE 2 Utilizing multiple injection wells to deliver oxidants and compressed air to a contaminated region containing contaminated groundwater where the injection wells were positioned as shown in FIG. 4 so that the ROI overlap and where a highly contaminated region existed between injection wells 65b and 65c, the following injection sequence was used. Step Duration H2O2 Ozone Air 1 10 min yes (well 65b) no no 2 10 min no no yes (well 65a) 3 10 min no yes (well 65c) yes (well 65c) As shown above, H2O2 was first injected into the contaminated region for 10 minutes to form a pool of H2O2(i.e., sphere of influence) into the immediate area of the well 65b, which is the center of the three wells (65a-c). Compressed air was then injected into the well 65a for 10 minutes to push the groundwater closer to well 65a, mix the H2O2 with the groundwater closer to the well 65b, and agitate the contaminants to bring them into solution. Following the injection of compressed air for 10 minutes, diluted ozone and compressed air was then injected into the well 65c for 10 minutes thereby creating OH radicals, which will oxidize the aqueous contaminants closer to the well 65b because of the ROI overlap. This three step injection sequence was repeated until the contaminated region was remediated. The remediation process described above utilizing the above injection sequence yielded the following results where MTBE represents Methyl tert-Butyl Ether, TBA represents tert-Butyl Alcohol, TAME represents tert-Amyl Methyl Ether, and ND represents non-detectable. The first data point is from monitoring well 55a, which is about 15 feet up gradient of the linear array of injection wells 65a-f. Contaminant Levels (ppb) Time MTBE TBA TAME prior to 1500 790 750 remediation 9 wks into ND ND ND remediation (<0.5) (<10) (<0.8) The second data point is from monitoring well 55b, which is about 35 feet down gradient of the linear array of injection wells 65a-f. Contaminant Levels (ppb) Time MTBE TBA TAME prior to 440 34 3 remediation 9 wks into ND ND ND remediation (<0.5) (<10) (<0.8) EXAMPLE 3 A release of unleaded gasoline was identified at a site during regulated underground storage tank (UST) upgrade activities during September 1995. Soil sample analytical results indicated that benzene, toluene, ethylbenzene and xylenes (BTEX) exceeded applicable Pennsylvania Department of Environmental Protection (PADEP) soil quality standards. Soil borings were completed using direct-push and hollow-stem auger drilling methods during October and November 1995. The findings of these investigations confirmed the presence of benzene and toluene in soil at concentrations exceeding applicable PADEP soil quality standards north and northwest of the dispenser island area and product piping. In November 1995, three monitoring wells (MW-1, MW-2, and MW-3) were installed. Five additional monitoring wells (MW-4 through MW-8) were installed in 1998. A groundwater pump and treat system began operation in April 1999 and is currently operating. Since groundwater monitoring was initiated onsite in December 1995, dissolved benzene and methyl tert butyl ether (MTBE) have been detected at MW-2, MW-3, and MW-3 in groundwater above applicable PADEP media specific concentrations (MSCs). Dissolved MTBE has also been detected offsite to the north and northeast of the site above the MSC. During April, 2003, additional soil quality delineation was completed on the rear portion of the site. The findings confirmed that benzene, toluene, ethylbenzene, MTBE and naphthalene were detected at concentrations above applicable PADEP MSCs in several borings along the north and northeast property boundary. The available drill logs also indicate that groundwater was encountered at depths ranging from 12 to 15 feet below grade, slightly above the bedrock surface. Static water levels measured at site monitoring wells on Apr. 17, 2003 range from three to nine feet below grade. It appears that the aquifer at the site comprises a shallow water-bearing zone perched above the bedrock surface and a deeper water-bearing zone occurring in fractures and bedding planes of the underlying bedrock. The two injection wells were constructed using 304 stainless steel riser. Each of the injection wells was constructed by installing two ½-inch diameter stainless steel points (one point for oxygen/ozone and one point for hydrogen peroxide) into a six-inch diameter borehole. Each borehole was advanced to an appropriate depth below the static water table (maximum of 20 feet bgs). Each hydrogen peroxide injection well was completed with a two foot section of stainless steel well screen. Each oxygen/ozone injection well was completed with a ceramic diffuser at the end of the riser. The ozone diffuser was installed at the bottom of the boring. Sandpack was placed surrounding the diffuser and to a depth of two feet above the top of the diffuser. A bentonite seal (minimum of one foot thick) was placed above the sandpack surrounding the ozone diffuser to prevent short-circuiting. Following the installation of both the diffuser and the well screen, each borehole was filled with concrete grout and completed with a protective, locking access vault, which was mounted flush to grade. Of the two injection points, the first injection point (IP-1) was installed in the existing groundwater interception trench and is intended to address hydrocarbon impact to groundwater above bedrock, observed at approximately 14 feet bgs. The second injection point (IP-2) was installed into the top of the bedrock surface, observed at 14 to 16 feet bgs. Observation wells were located within 15 feet of the injection points and were constructed with two-inch diameter schedule 40 PVC screen and casing. Clean silica sand filter pack was installed across the screened interval and a bentonite seal was installed above the sand pack to prevent the migration of surface water or groundwater from zones above the screened interval into the well. The remaining annular space above the bentonite seal was filled with grout to surface grade. Feasibility testing was conducted on Jun. 27, 2003 utilizing AS technology and on Jul. 2, 2003 utilizing the chemical oxidation technology at two locations (IP-1 and IP-2). AS was utilized to estimate the oxygen/ozone radius-of-influence under varying air injection flow rates. Air injection can be effectively used to estimate the expected radius-of-influence during ozone injection since both air and oxygen/ozone will be distributed similarly in the subsurface under varying injection flow rates (typically between 1 and 10 standard cubic feet per minute [scfm]). AS feasibility testing was performed using Data Acquisition and Processing Laboratory (DAPL). which is a self-contained platform that provides computerized on-site real-time data acquisition and processing evaluation. On Jul. 2, 2003, a one-day oxygen, ozone, air, and hydrogen peroxide injection test was conducted at the site. The oxygen/ozone stream used was a mixture of at least 90% oxygen and a maximum of 10% ozone at a flow rate of up to 0.7 scfm. This flow rate could have been increased up to 20 scfm by adding supplemental atmospheric air pumped into the subsurface via oil-less air compressors. Approximately 110 gallons of hydrogen peroxide were injected into the two injection points during the chemical oxidation event. The ozone components of the system include an air compressor, pressure swing adsorption unit, and ozone generator. The air compressor and pressure swing adsorption unit are utilized to generate oxygen and are commonly used with oxygen/ozone generators. The air produced by the compressor is directed into a pressure swing adsorption unit which adsorbs the nitrogen naturally present in the air stream, resulting in an oxygen-rich air stream to feed the ozone generator. The nitrogen adsorption unit periodically exhausts small volumes of nitrogen back into the atmosphere. The flow of the oxygen stream is monitored by a flow indicator. The flow is also transmitted to a flow controller which operates a solenoid valve to ensure a constant flow is delivered to the ozone generator. Testing was conducted in the existing interception trench at injection point IP-1 and in the native soil at injection point IP-2 to obtain the necessary information to determine the feasibility of the technology and to provide the necessary data for the subsequent installation of a remediation system for the site. Chemical oxidation testing was performed at injection points IP-1 and IP-2 to determine the effectiveness and applicability of the technology to site conditions. Testing was completed at each injection point in several steps ranging from low flow, high ozone concentration to high flow, low ozone concentration. The moderate to high flow steps were achieved by adding compressed air to the oxygen/ozone stream as a carrier gas. Prior to injection of the ozone/oxygen stream, approximately 50 gallons of 18% hydrogen peroxide was injected into each injection well to saturate the subsurface with peroxide. Subsequent injections of the oxygen/ozone stream allows for the production of hydroxyl radicals, which are more powerful oxidizers than ozone or hydrogen peroxide individually, through the reaction of ozone and hydrogen peroxide. Similar to the AS testing, groundwater quality measurements were obtained throughout testing. In addition, headspace readings were collected for LEL, percent oxygen, and ozone. An evaluation of the groundwater results indicates an overall reduction in the BTEX and MTBE concentrations as summarized in Table 2. The most significant reduction was observed, as expected, at injection well IP-2. The initial BTEX and MTBE concentrations were 293.7 micrograms per liter (μg/L) and 164 μg/L, respectively. Following all testing activities, the BTEX and MTBE concentrations were reduced to non-detect (ND) at a reporting limit of 1 μg/L. Reductions in dissolved BTEX concentrations at the three newly installed observation wells were 10%, 14%, and 11% for monitoring wells MW-9, MW-10, and MW-11, respectively, between the post AS samples and final samples. Dissolved MTBE concentrations were reduced by 26%, 29%, and 9% at wells MW-9, MW-10, and MW-11, respectively. The overall reductions observed at monitoring well MW-9, comparing pre-testing and final samples were 20% for BTEX and 47% for MTBE. Monitoring wells MW-10 and MW-11 are located immediately downgradient of the two injection points. Monitoring well MW-9 is located immediately upgradient of the two injection points. The results from the other three observation wells (MW-3R, SP-East, and SP-West), located side-gradient to the injection area, did not show decreases in concentrations. All three of the monitoring wells which indicated dissolved BTEX and MTBE concentration decreases (MW-9, MW-10, and MW-11) measured positive pressure influences during chemical oxidation testing at IP-1 and IP-2. TABLE 2 FEASIBILITY TEST GROUNDWATER ANALYTICAL RESULTS - VOCs Well BTEX % MTBE % ID Description Benzene Toluene Ethylbenzene Xylenes BTEX MTBE Difference Difference IP-1 Pre-Rem 212.0 19.0 140.0 329 700.0 177 — — Post-Rem NA NA NA NA — NA — — IP-2 Pre-Rem 26.2 15.7 55.8 196 293.7 164 — — Post-Rem ND (1) ND (1) ND (1) ND (1) — ND (1) 100% 100% MW- Post-Air 49.6 1.6 83.8 13.5 148.5 137 — — 3R Post-Rem 55.1 1.7 114.0 19.5 190.3 120 −28% 12% MW-9 Pre-Rem 394.0 10.4 125.0 68.6 598.0 3,210 — — Post-Air 354.0 9.0 105.0 65.8 533.8 2,370 11% 26% Post-Rem 296.0 9.5 105.0 69.9 480.4 1,690 20% 47% MW- Post-Air 23.2 0.57 16.6 3.9 44.3 287 — — 10 Post-Rem 23.4 ND (1) 9.8 4.9 38.1 240 14% 16% MW- Post-Air 1,470 602 988 4,570 7,630 7,940 — — 11 Post-Rem 1,360 584 1,100 3,740 6,784 7,220 — — SP- Post-Air 80.7 27.7 16.1 289.0 413.5 245 — — East Post-Rem 102.0 36.9 13.3 277.0 429.2 449 −4% −83% SP- Post-Air 57.8 6.3 16.3 94.2 174.6 168 — — West Post-Rem 45.6 4.5 13.2 80.3 143.6 178 18% −6% Notes: VOCs—volatile organic compounds Pre-Rem = Pre-Remediation Post-Rem = Post-Remediation Post-Air = Post-Air Sparge ND = Not Detected NA = Not analyzed MTBE = Methyl tert-butyl ether BTEX = sum of benzene, toluene, ethylbenzene, and total xylenes All values are reported in micrograms per liter (μg/L) Although the invention has been described with reference to the preferred embodiments, it will be apparent to one skilled in the art that variations and modifications are contemplated within the spirit and scope of the invention. The drawings and description of the preferred embodiments are made by way of example rather than to limit the scope of the invention, and it is intended to cover within the spirit and scope of the invention all such changes and modifications.
<SOH> BACKGROUND <EOH>Groundwater, a valuable and limited natural resource, can become contaminated by volatile organic compounds (VOC) and semi volatile organic compounds (SVOC) by: (i) leaking underground storage tanks and associated piping (e.g., gasoline stations); (ii) leaking/ruptured pipelines; (iii) chemical spills along roadways, at chemical plants, or manufacturing operations; and (iv) leaching of chemicals disposed of in landfills. Chemicals spilled as described above, if not immediately cleaned up, can be absorbed into the soil, subsequently transported (depending on the solubility of the contaminant) via rainwater to underground aquifers. Once in the aquifer, the contaminants spread and are carried down gradient. This spreading and movement of the contaminants is known as a “plume”. Drinking water wells, buildings, wetlands, etc. which are down gradient of the spill site can be negatively impacted by the contaminant plume, posing health risks to wildlife and to humans. The treatment of contaminated soils and groundwater has gained increased attention over the past few years because of uncontrolled hazardous waste disposal sites. It is well documented that the most common means of site remediation has been excavation and landfill disposal. While these procedures remove contaminants, they are extremely costly and in some cases difficult if not impossible to perform. More recently, research has focused on the conversion of contaminants contained in soil and groundwater based on the development of on-site and in situ treatment technologies. One such treatment has been the incineration of contaminated soils. The disadvantage of this system is in the possible formation of harmful by products including polychlorinated dibenzo-p-dioxins (PCDD) and polychlorinated dibenzofurans (PCDF). In situ biological soil treatment and groundwater treatment is another such system that has been reviewed in recent years. So-called bioremediation systems, however, have limited utility for treating waste components that are biorefractory or toxic to microorganisms. Such bioremediation systems were the first to investigate the practical and efficient injection of hydrogen peroxide into groundwater and/or soils. These investigations revealed that the overriding issue affecting the use of hydrogen peroxide in situ was the instability of the hydrogen peroxide downgradient from the injection point. The presence of minerals and enzymes such as catalase and peroxidase in the subsurface catalyzed the disproportionation of hydrogen peroxide near the injection point, with rapid evolution and loss of molecular oxygen, leading to the investigation of stabilizers as well as biological nutrients. During the early biological studies from the 1980's, some investigators recognized the potential for competing reactions, such as the direct oxidation of the substrate by hydrogen peroxide. Certain researchers also hypothesized that an unwanted in situ Fenton's-like reaction under native conditions in the soil was reducing yields of oxygen through the production of hydroxyl radicals, a powerful oxidizing species. Such a mechanism of contaminant reduction was not unexpected, since Fenton's-type systems have been used in ex situ systems to treat soil and groundwater contamination. Other investigators concomitantly extended the use of Fenton's-type systems to the remediation of in situ soil systems. These studies attempted to correlate variable parameters such as hydrogen peroxide, iron, phosphate, pH, and temperature with the efficiency of remediation. As with bioremediation systems, in situ Fenton's systems were often limited by instability of the hydrogen peroxide in situ and by the lack of spatial and temporal control in the formation of the oxidizing agent (i.e. hydroxyl radical) from the hydrogen peroxide. In particular, aggressive/violent reactions often occurred at or near the point where the source of the oxidizing agent (the hydrogen peroxide) and the catalyst were injected. As a consequence, a significant amount of reagents including the source of the oxidizing agent (hydrogen peroxide) was wasted because activity was confined to a very limited area around the injection point. In addition, these in situ Fenton's systems often required the aggressive adjustment of groundwater pH to acidic conditions, which is not desirable in a minimally invasive treatment system. Finally, such systems also resulted in the mineralization of the subsurface, resulting in impermeable soil and groundwater phases due to the deleterious effects of the reagents on the subsurface soils. Other researchers have investigated the use of ozone, either alone or in combination with hydrogen peroxide, in ex situ advanced oxidation processes (AOPs) wherein ozone (O 3 ) and hydrogen peroxide (H 2 O 2 ) introduced into water react with each other to form the hydroxyl radical (HO*). The hydroxyl radical formation reaction is as follows: in-line-formulae description="In-line Formulae" end="lead"? H 2 O 2 +2O 3 →2OH*+3O 2 (1) in-line-formulae description="In-line Formulae" end="tail"? Hydrogen peroxide, ozone, and hydroxyl radical then come into contact with and oxidize contaminants, destroying them. Glaze and Kang, J. Amer. Water Works Assoc., 80, 51 (1988), is hereby incorporated by reference in its entirety, describes an advanced oxidation process wherein ozone (O 3 ) and hydrogen peroxide (H 2 O 2 ) are introduced into contaminated water at atmospheric pressure. Known AOP decontamination systems suffer from a number of disadvantages. A first disadvantage of known AOP decontamination systems is formation of unwanted disinfection byproducts. For example, bromide ions (Br − ), naturally present in the water, can undergo a series of reactions to produce bromate (BrO 3 − ): in-line-formulae description="In-line Formulae" end="lead"? 3Br − +O 3 (only)→3BrO − (2) in-line-formulae description="In-line Formulae" end="tail"? in-line-formulae description="In-line Formulae" end="lead"? BrO+(O 3 or HO*)→BrO 3 − (3) in-line-formulae description="In-line Formulae" end="tail"? Bromate has recently been designated as a suspected carcinogen, and the U.S.E.P.A. has established a maximum level for drinking water of 10 μg/L. It is thus important to prevent or minimize bromate formation during decontamination of potable water. In reaction (2) above, neither the hydroxyl radical (HO*) nor hydrogen peroxide alone oxidize bromide to form hypobromite (BrO − ). Moreover, reaction (3) must compete with the conversion of hypobromite back to bromide that occurs in the presence of hydrogen peroxide: in-line-formulae description="In-line Formulae" end="lead"? BrO − +H 2 O 2 →Br − (4) in-line-formulae description="In-line Formulae" end="tail"? Thus when hydrogen peroxide concentration is greater, reaction (4) is favored and the formation of bromate is discouraged. See U. von Gunten and Y. Oliveras, Envir. Sci. and Tech., 32, 63 (1998); U. von Gunten, Y. Oliveras, Wat. Res., 31, 900 (1997); W. R. Haag, and J. Hoigne, Envir. Sci. and Tech., 17, 261(1983); U. von Gunten, J. Hoigne and A. Bruchet, Water Supply, 13, 45 which are all hereby incorporated by reference in their entireties. A second disadvantage of conventional ozone decontamination systems is the limited solubility of ozone in water at atmospheric pressure. FIG. 1 shows that the solubility of ozone in water increases with higher pressure. However, conventional oxidation decontamination systems introduce ozone at only atmospheric pressure, limiting the amount of ozone that can be dissolved in the water. A third disadvantage is the limited concentration of ozone normally present in the reactant gas stream that is mixed with the water. FIG. 2 shows that ozone solubility in water increases with increasing ozone in the gas phase. Conventional oxidation systems utilize gas streams containing only about 1-4% ozone by weight in air, effectively limiting the amount of ozone soluble in water. Finally, these AOP decontamination systems suffer from a similar limitation as all ex situ systems; namely, the necessity to pump contaminants from the in situ media to an external reaction vessel, a requirement which is both expensive and inefficient.
<SOH> BRIEF DESCRIPTION OF THE DRAWINGS <EOH>These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where: FIG. 1 plots overall pressure versus the concentration of ozone dissolved in water, based upon a 10% (v) concentration of ozone in the gas phase for conventional oxidation decontamination; FIG. 2 plots the concentration of ozone in the gas phase versus the resulting concentration of ozone dissolved in water for conventional oxidation decontamination; FIG. 3 illustrates a cross-sectional view of a representative remediation site where an underground storage tank (UST) 10 has leaked an organic contaminant into the surrounding soils and groundwater and formed a large contaminant plume; FIG. 4 illustrates a simplified, overhead plan view of the remediation site shown in FIG. 3 , where a UST has leaked an organic contaminant into the surrounding soils and the extent of the resulting contaminant plume migration is shown relative to the depth from the surface; FIG. 5 is a cross sectional view of a typical remediation site showing a leaking UST, the resultant contaminant plume, an injector assembly, and the general characteristics of the soils at such a site; FIG. 6 is a detailed, cross-sectional view of one embodiment of an injection well 65 for treating a remediation site; and FIG. 7 illustrates one embodiment of a component diagram of oxidant/compressed gas delivery and control system 98 . detailed-description description="Detailed Description" end="lead"?
20040319
20070904
20050331
73974.0
1
KRECK, JANINE MUIR
SYSTEM AND METHOD FOR REMEDIATING CONTAMINATED SOIL AND GROUNDWATER IN SITU
SMALL
0
ACCEPTED
2,004
10,805,512
ACCEPTED
System and method for effectuating the creation and management of customer pick-up/backhaul programs between buyers and sellers in a supply community
A business method and system that effectuates collaboration on Customer Pick-UP (CPU) between one or many buyers (customers) and sellers (suppliers) in a supply community. The method and system have particular utility in markets where the standard terms of sale are Destination Delivered. The method and system enables sellers to create, configure and maintain seller-specific CPU programs having at least one strategy option and at least one CPU allowance unit rate structure option which can be contemporaneously accessed by buyers to identify potential CPU opportunities and then submit a CPU proposal/request, each based on a single CPU strategy option, to one or more sellers, wherein the CPU proposal/request is a collaboration invitation, a supply bid or a request for a lane allowance quotation structured to facilitate structured to facilitate the agreement of a mutually acceptable CPU allowance unit rate consistent with the selected CPU strategy option. The system includes an internet-based program tool within which the seller can specify the rules used to select the most appropriate CPU allowance unit rate structure option for calculating the CPU shipment allowance and the seller can utilize a gainshare module to pay the buyer the agreed CPU allowance for any CPU shipments.
1. In a system for effectuating collaboration on a customer pick-up program and allowance management between one or many sellers and one or many buyers (partners) in a supply community which enables the one or many sellers to create, configure, and maintain a customer pick-up program, enables the one or many buyers to contemporaneously access, query, and view customer pick-up program and seller location information to identify potential customer pick-up program opportunities, enables a buyer and a seller to collaboratively establish a mutually acceptable customer pick-up! Program strategy from a collection of one or many customer pick-up program strategy options and to establish customer pick-up program allowances, and to determine the customer pick-up program allowance for a specific shipment by the selected customer pick-up program allowance unit rate structure option selected by the seller, the method including the steps of: the seller creating a customer pick-up program by selecting at least one customer pick-up program strategy option, selecting at least one customer pick-up program allowance unit rate structure option, and selecting the decision rules by which the customer pick-up program allowance unit rate structure option is selected to determine the customer pick-up program allowance for a single shipment; the seller providing required information for at least one seller shipping location; the buyer one of the at least one customer pick-up program strategy options selected by the seller and submitting a customer pick-up program proposal and request to seller, wherein the structure and content of the customer pick-up program proposal and request is determined by the just one selected strategy option; the buyer and seller selecting a customer pick-up allowance unit rate and at least one customer pick-up program allowance unit rate structure option for each customer pick-up program allowance; and determining the customer pick-up allowance for a specific shipment using the selected customer pick-up allowance unit rate structure option. 2. The method as claimed in claim 1 wherein the seller creates a customer pick-up program by entering attribute data including the customer pick-up program strategy, policy, procedures, shipping location profiles, and the customer pick-up program allowance and allowance unit rate formulae. 3. The method as claimed in claim 2 wherein the at least one customer pick-up program strategy option selected by the seller is from the group of options including collaborative gainsharing, for-hire transportation provide and the customer pick-up customer options 4. The method as claimed in claim 3 wherein the gainshare allocation factor by which the net cost savings are to be allocated between the partners in the collaborative gainsharing strategy option is within the range of 0% with no allocation to the customer pick-up program buyer and 100% with a total allocation to the customer pick-up program buyer. 5. The method as claimed in claim 1 wherein the at least one customer pick-up program allowance unit rate structure is selected by seller from a group of options including hundredweight basis ($/cwt), cube basis ($/cubic feet), pallet basis ($/pallet count), flat rate per purchase order basis ($/purchase order), flat rate per shipment basis ($/shipment) and percentage of invoice basis (% of invoice $ value). 6. The method as claimed in claim 1 wherein a single decision rule is used to select the just one customer pick-up program allowance unit rate structure to be applied to a single shipment, the decision rule being selected from the group including the default option specified by seller and buyer, the option that maximizes the customer pick-up program allowance, the option that minimizes the customer pick-up program allowance and a flat rate option. 7. The method as claimed in claim 2 or 6 wherein the customer pick-up allowance formulae are CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ⁢ ⁢ ( $ / UOM ) = ( Gainshare ⁢ ⁢ Allocation ⁢ ⁢ Factor ) × { ( Scaling ⁢ ⁢ Factor ) × [ ( Line ⁢ ⁢ Haul ⁢ ⁢ Cost ) + ( Fuel ⁢ ⁢ Adjustment ⁢ ⁢ Term ) ] + Accessorial ( Standard ⁢ ⁢ No . ⁢ of ⁢ ⁢ Units ) CPU ⁢ ⁢ Allowance ⁢ ⁢ ( $ ) = ( Performance ⁢ ⁢ Factor ) × [ ( CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ) × ( No . ⁢ of ⁢ ⁢ Units ⁢ ⁢ on ⁢ ⁢ Shipment ) ] 8. The method as claimed in claim 1 wherein the criteria used by the buyer to identify potential customer pick-up program opportunities are selected from the group of criteria options including customer pick-up program strategy, policy, procedures, customer pick-up allowance formulae, shipping location and profiles, and shipment volume and volatility 9. The method as claimed in claim 1 wherein the approval of customer pick-up program allowance payments from seller to buyer is effected by using an option selected from the group of options including a manual review and approval by the seller of each customer pick-up program allowance, by the seller and the systematic and automatic approval of each customer pick-up program allowance. 10. The method as claimed in claim 3 wherein payment of the customer pick-up allowance is effected using an option selected from the group of options including an off-invoice line item credit in the amount of the customer pick-up program allowance, a freight bill in the amount of the customer pick-up program allowance and use of the gainshare module to credit the buyer and debit the seller in the amount of the customer pick-up allowance. 11. The method as claimed in claim 1 wherein the buyer submits a customer pick-up program proposal and request to more than one customer pick-up program sponsor to consolidate more than one order on a single shipment and thereby pick up less then full truckload orders at more than one location. 12. The method as claimed in claim 1 wherein the line haul charge component of the customer pick-up program allowance unit rate is from time to time updated for changes in the fuel adjustment term as specified by the seller. 13. The method as claimed in claim 1 wherein the buyer and seller may be within the same corporate entity. 14. A system for effectuating collaboration in a customer pick-up program and allowance management between one or many sellers and one or many buyers (partners) in a supply community which enables the one or many sellers to create, configure, and maintain a customer pick-up program, enables the one or many buyers to access, query, and view the customer pick-up programs and seller location information to identify potential customer pick-up program opportunities, enables a buyer and a seller to collaboratively select and establish a mutually acceptable customer pick-up program strategy from a group including one or many customer pick-up program strategy options and to negotiate and agree customer pick-up program allowances and enables ! the determination of the customer pick-up allowance for a specific shipment by a selected customer pick-up program allowance unit rate structure option, the system comprising: means for a seller to create a customer pick-up program by selecting at least one customer pick-up program strategy option, selecting at least one customer pick-up program allowance unit rate structure option, and selecting the decision rules by which one customer pick-up program allowance unit rate structure option is selected; means for a seller to enter the required information for at least one seller shipping location in the customer pick-up program; means for a buyer to select one of the at least one customer pick-up program strategy options selected by the seller and submit a customer pick-up program proposal and request to seller, wherein the structure and content of the customer pick-up program proposal and request is determined by the just one selected strategy option; means for a buyer and seller to select customer pick-up program allowance unit rates and at least one customer pick-up program allowance unit rate structure option; and means to determine the customer pick-up program allowance for a specific shipment using the customer pick-up program allowance unit rate structure option selected by the seller. 15. The system as claimed in claim 14 wherein a seller creates a customer pick-up program by entering attribute data including the customer pick-up program strategy, policy, procedures, shipping locations, the customer pick-up program allowance and the customer pick-up program allowance unit rate formulae. 16. The system as claimed in claim 15 wherein the at least one customer pick-up program strategy option selected by the seller is from the group of options including collaborative gainsharing, for-hire transportation provider, and customer pick-up customer options. 17. The system as claimed in claim 16 wherein the gainshare allocation factor by which the net cost savings are to be allocated between the partners in the collaborative gainsharing strategy option is within the range of 0% with no allocation to the customer pick-up program buyer and 100% with a total allocation to the customer pick-up program buyer. 18. The system as claimed in claim 15 wherein the at least one customer pick-up program allowance unit rate structure option is selected by seller from a group of options including hundredweight basis ($/cwt), cube basis ($/cubic feet), pallet basis ($/pallet count), flat rate per purchase order basis ($/purchase order), flat rate per shipment basis ($/shipment), and percentage of invoice basis (% of invoice $ value). 19. The system as claimed in claims 15 or 18 wherein the single decision rule used with the customer pick-up program allowance unit rate structure to be applied to a shipment is selected from the group including the default option specified by seller and buyer, the option that maximizes the customer pick-up program allowance, the option that minimizes the customer pick-up program allowance, and a flat rate option for a purchase order or shipment. 20. The system as claimed in claim 14 or 19 wherein the customer pick-up program allowance formulae are CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ⁢ ⁢ ( $ / UOM ) = ( Gainshare ⁢ ⁢ Allocation ⁢ ⁢ Factor ) × { ( Scaling ⁢ ⁢ Factor ) × [ ( Line ⁢ ⁢ Haul ⁢ ⁢ Cost ) + ( Fuel ⁢ ⁢ Adjustment ⁢ ⁢ Term ) ] + Accessorials } ( Standard ⁢ ⁢ No . ⁢ of ⁢ ⁢ Units ) CPU ⁢ ⁢ Allowance ⁢ ⁢ ( $ ) = ( Performance ⁢ ⁢ Factor ) × [ ( CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ) × ( No . ⁢ of ⁢ ⁢ Units ⁢ ⁢ on ⁢ ⁢ Shipment ) ] 21. The system as claimed in claim 14 wherein the criteria selected by the buyer to identify potential customer pick-up program opportunities are from the group of criteria options including customer pick-up program strategy, policy, procedures, customer pick-up program allowance formulae, shipping locations and profiles, and shipment volume and volatility. 22. The system as claimed in claim 14 wherein the approval of customer pick-up program allowance payments from seller to buyer is effected by using an option selected from the group of options including a manual review and approval by the seller of each customer pick-up program allowance and the systematic and automatic approval of each customer pick-up program allowance. 23. The system as claimed in claim 14 wherein the payment of the customer pick-up program allowance due from the seller uses an option selected from the group of options including an off-invoice line item credit in the amount of the customer pick-up program allowance applied to the invoice for the goods, a freight bill in the amount of the customer pick-up program allowance submitted by the buyer to the seller, and use of the gainshare module to credit buyer the amount of the customer pick-up program allowance. 24. The system as claimed in claim 14 wherein the buyer submits a customer pick-up program proposal to more than one customer pick-up program partner to consolidate more than one order on a single shipment and thereby pick up less than full truckload orders at more than one location. 25. The system as claimed in claim 14 wherein the line haul charge component of the customer pick-up program allowance unit rate is from time to time updated for changes in the fuel adjustment term as specified by the seller. 26. The system as claimed in claim 14 wherein the buyer and the seller may be within the same corporate entity. 27. The system as claimed in claim 14 wherein the system is modular in design and the modules include a customer care module, a data entry and management module, a transaction module, a customer pick-up program creation and management module, a performance and compliance module, an incentive program creation and management module, and an account management module. 28. The method as claimed in claim 1 wherein the buyer reviews the customer pick-up program and location information to identify sellers and seller shipping locations that may be potential customer pick-up program opportunities. 29. The system as claimed in claim 14 wherein the buyer reviews the customer pick-up program and location information to identify sellers and seller shipping locations that may be potential customer pick-up program opportunities. 30. The method as claimed in claim 7 wherein the scaling factor can be between 0 and any positive number. 31. The system as claimed in claim 20 wherein the scaling factor can be between 0 and any positive number. 32. The method as claimed in claim 7 wherein the performance factor can be between 0 and any positive number. 33. The system as claimed in claim 20 wherein the performance factor can be between 0 and any positive number. 34. The method as claimed in claim 7 wherein the fuel adjustment term can be less than 0, greater than 0, and 0. 35. The system as claimed in claim 20 wherein the fuel adjustment term can be less than 0, greater than 0, and 0. 36. The method as claimed in claim 7 wherein the accessorials can be less than 0, greater than 0, and 0. 37. The system as claimed in claim 20 wherein the accessorials can be less than 0, greater than 0, and 0. 38. The method as claimed 1 wherein the buyer submits a customer pick-up program and request to seller. 39. The system as claimed in claim 14 wherein the buyer submits customer pick-up program and request to seller.
BACKGROUND OF THE INVENTION (1) Field of the Invention The present invention relates to collaborative transportation efficiency programs between buyers and sellers in a supply community, and more particularly to a method and system for effectuating collaboration on customer pick-up opportunities. (2) Description of the Prior Art Business partners must collaborate to compete in today's marketplace, especially to drive growth by short-cycle innovation and to liberate the resources required to fund the growth initiatives. As buyers and sellers have increasingly focused on their core businesses and competencies, driving non-value added costs out of their supply chains has become strategic to increasing value to the buyer (and consumer) through lower prices and innovation. Many companies have restructured their supply chains—reducing assets (plant and distribution center rationalization), costs (strategic sourcing initiatives, including out-sourcing), and inventory (integrated planning systems)—to be faster, more flexible, and more efficient. Only then can the right product be introduced to the marketplace at the right time for the right cost. The most successful companies collaborate across enterprise boundaries, avoiding sub-optimization by “drawing the box” around the extended supply chain. In particular, logistics is a functional area that is “ripe for picking” with lots of low-hanging fruit, especially in the fast-moving consumer goods (FMCG) market where logistics costs are often 5 to 10% of the selling price of the goods. One opportunity is to improve the cost-efficiency of transportation (equipment and labor) by reducing empty miles between loads (“deadhead”), maximizing trailer utilization (weigh-out or cube-out the container), and minimizing non-drive time (wait time at the location and loading/unloading times, together referred to as “dwell time”). Customer pick-up (CPU) is an approach that can contribute to all three of these objectives. First, the truck making the delivery from a customer's regional distribution center (CDC) to one of that customer's stores often runs empty from the store back to the CDC. An “in-bound” shipment from the supplier's distribution center (SDC) to the CDC can be picked-up and delivered by that customer's truck for minimal incremental cost, provided that the SDC is (essentially) en route from the customer's store to CDC. The customer truck could even make several CPU pick-ups of partial loads, thereby maximizing shipment weight or cube, provided that the route from the store to the (more than one) SDC's to the CDC is economic and the required day of shipping and pick-up appointments can be synchronized. CPU can also significantly reduce non-drive time because the CPU carrier typically has privileges to drop the loaded trailer upon arrival at the destination DC and leave immediately (rather than One opportunity is to improve the cost-efficiency of transportation (equipment wait to have the trailer unloaded). Also, when there are delays, the CPU carrier usually receives preferential treatment from the CDC. There are, however, several barriers that must be overcome for the supplier and customer business partners to realize the maximum combined value from CPU activities. Strategic Alignment and Relationship Management: First, the supplier and customer must agree on a single strategy prior to engaging in a CPU relationship. Insofar as the selected strategy determines the process role of each partner, failure to do so will negatively affect the quality of the business relationship. For example, is the strategy to provide the customer with Origin Collect terms of sale, or is the strategy to improve the utilization of the customer's transportation assets? If the strategy is genuinely the latter, then the role of the customer is actually the role of a supplier of transportation services. Or, perhaps the strategy is to collaborate so as to drive non-value added costs out of the extended supply chain. If so, the partners should share the savings through a gainshare program such as that described in pending patent application Ser. No. 10/775,680 filed Feb. 11, 2004 which is incorporated herein by reference and hereinafter referred to as the Gainshare Module. Both partners are rewarded for investing the resource required to develop and implement exceptional business processes. In today's CPU activities, these topics are not even considered, much less discussed and agreed upon. It is clear that a variety of strategies are available. The partners must agree on one, and only one, approach and then apply it rigorously. Unfortunately, conflicted behavior is not uncommon. For example, in the fast moving consumer goods (FMCG) market, customers espouse collaboration (share the savings), but then expect the supplier to use a CPU formula that is (essentially) “cost-neutral” for the supplier. Discovery: The current processes available to customers for discovering attractive CPU opportunities are unworkable. It is difficult for customers to 1) determine which suppliers offer CPU programs, 2) determine which of these CPU programs have policies that would be acceptable to the customer and procedures that are feasible for the customer, 3) identify shipping locations for a candidate supplier that are logistically feasible (location, volume, and typical shipment weight or cube), and 4) agree on an allowance via the standard process of requesting a CPU allowance quotation for the shipping lanes (SDC to CDC) of interest. As a result, most customers approach CPU in a tactical manner, supported by little, if any, strategic network-wide analysis to identify the highest-value set of lanes and suppliers. A simple, expeditious discovery process would allow the simultaneous assessment of many CPU options, most likely resulting in an improved solution. Program Complexity: No two CPU Programs are alike. For many sensible reasons, programs differ significantly in policy, procedure, and the structure of the formula used by the supplier to determine the CPU allowance. In practice, differences in policy and procedure get overlooked because enforcing compliance is so difficult. Regardless, the differences in allowance formula structure alone introduce significant complexity and confusion. The biggest difference is the basis of the CPU rate structure—is the CPU allowance rate a flat rate per purchase order or shipment (usually with a weight, cube, or pallet minimum), or is the CPU allowance determined by extending an agreed “cost per unit” rate ($ per weight, cube, or pallet) by the number of units (weight, cube, or pallet) without a minimum requirement? There are many options for the CPU rate structure, and for the other cost components, and each has its pros and cons. Predictably, confusion and anxiety are common, affecting the quality of supplier/customer relationships. Furthermore, it is difficult for a supplier to offer a CPU program that has the capability to alternate between different CPU allowance rate structures, so that the most appropriate structure is utilized for each load. For example, the allowance for a load that weighs out should not be determined using a cube basis rate structure. Lacking this capability, partner dyads resign themselves to choosing just one rate structure, and accepting its limitations. Program Compliance and Performance: In CPU, the supplier cedes control for the shipment to the customer upon pick-up by the customer (or the customer's carrier) at the supplier's ship-from location, even though the supplier typically retains title until the goods are delivered. In so doing, the supplier implicitly assumes several risks, such as: 1) Diversion: The customer can, having accepted an allowance to deliver a shipment to a specific CDC, divert that shipment to another CDC. This action can affect the supplier's stock allocation planning process as the inventory records (by location) are now incorrect. There is also the possibility that the customer never intended to deliver to the agreed destination, especially if the cost of delivery to the diverted location is less than the cost of delivery to the agreed destination. Regardless, it is very difficult, if not impossible, for the supplier to verify that the shipment was delivered to the agreed location. 2) Late Delivery and Unloading: The customer's traffic manager (or dispatcher) might (knowingly or unknowingly) make decisions that compromise the on-time arrival and unloading of the CPU shipment. Pick-up delays result when the CPU carrier cannot or does not honor their volume commitment, which is most likely during shipping peaks created by promotional events. In such an event the supplier must convert the load from CPU to Delivered and scramble to secure a carrier, which may be difficult as the supplier probably does not consistently ship on that lane. Delays are then common. Shipments can also be delayed due to a “relay”, where the trailer is handed off from one power unit to another, risking a delay on the transfer. Or, upon arrival, the CDC may choose not to promptly unload the trailer. At best, such events result in partner conflict over payment term compliance, as the supplier bases the payment due date on the assumed arrival (and unload) date, while the customer typically bases the payment date on the actual (and possibly later) unloading date. At worst, these delays result in an out-of-stock situation, and the supplier loses sales. In fact, it is for this reason that buyers in the FMCG market are known to complain about the poor on-time performance on CPU shipments delivered by their customer's private fleet or for-hire CPU carrier. 3) Enforcement: Needless to say, enforcement is challenging. First, the supplier can only measure on-time pick-up. It is then impossible for the supplier to reduce a discussion of on-time delivery to a fact basis. Even if the supplier could do so, they might be reluctant to because it might risk sales, especially for a strategic collaborative buyer/seller partnership. This is a simple consequence of the fact that customer is playing two roles—customer on the buy/sell of the goods, and provider (supplier) on the buy/sell of transportation services. The supplier typically defers to the customer role, and poor compliance on the CPU Program is ignored. 4) Financial Transaction Process: The standard terms of sale in the FMCG market is “Destination Delivered”, meaning that title to the goods transfers from the seller to the buyer on receipt at the customer's receiving dock (“Destination”) and that the transportation is arranged and paid for by the supplier (“Delivered”). Insofar as suppliers are often reluctant to quote an Origin Collect selling price, the standard industry practice is that suppliers offer customers who wish to pick-up their freight an “off-invoice” line item (i.e., credit) on the invoice for the goods in an amount agreed by buyer and seller. This credit is referred to as a “CPU allowance”. Another practice, although less common, is for the customer to submit a freight bill to the supplier in the amount of the CPU allowance. Either way, the financial transaction is an exceptional business process, if not for the buyer than certainly for the seller, leading to confusion and failure. In addition, if the CPU Line Haul Cost is to be corrected for changes in fuel prices via a fuel adjustment, then the parties have to manage the additional complexity of changing the allowances on the agreed adjustment cycle (often weekly). For these reasons, many sellers simply refuse to offer the option of CPU because they are not confident of successfully managing the process complexity that CPU introduces to the freight payment financial transaction process. Presently, there are no commercially available and practicable solutions that overcome these barriers and limitations, leaving consumer goods manufacturers and retailers (distributors) anxious and confused. A better solution is needed. Such a solution must not only address the barriers and limitations, but also must be: 1) Trusted: The solution's process must be sensible and fair, the rules pre-determined and enforced. 2) Robust: The solution must accommodate diversity at the strategic and tactical level. 3) Integrated and Systematic: The process by which the partners request and communicate CPU allowances must be integrated (one system serves all) and system-driven, preferably on the Internet. 4) Cheap and Easy to Use: The solution's process must be simple and intuitive, extendable with little incremental cost or effort, and inexpensive with no initial investment, so that all partners, regardless of size or capabilities, can participate. BRIEF SUMMARY OF INVENTION The present invention is a method and apparatus for effectuating collaboration on customer pick-up (also called back-haul) arrangements between one or many buyers and sellers (collectively called partners) in a supply community. The present invention enables sellers to create, configure, and maintain seller-specific CPU programs comprised of at least one CPU Strategy Option and at least one CPU Allowance Unit Rate Structure Option which can be contemporaneously accessed by one or many buyers to quickly and easily identify potential CPU opportunities and then submit a CPU Proposal/Request, each based on a single CPU Strategy Option, to one or many sellers, wherein the CPU Proposal/Request is either a Collaboration Invitation, a Supply Bid, or a Request for a Lane Allowance Quotation structured to facilitate the agreement of a mutually acceptable CPU Allowance Unit Rate consistent with the selected CPU Strategy Option. In a preferred embodiment, the apparatus of the present invention includes an internet-based program tool within which the seller can specify the rules used to select the most appropriate CPU Allowance Unit Rate Structure Option for calculating the CPU Allowance for a shipment and within which the seller can utilize the Gainshare Module to pay the buyer the agreed CPU Allowance for any CPU shipments. Thus, there has been outlined the more important features of the invention in order that the detailed description that follows may be better understood and in order that the present contribution to the art may be better appreciated. There are, of course, additional features of the invention that will be described hereinafter and which will form the subject matter of the claims appended hereto. In that respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its arrangement of the components set forth in the following description and illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. It is also to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting in any respect. Those skilled in the art will appreciate that the concept upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods and systems for carrying out the several purposes of this development. It is important that the claims be regarded as including such equivalent methods and products resulting therefrom that do not depart from the spirit and scope of the present invention. The application is neither intended to define the invention of the application, which is measured by its claims, nor to limit its scope in any way. Thus, the objectives of the invention set forth below, along with the various features of novelty which characterize the invention, are noted with particularity in the claims annexed to and forming a part of this disclosure. For a better understanding of the invention, its operating advantages and the specific results obtained by its use, reference should be made to the following detailed description taken in conjunction with the accompanying drawings wherein like characters of reference designate like parts throughout the several views. The drawings are included to provide a further understanding of the invention and are incorporated herein and constitute a part of the specification. They illustrate embodiments of the invention and, together with their description, serve to explain the principles of the invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram illustrating the creation of a CPU Program wherein a Sponsoring Partner must specify or select (i) at least one CPU Strategy for inclusion in the Program, (ii) complete the CPU Program Policy and Procedure templates, and (iii) designate the Sponsor's Ship Locations that will participate in the CPU Program. FIG. 2 is a block diagram illustrating the management of the Sponsor's CPU Allowance Formula wherein the Sponsor must select at least one CPU Allowance Unit Rate Structure Options and specify the Standard Number of Units for each Option selected, and enter the required CPU Allowance Formula parameters, such as the probably does not consistently ship on that lane. Delays are then common. Fuel Adjustment Term, the Scaling Factor, the Gainshare Allocation Factor, and the Performance Factor, as desired and the Decision Rule criteria that will be used to determine which Unit Rate Structure Option is to be used if the Sponsor has selected more than one Unit Rate Structure Option. FIG. 3 is a block diagram illustrating the discovery of potential CPU opportunities by a customer (a potential CPU program participant) wherein the customer searches the Sponsors' CPU Program and Location database to identify promising opportunities, and then submits, to a selected Sponsor, a CPU Proposal/Request based on just one of the CPU Strategies included by that Sponsor in its Program. FIG. 4 is a block diagram illustrating the determination and negotiation of CPU Allowances by the Customer and the Sponsor wherein the process by which the CPU Allowance for a lane is established is determined by the type of CPU Proposal/Request submitted by the Customer to the Sponsor. FIG. 5 is a block diagram illustrating the execution of CPU shipments, and the reporting required by the Sponsor to enforce compliance on key performance standards (KPI's) and policy compliance, wherein the Sponsor can change the Performance Factor for a specific CPU Program Participant as appropriate to reward or penalize performance. FIG. 6 is a block diagram illustrating the settlement of CPU shipments wherein the CPU Allowance for a particular shipment is calculated using the CPU Allowance Units Rate option selected according to the criteria specified by the CPU Sponsor, the Partners approve the payment, and the payment is effected by one of three options, including the use of the Gainshare Module. DETAILED DESCRIPTION OF THE INVENTION A supplier that desires to offer CPU as an option to its customers first creates a CPU Program by specifying attributes that enumerate their CPU strategy, policies, procedures (including shipment specification), and structure of the CPU Allowance Formula, and by designating which of their SDC shipping locations (city, state, and zip code) are available to participate in CPU, as shown in FIG. 1. In creating a CPU Program, the supplier becomes a CPU Program Sponsor. In this creation process step, the CPU Program Sponsor must make two key decisions. First, the CPU Program Sponsor must decide which CPU strategies to offer to its customers. The invention can support any kind of strategic relationship structure. By way of example, three CPU Strategy Options that can be enabled in the invention are: 1) Collaborative Gainsharing: In this strategy option, the expected net combined cost savings for converting to CPU is shared between the two partners so that both earn a return on their efforts. This is accomplished by setting the CPU Allowance Unit Rate such that the net savings are shared equally (50/50 split default value) by the partners or in whatever Gainshare Allocation Factor ratio the partners agree to. “Open-book” cost information is disclosed to both partners for their review and acceptance. 2) For-Hire Transportation Provider: In this strategy option, the Sponsor is willing to consider and act upon supply proposals submitted by their customers to sell and provide transportation services. Such a customer typically wishes to improve the utilization of their carrier assets, be it a private fleet or a for-hire carrier, by reducing unfilled miles and is prepared to function as a for-hire carrier, preferably operate under a Standard Carrier Alpha Code (SCAC), and receive tenders and perhaps even to submit freight bills electronically. The CPU Allowance Unit Rate is based on whatever Line Haul Cost the partners negotiate in the context of a competitive marketplace, wherein the negotiation is initiated by the customer in their supply proposal. 3) CPU Customer: In this strategy option, the Sponsor is willing to provide, upon the request of a customer, an offer to buy transportation services from the customer, wherein the CPU Allowance Unit Rate offered by the Sponsor is calculated using the Sponsor's actual historical costs of delivery (Line Haul Cost and typical Accessorials). CPU Customers typically desire to improve the utilization of their carrier's assets, be it a private fleet or a for-hire carrier, by reducing unfilled miles, but are not prepared to function as a for-hire carrier; the customer does not intend to operate under a SCAC and expects to be paid by the application of a credit in the amount of the CPU Allowance on their invoice for the goods purchased from the Sponsor and delivered by the CPU carrier. Accessorials are charges for services provided by the carrier on an “as-needed basis” in addition to the line Haul. Examples are: Live Load/Unload—driver is required to be present during loading or unloading; Detention—power unit is detained beyond the agreed loading/unloading time; and, Loading/Unloading—loading or unloading assistance provided by the driver or carrier's representative. Secondly, the Sponsor then specifies the structure of the CPU Allowance Unit Rate and the values for each parameter in the CPU Allowance Formulae (see Table 1 and FIG. 2), as follows: 1) The Sponsor selects which one or more of the CPU Allowance Unit Rate Structure Options to use as the basis for their CPU Allowance Unit Rate Formula and enters the Standard No. of Units for each of the Options selected. The invention can support any rate structure, including all those presented in Table 1, provided that the transaction data for the selected units of measure is available and entered into the system. Furthermore, the supplier can select more than one CPU Allowance Unit Rate Option and then specify the decision rules that will be used to determine which one of the more than one selected CPU Allowance Unit Rate Options will be utilized to calculate the Rate and the CPU Allowance for a particular CPU shipment. By way of example, the CPU Allowance for a shipment of dense goods where the shipment size is constrained by the maximum legal shipping weight would be most appropriately determined using the Hundredweight Basis Rate Structure. Conversely, the CPU Allowance for a shipment the size of which is limited by the volume of the shipment container (i.e., low density goods) would be most appropriately determined using the Cube Basis Rate Structure. Examples of decision rules include: i) the default Option specified by Seller and Buyer for that lane, ii) the Option that maximizes the CPU Allowance, iii) the Option that minimizes the CPU Allowance, and iv) a Flat Rate Option (Purchase Order or Shipment) provided that any trailer utilization conditions such as weight, cube, or pallet count associated with that Flat Rate Option are fully satisfied. 2) The Sponsor may activate the Fuel Adjustment Term and select one from many rate structures, such as a per mile adjustment ($/mile) or a percent of cost (% of Line Haul Cost). Any structure can be supported by the invention, provided that the required information is available and entered. If the Sponsor chooses to activate the Fuel Adjustment Term, then the Sponsor must also specify the cycle (i.e., weekly) on which the Fuel Adjustment Term is to be updated. 3) If the CPU Sponsor selects the “CPU Customer” Strategy Option as one of the at least one Options, then the CPU Sponsor may choose to activate the Scaling Factor. The Scaling Factor inflates or deflates the CPU Allowance. The default value is 100%. Values less than 100% reduce the CPU Allowance, thereby compensating the CPU Sponsor for any consequential costs incurred by implementing CPU (such as higher transportation rates due to reduced volume leverage, unbalanced lanes, or increased process complexity) or simply sharing back to the CPU Sponsor a portion of the savings realized by the customer via CPU. Values higher than 100% increase the CPU Allowance, a useful mechanism if the CPU Sponsor is unable to attract sufficient transportation capacity at the required performance level. So as to comply with the Robinson-Patman Act, the intent is that a single value of Scaling Factor is selected and applied to all customers uniformity. 4) The Sponsor may also choose to activate the Performance Factor, which serves to increase or decrease the CPU Allowance in accordance with the CPU Sponsor's Performance Factor Values Table and the CPU carrier's actual performance. The default value is 100%. Values less than 100% penalize the CPU customer for poor performance, while values greater than 100% reward the CPU customer for excellent performance. Accordingly, the Performance Factor is customer specific, based on quality key performance indicators, and reviewed and adjusted, as appropriate, on a specified cycle by the Sponsor. 5) The CPU Sponsor enters the Gainshare Allocation Factor if the Sponsor selected the Collaborative Gainsharing as one of the CPU Strategy Options. The default value is 100%. A Factor of 0% allocates none of the net combined savings to the customer. Conversely, a Factor of 100% allocates all of the savings to the customer. Referring now to FIGS. 3 and 4 (Opportunity Discovery and Negotiation), a customer that is interested in discovering and evaluating CPU opportunities with their suppliers can at anytime query the CPU Programs and Locations Databanks to identify suppliers that offer CPU programs and have Ship Locations that meet the customer's search criteria. Upon identifying promising sponsors and locations, the customer can drill into the Appointment Making Module to access historical data for shipments from that Sponsor's DC Location to their corresponding receiving DC Location to obtain shipment volume, volatility, and trailer utilization (average weight, pallet count, or cube). The evaluation of these highest-potential lanes is initiated when the customer submits a CPU Proposal/Request, selected from the following three Options, to the CPU Program Sponsor, as follows. The request is only submitted if the customer has accepted the Sponsor's CPU Policy and Procedure Agreement. 1) An Invitation to Collaborate in which the customer submits the information is included as a part of FIG. 4. The Sponsor responds to the invitation by submitting their current actual cost-of-delivery structure (comprised of the line haul, fuel adjustment, and accessorials, at both origin and destination, as relevant), any consequential costs that the Sponsor can reasonably expect to incur if CPU were implemented, the maximum CPU Allowance Unit Rate Maximum Limit that the Sponsor would accept, and accepts or overwrites the Standard Number of Units proposed by the customer. The CPU Allowance Unit Rate is then calculated using the Sponsor's Gainshare Allocation Factor. If the calculated CPU Allowance Unit Rate is greater than the customer's Minimum limit and less than the Sponsor's Maximum Limit, then both partners can view the CPU Allowance and all the cost information (but not the acceptance limits). If the disclosed cost information is acceptable to both partners, then the partners can each accept the CPU Allowance Unit Rate and the Standard Number of Units, and then plan and execute the transition to CPU. 2) A Supply Bid in which the customer submits the information presented is also included as a part of FIG. 4. The Sponsor is free to accept or reject the bid, or submit a counter-proposal to the customer. Standing accessorials (i.e., accessorials that will be incurred on every CPU shipment for a specific lane) can be included in the CPU Allowance Unit Rate. An accessorial schedule is also agreed for unplanned accessorials, if necessary. Note that no underlying cost-structure information is disclosed. The CPU Allowance Unit Rate for each CPU lane is determined by entering the negotiated Line Haul Cost, Fuel Adjustment Term, agreed standing accessorials, and the Standard No. of Units into the Sponsor's CUP Allowance Unit rate Formula, with the Gainshare Share Factor and the Scaling Factor both set at this default value of 100%. 3) A Request for a CPU Allowance Quotation in which the customer submits the information is also included as a part of FIG. 4. The Sponsor is then required to submit a CPU Allowance Unit Rate for each requested lane to the customer, which is calculated using the CPU Allowance Unit Rate Formula and lane-specific information (average line haul rate, historical accessorial cost at the origin and destination, and historical performance) entered by the Sponsor. If the CPU Allowance quoted by the Sponsor is greater than the customer's CPU Allowance Unit Rate Minimum Limit, then the Allowance is automatically accepted by both partners. Otherwise, the quoted CPU Allowance is automatically rejected. The customer can, if they wish, submit another request with a lower minimum CPU Allowance Unit Rate Minimum limit. In all three options above, the historical data for shipments on the subject lane—shipment volume, volatility, and trailer utilization (average weight, pallet count, or cube), as available—are systematically populated into the CPU Proposal/Request document. In any of these three options above, the customer can simultaneously submit a CPU Proposal/Request to more than one Sponsor with the intention of consolidating more than one order on a single shipment by picking up less then full truckload orders at more than one location. The customer would thereby be combining at least two partial loads into a more full truckload shipment. The customer would be accountable for planning the shipments so that the multiple pick-ups do fit in the one trailer and for synchronizing requested pick-up dates and times so that the shipment is feasible. Having successfully concluded the discovery and negotiation process step by entering into a definitive agreement with a CPU Program Sponsor, the customer becomes a CPU Customer. The details of the agreement are captured in CPU Lanes Database including the CPU Customer, CPU Program Sponsor, lane Origin Location(s) and Destination Location pair, historical volume, CPU carrier volume commitment, CPU Allowance Unit Rate Option, Standard Number of Units, CPU Allowance Unit Rate value, standing accessorials (if any), Gainshare Allocation Factor (if any), and Performance Factor (default=100%). CPU Customers and Sponsors may query their information for any of their partners at any time. They may also download data extracts to facilitate the entry of the necessary data into their legacy transaction system(s). The partners then plan and execute the transition from delivered to CPU. The partners are required to use the Appointment Making method and system disclosed in companion patent application Ser. No. 10/775,680. This ensures that the data required by the CPU Allowance Formula calculations is available. The CPU Customer and Sponsor generate and monitor Performance Reports for the Ship Locations and for the CPU Carrier, such as On-Time Pick-Up, On-Time Delivery, and On-Time Unloading. The KPI data is used to update the Performance Factor in the CPU Allowance Formula, if activated, according to the Performance Factor Values Table. In addition, the Sponsor can monitor the CPU customer's compliance to any policy requirements in the Sponsor's Program. For example, the Sponsor can monitor the destination location records for each shipment to identify instances of diversion. Or, the Sponsor can compare the identification number of the power unit used to pick-up the CPU shipment to the identification number of the power unit that delivered that same shipment. If different, the CPU customer's carrier made a power transfer (relay shipment). The Sponsor can then discuss the findings with the CPU customer to determine if the Sponsor's CPU Policy was violated and make changes to the Performance Factor for that CPU customer, as appropriate to reward excellent performance or penalize poor performance. The payment of the CPU Allowance can be effected by any of several business processes. The CPU Sponsor can apply an “off-invoice” line item credit to the CPU Customer's invoice in the amount of the CPU Allowance. This is effective, unless the goods on a single shipment are invoiced using multiple invoice documents, in which case the CPU Allowance credit must be allocated across the multiple invoice documents. Alternately, the CPU customer can submit a freight bill in the amount of the CPU Allowance to the CPU Sponsor for payment. This also is effective, but may not be feasible for many customers. Finally, the Gainshare process disclosed in the Gainshare Module referred to previously can be used effectively to settle the charge for the CPU shipment. The Gainshare process determines the net CPU credit due the CPU Customer by aggregating the CPU Allowance payable for each CPU shipment. Invoices are then issued to the Sponsor and payments are made to the Customer. As shown in FIG. 6, any CPU Allowance Unit Rate Structure Option included by the CPU Sponsor and CPU customer on a particular lane can be used for any shipment on that lane, as selected by the decision rules specified by the Sponsor applied to the shipment attribute values (weight, cube, and pallet count) entered in the appointment making process. A CPU Allowance Unit Rate of one (default) Unit Of Measure (UOM) type can be easily converted to the equivalent CPU Allowance Unit Rate of another UOM type by multiplying the Rate by the ratio of the Standard Number of Units for the default UOM divided by the Standard Number of Units for the other UOM. Furthermore, the Line Haul Cost component of the CPU Allowance Unit Rate Formula is automatically updated for changes in the Fuel Adjustment Term on the cycle selected by the Sponsor. The partners can choose to manually review each transaction (payment of or credit for CPU shipments), or activate the auto-approve feature. The method disclosed herein, and especially the use of the CPU Allowance Formulae presented in Table 1, is better understood by way of some examples, informational Tables 2 and 3 for which are as follows. TABLE 1 CPU Allowance Formulae and Unit Rate Structure Options CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ⁢ ⁢ ( $ / UOM ) = ( Gainshare ⁢ ⁢ Allocation ⁢ ⁢ Factor ) × { ( Scaling ⁢ ⁢ Factor ) × [ ( Line ⁢ ⁢ Haul ⁢ ⁢ Cost ) + ( Fuel ⁢ ⁢ Adjustment ⁢ ⁢ Term ) ] + Accessorials } ( Standard ⁢ ⁢ No . ⁢ of ⁢ ⁢ Units ) CPU ⁢ ⁢ Allowance ⁢ ⁢ ( $ ) = ( Performance ) × [ ( CPU ⁢ ⁢ Allowance ⁢ ⁢ Unit ⁢ ⁢ Rate ) × ( No . ⁢ of ⁢ ⁢ Units ⁢ ⁢ on ⁢ ⁢ Shipment ) ] Attribute Options Customer View Supplier View “CPU Allowance Hundredweight Basis ($/cwt) Acceptable for heavy goods that Incentivizes customer to maximize Unit Rate” Unit of Measure (UOM) = weigh out, should be based on as shipment weight, more complex as rate Structure hundred lbs shipped weight must be extended by No. of Units on Options Std No. of Units = 450 ct Shipment to calculate CPU Allowance (45,000 lbs) (with examples Cube Basis ($/cubic feet) Preferred for light-weight goods Incentivizes customer to maximize of values for UOM = cubic feed that cube out, should be based on shipment cube, more complex as rate “Standard No. of Standard No. of Units = shipped volume must be extended by No. of Units on Units” for 53′ 3830 cubic feed Shipment to calculate CPU Allowance trailers) Pallet Basis ($/pallet count) Preferred for light goods that cannot Incentivizes customer to maximize UOM = pallets be stacked, should be based on shipment pallet count, more complex as Standard No. of Units = shipped pallet count rate must be extended by No. of Units 24 pallet spots on Shipment to calculate CPU Allowance Invoice Value Basis Easiest, no product understanding Not aligned with actual costs, UOM = thousand dollars required, but not aligned with actual ineffective if load value vary Standard No. of Units = 50 k$ costs significantly Flat rate per PO Difficult if PO's must be combined Requires enforcement of minimum UOM = PO count to achieve threshold criteria weight, cube, or pallet Standard No. of Units = 1 count requirement [Optional: Minimum weight, cube, or pallet count requirement] Flat rate per Shipment Many customer systems are based Requires enforcement of minimum UOM = Shipment Container on PO (not on shipment), assumes weight, cube, or pallet count Standard No. of Units = 1 risk of supplier cuts requirement, may constitute [Optional: Minimum weight, disclosure of confidential rate cube, or pallet count information requirement] Fuel Adjustment None Causes cyclical changes in Simplest option, cycles neutralize Term variances, would request right to in longer-term deduct the fuel adjustment Cts/mile adjustment above/below the complex (requires trip mileage), complex (requires trip mileage), prefer neutral point prefer favorable adjustment only symmetrical adjustment Adjustment = (adjustment cts/ (no adjustment when below neutral mile) × (trip miles) point) % of allowance adjustment Preferred option, prefer favorable Prefer symmetrical adjustment above/below the neutral point adjustment only (no adjustment Adjustment = (adjustment %) × when below neutral point) (Line Haul Cost) Aceessorials None Acceptable for drop shipments Simple, penalizes inefficient no accessorial is paid) practices (as Loading and unloading accessorials, Preferred for live loads, complex Rewards inefficient customers, complex such as typical detention, and unless simplified to one standard unless use suppliers standard accessorial driver unloading, counting, and accessorial schedule. schedule sort and segregation Performance Factor that reduces Cpu Allowance if Understood, but probably viewed Complex, difficult to enforce Factor performance is significantly as low risk due to enforcement below average. difficulty Default Value = 100% Gainshare For Collaborative Gainshare Strategy Allocation ONLY. Factor Factor that allocates the net combined cost savings between the two parties. Default Value = 100% GAF = 0% allocates NONE of the net savings to the customer GAF = 100% allocates ALL of the savings to the customer. Scaling Factor For CPU Customer Strategy ONLY. Understands reason for term, but A useful tool, creates flexibility Factor that increases or decreases does introduce complexity. the CPU Allowance as specified by the Sponsor. Default Value = 100% SF < 100% compensates supplier for consequential costs incurred by supplier SF > 100% helps a supplier with insufficient capacity to attract additional CPU capacity. TABLE 2 Examples Example 1 Example 2 Example 3 Example 4 Example 5 Unit Rate Option Hundred wgt Cube Basis (cubic Pallet Basis Invoice Value Flat rate per (Units Of Measure) Basis (cwt) feet) (pallet count) Basis (thousand Shipment $, or k$) (shipment count) Gainshare 100% (Default 100% (Default 100% (Default 100% (Default 100% (Default Allocation Factor value) value) value) value) value) Scaling Factor 100% (Default 100% (Default 100% (Default 100% (Default 100% (Default value) value) value) value) value) Line Haul Cost $1000 $1000 $1000 $1000 $1000 Fuel Adjustment $0 $0 $0 $0 $0 Term Accessorials $0 $0 $0 $0 $0 Standard No. of 350 cwt (35,000 lbs) 1915 cubic feet 24 pallet spots $50 k$ 1 shipment Units (single stacked) CPU Allowance $2.857 per cwt $0.479 per $41.67 per $20 per k$ $1000 per Unit Rate cubic foot pallet shipment Actual No. of Units 370 cwt 1755 cubic feet 22 pallets 40 k$ 1 shipment on Shipment Performance 100% 100% 100% 100% 100% Factor CPU Allowance $1057 $840 $917 $800 $1000 for actual shipment TABLE 3 Additional Examples Example 6 Example 7 Example 8 Example 9 Example 10 Unit Rate Option Hundredwgt Basis Cube Basis (cubic Pallet Spots Invoice Value Flat rate per (Units Of Measure) (cwt) feet) Basis (pallet Basis (thousand Shipment spot count) $, or k$) (shipment count) Gainshare 100% (Default 100% (Default 100% (Default 100% (Default 100% (Default Allocation Factor value) value) value) value) value) Scaling Factor 70% 70% 70% 70% 70% Line Haul Cost $1000 $1000 $1000 $1000 $1000 Fuel Adjustment 105% 105% 105% 105% 105% Term Accessorials $50 $50 $50 $50 $50 Standard No. of 350 cwt (35,000 lbs) 1915 cubic feet 24 pallets spots $50 k$ 1 shipment Units (single stacked) CPU Allowance $2.243 per cwt $0.375 per $32.71 per $15.70 per k$ $785 per Unit Rate cubic foot pallet spot shipment Actual No. of Units 300 cwt 3830 cubic feet 24 pallet spots 80 k$ 1 shipment on Shipment Performance 110% 110% 110% 110% 110% Factor CPU Allowance $740 $1581 $863 $1381 $863 for actual shipment Examples 1 through 5 (Tables 1 and 2): In these examples, a CPU Sponsor and its Customer have agreed an Allowance of $1000 for a Lane using the “CPU Allowance” Strategy option with all other parameters set at the defaults values of 100% or $0. The Partners selected the five CPU Allowance Unit Rate Options shown, each with its specified Standard No. of Units, resulting in the five CPU Allowance Unit Rates shown. An actual CPU Shipment, having the actual shipment attributes shown (clearly dense, less expensive goods that cannot be double stacked), is then executed. The CPU Allowance for this actual CPU Shipment ranges from a low of $840 (cube basis) to a high of $1057 (hundredweight basis). If the CPU Sponsor had selected the Unit Rate Option Decision Rule of “choose Option that maximizes the Allowance”, the Customer would be paid $1057 for the shipment. Examples 6 through 10 (Tables 1 and 3): In these examples, the scenario is the same as in Examples 1 though 5, except that the CPU Sponsor has set the Scaling Factor at 70%, has historically paid $50 per shipment for accessorials, and fuel is now more expensive than the neutral point (yielding a Fuel Adjustment Term of 105%). They then execute an actual shipment containing low density, expensive goods that can be double stacked. This maximizes cube utilization and earns the Customer a maximum CPU Allowance of $1581 for the shipment. The Customer Pick-Up Program of the present invention can be incorporated in an internet web-site application which will enable business Partners in the truckload transportation marketplace (shippers, consignees and carriers) collaboratively to: (a) create and manage CPU Programs, (b) make and confirm pick-up and delivery appointments for truckload shipments, (c) record and share key transactional data, including accessorials incurred and proof-of-delivery documents, (d) measure and improve performance on key service and cost performance indicators, and (e) create and manage incentive programs that reward business partners for meeting threshold targets on the key performance indicators. Such an internet web-site application is preferably modular in design with each module comprised of a narrow set of related capabilities and independent of the other modules (sharing only a common administration module and an underlying data base). This modular design reduces complexity, simplifies development and maintenance, and ensures reliability. The modular design also helps ensure that the application, and its capabilities are intuitive and easy to use, so as to encourage adoption and consistent use by all individuals. Users will also be provided data entry options—a template (enter data into fields), manual Excel file uploads (or paste and copy), and an automated transfer server-to-server—to ease integration with current systems, regardless of business practice or process. The structure for the modules is as follows: 1. Customer Care Module: This module welcomes visitors and invited guests to the web-site, communicates the vision and program, and then provides the information that the prospective member will want and need to make their decision to join (such as site tours, sample program and reports, press releases and articles, and customer testimonials). After completing the registration process and selecting the desired services, the member is then cared for with information (news letters, bulletin board and market updates), communication tools (buttons to e-mail the administrator, submit improvement ideas or touch a partner), and training tools (frequently asked questions, learning tutorials, and Help!). Partner administrators are also able to manage their account and archive data. 2. Master Data Entry and Management Module: Each member partner must enter and maintain its administrative data. First, the partner designates an administrator, who then configures and assigns roles to users at that partner. The administrator then creates a partner list naming those partners with whom they wish to collaborate. Each shipper and customer (consignee) must complete the ship location profile for every ship location. This profile records the information required by shippers and carriers to flawlessly plan and execute a shipment. The information is easily accessed and searched, and is maintained by the user responsible for that location. The location user configures the appointment schedule for that location in the appointment engine (for inbound and outbound shipments, as relevant). This schedule can be customized or changed to meet the needs of that location. Carriers complete a request for information survey that documents their capabilities. This information will be used by shippers to identify the carriers with the potential to offer the highest value against the shipper's needs. 3. CPU Program Creation and Management Module: This module enables a supplier to create a CPU Program via a Program Wizard. Customers can then search the database of CPU Programs to identify programs and locations that meet their CPU needs and interests. The module then structures the exchange of cost information and proposals to assist the partners to evaluate opportunities and agree on CPU Allowance terms. Data management and compliance tracking capabilities are also provided. 4. Enter and Maintain Transactions Appointments Module: This module is the data warehouse where the data that drives the performance and incentive modules is entered and managed. Here, CPU customers and their carriers request pick-up and deliver appointments by using the appointment engine and the location then confirms the appointment. Actuals for each shipment (against the planned appointments) are entered, by both the carrier and the location to ensure accuracy. Using an accessorial validation tool, the carrier and location independently indicate which accessorials were provided by the carrier while at the location. The shipper can then access or download this accessorial history to investigate discrepancies and to approve accessorials invoiced by the carrier. The carrier can scan and post proof of delivery documents for later use by the shipper to resolve deduction claims made by the customer. 5. Performance and Compliance Module: This module is a data analysis engine that generates score card reports of the performance of each participating partner as compared to the minimum required performance level for each key performance indicators. Users can also drill down through the data to determine the root cause of any key performance indicator deviations against the required performance level. Examples of key performance indicators are: (a) on-time by location (versus appointment), (b) power dwell time by ship location and, (c) trailer dwell times (turns) by drop location. This module is effective for monitoring compliance of the CPU customer to the CPU Sponsor's Program Policy and Procedure. 6. Gainshare Incentive Program Creation and Management Module: In this module, member partners can create and manage their own incentive program(s). This module is also effective for the settlement of CPU Allowance credits calculated via the selected Line Haul Rate Structure algorithm. 7. Account Management Module: In this module, the monthly financial statement for each partner is generated and posted. Receivables are invoiced and payments are issued for earned incentives. The partner administrator can review the account and approve each credit or debit to the account. From the proceeding description, it can be seen that a CPU program creation and management method and system has been provided that will meet all of the advantages of prior art programs and offer additional advantages not heretofore achievable. With respect to the foregoing invention, the optimum functional and dimensional relationship to the parts of the invention including variations in format, material, shape, form, function, and manner of operation, use and assembly are deemed readily apparent to those skilled in the art, and all equivalent relationships suggested in the drawings and described in the specification are intended to be encompassed herein. The foregoing is considered as illustrative only of the principles of the invention. Numerous modifications and changes will readily occur to those skilled in the art, and it is not desired to limit the invention to the exact operation shown and described. All suitable modifications and equivalents that fall within the scope of the appended claims are deemed within the present inventive concept.
<SOH> BACKGROUND OF THE INVENTION <EOH>(1) Field of the Invention The present invention relates to collaborative transportation efficiency programs between buyers and sellers in a supply community, and more particularly to a method and system for effectuating collaboration on customer pick-up opportunities. (2) Description of the Prior Art Business partners must collaborate to compete in today's marketplace, especially to drive growth by short-cycle innovation and to liberate the resources required to fund the growth initiatives. As buyers and sellers have increasingly focused on their core businesses and competencies, driving non-value added costs out of their supply chains has become strategic to increasing value to the buyer (and consumer) through lower prices and innovation. Many companies have restructured their supply chains—reducing assets (plant and distribution center rationalization), costs (strategic sourcing initiatives, including out-sourcing), and inventory (integrated planning systems)—to be faster, more flexible, and more efficient. Only then can the right product be introduced to the marketplace at the right time for the right cost. The most successful companies collaborate across enterprise boundaries, avoiding sub-optimization by “drawing the box” around the extended supply chain. In particular, logistics is a functional area that is “ripe for picking” with lots of low-hanging fruit, especially in the fast-moving consumer goods (FMCG) market where logistics costs are often 5 to 10% of the selling price of the goods. One opportunity is to improve the cost-efficiency of transportation (equipment and labor) by reducing empty miles between loads (“deadhead”), maximizing trailer utilization (weigh-out or cube-out the container), and minimizing non-drive time (wait time at the location and loading/unloading times, together referred to as “dwell time”). Customer pick-up (CPU) is an approach that can contribute to all three of these objectives. First, the truck making the delivery from a customer's regional distribution center (CDC) to one of that customer's stores often runs empty from the store back to the CDC. An “in-bound” shipment from the supplier's distribution center (SDC) to the CDC can be picked-up and delivered by that customer's truck for minimal incremental cost, provided that the SDC is (essentially) en route from the customer's store to CDC. The customer truck could even make several CPU pick-ups of partial loads, thereby maximizing shipment weight or cube, provided that the route from the store to the (more than one) SDC's to the CDC is economic and the required day of shipping and pick-up appointments can be synchronized. CPU can also significantly reduce non-drive time because the CPU carrier typically has privileges to drop the loaded trailer upon arrival at the destination DC and leave immediately (rather than One opportunity is to improve the cost-efficiency of transportation (equipment wait to have the trailer unloaded). Also, when there are delays, the CPU carrier usually receives preferential treatment from the CDC. There are, however, several barriers that must be overcome for the supplier and customer business partners to realize the maximum combined value from CPU activities. Strategic Alignment and Relationship Management: First, the supplier and customer must agree on a single strategy prior to engaging in a CPU relationship. Insofar as the selected strategy determines the process role of each partner, failure to do so will negatively affect the quality of the business relationship. For example, is the strategy to provide the customer with Origin Collect terms of sale, or is the strategy to improve the utilization of the customer's transportation assets? If the strategy is genuinely the latter, then the role of the customer is actually the role of a supplier of transportation services. Or, perhaps the strategy is to collaborate so as to drive non-value added costs out of the extended supply chain. If so, the partners should share the savings through a gainshare program such as that described in pending patent application Ser. No. 10/775,680 filed Feb. 11, 2004 which is incorporated herein by reference and hereinafter referred to as the Gainshare Module. Both partners are rewarded for investing the resource required to develop and implement exceptional business processes. In today's CPU activities, these topics are not even considered, much less discussed and agreed upon. It is clear that a variety of strategies are available. The partners must agree on one, and only one, approach and then apply it rigorously. Unfortunately, conflicted behavior is not uncommon. For example, in the fast moving consumer goods (FMCG) market, customers espouse collaboration (share the savings), but then expect the supplier to use a CPU formula that is (essentially) “cost-neutral” for the supplier. Discovery: The current processes available to customers for discovering attractive CPU opportunities are unworkable. It is difficult for customers to 1) determine which suppliers offer CPU programs, 2) determine which of these CPU programs have policies that would be acceptable to the customer and procedures that are feasible for the customer, 3) identify shipping locations for a candidate supplier that are logistically feasible (location, volume, and typical shipment weight or cube), and 4) agree on an allowance via the standard process of requesting a CPU allowance quotation for the shipping lanes (SDC to CDC) of interest. As a result, most customers approach CPU in a tactical manner, supported by little, if any, strategic network-wide analysis to identify the highest-value set of lanes and suppliers. A simple, expeditious discovery process would allow the simultaneous assessment of many CPU options, most likely resulting in an improved solution. Program Complexity: No two CPU Programs are alike. For many sensible reasons, programs differ significantly in policy, procedure, and the structure of the formula used by the supplier to determine the CPU allowance. In practice, differences in policy and procedure get overlooked because enforcing compliance is so difficult. Regardless, the differences in allowance formula structure alone introduce significant complexity and confusion. The biggest difference is the basis of the CPU rate structure—is the CPU allowance rate a flat rate per purchase order or shipment (usually with a weight, cube, or pallet minimum), or is the CPU allowance determined by extending an agreed “cost per unit” rate ($ per weight, cube, or pallet) by the number of units (weight, cube, or pallet) without a minimum requirement? There are many options for the CPU rate structure, and for the other cost components, and each has its pros and cons. Predictably, confusion and anxiety are common, affecting the quality of supplier/customer relationships. Furthermore, it is difficult for a supplier to offer a CPU program that has the capability to alternate between different CPU allowance rate structures, so that the most appropriate structure is utilized for each load. For example, the allowance for a load that weighs out should not be determined using a cube basis rate structure. Lacking this capability, partner dyads resign themselves to choosing just one rate structure, and accepting its limitations. Program Compliance and Performance: In CPU, the supplier cedes control for the shipment to the customer upon pick-up by the customer (or the customer's carrier) at the supplier's ship-from location, even though the supplier typically retains title until the goods are delivered. In so doing, the supplier implicitly assumes several risks, such as: 1) Diversion: The customer can, having accepted an allowance to deliver a shipment to a specific CDC, divert that shipment to another CDC. This action can affect the supplier's stock allocation planning process as the inventory records (by location) are now incorrect. There is also the possibility that the customer never intended to deliver to the agreed destination, especially if the cost of delivery to the diverted location is less than the cost of delivery to the agreed destination. Regardless, it is very difficult, if not impossible, for the supplier to verify that the shipment was delivered to the agreed location. 2) Late Delivery and Unloading: The customer's traffic manager (or dispatcher) might (knowingly or unknowingly) make decisions that compromise the on-time arrival and unloading of the CPU shipment. Pick-up delays result when the CPU carrier cannot or does not honor their volume commitment, which is most likely during shipping peaks created by promotional events. In such an event the supplier must convert the load from CPU to Delivered and scramble to secure a carrier, which may be difficult as the supplier probably does not consistently ship on that lane. Delays are then common. Shipments can also be delayed due to a “relay”, where the trailer is handed off from one power unit to another, risking a delay on the transfer. Or, upon arrival, the CDC may choose not to promptly unload the trailer. At best, such events result in partner conflict over payment term compliance, as the supplier bases the payment due date on the assumed arrival (and unload) date, while the customer typically bases the payment date on the actual (and possibly later) unloading date. At worst, these delays result in an out-of-stock situation, and the supplier loses sales. In fact, it is for this reason that buyers in the FMCG market are known to complain about the poor on-time performance on CPU shipments delivered by their customer's private fleet or for-hire CPU carrier. 3) Enforcement: Needless to say, enforcement is challenging. First, the supplier can only measure on-time pick-up. It is then impossible for the supplier to reduce a discussion of on-time delivery to a fact basis. Even if the supplier could do so, they might be reluctant to because it might risk sales, especially for a strategic collaborative buyer/seller partnership. This is a simple consequence of the fact that customer is playing two roles—customer on the buy/sell of the goods, and provider (supplier) on the buy/sell of transportation services. The supplier typically defers to the customer role, and poor compliance on the CPU Program is ignored. 4) Financial Transaction Process: The standard terms of sale in the FMCG market is “Destination Delivered”, meaning that title to the goods transfers from the seller to the buyer on receipt at the customer's receiving dock (“Destination”) and that the transportation is arranged and paid for by the supplier (“Delivered”). Insofar as suppliers are often reluctant to quote an Origin Collect selling price, the standard industry practice is that suppliers offer customers who wish to pick-up their freight an “off-invoice” line item (i.e., credit) on the invoice for the goods in an amount agreed by buyer and seller. This credit is referred to as a “CPU allowance”. Another practice, although less common, is for the customer to submit a freight bill to the supplier in the amount of the CPU allowance. Either way, the financial transaction is an exceptional business process, if not for the buyer than certainly for the seller, leading to confusion and failure. In addition, if the CPU Line Haul Cost is to be corrected for changes in fuel prices via a fuel adjustment, then the parties have to manage the additional complexity of changing the allowances on the agreed adjustment cycle (often weekly). For these reasons, many sellers simply refuse to offer the option of CPU because they are not confident of successfully managing the process complexity that CPU introduces to the freight payment financial transaction process. Presently, there are no commercially available and practicable solutions that overcome these barriers and limitations, leaving consumer goods manufacturers and retailers (distributors) anxious and confused. A better solution is needed. Such a solution must not only address the barriers and limitations, but also must be: 1) Trusted: The solution's process must be sensible and fair, the rules pre-determined and enforced. 2) Robust: The solution must accommodate diversity at the strategic and tactical level. 3) Integrated and Systematic: The process by which the partners request and communicate CPU allowances must be integrated (one system serves all) and system-driven, preferably on the Internet. 4) Cheap and Easy to Use: The solution's process must be simple and intuitive, extendable with little incremental cost or effort, and inexpensive with no initial investment, so that all partners, regardless of size or capabilities, can participate.
<SOH> BRIEF SUMMARY OF INVENTION <EOH>The present invention is a method and apparatus for effectuating collaboration on customer pick-up (also called back-haul) arrangements between one or many buyers and sellers (collectively called partners) in a supply community. The present invention enables sellers to create, configure, and maintain seller-specific CPU programs comprised of at least one CPU Strategy Option and at least one CPU Allowance Unit Rate Structure Option which can be contemporaneously accessed by one or many buyers to quickly and easily identify potential CPU opportunities and then submit a CPU Proposal/Request, each based on a single CPU Strategy Option, to one or many sellers, wherein the CPU Proposal/Request is either a Collaboration Invitation, a Supply Bid, or a Request for a Lane Allowance Quotation structured to facilitate the agreement of a mutually acceptable CPU Allowance Unit Rate consistent with the selected CPU Strategy Option. In a preferred embodiment, the apparatus of the present invention includes an internet-based program tool within which the seller can specify the rules used to select the most appropriate CPU Allowance Unit Rate Structure Option for calculating the CPU Allowance for a shipment and within which the seller can utilize the Gainshare Module to pay the buyer the agreed CPU Allowance for any CPU shipments. Thus, there has been outlined the more important features of the invention in order that the detailed description that follows may be better understood and in order that the present contribution to the art may be better appreciated. There are, of course, additional features of the invention that will be described hereinafter and which will form the subject matter of the claims appended hereto. In that respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its arrangement of the components set forth in the following description and illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. It is also to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting in any respect. Those skilled in the art will appreciate that the concept upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods and systems for carrying out the several purposes of this development. It is important that the claims be regarded as including such equivalent methods and products resulting therefrom that do not depart from the spirit and scope of the present invention. The application is neither intended to define the invention of the application, which is measured by its claims, nor to limit its scope in any way. Thus, the objectives of the invention set forth below, along with the various features of novelty which characterize the invention, are noted with particularity in the claims annexed to and forming a part of this disclosure. For a better understanding of the invention, its operating advantages and the specific results obtained by its use, reference should be made to the following detailed description taken in conjunction with the accompanying drawings wherein like characters of reference designate like parts throughout the several views. The drawings are included to provide a further understanding of the invention and are incorporated herein and constitute a part of the specification. They illustrate embodiments of the invention and, together with their description, serve to explain the principles of the invention.
20040322
20081216
20050922
63528.0
0
CAMPBELL, SHANNON S
SYSTEM AND METHOD FOR EFFECTUATING THE CREATION AND MANAGEMENT OF CUSTOMER PICK-UP/BACKHAUL PROGRAMS BETWEEN BUYERS AND SELLERS IN A SUPPLY COMMUNITY
SMALL
0
ACCEPTED
2,004
10,805,612
ACCEPTED
ELECTROMECHANICAL VALVE OPERATING CONDITIONS BY CONTROL METHOD
A system and method to control engine valve timing of an internal combustion engine. Electromechanical valves are controlled in a manner to increase fuel economy. Further, the method can adjust valve operation to regulate valve temperature.
1. A system for selecting and controlling electrically actuated valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least two regions, each region having an electrically actuated valve; and a controller to select a valve operating mode, based on an operating condition of at least an electrically actuated valve, wherein said operating mode selects at least an intake valve of said cylinder located in at least one region of said first and second region, and to operate said selected intake valve, without operating a non-selected intake valve, during at least an intake stroke of a cycle of said cylinder, and to operate said non-selected intake valve during at least an intake stroke of a subsequent cycle of said cylinder, without operating said selected intake valve. 2. The system of claim 1 wherein said cylinder head of said cylinder has four regions, each region having an electrically actuated valve. 3. The system of claim 2 wherein said cylinder has two electrically actuated exhaust valves operating in said third and fourth regions. 4. The system of claim 1 wherein said cylinder head of said cylinder has five regions, each region having an electrically actuated valve. 5. The system of claim 1 wherein said cylinder head of said cylinder has three regions, each region having an electrically actuated valve. 6. A system for selecting and controlling electrically actuated valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least two regions, each region having an electrically actuated valve; and a controller to select a valve operating mode, based on an operating condition of at least an electrically actuated valve, wherein said operating mode selects at least an exhaust valve of said cylinder located in at least one region of said first and second region, and to operate said selected exhaust valve, without operating a non-selected exhaust valve, during a cycle of said cylinder, and to operate said non-selected exhaust valve during a subsequent cycle of said cylinder, without operating said selected exhaust valve. 7. The system of claim 6 wherein said cylinder head of said cylinder has four regions, each region having an electrically actuated valve. 8. The system of claim 7 wherein said cylinder has two electrically actuated intake valves operating in said first and second regions. 9. The system of claim 6 wherein said cylinder head of said cylinder has three regions, each region having an electrically actuated valve. 10. The system of claim 6 wherein said cylinder head of said cylinder has five regions, each region having an electrically actuated valve. 11. A system for selecting and controlling electrically actuated valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least four regions, each region having an electrically actuated valve; and a controller to select a valve operating mode, based on an operating condition of at least an electrically actuated valve, wherein said operating mode selects at least an intake valve of said cylinder located in at least one region of said first and second region, and to operate said selected intake valve, without operating a non-selected intake valve, during a cycle of said cylinder, and to operate said non-selected intake valve during a subsequent cycle of said cylinder, without operating said selected intake valve, and to select at least an exhaust valve of said cylinder located in at least one region of said third and forth region, and to operate said selected exhaust valve, without operating a non-selected exhaust valve, during a cycle of said cylinder, and to operate said non-selected exhaust valve during a subsequent cycle of said cylinder, without operating said selected exhaust valve. 12. The system of claim 11 wherein said selected intake valve and said selected exhaust valve lie in regions having adjacent sides. 13. The system of claim 11 wherein said selected intake valve and said selected exhaust valve lie in regions having nonadjacent sides. 14. A method to control electrically actuated valves in an internal combustion engine, the method comprising: during engine operation, operating a first and a second electrically actuated intake valve in a cylinder of said engine, during at least an intake stroke of a cycle of said cylinder during on a first set of electrically actuated valve operating conditions; and operating said first intake valve without operating said second intake valve during at least an intake stroke of a cycle of said cylinder, and operating said second intake valve without operating said first intake valve, during at least an intake stroke of a subsequent cycle of said cylinder, during a second set of electrically actuated valve operating conditions. 15. A system for selecting and controlling electrically actuated valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least two regions, each region having an electrically actuated valve; and a controller to select a valve operating mode, based on an operating condition of at least an electrically actuated valve and an operating condition of said engine, wherein said operating mode selects at least an exhaust valve of said cylinder located in at least one region of said first and second region, and to operate said selected exhaust valve, without operating a non-selected exhaust valve, during a cycle of said cylinder, and to operate said non-selected exhaust valve during a subsequent cycle of said cylinder, without operating said selected exhaust valve. 16. The system of claim 15 wherein said cylinder head of said cylinder has four regions, each region having an electrically actuated valve. 17. The system of claim 16 wherein said cylinder has two electrically actuated exhaust valves operating in said third and fourth regions. 18. The system of claim 15 wherein said engine operating condition is a temperature of said engine. 19. The system of claim 15 wherein said engine operating conditions is a temperature of a catalyst. 20. The system of claim 15 wherein said engine operating condition is an amount of oxidant storage capacity of a catalyst. 21. The system of claim 15 wherein said engine operating condition is an amount of oxidants stored in a catalyst. 22. A computer readable storage medium having stored data representing instructions executable by a computer to control an internal combustion engine of a vehicle, said storage medium comprising: instructions to select a valve operating mode, based on an operating condition of at least an electrically actuated valve, wherein said operating mode selects at least an intake valve of said cylinder located in at least one region of said first and second region, and to operate said selected intake valve, without operating a non-selected intake valve, during at least an intake stroke of a cycle of said cylinder, and to operate said non-selected intake valve during at least an intake stroke of a subsequent cycle of said cylinder, without operating said selected intake valve.
FIELD The present description relates to a method for controlling valves in an internal combustion engine and more particularly to a method for controlling electromechanically actuated valves to reduce valve degradation. BACKGROUND One method to control intake and exhaust valve operation during engine operation is described in U.S. Pat. No. 6,374,813. This method presents a means to control electromagnetically actuated valves to promote EGR control. The approach selects different valve modes and patterns to regulate internal EGR, i.e., EGR flow through a cylinder as opposed to EGR routed to the intake manifold. Valves are operated independently and control is based on operating conditions of the engine. Further, the disclosure also describes several valve configurations that may be operated in one or more operational modes to promote cylinder air charge swirl. The above-mentioned method can also have a disadvantage. Specifically, the approach may degrade engine breathing for engines that have different length intake runners. For example, some engines have two intake runners per cylinder, a long runner and a short runner; where the unequal length intake runners are selectively used to improve engine performance at different engine operating points. However, since the before-mentioned approach simply selects valves based on a desired amount of EGR without regard to the intake manifold geometry, engine breathing may degrade. Further, if the valves are operated as suggested, it may be possible for early valve degradation to occur due to high temperature valve operation, since valve selection is based simply on a desired amount of EGR. The inventors herein have recognized the above-mentioned disadvantages and have developed a method of electromechanical valve control that offers substantial improvements. SUMMARY One embodiment of the present description includes a system for selecting and controlling electromechanical valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least two regions, each region having an electromechanical valve; and a controller to select a valve operating mode, based on an operating condition of at least an electro-magnetically actuated valve, wherein said operating mode selects at least an intake valve of said cylinder located in at least one region of said first and second region, and to operate said selected intake valve, without operating a non-selected intake valve, during a cycle of said cylinder, and to operate said non-selected intake valve during a subsequent cycle of said cylinder, without operating said selected intake valve. This method can be used to reduce the above-mentioned limitations of the prior art approaches. Thus, when the mode selection is based on an operating condition of the valve, it may be possible to achieve certain advantages. For example, the engine and electromechanical valves experience different operational conditions. When a cold engine is started, the engine and electromechanical valves are at nearly the same temperature. However, as the valve is operated its temperature begins to diverge from the engine temperature. This can occur because electrical energy is delivered to the valve while chemical energy is delivered to the engine via the combustion chamber. Even though the electromechanical valve is attached to the engine, there may not be a one to one relationship between the electromechanical valve temperature and the engine temperature. In addition, the temperature rate of change can be different between the electromechanical valve and the engine. Therefore, when controlling electromechanical valves in an internal combustion engine, engine operating conditions and the valve operating conditions can be used to control the valves and improve operation of the engine, if desired. Alternatively, only the valve condition can be used, if desired. In another example, the system comprises: a cylinder head of said cylinder having at least two regions, each region having an electromechanical valve; and a controller to select a valve operating mode, based on an operating condition of at least an electro-magnetically actuated valve, wherein said operating mode selects at least an exhaust valve of said cylinder located in at least one region of said first and second region, and to operate said selected exhaust valve, without operating a non-selected exhaust valve, during a cycle of said cylinder, and to operate said non-selected exhaust valve during a subsequent cycle of said cylinder, without operating said selected exhaust valve. By selecting modes based on an operating condition of an electro-magnetically actuated valve, valve degradation can be reduced by, for example, alternating intake or exhaust valve operation. As an example, engine operation at elevated speed and load conditions can increase exhaust valve temperature. As engine speed increases the time between combustion events in a cylinder decreases. Additionally, as the load in a cylinder increases, the temperature in the cylinder also increases. Therefore, at elevated engine speed and load conditions, combustion transfers additional heat to an exhaust valve and less time is available to transfer heat, from the valve to the cylinder head. By alternating exhaust valves, in one example every other cylinder cycle, in a multi-valve cylinder, the inventors herein have reduced valve degradation by allowing additional time for heat to transfer from a valve to the cylinder head. The above advantages and other advantages and features of the present description will be readily apparent from the following detailed description of the embodiments when taken alone or in connection with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS The advantages described herein will be more fully understood by reading an example of an embodiment, referred to herein as the Detailed Description, when taken alone or with reference to the drawings, wherein: FIG. 1 is a schematic diagram of an engine; FIG. 2 is a flowchart of a method to determine engine torque and delivery; FIG. 3 is a plot of actual PMEP vs. predicted PMEP for active cylinders, determined from a polynomial with regressed coefficients; FIG. 4 is a plot of actual FMEP vs. predicted FMEP for active cylinders, determined from a polynomial with regressed coefficients; FIG. 5 is a plot of actual PMEP vs. predicted PMEP for inactive cylinders, determined from a polynomial with regressed coefficients; FIG. 6 is a plot of actual FMEP vs. predicted FMEP for inactive cylinders, determined from a polynomial with regressed coefficients; FIG. 7 is a plot of actual spark torque reduction vs. predicted spark torque reduction determined from a polynomial with regressed coefficients; FIG. 8 is a plot of actual fuel mass vs. predicted fuel mass determined from a polynomial with regressed coefficients; FIG. 9 is a plot of actual cylinder air charge volume vs. predicted cylinder air charge volume determined from a polynomial with regressed coefficients; FIG. 10 is a flowchart to determine the number of active cylinders and valves in an engine with electromechanically actuated valves; FIG. 11 is an example of an initialized cylinder and valve mode matrix; FIG. 12 is an-example of a mode matrix that has been through a cylinder and valve mode selection method; FIG. 13 is a diagram that shows engine warm-up states for cylinder and valve mode selection; FIG. 14 is a flowchart of a routine to determine cylinder and valve modes based on the state of a catalyst; FIG. 15 is a flowchart of a routine to determine cylinder and valve modes based on operational limits; FIG. 16 is a flowchart of a routine to determine cylinder and valve modes based on noise, vibration, and harshness (NVH); FIG. 17 is a flowchart of a routine to determine cylinder and valve modes based on desired engine brake torque; FIG. 18 is a flowchart of a routine to select cylinder and valve modes; FIG. 19 is a valve timing sequence for a cylinder operating in an alternating intake valve mode; FIG. 20 is a valve timing sequence for a cylinder operating with phased intake valves; FIGS. 21 and 21a are mechanical/electromechanical valve and cylinder grouped configuration; FIG. 22 is another mechanical/electromechanical valve and cylinder grouped configuration; FIG. 23 is grouped cylinder and valve control configuration of selected valves; FIG. 24 is another cylinder and valve control configuration of selected valves; FIG. 25 is another cylinder and valve control configuration of selected valves; FIG. 26 is another cylinder and valve control configuration of selected valves; FIG. 27 is another cylinder and valve control configuration of selected valves; FIG. 28 is a plot of a speed dependent cylinder and valve mode transition; FIG. 29 is a plot that shows torque capacity of a V8 engine operating in a variety of cylinder modes; FIG. 30 is a plot of torque dependent cylinder and valve mode changes; FIG. 31 is a plot of independent speed and torque based cylinder and valve mode changes; FIG. 32 is a flowchart of a routine of a method to control electromechanical valves during a start of an engine; FIG. 33a is a plot that shows representative intake valve timing at a relatively constant desired torque; FIG. 33b is a plot that shows representative exhaust valve timing at a relatively constant desired torque; FIG. 34a is a plot that shows representative intake valve timing for the first of two different engine starts; FIG. 34b is a plot that shows representative intake valve timing for the second of two different engine starts; FIG. 35a is a plot of representative intake valve timing during a start at sea level by the method of FIG. 32; FIG. 35b is a plot of representative intake valve timing during starts at altitude by the method of FIG. 32; FIG. 36 is a representative plot of intake valve timing, desired engine torque, and engine speed during a start of an engine by the method of FIG. 32; FIG. 37 is a flowchart of a method to control valve timing after a request to stop an engine or to deactivate a cylinder; FIG. 38 is a plot of an example of a representative intake valve timing sequence during a stop of a four-cylinder engine; FIG. 39 is a flowchart of a method to restart electromechanical valves in an internal combustion engine; FIG. 40 is a plot of an example of valve trajectory regions during a valve opening and closing event; FIG. 41 is a plot of example current during several valve restart attempts; FIG. 42 is a flowchart of a method to improve individual cylinder air-fuel detection and control; FIG. 43 is a plot of example simulated exhaust mass vs. crankshaft angle produced by the method of FIG. 42; FIG. 44 is a plot of example alternating intake/dual exhaust valve events over a crankshaft angle interval; FIG. 45 is a plot of example alternating intake/alternating exhaust valve events over a crankshaft angle interval; FIG. 46 is a plot of example single intake/alternating exhaust valve events over a crankshaft angle interval; FIG. 47 is a plot of example alternating intake/single exhaust valve events over a crankshaft angle interval; FIG. 48 is a plot of example dual intake/alternating exhaust valve events over a crankshaft angle interval; FIG. 49a is a plot of example intake valve events over a crankshaft angle interval during start; FIG. 49b is a plot of example exhaust valve events over a crankshaft angle interval during start; FIG. 50a is a plot of example intake valve events over a crankshaft angle interval during start; FIG. 50b is a plot of example exhaust valve events over a crankshaft angle interval during start; FIG. 51a is a plot of example intake valve events over a crankshaft angle interval during start; FIG. 51b is a plot of example exhaust valve events over a crankshaft angle interval during start; FIG. 52a is a plot of example intake valve events over a crankshaft angle interval during start; FIG. 52b is a plot of example exhaust valve events over a crankshaft angle interval during start; FIG. 53a is a plot of example intake valve events over a crankshaft angle interval during start; FIG. 53b is a plot of example exhaust valve events over a crankshaft angle interval during start; FIG. 54 is a plot showing piston trajectories and example decision boundaries for determining the stroke of an engine during a start; and FIG. 55 is a flowchart of a method to adjust fuel based on selected cylinder and/or valve mode. DETAILED DESCRIPTION Referring to FIG. 1, internal combustion engine 10, comprising a plurality of cylinders, one cylinder of which is shown in FIG. 1, is controlled by electronic engine controller 12. Engine 10 includes combustion chamber 30 and cylinder walls 32 with piston 36 positioned therein and connected to crankshaft 40. Combustion chamber 30 is shown communicating with intake manifold 44 and exhaust manifold 48 via respective intake valve 52 an exhaust valve 54. Each intake and exhaust valve is operated by an electromechanically controlled valve coil and armature assembly 53. Armature temperature is determined by temperature sensor 51. Valve position is determined by position sensor 50. In an alternative example, each of valves actuators for valves 52 and 54 has a position sensor and a temperature sensor. Intake manifold 44 is also shown having fuel injector 66 coupled thereto for delivering liquid fuel in proportion to the pulse width of signal FPW from controller 12. Fuel is delivered to fuel injector 66 by fuel system (not shown) including a fuel tank, fuel pump, and fuel rail (not shown). Alternatively, the engine may be configured such that the fuel is injected directly into the engine cylinder, which is known to those skilled in the art as direct injection. In addition, intake manifold 44 is shown communicating with optional electronic throttle 125. Distributorless ignition system 88 provides ignition spark to combustion chamber 30 via spark plug 92 in response to controller 12. Universal Exhaust Gas Oxygen (UEGO) sensor 76 is shown coupled to exhaust manifold 48 upstream of catalytic converter 70. Alternatively, a two-state exhaust gas oxygen sensor may be substituted for UEGO sensor 76. Two-state exhaust gas oxygen sensor 98 is shown coupled to exhaust manifold 48 downstream of catalytic converter 70. Alternatively, sensor 98 can also be a UEGO sensor. Catalytic converter temperature is measured by temperature sensor 77, and/or estimated based on operating conditions such as engine speed, load, air temperature, engine temperature, and/or airflow, or combinations thereof. Converter 70 can include multiple catalyst bricks, in one example. In another example, multiple emission control devices, each with multiple bricks, can be used. Converter 70 can be a three-way type catalyst in one example. Controller 12 is shown in FIG. 1 as a conventional microcomputer including: microprocessor unit 102, input/output ports 104, and read-only memory 106, random access memory 108, 110 keep alive memory, and a conventional data bus. Controller 12 is shown receiving various signals from sensors coupled to engine 10, in addition to those signals previously discussed, including: engine coolant temperature (ECT) from temperature sensor 112 coupled to cooling sleeve 114; a position sensor 119 coupled to a accelerator pedal; a measurement of engine manifold pressure (MAP) from pressure sensor 122 coupled to intake manifold 44; a measurement (ACT) of engine air amount temperature or manifold temperature from temperature sensor 117; and a engine position sensor from a Hall effect sensor 118 sensing crankshaft 40 position. In a preferred aspect of the present description, engine position sensor 118 produces a predetermined number of equally spaced pulses every revolution of the crankshaft from which engine speed (RPM) can be determined. In an alternative embodiment, a direct injection type engine can be used where injector 66 is positioned in combustion chamber 30, either in the cylinder head similar to spark plug 92, or on the side of the combustion chamber. Referring to FIG. 2, a high level flowchart of a routine that shows engine torque calculations from desired engine brake torque through engine output torque is shown. As illustrated below, determination of engine torque loss for an engine capable of cylinder deactivation and multi-stroke operation can be improved by determining cylinder losses in both active and inactive cylinders. Typically, in conventional four-stroke engines, engine indicated torque is calculated from engine friction losses, engine pumping losses, and engine brake torque. However, when a cylinder is deactivated, friction and pumping losses of the cylinder change. Therefore, a better estimation of total torque losses may be possible by using both active an inactive friction and pumping losses, as described by FIG. 2. Furthermore, by controlling torque in individual cylinders, transitions from a number of active cylinders to another number of active cylinders may be improved by the method of FIG. 2. For example, controlling torque in individual cylinders may allow individual cylinder torque amounts to smooth the transition from an eight-cylinder mode to a four-cylinder mode. Torque in individual cylinders may be ramped, stepped, and/or follow a predetermined trajectory during a cylinder and/or valve mode change to reduce torque disturbances. In contrast, controlling torque based on the number of active cylinders may result in a torque disturbance as the number of active cylinders changes from one engine revolution to the next. In addition, an engine operating at altitude may have different losses due to the operating environment. Namely, the pressure differential across the combustion chamber may be altered, when compared to sea level operation, so that the pumping efficiency may affect the engine torque production. By controlling and estimating engine torque in individual cylinders (including inactive cylinders), errors introduced by a change in altitude and/or air temperature may be reduced using the method of FIG. 2. Also, cylinder stroke changes in multi-stroke operation, e.g., twelve-stroke to four-stroke, can be improved. The method of FIG. 2 may allow four-stroke operation to be resumed by simply eliminating any benign pumping strokes and resuming a predetermined firing order after a combustion event in the multi-stroke cylinder, for example, since both inactive and active cylinder torque losses are considered. In contrast, other methods may require cylinders to complete the current cylinder cycle. In step 210, desired engine brake torque is determined. In one example, driver demand engine brake torque is input into engine controller via position sensor 119, FIG. 1, and can be further adjusted based on vehicle speed, engine speed, and/or gear ratio, for example. The signal can represent a fraction of the available engine torque at the current engine speed. For example, at an engine speed where an engine has a capacity of 300 N-M and a driver input is fifty percent of sensor range, the desired engine brake torque can be interpreted as 150 N-M. Alternatively, the driver demand can be determined from a cruise control system or a traction control system for reducing wheel slip. After desired engine brake torque is determined, the routine proceeds to step 212. In step 212, engine cylinder and valve modes are selected. In one example, an appropriate cylinder and valve mode is selected based on the desired engine brake torque, and other engine operating conditions and vehicle operating conditions. A detailed description of an example mode selection process is discussed in the description of FIG. 10. The cylinder mode can indicate cylinder operation and/or valve configuration. For example, cylinder modes may include, but are not limited to, V8, V6, V4, V2, I6, I5, I4, I3, I2, four-stroke, six-stroke, and twelve-stroke. Valve modes indicate valve operation and/or configuration in an active or inactive cylinder. For example, valve modes may include, but are not limited to, dual intake/dual exhaust (operating two intake valves and two exhaust valves during a combustion cycle of the engine, whether it is 4, 6, or 12 stroke), dual intake/single exhaust (operating two intake valves and one exhaust valve during a combustion cycle of the engine, whether it is 4, 6, or 12 stroke), single intake/dual exhaust (operating a single intake valve and two exhaust valves during a combustion cycle of the engine, whether it is 4, 6, or 12 stroke), single intake/single exhaust (operating a single intake valve and a single exhaust valve during a combustion cycle of the engine, whether it is 4, 6, or 12 stroke), alternating intake/dual exhaust (operating two intake valves during alternate cycles of a cylinder while operating two exhaust valves, whether it is 4, 6, or 12 stroke), dual intake/alternating exhaust (operating two intake valves while operating two exhaust valves during alternate cycles of a cylinder, whether it is 4, 6, or 12 stroke), alternating intake/alternating exhaust (operating two intake valves during alternate cycles of a cylinder while operating two exhaust valves during alternate cycles of an cylinder, whether it is 4, 6, or 12 stroke), single intake/alternating exhaust (operating as single intake valve while operating two exhaust valves during alternate cycles of an cylinder, whether it is 4, 6, or 12 stroke), and alternating intake/single exhaust (operating two intake valves during alternate cycles of a cylinder while operating a single exhaust valve, whether it is 4, 6, or 12 stroke). Some example unique valve and cylinder modes are detailed in the description of FIGS. 21-27. Further, the alternative valve modes are described in more detail with regard to FIGS. 44-48. As described herein, the engine can be controlled so that any (or all) or groups of the cylinders are operated between variations of the above modes. After the cylinder and valve modes have been selected, the routine proceeds to step 214. In step 214, engine accessory losses are determined. Typical accessory losses include, but are not limited to, air conditioning, alternator/generator, power steering pumps, water pump, and/or vacuum pumps and combinations thereof. A total accessory loss amount can be determined by collectively summing individual accessory loss amounts that are stored in tables or functions and are indexed by one or more variables. For example, power steering pump losses can be determined from a table that is indexed by ambient air temperature and steering angle input. Furthermore, torque loss due to power conversion and electrical valve operation can be determined by indexing an array containing torque losses that result from electromechanical valve operation based on engine speed, load and valve mode. The routine then continues on to step 216. In step 216, engine friction and pumping losses are determined. In one example, the routine determines individual cylinder losses based on the number of active and inactive cylinders, by looking up stored polynomial coefficients that are based on engine operating conditions. Coefficients are determined by analyzing cylinder pressure-volume. (P-V) diagrams collected at various engine speed/load conditions. Active and inactive cylinder pressure data are collected, and then data are regressed to determine polynomial coefficients for active and inactive cylinders. FIGS. 3 and 4 show example regression fit data for cylinder pumping and friction losses of an active cylinder. The data are based on the following regression equations A and B: PMEPAct=C0+C1·VIVO+C2·VEVC+C3·VIVC-IVO+C4·N Equation A: Where PMEPAct is pumping mean effective pressure, C0-C4 are stored, predetermined, polynomial coefficients, VIVO is cylinder volume at intake valve opening position, VEVC is cylinder volume at exhaust valve closing position, VIVC is cylinder volume at intake valve closing position, VIVO is cylinder intake valve opening position, and N is engine speed. Valve timing locations IVO and IVC are based on the last set of determined valve timings. FMEPAct=C0+C1·N+C2·N2 Equation B: Where FMEPAct is friction mean effective pressure, C0-C2 stored, predetermined polynomial coefficients, and N is engine speed. FIGS. 5 and 6 show example regression fit data for cylinder pumping and friction losses of a deactivated cylinder. Data are based on the following regression equations C and D: PMEPDeact=C0=C1·N+C2·N2 Equation C: Where PMEPDeact is friction mean effective pressure, C0-C2 are stored, predetermined polynomial coefficients, and N is engine speed. FMEPDeact=C0=C1·N+C2·N2 Equation D: Where FMEPDeact is friction mean effective pressure, C0-C2 are stored, predetermined polynomial coefficients, and N is engine speed. The following describes further exemplary details for the regression and interpolation schemes. One dimensional functions are used to store friction and pumping polynomial coefficients for active and inactive cylinders. The data taken to determine the coefficients are collected at a sufficient number of engine speed points to provide the desired torque loss accuracy. Coefficients are interpolated between locations where no data exists. For example, data is collected and coefficients are determined for an engine at engine speeds of 600, 1000, 2000, and 3000 RPM. If the engine is then operated at 1500 RPM, coefficients from 1000 and 2000 RPM are interpolated to determine the coefficients for 1500 RPM. Total friction losses are then determined by at least one of the following equations: FMEP total = [ Numcyl Act ⁣ · FMEP Act + Numcyl Dact · FMEP Dact ⁡ ( t deact ) ] Numcyl total or ⁢ ⁢ FMEP total = Modfact ⁣ · FMEP Act + ( 1 - Modfact ) · FMEP Deact Where NumcylAct is the number of active cylinders, NumcylDact is the number of deactivated cylinders, Modfact is the ratio of the number of active cylinders to total number of cylinders, and FMEPtotal is the total friction mean effective pressure. Total pumping losses are then determined by one of the following equations: PMEP total = [ Numcyl Act ⁣ * PMEP Act + Numcyl Dactt * PMEP Dact ⁡ ( t deact ) ] Numcyl total or ⁢ ⁢ PMEP total = Modfact ⁣ · PMEP Act + ( 1 - Modfact ) · PMEP Dact Where NumcylAct is the number of active cylinders, NumcylDact is the number of deactivated cylinders, Modfact is the ratio of the number of active cylinders to total number of cylinders, and PMEPtotal is the total pumping mean effective pressure. Additional or fewer polynomial terms may be used in the regressions for PMEPAct, PMEPDeact, FMEPAct, and FMEPDeact based on the desired curve fit and strategy complexity. The losses based on pressure are then transformed into torque by the following equations: Γ friction_total = FMEP total · V D 4 · π · N / m 2 ( 1 · 10 - 5 ⁢ bar ) Γ pumping_total = PMEP total · V D 4 · π · N / m 2 ( 1 · 10 - 5 ⁢ bar ) Where VD is the displacement volume of active cylinders. In step 218, indicated mean effective pressure (IMEP) for each cylinder is determined, for example via the equation: IMEP cyl ⁡ ( bar ) = ( Γ brake - ( Γ friction_total + Γ pumping_total + Γ accessories_total ) Num_cyl Act ) * 4 ⁢ π V D * ( 1 * 10 - 5 ⁢ bar ) N / m 2 · SPKTR Where Num_cylAct is the number of active cylinders determined in step 212, VD is the displacement volume of active cylinders, SPKTR is a torque ratio based on spark angle retarded from minimum best torque (MBT), i.e., the minimum amount of spark angle advance that produces the best torque amount. Additional or fewer polynomial terms may be used in the regression based on the desired curve fit and strategy complexity. Alternatively, different estimation formats can also be used. The term SPKTR is based on the equation: SPKTR = Γ Δ ⁢ ⁢ SPK Γ MBT Where ΓΔSPK is the torque at a spark angle retarded from minimum spark for best torque (MBT), and ΓMBT is the torque at MBT. In one example, the actual value of SPKTR is determined from a regression based on the equation: SPKTR=C0+C1*Δspark2+C2*Δspark*N+C3*Δspark2*IMEPMBT Where C0-C3 are stored, predetermined, regressed polynomial coefficients, N is engine speed, and IMEPMBT is IMEP at MBT spark timing. The value of SPKTR can range from 0 to 1 depending on the spark retard from MBT. The correlation between estimated and actual spark torque ratio is shown in FIG. 7. The routine then proceeds to step 220. In step 220, individual cylinder fuel charges are determined. An individual cylinder fuel mass is determined, in one example, for each cylinder by the following equation: Mf=C0+C1*N+C2*AFR+C3* AFR2+C4*IMEP+C5*IMEP2+C6*IMEP*N Where Mf is mass of fuel, C0-C6 are stored, predetermined, regressed polynomial coefficients, N is engine speed, AFR is the air-fuel ratio, and IMEP is indicated mean effective pressure. The correlation between estimated and actual fuel mass is shown in FIG. 8. As indicated previously, additional or fewer polynomial terms may be used in the regression based on the desired curve fit and strategy complexity. For example, polynomial terms for engine temperature, air charge temperature, and altitude might also be included. The routine then proceeds to step 222. In step 222, a desired air charge is determined from the desired fuel charge. In one example, a predetermined air-fuel mixture (based on engine speed, temperature, and load), with or without exhaust gas sensor feedback, determines a desired air-fuel ratio. The determined fuel mass from step 220 is multiplied by the predetermined desired air-fuel ratio to determine a desired cylinder air amount. The desired mass of air is determined from the equation: Ma=Mf·AFR Where Ma is the desired mass of air entering a cylinder, Mf is the desired mass of fuel entering a cylinder, and AFR is the desired air-fuel ratio. The routine then proceeds to step 224. In step 224, exhaust valve opening (EVO), intake valve opening (IVO), and exhaust valve closing (EVC) timing are determined from center point of overlap and desired overlap. Center point of intake and exhaust valve overlap is a reference point, in crank angle degrees, from where IVO and EVC are determined. Overlap is the duration, in degrees, that intake valves and exhaust valves are simultaneously open. IVO and EVC are determined by the following equations: IVO = CPO - OL 2 EVC = CPO + OL 2 Where CPO is center point of overlap and OL is overlap. The location of CPO and OL are predetermined and stored in a table that is indexed by engine speed and air mass entering a cylinder. The amount of overlap and the center point of overlap are selected based on desired exhaust residuals and engine emissions. Exhaust valve opening (EVO) is also determined from a table indexed by engine speed and air mass entering a cylinder. The predetermined valve opening positions are empirically determined and are based on a balancing engine blow down, i.e., exhaust gas evacuation, and lowering expansion losses. Further, the valve timings may be adjusted based on engine coolant or catalyst temperature. The routine then proceeds to step 226. In step 226, intake valve closing is determined. Since EVO, EVC, and IVO are scheduled in one example, i.e., predefined looked-up locations, intake valve closing (IVC) is determined based on these predetermined locations and the desired mass of air entering a cylinder, from step 222. The desired mass of air entering a cylinder is translated into a cylinder volume by the ideal gas law: V a = M a · R · T P Where Va is the volume of air in a cylinder, Ma is a desired amount of air entering a cylinder, from step 222, R is a ideal gas constant, T is the intake manifold temperature, and P is the intake manifold pressure. By using the ideal gas law, individual cylinder volumes be adjusted to provide the desired cylinder air amount at altitude. Furthermore, an altitude factor may be added to regression equations to provide additional altitude compensation. From the determined cylinder volume Va, a model-based regression determines a relationship between a volume of air in a cylinder and intake valve closing volume (IVC) from the equation: V a = C 0 + C 1 * ( V IVC - V Res ❘ Ti ) ⁢ + C 2 * dV Res + C 3 * ( N 1000 ) * ( V IVC - V Res ❘ Ti ) + C 4 * ( N 1000 ) * dV Res + C 5 * ( T i T e ) * ( V IVC - V Res ❘ Ti ) Where Vais the volume of air inducted into the cylinder, C0-C5 are stored, predetermined, regressed polynomial coefficients, VIVC is cylinder volume at intake valve closed, VRES|Ti is the residual volume evaluated at the cylinder inlet temperature, dVres is a residual pushback volume, i.e., the volume of exhaust residuals entering the intake manifold, N is engine speed, Ti is intake manifold temperature, and Te is exhaust manifold temperature. Additional or fewer polynomial terms may be used in the regression based on the desired curve fit and strategy complexity. The unknown value of VIVC is solved from the above-mentioned regression to yield: V IVC = V Res ❘ Ti + ( V a - C 0 - ( C 2 + C 4 · N 1000 ) · dV Res ) C 1 + C 3 · N 1000 + C 5 · ( T i T e ) The solution of VIVC is further supported by the following equations derived from cylinder residual estimation: V Res = ⁢ V EVC + ( V IVO - V EVC ) [ 1 - ( V E V I ) · ( A E A I ) ] dV Res = ⁢ V Res - V TDC V Res ❘ Ti = ⁢ V Res · ( T i T e ) V E V I = ⁢ P m + 1 2 V TDC = ⁢ V Dcyl ( CR - 1 ) V ⁡ ( x ) = ⁢ π · r 2 · ( L + s 2 - s 2 · cos ⁡ ( Θ ) - L 2 - ( s 2 · sin ⁡ ( Θ ) ) ) Where V(x) is the cylinder volume at crank angle Θ relative to top dead center of the respective cylinder, L is the length of a connecting rod, s/2 is the crank shaft offset where the connecting rod attaches to the crankshaft, relative to the centerline of the crank shaft, r is the cylinder radius, CR is the cylinder compression ratio, VDcyl is cylinder displacement volume, VTDC is cylinder volume at top dead center, VE/VI is the air velocity ratio across exhaust and intake valves, AE/AI is the area ratio across exhaust and intake valves, VRes is the residual cylinder volume, VIVO is cylinder volume at intake valve opening, VEVC is cylinder volume at exhaust valve closing, and VTDC is cylinder volume at top dead center. Thus, cylinder volumes VEVC and VIVO are determined by solving for V(x) at the respective EVC and IVO crank angles. Note that this is one example approach for setting valve timing and overlap. An alternative approach could interrogate a series of predetermined tables and/or functions based on driver demand, engine speed, and engine temperature to determine intake and exhaust valve timing. The routine then proceeds to step 228. In step 228, valve timings associated with IVO, IVC, EVO, and EVC are compared against valve constraints. For example, the determined valve timings are compared to a limited valve opening duration, i.e., valve timing below a specified duration is avoided to improve valve-opening consistency. If the determined valve timing is below a specified threshold the valve timings are increased to a predetermined duration. If determined valve timings are above the specified threshold no valve timing adjustments are made. Further, there may be other valve constraints, such as a maximum opening duration, which can be considered. The routine then continues to step 230. In step 230, final cylinder air amount is determined. This step can be performed to account for any adjustments in cylinder air amount resulting from valve timing adjustment in step 228. In one example, cylinder inducted air amount is determined from the valve timings of step 228 and the equation: V adjusta = C 0 + C 1 * ( V IVC - V Res ❘ Ti ) + C 2 * dV Res + C 3 * ( N 1000 ) * ( V IVC - V Res ❘ Ti ) + C 4 * ( N 1000 ) * dV Res + C 5 * ( T i T e ) * ( V IVC - V Res ❘ Ti ) Where Va is determined from the same equation as in step 226, but that uses revised valve timings. The correlation between estimated and actual cylinder air charge volume is shown in FIG. 9. Additional or fewer polynomial terms may be used in the regression based on the desired curve fit and strategy complexity. Cylinder air mass is then determined from: Maadjust=ρintake·Va Where Maadjust is mass of air entering a cylinder, ρ is density of air in the intake manifold determined from the ideal gas law, and Va is a volume of air inducted into the cylinder. The desired mass of fuel entering a cylinder is then determined from the equation: M fadjust = M aadjust AFR Where Maadjust is the desired mass of air entering a cylinder, Mfadjust is the desired mass of fuel entering a cylinder, and AFR is the desired air-fuel ratio. Further, the desired mass of fuel can be adjusted here for lost fuel, unaccounted fuel that passes cylinder rings or attaches to intake port walls, or for cylinder enleanment or enrichment based on cylinder and valve mode, or based on catalyst conditions. Lost fuel is preferably based on a number of fueled cylinder events. In step 232, the spark angle delivered to a cylinder is determined. In one example, the final spark angle is based on MBT spark timing, but is adjusted to deliver the desired IMEP. From the above mentioned IMEP equation, desired air-fuel ratio, Mfadjust, engine speed, and IMEP adjusted for revised valve timings is determined. The adjusted IMEP is then divided by the IMEP amount determined in step 218 to produce a ratio of IMEP. This ratio is then substituted into the spark torque ratio regression equation of step 218 and solved for the final spark angle. In one example, MBT spark timing is determined by the equation: SPKMBT=C0+C1·N+C2·N2+C3·N3+C4·Mf+C5·Mf2+C6·FDR+C7·FDR2·C8·FDR3 Where C0-C8 are stored, predetermined, regressed polynomial coefficients, N is engine speed, Mf is mass of fuel injected into a cylinder, and FDR is fuel dilution ratio (mass of fuel)/(air mass amount+residual mass amount). This example method of torque control permits individual cylinder valve timing and spark control in an engine capable of a variety of valve and cylinder modes without storing extensive engine maps within the torque control strategy. Referring to FIG. 10, a high level flowchart of cylinder and valve mode selection for an engine with electromechanically actuated valves is shown. Depending on mechanical complexity, cost, and performance objectives an engine can be configured with an array of electromechanical valve configurations. For example, if good performance and reduced cost are desired, a plausible valve configuration may include electromechanical intake valves and mechanically actuated exhaust valves. This configuration provides flexible cylinder air amount control while reducing the cost that is associated with higher voltage valve actuators that can overcome exhaust gas pressure. Another conceivable mechanical/electrical valve configuration is electromechanical intake valves and variable mechanically driven exhaust valves (mechanically driven exhaust valves that can be controlled to adjust valve opening and closing events relative to a crankshaft location). This configuration may improve low speed torque and increase fuel economy at reduced complexity when compared to a full electromechanically actuated valve train. On the other hand, electromechanical intake and exhaust valves can provide greater flexibility but at a potentially higher system cost. However, unique control strategies for every conceivable valve system configuration could be expensive and could waste valuable human resources. Therefore, it is advantageous to have a strategy that can control a variety of valve system configurations in a flexible manner. FIG. 10 is an example cylinder and valve mode selection method that can reduce complexity and yet is capable of flexibly controlling a variety of different valve configurations with few modifications. One example method described herein makes a set of cylinder and valve modes available each time the routine is executed. As the steps of the method are executed, different cylinder and valve modes may be removed from a set of available modes based on engine, valve, and vehicle operating conditions. However, the method may be reconfigured to initialize cylinder and valve modes in an unavailable state and then make desired cylinder and valve modes available as the different steps of the routine are executed. Thus, various options are available for the selection of an initialization state, order of execution, and activation and deactivation of available modes. In step 1010, row and column cells of a matrix (mode matrix) representing valve and cylinder modes are initialized by inserting numerical 1's into all matrix row and column cells. An example mode matrix is shown in FIG. 11 for an eight cylinder engine having two banks of four-cylinders each in a V-type configuration. The mode matrix is a construct that holds binary ones or zeros in this example, although other constructs can be used. The matrix can represent cylinder and valve mode availability. In this example, the ones represent available modes while zeros represent unavailable modes. The mode matrix is initialized each time the routine is called, thereby making all modes initially available. FIGS. 21-27 illustrate some potential valve and cylinder modes, and are described in more detail below. Although a matrix is shown, it is possible to substitute other structures such as words, bytes, or arrays in place of the matrix. Once the mode matrix is initialized the routine continues to step 1012. In step 1012, some valve and/or cylinder modes that are affected by engine warm-up conditions are deactivated from the mode matrix. In one example, warm-up valve and cylinder mode selection is based on engine operating conditions that determine an operating state of the engine. The description of FIG. 13 provides further details of warm-up valve and/or cylinder mode selection. The routine then proceeds to step 1014. In step 1014, some valve and/or cylinder modes that affect engine emissions or that are affected by emissions are deactivated. The description of FIG. 14 provides further details of cylinder and/or valve mode selection that is based on engine emissions. The routine then continues to step 1016. In step 1016, some valve and/or cylinder modes that are affected by engine operating region and valve degradation are deactivated. Catalyst and engine temperatures along with indications of valve degradation, are used in one example to determine cylinder and/or valve mode deactivation in this step. The description of FIG. 15 provides further details of the selection process. The routine then continues to step 1018. In step 1018, some valve and/or cylinder modes that affect engine and vehicle noise, vibration, and harshness (NVH) are deactivated. For-example, electromechanical valves can be selectively activated and deactivated to change the number of active cylinders and therefore the cylinder combustion frequency. It can be desirable, under selected circumstances, to avoid (or reduce) valve and cylinder modes that can excite vibrational frequencies or modes of a vehicle, i.e., frequencies where the mechanical structure has little or no damping characteristics. The valve and/or cylinder modes that affect these frequencies are deactivated in step 1018. The description of FIG. 16 provides further details of NVH based valve and cylinder mode deactivation. The routine then proceeds to step 1020. In step 1020, some cylinder and/or valve modes that do not provide sufficient torque to produce the desired engine brake torque are deactivated. In this step desired engine brake torque is compared to the torque capacity of the cylinder and valve modes contained within the mode matrix. In one example, if the desired brake torque is greater than the torque capacity (including a margin of error, if desired) of a given cylinder and valve mode, then the cylinder and/or valve mode is deactivated. Additional details of the torque based cylinder and valve mode selection process can be found in the description of FIG. 17. The routine then continues to step 1022. In step 1022, the mode matrix is evaluated and the cylinder and valve modes are determined. At this point, based on the criteria of steps 1010-1020, deactivated cylinder and valve operating modes have been made unavailable by writing zeros into the appropriate mode matrix cell row/column pair. The mode matrix is searched starting from the matrix origin (0,0) cell, row by row, to determine row and column pairs containing ones. The last matrix row/column containing a value of one determines the valve and cylinder mode. In this way, the design of the mode matrix and the selection process causes the fewest number of cylinders and valves to meet the control objectives. If a cylinder and/or valve mode change is requested, that is, if the method of FIG. 10 determines that a different cylinder and/or valve mode is appropriate since the last time the method of FIG. 10 executed, then an indication of an impending mode change is indicated by setting the requested mode variable to a value indicative of the new cylinder and/or valve mode. After a predetermined interval, the target mode variable is set to the same value as the requested mode variable. The requested mode variable is used to provide an early indication to peripheral systems of an impending mode change so that those systems may take action before the actual mode change. The transmission is one example where such action is taken, as described in FIG. 28. The actual cylinder and/or valve mode change is initiated by changing the target mode variable. Furthermore, the method may delay changing requested and target torque while adjusting fuel to suit the new cylinder and/or valve mode by setting the MODE_DLY variable. Cylinder and/or valve mode changes are inhibited while the MODE_DLY variable is set. The chosen valve and cylinder mode is then output to the torque determination and delivery routine. The cylinder and valve mode selection routine is then exited. In addition, the cylinder and valve mode matrix structure can take alternate forms and have alternate objectives. In one example, instead of writing ones and zeros to the cells of the matrix an alternate embodiment might write numbers to the matrix that are weighted by torque capacity, emissions, and/or fuel economy. In this example, selection of the desired mode might be based on the values of the numbers written into the matrix cells. Further, modes that define the axis of the matrix do not have to be in increasing or decreasing torque amounts; fuel economy, power consumption, audible noise, and emissions are a few additional criteria that may be used to define the structure of the mode control matrix organization. In this way, the matrix structure can be designed to determine cylinder and valve modes based on goals other than fewest cylinders and valves. Also, the method of FIG. 10 may be configured to determine operating conditions of a valve, valve actuator, engine, chassis, electrical system, catalyst system, or other vehicle system. The before-mentioned operating conditions may be used to determine a number of active cylinders, number of active valves, valve patterns, cylinder strokes in a cylinder cycle, cylinder grouping, alternate valve patterns, and valve phasing desired. Determining a variety of operating conditions and selecting an appropriate cylinder and valve configuration may improve engine performance, fuel economy, and customer satisfaction. In one example, at least the following two degrees of freedom can be used to regulate torque capacity of an engine: (1) the number of cylinders carrying out combustion; and (2) the number of valves operating in each cylinders Thus, it is possible to increase the resolution of torque capacity beyond that obtained by simply using the number of cylinders. Furthermore, the method of FIG. 10 can switch between cylinder and valve modes during a cycle of the engine based on engine operating conditions. In another example, an eight-cylinder engine operates four-cylinders in four-stroke mode and four-cylinders in twelve-stroke mode, all cylinders using four valves in each cylinder. This mode may generate the desired torque and a level of increased fuel efficiency by reducing the number of active cylinders and by operating the active cylinders at a higher thermal efficiency. In response to a change in operating conditions, the controller might switch the engine operating mode to four-cylinders operating in a four-stroke mode and using two valves in each cylinder. The remaining four-cylinders might operate in twelve-stroke mode with alternating exhaust valves. In another example, under other operating conditions, some cylinders are operated with fuel injection deactivated, and others are operated with 4 valves active per cylinder. This mode may generate the desired torque while further increasing fuel efficiency. Also, the exhaust valves in the cylinders operating in twelve-stroke mode may cool due to the alternating pattern. In this way, the method of FIG. 10 permits an engine to change the number of active cylinders, number of strokes in a cycle of a cylinder, number of operating valves, and the valve pattern based on operating conditions and the mode matrix calibration and design. Because an engine with electromechanical valves is capable of operating different cylinders in different modes, e.g., half the number of available cylinders in four-stroke and the remainder of cylinders in six-stroke, a cycle of an engine is defined herein as the number of angular degrees over which the longest cylinder cycle repeats. Alternatively, the cycle of a cylinder can be individually identified for each cylinder. For example, again, where an engine is operating with cylinders in both four and six stroke modes, a cycle of the engine is defined by the six-stroke cylinder mode, i.e., 1080 angular degrees. The cylinder and valve mode selection method described by FIG. 10 may also be used in conjunction with a fuel control method to further improve engine emissions. One such fuel control method is described by the flowchart illustrated in FIG. 55. Referring to FIG. 11, an example of an initialized cylinder and valve mode matrix for a V8 engine with electromechanical intake and exhaust valves is shown. The x-axis columns represent a few of potentially many valve modes for a cylinder with four valves. Dual intake/dual exhaust (DIDE), dual intake/alternating exhaust (DIAE), alternating intake/dual exhaust (AIDE), and alternating intake/alternating exhaust (AIAE) are shown from left to right, from higher to lower torque capacity. The y-axis rows represent a few of potentially many cylinder modes for a V8 engine. The cylinder modes with more cylinders begin at the bottom and end at the top with fewer cylinders, from higher to lower torque capacity. In this example, the mode matrix is advantageously constructed to reduce search time and mode interpretation. The intersection of a row and column, a cell, identifies a unique cylinder and valve mode. For example, cell (1,1) of the mode matrix in FIG. 12 represents V4 cylinder mode and dual intake/alternating exhaust (DIAE) valve mode. The mode matrix is organized so that engine torque capacity in the cylinder/valve mode decreases as the distance from the origin increases. The reduction in torque capacity is greater by row than by column because the number of active cylinders per engine cycle decreases as the row number increases, whereas the different valve modes reduce the engine torque by a fraction of a cylinder torque capacity. Since the mode matrix construction is based on valves and cylinders, it naturally allows cylinder and valve modes to be defined that determine the number of active cylinders and valves as well as the cylinder and valve configuration. In addition, the mode matrix can identify cylinder and valve configurations that group cylinders and that have unique numbers of operating valves and valve patterns. For example, the mode matrix can be configured to provide half of active cylinders with two active valves and the other half of active cylinders with three active valves. Also, the mode matrix supports selection of multi-stroke modes. Multi-stroke operation generally includes a combustion cycle of greater than a four stroke combustion cycle. As described herein, multistroke operation includes greater than four stroke combustion, and variation of the number of strokes in the combustion cycle, such as, for example, variation between four-stroke, six-stroke, and/or twelve-stroke. Further, different cylinders may be made active for a single cylinder mode, e.g., in a four-cylinder engine I2 cylinder mode may be produced by cylinders 1-4 or 2-3, by defining and selecting from two unique matrix cells. Any of the cylinder and valve modes represented in the mode matrix can be deactivated with the exception of the cylinder and valve mode that is located in the (0,0) cell. Cell (0,0) is not deactivated so that at least one mode is available. Referring to FIG. 12, an example of a matrix that has been through the cylinder and valve mode selection process is shown. The figure shows the zeros in the matrix cells that were initially set to ones in the mode matrix initialization, step 1010. Also, in the steps of the method of FIG. 10, when a cylinder and valve mode is deactivated, cylinder and valve modes of lesser torque capacity are also deactivated. For example, cell (1,2) has the higher torque capacity of the cells containing zeros. Based on the cylinder selected and valve mode selection criteria described above, cell (1,1) is selected as the current cylinder and valve mode, i.e., V4-dual intake/alternating exhaust (DIAE). This can reduce search time of the matrix if searching ceases after a zero is encountered in the matrix. Referring to FIG. 13, a diagram of the state machine that selects cylinder and valve modes based on warm-up conditions is shown. Four states are shown but fewer or additional states are possible. State 1316, the cold state, is the default state entered when the cylinder and valve mode selection routine is executed for the first time (e.g., after a start). Engine and/or vehicle operating conditions thereafter determine the occupied state. Further, the arrows connecting states 1310-1316 designate operational conditions that trigger a state change, transferring state control from one state to another. For example, upon receiving a key on indication the cold state 1316 is entered. Vehicle and engine operating conditions are then determined, and if conditions permit the operational state is changed. A representative condition that triggers state change from the cold state 1316 to the warm stabilized state 1310 via arrow 1320 is: If (((ECT>ECTSTBL) & (CAT>CATWRM)) or ((ECT>ECTWRM) & (CAT>CATSTBL))) Where ECT is measured or inferred engine temperature, ECTSTBL is a predetermined engine temperature that indicates the engine is at a warm operating temperature, CAT is a measured or inferred catalyst temperature, CATWRM is a predetermined catalyst temperature that indicates at least a partially warm catalyst system, ECTWRM is a predetermined engine temperature that indicates that the engine is warm but not at a stabilized operating temperature ECTSTBL, and CATSTBL is a predetermined catalyst temperature that indicates that the catalyst is at a temperature that permits efficient catalytic reactions. Similar rule sets control the transitions between the other states. Thus, if the statement is true, the cold state 1316 is exited and the warm stabilized state 1310 is entered. Contained within each state is a predetermined state matrix of the same dimensions as the mode matrix. The predetermined state matrix can contain ones and zeros. When in a given state any zeros entered in the predetermined state matrix are copied into the mode matrix. Each time the mode selection routine is executed there is potential to change states. In this way, the different warm-up states update the mode matrix. Further, calibration of predetermined state matrices allows catalyst temperature and engine temperature to determine active and inactive cylinder and valve modes. That is, engine and catalyst temperatures can determine the number of active cylinders and the number of strokes in the active cylinders, plus they can determine the number and configuration or pattern of operational valves. Warm-up cylinder and valve mode selection determination based on operational conditions of an engine are not constrained to engine temperature and catalyst temperature. Transitions between operating states may also be determined by engine oil temperature, ambient air temperature, barometric pressure, humidity, and a number of fueled cylinder events after a start, such as a number of combustion events. Although engine and catalyst temperature provide an indication of engine operating conditions, conditions of an electromechanical valve can provide additional information and in some cases a basis for cylinder and valve mode changes. For example, armature temperature determined by sensor 50 (or estimated) may be included into the above-mentioned representative condition that triggers a state change. Further, the number of valve operations, time since start, valve operating time, valve current, valve voltage, power consumed by the valve, valve impedance sensing devices, combinations thereof, and/or sub-combinations thereof can augment (or supplant) the armature temperature sensor by providing additional operating conditions of a valve. Consequently, operating conditions of an electromechanical valve can be used to determine the number of active cylinders and/or the number of strokes in the active cylinders, plus they can optionally be used to determine the number and configuration or pattern of operational valves. These valve operating conditions may be included with engine and catalyst conditions in the state transition logic or they can comprise state transition logic without engine and catalyst operating conditions. Selecting valve patterns, e.g., opposed intake and/or exhaust valves or diagonally opposed intake and exhaust valves, may also be based on warm-up conditions, cylinder stroke mode, and number of active cylinders by the state machine. This is accomplished by leaving desired valve patterns, cylinder stroke modes, and cylinder modes active in a given warm-up state. Then the remaining selection criteria of FIG. 2 can determine the cylinder mode, number of active valves, active valve pattern, and cylinder stroke mode by applying the conditional constraints of steps 1014-1022 of FIG. 10. Selection of electromechanical valves operation during the engine warm-up in this way can improve engine operation in a number of ways, such as, for example, by operating all cylinders of an engine with a fewer number of valves. One example of such an option would be a V8 with four electromagnetic valves per cylinder operated with eight cylinders and two valves per cylinder. Not only can such operation increase fuel economy (by saving electrical energy by reduced valve current), but engine noise, vibration, and harshness (NVH) can also be reduced since engine torque peaks are closer together. Further, valve power consumption at low temperature increases while power supply capacity may decrease. Therefore, selecting a fewer number of valves during a low temperature condition(such as, for example, during an engine start) can make more current available to the engine starter so that longer engine cranking (rotating the engine until the engine is rotating under its own power) and higher cranking torque is possible without depleting battery capacity. The state machine of FIG. 13 can be further configured to accommodate warm-up states that are entered based on operating conditions of a transmission. For example, transmission oil temperature, gear selector position, or estimated transmission torque losses may also be incorporated into warm-up state determination logic and used to select engine and valve modes. Continuing with the remaining transitions of FIG. 13, the transition from cold state 1316 to the warm stabilized state 1310 is performed if: (((ECT>ECTSTBL) & (CAT>CATWRM)) or ((ECT>ECTWRM)&(CAT>CATSTBL))) The transition from cold state 1316 to the warm state 1312 is performed if: (((ECT>ECTWRM) & (CAT>CATCOL)) or ((ECT>ECTCOL) & (CAT>CATWRM))) & ((ECT<ECTSTBL) & ( CAT<CATSTBL)) The transition from cold state 1316 to the cool state 1314 is performed if: (((ECT>ECTCOL) & (CAT>CATCLD)) or ((ECT>ECTCLD) & (CAT>CATCOL))) & ((ECT<ECTWRM) & (C AT<CATWRM)) The transition from cool state 1314 to warm state 1312 is performed if: (((ECT>ECTWRM) & (CAT>CATCOOL)) or ((CAT>CATWRM) & (ECT>ECTCOL))) The transition from warm state 1312 to warm stabilized state 1310 is performed if: (((ECT>ECTSTBL) & (CAT>CATWRM)) or ((CAT>CATSTBL) & (ECT>ECTWRM))) The transition from warm stabilized 1310 to warm 1312 is performed if: ((ECT<ECTSTBL) & (CAT<CATSTBL)) The transition from warm 1312 to cool 1314 is performed if: ((ECT<ECTWRM) & (CAT<CATWRM)) And finally, the transition from cool 1314 to cold 1316 is performed if: ((ECT<ECTCOL) & (CAT<CATCOL)) Where CATCOL is a catalyst temperature threshold that identifies a cool cat temp (e.g., 400 deg F.), ECTCOL is a engine temperature threshold that identifies a cool engine (e.g., 110 deg F.), CATCLD is a catalyst temperature threshold that identifies a cold cat (e.g., 70 deg F.), and ECTCLD is a temperature that identifies a cold engine temperature (e.g., 70 deg F.). Referring to FIG. 14, a method to deactivate cylinder and valve modes from the mode matrix based on catalyst operating conditions (for example, catalyst state) is shown. In one example, an oxidant storage state (such as an amount of oxidants stored) is used. In one example, oxygen is the primary oxidant. In one approach, catalyst temperature can be used in determining a catalyst operating condition. However, in another example, catalyst temperature (even though a factor in determining an oxidant storage state) is not explicitly used to determine cylinder and valve modes since this feature can be captured in the warm-up cylinder and valve mode selection, see FIG. 13. The method evaluates each cylinder and/or valve mode represented in the mode matrix and deactivates selected modes based on the evaluation. In steps 1410 and 1412, Catalyst storage capacity (such as a maximum oxidant storage availability at the current operating conditions) and oxidant storage amount are determined. In one example, these can be determined using the method in accordance with U.S. Pat. No. 6,453,662, which is hereby fully incorporated by reference. In one example, catalyst capacity is determined after filling the catalyst with oxidants by running the engine with a lean air/fuel ratio for an extended period of time. After the catalyst is filled, the air/fuel ratio provided to the engine is made rich. The pre-catalyst oxygen sensor 76 detects the rich air/fuel condition in the exhaust almost immediately. However, because the HC and CO produced by the rich engine air/fuel ratio reacts with the stored oxidants in the catalyst, there is a time delay until the post-catalyst oxygen sensor 98 detects a rich air/fuel ratio in the downstream exhaust. The length of the time delay is indicative of the oxidant storage capacity of the catalyst. Based upon the measured time delay, a deterioration factor between 0 and 1 (0 representing total deterioration and 1 representing no deterioration) is calculated. Alternatively, the method could be used in reverse, i.e., the catalyst could be depleted due to extended rich operation, after which the air/fuel ratio would be switched to lean operation. Similar to the original method, the length of the time delay until the post-catalyst sensor 98 registered a change in state would be indicative of the catalyst storage capacity. Also, the duration of delay can be affected by catalyst space velocity, air flow, temperature, etc., and these parameters can be therefore included in the calculation. The routine then proceeds to step 1414. In step 1414, an engine emissions amount is determined by looking up stored empirical emissions concentrations of HC, CO, and NOx at the current engine speed/load operating conditions. These concentrations can be integrated over time to determine a mass weight of each constituent. Further, functions that represent spark advance and air-fuel modifiers alter emissions concentrations, and can be included. Alternatively, emissions sensors may be employed to make a direct measurement of a constituent of interest. Still further, combinations of estimates and measurements can also be used. The routine then proceeds to step 1416. In step 1416, estimated catalyst oxidant storage capacity, CAT_CAP, is compared to a predetermined matrix of oxidant catalyst storage capacity amounts, CAT_STOR. In other words, each cylinder and valve mode may have a unique desired catalyst storage capacity that is compared to the estimated catalyst oxidant storage capacity. If the current catalyst oxidant storage capacity is above the amount stored in the predetermined catalyst storage matrix (which can represent a desired catalyst oxidant capacity for a selected cylinder and/or valve mode) the routine proceeds to step 1418. Otherwise, the routine continues to step 1420. In step 1420, cylinder and valve modes are deactivated based on the catalyst oxidant storage capacity. Cylinder and valve modes are deactivated based on the comparison of catalyst oxidant storage capacity verses the predetermined matrix of catalyst oxidant storage from step 1416. In other words, if current catalyst oxidant storage capacity is below a predetermined amount for a specific cylinder and valve mode, then the cylinder and valve mode is deactivated. In this way, cylinder and valve mode are determined, in part, by catalyst oxidant storage capacity. In step 1418, an amount of estimated stored oxidants, CAT_OXY, is compared to a predetermined matrix of oxidant catalyst storage capacity amounts, CAT_STOR, from step 1416. If the current catalyst oxidant storage capacity is greater than X % of the amount stored in the predetermined catalyst storage matrix the routine proceeds to step 1422. The value of X may be determined by indexing an array based on engine speed, engine air amount, and vehicle speed. To estimate the amount of oxidants, CAT_OXY, that are actually adsorbed/desorbed by the catalytic converter, (which can be done on a per brick basis) this estimation depends on several factors, including the volume of the catalytic converter 70, the flow rate of oxidants in the exhaust manifold 48, the percentage of the catalytic converter that is already full of oxidants, and other physical and operational characteristics of the catalytic converter. The change in the amount of oxidants stored in the catalytic converter 70 between two preset times (ΔT) is estimated based on the following model: Δ ⁢ ⁢ O 2 = C 1 * C 2 * C 3 * C 4 ⁡ [ K a * ( 1 - Stored ⁢ ⁢ O 2 Max ⁢ ⁢ O 2 ) N 1 * ( O 2 ⁢ Flow ⁢ ⁢ Rate Base ⁢ ⁢ Value ) Z 1 * Cat ⁢ ⁢ Vol * Δ ⁢ ⁢ T ] ⁢ ⁢ for ⁢ ⁢ Oxygen ⁢ ⁢ being ⁢ ⁢ adsorbed ( A ) Δ ⁢ ⁢ O 2 = C 1 * C 2 * C 3 * C 4 ⁡ [ K d * ( Stored ⁢ ⁢ O 2 Max ⁢ ⁢ O 2 ) N 2 * ( O 2 ⁢ Flow ⁢ ⁢ Rate Base ⁢ ⁢ Value ) Z 2 * Cat ⁢ ⁢ Vol * Δ ⁢ ⁢ T ] ⁢ ⁢ for ⁢ ⁢ Oxygen ⁢ ⁢ being ⁢ ⁢ desorbed ( B ) As indicated above, Equation (A) is used to calculate the change in oxidant storage in the catalytic converter if the catalyst is in an adsorption mode and Equation (B) is used if the catalyst is in a desorption mode. In Equations (A) and (B), the variables C1, C2, and C3 are assigned values to compensate for various functional and operational characteristics of the catalytic converter. The value of C1 is determined according to a mathematical function or look-up table based on the catalyst temperature. One embodiment uses a mathematical function that illustrates that a catalytic converter is most active when the catalyst is hot and least active when it is cold. The catalyst temperature can be determined according to several different methods that are well-known to those of skill in the art, including by a catalyst temperature sensor. The value of C2 in Equations (A) and (B) is determined based on the deterioration of the catalytic converter. The deterioration of the catalytic converter can be determined by a variety of well-known methods, including, for example, inferring such age or deterioration from the vehicle's total mileage (recorded by the vehicle's odometer) or total amount of fuel used over the vehicle's lifetime. Further, a catalytic deterioration factor can be calculated according to one of the preferred methods described hereinabove. The value of C3 is determined by a mathematical function or map based on the air mass flow in the exhaust manifold 48 which can be measured or inferred. The mathematical function used to assign values to C3 depends on the mass airflow rate in the induction manifold 44. The adsorption/desorption efficiency of the catalyst decreases as the mass flow rate increases. The C4 value is read from a two-dimensional look-up table of adaptive parameters. The primary index to the look-up table is air mass flow. For each air mass flow, there are two C4 values—one for when the catalyst is adsorbing oxidants (equation (A)) and one for when the catalyst is desorbing oxidants (equation (B)). Thus, the value of C4 used in equations (A) and (B) above varies from time to time with the determined air mass flow. In Equation (A), the value of ka represents the maximum adsorbing rate of the catalytic converter in terms of grams of oxidants per second per cubic inch. Similarly, in Equation (B), the value of kd represents the maximum desorbing rate of the catalytic converter in terms of grams of oxidants per second per cubic inch. The values of ka and kd are pre-determined based on the specifications of the particular catalytic converter being used. The value for Max O2 in both Equation (A) and Equation (B) represents the maximum amount of oxidants that the catalyst 70 is capable of storing in terms of grams. This is a constant value that is pre-determined according to the specifications of the particular catalytic converter used in the system. The value for Stored O2 in Equations (A) and (B) represents the previously-calculated current amount of oxidants stored in the catalytic converter 70 in terms of grams. The value for Stored O2 is read from RAM 108. The value for O2 Flow Rate in Equation (A) and Equation (B) represents the cylinder air amount. The Base Value in Equation (A) and Equation (B) represents the oxygen flow rate where Kd and Ka were determined and it is (PPM O2 of input gas)*(volumetric flow rate)*(density of O2). The Cat Vol parameter in Equation (A) and Equation (B) represents the total volume of the catalytic converter in terms of cubic inches. This value is pre-determined based on the type of catalytic converter being used. The value ΔT in both equations represents the elapsed time in seconds since the last estimation of the change in oxidant storage in the catalyst. Finally, the values of N1, N2, Z1, and Z2 are exponents that express the probability of desorption/adsorption and they are determined by experimentally measuring rates of adsorption/desorption at given levels of storage and flow. The exponents are regressed from measurements and can be used to describe linear to sigmoid probabilities. After the change in estimated oxidant storage in the catalyst 70 is calculated according to Equation (A) or Equation (B), the running total of the current oxidant storage maintained in RAM memory 108 is updated accordingly. Specifically, the amount of oxidants either adsorbed or desorbed is added/subtracted to the running total of oxidant storage, which is maintained in RAM memory 108. If the current catalyst oxidant storage capacity is not greater than X % of the amount stored in the predetermined catalyst storage matrix, the routine continues and exits, signifying that the catalyst has a desired oxidant storage capacity and that a desired amount of the storage capacity remains for storing oxidants. In step 1422, cylinder and valve modes are deactivated based on the amount of oxidants stored in the catalyst. Cylinder and valve modes are deactivated based on the comparison of oxidants stored in a catalyst to a percentage of an amount stored in the predetermined catalyst storage matrix. In other words, if the amount of oxidants stored in a catalyst are greater than a percentage of a predetermined amount then those cylinder and valve modes that are greater than the desired amount are deactivated. For example, if a catalyst has a predetermined oxidant storage capacity of 0.0001 gm and has a desired oxidant storage capacity of 60% or less of the predetermined oxidant storage capacity then the cylinder and valve mode will be deactivated if the stored oxidant amount is greater than 0.00006 gm. An alternative to the method of FIG. 14 is to recognize that deactivation of cylinder and valve modes can affect engine feed gas emissions. Therefore, cylinder and valve modes may be selected to alter the catalyst state. That is, deactivating certain cylinder and valve modes can constrain engine feed gas emissions altering the gas concentrations that enter the catalyst. For example, a V8 engine operating in V4 cylinder and dual intake/dual exhaust mode may produce higher levels of oxidants as compared to a V8 cylinder mode due to higher in cylinder temperatures and pressures. If a catalyst oxidant storage capacity is less than desired, V4 cylinder mode could be deactivated in an effort to reduce NOx emissions. In addition, engine fuel may be adjusted before and during a cylinder/valve mode change to further affect the amount of oxidants stored in a catalyst. For example, if an engine is operating in an eight cylinder mode and mode selection criteria permits switching to another mode, four-cylinder mode for example, fuel may be added or subtracted from the base fuel amount to bias the total fuel amount in a rich or lean direction, before the mode change is initiated, to precondition the catalyst for the mode change. Further, during and after a mode change, fuel may be added or subtracted from the base fuel amount to bias the total fuel amount in a rich or lean direction. The fuel adjustments may provide compensation for gas constituent changes that may occur due to different cylinder air amounts. In one example embodiment, advantageous operation can be obtained for an engine with electromechanical valves that is first operating in a first operating mode with a first valve and/or cylinder configuration (e.g., a first group of cylinders operating with a first number of valves and a second group operating with a second number of valves, or some cylinders in 4-stroke and some cylinders in 12 stroke mode, or some cylinders deactivated and remaining cylinders having differing number of active valves, or combinations or subcombinations thereof), and transitions to operating in a second operating mode with a second valve and/or cylinder configuration. And, before and/or during the transition, the exhaust gas mixture air-fuel ratio is temporarily biased lean or rich to precondition the exhaust system (by, for example, changing the air-fuel mixture in one or more cylinders carrying out combustion). Referring to FIG. 15, a flowchart of a method to deactivate cylinder modes (from available modes, for example) based on engine and valve operational limits is shown. The method evaluates engine and catalyst temperatures to determine which available cylinder and valve modes should be deactivated. Further, if valve degradation is indicated the method deactivates cylinder and valve modes influenced by the degradation, with the exception of the cylinder and valve mode in cell (0,0) of the mode matrix, if desired. In step 1510, engine operating conditions are determined. Engine temperature sensor 112 and catalyst brick temperature 77 are measured. Alternatively, the temperatures may be inferred. In addition, exhaust valve temperature can be inferred from empirical data based on engine temperature, exhaust residuals, engine speed, engine air amount, and spark advance. The routine then proceeds to step 1512. In step 1512, catalyst temperature, CAT_TEMP, is compared to a predetermined variable CAT_tlim. If the catalyst temperature is greater than CAT_tlim the routine proceeds to step 1514. If catalyst temperature is less than CAT_tlim then the routine proceeds to step 1516. In step 1514, cylinder and valve modes are deactivated based on predetermined matrix, CAT_LIM_MTX. The matrix has the same dimension as the mode matrix, i.e., the matrices have the same number of elements. Within CAT_LIM_MTX, the cylinder and valve modes that produce higher temperatures are deactivated. The deactivated modes are then copied from the CAT_LIM_MTX to the mode matrix. For example, if a measured or inferred catalyst temperature is higher than desired for a V8 engine, partial cylinder modes, V4, six-stroke, and V2 are deactivated. Deactivating the partial cylinder modes lowers exhaust temperatures by decreasing the load per cylinder at the same desired torque. The routine then proceeds to step 1516. In step 1516, engine temperature, ENG_TEMP, is compared to a predetermined variable ENG_tlim. If the engine temperature is greater than ENG_tlim the routine proceeds to step 1518. If the engine temperature is less than ENG_tlim then the routine proceeds to step 1520. In step 1518, cylinder and valve modes are deactivated based on predetermined matrix, ENG_LIM_MTX, where the matrix has the same dimension as the mode matrix, i.e., the matrices have the same number of elements. Within ENG_LIM_MTX the cylinder and valve modes that produce higher temperatures are deactivated. The deactivated modes are then copied from the ENG_LIM_MTX to the mode matrix. For example, if a measured or inferred catalyst temperature is higher than desired for a V8 engine, partial cylinder modes, V4, six-stroke, and V2 are deactivated. Deactivating the partial cylinder modes can lower exhaust temperatures by decreasing the load per cylinder at the same desired torque. The routine then proceeds to step 1520. In step 1520, the inferred exhaust valve temperature, EXH_vlv_tmp, is to a predetermined variable EXH_tlim. If the inferred exhaust valve temperature is greater than EXH_tlim the routine proceeds to step 1522. If the inferred exhaust valve temperature is less than the EXH_tlim then the routine proceeds to step 1524. In step 1522, cylinder and valve modes are deactivated based on predetermined matrix, EXH_LIM_MTX, where the matrix has the same dimension as the mode matrix, i.e., the matrices have the same number of elements. Within EXH_LIM_MTX the cylinder and valve modes that produce higher temperatures are deactivated. The deactivated modes are then copied from the ENG_LIM_MTX to the mode matrix. For example, if a measured or inferred exhaust valve temperature is higher than desired for a V8 engine, partial cylinder modes, V4, six-stroke, and V2 are deactivated and the exhaust valves operate in an alternating mode. Deactivating the partial cylinder modes lowers exhaust temperatures by decreasing the load per cylinder while alternating valves facilitates heat transfer between the inactive exhaust valve and the cylinder head. The routine then proceeds to step 1524. In step 1524, valve degradation is evaluated. The valve degradation can be indicated in a number of ways that may include but are not limited to: valve position measurements, temperature measurements, current measurements, voltage measurements, by inference from oxygen sensors, or by an engine speed sensor. If valve degradation is detected, a variable, VLV_DEG, is loaded with the number of cylinders with degraded valves and a cylinder identifier, CYL_DEG, is loaded with the latest cylinder number where the degraded valve is located, in step 1528. If valve degradation is present, the routine continues to step 1526. If valve degradation is not indicated the routine exits. In step 1526, cylinder and valve modes that are affected by valve degradation are deactivated, which can include deactivating the cylinder(s) with the degraded valve(s). Specifically, the cylinder in which the degraded valve is located, CYL_DEG, is an index into a matrix, FN_DEGMODES_MTX, that contains cylinder modes that are affected by the cylinder that contains the degraded valve. The routine then deactivates the cylinder modes that are identified by the FN_DEGMODES_MTX. However, in one example, the cylinder mode of row zero is not deactivated so that the engine is capable of delivering torque from at least some (or all) cylinders with non-degraded valves when requested. In addition, if more than one cylinder has degraded performance due to degraded valve performance, i.e., VLV_DEG is greater than one, the cylinder mode corresponding to row zero is the single active cylinder mode. In this way, a cylinder identified to have degraded performance causes affected cylinder modes to be deactivated, which may include disabling combustion, fuel injection, and/or ignition plug activation in the cylinders with degraded valves. Thus, fuel and/or spark can be deactivated in cylinders with degraded valve performance. Valve performance degradation may also be compensated in step 1526. Valve temperature is sensed by temperature sensor 50, but additional valve operating conditions may be determined as well. For example, valve voltage, impedance, and power consumption may be sensed or inferred. These parameters may be compared to predetermined target amounts to form error amounts that are then used to adjust an operating parameter of a vehicle electrical system. For example, if ambient air temperature increases and a voltage amount, measured or inferred, at a valve is lower than desired, a signal may be sent to the vehicle electrical system to increase the supply voltage. In this way, operating conditions of the valve may be used to adjust an operating condition of a vehicle electrical system so that valve operation is improved. The routine then proceeds to step 1530. In step 1530, operating conditions of a vehicle electrical system are assessed. If electrical system available power, available current, and/or available voltage is below a predetermined amount or is degraded, the routine proceeds to step 1532. Furthermore, if an external electrical load, e.g., a computer or video game powered by the vehicle electrical system, or an ancillary, lower priority electrical load, e.g., a vehicle component, such as an air pump or fan is loading the vehicle electrical system more than a predetermined amount or more than a fraction of the total available electrical system capacity, the routine proceeds to step 1532. The routine then proceeds to exit. In step 1532, cylinder and valve modes are deactivated based on electrical system operating conditions. Copying zeros from selected matrices into the mode matrix deactivates cylinder and valve modes. If electrical system available power, available current, and/or available voltage are below a first set of predetermined amounts, matrix FNVLVRED zeros are copied into the mode matrix. In this example, the zeros restrict valve operation to the number of engine cylinders with two operational valves per cylinder. If the above-mentioned electrical parameters are below a second set of predetermined amounts, matrix FNCYLRED zeros are copied into the mode matrix. In this example, the zeros restrict valve operation to a reduced number of active cylinders and a reduced number of valves in active cylinders. Further, if power to external or ancillary loads exceeds predetermined amounts, controlling a power switch, e.g., a relay or transistor, deactivates power to these devices. The combination of deactivating cylinder and valve modes along with reducing the affect of external and ancillary electrical loads can improve likelihood of starting during conditions of reduced electrical system capacity. For example, during cold ambient temperatures, engine friction increases and battery power may be reduced. By deactivating lower priority electrical loads and selecting a reduced number of active cylinders and valves, additional electrical power is available for an engine starter and active valves during starting. In addition, vehicle range may be increased if electrical system performance degrades during engine operation by deactivating lower priority electrical loads and reducing active cylinders and valves. Referring to FIG. 16, a flowchart of a method to deactivate cylinder modes based on frequencies of modal vibration of a vehicle chassis and components. The method evaluates engine speed and predicts future engine speed so that excitation of modal frequencies of the vehicle chassis and components can be reduced. Components whose modal frequencies are desirable to reduce or avoid include, for example: drive shafts, brackets, and transmission housing. The method deactivates cylinder modes if the engine combustion frequency approaches a predetermined modal frequency. Engine speed is anticipated because cylinder mode transitions take a period of time to initiate and because it also may take time to allow a torque converter to exit lock-up mode and begin to slip, reducing driveline torque surges. In other words, when transitioning between different valve and/or cylinder modes, in one example, the torque converter is unlocked before the transition, to dampen any uncompensated torque disturbance. In step 1610, engine speed is determined. Engine speed is determined from engine position sensor 118. The routine then proceeds to step 1612. In step 1612, variables for current transmission gear, CUR_GR, and target (future) transmission gear, TAR_GR, are evaluated to determine if a gear shift is pending. The transmission controller determines current and target gears from engine speed, driver brake torque demand, transmission temperature, and signals alike, for example. If CUR_GR and TAR_GR are different, a transmission shift is pending or is in progress. If a gear shift is pending or is in progress the routine proceeds to step 1614. If a gear shift is not in progress or pending, the routine proceeds to step 1616. In step 1614, engine speed is predicted into the future by multiplying the current engine speed by the ratio of current and target gear ratios. In automatic transmissions, the slip of a torque converter can also be incorporated into gear based anticipation. This allows engine combustion frequencies that are influenced by transmission gears to be reduced or avoided. When a transmission shifts gears, the engine speed can change quickly as the engine speed and vehicle speed are brought together through the transmission gear set. Engine speed is anticipated during gear shifting by the equation: Ant_Eng ⁢ _N = Eng_N · Tar_Gr ⁢ _Rto Cur_Gr ⁢ _Rto Where Ant_Eng is the anticipated engine speed, Eng_N is the current engine speed, Tar_Gr_Rto is the target (future) gear ratio, and Cur_Gr_Rto is the current gear ratio. The equation predicts engine speed during up and down shifting so that excitation of modal frequencies can be avoided. The routine then proceeds to step 1618. In step 1616, engine speed is predicted based on current and past engine speed measurements. Engine speed is predicted by the equation: Ant_Eng ⁢ _N = Eng_N ⁢ ( k ) + Ant_Tm · Eng_N ⁢ ( k ) - Eng_N ⁢ ( k - 1 ) Δ ⁢ ⁢ t Where Ant_Eng is the anticipated engine speed, Eng_N(k) is the current engine speed, Eng_N(k−1) is engine speed of the previous engine speed sample, Ant_Tm is the anticipation time, i.e., period of time anticipated into the future, and Δt is the time duration between samples. The anticipation time, Ant_Tm, should be less than 0.5 seconds. Alternatively, engine speed may be used in place of predicted engine speed, but speed thresholds of each cylinder and valve mode are lowered to avoid encountering NVH areas. The routine then continues to step 1618. In step 1618, anticipated engine speed is converted into combustion frequencies that are associated with cylinder modes. For example, an anticipated engine speed of 1500 RPM for an engine operating in four-stroke mode with eight active cylinders translates to a firing frequency of 100 Hertz (1500 Rev/min*1 min/60 sec*4 firing/Rev). These frequencies are then compared to a predetermined undesirable cylinder mode frequency so that excitation of modal frequencies is avoided or reduced by activating or deactivating cylinders and/or valves. Further, the number of strokes in a cycle of a cylinder may also be changed to avoid undesirable frequencies. For example, if the modal frequency of a vehicle chassis is 15 Hz it is desirable to avoid this and lower frequencies. An engine operating at 800 RPM has a V8 combustion frequency of 53.3 Hz, a V4 combustion frequency of 26.6 Hz, and a V2 combustion frequency of 13.3 Hz. Therefore, in this example, V2 cylinder mode can be deactivated. Further, step 1620 provides an offset to the predetermined desired-frequency of step 1618. If the cylinder load, or cylinder air amount, is low, the predetermined desired frequency can be lowered as a function of the cylinder load. Typically, a cylinder load below 30% of cylinder load capacity will lower the predetermined frequency capacity. The routine then exits. In addition, the number of valve events during a cycle of an active cylinder may also be used to avoid frequencies (or reduce the impact) that are a result of valve operations. In other words, when a valve is operated it generates a different frequency than the cylinder combustion frequency because the valve operates at least twice in an active cylinder, one time opening and one time closing. These frequencies may also be avoided or reduced in step 1618 by identifying valve frequencies based on valve and cylinder modes. Further, frequencies that affect driveline and drive shaft vibration or are affected by the state of a torque converter lock-up clutch may be avoided or reduced by simply changing combustion frequency and valve events as described above. Further yet, a signal may be output from step 1618 to change a damping ratio of a motor mount having variable characteristics. As cylinder combustion frequency and valve operating frequency approach a predetermined value, a signal may be sent to an external routine to alter motor mount damping ratios to further reduce any noise or vibration. Referring to FIG. 17, a flowchart of a method to deactivate cylinder modes based on desired engine brake torque is described. The method evaluates desired engine brake torque and predicts future engine brake torque so that torque is smoothly applied between cylinder and valve mode transitions. In step 1710, desired engine brake torque is determined from accelerator pedal 119. The routine then proceeds to step 1712. Note that other engine output parameters could be used in place of engine brake torque, such as wheel torque, transmission input torque, transmission output torque, engine indicated torque, and others. Further, it can also be based on engine or vehicle speed. In step 1712, the method determines if desired brake torque is increasing or decreasing. In one example, the current desired brake torque is subtracted from the previous sample value of desired engine brake torque. If the sign of the result is positive, brake torque is (or determined to be) increasing. If the result is negative, desired brake torque is (or determined to be) decreasing. If the desired brake torque is increasing, the method proceeds to step 1716. If the desired brake torque is decreasing the method proceeds to step 1714. Further, the routine can also have a third option that looks to whether the torque is remaining substantially steady (e.g., not changing within 0-5%, for example). If such a condition is detected, in this example, the routine continues to step 1716. In step 1714, the desired engine brake torque signal is filtered by a first order filter and a predetermined time constant, although higher order filters could be used, or other types of filters could be used. By filtering the decreasing desired brake torque signal, potential of increased frequency of switching between multiple cylinder and valve modes can be reduced. For example, if the vehicle driver depresses and then releases the accelerator 119 multiple times over a short period, the filter can reduce the number of mode changes because the filtered desired torque signal decays, i.e., goes to a lower value, at a slower rate than the unfiltered desired torque signal. In an alternative embodiment, both increasing and decreasing signals can be filtered and then used with a dead-band to reduce the amount of unnecessary valve or cylinder mode switching in response to driver changes. The method then continues to step 1718. In step 1716, the increasing desired brake torque signal is predicted into the future by an anticipation algorithm. Desired engine torque is anticipated by the equation: Ant_Eng ⁢ _Tor = Eng_Tor ⁢ ( k ) + Ant_Amt · Eng_Tor ⁢ ( k ) - Eng_Tor ⁢ ( k - 1 ) Δ ⁢ ⁢ t Where Ant_Eng_Tor is the anticipated desired engine torque, Eng_Tor(k) is the current desired engine torque, Eng_Tor(k−1) is desired engine torque of the previous desired engine torque sample, Ant_Amt is the anticipation time, i.e., period of time anticipated into the future, and At is the time duration between samples. The anticipation time, Ant_Amt, in one example, is less than 0.5 seconds. Alternatively, desired engine torque may be used in place of predicted desired engine torque, but torque thresholds of each cylinder and valve mode are lowered to avoid encountering the torque capacity of a mode. The routine then continues to step 1718. In step 1718, desired engine torque is compared to a matrix, Eng_Mod_Tor, of torque capacity amounts for cylinder and valve modes. Each cell of the cylinder and valve mode matrix has a corresponding cell in the Eng_Mod_Tor matrix. If the desired engine torque is greater than the torque capacity of a cylinder and valve mode, then the cylinder and valve mode is deactivated. In other words, the desired torque is compared against the torque capacity of each cylinder and valve mode. If the desired torque is greater than a cylinder and valve mode, the mode is deactivated. The routine then exits. Referring to FIG. 18, a method to select a cylinder and valve mode from a matrix of available cylinder and valve modes is described. In one example, the method searches the entire mode matrix for a mode with the least number of active cylinders and valves. Since the before-mentioned steps have already deactivated cylinder and valve modes based on operating conditions of the engine and vehicle, this step provides a second example criteria for selection of cylinder and valve modes, namely, fuel economy. By selecting the fewest number of active cylinders and valves, fuel economy is increased by improving cylinder efficiency and reducing electrical power consumption. However, alternative search schemes can be used by structuring the columns and rows of the matrix differently to emphasize other goals, or combinations of different goals. In step 1810, row and column indexes are initialized each time the routine is executed and the routine stores the current row and column index if the mode matrix cell pointed to by the indexes contains a value of one. In this example, only one row and column index is stored at a time. The routine proceeds to step 1812 after the current mode matrix cell is evaluated. In step 1812, the current column number, cols, is compared to the number of columns of the mode matrix, col_lim. If the currently indexed column is less than the total number of mode matrix columns the routine proceeds to step 1814. If the indexed column is not less than the total number of mode matrix columns the routine proceeds to step 1816. In step 1814, the column index value is incremented. This allows the routine to search from column zero to column col_lim of each row. The routine then continues to step 1810. In step 1816, the column index is reset to zero. This action allows the routine to evaluate every column of every row of the mode matrix if desired. The routine then proceeds to step 1818. In step 1818, the current row number, rows, is compared to the number of rows of the mode matrix, row_lim. If the currently indexed row is less than the total number of mode matrix rows the routine proceeds to step 1820. If the indexed row is not less than the total number of mode matrix rows the routine proceeds to step 1822. In step 1820, the row index value is incremented. This allows the routine to search from row zero to column row_lim of each row. The routine then continues to step 1810. In step 1822, the routine determines the desired cylinder and valve mode. The last row and column indexes are output to the torque determination routine, FIG. 2, step 212. The row number corresponds to the desired cylinder mode and the column number corresponds to the desired valve mode. The routine then exits. Referring to FIG. 19, a timing chart that illustrates alternating intake valve control is shown. The x-axis is designed to show two engine revolutions, or one cylinder firing cycle (combustion cycle) for a cylinder in four-stroke mode (although other strokes can be used). In this example, a cylinder with two intake valves (labeled “An” and “B”) is controlled according to the timing diagram of FIG. 19. The position of intake valve A opens prior to the 360 degree crankshaft marking, and it does not open at the next 360 degree crankshaft marking, but it opens again at the following 360 degree crankshaft marking. In other words, the A valve opens every other combustion event, in the case where the engine is operating in a four-stroke mode, the cylinder firing every 720 degrees of crankshaft rotation, or every two revolutions. The second intake valve also opens at a 360 degree crankshaft marking too, but valve B opens 720 degrees out of phase with valve A. Also, this valve sequence is possible for both intake and/or exhaust valves. Alternatively, some cylinders of the engine can operate with alternating valves while others operate with the same single valve, or dual valves. The (full or partial) alternating valve sequence can advantageously reduce valve wear, reduce exhaust valve temperature, and/or reduce power consumption. Further, the valve sequence can alter engine breathing characteristics, i.e., the amount of air inducted, when different length intake or exhaust manifold runners are available for the different intake and exhaust valves. The valve sequence is one of many sequences and operating patterns available for electromagnetically actuated valves and may be selected by the method of FIG. 10. Referring to FIG. 20, a timing chart that illustrates an example of intake valve phasing control is described. A cylinder with two intake valves is controlled according to the timing diagram of FIG. 20. Intake valve A opens prior to each 360 degree crankshaft marking. On the other hand, valve B opens at the 360 degree crankshaft marking. The angular difference between the valve openings is a valve phase difference, and can be varied based on engine or vehicle operating conditions, including valve operating conditions. Further, the valve opening location, valve lift, and duration of each of valves A and B can also be adjusted based on these conditions. It is also possible to open valve A before valve B or to operate valve B before valve A based on engine speed and load, or other conditions, such as valve operating conditions. Thus, in some operating modes, valve A opens (or closes) before valve B, and in other modes (at other conditions, such as temperature, speed, load, catalyst storage amounts, etc.) valve B opens (or closes) before valve A. Further, the amount of phasing can also be based on engine speed and load, or other conditions, such as valve operating conditions. Valve phasing has potential benefits for both intake and exhaust valves. For intake valves, valve phasing can increase charge motion at idle and lower engine speeds. This increased charge motion can be combined with a lean air-fuel mixture to reduce expelled engine hydrocarbons during a start, for example. Further, valve phasing can also alter intake breathing which may improve the signal to noise ratio of sensors that are used to estimate engine air amount, such as the manifold pressure sensor, and/or mass air flow sensor. Exhaust valves may also be phased (e.g. opening phasing and/or closing phasing can be used, as with intake valves) to improve engine operation. For example, exhaust valve phasing offers the opportunity to reduce electrical power consumption. By opening a single valve followed by a second valve, as opposed to simultaneously opening two valves, during an exhaust stroke when cylinder pressures are elevated, less energy goes into opening the second exhaust valve. Alternatively, in some conditions, simultaneous opening and/or closing can be used. Further, combination of intake and exhaust phasing can be used, at least on some cylinders, if desired. Intake and exhaust valve phasing may also be combined with cylinder grouping, multi-stroke, and alternating valves, and combinations and subcombinations thereof, to further enhance engine performance and fuel economy. Valve phasing is one of many sequences available for electromagnetically actuated valves and may be selected by the method of FIG. 10 by including it as an available valve mode, if desired. Referring to FIG. 21, a cylinder and valve configuration that offers flexible control options with reduced cost is shown. The M label designates a mechanical valve operated by a camshaft (optionally having hydraulically actuated variable cam timing) while the E designates an electromechanical valve. The figure shows two cylinder groups, one group with electromechanically actuated intake valves and the other group with mechanically actuated intake valves. It is also possible to configure group two with mechanical intake valves and electromechanical exhaust valves. Yet another configuration may be where one group of cylinders has one or more electromechanically actuated valves and the remaining valves in the engine are mechanically activated. This allows the cylinder groups to have different valve configurations for different objectives. For example, one cylinder group may operate with four valves while the other group operates with two valves. This allows the four valve cylinders to have a higher torque capacity during some conditions, such as speed and load conditions, and allows the engine to have multiple torque capacity amounts by selectively activating the electromechanically actuated valves. By operating two cylinder groups with different valve configurations, engine fuel economy can also be increased. For example, a V10 engine with two cylinder banks can be configured with a mechanically actuated valve bank and either an electromechanically actuated or combination mechanical/electromechanically actuated valve bank. Cylinders in the electromechanical bank may be deactivated as desired without the cost of installing electromechanical valves in all cylinders. Further, engine emissions may be improved in an exhaust configuration where catalyst bricks are located at different distances from cylinder heads. A bank of cylinders with electromechanically actuated valves can retard exhaust valve timing, thereby increasing heat for the cylinder bank where the catalyst bricks are located further away from the cylinder head. Consequently, the different cylinder banks can be configured based on engine design to improve emissions. Referring now to FIG. 21A, an alternative configuration is shown with electrically actuated intake valves, and mechanically cam actuated exhaust valves (optionally with hydraulically actuated variable cam timing). Note that while two intake and two exhaust valves are shown, in yet another alternative embodiment, one electrically actuated intake, and one cam actuated exhaust valve can be used. Further, two electrically actuated intake valves, and one cam actuated exhaust valve can also be used. Referring to FIG. 22, an alternative grouped cylinder and valve configuration is shown. The configuration of FIG. 22 offers some of the same benefits as those described for FIG. 21, but all cylinders are shown with mechanical and electromechanically actuated valves. This configuration offers further control flexibility by allowing all cylinders to be mechanically controlled or by operating a mechanical group and a mechanical/electromechanical group. Placing the electromechanical valves and mechanical valves in different locations in the different cylinder groups can further alter this embodiment. For example, group one could be configured with electromechanical intake valves and mechanical exhaust valves while group two is configured with mechanical intake valves and electromechanical exhaust valves. The cylinder and valve configurations of FIGS. 21, 21A, and 22 may be further altered by changing electromechanical valve locations for mechanical valve locations or by rearranging valve patterns. For example, one cylinder group arrangement may configure electromechanical intake and exhaust valves into a diagonal configuration that promotes cylinder charge swirl instead of the illustrated opposed valve configuration. Referring to FIGS. 23 and 24, additional embodiments of grouped cylinder and valve configurations are shown. The valve locations designated by an S, the selected valve, are operated during a cycle of the engine. Note that additional valves may be mechanically operated by a cam, in some examples. The cylinder and valve configurations shown divide the cylinder into two regions (between intake and exhaust valves in FIG. 23, and between groups of intake and exhaust valves in FIG. 24). Further, additional configurations can be used where the selected valve is in the same region but is not selected in the figure. These configurations can have at least some of the same benefits as the configurations as those described for FIGS. 21-22, for example. Referring to FIGS. 25, 26 and 27, yet further embodiments of grouped cylinder and valve configurations are shown. The valve locations designated by an S, the selected valve, are operated during a cycle of the engine. The cylinder and valve configurations shown break the cylinder into four regions, each region having an electromagnetically actuated valve, regions 1 and 2 containing intake valves, and regions 3 and 4 containing exhaust valves. Further, additional configurations can be used where the selected valve is in an alternate region but is not selected in the figure. These configurations can have the same benefits as the configurations described for FIGS. 21-24, but the configurations can also offer more control flexibility. For example, multi-stroke, valve phase control, alternating valves, and combinations thereof, as described by FIG. 19 and 20, can be implemented in grouped cylinder control. Further, the selected valve patterns can be altered to provide 2, 3, and 4 valve operation. Referring to FIG. 28, a plot of a speed dependent cylinder and valve mode change by the method of FIG. 10 is shown. The plot shows four separate plots of signals of interest during a speed dependent mode change. The top plot shows actual engine speed referenced to time. Engine speed starts at approximately 800 RPM and is ramped up to 1500 RPM then ramped back down to 800 RPM. The third plot of requested mode verses time shows speed dependent mode hysteresis. That is, a mode request is initiated at 1100 RPM for increasing engine speed and another mode request is initiated at 950 RPM for decreasing engine speed. The engine speed based cylinder and valve mode transition points for increasing and decreasing engine speed are calibrated as desired. The second plot from the top is a plot of anticipated engine speed. There is increased variation in the engine speed signal as compared to the top plot. This variation is due to the differentiation used in the anticipation algorithm. This signal is the basis for speed dependent mode changes. Anticipated engine speed leads the actual speed during accelerations and decelerations, allowing mode transitions to be executed before the actual engine speed reaches the predetermined cylinder and valve mode transition speed. The third and fourth plots from the top show the requested mode and the target mode. The requested mode leads the target mode. This lead time allows the transmission torque converter to begin slipping so that the torque disturbance of a cylinder and valve mode change is dampened in the vehicle driveline. Referring to FIG. 29, a plot shows engine torque capacity of a V8 engine operating in a variety of cylinder modes. The torque modes shown illustrate the different torque capacity of an engine as cylinders are deactivated and the number of cylinder strokes is increased. Further, additional torque capacities could be shown for specific valve modes. For example, two valve V8 operation would have a different torque capacity curve than four valve V8 operation. In one example, a strategy of mode transition is employed where a transition between modes is performed before the torque capacity of a given cylinder and valve mode is reached. By doing this, the driver can experience a more continuous torque progression through the various available modes. Referring to FIG. 30, a plot of a torque dependent cylinder and valve mode change by the method of FIG. 10 is shown. The Figure shows four separate plots of signals of interest during a torque dependent mode change. The top plot shows actual desired engine torque referenced to time. Engine torque starts at approximately 100 N-M and is ramped up to 200 N-M then ramped back down to 100 N-M. The third plot of requested mode verses time shows engine torque dependent mode hysteresis and filtering of desired torque. That is, a mode request is initiated at 130 N-M for increasing desired engine torque and another mode request is initiated at 110 N-M for decreasing desired engine torque that is also delayed in time. The engine torque cylinder and valve mode transition points for increasing and decreasing desired engine torque are calibrated as desired. The second plot from the top is a plot of anticipated and filtered desired engine torque (anticipated torque when desired torque increases and filtered torque when desired engine torque decreases). Notice, anticipated and filtered torque leads desired torque for increasing desired engine torque and lags, due to filtering, decreasing engine torque. The third and fourth plots from the top show the requested mode and the target mode. Notice, that the requested mode leads the target mode. Also, the requested mode transition during decreasing desired torque occurs long the after desired engine torque reaches 100 N-M. This lead time allows the transmission torque converter to begin slipping so that the torque disturbance of a cylinder and valve mode change is dampened in the vehicle driveline. The calibration of the filter time constant and the torque hysteresis allows the mode transition logic to avoid multiple mode transitions if the driver rapidly cycles the accelerator pedal 119. Referring to FIG. 31, a plot of independent speed and torque based cylinder and valve mode changes initiated by the method of FIG. 10 is shown. The top plot shows anticipated engine speed while the second plot shows anticipated and filtered desired engine torque. The third plot from the top shows the actual desired mode change request. The first mode transition, labeled #1, is based on anticipated engine speed alone. The second, third, fourth, and fifth transitions are based on anticipated engine speed and desired anticipated filtered engine torque. The competing engine speed and torque requests are thus able to be handled by the mode selection approach. While electromechanically actuated valves present various opportunities to increase fuel economy and engine performance, they can also improve engine starting, stopping, and emissions in other ways. FIG. 32 illustrates a method to improve engine starting by controlling intake and exhaust valves. As one example, electromechanically actuated valves allow the ability to select the first cylinder to carry out combustion during a start. In one example, at least during some operating conditions, a consistent cylinder is selected for performing the first combustion, which can provide reduced emissions. In other words, when an engine is started on the same cylinder, at least during two subsequent starts under selected conditions, variation in the amount of fuel delivered into each cylinder during a start can be decreased. By beginning fuel injection in the same cylinder, unique fuel amounts can be repeatedly delivered into each cylinder. This is possible because fuel may be scheduled from the same reference point, i.e., the first cylinder selected to combust an air-fuel mixture. In general, because of packaging constraints, no two cylinders have identical intake ports in a multi cylinder engine. Consequently, each cylinder has a unique fuel requirement to produce a desired in cylinder air-fuel mixture. Fortunately, one example of the method described herein allows fuel injected into each individual cylinder to be tailored to each unique port geometry, port surface finish, and injector spray impact location, thereby, reducing air-fuel variation and engine emissions. In another example, to reduce wear caused by repeatedly carrying out a first combustion, the cylinder selected for repeatedly carrying out the first combustion is varied. It can be varied based on various sets of operating conditions, such as a fixed number of starts, engine temperature, a combination thereof, or others. Thus, for a first number of starts, cylinder 1 is repeatedly used to start the engine. Then, for a second number of starts, another cylinder (e.g. a first available cylinder, or the same cylinder such as cylinder number 2) is repeatedly used to start the engine. Alternative, a different cylinder is selected based on engine or air temperature. In still another example, different cylinders for starting are selected based on barometric pressure (measured or estimated, or correlated to other parameters that are measured or estimated). Referring to FIG. 32, in step 3210, the routine determines if a request to start the engine has been made. A request may be made by an ignition switch, a remotely transmitted signal, or by another subsystem, e.g., a voltage controller of a hybrid power system. If not, the routine exits. If so, the routine proceeds to step 3212. In step 3212, all exhaust valves are closed. The valves may be simultaneously closed or may be closed in another order to reduce power supply current. Also, in an alternative embodiment, less than all of the exhaust valves can be closed. The closed valves remain closed until a combustion event has occurred in the respective cylinder of the valves. That is, the exhaust valve for a cylinder remains closed until a first combustion event has occurred in the cylinder. By closing the exhaust valve, residual hydrocarbons can be prevented from exiting the cylinder during engine cranking and run-up (a period between cranking and before achieving a substantially stable idle speed). This can reduce emitted hydrocarbons and thereby can reduce vehicle emissions. The routine then proceeds to step 3214. In addition, intake valves may be set to a predetermined position, open or closed. Closing intake valves during cranking increases pumping work and starter motor current, but can trap hydrocarbons in a cylinder. Opening intake valves during cranking decreases pumping work and starter motor current, but may push hydrocarbons into the intake manifold. As such, various combinations of open and closed intake valves can be used for example. In another example, closed intake valves are used. And, in still another example, open intake valves are used. The descriptions of FIGS. 49-53 provide detailed explanations of additional valve sequencing embodiments that may be used to start an engine by the method of FIG. 32. Alternatively, all exhaust valves may be set to an open position and the intake valves set to a closed position until engine position is established. Then exhaust valves in respective cylinders are closed at bottom-dead-center of piston travel and intake valves are operated based on a desired combustion order. The exhaust valves are operated after a first combustion event in the respective cylinders based on the desired engine cycle. Hydrocarbons are pumped out of a cylinder and then drawn back into the cylinder, being combusted in a subsequent cylinder cycle by this method. This can reduce emitted hydrocarbons when compared to mechanical four-stroke valve timing. In step 3214, the engine is rotated and engine position is determined by evaluating the engine position sensor 118. A sensor that can quickly identify engine position can be used to reduce engine crank time and is therefore preferred. The routine then proceeds to step 3216. In step 3216, engine indicated torque, spark advance and fuel are determined by the method of FIG. 10. The engine is started using a predefined desired engine brake torque, engine speed, spark advance, and Lambda. Lambda is defined as follows: Lambda ⁡ ( λ ) = Air Fuel Air Fuel stoichiometry This is in contrast to conventional engines that are started by matching the fuel to an engine air amount estimate that is based on fixed valve timing. The method of FIG. 10 adjusts valve timing and spark angle to produce the desired torque and engine air amount. By adjusting the valve timing and/or lift to meet torque and air amount requirements during cranking and/or starting, the engine can be made to uniformly accelerate up to idle speed, start after start, whether at sea level or altitude. FIGS. 35 and 36 show example valve timing for producing uniform sea level and altitude engine starts. Further, the method of FIG. 32 can reduce variation in the mass of air and fuel required to start an engine. Nearly the same torque can be produced (if desired) at altitude and sea level by adjusting valve timing, injecting an equal amount of fuel, and similar spark timing. Only small adjustments for altitude are made to compensate for fuel volatility and engine back pressure differences. The method continues on to step 3218. Providing uniform engine starting speeds can also be extended to engine strategies that are not based on engine torque. For example, a predetermined target engine air amount may be scheduled based on a number of fueled cylinder events and/or engine operating conditions (e.g., engine temperature, ambient air temperature, desired torque amount, and barometric pressure). The method of step 222 uses the ideal gas law and cylinder volume at intake valve closing timing to determine the valve timing and duration. Next, fuel is injected based on the target engine air amount and is then combusted with the inducted air amount. Because the target engine air amount is uniform or nearly uniform between sea level and altitude, valve timing adjustments are made while the fuel amount remains nearly the same (e.g. within 10%). In another example, a target fuel amount based on the number of fueled cylinder events and/or engine operating conditions (e.g., engine temperature, ambient air temperature, catalyst temperature, or intake valve temperature) may also be used to start an engine. In this example, a cylinder air amount based on the target cylinder fuel amount is inducted by adjusting valve timing to achieve the desired air-fuel ratio. The desired air-fuel ratio (e.g., rich, lean, or stoichiometric) is then combusted to start the engine. In addition, spark advance may be adjusted based on the cylinder air amount, valve timing may be further adjusted based on ambient air temperature and pressure, and fuel may be directly injected or port injected using this starting method. Note that while it may be desirable to provide uniform engine starting speeds under various conditions, there may be conditions in which other approaches are used. Further, it may be desired to provide a desired air amount during a start based on an operating condition of an engine by adjusting valve timing based on engine position and desired cylinder air amount, or a desired torque, etc., even if a consistent engine speed trajectory is not used. In step 3218, the routine determines if combustion will be initiated in a predefined cylinder or in a cylinder that can complete a first intake stroke (e.g. a first available cylinder for combustion). If combustion is selected in a predefined cylinder the cylinder number is selected from a table or function that may be indexed by an engine operating condition or engine characteristic. By selecting a cylinder to begin combustion, and by selecting the first combusting cylinder based on engine operating conditions, (start after start if desired) engine emissions can be improved. In one example, if a four-cylinder engine is started at 20° Celsius, cylinder number one may be selected to produce a first combustion event each time the engine is started at 20° Celsius. However, if the same engine is started at 40° Celsius, a different cylinder may be selected to produce a first combustion event, this cylinder may be selected each time the engine is started at 40° Celsius, or alternatively, a different cylinder may be selected depending on engine control objectives. Selecting a starting cylinder based on this strategy can reduce engine emissions. Specifically, fuel puddles are commonly created in intake ports of port fuel injection engines. The injected fuel can attach to the intake manifold walls after injection and the amount of fuel inducted can be influenced by intake manifold geometry, temperature, and fuel injector location. Since each cylinder can have a unique port geometry and injector location, different puddle masses can develop in different cylinders of the same engine. Further, fuel puddle mass and engine breathing characteristics may change between cylinders based on engine operating conditions. For example, cylinder number one of a four-cylinder engine may have a consistent fuel puddle at 20° Celsius, but the puddle mass of cylinder number four may be more consistent at 40° Celsius. This can occur because the fuel puddle may be affected by engine cooling passage locations (engine temperature), ambient air temperature, barometric pressure, and/or a characteristic of the engine (e.g., manifold geometry and injector location). Also, the location and temperature of a catalyst may also be used to determine a first cylinder to combust. By considering the location and temperature of a catalyst during a start engine emissions can be reduced. For example, in an eight cylinder, two bank engine, it may be beneficial to produce a first combustion event in cylinder number four (bank one) for one of the above-mentioned reasons. On the other hand, after the engine is warm, it may be beneficial to start the same engine on cylinder number five (bank two) if the catalyst in bank two is located closer to cylinder number five, compared to the catalyst in bank one, relative to cylinder number four. The closer and possibly warmer catalyst in bank two may convert hydrocarbons, produced during a higher temperature start, more efficiently, compared to the catalyst in bank one. In addition, engine hardware characteristics may also influence selection of a first cylinder to combust. For example, cylinder location relative to a motor mount, and/or oxygen sensor location may be factors at one set of engine operating conditions and may not be used as factors at a different set of engine operating conditions. This strategy may be used if a cylinder selected for a first combustion event reduces engine noise and vibration at a lower temperature, but another cylinder has improved characteristics at a different temperature. Also, the amount of lost fuel, fuel that is injected into a cold engine but not observed in exhaust gases due to fuel puddles and migration into the crankcase, can change each time a cylinder combusts due to cylinder ring expansion. Further, the amount of lost fuel in a specific cylinder may change depending on the engine operating conditions. Therefore, it can be beneficial to select one cylinder for a first combustion event based on one set of engine operating conditions, and to select a different cylinder for a first combustion event based on a second set of operating conditions. Then, individual fuel amounts can be delivered to individual cylinders, in the same order, starting with the first cylinder to combust, such that fuel amount variability may be reduced. Thus, the same fuel amount can be injected into the same cylinder that has nearly the same (such as within 1%, within 5%, or within 10%) puddle mass, start after start. Thus, it may be beneficial to select and/or change a first cylinder to combust, during a start, based on engine operating conditions and/or engine characteristics. Note that combustion can also be started in multiple cylinders, if desired. Also, in an engine of “I” configuration, i.e., I4 or I6, selecting a predetermined cylinder located closest to the flywheel or near the center of the engine block can reduce torsional vibration created by crankshaft twist during a start, at least under some conditions. Crankshaft twist is a momentary angular offset between the crankshaft ends that may occur during a start due to engine acceleration. Generally, the first cylinder to fire inducts a high air charge in an effort to accelerate the engine from crank to run speed, thereby producing a large acceleration. If an engine is started on a cylinder that is furthest from the location of the engine load, i.e., the flywheel, the crankshaft may twist due to the force exerted on the crankshaft by the piston and the distance from the combusting cylinder to the load. Therefore, selecting a predetermined cylinder that is located closest to the engine load or that has more support, i.e., a location central to the engine block, can reduce engine vibration during a start. And, by selecting a cylinder to start an engine on that reduces vibration, customer satisfaction may be improved. However, selecting a predetermined cylinder closest to the flywheel in which to carry out a first combustion event may increase engine crank time given a conventional mechanically constrained valve train. Nevertheless, an engine with electromechanical valves is not mechanically constrained. Rather, engine valve timing can be adjusted to create an intake stroke on the first cylinder, closest to the engine flywheel, where the piston is capable of producing a vacuum in the cylinder. For example, this can be the cylinder closest to the flywheel with a downward moving piston where sufficient vacuum is created to pull the injected fuel into the cylinder, enabling an engine output to be produced. Subsequent combustion can then proceed based on conventional four-stroke valve timing. Thus, in one example, after processing a signal indicative of an engine start (or engine position), the routine sets an intake stroke on the first cylinder with sufficient piston downward movement to produce an engine output (e.g., engine torque, or a desired cylinder charge). Once this is set, the remaining cylinders can have their respective valve timings positioned relative to the set intake stroke of said cylinder. Then, the first combustion can be carried out in the first cylinder with sufficient piston downward movement, and subsequent combustion can be carried out in the remaining cylinder based on the position valve timings in the selected firing order. Returning to FIG. 32, if combustion is desired in a predefined cylinder the routine proceeds to step 3222. If combustion in a predefined cylinder is not desired the routine proceeds to step 3220. In step 3220, the routine determines which cylinder can capture or trap the desired cylinder air amount first. The position of a piston and its direction of motion, up (traveling toward the cylinder head) or down (traveling away from the cylinder head) can also factor into this determination, as indicated below in the description of FIG. 54. By selecting a cylinder that is capable of first capturing the desired cylinder air amount, starting time can be reduced. Alternatively, selecting a cylinder capable of a first combustion event may also reduce engine starting time. However, engine starting speed and emissions variability can be affected. The type of fuel injection can also affect the cylinder selection process. Port fueled engines rely on an intake stroke to induct fuel and air into a cylinder. However, late intake valve closing is also possible but inducting the desired cylinder fuel amount can be more difficult. Therefore, selecting a cylinder for a first combustion event, for a port injected engine, can be defined by a capacity of a cylinder to induct both air and fuel. On the other hand, direct injection engines inject fuel directly into the cylinder providing an opportunity to combust fuel with air that is trapped by closing the intake and exhaust valves. Given a sufficient trapped volume of air, an intake cycle of the valves may not be necessary to facilitate combustion in a cylinder because air trapped in the cylinder can be mixed with fuel that is directly injected into the cylinder. Therefore, engine valve timing can be adjusted based on engine position to facilitate combustion in the first cylinder, nearest the flywheel, capable of capturing and compressing a desired air amount. In addition, engines commonly have two pistons that are in the same cylinder position, relative to one another. Combustion in the cylinders can be defined by selecting the appropriate valve timing for the respective cylinders. Since electromechanical valves can be operated without regard to crankshaft position, an engine control strategy can select which of the two cylinders will combust first by applying the appropriate valve timing. Therefore, in step 3220, the strategy selects a cylinder based on its ability to capture a desired cylinder air amount and then sets the appropriate valve timing between competing cylinders. For example, a four-cylinder engine with pistons in cylinders 1 and 4 in position to complete a first induction stroke, cylinder 1 is selected to produce a first combustion event. In addition, example criteria to select one of two cylinders competing for a first combustion event include cylinder position, starting noise and vibration, and cylinder air-fuel maldistribution. For example, in a four-cylinder engine, cylinder number four is located closest to the engine flywheel. The crankshaft may experience less twist during a start if cylinder four fires before cylinder one. This may reduce engine noise and vibration during a start. In another example, a certain cylinder may be located closer to engine mounts. The proximity of a cylinder to engine mounts may also influence which cylinder to select for a first combustion event. In yet another example, manufacturing processes and/or design limitations may affect air-fuel distribution in cylinders of an engine. Selecting a cylinder based on engine characteristics may improve air-fuel control during a start. The routine continues on to step 3222. In step 3222, fuel is injected based on engine position and desired torque, spark, and Lambda from step 3216 above. In the method of FIG. 32, fuel can be injected on open or closed valves, delivered to all cylinders at the same time, or be delivered to individual cylinders in individual amounts. However, in one example, fuel is preferentially injected on an individual cylinder basis so that the fuel amount can be tailored to a cylinder event. The period of the cylinder event signal is the crank angle duration wherein a cycle of a cylinder repeats, in the case of a four-stroke cylinder cycle a cylinder event in degrees is: 720/number of engine cylinders. In one example, fuel is injected based on the number of fueled cylinder events and controlled individual cylinder air amounts are used to improve engine air-fuel control. By controlling individual cylinder event air amounts and counting the number of fueled cylinder events, then delivering the amount of fuel based on the number of fueled cylinder events counted and cylinder event air amounts, engine starting can be improved. In other words, since engine air amount can be controlled during a start and since the amount of fuel to achieve a desired air-fuel ratio changes based on the number of fueled cylinder events, fuel delivery based on the number of cylinder events and individual cylinder air amounts can improve engine air-fuel control. Consequently, fueling based on fueled cylinder events and controlling individual cylinder air amounts can be used to lower engine emissions and to provide uniform engine run-up speed during starting. Furthermore, engine fuel requirements can be a function of the number of fueled cylinder events rather than solely based on time. Cylinder events can be associated with mechanical dimensions; time is a continuum, which lacks spatial dimensions and linkage to the physical engine. Therefore, engine fueling based on the number of fueled cylinder events can reduce the fuel variation associated with time based fueling. Typically, the amount of fuel injected in step 3222 produces a lean mixture during cold starts. This can reduce hydrocarbons and catalyst light off time. However, the amount of fuel injected may also produce a stoichiometric or rich mixture. The routine proceeds to step 3224. In step 3224, the valves are operated starting with setting the stroke (intake) of the cylinder selected to produce a first combustion event. Alternately, another stroke (exhaust, power, compression) may be set in the first cylinder selected to combust. Depending on the valve train configuration (e.g., full electromechanical or a mechanical/electromechanical hybrid), and the control objectives (e.g., reduced emissions or reduced pumping work, etc.), valves are sequenced based on a predetermined order of combustion, see FIGS. 33-34 and 49-53 for example. Typically, during starting, all cylinders are operated in a four-stroke mode to reduce engine emissions and catalyst light off time. However, multi-stroke or a fraction of the total cylinders may also be used during starting. The routine proceeds to exit. FIGS. 33a and 33b are plots that show representative intake and exhaust valve timing at a relatively constant desired torque, spark, and Lambda for a four-cylinder engine operated in four-stroke mode by the method of FIG. 32. Valve opening and closing positions are identified by a legend on the left side of the valve sequences, O for open and C for closed. At key on, or at an operator generated signal indicative of a request to start the engine, electromechanically controlled intake and exhaust valves are set to a closed position from the deactivated mid position. Alternatively, intake valves may also be set to an open position in respective cylinders until the onset of a first intake event to reduce cranking torque and starter current. In this illustration, cylinder 1 is the cylinder selected for a first combustion event, but cylinder 3 or 2 may be selected if a quicker start is desired. Once the first cylinder for combustion is selected and the first induction event occurs, the remaining cylinders follow with four-cylinder, four-stroke, engine valve timing, i.e., 1-3-4-2. In the sequence, exhaust valves are set to a closed position and remain in a closed position until a combustion event has occurred in the respective cylinder. The exhaust valves begin operation at the shown exhaust valve timing thereafter. By closing exhaust valves until combustion has occurred in a cylinder, hydrocarbons from engine oil and residual fuel are captured in the cylinder and combusted in the first combustion event. In this way, the amount of raw hydrocarbons expelled into the exhaust system can be reduced. Further, the combusted hydrocarbons can provide additional energy to start the engine and warm a catalyst. In addition, cylinders with mechanical valve deactivators may deactivate exhaust or intake valves in a similar manner to produce similar results. FIGS. 34a and 34b, are plots that show representative intake valve timing for two engine starts, at different engine positions, of a four-cylinder engine by the method of FIG. 32. Cylinder 1 is selected as the starting cylinder and the engine is started at a substantially constant desired torque, spark, and Lambda (although in alternative examples, these can be variable). Valve opening and closing positions are identified by a legend on the left side of the valve sequences, O for open and C for closed. At key on, intake and exhaust valves are set to a closed position from the deactivated mid position. Alternatively, intake valves may also be set to an open position in respective cylinders until the onset of a first intake event to reduce cranking torque and starter current. From top to bottom, the first four valve timing events are for start #1, the second four valve timing events are for start #2, cylinder position is shown for start #1, and cylinder position is shown for start #2. The figure shows an engine stop position for start #1 that is approximately 50 degrees after top dead center of cylinders 1 and 4. Also, the plot of cylinder 1 shows from piston position that the piston is already partially through its downward stroke motion. Key on occurs at this point, and fuel could be injected at this point on an open valve so that the mixture would then be compressed and combusted as the piston travels up in the following stroke. However, engine cranking speed at this point may be low because of engine inertia and friction which may lead to poor fuel atomization and combustion. Therefore, the engine controller, in this example, waits to open the intake valve until an entire intake stroke of cylinder 1 can be completed, roughly 280 engine crank angle degrees. The remaining cylinder valve events follow cylinder 1 in the combustion order illustrated. On the other hand, the first valve event of start #2 is approximately 180 degrees after key on. The valve event occurs earlier because the engine stop position permits a full intake stroke in cylinder #1 earlier than the engine stop position of start #1. Start #2 also shows how to align valve timing for a strategy that selects a cylinder for a first combustion event based on a cylinder that can complete a first full induction stroke. Cylinders 1 and 4 are the first cylinders capable of a full intake stroke because of the engine stop position. Pistons 2 and 3 are 180 degrees out of phase with pistons 1 and 4 and are therefore partially through a downward stroke in the engine stop position. Valve timing can be adjusted for direct injection (DI) engines using the same principles. For example, fuel is injected into a cylinder of a DI engine. Further, a cylinder that is selected for a first combustion event could also be based on piston position and direction of movement. Then the intake valve timing of the first cylinder can be adjusted to achieve a desired torque. However, fuel injection is not constrained in a DI by valve timing; Therefore, the desired engine air amount may be obtained by adjusting valve timing to open the intake valve before or after bottom dead center of an intake stroke. FIGS. 35a and 35b are plots of representative intake valve timing during an engine start at sea level and a plot that shows representative intake valve timing during an engine start at altitude by the method of FIG. 32. For simplicity of explanation, both starts begin at the same engine starting position and represent valve timing that follows a desired torque request that is used for both altitude and sea level. Substantially the same torque request is scheduled for altitude and sea level so that the fuel delivery remains nearly constant between altitude and sea level. However, as noted above, different torque requests could also be used, if desired. In contrast, a conventional engine adjusts the amount of fuel delivered based on an engine air amount, which differs between sea level and altitude due to variations in barometric pressure. This may result in different starting torque between sea level and altitude starts, resulting in different starting speeds between altitude and sea level. The change in engine speed and in the amount of fuel injected can then lead to air-fuel and emissions differences between sea level and altitude. By adjusting valve timing as shown in FIG. 35 so that engine torque and air amount is nearly the same between altitude and sea level (e.g., within 1%, 5%, or 10%), variation of air-fuel ratio and engine emissions between altitude and sea level are reduced. And while previous hydraulic VCT systems were able to adjust valve timing, these actuators typically were not functional during a start (since there was little to no hydraulic pressure available). Thus by using electric valves, improved starting can be obtained. The engine start #1 of FIG. 35a is at sea level and begins with a longer valve event so that the engine will accelerate quickly from crank. The subsequent valve events are shorter as engine friction decreases and less torque is necessary to bring the engine up to idle speed. After the first four events, the valve duration remains substantially constant reflecting a substantially constant torque demand (although if torque demand changed, the durations could change, for example). Also, in one alternative, the valve opening durations can begin to decrease after the first event. Alternatively, decreasing valve duration may be carried out over a fewer or greater number of cylinder events. Further, the engine desired torque might change due to cold start spark retard or from combusting lean air-fuel mixtures. The engine start #2 is at altitude and begins with a longer valve event, when compared to the sea level valve event, so that the engine will accelerate at approximately the same rate from crank. The subsequent valve events are longer than the corresponding sea level valve events, but shorter than the initial valve event for the above-mentioned reasons. Referring to FIG. 36, a plot representative of cylinder #1 valve events at altitude and sea level along with representative desired torque request and engine speed trajectories is shown. The plot shows example engine starting differences between starting at sea level and altitude, while obtaining a uniform engine speed with little over-shoot that remains steady after idle speed is reached. Maintaining these engine speed and torque trajectories between altitude and sea level can reduce air-fuel variability and emissions. Further, the driver experiences more consistent engine performance during a start, and therefore customer satisfaction can be improved. Also, valve timing can be adjusted for direct injection (DI) engines using the same principles. For example, fuel can be injected into a cylinder of a DI engine based on piston position and direction of movement, after valve timing has been adjusted to achieve a desired torque at the present altitude. Referring to FIG. 37, a flowchart of a method to control valve timing after a request to stop an engine or to deactivate a cylinder is shown. In step 3710, the routine determines if a request has been made to stop the engine or deactivate one or more cylinders. The request may be initiated by the driver of the vehicle or from within the vehicle control architecture, such as a hybrid-electric vehicle. If a request is present the routine proceeds to step 3712. If no request is present the routine proceeds to exit. In step 3712, fuel is deactivated to individual cylinders based on the combustion order of the engine. That is, fuel injections that are in progress complete injection, and then fuel is deactivated. Further, calculations that determine the cylinder port fuel puddle mass continue and the intake valve duration is adjusted in step 3714 to produce the desired air-fuel ratio. Fuel puddle mass is determined with the method in accordance with U.S. Pat. No. 5,746,183 and is hereby fully incorporated by reference. The fuel mass after the last injection is determined from: m p ⁡ ( k ) = τ τ + T · m p ⁡ ( k - 1 ) Where mp is the mass of the fuel puddle, k is the cylinder event number, τ is a time constant, and T is sampling time. Subsequent fuel puddle mass is obtained from: Δ ⁢ ⁢ m p = m p ⁡ ( k ) - m p ⁡ ( k - 1 ) = m p ⁡ ( k - 1 ) · ( - T τ + T ) Where Δmp is the fuel puddle mass entering a cylinder. Alternatively, a predefined puddle mass or a puddle mass determined from a look-up table can be substituted for the puddle mass entering a cylinder. In addition, spark may be adjusted in this step based on the request to stop the engine. Preferably, spark is adjusted to a value retarded from MBT to reduce engine hydrocarbons and increase exhaust heat. For example, adjusting spark during shut-down, catalyst temperature may be increased so that if the engine is restarted sometime soon, higher catalyst conversion efficiency may be achieved, due to a higher catalyst temperature. In another example, retarding spark during engine shut-down may reduce evaporative emissions. Since hydrocarbon concentrations in exhaust gas may be reduced, exhaust gases that escape to the atmosphere during an engine stop may have fewer hydrocarbons. Thus, in some examples, during an engine shut-down operation, computer readable code can be used to retard ignition timing on at least one of a group of final combustion events during the shut-down to increase exhaust temperature thereby improving emissions on a subsequent engine re-start. In one example, upon receiving a command to shut-down the engine, one or several combustion events are still carried out, e.g., 1, 2, 3, 4, or a range of combustion events depending on operating conditions, e.g., 1-5, 1-3, 1-2, etc. By adjusting the ignition timing of at least some of these (e.g., the last one, the last two, one of the last two or three), it is possible to improve later re-starts that are performed before the catalyst has cooled. Further, as noted above, adjusting of exhaust (or intake) valve opening and/or closing timing (or lift) can also be used (or alternatively used) to further increase exhaust gas heat to the catalyst during a shut-down. In step 3714, valve timing is adjusted. Upon indication of a request to stop or cylinder deactivation, intake and exhaust valve timing can be adjusted. The intake valve opening (IVO) is moved to the engine position where a high intake port velocity is obtained, typically 45 degrees after the intake stroke begins. Moving the valve opening position to this location draws more fuel into the cylinder from the intake port puddle for a last combustion event. This can reduce the fuel puddle when the cylinder is deactivated or when the engine is stopped. Furthermore, a smaller fuel puddle contributes less fuel to a cylinder when the engine is restarted, thereby leading to more accurate air-fuel control during a start. The routine proceeds to step 3716. In step 3716, fuel mass and valve opening location are then substituted into the method of FIG. 2 which then determines valve opening duration and spark. The valves are operated with adjusted timing for at least an intake event, but may be operated longer if desired. Furthermore, the intake valve opening is typically adjusted to a location of between 30 and 180 crank angle degrees after top-dead-center of the intake stroke. The intake valve closing timing can also be adjusted to compensate air charge differences that may result from adjusting intake valve opening timing. The cylinder air-fuel mixture during engine shut-down may be lean, rich, or stoichiometric depending on control objectives. In addition, the exhaust valves and spark advance may also be adjusted during engine shut-down. For example, exhaust valves are adjusted to an opening location of between 0 and 120 crank angle degrees after top-dead-center of the exhaust stroke. When this exhaust valve timing is combined with a spark angle adjustment, additional heat can be added to the catalyst prior to engine shut-down. As mentioned above, this can increase catalyst temperature in anticipation of a subsequent start. Further the exhaust valve closing timing can also be adjusted based on the adjusted exhaust valve opening time. The routine then exits. Referring to FIG. 38, an example of a representative intake valve timing sequence during a stop of a four-cylinder engine is shown. The valve sequences begin on the left-hand side of the figure where the valve crank angle degrees are marked relative to top-dead-center of the combustion stroke of respective cylinders. The intake valves open at the end of the exhaust stroke indicating internal EGR flow into the cylinder. At an indication of a shut down request, the vertical line, intake valve timing is adjusted for the first cylinder where fuel injection is deactivated after the shut down request, cylinder 1 in this example. Both the valve opening and valve duration are adjusted. The valve duration adjustment is based on an estimated fuel puddle fraction that enters the cylinder. The valve duration adjustment provides the desired exhaust air-fuel ratio. Alternatively, valve opening location can be adjusted along with scheduling a stoichiometric or lean final injection before deactivating fuel injection. Further, before fuel injection is deactivated, a specific number of injections can be scheduled coincident with the valve opening position adjustment. The figure illustrates three induction events after the valve timing adjustment is made. However, fewer or additional combustion or even non-combustion cylinder events after each intake event can be used. Referring to FIG. 39, a method of restarting electromechanical valves in an internal combustion engine is shown. In some cases, electromechanical valve actuators contain mechanical springs and electrical coils that act as electromagnets, both of which are used to regulate valve position. However, during cylinder operation pressure in a cylinder may work for or against valve operation. For example, exhaust valves overcome cylinder pressure to open, but are assisted by cylinder pressure when closing. As a result, capturing current, current necessary to overcome spring force, and holding current, current that holds a valve open or closed, varies with operating conditions of the engine. The method described herein can restart a valve in and internal combustion engine if a predetermined current does not overcome an opening or closing spring force, permitting the valve to open or close during a cycle of the cylinder. In an inactive state (no applied voltage or current), the mechanical springs position valves in a mid position that is partially open. The valves can also assume the mid position if conditions in an engine do not permit the predetermined current to open or close the valve, i.e., the valve trajectory (position) deviates from a desired path. If the path of a valve deviates from the desired valve trajectory, one or more attempts may be made to restart the valve so that it can resume the desired trajectory. One approach is described below. Valve trajectory may be determined directly from sensor measurements, sensor 50 for example, or by inference from crankshaft position. Specifically, the following method can be applied to each electromechanical valve in an engine to provide for valve restarting. Thus, the variables of FIG. 39 are arrays that contain data for each of the respective valves, although it can be applied to a subset of valves, or a single valve, if desired. In step 3910, valve trajectory is read from valve position sensor 51 and is evaluated to determine if an error in valve trajectory has occurred. Valve position sensor 51 may be a discrete or continuous position sensor. Desired valve position and current are determined by interrogating four matrices that contain look-up pointers for desired valve trajectories and associated currents. Matrices FNVLVCURO and FNVLVCURC hold numerical pointers that identify valve current vectors for valve opening and closing respectively. Matrices FNVLVPOSO and FNVLVPOSC hold numerical pointers that identify valve position for valve opening and closing respectively. Both the position and current matrices are indexed by engine speed and load. The pointers contained within the matrices then determine a specific vector that contains position or current information based on the valve position regions designated in FIG. 40, CL_pos_set and CL_cur_set respectively. A separate valve control method accesses CL_cur_set to actuate the electromechanical valves. If an error in valve trajectory is determined the routine proceeds to step 3912. If no trajectory error is determined the routine proceeds to step 3932. In step 3912, predetermined current is applied to close the off-trajectory valve. The applied current is an upper current limit based on the valve and power supply. Alternatively, the valve may be moved to an open or mid position. In addition, a variable that represents the number of on-trajectory valve openings and closings, Vlv_cnt, is zeroed. Further, fuel injection into the cylinder housing the off-trajectory valve may be disabled until the valve has completed a predetermined number of on-trajectory operations. The method proceeds to step 3914. In step 3914, the routine determines if the off-trajectory valve has closed. If the valve has closed, the routine proceeds to step 3916. If the valve has not closed the routine proceeds to step 3930. Alternatively, steps 3912 and 3914 can be eliminated. In this case, if a valve is off-trajectory, valve current will be increased in the region where the trajectory error was detected. The valve will stay in a mid position until a command to open or close the valve is given based on the base valve timing. In other words, the current that drives the off-trajectory valve is increased in the region of the detected trajectory error, but the valve is restarted by the base valve timing, e.g., the valve timing based on desired torque and engine operating conditions. In step 3930, deactivation of the off-trajectory valve and of the cylinder containing the valve occurs. The cylinder and valve are deactivated by the cylinder and valve mode selection method of FIG. 10. The cylinder number containing the degraded valve is loaded into variable CYL_DEG during step 3930 and is passed to step 1528 of FIG. 15. The routine then exits. In step 3916, valve current, CL_cur, is compared against a predetermined variable, cur_lim. Each region of the valve trajectory profile, as illustrated in FIG. 40, begins at a predefined current level. If a valve trajectory error occurs, valve current in all the regions of an opening (R1-R4) or closing (R4-R7) valve event is increased, steps 3930 and 3922. In addition, valve operation is resynchronized with engine timing. For example, valve timing is aligned with the desired cycle of the respective cylinder. Further, the resynchronization may be attempted after a predetermined number of cylinder cycles. If the valve does not follow the desired valve trajectory and the valve current in each region is greater than cur_lim, the routine proceeds to step 3918. If the valve current is less than cur_lim the routine proceeds to step 3920. In step 3918, the number of valve restart attempts at a current level of cur_lim, Rcl_dec, is compared to a predetermined variable, Rcl_deg_lim. If the number of restart attempts is greater than Rcl_deg_lim, the routine proceeds to step 3930. If the number of restart attempts is less than Rcl_deg_lim the routine proceeds to step 3924. This decision logic allows the routine to make a predetermined number of valve restart attempts before deactivating the cylinder and valve. In step 3924, a count representing the number of valve restart attempts at the current amount in the cur_lim variable is incremented. Each time the routine executes this logic the variable Rcl_deg is incremented. This variable allows the routine to deactivate the off-trajectory valve and the cylinder in which it resides to be deactivated if a predetermined number of attempts are exceeded, steps 3918 and 3930. The routine proceeds to exit after incrementing the variable. In step 3920, valve restart attempts are compared to a predetermined value. A variable, Rcl, representing the number of restart attempts at a current amount below cur_lim is compared to a predetermined value, Rcl_lim. If the number of restart attempts is greater than the predetermined value the routine proceeds to step 3922. If the number of restart attempts is less than the predetermined value the routine proceeds to step 3926. In step 3926, a count representing a number of valve restart attempts below a current amount stored in Rcl_lim is incremented. After incrementing Rcl the routine proceeds to step 3928. In step 3928, valve current is adjusted. The before-mentioned valve control current vector, CL_cur_set, is adjusted by a predetermined amount, Δ_adjust_up, each time a valve restart is attempted. Further, if a valve is restarted below the nominal engine operating temperature, CL_adjust is not adjusted, but valve current compensation based on temperature, Vt_adjust, is incremented by a predetermined amount at the temperature where the valve restart attempt is made. The valve current adjustment is adjusted by the equation: CL—cur_set=Vt_adjust·(CL_base_set+CL_adjust) Where CL_cur_set is current vector at the engine operating conditions, Vt_adjust is a function that is indexed by engine or valve temperature, CL_base_set is a vector containing base current amounts, and CL_adjust is a vector of adjustment current amounts at the engine operating conditions. Following the current adjustment the routine exits. In step 3922, valve current is set to a predetermined amount. After attempting to restart an off-trajectory valve a predetermined number of times, CL_cur_set is set to cur_lim. This may allow a valve to restart sooner than by continuing to make small incremental current increases. In addition, a variable vector, Alow, is loaded with the latest value of CL_cur_set. By loading CL_adjust into Alow the routine adapts the valve current based on engine operating conditions. The routine then proceeds to exit. In step 3932, on-trajectory valve event counter is incremented. The number of on-trajectory valve events, openings and closings, Vlv_cnt, is incremented when no trajectory error is detected. By accounting for the number of on-trajectory valve operations the method may reduce valve current from the amount stored in cur_lim. The routine then proceeds to step 3934. In step 3934, valve current is compared to a predetermined amount. If the valve current is greater than the amount stored in cur_lim the routine proceeds to step 3936. If the valve current is less than the amount stored in cur_lim the routine exits. In step 3936, the number of on-trajectory valve events, Vlv_cnt, is compared to a predetermined amount, Vlv_on_traj. If Vlv_cnt is greater than Vlv_on_traj the routine proceeds to step 3938. If Vlv_cnt is less than Vlv_on_traj the routine exits. In step 3938, valve current, CL_cur_set is adjusted to a lower amount. After a predetermined number of on-trajectory valve events the valve current is lowered by a predetermined amount, Δ_adjust_dn. By lowering the valve current after a predetermined number of on-trajectory events the routine can quickly restart valves and then locate a current amount that operates the valve while decreasing electrical losses and improving fuel economy. Therefore, step 3938 provides a current adapting operation for the routine. The routine then exits. Referring to FIG. 40, a plot of valve trajectory regions during an opening and closing valve event is shown. In the method of FIG. 39, valve trajectories during opening and closing events are compared to predefined valve trajectories such as those shown in FIG. 40 to determine valve error trajectories. The valve trajectory is separated into seven regions, regions 1-4 describe valve opening and regions 4-7 describe valve closing. By comparing regions of the valve trajectory for valve trajectory errors, the valve restart method can increase or decrease valve current in specific regions. This allows the method of FIG. 39 to adjust valve current in a desired region without increasing valve current in other regions, thereby improving engine and electrical efficiency. Valve current during valve opening and closing is also separated into regions, similar to those shown in FIG. 40. Valve current in and around valve trajectory error regions can be adjusted to reestablish on-trajectory valve operation. Furthermore, valve trajectories and current amounts can be divided into a fewer or greater number of regions than shown in FIG. 40. Referring to FIG. 41, a plot of an example valve current produced by the method of FIG. 39 is shown. Once a valve trajectory error is indicated, valve current is adjusted slowly and then steps up to CL_lim. Further, after the valve is restarted, the valve current is reduced in the direction of Alow. Referring to FIG. 42, a flowchart of a method to improve individual cylinder air-fuel detection and control is shown. The method takes advantage of the opportunity electromechanical valves present to improve individual cylinder air-fuel detection and control by providing separation, at least under some conditions, between individual cylinder exhaust pressure events. Combustion in a cylinder produces pressures above atmospheric pressure that act on a piston, moving the piston, and expanding the cylinder volume. Exhaust valves open to release cylinder pressure and exhaust the combusted gas mixture. The pressure differential between the exhaust manifold and the end of the tailpipe, which is at atmospheric pressure, causes exhaust to flow from a cylinder head to the tailpipe. The exhaust flow rate is a function of the exhausted cylinder pressure, the exhaust system volume, manifold and pipe geometry, and resistance of elements in the exhaust passage. By increasing the number of crank angle degrees between cylinder combustion events, additional time is provided between combustion events. This allows higher-pressure exhaust gases at the cylinder head to migrate toward the tailpipe, equalizing exhaust system pressure. Since exhaust pressure is the mechanism that carries the combusted exhaust gas information, e.g., air-fuel ratio, the additional space between combustion events reduces the amount of residual exhaust gas from previous combustion events at the oxygen sensor location, FIG. 1, 76. The inventors herein have discovered that electromechanical valves may improve individual cylinder air-fuel separation and control. Electromechanical valves can extend the distance between cylinder vents by altering exhaust valve timing, operating in a multi-stroke cylinder mode while providing the desired amount of engine torque. Also note that in one example, multi-stroke operation can be combined along with varying the number of active valves in the cylinders (or by varying the number of active valves between different cylinder groups operating in multi-stroke), and with deactivating cylinders. Such operation can also improve torque control by enabling finer torque resolution in different modes. The method of FIG. 42 may be integrated into the cylinder and valve mode selection routine, FIG. 10 or alternately, as shown here, as a stand-alone function that repeatedly executes until all cylinders are adjusted at a given engine speed and load. In step 4210, operating conditions are determined. For example, the routine evaluates rates of change in engine speed and desired torque to determine if individual cylinder air-fuel detection and control should be permitted. If high rates of change in engine speed or desired torque occur, the routine is exited because individual cylinder air-fuel detection can become more difficult. In addition, engine temperature and valve operating conditions can further restrict entry into the routing. If stabilized operating conditions are present, the routine proceeds to step 4212, if not, the routine proceeds to exit. In step 4212, cylinder and valve modes to improve individual cylinder air-fuel detection are selected. Based on the desired engine torque, cylinder and valve modes are selected to improve individual cylinder air-fuel detection. The method can choose to modify exhaust valve timing, enter multi-stroke cylinder operation, or deactivate selected cylinders or combinations or sub-combinations thereof. If selected cylinders are deactivated for a period, deactivated cylinders are later reactivated and other cylinders are deactivated. This allows all cylinders to be individually adjusted, if desired, as the routine executes. Alternatively, the cylinder and valve mode may be selected by the method of FIG. 10. If a selected cylinder and valve mode is appropriate for individual cylinder air fuel detection, the routine is executed. In step 4214, cylinder and/or valve mode are set. As discussed above, the routine selects cylinder and/or valve modes from a group of available modes that can increase the separation between cylinder events. This can be accomplished by selecting from the above-mentioned cylinder and valve modes or additionally by grouping combinations of cylinder and valve modes. For example, a 4-cylinder engine may be operated with 2 cylinders in four-stroke mode and 2 cylinders in six-stroke mode. Further, the spark timing, air-fuel ratio, and air charge amounts can be increased or decreased between cylinder groups. These variables allow increased signal to noise ratios in the cylinders being evaluated. For example, air-fuel ratio can be made rich or lean in one group of cylinders and stoichiometric in another group. Alternately, one group compared to another may induct an additional air amount that will increase cylinder pressure. Further, spark adjustments may be made between cylinders groups to balance torque generation between the groups. In addition, grouping valves in different ways enables cylinder specific diagnostics to be performed. For example, all cylinders, with the exception of the cylinder being evaluated, can be operated in a base configuration. The cylinder under evaluation, e.g., the second cylinder group, is operated with additional valves to provide additional flow and potentially a different air-fuel ratio. By operating in this configuration, assessment of the operation of a specific cylinder can be less perceptible than by other methods. Also, different valve patterns in different cylinder groups may also provide an advantage of different cylinders to producing different combustion products at similar torque levels. This permits engine emissions to be adapted to a specific catalyst system. As mentioned above, asymmetric exhaust systems with different catalyst locations between engine bank is one example. Further, different shape catalysts and different catalyst substrate densities can also be compensated. The selected valve and cylinder configuration is activated, then the routine proceeds to step 4216. In step 4216, individual cylinder air-fuel ratios are determined. After the individual cylinder events have been separated, by altered valve timing and/or configurations, a predetermined time is allowed to expire that allows the system to reach an equilibrium condition. Then oxygen sensor sampling is adjusted to correspond to the altered cylinder operation and pressure signal. The sampling is adjusted so that a sample is taken after the peak pressure passes the oxygen sensor. This allows the cylinder pressure of the latest combustion event to push a larger fraction of past combustion event gases out the tail pipe before a sample is taken. Next, the method employs the method of U.S. Pat. No. 5,515,828, which is hereby fully incorporated by reference, to determine individual cylinder air-fuel ratio adjustments. These adjustment amounts may be stored in memory to produce continually adaptive cylinder adjustments. Once individual cylinder adjustment amounts are determined, the routine proceeds to step 4218. In step 4218, engine air or fuel adjustments are made. Because electromechanical valve timing may be adjusted with little restriction, valve timing adjustments may be made to compensate for air-fuel errors. This is accomplished by allowing a small offset between the desired valve timing and the final valve timing. For example, IVC valve timing from FIG. 2, step 226, may be altered by adding an offset to the determined IVC timing, e.g., IVC_final=IVC+ΔIVC. The valve timing adjustment is limited to restrict changes in engine torque production. Alternatively, the amount of fuel delivered to individual cylinders may also be adjusted. Fuel adjustments are made to balance air-fuel in step 220 of FIG. 2. An offset alters the desired lambda value, e.g., LAM_Fin=LAMBDA+ΔLAM. However, step 222 continues to use the base LAMBDA value to determine the desired air charge. This allows fuel changes without significantly affecting air charge and torque production. Fuel amount adjustments are also limited to ensure system robustness. The routine then exits. Referring to FIG. 43, a plot of simulated normalized exhaust mass, which is a function of engine crankshaft angle, from a few of the previously mentioned cylinder and valve modes used to improve air-fuel detection is shown. The first plot shows normalized exhaust mass in a four-cylinder engine operating in four-stroke cylinder mode. The mass traces are generally symmetric, whereas an actual engine may produce slight phase differences at the confluence point because of transmission distance differences in the exhaust system that result from cylinder and sensor location. Also, the signal peaks, indicative of exhausted combustion events, occur at shorter intervals compared to the other plots. The second plot shows a four-cylinder engine operating with four active cylinders in four-stroke mode and with two of the four cylinders with delayed exhaust valve timing. Cylinders with delayed exhaust valve timing combust every other combustion event. This mode provides less signal separation than the modes of the third plot, but all four cylinders are active, providing additional torque capacity. Late exhaust valve opening can increase the crank angle duration between combustion in cylinders with nominal exhaust valve timing and cylinders with retarded exhaust valve timing. However, since four-cylinders combust at the same rate as the first plot, the crank angle duration between cylinders with delayed exhaust valve timing and cylinders having nominal exhaust valve timing decreases. Further, delaying exhaust valve timing can improve cylinder air-fuel mixture identification in cylinders with nominal exhaust valve timing because it can provide additional time for exhaust from previous combustion events to be expelled to the atmosphere. Consequently, the exhaust gas sample may be closer to the actual cylinder air-fuel mixture. The third plot shows a four-cylinder engine operating with 2 active cylinders. Comparing the first plot to the third plot illustrates the separation in the mass peaks. This signal separation can be used to advantage to enable better determination of individual cylinder air-fuel ratios. Again, the separation between cylinder events may add additional time for the exhaust from previous combustion events to be expelled to the atmosphere. FIGS. 44-48 show various alternative embodiment valve/cylinder configurations which can be used with the above described system and methods. Referring now specifically to FIG. 44, a plot shows intake and exhaust events in a cylinder operating in four-stroke cylinder mode, with four valves per cylinder, and the valves operating in a alternating intake/dual exhaust configuration. Valve timing is referenced to top-dead-center of combustion being zero degrees. The top two traces show intake valves opening in an alternating pattern, every other combustion event. That is, intake valve “A” opens every 1440 crank angle degrees, and intake valve “B” opens every 1440 crank angle degrees. Valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between intake valve “A” and intake valve “B” may also be added. The bottom two traces show both exhaust valves opening every 720 degrees. Alternatively, a phase angle difference may be added between exhaust valve events, but in this example both exhaust valves open after a combustion event. This valve operating configuration may be selected by the mode control matrix to reduce electrical power consumption and to change air induction characteristics. In addition, this valve configuration may be used in other multi-stroke cylinder modes and/or in an engine with at least some deactivated cylinders. Referring to FIG. 45, a plot shows intake and exhaust events in a cylinder operating in four-stroke cylinder mode, with four valves per cylinder, and the valves operating in a alternating intake/alternating exhaust configuration. Valve timing is referenced to top-dead-center of combustion being zero degrees. The top two traces show intake, valves opening in an alternating pattern, every other combustion event. That is, intake valve “A” opens every 1440 crank angle degrees, and intake valve “B” opens every 1440 crank angle degrees. Valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between intake valve “A” and intake valve “B” may also be added. The bottom two traces show exhaust valves opening in an alternating pattern, every other combustion event. That is, exhaust valve “A” opens every 1440 crank angle degrees, and exhaust valve “B” opens every 1440 crank angle degrees, valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between exhaust valve “A” and exhaust valve “B” may also be added. This valve operating configuration may also be selected by the mode control matrix to reduce electrical power consumption and to change air induction characteristics. Furthermore, operating valves in an alternating configuration may reduce valve degradation. In addition, this valve configuration may be used in other multi-stroke cylinder modes and/or in an engine with at least some deactivated cylinders. Referring to FIG. 46, a plot shows intake and exhaust events in a cylinder operating in four-stroke cylinder mode, with four valves per cylinder, and the valves operating in a single intake/alternating exhaust configuration. Valve timing is referenced to top-dead-center of combustion being zero degrees. The top two traces show intake valve “A” opening before each combustion event. Intake valve “B” is deactivated in a closed position. Alternatively, intake valve “B” may be operated while intake valve “A” is deactivated in a closed position. The bottom two traces show exhaust valves opening in an alternating pattern, every other combustion event. That is, exhaust valve “A” opens every 1440 crank angle degrees, and exhaust valve “B” opens every 1440 crank angle degrees. Valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between exhaust valve “A” and exhaust valve “B” may also be added. This valve operating configuration may also be selected by the mode control matrix to reduce electrical power consumption and to change air induction characteristics. Referring to FIG. 47, a plot shows intake and exhaust events in a cylinder operating in four-stroke cylinder mode, with four valves per cylinder, and the valves operating in a alternating intake/single exhaust configuration. Valve timing is referenced to top-dead-center of combustion being zero degrees. The top two traces show intake valves opening in an alternating pattern, every other combustion event. That is, intake valve “A” opens every 1440 crank angle degrees, and intake valve “B” opens every 1440 crank angle degrees, valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between intake valve “A” and intake valve “B” may also be added. The bottom two traces show exhaust valve “A” opening after each combustion event. Exhaust valve “B” is deactivated in a closed position. Alternatively, exhaust valve “B” may be operated while exhaust valve “A” is deactivated in a closed position. This valve operating configuration may also be selected by the mode control matrix to reduce electrical power consumption and to change exhaust flow characteristics. Referring to FIG. 48, a plot shows intake and exhaust events in a cylinder operating in four-stroke cylinder mode, with four valves per cylinder, and the valves operating in a dual intake/alternating exhaust configuration. Valve timing is referenced to top-dead-center of combustion being zero degrees. The top two traces show both intake valves opening every 720 degrees. Alternatively, a phase angle difference may be added between intake valve events, but in this example both intake valves open before a combustion event. Alternatively, a phase angle between intake valve “A” and intake valve “B” may also be added. The bottom two traces show exhaust valves opening in an alternating pattern, every other combustion event. That is, exhaust valve “A” opens every 1440 crank angle degrees, and exhaust valve “B” opens every 1440 crank angle degrees. Valve “A” and valve “B” opening events are separated by 720 degrees. Alternatively, a phase angle between exhaust valve “A” and exhaust valve “B” may also be added. This valve operating configuration may also be selected by the mode control matrix to reduce electrical power consumption, increase performance, and to change exhaust flow characteristics. As described above with regard to FIGS. 33a and 33b, electromechanical valves may be used to improve engine starting and reduce engine emissions. FIGS. 49 through 54 present alternative valve sequences that maybe used in engines with electromechanical valves or with valves that may be mechanically deactivated. The figures show four-cylinder operation for simplicity, but the methods can be carried over to engines with fewer or additional cylinders. As described above and below, any of the above operating modes can be used alone or in combination with one another, and/or in combination with varying the number of strokes of the cylinder cycle, phased intake, and/or phased exhaust valve opening and/or closing. Referring to FIGS. 49a and 49b, the plots show intake and exhaust valve timing during a start for an engine with mechanical exhaust valves and valves that may be held in an open position, electromechanical valves for example. The intake valves are set to an open position after a key on is observed. As the starter rotates the engine, the mechanically driven exhaust valves open and close based on the engine position and cam timing. At the vertical sync line, a point shown for illustration and that may vary depending on system configuration, the engine controller 12 determines engine position from crankshaft sensor 118. A delay time is shown between sync and the first valve operation (opening/closing), the actual delay may be shorter or longer. After engine position is known, the intake valves are held open until before fuel is injected into an intake port of a cylinder selected for a first combustion event. Alternatively, the intake valve may be held open and fuel injected during a first intake stroke. By holding the intake valves in an open position, residual hydrocarbons pumped through the engine as the engine rotates can be reduced. Opening intake and exhaust valves during the same crank angle interval allows a portion of residual hydrocarbons to be pumped into the intake manifold where the hydrocarbons can be inducted and combusted after a first combustion event. As described above, the individual cylinder intake valves are held open until before fuel is injected into the ports of respective cylinders. After the valve is closed, fuel is injected, and then induction and four-stroke valve sequence begins. Alternatively, cylinders can be operated in multi-stroke modes and/or fuel may be injected on an open valve. Furthermore, fuel may be injected after the induction stroke on direct injection engines. Referring to FIGS. 50a and 50b, the plots show intake and exhaust valve timing during a start for an engine with valves that may be operated before combustion in a selected cylinder occurs, electromechanical valves for example. The intake valves are set to an open position after a key on is observed. As the starter rotates the engine, the mechanically driven exhaust valves open and close based on the engine position and cam timing. At the vertical sync line, a point shown for illustration and that may vary depending on system configuration, the engine controller 12 determines engine position from crankshaft sensor 118. After engine position is known, the intake valves are closed when the exhaust valves are open, and the intake valves are held open when the exhaust valves are closed, until before fuel is injected into a intake port of a cylinder selected for a first combustion event. By following this sequence, engine pumping work can be reduced, but there may be some net residual hydrocarbon flow through the engine. As described above, the intake valves are closed when the exhaust valves are open, and the intake valves are held open when the exhaust valves are closed. Fuel is injected on a closed intake valve prior to an induction event in respective cylinders. Alternatively, cylinders can be operated in multi-stroke modes and/or fuel may be injected on an open valve. Furthermore, fuel may be injected after the induction stroke on direct injection engines. Referring to FIGS. 51a and 51b, the plots show intake and exhaust valve timing during a start for an engine with valves that may be operated before combustion in a selected cylinder occurs, electromechanical valves for example. The intake valves are set to an open position after a key on is observed. As the starter rotates the engine the mechanically driven exhaust valves open and close based on the engine position and cam timing. At the vertical sync line, a point shown for illustration and that may vary depending on system configuration, the engine controller 12 determines engine position from crankshaft sensor 118. After engine position is known, the intake valves are open during crank angle intervals that can be intake and compression strokes of four-stroke cylinder operation. During crank angle intervals that can be considered power and exhaust strokes of four-stroke cylinder operation, the intake valves are closed. This sequence occurs until before fuel is injected into the intake port of a cylinder selected for a first combustion event. By following this sequence, engine pumping work may be increased, but net residual hydrocarbon flow through the engine can be reduced. And, in some cases, net flow through the engine is reversed, such that gasses from the exhaust manifold are pumped into the intake manifold, before fuel injection is commenced. Fuel is injected on a closed intake valve prior to an induction event in respective cylinders. Alternatively, cylinders can be operated in multi-stroke modes and/or fuel may be injected on an open valve. Furthermore, fuel may be injected after the induction stroke on direct injection engines. Referring to FIGS. 52a and 52b, the plots show intake and exhaust valve timing during a start for an engine with valves that may be held in a position, electromechanical valves for example. The intake valves are set to an open position and the exhaust valves are set to a closed position after a key on is observed. At the vertical sync line, a point shown for illustration and that may vary depending on system configuration, the engine controller 12 determines engine position from crankshaft sensor 118. A delay time is shown between sync and the first valve operation (opening/closing), the actual delay may be shorter or longer. After engine position is known, the intake valves are held open until before fuel is injected into the intake port of a cylinder selected for a first combustion event. By holding the intake valves in an open position and exhaust valves in a closed position, engine pumping work and residual hydrocarbons pumped through the engine as the engine rotates can be reduced. Opening intake valves can reduce engine pumping work since air can pass in and out of a cylinder as a piston travels toward or away from the cylinder head. Holding residual hydrocarbons in an engine and combusting the hydrocarbons may reduce the amount of hydrocarbons emitted into the exhaust since residual hydrocarbons may be converted into other constituents, namely CO2 and H2O, during combustion. Referring to FIGS. 53a and 53b, the-plots show intake and exhaust valve timing during a start for an engine with valves that may be held in a position, electromechanical valves for example. The intake valves are set to a closed position and the exhaust valves are set to an open position after a key on is observed. At the vertical sync line, a point shown for illustration and that may vary depending on system configuration, the engine controller 12 determines engine position from crankshaft sensor 118. A delay time is shown between sync and the first valve operation (opening/closing), the actual delay may be shorter or longer. After engine position is known, the intake valve is held closed until fuel is injected into the intake port of the respective cylinder, and then the intake valve opens to induct an air-fuel mixture. The exhaust valves are held in an open position until before a first induction event in the respective cylinder. After the exhaust valves are closed, exhaust valve operation is based on the operational stroke of the cylinder, four-stroke for example. By holding the intake valves in a closed position and exhaust valves in an open position, engine pumping work and residual hydrocarbons pumped through the engine as the engine rotates can be reduced. Opening exhaust valves can reduce engine pumping work since air can pass in and out of a cylinder as a piston travels toward or away from the cylinder head. However, the net air flow through the engine remains low since the intake valves are held in a closed position. Since engines having electromechanical valves are not mechanically constrained to operate at fixed crankshaft positions, valve timing may be set to produce a desired stroke in a selected cylinder. For example, a piston that is traveling toward the cylinder head may be set to a compression or exhaust stroke by adjusting valve timing. In one example, setting the stroke of a cylinder can be described by FIG. 54. Referring to FIG. 54 a plot shows piston trajectories for two pistons in a four-cylinder engine over two engine revolutions. The piston trajectory of the top plot and the piston trajectory of the bottom plot are 180 crank angle degrees out of phase. That is, one piston is at the top of the cylinder while the other piston is at the bottom of a cylinder. Three symbols (o, *, and Δ) identify example engine positions where an engine controller may determine engine position during a start. In addition, four vertical lines pass through both plots to illustrate moveable decision boundaries where cylinder strokes can be determined. The number of decision boundaries can vary with the number of cylinders in an engine. Typically, one decision boundary is selected for every two cylinders in an engine. Setting the stroke (e.g., intake, combustion, compression, or exhaust) for a cylinder capable of a first combustion event may be accomplished based on a number of engine operating conditions, control objectives, and may include a decision boundary. For example, after engine position can be established, a decision boundary can be used as a location, over a crank angle interval, to set a stroke of a particular cylinder, based on engine operating conditions and control objectives. A four-cylinder engine with control objectives of a first combustion event in cylinder number one, producing a desired torque resulting from combustion event number one, could set the stroke of cylinder one, providing criteria are met, at or before a decision boundary. The remaining cylinder strokes can be set based on a predetermined order of combustion. The decision boundary can be described as a location in crankshaft degrees relative to a piston position. In FIG. 54, the decision boundary 1 is at approximately 170 degrees after top-dead-center of cylinder “B”. Decision boundary 2 is at approximately 350 degrees after top-dead-center of cylinder As the engine rotates, based on the determined engine operating conditions, cylinder stroke for respective cylinders may be set by adjusting valve timing, before and up to, a boundary condition. Two boundary conditions, decision boundary 1 and decision boundary 2, are shown in FIG. 54 because the illustrated cylinder trajectories are out of phase and the second boundary condition may be encountered, permitting setting of cylinder stroke, before the piston location represented by decision boundary 1 is reencountered. In other words, in this example, decision boundary 1 and 2 represent the same cylinder stroke setting opportunity, albeit in different cylinders. Of course, the boundary conditions can move based on engine operating conditions and control objectives. For example, boundary conditions may be moved, relative to crankshaft angle, based on engine temperature or barometric pressure. When a decision boundary is encountered, engine operating parameters are evaluated to determine if the stroke of engine cylinders can be set. For example, if engine position and engine speed and/or acceleration permits induction of a desired air amount that can produce a desired engine output, a selected cylinder may be set to an induction stroke. Specifically, desired engine outputs can include desired engine torque, a desired cylinder air amount, and a desired engine speed. However, if operating conditions do not permit setting the stroke of a cylinder at the present boundary, then the next boundary condition factors into setting the cylinder stroke. Referring again to FIG. 54, the “o” signifies a location where engine position might be established. If engine operating conditions meet criteria for setting the stroke of a cylinder before decision boundary 1 is encountered, the stroke of a selected cylinder can be set. In one example, cylinder “B” may be set to an intake stroke by adjusting valve timing such that cylinder “B” is the first cylinder to combust. The remaining cylinders are set to strokes based on a firing order, 1-3-4-2 in a four cylinder engine for example. In other words, if cylinder number one is set to an intake stroke, cylinder number three is set to an exhaust stroke, cylinder number four is set to a power stroke, and cylinder number two is set to a compression stroke. However, as described above, selected valve events may not follow four-stroke cylinder timings, up to a first combustion event, so that engine starting can be improved. On the other hand, if after evaluation engine operating conditions, the cylinder stroke cannot be set, the next stroke setting opportunity is at decision boundary 2. The “*” signifies another engine position where engine position might be established. Again, if engine operating conditions meet criteria for setting the stroke of a cylinder before decision boundary 1 is encountered, the stroke of the selected cylinder is set. However, the “*” position occurs closer to decision boundary than the “o” position. When engine position is determined closer to the decision boundary, opportunity to set the stroke of a cylinder can decrease. For example, if an engine is beginning to rotate and engine position is established near a decision boundary, there may not be a sufficient duration or sufficient upward or downward movement to induct a desired cylinder air amount and produce an engine output. In this example, setting the cylinder stroke may be delayed until the next decision boundary under these conditions. The “Δ” signifies yet another engine position where engine position might be established. In this position, if engine operating conditions meet criteria for setting the stroke of a cylinder before decision boundary 2 is encountered, the stroke of the selected cylinder is set. Specifically, in this case, cylinder “A” is set to an intake stroke and fueled to be the first cylinder to carry out combustion. Decision boundary 1 and 2 can be used to set the stroke of different cylinders that produce a first combustion event. As described above, various valve sequences can be used to vary valve timing (of electromechanical valves, for example) to be different before (and/or during) a first combustion event (or a first fuel injection event), compared with valve timing after a first combustion event. Each of the above embodiments offer different advantages that can be used to improve engine operation. Referring to FIG. 55, a flowchart shows a method to adjust air-fuel based on a selected cylinder and/or valve mode. As described above, cylinder and valve modes may be used to improve performance and fuel economy. However, without controlling the state of a catalyst (amount of stored oxidants, temperature, etc.) during cylinder and/or valve mode changes, and while in the different cylinder and/or valve modes, emissions may increase. Fuel and spark are two control parameters that can be used to adjust the state of a catalyst. The method of FIG. 55 works in conjunction with the method of FIG. 10 to affect the catalyst state by adjusting fuel delivered to the engine. In step 5510, the routine determines if a mode change has been requested by step 1022 of FIG. 10. A mode change request is indicated by a difference between the requested mode variable and the target mode variable. If a mode change is not pending, the routine proceeds to step 5520. If a mode change is pending, the routine proceeds to step 5512. In step 5512, the routine determines if the requested engine torque is increasing. If so, the routing proceeds to step 5522. If not, the routine proceeds to step 5514. This step allows a cylinder and/or valve mode change to occur without a long delay if the driver is requesting additional torque, which can improve vehicle drivability. In step 5514, the routine delays an impending cylinder and/or valve mode change. The routine sends a signal, by setting the MODE_DLY variable, to step 1022 of FIG. 10. The duration of the delay may be based on time and/or on the oxidant state and/or oxidant storage capacity of the catalyst. For example, the oxidant storage capacity of a catalyst and the amount of oxidants stored in the catalyst may be sufficient to allow a mode change by the method of FIG. 14, but this routine may delay the mode change to further adjust the catalyst state by increasing or decreasing fuel to the engine. Typically, the delay is maintained until the oxidant storage capacity reaches a predetermined level that is based on the new cylinder and/or valve mode. The routine then continues to step 5516. In step 5516, the routine determines if the delay is complete. If the delay is complete the routine continues to step 5524. If the delay is not complete the routine proceeds to step 5518. In step 5518, the fuel delivered to the engine is adjusted. The fuel adjustment amount is based on the new cylinder and/or valve mode, engine operating conditions, and catalyst conditions. For example, if the engine was operating in a fuel enrichment mode to regulate catalyst temperature, the fuel amount may be leaned to return the catalyst from a hydrocarbon rich state. On the other hand, if the engine has been operating with eight cylinders at low or moderate loads, and a reduced cylinder mode is requested, the fuel amount may be enriched to anticipate higher levels of NOx that may occur in reduced cylinder modes. Fuel is adjusted by increasing or decreasing the average amount of fuel delivered to the engine, by biasing the fuel for example. Alternatively, fuel amounts may be pulsed or stepped to increase or decrease the amount of oxidants stored in the catalyst. The effect of this step can be to pre-condition the state of the catalyst for the impending cylinder and/or valve mode change. Then, the routine exits. In step 5524, the routine enables a requested cylinder and/or valve mode. After the predetermined delay is been met, the MODE_DLY variable is set to an off state, permitting the mode change in step 1022 of FIG. 10. The routine proceeds to exit after turning off the mode delay flag. In step 5522, fuel delivered to the engine is adjusted based on the new cylinder and/or valve mode. This path of the routine does not delay an impending cylinder and/or valve mode request, but the fuel may be enriched or leaned during the period between setting the requested mode variable and setting the target mode variable. This feature may also be used to pre-condition the catalyst before an impending cylinder and/or valve mode change. The routine proceeds to exit. In step 5520, fuel is adjusted based on the current cylinder and/or valve mode. Switching cylinder and/or valve modes may alter engine feed gas constituents. It may be beneficial to adjust the amount of fuel delivered to the engine to compensate for exhaust gases produced by specific cylinder and/or valve modes. Therefore, the base fuel delivered to the engine can be adjusted to provide the before-mentioned compensation. For example, the desired base fuel amount may produce a stoichiometric air-fuel mixture, such as approximately 14.6 for example. Fuel compensation can be determined by looking up a fuel bias amount from a matrix of fuel bias amounts, MODE_BIAS. In this example, an enrichment request of 0.2 air-fuel ratios may be requested. The fuel bias can then reduce the air-fuel mixture to produce a 14.4 air-fuel ratio mixture. Compensation for each cylinder and/or valve mode is provided. The routine proceeds to exit. As will be appreciated by one of ordinary skill in the art, the routines described in FIGS. 2, 10, 13-18, 32, 37 and 39 may represent one or more of any number of processing strategies such as event-driven, interrupt-driven, multi-tasking, multi-threading, and the like. As such, various steps or functions illustrated may be performed in the sequence illustrated, in parallel, or in some cases omitted. Likewise, the order of processing is not necessarily required to achieve the features and advantages described herein, but are provided for ease of illustration and description. Although not explicitly illustrated, one of ordinary skill in the art will recognize that one or more of the illustrated steps or functions may be repeatedly performed depending on the particular strategy being used. It will be appreciated that the various operating modes described above are exemplary in nature, and that these specific embodiments are not to be considered in a limiting sense, because numerous variations are possible. The subject matter of the present disclosure includes all novel and non-obvious combinations and subcombinations of the valve operating patters, cylinder operating patterns, cylinder stroke variations, valve timing variations, and other features, functions, and/or properties disclosed herein. For example, in one example, an approach can be used where the engine varies the number of cylinders carrying out combustion. Further, not only can the number of the cylinders carrying out combustion be varied, but the number of valves in active cylinders can also be varied (in time, or between different cylinder groups). Further still, in addition or as an alternative, the number of stroke in active cylinders can be varied (in time, or between different cylinder groups). Thus, in one example, in a first mode the engine can operate with a first number of cylinders carrying out combustion with a first number of strokes and a first number of active valves, and in a second mode, the engine can operate with a second number of cylinders carrying out combustion with a second number of strokes and a second number of active valves. In this way, greater torque resolution can be obtained with increasing fuel economy. In another example, a first group of cylinders of the engine can operate with a first number of strokes and a first number of active valves, and a second group of cylinders of the engine can operate with a second number of strokes and a second number of active valves. In still another example, the cylinders can have equal number of valves active, yet different valve patterns (e.g., one group of cylinder can have the active intake valve and exhaust valve in a diagonal configuration, while another group has a non-diagonal configuration). Further, in one approach, the control system can use a combination of varying the number of cylinders carrying out combustion, varying the number (or pattern) of active valves, and/or varying the number of strokes of active cylinders as ways to control engine output torque. By having numerous degrees of freedom, it can be possible to better optimize engine performance for various operating conditions. Also, in one example described above, the number of strokes can be varied as a condition of a catalyst in the exhaust system varies, such as, for example, the amount of stored oxidants. However, other engine parameters can also be adjusted based on catalyst conditions, such as the number of active valves in active cylinders, and/or the pattern of active valve in active cylinders. Further, the number of cylinders carrying out combustion can also be varied as catalyst conditions vary. The following claims particularly point out certain combinations and subcombinations regarded as novel and nonobvious. These claims may refer to “an” element or “a first” element or the equivalent thereof. Such claims should be understood to include incorporation of one or more such elements, neither requiring nor excluding two or more such elements. Other combinations and subcombinations of the valve operating patters, cylinder operating patterns, cylinder stroke variations, valve timing variations, and/or properties may be claimed through amendment of the present claims or through presentation of new claims in this or a related application. Such claims, whether broader, narrower, equal, or different in scope to the original claims, also are regarded as included within the subject matter of the present disclosure. This concludes the description. The reading of it by those skilled in the art would bring to mind many alterations and modifications without departing from the spirit and the scope of the disclosure. For example, I3, I4, I5, V6, V8, V10, and V12 engines operating in diesel, natural gas, gasoline, or alternative fuel configurations could be used to advantage.
<SOH> BACKGROUND <EOH>One method to control intake and exhaust valve operation during engine operation is described in U.S. Pat. No. 6,374,813. This method presents a means to control electromagnetically actuated valves to promote EGR control. The approach selects different valve modes and patterns to regulate internal EGR, i.e., EGR flow through a cylinder as opposed to EGR routed to the intake manifold. Valves are operated independently and control is based on operating conditions of the engine. Further, the disclosure also describes several valve configurations that may be operated in one or more operational modes to promote cylinder air charge swirl. The above-mentioned method can also have a disadvantage. Specifically, the approach may degrade engine breathing for engines that have different length intake runners. For example, some engines have two intake runners per cylinder, a long runner and a short runner; where the unequal length intake runners are selectively used to improve engine performance at different engine operating points. However, since the before-mentioned approach simply selects valves based on a desired amount of EGR without regard to the intake manifold geometry, engine breathing may degrade. Further, if the valves are operated as suggested, it may be possible for early valve degradation to occur due to high temperature valve operation, since valve selection is based simply on a desired amount of EGR. The inventors herein have recognized the above-mentioned disadvantages and have developed a method of electromechanical valve control that offers substantial improvements.
<SOH> SUMMARY <EOH>One embodiment of the present description includes a system for selecting and controlling electromechanical valves to operate in at least a cylinder of an internal combustion engine, the system comprising: a cylinder head of said cylinder having at least two regions, each region having an electromechanical valve; and a controller to select a valve operating mode, based on an operating condition of at least an electro-magnetically actuated valve, wherein said operating mode selects at least an intake valve of said cylinder located in at least one region of said first and second region, and to operate said selected intake valve, without operating a non-selected intake valve, during a cycle of said cylinder, and to operate said non-selected intake valve during a subsequent cycle of said cylinder, without operating said selected intake valve. This method can be used to reduce the above-mentioned limitations of the prior art approaches. Thus, when the mode selection is based on an operating condition of the valve, it may be possible to achieve certain advantages. For example, the engine and electromechanical valves experience different operational conditions. When a cold engine is started, the engine and electromechanical valves are at nearly the same temperature. However, as the valve is operated its temperature begins to diverge from the engine temperature. This can occur because electrical energy is delivered to the valve while chemical energy is delivered to the engine via the combustion chamber. Even though the electromechanical valve is attached to the engine, there may not be a one to one relationship between the electromechanical valve temperature and the engine temperature. In addition, the temperature rate of change can be different between the electromechanical valve and the engine. Therefore, when controlling electromechanical valves in an internal combustion engine, engine operating conditions and the valve operating conditions can be used to control the valves and improve operation of the engine, if desired. Alternatively, only the valve condition can be used, if desired. In another example, the system comprises: a cylinder head of said cylinder having at least two regions, each region having an electromechanical valve; and a controller to select a valve operating mode, based on an operating condition of at least an electro-magnetically actuated valve, wherein said operating mode selects at least an exhaust valve of said cylinder located in at least one region of said first and second region, and to operate said selected exhaust valve, without operating a non-selected exhaust valve, during a cycle of said cylinder, and to operate said non-selected exhaust valve during a subsequent cycle of said cylinder, without operating said selected exhaust valve. By selecting modes based on an operating condition of an electro-magnetically actuated valve, valve degradation can be reduced by, for example, alternating intake or exhaust valve operation. As an example, engine operation at elevated speed and load conditions can increase exhaust valve temperature. As engine speed increases the time between combustion events in a cylinder decreases. Additionally, as the load in a cylinder increases, the temperature in the cylinder also increases. Therefore, at elevated engine speed and load conditions, combustion transfers additional heat to an exhaust valve and less time is available to transfer heat, from the valve to the cylinder head. By alternating exhaust valves, in one example every other cylinder cycle, in a multi-valve cylinder, the inventors herein have reduced valve degradation by allowing additional time for heat to transfer from a valve to the cylinder head. The above advantages and other advantages and features of the present description will be readily apparent from the following detailed description of the embodiments when taken alone or in connection with the accompanying drawings.
20040319
20060418
20050922
63491.0
0
HUYNH, HAI H
ELECTROMECHANICAL VALVE OPERATING CONDITIONS BY CONTROL METHOD
UNDISCOUNTED
0
ACCEPTED
2,004
10,805,622
ACCEPTED
Roll forming machine with improved adjustability and profile changing capability
A roll forming machine wherein a single operator can quickly replace roll forming stations to change the desired lateral profile and wherein adjustments to the lateral positions of the roll forming stations can be quickly effected. This is accomplished by mounting the roll forming elements on short tooling rail sections which in turn are mounted on longer mounting rails which are used as platforms whereby all the adjustments are preset so that all setup work is performed prior to installing the tooling rails. Because the tooling rail sections are shorter, they may be inserted in, and removed from, the machine by a single operator without requiring the partial disassembly, and subsequent reassembly, of the entry and shear assemblies.
1. A roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, said roll forming machine driving said supply strip along a predetermined path of travel through a plurality of roll forming stations and comprising: a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between said side frames; a plurality of mounting blocks each supported on a respective one of said lower transverse members adjacent a first one of said pair of side frames, each of said mounting blocks having an upper horizontal surface and a plurality of spaced mounting holes extending into said each mounting block from said upper surface, said plurality of mounting holes for each of said mounting blocks extending along a respective line orthogonal to said pair of side frames and having identical spacing on all of said plurality of mounting blocks, and wherein the upper horizontal surfaces of all of said plurality of mounting blocks lie along a single horizontal plane; a first mounting rail secured to at least two of said plurality of mounting blocks by at least two mounting threaded members each extending through a respective opening in said first mounting rail and into a respective mounting hole in a respective one of said at least two mounting blocks, wherein each of said respective mounting holes occupies the same relative position in its respective mounting block; a first tooling rail secured to said first mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said first tooling rail; wherein said first tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members. 2. The roll forming machine according to claim 1 wherein: said first mounting rail is formed with a plurality of equally spaced mounting holes along a line adapted to be parallel to said side frames when said first mounting rail is secured to said mounting blocks; said first tooling rail is formed with a plurality of openings along a line, wherein said plurality of openings are registrable in pairs with respective pairs of the mounting holes of said first mounting rail; and said roll forming machine further includes a plurality of threaded members each extendable through a respective first tooling rail opening and into a respective first mounting rail mounting hole for securing said first tooling rail to said first mounting rail. 3. The roll forming machine according to claim 1 wherein each of said mounting blocks is adjustably positionable relative to said respective lower transverse member along a line orthogonal to said pair of side frames. 4. The roll forming machine according to claim 1 further comprising: a first plurality of threaded shafts extending into said cage from a second one of said pair of side frames and orthogonal to said pair of side frames; a first plurality of traveler bar blocks each threadedly secured to a respective one of said first plurality of threaded shafts for movement therealong; a second mounting rail secured to at least two of said first plurality of traveler bar blocks; a second tooling rail secured to said second mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said second tooling rail; wherein said second tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members. 5. The roll forming machine according to claim 4 further comprising adjustment means outside said cage and coupled to said first plurality of threaded shafts for controllably rotating said first plurality of threaded shafts to selectively move said first plurality of traveler bar blocks toward and away from said second one of said pair of side frames. 6. The roll forming machine according to claim 5 further comprising: a second plurality of threaded shafts extending into said cage from said second one of said pair of side frames and orthogonal to said pair of side frames; a second plurality of traveler bar blocks each threadedly secured to a respective one of said second plurality of threaded shafts for movement therealong; a third mounting rail secured to at least two of said second plurality of traveler bar blocks; a third tooling rail secured to said third mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said third tooling rail; wherein said third tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members; and wherein said adjustment means is also coupled to said second plurality of threaded shafts and includes a clutch coupled between said first and second pluralities of threaded shafts, said clutch being selectively engagable and disengagable to couple and uncouple, respectively, said first and second pluralities of traveler bar blocks for concurrent movement. 7. A roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, said roll forming machine driving said supply strip along a predetermined path of travel through a plurality of roll forming stations and comprising: a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between said side frames; a first plurality of threaded shafts extending into said cage from a first one of said pair of side frames and orthogonal to said pair of side frames; a first plurality of traveler bar blocks each threadedly secured to a respective one of said first plurality of threaded shafts for movement therealong; a first mounting rail secured to at least two of said first plurality of traveler bar blocks; a first tooling rail secured to said first mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said first tooling rail; wherein said first tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members. 8. The roll forming machine according to claim 7 further comprising adjustment means outside said cage and coupled to said first plurality of threaded shafts for controllably rotating said first plurality of threaded shafts to selectively move said first plurality of traveler bar blocks toward and away from said first one of said pair of side frames. 9. The roll forming machine according to claim 8 further comprising: a second plurality of threaded shafts extending into said cage from said first one of said pair of side frames and orthogonal to said pair of side frames; a second plurality of traveler bar blocks each threadedly secured to a respective one of said second plurality of threaded shafts for movement therealong; a second mounting rail secured to at least two of said second plurality of traveler bar blocks; a second tooling rail secured to said second mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said second tooling rail; wherein said second tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members; and wherein said adjustment means is also coupled to said second plurality of threaded shafts and includes a clutch coupled between said first and second pluralities of threaded shafts, said clutch being selectively engagable and disengagable to couple and uncouple, respectively, said first and second pluralities of traveler bar blocks for concurrent movement. 10. The roll forming machine according to claim 7 further comprising: a plurality of mounting blocks each supported on a respective one of said lower transverse members adjacent a second one of said pair of side frames, each of said mounting blocks having an upper horizontal surface and a plurality of spaced mounting holes extending into said each mounting block from said upper surface, said plurality of mounting holes for each of said mounting blocks extending along a respective line orthogonal to said pair of side frames and having identical spacing on all of said plurality of mounting blocks, and wherein the upper horizontal surfaces of all of said plurality of mounting blocks lie along a single horizontal plane; a third mounting rail secured to at least two of said plurality of mounting blocks by at least two mounting threaded members each extending through a respective opening in said third mounting rail and into a respective mounting hole in a respective one of said at least two mounting blocks, wherein each of said respective mounting holes occupies the same relative position in its respective mounting block; a third tooling rail secured to said third mounting rail; and at least one set of roll forming elements each defining a roll forming station secured to said third tooling rail; wherein said third tooling rail with said at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of said cage vertically between an adjacent pair of upper transverse members. 11. The roll forming machine according to claim 10 wherein: said third mounting rail is formed with a plurality of equally spaced mounting holes along a line adapted to be parallel to said side frames when said third mounting rail is secured to said mounting blocks; and said third tooling rail is formed with a plurality of openings along a line, wherein said plurality of openings are registrable in pairs with respective pairs of the mounting holes of said third mounting rail; said roll forming machine further including a plurality of bolts each extendable through a respective third tooling rail opening and into a respective third mounting rail mounting hole for securing said third tooling rail to said third mounting rail. 12. The roll forming machine according to claim 10 wherein each of said mounting blocks is adjustably positionable relative to said respective lower transverse member along a line orthogonal to said pair of side frames.
BACKGROUND OF THE INVENTION This invention relates to roll forming machines which form an indeterminate length panel of a desired lateral profile from a supply strip of sheet metal and, more particularly, to such a machine wherein a single operator can quickly replace roll forming stations to change the desired lateral profile and wherein adjustments to the lateral positions of the roll forming stations can be quickly effected. Roll forming machines are well known in the construction industry. Such a machine is typically mounted on the bed of a pickup truck, van, trailer, or the like, so that it can be transported to, and used at, the site where siding panels, roofing panels and rain gutters are to be installed. Typically, such a machine comprises a series of spaced forming stations, each having upper and lower shaping rollers between which a sheet metal strip is passed, so as to impart a desired shape, or lateral profile, to the sheet metal strip, which is uniform along the length of the sheet metal strip after it exits the machine. The strip is cut to its desired length as it exits the roll forming machine. Different combinations of rollers provide different lateral profiles to the strip. Conventionally, each machine is designed to provide a single predetermined lateral profile to the sheet metal strip. U.S. Pat. No. 5,425,259 discloses a roll forming machine where the forming stations are mounted on a set of rail structures which can be interchanged with a different set of rail structures to form a different lateral profile. This allows the operator to change lateral profiles without having to remove and replace each individual forming station. According to this patent, the rail structures on the right side of the machine are mounted directly to the machine frame by the use of mounting blocks that stay with the rail structures when changed for a different set of forming stations. The two rail structures on the left side of the machine are mounted directly to threaded adjustment traveler bar blocks and have to be realigned relative to the machine frame every time a set of rail structures is mounted into the machine. This realignment requires at least two adjustments. First, the rail structures on the left side have to be adjusted to ensure that they are parallel to the rail structures on the right side of the machine. Second, the first rail structure on the left side has to be adjusted to have a given offset relative to the second rail structure on the left side of the machine. This is accomplished by turning the nuts on the threaded adjustment traveler bar blocks on the first rail structure so that the first rail structure is moved left or right until the proper offset is achieved. While adjusting this offset, the first rail structure on the left side has to be kept parallel with the rail structures on the right side of the machine. The aforedescribed arrangement suffers from a number of disadvantages. For example, it requires two people and an average of three to four hours to replace the rail structures in order to change the lateral profile produced by the machine. There are three major reasons for this disadvantage. The first reason is that three of the four rail structures are long and heavy, requiring two people to remove and insert the rail structures from and into the machine. The second reason is that the shear and entry assemblies of the machine need to be partially disassembled and then reassembled to allow the long rail structures to be removed from and inserted into the machine. The third reason is that the rail structures must be mounted and realigned to the machine before being able to form the next lateral profile. It would therefore be desirable to have a roll forming machine wherein the lateral profile can be easily and quickly changed by a single person. SUMMARY OF THE INVENTION According to this invention, there is provided a roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, the roll forming machine driving the supply strip along a predetermined path of travel through a plurality of roll forming stations. The inventive roll forming machine comprises a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between the side frames. A plurality of mounting blocks are each supported on a respective one of the lower transverse members adjacent a first one of the pair of side frames. Each of the mounting blocks has an upper horizontal surface and a plurality of spaced mounting holes extending into each mounting block from its upper surface. The plurality of mounting holes for each of the mounting blocks extend along a respective line orthogonal to the pair of side frames and have identical spacing on all of the plurality of mounting blocks. The upper horizontal surfaces of all of the plurality of mounting blocks lie along a single horizontal plane. A first mounting rail is secured to at least two of the plurality of mounting blocks by at least two mounting threaded members each extending through a respective opening in the first mounting rail and into a respective mounting hole in a respective one of the at least two mounting blocks. Each of the respective mounting holes occupies the same relative position in its respective mounting block so that the mounting rail is automatically parallel to the side frames of the machine. A first tooling rail is secured to the first mounting rail. At least one set of roll forming elements defining a roll forming station is secured to the first tooling rail. The first tooling rail with the at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of the cage vertically between an adjacent pair of upper transverse members. Thus, the removable sections are small enough to be handled by one person and, since they are removed vertically, the entry and shear assemblies of the machine remain intact during a tooling change. Also according to this invention, there is provided a roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, the roll forming machine driving the supply strip along a predetermined path of travel through a plurality of roll forming stations. The inventive roll forming machine comprises a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between the side frames. A first plurality of threaded shafts extends into the cage from a first one of the pair of side frames orthogonal to the pair of side frames and a first plurality of traveler bar blocks are each threadedly secured to a respective one of the first plurality of threaded shafts for movement therealong. A first mounting rail is secured to at least two of the first plurality of traveler bar blocks and a first tooling rail is secured to the first mounting rail. At least one set of roll forming elements defining a roll forming station is secured to the first tooling rail. The first tooling rail with the at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of the cage vertically between an adjacent pair of upper transverse members. Thus, the removable sections are small enough to be handled by one person and, since they are removed vertically, the entry and shear assemblies of the machine remain intact during a tooling change. In accordance with an aspect of this invention, there is provided an adjuster outside the cage which is coupled to the threaded shafts for controllably rotating the threaded shafts so that the traveler bar blocks, along with the mounting rails secured thereto, are movable toward and away from the first one of the pair of side frames. In accordance with a further aspect of this invention, the threaded shafts are divided into two groups and the adjuster includes a clutch coupled between the two groups of threaded shafts. Each group of threaded shafts is associated with a respective mounting rail. The clutch is selectively engageable and disengageable so that one of the mounting rails can be moved independently to provide an offset between the two mounting rails. BRIEF DESCRIPTION OF THE DRAWINGS The foregoing will be more readily apparent from reading the following description in conjunction with the drawings in which like elements in different figures thereof are identified by the same reference numeral and wherein: FIG. 1 is a perspective view of an embodiment of the inventive roll forming machine showing the rigid cage structure; FIG. 2 is a top perspective view of the machine shown in FIG. 1 without the upper transverse frame members and drive mechanism; FIG. 3 is a schematic top plan view of the inventive machine showing the right side rail structures; FIG. 4 is a perspective view of a mounting block used on the right side of the inventive machine; FIG. 5 is an exploded perspective view showing a tooling rail, a mounting rail and a pair of mounting blocks, illustrating how they are connected together and to lower transverse members of the framework of the inventive machine; FIG. 6 is a schematic top plan view of the inventive machine showing the left side mounting rail structures; FIG. 7 is a perspective view of a traveler bar block; FIG. 8 is a perspective view of the inventive adjustment mechanism for the traveler bar blocks on the left side of the inventive machine; FIGS. 9a and 9b are perspective views of the clutch in the adjustment mechanism shown in FIG. 8, with the clutch engaged and disengaged, respectively; and FIGS. 10a and 10b illustrate sample lateral profiles of roofing panels which can be formed by the inventive roll forming machine. DETAILED DESCRIPTION Referring now to the drawings, FIG. 1 shows a roll forming machine, designated generally by the reference numeral 10, which incorporates structure according to the principles of this invention. Roll forming machines, per se, are well known in the art and therefore will not be described in detail herein, except for those portions of the machine 10 which particularly relate to the present inventive improvements. The machine 10 is designed to form an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal (not shown) having a pair of parallel straight edges. As is known in the art, the machine 10 drives the supply strip along a predetermined path of travel through a plurality of roll forming stations. For purposes of illustration, the machine 10 is designed to form roofing panels. FIGS. 10a and 10b show illustrative lateral profiles of roofing panels which can be formed by the machine 10, depending upon which set of tooling is installed in the machine 10. As shown, the machine 10 has a rigid framework including a pair of rigid parallel side frames 12,14 interconnected by a plurality of rigid upper and lower transverse members 16,18, respectively, to form a rigid cage having an interior and a width between the side frames 12,14. For future discussion purposes, the side of the machine 10 which is adjacent the side frame 12 will be referred to as the “right” side and the side of the machine 10 which is adjacent the side frame 14 will be referred to as the “left” side. On the lower transverse members 18 along the right side of the machine 10 are supported a plurality of mounting blocks 20 which are each bolted to a respective block 22 which is secured, as by welding, to a respective lower transverse member 18. The pair of bolts 24 which secure a mounting block 20 to a respective block 22 extend through respective elongated slots 26 in the mounting block 20 and into internally threaded bores 28 in the block 22 so that the position of the mounting block 20 is adjustable. Such adjustability is effected by means of pusher set screws 30 to slide the mounting block 20 back and forth along a line orthogonal to the side frames 12,14. Each of the mounting blocks 20 has an upper horizontal surface 32 and a plurality of internally threaded mounting holes 34 extending into the mounting block 20 from the upper horizontal surface 32. The mounting holes 34 extend along a line orthogonal to the side frames 12,14 and are preferably equally spaced, illustratively on one-half (½) inch centers, along that line. The spacing of the mounting holes 34 is identical on all of the mounting blocks 20 and the upper horizontal surfaces 32 of all the mounting blocks 20 lie along a single horizontal plane. According to this invention, each of a first set of mounting rails 36 is secured to at least two of the mounting blocks 20. Illustratively, there are two mounting rails 36 along the right side of the machine 10. Each mounting rail 36 is a flat stiff bar of sheet metal formed with two sets of mounting holes. The first set of mounting holes 38 are countersunk through-bores for securing the mounting rails 36 to the mounting blocks 20 by means of threaded members, such as flat head screws, 40. The mounting holes 38 are spaced the same as the spacing between the mounting blocks 20 and lie along a line substantially centered along each mounting rail 36. The second set of mounting holes 42 are internally threaded bores equally spaced (illustratively on eight inch centers) along the same central line and are for securing the tooling rails to the mounting rails 36, as will be described in full detail hereinafter. Each different lateral profile formed by a different set of tooling requires that the mounting rails 36 be secured to the mounting blocks 20 in specific ones of the mounting holes 34, in accordance with a mounting chart set forth in the operator's manual provided with the machine 10. The mounting rails are installed and set for a particular lateral profile without the presence of any tooling, resulting in an easier setup. The mounting rails 36 are used for supporting the roll forming tooling. According to this invention, short sections of tooling rail 44 are provided. Each tooling rail 44 is an angle bracket. At least one set of roll forming elements (or tooling) 46 defining a roll forming station is secured to each tooling rail 44. Since the mounting holes 42 on the mounting rails 36 are spaced on eight inch centers and each tooling rail 44 must be secured to at least two of the mounting holes 42, each tooling rail section 44 is chosen to be less than sixteen inches in length, but longer than about nine inches. This allows a tooling rail section 44 to be manipulated into and out of the machine 10 vertically between an adjacent pair of upper transverse members 16. Each tooling rail 44 is provided with mounting through-holes 48 spaced on eight inch centers to match the spacing of the mounting holes 42. To secure the tooling rail 44 to the mounting rail 36, threaded members, such as screws or bolts, 50 extend through the holes 48 and into the holes 42. The holes 48 are along a line parallel to the longitudinal axis of the tooling rail 44, which line is uniquely located for each lateral profile so that the required offset is built into the tooling rail itself. Thus, as shown in FIGS. 2 and 3, there are illustratively two mounting rails 36 on the right side of the machine 10. Depending on the lateral profile being formed by the tooling installed in the machine 10, each of the mounting rails 36 is secured in a particular set of mounting holes 34. The combination of the particular set of mounting holes 34 and the location of the line for the holes 48 in the tooling rails 44 determines the offset between the roll forming elements 46 on the two mounting rails 36. Therefore, no final adjustments are required on the right side of the machine 10 when changing from one lateral profile to another. The mounting of the tooling on the left side of the machine 10 is arranged differently from the mounting on the right side. In particular, mounting rails 52, of the same general construction as the mounting rails 36, are permanently bolted to traveler bar blocks 54 which are in turn secured to threaded traveler nuts 56 mounted on threaded adjustment shafts 58. Tooling rails 60, of the same general construction as the tooling rails 44 and having roll forming elements 62 defining roll forming stations secured thereto, are secured to the mounting rails 52. The mounting rails 52 and the tooling rails 60 have the same mounting hole configurations for their connection as do the mounting rails 36 and the tooling rails 44, respectively, except that there is only a single line for the mounting holes on the tooling rails 60. Thus, a tooling rail section 60, like a tooling rail section 44, can be manipulated into and out of the machine 10 vertically between an adjacent pair of upper transverse members 16. The threaded adjustment shafts 58 extend into the rigid cage interior of the machine 10 from the side frame 14 orthogonally to the side frames 12,14. The inner ends of the shafts 58 are journalled for rotation in the bearing blocks 64. The outer ends of the shafts 58 extend through the bearing blocks 66 and are terminated by bevel gears 68. Rotation of the threaded shafts 58 moves the traveler nuts 56, along with the mounting rails 52 and their respective tooling rails 60, toward and away from the side frame 12, depending upon the direction of rotation of the shafts 58. This provides a way to vary the distance between the roll forming stations on the left and right sides of the machine 10. Rotation of the shafts 58 is effected by turning the crank handle 70 which is connected through gearing (not shown) to the first adjustment shaft 58 and to the transfer shaft 72. The transfer shaft 72 extends orthogonally to the adjustment shafts 58 and is connected to their bevel gears 68 through the bevel gears 74 spaced along its length. As shown in FIGS. 2 and 6, there are illustratively two mounting rails 52 on the left side of the machine 10. Each different lateral profile formed by a different set of tooling requires a different offset between the two left side mounting rails, as well as a different spacing between the roll forming stations on the left and right sides of the machine 10. The operator's manual provided with the machine 10 includes a chart setting forth this offset and spacing. To accommodate the offset between the two mounting rails 52, the transfer shaft 72 is formed as two sections with a clutch 76 interposed between the two sections so as to separate the two mounting rails 52. The clutch 76 has two parts, a fixed half 78 and a sliding half 80. Thus, when a new set of tooling is to be installed in the machine 10, the set screw 82 on the collar 84 is loosened and the sliding half 80 of the clutch 76 is slid to the right, as viewed in FIGS. 9a and 9b, to separate the clutch teeth and disengage the two halves of the clutch 76. With the clutch 76 disengaged, the crank handle 70 is turned to obtain the appropriate offset between the two mounting rails 52. By adjusting the offset in this manner, it will be appreciated that the process of adjusting the offset is greatly simplified. The clutch 76 is then engaged by moving the sliding half 80 to the left and tightening the set screw 82. The crank handle 70 is then turned to set the appropriate distance between the left and right side roll forming stations, in accordance with the desired lateral profile to be formed by the new set of tooling. Accordingly, there has been disclosed an improved roll forming machine wherein a single operator can quickly replace roll forming stations to change the desired lateral profile and wherein adjustments to the lateral positions of the roll forming stations can be quickly effected. While a preferred embodiment of the present invention has been disclosed herein, it will be appreciated by those of skill in the art that various modifications and adaptations to the disclosed embodiment are possible. It is therefore intended that this invention be limited only by the scope of the appended claims.
<SOH> BACKGROUND OF THE INVENTION <EOH>This invention relates to roll forming machines which form an indeterminate length panel of a desired lateral profile from a supply strip of sheet metal and, more particularly, to such a machine wherein a single operator can quickly replace roll forming stations to change the desired lateral profile and wherein adjustments to the lateral positions of the roll forming stations can be quickly effected. Roll forming machines are well known in the construction industry. Such a machine is typically mounted on the bed of a pickup truck, van, trailer, or the like, so that it can be transported to, and used at, the site where siding panels, roofing panels and rain gutters are to be installed. Typically, such a machine comprises a series of spaced forming stations, each having upper and lower shaping rollers between which a sheet metal strip is passed, so as to impart a desired shape, or lateral profile, to the sheet metal strip, which is uniform along the length of the sheet metal strip after it exits the machine. The strip is cut to its desired length as it exits the roll forming machine. Different combinations of rollers provide different lateral profiles to the strip. Conventionally, each machine is designed to provide a single predetermined lateral profile to the sheet metal strip. U.S. Pat. No. 5,425,259 discloses a roll forming machine where the forming stations are mounted on a set of rail structures which can be interchanged with a different set of rail structures to form a different lateral profile. This allows the operator to change lateral profiles without having to remove and replace each individual forming station. According to this patent, the rail structures on the right side of the machine are mounted directly to the machine frame by the use of mounting blocks that stay with the rail structures when changed for a different set of forming stations. The two rail structures on the left side of the machine are mounted directly to threaded adjustment traveler bar blocks and have to be realigned relative to the machine frame every time a set of rail structures is mounted into the machine. This realignment requires at least two adjustments. First, the rail structures on the left side have to be adjusted to ensure that they are parallel to the rail structures on the right side of the machine. Second, the first rail structure on the left side has to be adjusted to have a given offset relative to the second rail structure on the left side of the machine. This is accomplished by turning the nuts on the threaded adjustment traveler bar blocks on the first rail structure so that the first rail structure is moved left or right until the proper offset is achieved. While adjusting this offset, the first rail structure on the left side has to be kept parallel with the rail structures on the right side of the machine. The aforedescribed arrangement suffers from a number of disadvantages. For example, it requires two people and an average of three to four hours to replace the rail structures in order to change the lateral profile produced by the machine. There are three major reasons for this disadvantage. The first reason is that three of the four rail structures are long and heavy, requiring two people to remove and insert the rail structures from and into the machine. The second reason is that the shear and entry assemblies of the machine need to be partially disassembled and then reassembled to allow the long rail structures to be removed from and inserted into the machine. The third reason is that the rail structures must be mounted and realigned to the machine before being able to form the next lateral profile. It would therefore be desirable to have a roll forming machine wherein the lateral profile can be easily and quickly changed by a single person.
<SOH> SUMMARY OF THE INVENTION <EOH>According to this invention, there is provided a roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, the roll forming machine driving the supply strip along a predetermined path of travel through a plurality of roll forming stations. The inventive roll forming machine comprises a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between the side frames. A plurality of mounting blocks are each supported on a respective one of the lower transverse members adjacent a first one of the pair of side frames. Each of the mounting blocks has an upper horizontal surface and a plurality of spaced mounting holes extending into each mounting block from its upper surface. The plurality of mounting holes for each of the mounting blocks extend along a respective line orthogonal to the pair of side frames and have identical spacing on all of the plurality of mounting blocks. The upper horizontal surfaces of all of the plurality of mounting blocks lie along a single horizontal plane. A first mounting rail is secured to at least two of the plurality of mounting blocks by at least two mounting threaded members each extending through a respective opening in the first mounting rail and into a respective mounting hole in a respective one of the at least two mounting blocks. Each of the respective mounting holes occupies the same relative position in its respective mounting block so that the mounting rail is automatically parallel to the side frames of the machine. A first tooling rail is secured to the first mounting rail. At least one set of roll forming elements defining a roll forming station is secured to the first tooling rail. The first tooling rail with the at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of the cage vertically between an adjacent pair of upper transverse members. Thus, the removable sections are small enough to be handled by one person and, since they are removed vertically, the entry and shear assemblies of the machine remain intact during a tooling change. Also according to this invention, there is provided a roll forming machine of the type which forms an indeterminate length panel of a desired lateral profile from a uniform width supply strip of sheet metal having a pair of parallel straight edges, the roll forming machine driving the supply strip along a predetermined path of travel through a plurality of roll forming stations. The inventive roll forming machine comprises a rigid framework including a pair of rigid parallel side frames interconnected one to the other by a plurality of rigid parallel upper and lower transverse members to form a rigid cage having an interior and a width between the side frames. A first plurality of threaded shafts extends into the cage from a first one of the pair of side frames orthogonal to the pair of side frames and a first plurality of traveler bar blocks are each threadedly secured to a respective one of the first plurality of threaded shafts for movement therealong. A first mounting rail is secured to at least two of the first plurality of traveler bar blocks and a first tooling rail is secured to the first mounting rail. At least one set of roll forming elements defining a roll forming station is secured to the first tooling rail. The first tooling rail with the at least one set of roll forming elements secured thereto is dimensioned so that it can be manipulated into and out of the cage vertically between an adjacent pair of upper transverse members. Thus, the removable sections are small enough to be handled by one person and, since they are removed vertically, the entry and shear assemblies of the machine remain intact during a tooling change. In accordance with an aspect of this invention, there is provided an adjuster outside the cage which is coupled to the threaded shafts for controllably rotating the threaded shafts so that the traveler bar blocks, along with the mounting rails secured thereto, are movable toward and away from the first one of the pair of side frames. In accordance with a further aspect of this invention, the threaded shafts are divided into two groups and the adjuster includes a clutch coupled between the two groups of threaded shafts. Each group of threaded shafts is associated with a respective mounting rail. The clutch is selectively engageable and disengageable so that one of the mounting rails can be moved independently to provide an offset between the two mounting rails.
20040315
20060103
20050915
87486.0
2
CRANE, DANIEL C
ROLL FORMING MACHINE WITH IMPROVED ADJUSTABILITY AND PROFILE CHANGING CAPABILITY
SMALL
0
ACCEPTED
2,004
10,805,720
ACCEPTED
Transistor with shallow germanium implantation region in channel
A method of manufacturing a transistor and a structure thereof, wherein a very shallow region having a high dopant concentration of germanium is implanted into a channel region of a transistor at a low energy level, forming an amorphous germanium implantation region in a top surface of the workpiece, and forming a crystalline germanium implantation region beneath the amorphous germanium implantation region. The workpiece is annealed using a low-temperature anneal to convert the amorphous germanium region to a crystalline state while preventing a substantial amount of diffusion of germanium further into the workpiece, also removing damage to the workpiece caused by the implantation process. The resulting structure includes a crystalline germanium implantation region at the top surface of a channel, comprising a depth below the top surface of the workpiece of about 120 Å or less. The transistor has increased mobility and a reduced effective oxide thickness (EOT).
1. A transistor, comprising: a workpiece, the workpiece comprising a top surface; a crystalline implantation region disposed within the workpiece, the crystalline implantation region comprising germanium, wherein the crystalline implantation region extends within the workpiece from the top surface of the workpiece by about 120 Å or less; a gate dielectric disposed over the crystalline implantation region; a gate disposed over the gate dielectric; and a source region and a drain region formed in at least the crystalline implantation region within the workpiece. 2. The transistor according to claim 1, wherein the crystalline implantation region comprises a concentration of about 1×1017 to about 5×1023 atoms/cm3 of germanium. 3. The transistor according to claim 1, wherein the crystalline implantation region comprises a top portion comprising about 50% or greater of germanium. 4. The transistor according to claim 3, wherein the crystalline implantation region top portion comprises substantially 1001% germanium. 5. The transistor according to claim 3, wherein the crystalline implantation region top portion comprises a thickness of about 20 Å. 6. The transistor according to claim 1, wherein the gate dielectric comprises a material having a dielectric constant of about 4.0 or greater. 7. The transistor according to claim 6, wherein the gate dielectric comprises HfO2, HfSiOx, Al2O3, ZrO2, ZrSiOx, Ta2O5, La2O3, SixNy, SiON, or combinations thereof. 8. The transistor according to claim 1, wherein the gate dielectric comprises SiO2. 9. The transistor according to claim 1, further comprising isolation regions disposed in the workpiece, and further comprising spacers formed over and abutting sidewalls of the gate and gate dielectric. 10. The transistor according to claim 1, wherein the workpiece comprises a silicon-on-insulator (SOI) wafer. 11. A method of fabricating a transistor, the method comprising: providing a workpiece, the workpiece having a top surface; implanting germanium into the top surface of the workpiece, forming a first germanium-containing region within the top surface of the workpiece and forming a second germanium-containing region beneath the first germanium-containing region, the first germanium-containing region extending a first depth beneath the workpiece top surface, the second germanium-containing region having a second depth extending below the first depth, the first and second depth comprising about 100 Å or less below the top surface of the workpiece; depositing a gate dielectric material over the first germanium-containing region; depositing a gate material over the gate dielectric material; patterning the gate material and gate dielectric material to form a gate and a gate dielectric over the first germanium-containing region; and forming a source region and a drain region in at least the first germanium-containing region. 12. The method according to claim 11, wherein forming the first germanium-containing region comprises forming an amorphous germanium-containing region, and wherein forming the second germanium-containing region comprises forming a first crystalline germanium-containing region. 13. The method according to claim 12, further comprising annealing the workpiece, before depositing the gate dielectric material, converting the amorphous germanium-containing region to a second crystalline germanium-containing region, the first crystalline germanium-containing region and the second crystalline germanium-containing region comprising a single crystalline germanium-containing region, the single crystalline germanium-containing region comprising a third depth beneath the workpiece top surface. 14. The method according to claim 13, wherein the third depth is about 120 Å or less. 15. The method according to claim 13, wherein the first depth is about 45 Å or less, and the second depth is about 55 Å or less. 16. The method according to claim 13, wherein annealing the workpiece comprises heating the workpiece to a temperature of about 750° C. or less for about 60 minutes or less. 17. The method according to claim 12, further comprising annealing the workpiece, after depositing the gate dielectric material, converting the amorphous germanium-containing region to a second crystalline germanium-containing region, the first crystalline germanium-containing region and the second crystalline germanium-containing region comprising a single crystalline germanium-containing region, the single crystalline germanium-containing region comprising a third depth beneath the workpiece top surface. 18. The method according to claim 17, wherein the third depth is about 120 Å or less. 19. The method according to claim 17, wherein the first depth is about 45 Å or less, and the second depth is about 55 Å or less. 20. The method according to claim 17, wherein annealing the workpiece comprises heating the workpiece to a temperature of about 750° C. or less for about 60 minutes or less. 21. The method according to claim 12, wherein implanting germanium into the top surface of the workpiece comprises forming a damage region between the first germanium-containing region and the second germanium-containing region, further comprising annealing the workpiece, converting the amorphous germanium-containing region to a second crystalline germanium-containing region, the first crystalline germanium-containing region and the second crystalline germanium-containing region comprising a single crystalline germanium-containing region, and wherein annealing the workpiece causes the removal of the damaged region between the first germanium-containing region and the second germanium-containing region. 22. The method according to claim 11, wherein implanting the germanium comprises implanting germanium at an energy dose of about 5 keV or less. 23. The method according to claim 11, wherein implanting the germanium comprises implanting germanium at a dose of about 1×1015 to 1×1017 atoms/cm2. 24. The method according to claim 11, wherein implanting the germanium comprises forming the first germanium-containing region comprising at least 80% germanium at a top portion thereof. 25. The method according to claim 24, wherein implanting the germanium comprises forming the first germanium-containing region comprising substantially 1001% germanium at a top portion thereof. 26. The method according to claim 11, wherein depositing the gate dielectric material comprises depositing a material having a dielectric constant of about 4.0 or greater. 27. The method according to claim 26, wherein the depositing the gate dielectric material comprises depositing HfO2, HfSiOx, Al2O3, ZrO2, ZrSiOx, Ta2O5, La2O3, SixNy, SiON, or combinations thereof. 28. The method according to claim 11, wherein depositing the gate dielectric material comprises depositing SiO2. 29. The method according to claim 11, further comprising forming isolation regions in the workpiece, before implanting germanium into the top surface of the workpiece. 30. The method according to claim 11, further comprising forming spacers over sidewalls of the gate and gate dielectric. 31. The method according to claim 11, wherein providing the workpiece comprises providing a silicon-on-insulator (SOI) wafer. 32. The method according to claim 11, wherein forming the source and drain regions comprises a temperature of about 938.3° C. or less. 33. A method of fabricating a transistor, the method comprising: providing a workpiece, the workpiece having a top surface; implanting germanium into the top surface of the workpiece, forming an amorphous germanium-containing region within the top surface of the workpiece, the amorphous germanium-containing region extending about 45 Å or less beneath the workpiece top surface, wherein implanting germanium into the top surface of the workpiece also forms a first crystalline germanium-containing region beneath the amorphous germanium-containing region, the first crystalline germanium-containing region extending about 55 Å or less beneath the amorphous germanium-containing region; depositing a gate dielectric material over the amorphous germanium-containing region, the gate dielectric material having a dielectric constant of about 4.0 or greater; annealing the workpiece at a temperature of about 750° C. or less for about 60 minutes or less, re-crystallizing the amorphous germanium-containing region and forming a single second crystalline germanium-containing region within the top surface of the workpiece, the single second crystalline germanium-containing region comprising the re-crystallized amorphous germanium-containing region and the first crystalline germanium-containing region, the second crystalline germanium-containing region extending about 120 Å or less beneath the workpiece top surface; depositing a gate material over the gate dielectric material; patterning the gate material and gate dielectric material to form a gate and a gate dielectric over the second crystalline germanium-containing region; and forming a source region and a drain region in at least the second crystalline germanium-containing region. 34. The method according to claim 33, wherein implanting the germanium into the top surface of the workpiece comprises forming a damage region between first germanium-containing region and the second germanium-containing region, further comprising annealing the workpiece, converting the amorphous germanium-containing region to a second crystalline germanium-containing region, the first crystalline germanium-containing region and the second crystalline germanium-containing region comprising a single crystalline germanium-containing region, and wherein annealing the workpiece causes the removal of the damaged region between the first germanium-containing region and the second germanium-containing region. 35. The method according to claim 33, wherein implanting the germanium comprises implanting germanium at an energy dose of about 5 keV or less and at a dose of about 1×1015 to 1×1017 atoms/cm2. 36. The method according to claim 33, wherein implanting the germanium comprises forming the first germanium-containing region comprising at least 50% germanium at a top portion thereof. 37. The method according to claim 33, wherein the depositing the gate dielectric material comprises depositing HfO2, HfSiOx, Al2O3, ZrO2, ZrSiOx, Ta2O5, La2O3, SixNy, SiON, or combinations thereof. 38. The method according to claim 33, wherein forming the source and drain regions comprises a temperature of about 938.3° C. or less.
CROSS-REFERENCE TO RELATED APPLICATIONS This patent application relates to the following co-pending and commonly assigned patent applications: Ser. No. 10/748,995, filed on Dec. 30, 2003, entitled, “Transistor with Silicon and Carbon Layer in the Channel Region;” and Ser. No. 10/771,075, filed on Feb. 3, 2004, entitled, “Transistor with Doped Gate Dielectric,” which applications are hereby incorporated herein by reference. TECHNICAL FIELD The present invention relates generally to semiconductor devices, and more particularly to a method of fabricating a transistor and a structure thereof. BACKGROUND Semiconductor devices are used in a variety of electronic applications, such as personal computers, cell phones, digital cameras, and other electronic equipment, as examples. A transistor is an element that is utilized extensively in semiconductor devices. There may be millions of transistors on a single integrated circuit (IC), for example. A common type of transistor used in semiconductor device fabrication is a metal oxide semiconductor field effect transistor (MOSFET). The gate dielectric for MOSFET devices has in the past typically comprised silicon dioxide, which typically has a dielectric constant of 3.9. However, as devices are scaled down in size, using silicon dioxide for a gate dielectric becomes a problem because of gate leakage current, which can degrade device performance. Therefore, there is a trend in the industry towards the development of the use of high dielectric constant (k) materials for use as the gate dielectric in MOSFET devices. The term “high k materials” as used herein refers to a dielectric material having a dielectric constant of 4.0 or greater. High k gate dielectric development has been identified as one of the future challenges in the 2003 edition of International Technology Roadmap for Semiconductors (ITRS), incorporated herein by reference, which identifies the technological challenges and needs facing the semiconductor industry over the next 15 years. For low power logic (for portable electronic applications, for example), it is important to use devices having low leakage current, in order to extend battery life. Gate leakage current must be controlled in low power applications, as well as sub-threshold leakage, junction leakage, and band-to-band tunneling. For high performance (namely, high speed) applications, it is important to have a low sheet resistance and a minimal effective gate oxide thickness. To fully realize the benefits of transistor scaling, the gate oxide thickness needs to be scaled down to less than 2 nm. However, the resulting gate leakage current makes the use of such thin oxides impractical in many device applications where low standby power consumption is required. For this reason, the gate oxide dielectric material will eventually be replaced by an alternative dielectric material that has a higher dielectric constant. However, device performance using high k dielectric materials tends to suffer from trapped charge in the dielectric layer, which deteriorates the mobility, making the drive current lower than in transistors having silicon dioxide gate oxides, thus reducing the speed and performance of transistors having high k gate dielectric materials. FIG. 1 shows a cross-sectional view of a prior art semiconductor device 100 comprising a transistor with a high k gate dielectric material. The semiconductor device 100 includes field oxide regions 104 formed in a workpiece 102. The transistor includes a source S and a drain D that are separated by a channel region C. The transistor includes a gate dielectric 108 that comprises a high k insulating material. A gate 110 is formed over the gate dielectric 108, as shown. After the gate 110 is formed, the source region S and drain region D are lightly doped, e.g., by a lightly doped drain (LDD) implant, to form extension regions 120 of the source S and drain D. Insulating spacers 112 are then formed along the sidewalls of the gate 110 and gate dielectric 108, and a source/drain implant is performed on exposed surfaces of the workpiece 102, followed by a high temperature thermal anneal, typically at temperatures of about 1000 to 1050° C., to form the source S and drain D. A problem with the prior art semiconductor device 100 shown in FIG. 1 is that an interfacial oxide 114 is formed between the workpiece 102 and the high k dielectric 108, and an interfacial oxide 116 is formed between the high k dielectric 108 and the gate 110. The interfacial oxides 114 and 116 form because the workpiece 102 typically comprises silicon, which has a strong tendency to form silicon dioxide (SiO2) in the presence of oxygen, during the deposition of the high k gate dielectric 108, for example, forming interfacial oxide 114. Likewise, the gate 110 often comprises polysilicon, which also tends to form an interfacial oxide 116 comprising SiO2 on the top surface of the high k gate dielectric 108. The source S and drain D regions of the semiconductor device 100 may be made to extend deeper within the workpiece 102 by implanting ions of a dopant species, and annealing the workpiece 102 to cause diffusion of the dopant deep within the workpiece 102, forming the source S and drain D regions. Another problem with the prior art structure 100 is that the high temperature anneal processes used to form the source S and drain D tend to degrade the dielectric constant of the high k gate dielectric 108. In particular, when exposed to a high temperature treatment, the interfacial oxides 114 and 116 become thicker, increasing the effective oxide thickness (EOT) 118 evaluated electrically from the entire gate stack (the interfacial oxide 1 14, high k dielectric 108 and interfacial oxide 116) of the semiconductor device 100. Thus, by using a high k dielectric material for the gate dielectric 108, it can be difficult to decrease the gate dielectric 108 thickness to a dimension required for the transistor design, as devices 100 are scaled down in size. Therefore, what is needed in the art is a transistor design and fabrication method having a high k dielectric material, wherein the effective gate dielectric thickness is reduced. Another challenge in the scaling of transistors is increasing the mobility in the channel region, which increases the speed of the device. Thus, what is also needed in the art is a transistor design and fabrication method wherein mobility in the channel region is increased. SUMMARY OF THE INVENTION These and other problems are generally solved or circumvented, and technical advantages are generally achieved, by preferred embodiments of the present invention, which includes a transistor and method of fabrication thereof, having a channel region with a very shallow high concentration of germanium implanted therein. A low-temperature anneal process is used to re-crystallize the germanium implantation region in the channel region and eliminate defects or damage caused by the implantation process. A gate dielectric material is formed over the channel region, before or after the low-temperature anneal process, and a gate is formed over the high-k gate dielectric. Source and drain regions are formed by implanting dopants and using a low-temperature anneal process to drive in the dopants. Due to the presence of a high concentration of germanium at the top surface of the channel, and because of the low-temperature anneal processes used in accordance with embodiments of the present invention, the effective oxide thickness of the gate dielectric is kept to a minimum, resulting in a thinner effective gate dielectric (or oxide) thickness. The implanted germanium also increases the mobility of the channel region due to the strain in the channel region caused by the size misfit between silicon atoms and germanium atoms. For example, germanium atoms are larger than silicon atoms, so when germanium is introduced into a silicon atomic lattice structure, the larger germanium atoms create stress in the atomic structure in the channel region. In accordance with a preferred embodiment of the present invention, a transistor includes a workpiece, the workpiece comprising a top surface, and a crystalline implantation region disposed within the workpiece, the implantation region comprising germanium, wherein the crystalline implantation region extends within the workpiece from the top surface of the workpiece by about 120 Å or less. A gate dielectric is disposed over the implantation region, and a gate is disposed over the gate dielectric. The transistor includes a source region and a drain region formed in at least the crystalline implantation region within the workpiece. In accordance with another preferred embodiment of the present invention, a method of fabricating a transistor includes providing a workpiece, the workpiece having a top surface, and implanting germanium into the top surface of the workpiece, forming a first germanium-containing region within the top surface of the workpiece and forming a second germanium-containing region beneath the first germanium-containing region. The first germanium-containing region extends a first depth beneath the workpiece top surface, and the second germanium-containing region extends a second depth below the first depth. The first and second depth comprise about 100 Å or less below the top surface of the workpiece. The method includes depositing a gate dielectric material over the first germanium-containing region, depositing a gate material over the gate dielectric material, and patterning the gate material and gate dielectric material to form a gate and a gate dielectric over the first germanium-containing region. A source region and a drain region are formed in at least the first germanium-containing region. In accordance with yet another preferred embodiment of the present invention, a method of fabricating a transistor includes providing a workpiece, the workpiece having a top surface, and implanting germanium into the top surface of the workpiece, forming an amorphous germanium-containing region within the top surface of the workpiece, the amorphous germanium-containing region extending about 45 Å or less beneath the workpiece top surface, and also forming a first crystalline germanium-containing region beneath the amorphous germanium-containing region, the first crystalline germanium-containing region extending about 55 Å or less beneath the amorphous germanium-containing region. A gate dielectric material is deposited over the amorphous germanium-containing region, the gate dielectric material having a dielectric constant of about 4.0 or greater. The workpiece is annealed at a temperature of about 750° C. or less for about 60 minutes or less, re-crystallizing the amorphous germanium-containing region and forming a single second crystalline germanium-containing region within the top surface of the workpiece, the single second crystalline germanium-containing region comprising the re-crystallized amorphous germanium-containing region and the first crystalline germanium-containing region, the second crystalline germanium-containing region extending about 120 Å or less beneath the workpiece top surface. A gate material is deposited over the gate dielectric material, and the gate material and the gate dielectric material are patterned to form a gate and a gate dielectric over the second crystalline germanium-containing region. A source region and a drain region are formed in at least the second crystalline germanium-containing region. Advantages of preferred embodiments of the present invention include providing a transistor design and manufacturing method thereof, wherein the total anneal temperature for the transistor manufacturing process flow is reduced, reducing the thermal budget and improving the gate dielectric quality. Because of the presence of germanium in the workpiece, and because the anneal process to re-crystallize the amorphous germanium-containing region comprises a low temperature, the effective gate oxide thickness is kept to a minimum. The germanium in the channel region increases the mobility of holes and electrons in the channel region, resulting in a transistor device with a faster response time and increased drive current. The foregoing has outlined rather broadly the features and technical advantages of embodiments of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of embodiments of the invention will be described hereinafter, which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiments disclosed may be readily utilized as a basis for modifying or designing other structures or processes for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which: FIG. 1 shows a cross-sectional view of a prior art transistor; FIGS. 2 through 5 show cross-sectional views of a transistor at various stages of manufacturing in accordance with a preferred embodiment of the present invention, with FIG. 3 being an enlarged view of the channel region in FIG. 2, wherein a channel region of a transistor is implanted at a low energy with a high concentration of germanium, followed by a low temperature anneal process; and FIGS. 6 through 8 show cross-sectional views of another embodiment of the present invention, wherein the gate dielectric material is deposited before the low temperature anneal to re-crystallize the amorphous germanium-containing region at the top surface of the workpiece, and wherein FIG. 7 is an enlarged view of the channel region shown in FIG. 6. Corresponding numerals and symbols in the different figures generally refer to corresponding parts unless otherwise indicated. The figures are drawn to clearly illustrate the relevant aspects of the preferred embodiments and are not necessarily drawn to scale. DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention. The present invention will be described with respect to preferred embodiments in a specific context, namely a transistor formed on a semiconductor device. The invention may also be applied, however, to MOSFETs or other transistor devices, including p channel metal oxide semiconductor (PMOS) transistors, n channel metal oxide semiconductor (NMOS) transistors, and/or complimentary metal oxide semiconductor (CMOS) devices, as examples. Only one transistor is shown in each of the figures; however, there may be many other transistors and devices formed in the manufacturing process for the semiconductor devices shown. The use of germanium in a channel region of a transistor is desired, because germanium creates strain in the channel due to the lattice mis-match between silicon and germanium, having a potential to increase the mobility of holes and electrons in a transistor. However, there have been problems and challenges in introducing germanium into channel regions of transistors, which will be discussed next herein. Introducing germanium into a channel region by epitaxial growth of Si and Ge is disclosed in commonly assigned U.S. patent application, Ser. No. 10/748,995, filed on Dec. 30, 2003, entitled “Transistor with Silicon and Carbon Layer in the Channel Region,” which is incorporated herein by reference. However, growing an epitaxial layer in the channel region requires an additional deposition step in the manufacturing process flow of a transistor, which increases the manufacturing costs, and is thus undesirable. Attempts have been made in the past to implant germanium into the channel region of a transistor. However, implanting germanium in a substrate results in defects being formed, which causes leakage current in the transistor. In the past, the implantation of germanium was at an energy level of 30 keV to 200 keV with dose ranges from 1×1015 to 1×1017 atoms/cm2, resulting in (after thermal processing) a final channel composition of SiGe, with x<0.16. According to Plummer et al. in Silicon VLSE Technology, Fundamentals, Practice and Modeling, 2000, Prentice Hall, Upper Saddle River, N.J., at p. 453, which is incorporated herein by reference, the distribution of the implanted ions is often modeled to the first order by a Gaussian distribution given by Equation 1, below. Equation ⁢ ⁢ 1 ⁢ : ⁢ ⁢ C ⁡ ( x ) = C p ⁢ exp ⁡ ( - ( x - R p ) 2 2 ⁢ Δ ⁢ ⁢ R p 2 ) ; where Rp is the average projected range normal to the surface, ΔRp is the standard deviation or straggle about that range, and Cp is the peak concentration where the Gaussian is centered. In general, the peak concentration, Cp, is inverse proportional to the straggle, ΔRp, and the Rp and ΔRp are monotonically changed with the implant energy. To implant Ge with the previous mentioned energy range, the (Rp, ΔRp) range from (255 Å, 55 Å) to (1233 Å, 322 Å). This implantation of germanium causes damage to the substrate, creating leakage paths in the channel region, and causing high drain to substrate leakage current, low breakdown voltages and reduced drain current for the transistor. In addition, end-of-range (EOR) defects form below an amorphous/crystalline interface after the implant, and those defects are difficult to anneal out, even using a higher temperature process. These defects will cause source to drain leakage and “off state” leakage in the channel region of a transistor, degrading device performance. As mentioned above, by having Ge in the Si lattice, forming a SiGex layer, channel mobility will be increased. The higher the Ge content, the higher the mobility improvement. To increase the Ge content in this implant scheme, either the energy of the implant needs to be decreased, or dose of the implant needs to be increased. However, in a lower energy conditions, the depth of the EOR will be also shallower and close to the active channel region, which will make the leakage problem more severe. Because the end-of-range defects cannot be easily removed, attempts have been made to lower the amorphous/crystalline interface deeper into the substrate, e.g., to a depth of 1 μm or greater, in an attempt to avoid increasing the leakage current. That process requires an even larger implant energy (500 keV or larger) and because more complex defects are generated near the surface, makes this process not effective. Therefore, this implant scheme to form a SiGex layer is not preferable in semiconductor industry, and instead, the mainstream technique of introducing germanium into a channel region is by using a CVD (Chemical Vapor Deposition) method to deposit SiGex on top of a Si substrate. In a paper entitled, “Surface Proximity Effect on End-of Range Damage of Low Energy Ge Implantation” by King et al., presented at the Ultra Shallow Junctions (USJ) 2003 Conference, pp. 447-450, which is incorporated herein by reference, germanium was implanted into a silicon substrate using an energy of 10 keV at a concentration of 1×1015 atoms/cm2, and a portion of the implanted germanium layer was mechanically thinned by lapping. According to the authors, a lapped substrate having an amorphous/crystalline interface at a depth of 45 Å resulted in no end-of-range defects being formed during an anneal process. The surface proximity, e.g., implanting the germanium at a depth close to the surface of the substrate, resulted in subsequent annihilation of defects upon annealing. Embodiments of the present invention achieve technical advantages by providing a novel method of manufacturing a transistor, wherein a very shallow region of germanium is introduced into a channel region of a transistor, without requiring an additional deposition or epitaxial growth process, and also avoiding increasing the leakage current of the transistor. Germanium is implanted in a shallow top region of a workpiece in a channel region of the transistor, at a depth of about 45 Å or less. The germanium is implanted using a low energy level and at a high concentration dose, creating an initially amorphous region of germanium, after the implant. The amorphous germanium implantation region is annealed using a low-temperature anneal to convert the amorphous germanium region implanted to a crystalline state while preventing a substantial amount of diffusion of germanium further into the workpiece, and also removing damage to the workpiece that may have been caused by the low energy, high dopant concentration shallow implant. The resulting structure includes a crystalline germanium implantation region at the top surface of a channel, comprising a depth below the top surface of the workpiece of about 120 Å or less. An interfacial oxide formed between the germanium-implanted workpiece and the gate dielectric has a minimal thickness, resulting in a lower electrical effective gate oxide thickness (EOT). The shallow germanium region in the channel of the transistor increases the hole and electron mobility. FIGS. 2 through 5 show cross-sectional views of a preferred embodiment of the present invention at various stages of manufacturing. Referring first to FIG. 2, a semiconductor device 200 comprises a workpiece 202. The workpiece 202 may include a semiconductor substrate comprising silicon or other semiconductor materials covered by an insulating layer, for example. The workpiece 202 may also include other active components or circuits, not shown. The workpiece 202 may comprise silicon oxide over single-crystal silicon, for example. The workpiece 202 may include other conductive layers or other semiconductor elements, e.g., transistors, diodes, etc. The workpiece 202 may also comprise a silicon-on-insulator (SOI) substrate, for example. The workpiece 202 may be lightly doped (not shown). In general, the workpiece 202 is doped with the either N or P type dopants, depending on whether the junctions of the transistor to be formed will be P or N type, respectively. For example, if the transistors to be manufactured comprise PMOS transistors, the workpiece 202 may be lightly doped with N type dopants. Or, if NMOS transistors will be formed, the workpiece 202 may be lightly doped with P type dopants. Isolation regions 204 may be formed in various locations on the workpiece 202, as shown. The isolation regions 204 may comprise shallow trench isolation (STI) regions or field oxide regions that are disposed on either side of a channel region C of a transistor 250 (not shown in FIG. 2; see FIG. 5), for example. The isolation regions 204 may be formed by depositing a photoresist over the workpiece 202, not shown. The photoresist may be patterned using lithography techniques, and the photoresist may be used as a mask while the workpiece 202 is etched to form holes or patterns for the isolation regions 204 in a top surface of the workpiece 202. An insulator such as an oxide, for example, may be deposited over the workpiece 202 to fill the patterns, forming isolation regions 204. Alternatively, the isolation regions 204 may be formed by other methods and may comprise other insulating materials, for example. Note that if PMOS and NMOS transistors (not shown) are to be manufactured on the same workpiece 202, the workpiece 202 may be lightly doped with P type dopants, the NMOS portions of the workpiece 202 may be masked, and well implants may then be formed to create N wells for the PMOS devices. P type implants may then be implanted into the NMOS portions. The exposed portions of the workpiece 202 are subjected to a pre-gate cleaning process to remove any native oxides or other debris or contaminants from the top surface of the workpiece 202. The pre-gate treatment may comprise a HF, HCl or ozone based cleaning treatment, as examples, although the pre-gate treatment may alternatively comprise other chemistries. Next, germanium is implanted into a shallow top region of the exposed regions of the workpiece 202, in particular in a channel region C of a transistor, as shown in FIG. 2. Germanium atoms are preferably implanted using a low energy implant, preferably at an energy level of about 5 keV or less for a time period of about 3 to 30 minutes per wafer or workpiece (for example, in a batch tool that handles X number of wafers, the time period for the low energy implant would be (3 to 30 minutes)×X). The implantation dose is preferably targeted at the surface 232 of the workpiece 202, and comprises a high dose, preferably about 1×1015 to 1×1017 atoms/cm2 of germanium, for example. The germanium implantation step results in the formation of an amorphous germanium implantation region 230 (also referred to herein as an amorphous germanium-containing region) proximate the top surface 232 of the workpiece 202, and a crystalline germanium implantation region 236 (also referred to herein as a crystalline germanium-containing region) disposed beneath the amorphous germanium implantation region 230. The amorphous germanium implantation region 230 preferably comprises a depth d1 of about 45 Å or less beneath the top surface 232 of the workpiece 202, for example. The crystalline germanium implantation region 236 preferably comprises a depth d2 of about 55 Å or less beneath the amorphous germanium implantation region 230. The total depth d3 of the crystalline germanium implantation region 236 and the amorphous germanium implantation region 230 preferably comprises a depth of about 100 Å or less, for example. The amorphous germanium implantation region 230 and the crystalline germanium implantation region 236 may be separated by a damage region 234 as a result of the implantation process. Implantation involves bombardment of the workpiece 202 by atoms (in this case, germanium atoms) which can result in physical damage within the workpiece 202. Because the damage region 234 is located close to the top surface 232 of the workpiece 202, the damage region 234 will be repaired or annihilated in a subsequent low-temperature anneal step, to be described further herein. The germanium implantation process results in a Gaussian distribution (e.g., a distribution appearing similar to one side of a Bell curve) of germanium ions implanted within the top surface 232 of the workpiece 202, as shown in greater detail in FIG. 3. The concentration of germanium is preferably higher at an upper level 230 a than at each subsequent lower level 230b, 230c, 230d, 236a, 236b beneath the top surface 232 of the workpiece 202. The concentration of germanium in a top portion 230 near the top surface 232 of the workpiece 202 may comprise about 50% or greater of germanium and about 50% or less of silicon, as an example. The dopant concentration of germanium at upper portions of the amorphous germanium implantation region 230a and 230b may comprise on the order of about 1×1018 to 5×1023 atoms/cm3, as examples. The dopant concentration of germanium at lower portions of the crystalline germanium implantation region 236b may comprise a concentration of about 1×1017 or less, for example. The dopant concentration of germanium after the low energy shallow implant preferably results in the highest concentration of germanium dopants near the top surface 232 of the workpiece 202, with the germanium dopant concentration being gradually less extending downward through the workpiece 202. In one embodiment, the top portion 230a of the amorphous germanium implantation region preferably comprises substantially 1001% germanium. This embodiment is particularly effective in reducing the electrical effective oxide thickness of the transistor, to be described further herein. Note that preferably, a sacrificial oxide is not deposited over the workpiece 202 before implanting the germanium, as is sometimes used in ion implantation processes. By not using a sacrificial oxide, a higher concentration of germanium may be implanted, in accordance with preferred embodiments of the present invention. In particular, higher concentrations of germanium may be implanted at low energy levels of 5 keV or less, if a sacrificial oxide is not used. Using a sacrificial oxide would require a higher energy level to achieve the germanium implantation, and a low energy level implant is desired to achieve the shallow implant of about 100 Å or less. Furthermore, in accordance with embodiments of the present invention, the workpiece 202 is preferably not exposed to a temperature of over about 938.3° C. after the germanium is implanted into the shallow top region of the workpiece 202, which is the melting point of germanium. Heating the workpiece 202 to a temperature over about 938.3° C. would deleteriously affect the transistor performance. Furthermore, preferably the workpiece 202 is not heated to a temperature of greater than about 750° C. for extended periods of time after the germanium implant and before the gate dielectric material deposition, to avoid causing excessive diffusion of germanium further into the workpiece 202. Next, the workpiece 202 is subjected to a low temperature anneal process, e.g., at a temperature of about 750° C. or less for about 60 minutes or less, for example. The low temperature anneal process may comprise a solid phase epitaxial regrowth (SPER) process, for example. The low temperature anneal process causes the amorphous germanium implantation region 230 to re-crystallize (e.g., the top region of the workpiece where the amorphous germanium implantation region 230 now resides was crystalline prior to the implantation of the germanium), and also repairs the damaged region 234, resulting in a single crystalline germanium implantation region 238 having a depth d4 beneath the top surface 232 of the workpiece, as shown in FIG. 4. The single crystalline germanium implantation region 238 comprises the re-crystallized amorphous germanium implantation region 230 and the crystalline germanium implantation region 236. The total depth d3 of the amorphous germanium-containing region 230 and crystalline germanium-containing region 236 of FIG. 2 may be increased by about 20 Å or less to a depth d4 of about 120 Å or less during the low temperature anneal process, caused by diffusion of germanium downwards into the workpiece 202. Advantageously, because the anneal process to re-crystallize the amorphous implantation region 230 and repair the damaged region 234 is at a low temperature, the depth d4 is not increased much (e.g., only about 20 Å or less) during the low temperature anneal process. Regions of the workpiece 202 (not shown) may then be implanted for a VT threshold voltage, for example. An anti-punch-through implant may then be performed on portions of the workpiece 202, also not shown. Alternatively, the VT and anti-punch-through implants may be performed on the workpiece 202 before the germanium implant, in accordance with a preferred embodiment of the present invention. The workpiece 202 may then be exposed to another pre-gate cleaning or treatment comprising a HF, HCl or ozone based cleaning treatment, as examples, to remove any particulates, contaminates, or native oxide particles disposed on the germanium implantation region 238 in the channel region C, for example. A gate dielectric material 240 is deposited over the workpiece 202, as shown in FIG. 4. The gate dielectric material 240 may be also deposited before annealing the workpiece, to be described herein with reference to FIGS. 6-8. Referring again to FIG. 4, in one embodiment, the gate dielectric material 240 preferably comprises a high k material having a dielectric constant of 4.0 or greater. In this embodiment, the gate dielectric material 240 preferably comprises HfO2, HfSiOx, Al2O3, ZrO2, ZrSiOx, Ta2O5, La2O3, SixNy or SiON, as examples, although alternatively, the gate dielectric material 240 may comprise other high k insulating materials. The gate dielectric material 240 may comprise a single layer of material, or alternatively, the gate dielectric material 240 may comprise two or more layers. In one embodiment, one or more of these materials can be included in the gate dielectric material 240 in different combinations or in stacked layers. The gate dielectric material 240 may be deposited by chemical vapor deposition (CVD), atomic layer deposition (ALD), metal organic chemical vapor deposition (MOCVD), physical vapor deposition (PVD), or jet vapor deposition (JVP), as examples, although alternatively, the gate dielectric material 240 may be deposited using other suitable deposition techniques. The gate dielectric material 240 preferably comprises a thickness of about 10 Å to about 60 Å in one embodiment, although alternatively, the gate dielectric material 240 may comprise other dimensions, such as 80 Å or less, as an example. Embodiments of the present invention are particularly advantageous when used in transistor designs having high dielectric constant materials for the gate dielectric material 240, because a concern with high dielectric constant gate materials is reducing the effective gate oxide thickness, which advantageously is reduced by embodiments of the present invention. Furthermore, transistors having high-k gate dielectrics typically have lower electron and hole mobility than transistors utilizing more traditional gate dielectric materials, such as SiO2 or SiON, and thus, this is another reason that embodiments of the invention are advantageous for use with high k gate dielectric materials. However, embodiments of the present invention also have useful application in transistor designs having more traditional gate dielectric materials, such as SiO2 or SiON, as examples. A gate material 242 is deposited over the gate dielectric material 240. The gate material 242 preferably comprises a conductor, such as a metal or polysilicon, although alternatively, other conductive and semiconductive materials may be used for the gate material 242. For example, the gate material 242 may comprise TiN, HfN, TaN, a fully silicided gate material (FUSI), or other metals, as examples. The gate material 242 may comprise a plurality of stacked gate materials, such as a metal underlayer with a polysilicon cap layer disposed over the metal underlayer, or a combination of a plurality of metal layers that form a gate electrode stack. Alternatively, in another embodiment, the gate material 242 may comprise polysilicon or other semiconductor materials. The gate material 242 may be deposited using CVD, PVD, ALD, or other deposition techniques, as examples. The gate material 242 preferably comprises a thickness of about 1500 Å, although alternatively, the gate material 242 may comprise about 1000 Å to about 2000 Å, or other dimensions, for example. The gate material 242 and the gate dielectric material 240 are patterned using a lithography technique to form a gate 242 and a gate dielectric 240 of a transistor, as shown in FIG. 5. For example, a photoresist (not shown) may be deposited over the workpiece 202. The photoresist may be patterned with a desired pattern for the gate and gate dielectric, and the photoresist may be used as a mask while the gate material 242 and the gate dielectric material 240 are etched to form the gate material 242 and gate dielectric material 240 into the desired pattern. The photoresist is then stripped or removed. Note that a thin interfacial layer 244 is likely to be formed during the deposition of the gate dielectric material 240, or during a cleaning treatment such as a wet pre-clean, prior to the gate dielectric material 240 deposition, as examples. This thin interfacial layer 244 typically comprises a thickness of about 7 Å or less. The thin interfacial layer 244 forms by the reaction of silicon or other semiconductor material in the workpiece 202 with an oxide in the gate dielectric material 240 or pre-clean process. Advantageously, the thickness of the thin interfacial layer 244 is minimized by the presence of germanium (e.g., at 230a) in the top surface of the workpiece 202, and also because only low temperature anneal processes are used in the manufacturing process from this point forward. A thin interfacial layer may also be formed between the gate 242 and the gate dielectric 240 (not shown in FIG. 5; see FIG. 8). Next, in accordance with a preferred embodiment of the present invention, a source region S and drain region D are then formed proximate the channel region C, as shown in FIG. 5. More particularly, the source region S and the drain region D are preferably formed in at least the crystalline germanium implantation region 238, as shown. For example, the source region S and the drain region D may also extend through the crystalline germanium implantation region 238 into the workpiece 202 below the crystalline germanium implantation region 238 (not shown). The source region S and drain region D may be formed using an optional extension implant, which may comprise implanting dopants using a low energy implant at about 200 eV to 1 keV, for example, to form extension regions 220. A spacer material such as silicon nitride or other insulator, as examples, is deposited over the entire workpiece 202, and then the spacer material is etched using an etch process such as an anisotropic etch, leaving the spacers 248 disposed over sidewalls of the gate dielectric 240 and gate 242, as shown. Alternatively, the spacers 248 may be more rectangular-shaped and may be patterned using a photoresist as a mask, as an example, not shown. To complete the implantation of the source S and drain D regions, a second dopant implantation process is then performed on exposed portions of the germanium implantation region 238, preferably using a slightly higher energy implantation process than was used for the extension regions 220. For example, the second implantation process may be at about 5 keV to 20 keV. A low-temperature temperature anneal may then be performed to drive in and activate the dopant of the extension regions 220 and the source S and drain D regions. The low-temperature anneal is preferably performed at a temperature of less than 938.3° C. to avoid damaging the germanium in the germanium implantation region 238, for example. The doped regions of the source S and drain D and extension regions 220 extend beneath the spacers 248 and also extend laterally beneath the gate 242 and gate dielectric 240 by about 100 Å or less, as shown in FIG. 5. The low-temperature anneal process to form the source S and drain D preferably comprises a temperature of about 938.3° C. or less for about 1 hour or less, and more preferably comprises a temperature of about 900° C. or less for about 20 minutes or less, as examples. The doped regions of the source S and drain D preferably comprise a thickness of about 100 Å or less. The manufacturing process for the device 200 is then continued to complete the device 200, preferably without subjecting the semiconductor device 200 to high temperatures, e.g., preferably without exposing the semiconductor device 200 to a temperature greater than about 938.3° C. Thus, in accordance with an embodiment of the invention, a transistor 250 is formed that includes a gate 242, a source S and a drain D, wherein the transistor 250 channel region C comprises a shallow crystalline germanium implantation region 238 formed therein. The germanium implantation region 238 in the channel region C increases the mobility of the transistor device 250. The transistor device 250 has a thin effective oxide thickness 246 which includes the interfacial layer 244, the high k gate dielectric 240, and a thin interfacial layer between the gate 242 and gate dielectric 240, if present, not shown. Advantageously, because the transistor 250 is not exposed to a high-temperature anneal process, e.g., temperatures of 938.3° C. or greater, increasing the thickness of the interfacial layer 244 is avoided, thus decreasing the effective oxide thickness 246. For example, the interfacial layer 244 preferably comprises a thickness of about 2 Å to about 7 Å, and more preferably comprises a thickness of about 7 Å or less. The transistor 250 is particularly advantageous in applications wherein a high drive current and minimal effective oxide thickness are important, such as in high performance (e.g., high speed) applications, for example, in use with memory and other devices. The germanium implantation of the channel region particularly enhances performance of devices with high-k gate stack Ge oxides (such as GeO2 or GeO), which are unstable as compared to Si oxides. By having Ge at the workpiece 232 surface, the bottom interfacial layer 244, which primarily comprises Si oxide, between Si substrate 238 and high-k dielectric 240 is reduced in thickness and hence, a smaller EOT is achievable for the transistor device 250, which is advantageous in both low power and high performance applications. In addition, Ge segregates near the workpiece top surface 232, proximate the interfacial oxide 244 comprising Si oxides, forming a high Ge content region at the interface (e.g., at 230a in FIG. 3). This further enhances the channel mobility of the transistor device 250. For these reasons, the Ge channel implant process described herein is particularly advantageous in high-k gate stack 240 applications. FIGS. 6 through 8 show cross-sectional views of another embodiment of the present invention, in which a similar process flow may be used as was described for FIGS. 2 through 5. Similar reference numbers are designated for the various elements in FIGS. 6 through 8 as were used in FIGS. 2 through 5. To avoid repetition, each reference number shown in the figure is not described again in detail herein. Rather, similar materials and thicknesses described for x02, x04, etc. . . . are preferably used for the material layers shown as were described for FIGS. 2 through 5, where x=2 in FIGS. 2 through 5 and x=3 in FIGS. 6 through 8. As an example, the preferred and alternative materials listed for the high k gate dielectric material 240 in the description for FIGS. 2 through 5 are preferably also used for the high k gate dielectric material 340 in FIGS. 6 through 8. As shown in FIG. 6, in this embodiment, the gate dielectric material 340 is deposited before the low-temperature anneal process, immediately after the shallow implantation process to form the amorphous germanium implantation region 330 proximate the top surface 332 of the workpiece 302, and a crystalline germanium implantation region 336 disposed beneath the amorphous germanium implantation region 330. An advantage of this embodiment is that Ge is maintained at the maximum level because Ge out-diffusion is blocked by the gate dielectric 340. The gate dielectric 240 functions as a cap layer during the low temperature anneal process, in this embodiment. For example, in the embodiment shown in FIGS. 2 through 5, in the low temperature anneal process after implanting germanium, Ge may out-diffuse upwards into the ambient (e.g., it may evaporate). However, by having the gate dielectric 340 disposed over the workpiece top surface 332 during the low-temperature anneal, Ge is prevented from leaving from the top surface 332 of the workpiece 302. FIG. 7 shows a more detailed view of the channel region C of FIG. 6. Note than in accordance with embodiments of the present invention, the top portion 330a of the amorphous germanium implantation region 330 may advantageously comprise substantially 1001% germanium. This is advantageous because germanium oxide (GeO2) is not stable and does not have a strong tendency to form, as does SiO2. Therefore, by having a top layer 330a of 1001% germanium, the thickness of interfacial oxide 344 formed is minimal, e.g., 4 Å or less, shown in FIG. 8, and alternatively, no interfacial oxide 344 may be formed at all between the high k gate dielectric 340 and the germanium implantation region 338 (not shown in the figures). Note that an interfacial oxide 352 may also be formed between high k gate dielectric 340 and the gate electrode 342, as shown in FIG. 8. Note also that the transistor 360 may not include shallow extension regions in the source S and drain D regions, but rather, the source S and drain D region may comprise an extension region that extends laterally beneath a portion of the gate dielectric 340 and the gate electrode 342. Experimental Results Experiments show that a low energy shallow implant of germanium in a channel region of a transistor device having a high k dielectric result in transistors having increased transconductance and increased saturation current, indicating that the transistors have increased mobility in the channel region. The transistors also had a measurable lower EOT. Experimental results of implementing embodiments of the present invention will next be described, with the manufacturing steps being listed sequentially, and with reference to FIGS. 6-8. CMOS devices comprising NMOS and PMOS transistors having germanium-implanted channel regions were fabricated. A control wafer was also fabricated, using the same materials, dimensions, and manufacturing processes, but not having a germanium implant in the channel region. Germanium was implanted into the top surfaces 332 of workpieces 302 of the experimental wafers at energy levels ranging from 0.5 keV to 4 keV at doses ranging from 5×1015 to 1×1016 Ge atoms/cm2. A gate dielectric 340 comprising 45 Å of 20% HfSiOx (20% SiO2 and 80% HfO2) was deposited over the workpieces 302. The workpieces 302 were annealed at 700° C. in a NH3 ambient for 60 seconds. A gate material 342 comprising 100 Å of TiN and a subsequently-deposited 1800 Å layer of polysilicon was formed over the gate dielectric 340. The gate material 342 and the gate dielectric 340 were patterned to form a gate 342 and gate dielectric 340. Source and drain regions S/D were formed by implanting As for the NMOS devices, and by implanting BF2 for the PMOS devices, and annealing the workpieces 302 at 900° C. for 60 seconds. The electrical performance of transistors 360 having germanium implanted in the channel region C was compared to transistors having no germanium implant in the channel region. The electrical effective oxide thickness (EOT) of transistors 360 having a shallow germanium implant in the channel was lower on average by about 10%, and was lower by 1.1 Å in one instance than the control wafer. The saturation current and transconductance were higher in the Ge-implanted wafers than in the control wafers by about 20%. For example, the saturation current of one Ge-implanted wafer was 5.175 ηamperes/μm, compared to 4.525 μamperes/μm for the control wafer. The transconductance was 17.5 μSiemens/μm of one Ge-implanted wafer, compared to 16.2 μSiemens/μm for the control wafer. The electron mobility of Ge wafers was slightly higher for the control wafer, by about 5%. As an example, the mobility was 89.6 cm2/voltage-seconds for one Ge-implanted wafer and the mobility was 86.1 cm2/voltage-seconds for the control wafer. Optimal performance of germanium-implanted channel transistors 360 was seen when the germanium implantation process comprised 2 keV at a dose of 1×1016 atoms/cm2 germanium. Note that in the experimental results described herein, the anneal was performed in an ammonia ambient, however, in a preferred embodiment, the low energy germanium implantation process comprises other ambient gases such as N2. The order of the manufacturing process steps described herein may be altered. For example, in a preferred embodiment, the workpiece is preferably subjected to a pre-gate clean immediately before the germanium implant, to minimize the amount of native oxide present on the workpiece surface prior to the germanium implant, thus increasing the concentration of germanium implanted in the top surface of the workpiece. Alternatively, the pre-gate clean may be performed at other stages in the manufacturing process. In one preferred embodiment, the process steps are completed in the following order: form field oxide regions 204 in a workpiece 202, implant VT implants, implant anti-punch-through implants, pre-gate clean, implant shallow germanium regions in channel region C as described herein, deposit gate dielectric 240/340, low-temperature anneal, deposit gate material 242/342, pattern gate 242/342 and gate dielectric 240/340, implant source/drain extension implants, form spacers, and form deep source and drain regions S/D. Advantages of preferred embodiments of the present invention include providing transistor designs 250 and 360 and methods of manufacture thereof, having a channel region C with a shallow germanium implantation region 238 and 338 formed therein. The germanium is implanted using a low energy and high dopant concentration process. Amorphous regions 230 and 330 and damaged areas 234 and 334 are re-crystallized and repaired, respectively, using a low temperature anneal process. Electron and hole mobility in the channel region C is increased, and the effective oxide thickness 246 and 346 is minimized, due to the high concentration of germanium at the top surface 232 and 332 of the workpiece 202 and 302, which minimizes interfacial oxide 244 and 344 formation. Because a low-temperature anneal process is used to re-crystallize the amorphous germanium implant regions 230 and 330 and also to form the source S and drain D region, the effective oxide thicknesses 246 and 346 of the gate dielectric 240 and 340 are not substantially increased, resulting in a thinner effective gate dielectric thickness (or effective oxide thickness (EOT), 246 and 346, which comprises the total thickness of any thin interfacial oxide layers 244, 344 and 352 and gate dielectric 240 and 340, respectively. The transistors 250 and 360 described herein benefit from a reduced thermal budget and improved gate quality. Another advantage of embodiments of the present invention is the ability to implant germanium in a plurality of wafers or workpieces 202 and 302 at a single time, e.g., using batch dopant implantation processing tools that are commonly found in semiconductor manufacturing facilities. In one preferred embodiment, the gate dielectric material 340 is formed over the channel region C before the low temperature anneal process to re-crystallize amorphous germanium-implanted region in the workpiece 302, so that the gate dielectric material 340 acts as a capping layer, preventing germanium from outdiffusing or evaporating from the top surface of the workpiece 302, and resulting in an increase in the germanium concentration at the top surface 332 of the workpiece 302. Again, only one transistor is shown in each figure. However, a plurality of transistors may be formed simultaneously in accordance with embodiments of the present invention, not shown. Furthermore, PMOS and NMOS transistors may be fabricated on a single workpiece, by masking portions of the workpiece while other portions are processed. Although embodiments of the present invention and their advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. For example, it will be readily understood by those skilled in the art that many of the features, functions, processes, and materials described herein may be varied while remaining within the scope of the present invention. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
<SOH> BACKGROUND <EOH>Semiconductor devices are used in a variety of electronic applications, such as personal computers, cell phones, digital cameras, and other electronic equipment, as examples. A transistor is an element that is utilized extensively in semiconductor devices. There may be millions of transistors on a single integrated circuit (IC), for example. A common type of transistor used in semiconductor device fabrication is a metal oxide semiconductor field effect transistor (MOSFET). The gate dielectric for MOSFET devices has in the past typically comprised silicon dioxide, which typically has a dielectric constant of 3.9. However, as devices are scaled down in size, using silicon dioxide for a gate dielectric becomes a problem because of gate leakage current, which can degrade device performance. Therefore, there is a trend in the industry towards the development of the use of high dielectric constant (k) materials for use as the gate dielectric in MOSFET devices. The term “high k materials” as used herein refers to a dielectric material having a dielectric constant of 4.0 or greater. High k gate dielectric development has been identified as one of the future challenges in the 2003 edition of International Technology Roadmap for Semiconductors (ITRS), incorporated herein by reference, which identifies the technological challenges and needs facing the semiconductor industry over the next 15 years. For low power logic (for portable electronic applications, for example), it is important to use devices having low leakage current, in order to extend battery life. Gate leakage current must be controlled in low power applications, as well as sub-threshold leakage, junction leakage, and band-to-band tunneling. For high performance (namely, high speed) applications, it is important to have a low sheet resistance and a minimal effective gate oxide thickness. To fully realize the benefits of transistor scaling, the gate oxide thickness needs to be scaled down to less than 2 nm. However, the resulting gate leakage current makes the use of such thin oxides impractical in many device applications where low standby power consumption is required. For this reason, the gate oxide dielectric material will eventually be replaced by an alternative dielectric material that has a higher dielectric constant. However, device performance using high k dielectric materials tends to suffer from trapped charge in the dielectric layer, which deteriorates the mobility, making the drive current lower than in transistors having silicon dioxide gate oxides, thus reducing the speed and performance of transistors having high k gate dielectric materials. FIG. 1 shows a cross-sectional view of a prior art semiconductor device 100 comprising a transistor with a high k gate dielectric material. The semiconductor device 100 includes field oxide regions 104 formed in a workpiece 102 . The transistor includes a source S and a drain D that are separated by a channel region C. The transistor includes a gate dielectric 108 that comprises a high k insulating material. A gate 110 is formed over the gate dielectric 108 , as shown. After the gate 110 is formed, the source region S and drain region D are lightly doped, e.g., by a lightly doped drain (LDD) implant, to form extension regions 120 of the source S and drain D. Insulating spacers 112 are then formed along the sidewalls of the gate 110 and gate dielectric 108 , and a source/drain implant is performed on exposed surfaces of the workpiece 102 , followed by a high temperature thermal anneal, typically at temperatures of about 1000 to 1050° C., to form the source S and drain D. A problem with the prior art semiconductor device 100 shown in FIG. 1 is that an interfacial oxide 114 is formed between the workpiece 102 and the high k dielectric 108 , and an interfacial oxide 116 is formed between the high k dielectric 108 and the gate 110 . The interfacial oxides 114 and 116 form because the workpiece 102 typically comprises silicon, which has a strong tendency to form silicon dioxide (SiO 2 ) in the presence of oxygen, during the deposition of the high k gate dielectric 108 , for example, forming interfacial oxide 114 . Likewise, the gate 110 often comprises polysilicon, which also tends to form an interfacial oxide 116 comprising SiO 2 on the top surface of the high k gate dielectric 108 . The source S and drain D regions of the semiconductor device 100 may be made to extend deeper within the workpiece 102 by implanting ions of a dopant species, and annealing the workpiece 102 to cause diffusion of the dopant deep within the workpiece 102 , forming the source S and drain D regions. Another problem with the prior art structure 100 is that the high temperature anneal processes used to form the source S and drain D tend to degrade the dielectric constant of the high k gate dielectric 108 . In particular, when exposed to a high temperature treatment, the interfacial oxides 114 and 116 become thicker, increasing the effective oxide thickness (EOT) 118 evaluated electrically from the entire gate stack (the interfacial oxide 1 14 , high k dielectric 108 and interfacial oxide 116 ) of the semiconductor device 100 . Thus, by using a high k dielectric material for the gate dielectric 108 , it can be difficult to decrease the gate dielectric 108 thickness to a dimension required for the transistor design, as devices 100 are scaled down in size. Therefore, what is needed in the art is a transistor design and fabrication method having a high k dielectric material, wherein the effective gate dielectric thickness is reduced. Another challenge in the scaling of transistors is increasing the mobility in the channel region, which increases the speed of the device. Thus, what is also needed in the art is a transistor design and fabrication method wherein mobility in the channel region is increased.
<SOH> SUMMARY OF THE INVENTION <EOH>These and other problems are generally solved or circumvented, and technical advantages are generally achieved, by preferred embodiments of the present invention, which includes a transistor and method of fabrication thereof, having a channel region with a very shallow high concentration of germanium implanted therein. A low-temperature anneal process is used to re-crystallize the germanium implantation region in the channel region and eliminate defects or damage caused by the implantation process. A gate dielectric material is formed over the channel region, before or after the low-temperature anneal process, and a gate is formed over the high-k gate dielectric. Source and drain regions are formed by implanting dopants and using a low-temperature anneal process to drive in the dopants. Due to the presence of a high concentration of germanium at the top surface of the channel, and because of the low-temperature anneal processes used in accordance with embodiments of the present invention, the effective oxide thickness of the gate dielectric is kept to a minimum, resulting in a thinner effective gate dielectric (or oxide) thickness. The implanted germanium also increases the mobility of the channel region due to the strain in the channel region caused by the size misfit between silicon atoms and germanium atoms. For example, germanium atoms are larger than silicon atoms, so when germanium is introduced into a silicon atomic lattice structure, the larger germanium atoms create stress in the atomic structure in the channel region. In accordance with a preferred embodiment of the present invention, a transistor includes a workpiece, the workpiece comprising a top surface, and a crystalline implantation region disposed within the workpiece, the implantation region comprising germanium, wherein the crystalline implantation region extends within the workpiece from the top surface of the workpiece by about 120 Å or less. A gate dielectric is disposed over the implantation region, and a gate is disposed over the gate dielectric. The transistor includes a source region and a drain region formed in at least the crystalline implantation region within the workpiece. In accordance with another preferred embodiment of the present invention, a method of fabricating a transistor includes providing a workpiece, the workpiece having a top surface, and implanting germanium into the top surface of the workpiece, forming a first germanium-containing region within the top surface of the workpiece and forming a second germanium-containing region beneath the first germanium-containing region. The first germanium-containing region extends a first depth beneath the workpiece top surface, and the second germanium-containing region extends a second depth below the first depth. The first and second depth comprise about 100 Å or less below the top surface of the workpiece. The method includes depositing a gate dielectric material over the first germanium-containing region, depositing a gate material over the gate dielectric material, and patterning the gate material and gate dielectric material to form a gate and a gate dielectric over the first germanium-containing region. A source region and a drain region are formed in at least the first germanium-containing region. In accordance with yet another preferred embodiment of the present invention, a method of fabricating a transistor includes providing a workpiece, the workpiece having a top surface, and implanting germanium into the top surface of the workpiece, forming an amorphous germanium-containing region within the top surface of the workpiece, the amorphous germanium-containing region extending about 45 Å or less beneath the workpiece top surface, and also forming a first crystalline germanium-containing region beneath the amorphous germanium-containing region, the first crystalline germanium-containing region extending about 55 Å or less beneath the amorphous germanium-containing region. A gate dielectric material is deposited over the amorphous germanium-containing region, the gate dielectric material having a dielectric constant of about 4.0 or greater. The workpiece is annealed at a temperature of about 750° C. or less for about 60 minutes or less, re-crystallizing the amorphous germanium-containing region and forming a single second crystalline germanium-containing region within the top surface of the workpiece, the single second crystalline germanium-containing region comprising the re-crystallized amorphous germanium-containing region and the first crystalline germanium-containing region, the second crystalline germanium-containing region extending about 120 Å or less beneath the workpiece top surface. A gate material is deposited over the gate dielectric material, and the gate material and the gate dielectric material are patterned to form a gate and a gate dielectric over the second crystalline germanium-containing region. A source region and a drain region are formed in at least the second crystalline germanium-containing region. Advantages of preferred embodiments of the present invention include providing a transistor design and manufacturing method thereof, wherein the total anneal temperature for the transistor manufacturing process flow is reduced, reducing the thermal budget and improving the gate dielectric quality. Because of the presence of germanium in the workpiece, and because the anneal process to re-crystallize the amorphous germanium-containing region comprises a low temperature, the effective gate oxide thickness is kept to a minimum. The germanium in the channel region increases the mobility of holes and electrons in the channel region, resulting in a transistor device with a faster response time and increased drive current. The foregoing has outlined rather broadly the features and technical advantages of embodiments of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of embodiments of the invention will be described hereinafter, which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiments disclosed may be readily utilized as a basis for modifying or designing other structures or processes for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims.
20040322
20060822
20050922
69265.0
0
KIM, SU C
TRANSISTOR WITH SHALLOW GERMANIUM IMPLANTATION REGION IN CHANNEL
UNDISCOUNTED
0
ACCEPTED
2,004
10,805,876
ACCEPTED
Pesticide and fungicide treatments made from hop extracts
The invention is an organic pesticide or fungicide made from components of hop extract by preparing stable aqueous emulsions of hop acids and other hop extract components. The hop acids and other hop extract components are suspended as stable, colloidal preparations in water, which can be sprayed on plants for pest control.
1. A method for controlling spider mites in an agricultural crop, comprising: applying a treatment solution of at least 1.0% concentration beta acids to the crop as an emulsion, and including soap in the emulsion in an amount sufficient to reduce film in the treatment solution. 2. A method for controlling powdery mildew in an agricultural crop, comprising: applying a treatment solution of at least 1.0% concentration of beta acids to crop as an emulsion, and including soap in the emulsion in an amount sufficient to reduce film in the treatment solution.
RELATED APPLICATIONS This specification is a continuation-in-part of application Ser. No. 10/212,982, filed Aug. 5, 2002, now abandoned. Application Ser. No. 10/212,982 was a continuation of application Ser. No. 09/573,332, filed May 17, 2000, now abandoned. TECHNICAL FIELD The invention disclosed here generally relates to pesticides and fungicides. More particularly, it relates to the use of components of hop extracts as a pesticide, fungicide, or for the treatment of other plant diseases. BACKGROUND OF THE INVENTION Chemical pesticides are used in commercial agriculture, home gardening, residential use, and similar applications for the purpose of controlling insects and spiders. There are well-known environmental and health concerns associated with using chemical pesticides, herbicides, or fungicides. For example, in some instances, it has been proven that the long-term use of certain chemical pesticides creates environmental problems. A well-known example involved the ban of DDT in the United States. Ongoing health concerns about chemical pesticides have given rise to an emerging market for “organic” pesticides. Insecticidal soap is a typical example of an organic pesticide in use today. Organic pesticides are generally deemed to be less effective than chemical pesticides. There is a trade-off when comparing one to the other. Chemical pesticides have a higher level of toxicity and provide better pest control. However, higher toxicity also heightens environmental concerns. The same level of environmental concern does not attach to organic pesticides, but at the price of effective pest control. Hope cones contain lupulin glands that have two important bittering substances: alpha acids and beta acids. These acids are sometimes called humulones and lupulones, respectively. Hop acids were initially used as a preservative agent for beer prior to the existence of refrigeration. Today, they are primarily used to create the bitter taste and flavor of beer. The term “hop acids,” as used here, means alpha acids, beta acids, mixtures of these acids, and/or other components found in hop extracts; for example, beta fraction, essential oils, waxes, and uncharacterized resins. The term “hop acids” also includes all forms of modified hop acids; for example, iso-alpha acids, tetra-hydro-iso-alpha acids, rho-iso-alpha acids, hexa-hydro-iso-alpha acids, and hexa-hydro-beta acids. As is well known, alpha acids consist of mixtures of analogues, primarily humulone, cohumulone, adhumulone, and other minor constituents. Similarly, beta acids consist of mixtures of analogues, primarily lupulone, colupulone, adlupulone, and other minor constituents. For these reasons, alpha and beta acids are referred to in the plural. A number of companies are in the business of producing hop extracts for the brewing industry. These extracts come from the hops that are grown in various regions of the world. In some respects, the hop extract industry is a combination of agriculture and chemistry. On the agricultural side, hop growers have many of the same kinds of problems with pests as the growers of other food products. For example, spider mites, which are a common agricultural pest, are also a problem for hop growers. Agricultural crops are also affected by powdery mildew, mold, and other kinds of blight or disease. Powdery mildew is particularly a problem for hop growers. Given that people have been drinking hop acids as part of beer for many centuries, hop acids are a proven organic consumable. Hops are one of the basic ingredients of beer and, as such, hops and hop extracts are considered GRAS (Generally Recognized As Safe) by the U.S. Food and Drug Administration (“FDA”). Those who work with hop extracts have discovered that the beta fraction of hop acids dissolved in ethanol or xylene can be toxic to spider mites. Hop acids and other components of hop extracts are not highly soluble in water, but are quite soluble in non-aqueous solvents like ethanol or xylene. However, such non-aqueous solvents are undesirable carriers for the application of pesticides to plants. Therefore, while water is an essential carrier for pesticide application to plants, because of solubility problems, water is not easy to use as a carrier if hop acids are the active agent. The present invention provides a way to use water as the carrier for delivering hop acids as a pesticide, fungicide, or the like. SUMMARY OF THE INVENTION The invention is a treatment solution made from hop acids and related hop extract components that can be used as a pesticide, fungicide, or blight or disease treatment of plants. The treatment solution can be made by creating an aqueous emulsion of hop acids. An “emulsion” is different from a solution and enables hop acids and other hop extract components to be applied to plants as part of a water-based spray, rather than using a non-aqueous solvent. Hop acids are not highly soluble in water. However, stable aqueous solutions of certain hop acids can be prepared by the selection of appropriate concentration and pH. Further, it is possible to prepare these aqueous emulsions as colloidal suspensions in water (i.e., emulsions) that will not separate over time. Moreover, these emulsions can be diluted with water as required by the end user for spraying. Although the emulsions are stable, they are also susceptible to film creation. Films are problematical with spray applicators in the field. Regardless of the effectiveness of the treatment solution with respect to controlling either pests or plant diseases, the solution cannot be applied effectively if it causes spray nozzles to clog on a continuous basis. We have been engaged in the ongoing development of formulations of hop acids for use as treatment solutions for pests and plant diseases. Our initial formulations involved experimenting with 10% solutions of hop acids diluted with water and an emulsifier to create a stable aqueous emulsion. These initial studies involved the preparation of emulsions from beta fraction (beta acid oil), beta acids, and alpha acids. Subsequent studies involved the use of beta acids with the concentration reduced from 10% to 1%. Moreover, it was discovered that the film or residue problem described above can be improved considerably by adding liquid soap to the treatment solution at a low concentration. BEST MODE FOR CARRYING OUT THE INVENTION A. Initial Tests. The following description sets forth examples for creating stable 10% solutions of hop acids or 10% emulsions of hop acids that can be diluted with water to the desired degree to produce stable aqueous emulsions that can then be used as spray-on treatment solutions. These treatment solutions may have use as pesticides, fungicides, or for the treatment of other kinds of plant diseases. The diluted emulsions remain stable at all dilutions. What this means is that concentrated solutions and/or emulsions can be sold as organic pesticides and later diluted by the user. We initially developed three basic formulations. The first formulation was a 10% emulsion of beta fraction. This emulsion can be diluted with water to any degree to form further stable emulsions. The second and third formulations involved the preparation of 10% solutions of alpha and beta acids. These aqueous solutions convert to stable, aqueous emulsions upon the addition of water and likewise can be diluted to a lower concentration. Specific examples of these formulations are set forth below. 1. Preparation of 10% Emulsion of Beta Fraction (Beta Acid Oil) for Pest Control. The term “beta fraction” refers to the oily, waxy, resinous portion of the hop extract obtained when the hop extract is washed with caustic water to remove most of the alpha acids. The beta fraction contains mostly beta acids, resins, oils, and waxes; it is also called beta acid oil. To prepare an aqueous emulsion of beta fraction, the beta fraction was heated to 60° C., and added to a volume of 60° C. water, to which an emulsifier, such as Ninol FM Tri-Emulsifier, was added. Ninol FM Tri-Emulsifier is available from Northwest Agricultural Products, 821 South Chestnut, Pasco, Wash. 99302 (509-547-8234). The mixture was then emulsified in a high-shear mixer to produce a stable emulsion. As an example, to produce ˜1 Kg of beta fraction emulsion, 100 g of beta fraction was heated to 60° C., and 890 grams of water was heated separately to 60° C. The warm beta fraction and water were mixed together, and 10 grams of Ninol emulsifier was added to the mixture (the addition of as little as 0.2% emulsifier will produce a stable emulsion; adding up to 2% emulsifier will increase beta fraction utilization). This mixture was placed in a high-shear mixer (a Warring kitchen blender on high speed), mixed for 60-90 seconds, poured into a container, and let sit for 2-3 minutes or until any foam collapsed. Any of the beta fraction that would not emulsify was separated. The aqueous emulsion was decanted, and any beta fraction or foam that did not go into the aqueous emulsion was discarded. A 10% beta fraction aqueous emulsion prepared as described in the above example is a stable emulsion. When diluted with tap water or well water, it forms similarly stable aqueous emulsions at all dilutions. 2. Preparation of 10% Aqueous Beta-Acids Solution for Pest Control Beta fraction was the starting material used to prepare a 10% aqueous beta-acids solution. The beta fraction may be used as is or washed with caustic water to reduce the alpha-acids concentration in the beta fraction so that the ratio of alpha-acids to beta-acids is 0.05, or below, by HPLC analysis. The temperature of the beta fraction was raised to 60° C. with continuous mixing, and caustic was added in the form of KOH to bring the pH to 10-11. Having first determined the beta-acids content in the beta fraction by HPLC analysis, a volume of 60° C. water was added, while mixing, so that the beta-acids concentration of the aqueous phase was between 10% and 50%. The pH of the solution was adjusted, if necessary, to 10-11 at 60° C. It was necessary to subtract the volume of KOH added for pH adjustment from the calculated volume of water. Also, a temperature range of 55-70° C. was acceptable, although 60° C. was optimal. Mixing was stopped, and the mixture was allowed to sit for at least 45 minutes, during which time the temperature of the solution was maintained at 60° C. The aqueous beta-acids phase was then separated from the resinous phase. The aqueous phase was diluted to a concentration of 10% beta acids by HPLC, while the temperature was maintained at 60° C., and the pH kept at 10-11. The aqueous phase was cooled (mixing is optional) to 1-13° C., and allowed to sit for at least 2 hours. The solution was then decanted or filtered. Small-Scale 10% Beta Acids Example: 500 g of beta fraction containing 50% beta-acids by HPLC was heated to 60° C. Approximately 250 mL of 20% KOH was added while stirring, with heat to maintain a 60° C. temperature, and to bring the pH up to 10.7. Mixing was stopped, and the mixture was allowed to sit overnight. The following morning, the resinous fraction was set aside and the aqueous fraction was heated to 60° C. and analyzed by HPLC. Water and 20% KOH were added to bring the beta acids concentration to 10%, and the pH to 10.7. The aqueous beta acids solutions was refrigerated to 5° C. overnight, and filtered the next morning. Large-Scale 10% Beta Acids Example: 1000 kg of beta fraction at 60° C. was placed in a hot water-jacketed tank. Approximately 120 gallons of 20% KOH was added with continuous mixing until the pH of the aqueous phase reached 10.7. The mixing was shut down, but the heat was maintained at 60° C., and the mixture was allowed to sit overnight. The aqueous layer was pumped into a stainless steel, heat-jacketed tank and diluted to a 10% beta-acids concentration by HPCL using deionized water. The temperature and pH were maintained at 60° C. and 10.7, respectively. Heating of the tank was stopped, the product was cooled to 10° C., and the allowed to settle overnight. Clouded and precipitated material was pumped to a recycle tank, and the clear beta-acids solution was filtered. 10% beta-acids solution is relatively easy to make (see above examples). It is a clear solution with no precipitated material. It is similar in color, clarity, and consistency to weak iced tea. However, the stability is not robust, however. A change in temperature can cause cloudiness to appear. Also, if it is diluted with cold (or even warm) water after it is formulated, it becomes cloudy immediately. Dilution of 10% beta-acids solution with tap water or well water results in the formation of a stable aqueous emulsion. It has the appearance of milk and does not exhibit any separation even during days of storage. It was very stable, and no precipitate formed, even down to a dilution of 1:16. Also, as the solution was diluted with water, only a minor change in the pH occurred. It dropped by about 0.5 pH units, certainly not enough to be the cause of precipitation. No difference was observed when 0.4% Ninol emulsifier was added. 3. Preparation of 10% Aqueous Alpha-Acids Solution for Pest Control General Example: Supercritical CO2 Nugget extract was used to prepare 10% aqueous alpha-acids solution; however, one may start with hop extract of any type or variety. The hop extract was placed in a volume of water calculated to produce an aqueous alpha-acids solution, with a concentration of 3-20% by HPLC. An alpha acid concentration of less than 8% was optimum. At this concentration, beta acid solubility in the aqueous phase was lowered. The temperature was raised to 50-70° C., and the pH was adjusted to 6-8, with constant mixing. A pH of 7-8 was optimum. The extract solution was then allowed to sit for at least 45 minutes. The resinous fraction containing beta-acids, oils, and waxes was set aside, while the aqueous alpha-acids solution was decanted. The temperature was raised to 60° C. and the pH was raised to 7-9. The solution was analyzed by HPLC. If the alpha-acids concentration was 10% or greater, water was added to bring the concentration to 10%. The solution was cooled to 1-19° C., and filtered or decanted. If the alpha-acids concentration was less than 10%, the aqueous solution was acidified (H2SO4 or H3PO4 were satisfactory) at 60° C. to bring the alpha-acids out of solution. The alpha-acids were washed with fresh 60° C. water and allowed to sit for a minimum of 45 minutes. The water was discarded, and a calculated volume of 60° C. fresh water was added. The volume was calculated to produce a 10% alpha acid concentration by HPLC, also taking into account the volume of caustic necessary for pH adjustment. The alpha-acids solution was heated to 60° C., and the pH was raised to 7-9 with KOH solution. The aqueous solution was allowed to cool to 1-19° C., and filtered or decanted. Small-Scale Example of 10% Aqueous Alpha-Acids Solution: 800 g of supercritical CO2 Nugget extract was added to 2700 mL of deionized water, and the temperature was increased, with constant mixing, to 60° C. Approximately 300 mL of 20% KOH was added to bring the pH up to 7.7. The solution was allowed to sit overnight. The resinous fraction containing beta-acids, oils, and waxes was set aside, while the aqueous alpha-acids solution was decanted and cooled overnight to 7° C. The aqueous solution was then filtered, while cold, to remove any crystallized beta fraction, and brought back to 60° C. 20% H2SO4 was added with continuous stirring until the pH was 2.5. The resinous alpha-acids were separated and washed with fresh 60° C. deionized water. The alpha-acids were added to 2000 mL deionized water and brought to 60° C. Approximately 300 mL of 20% KOH was added to bring the pH up to 8.0, and the solution was analyzed by HPLC. Deionized water and 20% KOH were added to bring the concentration and pH up to 10% and 8.9, respectively. The solution was cooled to 5° C. overnight, and filtered. 10% alpha-acids solution is also relatively easy to make (see above example) and is a clear solution with no precipitated material. Like the beta acids formulation, it is similar in color, clarity, and consistency to weak iced tea. The stability is not robust and a change in temperature can cause cloudiness to appear. Dilution of 10% alpha-acids solution with tap water or well water results in the formation of a stable aqueous emulsion which has the appearance of milk and does not exhibit any separation, even after days of storage. It was found to be very stable down to a dilution of 1:16, and no precipitate formed. Also, as the solution was diluted with water, only a minor change in the pH occurred. It dropped by about 0.5 pH units, certainly not enough to be the cause of the precipitation. No difference was observed when 0.4% Ninol emulsifier was added. 4. Method of Application The above emulsions were sprayed on plants according to the following procedure: The above-concentrated formulations were diluted with tap water to the desired concentration and the diluted portion agitated by shaking prior to spray application. Application of formulations to hop leaves in the laboratory was accomplished by a hand-held and manually-operated bottle sprayer of 500 mL volume, with finger lever action and nozzle adjusted to the finest droplet size. Application of each formulation consisted of two pulls of the sprayer lever with the nozzle 12 inches from the leaf surface. Each double pull of the lever applied approximately 2 milliliters of liquid to an area of approximately one square foot. The spray pattern did not provide droplet density sufficient to cover 100% of the leaf area, but droplets were close enough to each other to cover about 50% of the leaf area. Treated hop leaves were placed inside plastic bags at approximately 22 degrees centigrade. Each treatment consisted of 4 hop leaves. 5. Initial Results Tests were made on the two-spotted spider mite pest (Tetranychus urticae), on the beneficial predator mite (Galendromus occidentalis), and on the green peach aphid (Myzus persicae). Mortality was determined after 24 hours for pest mites, 48 hours for beneficial mites, and 72 hours for aphids. A 1:16 dilution of the original 10% concentrations resulted in an applied concentration of 0.625% for each formulation described above. At this concentration and under the described conditions, all three formulations produced 100% mortality of the treated pest mites within 24 hours of application, while the mortality of the beneficial mites was much less at about 25% after 48 hours. Concentrations of 10% produced the immediate death of about 30% of the aphids present for each formulation. Greater dilutions produced fewer immediate mortalities. B. Field Tests. We conducted a confidential field trial using a beta acid emulsion for the purpose of determining effectiveness with respect to the control of two-spotted spider mites on commercial hops. These field tests involved applying a 1% beta acid emulsion to three plots at the rate of 15, 200, and 100 gallons per acre, respectively. The 15 gallon plot was treated with a tower sprayer. The 100 and 200 gallon plots were treated with a windmill sprayer. Spray treatments were applied on June 20, June 26, July 3, July 10, July 26, August 6, and August 15. The following table sets forth the results of the field trial (application dates are in bold face): FIELD TRIAL USING BETA TO CONTROL TWO SPOTTED SPIDER MITES IN COMMERCIAL HOPS CONTROL BETA 1% BETA 1% BETA 1% CONTROL East Check 15 Gallon 200 Gallon 100 Gallon West Check Row 108 Row 58 Row 48 Row 38 Row 18 DATE mites eggs mites eggs mites eggs mites eggs mites eggs Jun. 10 4 26 4 4 2 15 Jun. 14 Jun. 20 6 8 60 44 22 21 12 15 2 0 Jun. 20 Jun. 20 31 48 26 30 27 23 Jun. 21 Jun. 26 194 253 98 62 82 70 Jun. 26 Jun. 26 42 58 51 46 102 74 Jul. 03 133 243 184 403 109 194 Jul. 03 Jul. 03 96 74 232 440 181 270 154 432 4 8 219 242 93 102 Jul. 10 59 202 611 618 91 59 406 584 12 18 Jul. 11 238 285 269 621 147 251 Jul. 26 27 18 283 355 469 717 229 306 31 30 32 33 126 521 147 277 Aug. 6 32 77 134 384 173 478 163 275 14 60 Aug. 9 Aug. 15 Aug. 22 10 26 33 87 90 61 10 26 Aug. 26 32 33 107 111 22 26 9 21 The 100 and 200 gallon applications were found to kill mites at the rate of 100% on lower hop leaves after every application and 85% on upper leaves. The 15 gallon application had about 50% kill rate on lower leaves and less than that on the upper leaves. It also appeared that powdery mildew was controlled on these plots. Nevertheless, it was discovered that the emulsions tended to clog the sprayers. C. Follow-Up Tests. In subsequent field tests, it was discovered that solubility and film problems associated with beta acids could be improved considerably by adding liquid soap at 0.5% concentration. It has been further discovered that beta acids may be effective in controlling the late blight organism on potato leaves and may have potential for use as a fungicide on organically-grown potatoes and tomatoes. It is possible that beta acids can be applied on tomatoes to control black mold disease. At the 1% concentration, beta acids have shown good suppression of spore formation in hop powdery mildew colonies that were already formed. This is an important development because it can be used to treat powdery mildew infections that are already in existence in a hop field. Powdery mildew is also a problem with wine grapes. The invention described above is not to be limited by the above examples. It is to be limited only by the following claims, which are to be interpreted according to established doctrines of claim interpretation. The terms “hop acids,” “solution,” and “emulsion” are to be interpreted as used above and as they are understood in the hop industry.
<SOH> BACKGROUND OF THE INVENTION <EOH>Chemical pesticides are used in commercial agriculture, home gardening, residential use, and similar applications for the purpose of controlling insects and spiders. There are well-known environmental and health concerns associated with using chemical pesticides, herbicides, or fungicides. For example, in some instances, it has been proven that the long-term use of certain chemical pesticides creates environmental problems. A well-known example involved the ban of DDT in the United States. Ongoing health concerns about chemical pesticides have given rise to an emerging market for “organic” pesticides. Insecticidal soap is a typical example of an organic pesticide in use today. Organic pesticides are generally deemed to be less effective than chemical pesticides. There is a trade-off when comparing one to the other. Chemical pesticides have a higher level of toxicity and provide better pest control. However, higher toxicity also heightens environmental concerns. The same level of environmental concern does not attach to organic pesticides, but at the price of effective pest control. Hope cones contain lupulin glands that have two important bittering substances: alpha acids and beta acids. These acids are sometimes called humulones and lupulones, respectively. Hop acids were initially used as a preservative agent for beer prior to the existence of refrigeration. Today, they are primarily used to create the bitter taste and flavor of beer. The term “hop acids,” as used here, means alpha acids, beta acids, mixtures of these acids, and/or other components found in hop extracts; for example, beta fraction, essential oils, waxes, and uncharacterized resins. The term “hop acids” also includes all forms of modified hop acids; for example, iso-alpha acids, tetra-hydro-iso-alpha acids, rho-iso-alpha acids, hexa-hydro-iso-alpha acids, and hexa-hydro-beta acids. As is well known, alpha acids consist of mixtures of analogues, primarily humulone, cohumulone, adhumulone, and other minor constituents. Similarly, beta acids consist of mixtures of analogues, primarily lupulone, colupulone, adlupulone, and other minor constituents. For these reasons, alpha and beta acids are referred to in the plural. A number of companies are in the business of producing hop extracts for the brewing industry. These extracts come from the hops that are grown in various regions of the world. In some respects, the hop extract industry is a combination of agriculture and chemistry. On the agricultural side, hop growers have many of the same kinds of problems with pests as the growers of other food products. For example, spider mites, which are a common agricultural pest, are also a problem for hop growers. Agricultural crops are also affected by powdery mildew, mold, and other kinds of blight or disease. Powdery mildew is particularly a problem for hop growers. Given that people have been drinking hop acids as part of beer for many centuries, hop acids are a proven organic consumable. Hops are one of the basic ingredients of beer and, as such, hops and hop extracts are considered GRAS (Generally Recognized As Safe) by the U.S. Food and Drug Administration (“FDA”). Those who work with hop extracts have discovered that the beta fraction of hop acids dissolved in ethanol or xylene can be toxic to spider mites. Hop acids and other components of hop extracts are not highly soluble in water, but are quite soluble in non-aqueous solvents like ethanol or xylene. However, such non-aqueous solvents are undesirable carriers for the application of pesticides to plants. Therefore, while water is an essential carrier for pesticide application to plants, because of solubility problems, water is not easy to use as a carrier if hop acids are the active agent. The present invention provides a way to use water as the carrier for delivering hop acids as a pesticide, fungicide, or the like.
<SOH> SUMMARY OF THE INVENTION <EOH>The invention is a treatment solution made from hop acids and related hop extract components that can be used as a pesticide, fungicide, or blight or disease treatment of plants. The treatment solution can be made by creating an aqueous emulsion of hop acids. An “emulsion” is different from a solution and enables hop acids and other hop extract components to be applied to plants as part of a water-based spray, rather than using a non-aqueous solvent. Hop acids are not highly soluble in water. However, stable aqueous solutions of certain hop acids can be prepared by the selection of appropriate concentration and pH. Further, it is possible to prepare these aqueous emulsions as colloidal suspensions in water (i.e., emulsions) that will not separate over time. Moreover, these emulsions can be diluted with water as required by the end user for spraying. Although the emulsions are stable, they are also susceptible to film creation. Films are problematical with spray applicators in the field. Regardless of the effectiveness of the treatment solution with respect to controlling either pests or plant diseases, the solution cannot be applied effectively if it causes spray nozzles to clog on a continuous basis. We have been engaged in the ongoing development of formulations of hop acids for use as treatment solutions for pests and plant diseases. Our initial formulations involved experimenting with 10% solutions of hop acids diluted with water and an emulsifier to create a stable aqueous emulsion. These initial studies involved the preparation of emulsions from beta fraction (beta acid oil), beta acids, and alpha acids. Subsequent studies involved the use of beta acids with the concentration reduced from 10% to 1%. Moreover, it was discovered that the film or residue problem described above can be improved considerably by adding liquid soap to the treatment solution at a low concentration. detailed-description description="Detailed Description" end="lead"?
20040322
20120410
20050224
63356.0
0
LEVY, NEIL S
PESTICIDE AND FUNGICIDE TREATMENTS MADE FROM HOP EXTRACTS
SMALL
1
CONT-ACCEPTED
2,004
10,805,928
ACCEPTED
Write current waveform asymmetry compensation
A write current circuit (300, 400) adapted to drive a thin film write head (202) of a mass media information storage device. The write current circuit (300, 400) further includes programming circuitry (311, 411) driven such that parameters of the write current waveform can be varied, including the write current overshoot amplitude and/or overshoot duration. The present invention achieves technical advantages by providing the ability to program out or adjust for system introduced asymmetries in the write current waveform.
1. A write current circuit for a mass media write head, comprising: a head write driver circuit adapted to drive the write head with a write current signal having a positive write edge and a negative write edge; and a circuit coupled with the head write driver circuit and adapted to selectively provide pulsing signals which define an overshoot amplitude of said positive write edge and said negative write edge of said write current signal. 2. The write current circuit of claim 1, wherein said further circuit is a differential current source. 3. The write current circuit of claim 2, wherein said differential current source is programmable. 4. The write current circuit of claim 1, wherein said further circuit is adapted to selectively provide a defined amplitude. 5. The write current circuit of claim 4, wherein said further circuit is programmable for providing differential overshoot amplitudes for said positive write edge and said negative write edge. 6. The write current circuit of claim 1, wherein said further circuit includes a delay circuit for selectively providing a defined pulse width for each of said overshoots. 7. The write current circuit of claim 6, wherein said delay circuit is programmable for providing differential overshoot pulse widths for said positive write edge and said negative write edge. 8. The write current circuit of claim 1, wherein said further circuit is adapted to selectively provide a defined amplitude of each of said overshoots and includes a delay circuit for providing a defined pulse width for each of said overshoots. 9. The write current circuit of claim 8, wherein said further circuit and said delay circuit are programmable for providing differential overshoot amplitudes and pulse widths for said positive write edge and said negative write edge. 10. A write driver for an inductive head element in a disk drive system, said driver comprising: an H-bridge circuit capable of driving a first current and a second current through said head element; a boost circuit coupled with said H-bridge and operable for delivering a current pulse during time periods defining a positive edge of said first current and a negative edge of said first current responsive to a control signal, wherein a sum of said first current and said second current provides the write current for said head element; and said boost circuit is further adapted to selectively vary said positive edge current pulse and said negative edge current pulse; and a circuit coupled with the head write driver circuit and adapted to selectively provide pulsing signals which define an overshoot amplitude of said positive write edge and said negative write edge of said write current signal. 11. The write driver of claim 10, wherein said boost circuit includes a programmable differential current source. 12. The write driver of claim 10, wherein said boost circuit is further adapted to selectively provide a defined amplitude for each of said positive edge current pulse and said negative edge current pulse. 13. The write driver of claim 12, wherein said boost circuit is programmable for providing differential amplitudes for said positive edge current pulse and said negative edge current pulse. 14. The write driver of claim 10, wherein said boost circuit further includes a delay circuit for selectively providing a defined pulse width for each of said positive edge current pulse and said negative edge current pulse. 15. The write driver of claim 14, wherein said delay circuit is programmable for providing differential pulse widths for said positive edge current pulse and said negative edge current pulse. 16. The write driver of claim 10, wherein said boost circuit is further adapted to selectively provide a defined amplitude for each of said positive edge current pulse and said negative edge current pulse and further includes a delay circuit for selectively providing a defined pulse width for each of said positive edge current pulse and said negative edge current pulse. 17. The write driver of claim 16, wherein said boost circuit and said delay circuit are programmable for providing differential amplitudes and pulse widths for said positive edge current pulse and said negative edge current pulse. 18. A method of providing a write current to an inductive head element in a disk drive system, comprising: providing current pulses cooperable for defining a positive edge and a negative edge of said write current; differentially varying an amplitude of said positive edge current pulse and said negative edge current pulse for counteracting induced imbalances in said write current. 19. The method of claim 19 further comprising varying a pulse width of said positive edge current pulse and said negative edge current pulse for further counteracting induced imbalances corresponding to said disk drive system.
FIELD OF THE INVENTION The present invention relates to media information storage and, more particularly, to a programmable write current overshoot amplitude and duration asymmetry correction technique. BACKGROUND OF THE INVENTION Hard disk drives are mass storage devices that include a magnetic storage media, e.g. rotating disks or platters, a spindle motor, read/write heads, an actuator, a pre-amplifier, a read channel, a write channel, a servo circuit, and control circuitry to control the operation of hard disk drive and to properly interface the hard disk drive to a host system or bus. FIG. 1 shows an example of a prior art disk drive mass storage system 10. Disk drive system 10 interfaces with and exchanges data with a host 32 during read and write operations. Disk drive system 10 includes a number of rotating platters 12 mounted on a base 14. The platters 12 are used to store data that is represented as magnetic transitions on the magnetic platters, with each platter 12 coupleable to a head 16 which transfers data to and from a preamplifier 26. The preamp 26 is coupled to a synchronously sampled data (SSD) channel 28 comprising a read channel and a write channel, and a control circuit 30. SSD channel 28 and control circuit 30 are used to process data being read from and written to platters 12, and to control the various operations of disk drive mass storage system 10. Host 32 exchanges digital data with control circuit 30. Data is stored and retrieved from each side of the magnetic platters 12 by the arm and interconnect 16 which comprise a read head 18 and a write head 20 at the tip thereof. The conventional read head 18 and write head 20 comprise magneto-resistive read head and thin-film inductive write head adapted to read or write data from/to platters 12 when current is passed through them. Arm and interconnect 16 are coupled to preamplifier 26 that serves as an interface between read/write heads 18/20 of disk/head assembly 10 and SSD channel 28. The preamp 26 provides amplification to the waveform data signals as needed for both read and write operations. A preamp 26 may comprise a single chip or may comprise separate components rather than residing on a single chip. The magnetic flux transitions on the magnetic platter 12 are created by switching the write current polarity through the write head 20. The faster the write current switches polarity, the faster the change of the magnetic flux, and consequently more bits per inch can be stored in the media. To decrease the transition time of the media, an overshoot current is employed with the write driver signal. Further, write signals are designed with a symmetrical differential voltage swing during the write current reversal period. Symmetrical common-mode voltage swing is also desirable but not required. Symmetrical differential voltage swings create a symmetric current response in the inductive load if there are no imbalances in the interconnect leading to the write head. However, in a real system the read head interconnect is adjacent to the write head interconnect on the arm 16 thus creating an imbalanced interconnect due to one of the differential write traces being physically close to one of the differential reader traces. When symmetrical differential voltage swings are driven from the preamp an asymmetrical write current waveform appears at the write head 18 load due to the interconnect imbalance. Particular areas for improvements of write driver current circuits used to drive a thin film head include addressing the system induced imbalances of the write current, and providing the ability to change the write currents waveform shape so that these positive and negative amplitude and duration signal aspects can be customized. Accordingly, there is desired an improved write driver current circuit which can provide a symmetrical write current in an environment with induced imbalances, and positive and negative signal aspects selectively customized for optimizing disk drive performance. SUMMARY The present invention achieves technical advantages as a system and method for correcting the inherent imbalance associated with the read/write head interconnect which causes unbalanced loading on the write data path in which this unbalanced loading induces an asymmetry in the write current waveform. A write current circuit adapted to drive a thin film write head of a mass media information storage device further including programming circuitry driven such that parameters of the write current waveform can be varied, including the write current overshoot amplitude and/or overshoot duration. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention, reference is made to the following detailed description taken in conjunction with the accompanying drawings wherein: FIG. 1 illustrates a conventional disk drive system; FIG. 2A illustrates a conventional write driver circuit; FIG. 2B shows a graphical representation of a write signal with symmetrical positive and negative write current overshoot as well as the equal amplitude write current pulsing signals 211/221 as seen at node X and node Y on FIG. 2A; FIG. 2C shows a graphical representation of equally delayed positive and negative write current overshoot duration signals for a symmetrical positive and negative write current overshoot duration signal; FIG. 3A illustrates a write drive circuit with a individual positive and negative programmable write current overshoot AMPLITUDE correction DAC in accordance with exemplary embodiments of the present invention; FIG. 3B shows a graphical representation of the write current pulsing signals 331/333 for asymmetrical positive and negative write current overshoot; FIG. 3C shows a graphical representation of a corrected and uncorrected write current signal with write current overshoot AMPLITUDE asymmetry; FIG. 4A illustrates a write drive circuit with a individual positive and negative programmable write current overshoot DURATION correction DAC in accordance with exemplary embodiments of the present invention; FIG. 4B shows a graphical representation of individually delayed positive and negative write current overshoot duration signals for a write current signal with asymmetrical positive and negative write current overshoot duration; and FIG. 4C shows a graphical representation of a corrected and uncorrected write current signal with write current overshoot DURATION asymmetry. DETAILED DESCRIPTION The numerous innovative teachings of the present application will be described with particular reference to the presently preferred exemplary embodiments. However, it should be understood that this class of embodiments provides only a few examples of the many advantageous uses and innovative teachings herein. In general, statements made in the specification of the present application do not necessarily delimit any of the various claimed inventions. Moreover, some statements may apply to some inventive features, but not to others. Throughout the drawings, it is noted that the same reference numerals or letters will be used to designate like or equivalent elements having the same function. Detailed descriptions of known functions and constructions unnecessarily obscuring the subject matter of the present invention have been omitted for clarity. Referring now to FIG. 2A there is illustrated a simplified H-bridge type circuit typically used for driving current through a write head 202 in a hard disk drive system. The purpose of the H-bridge is to enable current to be driven through the write head in either direction in which the H-bridge includes both a positive 204 and negative 206 side as is known in the art. The simplified circuit also includes an write current overshoot amplitude DAC 212 coupled to the conventional write driver circuitry 208, 210 for controlling the write current overshoot amplitude equally for each of the positive 204 and negative 206 portions of the H-bridge. Also included is a write current overshoot duration DAC 214 coupled to the conventional write driver circuitry 208, 210 for controlling the write current overshoot duration equally for each of the positive 204 and negative 206 portions of the H-bridge. Referring now to FIG. 2B there is shown the write current overshoot amplitude pulsing signals, seen at node X and Node Y on FIG. 2A, typically used with the circuit shown in FIG. 2A to equally generate the positive and negative write current overshoots amplitudes. As shown and described above, separate signals 211 and 221 are used to generate the positive edge and the negative edge write current overshoot amplitude. Conventionally, the amplitudes of the signals are designed to be equal in order to create a nice symmetrical write current overshoot amplitude. Referring now to FIG. 2C there is shown positive edge and negative edge write current overshoot duration control signals that are internal signals to block 208 and 210 on FIG. 2A, used to equally generate the positive and negative write current overshoot durations. As shown and described above, separate signals 243 and 245 are equally delayed versions of the reference signal 241 and used to generate the positive edge and the negative edge write current overshoot duration. Conventionally, the delay of the duration control signals are designed to be equal in order to create a nice symmetrical write current overshoot durations. An exemplary embodiment of the present invention comprises an individually positive edge and negative edge adjustable write current overshoot amplitude which enables a user to program out or adjust for system introduced asymmetries in the amplitude of the write current overshoot waveform. And, a further embodiment includes an individually positive and negative edge adjustable duration circuit enabling write current overshoot duration asymmetry adjustments which further improves overall system performance. Referring now to FIG. 3A there is shown a drive circuit 300 with an individual programmable positive and negative write current overshoot amplitude correction DAC 311 in accordance with exemplary embodiments of the present invention. Further, components of the circuit 300 include items 202, 204, 206, 208, 210, 212 and 214 which are the same as those shown in FIG. 2A. The addition of the individually programmable positive and negative amplitude correction DAC 311 enables the resultant positive edge and negative edge write current overshoot amplitude signals to be individually compensated for. That is, block 311 enables selective programming of the write current overshoot amplitude providing separate tuning for the positive and negative peak write current overshoot amplitude value. Referring now to FIG. 3B there is shown the write current overshoot amplitude pulsing signals, seen at node X and Node Y on FIG. 3A, used with the circuit shown in FIG. 3A to individually adjust the positive and negative write current overshoots amplitudes. As shown and described above, separate signals 331 and 333 are used to generate the positive edge and the negative edge write current overshoot amplitude. As shown on FIG. 3B, the write current amplitude pulsing signals are no longer equal in amplitude thus purposefully introducing a non-symmetrical write current overshoot amplitude allowing the user to compensate for system induced write current overshoot asymmetries, for example. FIG. 3C illustrates a simulated write current having a waveform 341 with a +6 mA asymmetry on the positive edge write current overshoot and a resultant waveform 343 in which the positive edge amplitude of the positive write current overshoot signal has been adjusted via the individual programmable positive and negative amplitude correction DAC 311 of the present invention until the asymmetry was removed. Range for individual amplitude programmability is determined by the system requirements but typically +/−20% of the programmed equal amplitude is enough to compensate for system induced asymmetries. Referring now to FIG. 4A there is shown another exemplary embodiment including the addition of an individual programmable positive and negative write current overshoot duration correction DAC 411. Further, components of the circuit 400 include items 202, 204, 206, 208, 210, 212, 214 and 311 which are the same as those shown in FIG. 3A. The addition of the individually programmable positive and negative duration correction DAC 411 is added to enable the resultant positive edge and negative edge write current overshoot duration signals to be individually compensated for. That is, block 411 enables selective programming of the write current overshoot duration providing separate tuning for the positive and negative peak write current overshoot duration value. This enables a user to not only selectively program the amplitude separately for each of the positive and negative amplitudes of the write current overshoot signal but also selectively program the duration separately for each of the positive and negative durations of the write current overshoot signal. Referring now to FIG. 4B there is shown positive edge and negative edge write current overshoot duration control signals that are internal signals to block 208 and 210 on FIG. 4A, used to generate the positive and negative write current overshoot durations. As shown and described above, separate signals 433 and 435 are individually delayed versions of the reference signal 431 and used to generate the positive edge and the negative edge write current overshoot duration. As shown on FIG. 4B, the write current duration control signals are no longer equal in amplitude thus purposefully introducing a non-symmetrical write current overshoot duration allowing the user to compensate for system induced write current overshoot duration asymmetries, for example. FIG. 4C illustrates a simulated write current having a waveform 441 with a 45 pS write current overshoot duration asymmetry and a resultant waveform 443 in which the duration of the positive write current overshoot signal has been adjusted via the individual duration control circuit 411 of the present invention until the asymmetry was removed. Range for individual duration programmability is determined by the system requirements but typically +/−20% of the equally programmed duration is enough to compensate for system induced asymmetries. To summarize, a system and/or method is provided for correcting the inherent imbalance associated with the read/write head interconnects which cause unbalanced loading on the differential write data path in which this unbalanced loading induces an asymmetry in the write current overshoot signal amplitude and duration. An asymmetrical write current introduces unwanted jitter into the write data and ultimately degrades the bit error rate of the signal. The write driver overshoot current signal is programmed to counter-act system induced imbalances in the write signal. Although exemplary embodiments of the invention are described above in detail, this does not limit the scope of the invention, which can be practiced in a variety of embodiments.
<SOH> BACKGROUND OF THE INVENTION <EOH>Hard disk drives are mass storage devices that include a magnetic storage media, e.g. rotating disks or platters, a spindle motor, read/write heads, an actuator, a pre-amplifier, a read channel, a write channel, a servo circuit, and control circuitry to control the operation of hard disk drive and to properly interface the hard disk drive to a host system or bus. FIG. 1 shows an example of a prior art disk drive mass storage system 10 . Disk drive system 10 interfaces with and exchanges data with a host 32 during read and write operations. Disk drive system 10 includes a number of rotating platters 12 mounted on a base 14 . The platters 12 are used to store data that is represented as magnetic transitions on the magnetic platters, with each platter 12 coupleable to a head 16 which transfers data to and from a preamplifier 26 . The preamp 26 is coupled to a synchronously sampled data (SSD) channel 28 comprising a read channel and a write channel, and a control circuit 30 . SSD channel 28 and control circuit 30 are used to process data being read from and written to platters 12 , and to control the various operations of disk drive mass storage system 10 . Host 32 exchanges digital data with control circuit 30 . Data is stored and retrieved from each side of the magnetic platters 12 by the arm and interconnect 16 which comprise a read head 18 and a write head 20 at the tip thereof. The conventional read head 18 and write head 20 comprise magneto-resistive read head and thin-film inductive write head adapted to read or write data from/to platters 12 when current is passed through them. Arm and interconnect 16 are coupled to preamplifier 26 that serves as an interface between read/write heads 18 / 20 of disk/head assembly 10 and SSD channel 28 . The preamp 26 provides amplification to the waveform data signals as needed for both read and write operations. A preamp 26 may comprise a single chip or may comprise separate components rather than residing on a single chip. The magnetic flux transitions on the magnetic platter 12 are created by switching the write current polarity through the write head 20 . The faster the write current switches polarity, the faster the change of the magnetic flux, and consequently more bits per inch can be stored in the media. To decrease the transition time of the media, an overshoot current is employed with the write driver signal. Further, write signals are designed with a symmetrical differential voltage swing during the write current reversal period. Symmetrical common-mode voltage swing is also desirable but not required. Symmetrical differential voltage swings create a symmetric current response in the inductive load if there are no imbalances in the interconnect leading to the write head. However, in a real system the read head interconnect is adjacent to the write head interconnect on the arm 16 thus creating an imbalanced interconnect due to one of the differential write traces being physically close to one of the differential reader traces. When symmetrical differential voltage swings are driven from the preamp an asymmetrical write current waveform appears at the write head 18 load due to the interconnect imbalance. Particular areas for improvements of write driver current circuits used to drive a thin film head include addressing the system induced imbalances of the write current, and providing the ability to change the write currents waveform shape so that these positive and negative amplitude and duration signal aspects can be customized. Accordingly, there is desired an improved write driver current circuit which can provide a symmetrical write current in an environment with induced imbalances, and positive and negative signal aspects selectively customized for optimizing disk drive performance.
<SOH> SUMMARY <EOH>The present invention achieves technical advantages as a system and method for correcting the inherent imbalance associated with the read/write head interconnect which causes unbalanced loading on the write data path in which this unbalanced loading induces an asymmetry in the write current waveform. A write current circuit adapted to drive a thin film write head of a mass media information storage device further including programming circuitry driven such that parameters of the write current waveform can be varied, including the write current overshoot amplitude and/or overshoot duration.
20040322
20101123
20050922
68632.0
0
NEGRON, DANIELL L
WRITE CURRENT WAVEFORM ASYMMETRY COMPENSATION
UNDISCOUNTED
0
ACCEPTED
2,004
10,805,932
ACCEPTED
System and method for viewing message attachments
Methods and systems for handling attachments on wireless mobile communication devices. An attachment provided with a secure message is received at a message server. The secure message itself was received by the server as an attachment. The secure message is processed in order to locate within the secure message the requested attachment. The located attachment is provided to a mobile device.
1. A method for handling secure message attachments for a mobile device, comprising the steps of: receiving at a server a second attachment provided within a secure message; wherein the secure message itself was received by the server as a first attachment; requesting the second attachment at the mobile device; processing the secure message in order to locate within the secure message the second attachment; and providing the second attachment to the mobile device. 2. The method of claim 1, wherein the secure message is structured according to a security scheme such that the secure message is handled as an attachment by the server. 3. The method of claim 2, wherein the security scheme includes a symmetric key scheme. 4. The method of claim 2, wherein the security scheme includes an asymmetric key scheme. 5. The method of claim 2, wherein the security scheme is a Secure Multipurpose Internet Mail Extensions (S/MIME) scheme. 6. The method of claim 1, wherein the secure message is structured such that a secure layer has been added to the message and the second attachment. 7. The method of claim 6, wherein the secure layer acts as an envelope with respect to the message and the second attachment. 8. The method of claim 7, wherein the secure layer was generated during an encryption operation. 9. The method of claim 8, wherein a session key is received by the server from the mobile device for use by the server to decrypt the secure message. 10. The method of claim 7, wherein the secure layer was generated during a digital signature operation. 11. The method of claim 10, wherein the secure layer was generated during an encryption operation. 12. The method of claim 1, wherein the second attachment is selected from the group consisting of: a textual document, word processing document, audio file, image file, or video file. 13. The method of claim 1, wherein the secure message without the second attachment is sent from the server to the mobile device, wherein the second attachment is provided to the mobile device based upon the mobile device requesting the second attachment. 14. The method of claim 13, wherein the request from the mobile device for the second attachment results from a user requesting the second attachment. 15. The method of claim 13, wherein the request from the mobile device includes data to be used by the server to identify the second attachment that is to be provided to the mobile device. 16. The method of claim 1, wherein the secure layer was generated during an encryption operation, wherein a decryption operation is performed in order to locate within the secure message the second attachment. 17. The method of claim 1, wherein the secure message has a plurality of attachments. 18. The method of claim 1, wherein the server provides an indication to the mobile device that the secure message has the second attachment, wherein the indication is used by the mobile device to indicate to the mobile device's user that the secure message has the second attachment. 19. The method of claim 1, wherein the second attachment is automatically provided by the server to the mobile device when the secure message is opened by the mobile device's user. 20. The method of claim 1, wherein the second attachment is rendered before being provided to the mobile device. 21. The method of claim 1, wherein means for providing a wireless network and means for providing a message server are used to communicate the located attachment to the mobile device. 22. The method of claim 1, wherein the mobile device is a handheld wireless mobile communications device. 23. The method of claim 1, wherein the mobile device is a personal digital assistant (PDA). 24. A data signal that is transmitted using a communication channel, wherein the data signal includes the second attachment of claim 1; wherein the communication channel is a network, wherein the data signal is packetized data that is transmitted through a carrier wave across the network. 25. Computer-readable medium capable of causing a mobile device to perform the method of claim 1. 26. An apparatus located at a computer server for handling secure message attachments for a mobile device, wherein the server receives a secure message containing a second attachment, comprising: a data store that stores the secure message and the second attachment; wherein the secure message contains a secure layer such that the secure message itself is received by the server as a first attachment; a secure message processing module that looks into the secure message through the secure layer in order to locate the second attachment; wherein the second attachment is provided to the mobile device. 27. The apparatus of claim 26, further comprising: a rendering module that renders the second attachment before the second attachment is provided to the mobile device. 28. The apparatus of claim 26, further comprising: a decryption processing module to decrypt the secure message so that the second attachment can be located within the secure message. 29. An apparatus for handling secure message attachments for a mobile device, comprising: means for receiving a second attachment provided with a secure message; wherein the secure message itself was received by the server as a first attachment; means for processing the secure message in order to locate within the secure message the second attachment; means for providing the second attachment to the mobile device.
BACKGROUND 1. Technical Field The present invention relates generally to the field of secure electronic messaging, and in particular to accessing message attachments. 2. Description of the Related Art Capabilities of wireless mobile communication devices have expanded greatly. For example, such devices not only receive electronic messages, but can view attachments associated with electronic messages. However, difficulties arise when a mobile device wishes to access attachments of secure messages. This is due at least in part to how messages and attachments are structured in order to comport with a security scheme. SUMMARY In accordance with the teachings disclosed herein, methods and systems are provided for handling attachments on wireless mobile communication devices. As an example, a method can include receiving an attachment provided with a secure message, wherein the secure message itself was received by the server as an attachment. The secure message is processed in order to locate within the secure message the requested attachment. The located attachment is provided to the mobile device. As another example, a system can include a server having a data store that stores a secure message and its associated attachment. The secure message contains a secure layer such that the secure message is received by the server as an attachment itself. A secure message processing module looks into the secure message through the secure layer in order to locate the attachment. The located attachment is provided to the mobile device. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a messaging system. FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system. FIG. 3 is a block diagram illustrating a mobile device accessing an attachment. FIG. 4 is a flow chart depicting an operational scenario wherein a mobile device accesses an attachment. FIG. 5 is a block diagram illustrating a mobile device receiving a rendered attachment. FIG. 6 is a block diagram illustrating a mobile device providing a key to a server for use in accessing an attachment. FIG. 7 is a block diagram of a wireless mobile communication device. DETAILED DESCRIPTION The attachment accessing methods and systems disclosed herein may be used with many different types of secure messaging schemes. As an illustration, in a public key cryptography scheme, each user has a key pair including a public key that is distributed or available to other users and a private key that is known only to the user that is the “owner” of the key pair. For secure messaging operations based on public key cryptography, a user uses a private key to decrypt received encrypted messages and to sign messages to be sent. Public keys are used to encrypt messages to be sent and to verify digital signatures on received messages. Thus, access to public keys of other users is required for different secure messaging operations. Secure messages may be signed with a digital signature, encrypted, or both signed and encrypted, and may also be processed in other ways by a message sender or intermediate system between a message sender and a messaging client which receives the secure message. For example, secure messages include messages that have been signed, encrypted and then signed, or signed and then encrypted, by a message sender according to variants of Secure Multipurpose Internet Mail Extensions (S/MIME). A secure message could similarly be encoded, compressed or otherwise processed either before or after being signed and/or encrypted. A messaging client allows a system on which it operates to receive and possibly also send messages. Messaging clients operate on a computer system, a handheld device, or any other system or device with communications capabilities. Many messaging clients also have additional non-messaging functions. FIG. 1 is a block diagram of a messaging system. The system 10 includes a Wide Area Network (WAN) 12, coupled to a computer system 14, a wireless network gateway 16, and a Local Area Network (LAN) 18 (e.g., a corporate LAN). The wireless network gateway 16 is also coupled to a wireless communication network 20, in which a wireless mobile communication device 22 (“mobile device”) is configured to operate. The computer system 14 is a desktop or laptop personal computer (PC), which is configured to communicate to the WAN 12, which is the Internet in most implementations. PCs, such as computer system 14, normally access the Internet through an Internet Service Provider (ISP), an Application Service Provider (ASP), or the like. The LAN 18 is a network-based messaging client. It is normally located behind a security firewall 24. Within the LAN 18, a message server 26, operating on a computer behind the firewall 24, serves as the primary interface for the corporation to exchange messages both within the LAN 18, and with other external messaging clients via the WAN 12. Two known message servers 26 are Microsoft™ Exchange server and Lotus Domino™ server. These servers 26 are often used in conjunction with Internet mail routers that route and deliver mail messages. A server such as the message server 26 also typically provides additional functionality, such as dynamic database storage for calendars, to do lists, task lists, e-mail, electronic documentation, etc. The message server 26 provides messaging capabilities to the corporation's networked computer systems 28 coupled to the LAN 18. A typical LAN 18 includes multiple computer systems 28, each of which implements a messaging client, such as Microsoft Outlook™, Lotus Notes, etc. Within the LAN 18, messages are received by the message server 26, distributed to the appropriate mailboxes for user accounts addressed in the received message, and then accessed by a user through a computer system 28 operating as a messaging client. The wireless gateway 16 provides an interface to a wireless network 20, through which messages are exchanged with a mobile device 22. Such functions as addressing of the mobile device 22, encoding or otherwise transforming messages for wireless transmission, and any other required interface functions are performed by the wireless gateway 16. Although the wireless gateway 16 operates with the single wireless network 20 in FIG. 1, wireless gateways may be configured to operate with more than one wireless network in alternative embodiments, in which case the wireless gateway may also determine a most likely network for locating a given mobile device user and may also track users as they roam between countries or networks. Any computer system 14, 28 with access to the WAN 12 may exchange messages with a mobile device 22 through the wireless network gateway 16. Alternatively, private wireless network gateways, such as wireless Virtual Private Network (VPN) routers, could be implemented to provide a private interface to a wireless network. For example, a wireless VPN router implemented in the LAN 18 would provide a private interface from the LAN 18 to one or more mobile devices such as the mobile device 22 through the wireless network 20. Wireless VPN routers and other types of private interfaces to the mobile device 22 may effectively be extended to entities outside the LAN 18 by providing a message forwarding or redirection system that operates with the message server 26. Such a redirection system is disclosed in U.S. Pat. No. 6,219,694, which is hereby incorporated into this application by reference. In this type of redirection system, incoming messages received by the message server 26 and addressed to a user of a mobile device 22 are sent through the wireless network interface, either a wireless VPN router, wireless gateway 16 or other interface, to the wireless network 20 and to the user's mobile device 22. Another alternate interface to a user's mailbox on a message server 26 is a Wireless Application Protocol (WAP) gateway, through which a list of messages in a user's mailbox on the message server 26, and possibly each message or a portion of each message, could be sent to the mobile device 22. Wireless networks such as the wireless network 20 normally deliver information to and from mobile devices via RF transmissions between base stations and the mobile devices. The wireless network 20 may, for example, be a data-centric wireless network, a voice-centric wireless network, or a dual-mode network that can support both voice and data communications over the same infrastructure. Known data-centric network include the Mobitex™ Radio Network (“Mobitex”), and the DataTAC™ Radio Network (“DataTAC”). Examples of known voice-centric data networks include Personal Communication Systems (PCS) networks like Global System for Mobile Communications (GSM) and Time Division Multiple Access (TDMA) systems. Dual-mode wireless networks include Code Division Multiple Access (CDMA) networks, General Packet Radio Service (GPRS) networks, and so-called third-generation (3G) networks, such as Enhanced Data rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS), which are currently under development. The mobile device 22 is a data communication device, a voice communication device, or a multiple-mode device capable of voice, data and other types of communications. An exemplary mobile device 22 is described in further detail below. Perhaps the most common type of messaging currently in use is e-mail. In a standard e-mail system, an e-mail message is sent by an e-mail sender, possibly through a message server and/or a service provider system, and is then routed through the Internet, when necessary, to one or more message receivers. E-mail messages are normally sent in the clear and typically use Simple Mail Transfer Protocol (SMTP) headers and Multi-purpose Internet Mail Extensions (MIME) body parts to define the format of the e-mail message. In recent years, secure messaging techniques have evolved to protect both the content and integrity of messages, such as e-mail messages. S/MIME and Pretty Good Privacy™ (PGP™) are two public key secure e-mail messaging protocols that provide for both encryption, to protect data content, and signing, which protects the integrity of a message and provides for sender authentication by a message receiver. In addition to utilizing digital signatures and possibly encryption, secure messages may also be encoded, compressed or otherwise processed. FIG. 2 is a block diagram illustrating a secure e-mail message exchange in a messaging system. The system includes an e-mail sender 30 coupled to a WAN 32, and a wireless gateway 34, which provides an interface between the WAN 32 and a wireless network 36. A mobile device 38 is adapted to operate within the wireless network 36. The e-mail sender 30 is a PC, such as the system 14 in FIG. 1, a network-connected computer, such as computer 28 in FIG. 1, or a mobile device, on which a messaging client operates to enable e-mail messages to be composed and sent. The WAN 32, wireless gateway 34, wireless network 36 and mobile device 38 are substantially the same as similarly-labelled components in FIG. 1. In an example digital signature scheme, a secure e-mail message sender 30 digitally signs a message by taking a digest of the message and signing the digest using the sender's private key. A digest may, for example, be generated by performing a check-sum, a Cyclic Redundancy Check (CRC), a hash, or some other non-reversible operation on the message. This digest is then digitally signed by the sender using the sender's private key. The private key is used to perform an encryption or some other transformation operation on the digest to generate a digest signature. A digital signature, including the digest and the digest signature, is then appended to the outgoing message. In addition, a digital Certificate (Cert) of the sender, which includes the sender's public key and sender identity information that is bound to the public key with one or more digital signatures, and possibly any chained Certs and Certificate Revocation Lists (CRLs) associated with the Cert and any chained Certs, is often included with the outgoing message. The secure e-mail message 40 sent by the e-mail sender 30 includes a component 42 including the sender's Cert, Cert chain, CRLs and digital signature and the signed message body 44. In the S/MIME secure messaging technique, Certs, CRLs and digital signatures are normally placed at the beginning of a message as shown in FIG. 2, and the message body is included in a file attachment. Messages generated by other secure messaging schemes may place message components in a different order than shown or include additional and/or different components. For example, a signed message 40 may include addressing information, such as “To:” and “From:” email addresses, and other header information not shown in FIG. 2. When the secure e-mail message 40 is sent from the e-mail sender 30, it is routed through the WAN 32 to the wireless gateway 34, through the wireless network 36, and then to the mobile device 38. As described above, an e-mail message sender may alternatively send a message directly to a wireless gateway, to a computer system associated with a mobile device, or to a wireless VPN router or other interface for delivery to a mobile device. The receiver of the signed message 40, the mobile device 38, typically verifies the digital signature 42 in the secure message 40 by generating a digest of the message body 44, extracting the transmitted digest from the digital signature 42, comparing the generated digest with the digest extracted from the digital signature 42, and then verifying the digest signature in the digital signature. The digest algorithm used by a secure message receiver to generate the generated digest is the same as the algorithm used by the message sender, and is normally specified in a message header, or possibly in a digital signature of the secure message. Commonly used digest algorithm include the Secure Hash Algorithm 1 (SHA1) and Message-Digest Algorithm 5 (MD5), although other digest algorithms may be used. It should be appreciated that the systems and methods described herein are in no way limited to the above, or any other digital signature scheme. In order to verify the digest signature, the receiver 38 retrieves the public key of the sender 30, generally by extracting the public key from the sender's Cert 42 attached to the message 40, and then verifies the signature on the digest in the digital signature by performing a reverse transformation on the digest signature. For example, if the message sender 30 generated the digest signature by encrypting the digest using its private key, then a receiver 38 uses the sender's public key to decrypt the digest signature to recover the original digest. The secure message 40 shown in FIG. 2 includes the sender's Cert 42, from which the sender's public key can be extracted. Where the sender's public key was extracted from an earlier message from the sender 30 and stored in a key store in the receiver's local store, the sender's public key may instead be retrieved from the local store. Alternatively, the public key may be retrieved from the sender's Cert stored in a local store, or from a Public Key Server (PKS). A PKS is a server that is normally associated with a Certificate Authority (CA) from which a Cert for an entity, including the entity's public key, is available. A PKS might reside within a corporate LAN such as 18 (FIG. 1), or anywhere on the WAN 32, Internet or other network or system through which message receivers may establish communications with the PKS. The Cert, Cert chain and CRLs 42 are used by a receiver to ensure that the sender's Cert is valid, i.e., that the Cert has not been revoked or expired, and is trusted. A Cert is often part of a Cert chain, which includes a user's Cert as well as other Certs to verify that the user's Cert is authentic. For example, a Cert for any particular entity typically includes the entity's public key and identification information that is bound to the public key with a digital signature. Several types of Cert currently in use include, for example, X.509 Certs, which are typically used in S/MIME, and PGP Certs, which have a slightly different format. The digital signature in a Cert is generated by the issuer of the Cert, and is checked by a message receiver as described above. A Cert may include an expiry time or validity period from which a messaging client determines if the Cert has expired. When a CRL is available, the Cert is checked against the CRL to ensure that the Cert has not been revoked. If the digital signature in a message sender's Cert is verified, the Cert has not expired or been revoked, and the issuer of the Cert is trusted by a message receiver, then the digital signature of the message is trusted by the message receiver. If the issuer of the Cert is not trusted, then the message receiver traces a certification path through the Cert chain to verify that each Cert in the chain was signed by its issuer, whose Cert is next in the Cert chain, until a Cert is found that was signed by a root Cert from a trusted source, such as a large PKS. Once a root Cert is found, then a signature can be trusted, because both the sender and receiver trust the source of the root Cert. If a secure message was encrypted or otherwise processed by a message sender after being signed, then each receiver first decrypts or performs other inverse processing operations on the message before signature verification is performed. Where encryption or other processing was performed before signing, however, inverse processing such as decryption is performed after signature verification. Encryption and decryption involve applying a cryptographic key and cipher algorithm to information to be encrypted or decrypted. Encryption and decryption use corresponding cipher algorithms, which may or may not be the same, and either the same or different cryptographic keys. In public key systems, different keys are used for encryption and decryption, whereas in “shared secret” type operations, the same key, a secret shared between a sender and recipient, is used for both encryption and decryption. Access to a user's public key is also used when an outgoing message addressed to that user is to be encrypted according to a public key encryption algorithm. However, when an error is encountered during a public key access operation, known messaging clients provide little or no information as to the nature of any errors and possible solutions. FIG. 3 illustrates a mobile device 100 wishing to access an attachment 102 that is attached to a secure message 104. In FIG. 3, the secure message scheme used in this example treats the secure message 104 itself as an attachment. As an illustration, when a server 106 receives an S/MIME message 104, the S/MIME message 104 is (at least initially) perceived by the server 106 as an attachment due to how the S/MIME message 104 is structured. Such a scheme may be considered as having an attachment 102 within another attachment (i.e., the secure message 104). A reason that a secure message 104 appears as an attachment to an e-mail program (e.g., Microsoft Outlook) or to the server 106 is that the message has been enveloped (e.g., encrypted or otherwise protected) with a secure layer. For example, the secure layer can result from the message being encrypted using a random symmetric key, wherein that symmetric key may then be encrypted using the recipient's public key and sent along with the message. If a message is being sent to multiple recipients, the symmetric key is encrypted separately by every recipient's public key. The enveloped message and the encrypted symmetric keys are packaged together and also may be protected via a digital signature. More specifically, since S/MIME is used to secure MIME entities, a MIME entity that is secured as such can be thought of as the “inside” MIME entity. That is, it is the “innermost” object of a larger MIME message. One or more attachments may be contained within a MIME entity. These aspects are further discussed in RFC 2633 (version 3) entitled “S/MIME Version 3 Message Specification.” It should be understood that message security techniques other than S/MIME may be used that result in a secure layer that envelops or wraps message components and which need to be processed by the systems and methods disclosed herein. An attachment 102 contained within a secure message 104 that a mobile device 100 wishes to obtain may be any type of file, such as a textual/word processing document. The attachment 102 may also be an image, audio or video file. Because the mobile device 100 is typically resource-limited and in order to save bandwidth, the message server 106 may elect not to initially send the attachment 102 to the mobile device 100 over a wireless connector system 108. While viewing the message on the mobile device 100, a user can request that the message's associated attachment data 102 be transmitted to the mobile device 100 over the wireless connector system 108. It is noted that the wireless connector system 108 may include a wireless network, wireless gateway, and/or wide area network. The server 106 receives the attachment request 110 and uses the identifying information contained within the attachment request 110 to locate the proper attachment 102. The server 106 contains computer instructions, such as a secure message processing module 112, to look inside the secure message 104 to locate the attachment 102. In order to look inside the secure message 104, decryption operations may need to take place. Location of the attachment 102 within the secure message 104 can be accomplished in many ways, such as by locating a MIME field that contains or is associated with the desired attachment. Once located, the server 106 sends over the wireless connector system 108 the requested attachment 114 to the mobile device 100. The mobile device 100 can then use the transmitted attachment 114 in any way permitted for the attachment, such as to view the attachment 114 or play an audio attachment. FIG. 4 illustrates an operational scenario wherein a mobile device accesses an attachment. At step 200, a mobile device receives a secure message. If the secure message has one or more attachments, then the mobile device typically displays an icon to the user in order to indicate that an attachment is associated with the message and can be provided to the user. The server may provide an indication to the mobile device that the secure message has an attachment, and the server's indication is used by the mobile device to indicate to the mobile device's user that the secure message has an attachment. Additionally, it should be understood that there may be situations where an attachment is to be provided to a mobile device other than a user indicating a desire to retrieve an attachment. As an illustration, a mobile device may automatically retrieve an attachment based upon the message being opened. If the attachment is to be retrieved, then at step 202 the mobile device provides a request to have the attachment provided to it. At step 204, the server receives the attachment request. The attachment request may use many different approaches to indicate which attachment(s) the mobile device wishes to receive. For example, the device can specify which attachment it is interested in by using a message attachment indexing system that the device and server both understand. When the user wishes to view an attachment in an S/MIME message, the device sends the appropriate attachment identifier to the server. The server performs an index lookup to find the attachment or the message containing the attachment based upon the identifier. At step 206, the server processes the secure message encoding and finds the attachment within the secure message. At step 208, the server provides the attachment to the mobile device. The mobile device provides the attachment to the user at step 210. It should be understood that the steps in the flowchart need not necessarily include all of the steps disclosed herein and may include further steps and operations. For example, the server may initially look inside the secure message, such as by decrypting the secure message, to determine whether any attachments are associated with the secure message. The server can provide an indication to the mobile device as to whether the secure message contained any attachments (which indication can then be provided to the user). As another example, the server may render the attachment before transmitting it to the mobile device. As shown in FIG. 5, the server 106 may render the attachment 102 so that the attachment 102 can be more easily viewed (provided that the attachment is of the type that can be viewed by the mobile device). A rendering operation software module 300 accessible by the server 106 can perform the proper rendering of the attachment 102 so that the resource-limited mobile device 100 does not have to perform such operations. The rendering operation software module 300 renders the attachment 102 so as to be compatible with the attachment viewing software used by the mobile device 100. If needed, module 300 can access a lookup table to determine which format to use to render the attachment 102 for a particular mobile device 100. It should be understood that other approaches may be used, such as the mobile device 100 indicating to the server 106 which format should be used to render the attachment 102, or the server 106 providing attachment viewing software to the mobile device 100 so that the mobile device 100 may view the rendered attachment 114. The rendered attachment 114 is transmitted to the mobile device 100 and viewed normally on the mobile device 100. The server 106 may transmit all or a portion of the attachment 102. In the situation of the latter, if the mobile device 100 wants to see additional portions of the attachment 102, then the server 106 will send additional portions of the attachment 102 in response to a request by the mobile device 100. Other operations can be performed with respect to the secure message and its attachment(s). For example, if a message is just signed, then the server can process the secure message encoding and find the attachment. However, if the message is encrypted, then the server uses one or more symmetric/asymmetric keys that are needed to decrypt the secure message. As shown in FIG. 6, the mobile device 100 may provide the session key 402 (which was used to encrypt the secure message 104) to the server 106 with the attachment request 110. The server 106 accesses an encryption/decryption processing module 400 to decrypt the secure message 104 using the transmitted session key 402. After the secure message 104 had been decrypted by the module 400, the secure message processing module 112 looks into the secure message 104 and obtains the attachment 102. The attachment 302 is transmitted for use by the mobile device 100. The attachment 302 is optionally rendered as described above before transmission to the mobile device 100. It will be appreciated that the systems and methods are disclosed by way of example only. Many variations on the systems and methods described above are within the scope of the invention as claimed, whether or not expressly described. For example, the operations disclosed herein may be implemented as the secure message processing module may comprise one or more modules in order to handle a secure message and its attachment(s). Data structures may be used as part of the operations, such as to store data needed to access the attachment contained within a secure message. Still further, data signals transmitted using a communication channel may be used with the systems and methods. The data signals can include any type of data, such as the data and attachments transmitted to and/or from a mobile device. The data signal may be packetized data that is transmitted through a carrier wave or other medium across the network. Computer-readable media may be provided to and used with the mobile device that is capable of causing a mobile device to perform the methods and implement the systems disclosed herein. As another example, the methods and systems may be used with a wide assortment of electronic devices, such as a personal digital assistant (PDA) device or the mobile device 600 shown in FIG. 7. With reference to FIG. 7, the mobile device 600 is preferably a two-way communication device having at least voice and data communication capabilities. The mobile device 600 preferably has the capability to communicate with other computer systems on the Internet. Depending on the functionality provided by the device, the device may be referred to as a data messaging device, a two-way pager, a cellular telephone with data messaging capabilities, a wireless Internet appliance or a data communication device (with or without telephony capabilities). The mobile device 600 includes a transceiver 611, a microprocessor 638, a display 622, non-volatile memory 624, RAM 626, auxiliary input/output (I/O) devices 628, a serial port 630, a keyboard 632, a speaker 634, a microphone 636, a short-range wireless communications sub-system 640, and other device sub-systems 642. The transceiver 611 includes transmit and receive antennas 616, 618, a receiver (Rx) 612, a transmitter (Tx) 614, one or more local oscillators (LOs) 613, and a digital signal processor (DSP) 620. Within the non-volatile memory 624, the mobile device 600 includes a plurality of software modules 624A-624N that can be executed by the microprocessor 638 (and/or the DSP 620), including a voice communication module 624A, a data communication module 624B, and a plurality of other operational modules 624N for carrying out a plurality of other functions. As described above, the mobile device 600 is preferably a two-way communication device having voice and data communication capabilities. Thus, for example, the mobile device 600 may communicate over a voice network, such as any of the analog or digital cellular networks, and may also communicate over a data network. The voice and data networks are depicted in FIG. 7 by the communication tower 619. These voice and data networks may be separate communication networks using separate infrastructure, such as base stations, network controllers, etc., or they may be integrated into a single wireless network. The communication subsystem 611 is used to communicate with the network 619. The DSP 620 is used to send and receive communication signals to and from the transmitter 614 and receiver 612, and may also exchange control information with the transmitter 614 and receiver 612. If the voice and data communications occur at a single frequency, or closely-spaced set of frequencies, then a single LO 613 may be used in conjunction with the transmitter 614 and receiver 612. Alternatively, if different frequencies are utilized for voice communications versus data communications, then a plurality of LOs 613 can be used to generate a plurality of frequencies corresponding to the network 619. Although two antennas 616, 618 are depicted in FIG. 7, the mobile device 600 could be used with a single antenna structure. Information, which includes both voice and data information, is communicated to and from the communication module 611 via a link between the DSP 620 and the microprocessor 638. The detailed design of the communication subsystem 611, such as frequency band, component selection, power level, etc., will be dependent upon the communication network 619 in which the mobile device 600 is intended to operate. For example, a mobile device 600 intended to operate in a North American market may include a communication subsystem 611 designed to operate with the Mobitex or DataTAC mobile data communication networks and also designed to operated with any of a variety of voice communication networks, such as AMPS, TDMA, CDMA, PCS, etc., whereas a mobile device 600 intended for use in Europe may be configured to operate with the GPRS data communication network and the GSM voice communication network. Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 600. Depending upon the type of network 619, the access requirements for the dual-mode mobile device 600 may also vary. For example, in the Mobitex and DataTAC data networks, mobile devices are registered on the network using a unique identification number associated with each device. In GPRS data networks, however, network access is associated with a subscriber or user of a mobile device 600. A GPRS device typically requires a subscriber identity module (“SIM”), which is required in order to operate the mobile device 600 on a GPRS network. Local or non-network communication functions (if any) may be operable, without the SIM, but the mobile device 600 will be unable to carry out any functions involving communications over the network 619, other than any legally required operations, such as ‘911’ emergency calling. After any required network registration or activation procedures have been completed, the mobile device 600 may send and receive communication signals, preferably including both voice and data signals, over the network 619. Signals received by the antenna 616 from the communication network 619 are routed to the receiver 612, which provides for signal amplification, frequency down conversion, filtering, channel selection, etc., and may also provide analog to digital conversion. Analog to digital conversion of the received signal allows more complex communication functions, such as digital demodulation and decoding to be performed using the DSP 620. In a similar manner, signals to be transmitted to the network 619 are processed, including modulation and encoding, for example, by the DSP 620 and are then provided to the transmitter 614 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 619 via the antenna 618. Although a single transceiver 611 is shown in FIG. 7 for both voice and data communications, the mobile device 600 may include two distinct transceivers, a first transceiver for transmitting and receiving voice signals, and a second transceiver for transmitting and receiving data signals. In addition to processing the communication signals, the DSP 620 also provides for receiver and transmitter control. For example, the gain levels applied to communication signals in the receiver 612 and transmitter 614 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 620. Other transceiver control algorithms could also be implemented in the DSP 620 in order to provide more sophisticated control of the transceiver 611. The microprocessor 638 preferably manages and controls the overall operation of the mobile device 600. Many types of microprocessors or microcontrollers could be used for this part, or, alternatively, a single DSP 620 could be used to carry out the functions of the microprocessor 638. Low-level communication functions, including at least data and voice communications, are performed through the DSP 620 in the transceiver 611. Other, high-level communication applications, such as a voice communication application 624A, and a data communication application 624B may be stored in the non-volatile memory 624 for execution by the microprocessor 638. For example, the voice communication module 624A may provide a high-level user interface operable to transmit and receive voice calls between the mobile device 600 and a plurality of other voice devices via the network 619. Similarly, the data communication module 624B may provide a high-level user interface operable for sending and receiving data, such as e-mail messages, files, organizer information, short text messages, etc., between the mobile device 600 and a plurality of other data devices via the network 619. The microprocessor 638 also interacts with other device subsystems, such as the display 622, non-volatile memory 624, random access memory (RAM) 626, auxiliary input/output (I/O) subsystems 628, serial port 630, keyboard 632, speaker 634, microphone 636, a short-range communications subsystem 640 and any other device subsystems generally designated as 642. The components 628, 632, 634 and 636 are examples of the types of subsystems that could be provided as users interfaces. The modules 624A-N are executed by the microprocessor 638 and may provide a high-level interface between a user of the mobile device and the mobile device. This interface typically includes a graphical component provided through the display 622, and an input/output component provided through the auxiliary I/O 628, keyboard 632, speaker 634, or microphone 636. Some of the subsystems shown in FIG. 7 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. Notably, some subsystems, such as keyboard 632 and display 622 may be used for both communication-related functions, such as entering a text message for transmission over a data communication network, and device-resident functions such as a calculator or task list or other PDA type functions. Operating system software used by the microprocessor 638 is preferably stored in a persistent store such as non-volatile memory 624. In addition to the operating system and communication modules 624A-N, the non-volatile memory 624 may also include a file system for storing data. A storage area is also preferably provided in the non-volatile memory 624 to store public keys, a private key, and other information required for secure messaging. The operating system, specific device applications or modules, or parts thereof, may be temporarily loaded into a volatile store, such as RAM 626 for faster operation. Moreover, received communication signals may also be temporarily stored to RAM 626 before permanently writing them to a file system located in the non-volatile store 624. As those skilled in the art will appreciate, the non-volatile store 624 may be implemented as a Flash memory component or a battery backed-up RAM, for example. An exemplary application module 624N that may be loaded onto the mobile device 600 is a personal information manager (PIM) application providing PDA functionality, such as calendar events, appointments, and task items. This module 624N may also interact with the voice communication module 624A for managing phone calls, voice mails, etc., and may also interact with the data communication module 624B for managing e-mail communications and other data transmissions. Alternatively, all of the functionality of the voice communication module 624A and the data communication module 624B may be integrated into the PIM module. The non-volatile memory 624 preferably provides a file system to facilitate storage of PIM data items on the device. The PIM application preferably includes the ability to send and receive data items, either by itself, or in conjunction with the voice and data communication modules 624A, 624B, via the wireless network 619. The PIM data items are preferably seamlessly integrated, synchronized and updated, via the wireless network 619, with a corresponding set of data items stored or associated with a host computer system, thereby creating a mirrored system for data items associated with a particular user. The mobile device 600 may also be manually synchronized with a host system by placing the mobile device 600 in an interface cradle, which couples the serial port 630 of the mobile device 600 to the serial port of the host system. The serial port 630 may also be used to download other application modules 624N for installation, and to load Certs, keys and other information onto a device. This wired download path may be used to load an encryption key onto the mobile device 600, which is a more secure method than exchanging encryption information via the wireless network 619. Additional application modules 624N may be loaded onto the mobile device 600 through the network 619, through an auxiliary I/O subsystem 628, through the serial port 630, through the short-range communications subsystem 640, or through any other suitable subsystem 642, and installed by a user in the non-volatile memory 624 or RAM 626. Such flexibility in application installation increases the functionality of the mobile device 600 and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 600. When the mobile device 600 is operating in a data communication mode, a received signal, such as a text message or a web page download, is processed by the transceiver 611 and provided to the microprocessor 638, which preferably further processes the received signal for output to the display 622, or, alternatively, to an auxiliary I/O device 628. A user of mobile device 600 may also compose data items, such as email messages, using the keyboard 632, which is preferably a complete alphanumeric keyboard laid out in the QWERTY style, although other styles of complete alphanumeric keyboards such as the known DVORAK style may also be used. User input to the mobile device 600 is further enhanced with a plurality of auxiliary I/O devices 628, which may include a thumbwheel input device, a touchpad, a variety of switches, a rocker input switch, etc. The composed data items input by the user may then be transmitted over the communication network 619 via the transceiver 611. When the mobile device 600 is operating in a voice communication mode, the overall operation of the mobile device 600 is substantially similar to the data mode, except that received signals are preferably output to the speaker 634 and voice signals for transmission are generated by a microphone 636. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on the mobile device 600. Although voice or audio signal output is preferably accomplished primarily through the speaker 634, the display 622 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information. For example, the microprocessor 638, in conjunction with the voice communication module 624A and the operating system software, may detect the caller identification information of an incoming voice call and display it on the display 622. A short-range communications subsystem 640 is also included in the mobile device 600. For example, the subsystem 640 may include an infrared device and associated circuits and components, or a short-range wireless communication module such as a Bluetooth™ communication module or an 802.11 module to provide for communication with similarly-enabled systems and devices. Those skilled in the art will appreciate that “Bluetooth” and “802.11” refer to sets of specifications, available from the Institute of Electrical and Electronics Engineers (IEEE), relating to wireless personal area networks and wireless LANs, respectively.
<SOH> BACKGROUND <EOH>1. Technical Field The present invention relates generally to the field of secure electronic messaging, and in particular to accessing message attachments. 2. Description of the Related Art Capabilities of wireless mobile communication devices have expanded greatly. For example, such devices not only receive electronic messages, but can view attachments associated with electronic messages. However, difficulties arise when a mobile device wishes to access attachments of secure messages. This is due at least in part to how messages and attachments are structured in order to comport with a security scheme.
<SOH> SUMMARY <EOH>In accordance with the teachings disclosed herein, methods and systems are provided for handling attachments on wireless mobile communication devices. As an example, a method can include receiving an attachment provided with a secure message, wherein the secure message itself was received by the server as an attachment. The secure message is processed in order to locate within the secure message the requested attachment. The located attachment is provided to the mobile device. As another example, a system can include a server having a data store that stores a secure message and its associated attachment. The secure message contains a secure layer such that the secure message is received by the server as an attachment itself. A secure message processing module looks into the secure message through the secure layer in order to locate the attachment. The located attachment is provided to the mobile device.
20040322
20111101
20050922
97266.0
0
AJAYI, JOEL
SYSTEM AND METHOD FOR VIEWING MESSAGE ATTACHMENTS
UNDISCOUNTED
0
ACCEPTED
2,004